Persuasion Strategies: Use of Negative Forces in Scam E-mails

Chitchanok Naksawat, Songyut Akkakoson, Chek Kim Loi

Abstract


The 21st century globalisation strongly influences the world as a result of highly improved technology and communications which made it possible for everyone involved to have equal access to a global market and information exchange via English. As a result, electronic communication has become part of the present-day multinational professionals of all fields who work daily in front of their digital monitors. At times, these professionals may receive Nigerian 419 scam e-mails in which fraudsters target victims to make advance payments for financial gains that do not materialise. In these e-mails, situations in which persuasion techniques are intertwined are well crafted. As a result, the victim who is susceptible to the offer is more likely to respond and be lured into losing money eventually. The present study, consequently, analysed a corpus of 50 Nigerian 419 scam e-mails through a textual analysis to examine language aspects in terms of persuasion strategies fraudsters used as a compelling force to achieve their communicative purposes of lures and deceits. The study has revealed two major types of deceptive techniques which are used in combination, namely framing-rhetoric triggers, disguised as the traditional genre of electronic communications and human weakness-exploiting triggers, intended as incitement of recipients' emotions. Finally, the paper includes not only pedagogical suggestions for business English teachers when implementing classroom activities, but also warnings for either pre-experienced or experienced business professionals in relation to interpreting the unknown e-mails' messages they receive with great caution.

 


Keywords


spam; Nigerian 419 scam; e-mail; fraud; persuasion strategies

Full Text:

PDF

References


Atkins, B. & Huang, W. (2013). A Study of Social Engineering in Online Frauds. Open Journal of Social Sciences. 1(3), 23-32.

Brown, J. D. (1996). Testing in Language Programs. New Jersey, NJ: Prentice Hall Regents.

Cukier, W. L., Nesselroth, E. J., & Cody, S. (2007). Genre, narrative and the "Nigerian Letter" in electronic mail. HICSS 2007 Conference Proceedings, 3-6 January, Hawaii doi: 10.1109/HICSS.2007.238

Cukier, W. L., Ngwenyama, O. & Nesselroth-Woyzbun, E. J. (2008). Genres of Spam: Expectations and Deceptions. Scandinavian Journal of Information Systems. 20(1), 69-92.

Dion, M. (2010). Advance Fee Fraud Letters as Machiavellian/Narcissistic Narratives. International Journal of Cyber Criminology. 4(1&2), 630-642.

Dyrud, M. A. (2005). "I bought you a good news": An analysis of Nigerian 419 letters. ABC 70th Annual Conference Proceedings, 20-22 October, Irvine. Retrieved from

http://www.businesscommunication.org/conventions/Proceedings/2005/PDFs/07ABC05.pdf

Fraud.org. (n.d.a). Top Scam of 2014. Retrieved from http://www.fraud.org/images/PDF/2014_fraud_report.pdf

Fraud.org. (n.d.b). Top Scam of 2011. Retrieved from http://fraudresearchcenter.org/wp-content/uploads/2012/02/National-Consumers-League-2011-Top-Scams-of-2011.pdf

Fraud.org. (n.d.c). Nigerian Money Offers. Retrieved from http://www.fraud.org/scams/direct-marketing/nigerian-money-offers

Gillespie, A. (2012, July 16). Using Spam Emails in your Classroom [Weblog post]. Retrieved from http://www.theguardian.com/teacher-network/2012/jul/16/spam-emails-classroom

Huang, W., & Brockman, A. (2011). Social Engineering Exploitations in Online Communications: Examining Persuasions Used in Fraudulent E-mails. In T. Holt (Ed.). Crime Online: Correlates, Causes, and Context (pp. 87-111). Durham, NC: Carolina Academic Press.

Kiang, N. Y. (2003). A Discourse Analysis of E-mail Messages in a Malaysian Business Community. GEMA Online® Journal of Language Studies. 3(1), 1-12.

King, A., & Thomas, J. (2009). You can't Cheat an Honest Man: Making ($$$s and) Sense of the Nigerian E-mail Scams. In F. Schmallegar, & M. Pittaro (Eds.). Crimes of the Internet (pp. 206-224). Saddle River, NJ: Pearson Education.

Mann, I. (2008). Hacking the Human: Social Engineering Techniques and Security Measures. Burlington, VT: Gower Publishing Company.

Manson, L. (2011). Crimes of persuasion: Scams and their victims. Edinburgh: The Scottish Association of Citizens Advice Bureaux - Citizens Advice Scotland. Retrieved from

http://www.cas.org.uk/system/files/publications/crimes-of-persuasion.pdf

National White Collar Crime Center (2014). Internet crime report. Washington, DC: Bureau of Justice Assistance. Retrieved from https://www.fbi.gov/news/news_blog/2014-ic3-annual-report

Nigeria - The 419 Coalition Website. (n.d.). The Nigerian Scam (419 Advance Fee Fraud) Defined. Retrieved March 28, 2015 from http://home.rica.net/alphae/419coal/

Perloff, R. M. (2010). The Dynamics of Persuasion: Communication and Attitudes in the 21st Century (4th ed.). New York, NY: Routledge.

Raman, K. (2008). Ask and You Will Receive. McAfee Security Journal, Fall, 9-12.

Ross, D. (2009). ARS Dictaminis Perverted: The Personal Solicitation E-mail as a Genre. Journal of Technical Writing and Communication, 39(1), 25-41.

Rovinelli, R. J., & Hambleton, R. K. (1977). On the Use of Content Specialists in the Assessment of Criterion-referenced Test Item Validity. Dutch Journal of Educational Research. 2, 49-60.

Sandler, C. (2010). Teen’s Guides: Living with the Internet and Online Dangers. New York: Facts on File.

Stajano, F., & Wilson, P. (2009). Understanding Scam Victims: Seven Principles for Systems Security (Report No. 754). Cambridge: University of Cambridge Computer Laboratory.

Thompson, S. (2006). Helping the Hacker? Library Information, Security, and Social Engineering. Information Technology and Libraries. 25(4), 222-225.

Upton, T. A. & Connor, U. (2001). Using Computerised Corpus Analysis to Investigate the Textlinguistic Discourse Moves of a Genre. English for Specific Purposes. 20, 313-319.

Viosca, R.C., Bergiel, B.J. & Balsmeier, P. (2004). Effects of the Electronic Nigerian Money Fraud on the Brand Equity of Nigeria and Africa. Management Research News. 27(6), 11-20.

Workman, M. (2008). Wisecracker: A Theory-grounded Investigation of Phishing and Pretext Social Engineering Threats to Information Security. Journal of Personality and Social Psychology. 9(2), 1-27.


Refbacks

  • There are currently no refbacks.


 

 

 

eISSN : 2550-2131

ISSN : 1675-8021