Persuasion Strategies: Use of Negative Forces in Scam E-mails
Keywords:
spam, Nigerian 419 scam, e-mail, fraud, persuasion strategiesAbstract
The 21st century globalisation strongly influences the world as a result of highly improved technology and communications which made it possible for everyone involved to have equal access to a global market and information exchange via English. As a result, electronic communication has become part of the present-day multinational professionals of all fields who work daily in front of their digital monitors. At times, these professionals may receive Nigerian 419 scam e-mails in which fraudsters target victims to make advance payments for financial gains that do not materialise. In these e-mails, situations in which persuasion techniques are intertwined are well crafted. As a result, the victim who is susceptible to the offer is more likely to respond and be lured into losing money eventually. The present study, consequently, analysed a corpus of 50 Nigerian 419 scam e-mails through a textual analysis to examine language aspects in terms of persuasion strategies fraudsters used as a compelling force to achieve their communicative purposes of lures and deceits. The study has revealed two major types of deceptive techniques which are used in combination, namely framing-rhetoric triggers, disguised as the traditional genre of electronic communications and human weakness-exploiting triggers, intended as incitement of recipients' emotions. Finally, the paper includes not only pedagogical suggestions for business English teachers when implementing classroom activities, but also warnings for either pre-experienced or experienced business professionals in relation to interpreting the unknown e-mails' messages they receive with great caution.References
Atkins, B. & Huang, W. (2013). A Study of Social Engineering in Online Frauds. Open Journal of Social Sciences. 1(3), 23-32.
Brown, J. D. (1996). Testing in Language Programs. New Jersey, NJ: Prentice Hall Regents.
Cukier, W. L., Nesselroth, E. J., & Cody, S. (2007). Genre, narrative and the "Nigerian Letter" in electronic mail. HICSS 2007 Conference Proceedings, 3-6 January, Hawaii doi: 10.1109/HICSS.2007.238
Cukier, W. L., Ngwenyama, O. & Nesselroth-Woyzbun, E. J. (2008). Genres of Spam: Expectations and Deceptions. Scandinavian Journal of Information Systems. 20(1), 69-92.
Dion, M. (2010). Advance Fee Fraud Letters as Machiavellian/Narcissistic Narratives. International Journal of Cyber Criminology. 4(1&2), 630-642.
Dyrud, M. A. (2005). "I bought you a good news": An analysis of Nigerian 419 letters. ABC 70th Annual Conference Proceedings, 20-22 October, Irvine. Retrieved from
http://www.businesscommunication.org/conventions/Proceedings/2005/PDFs/07ABC05.pdf
Fraud.org. (n.d.a). Top Scam of 2014. Retrieved from http://www.fraud.org/images/PDF/2014_fraud_report.pdf
Fraud.org. (n.d.b). Top Scam of 2011. Retrieved from http://fraudresearchcenter.org/wp-content/uploads/2012/02/National-Consumers-League-2011-Top-Scams-of-2011.pdf
Fraud.org. (n.d.c). Nigerian Money Offers. Retrieved from http://www.fraud.org/scams/direct-marketing/nigerian-money-offers
Gillespie, A. (2012, July 16). Using Spam Emails in your Classroom [Weblog post]. Retrieved from http://www.theguardian.com/teacher-network/2012/jul/16/spam-emails-classroom
Huang, W., & Brockman, A. (2011). Social Engineering Exploitations in Online Communications: Examining Persuasions Used in Fraudulent E-mails. In T. Holt (Ed.). Crime Online: Correlates, Causes, and Context (pp. 87-111). Durham, NC: Carolina Academic Press.
Kiang, N. Y. (2003). A Discourse Analysis of E-mail Messages in a Malaysian Business Community. GEMA Online® Journal of Language Studies. 3(1), 1-12.
King, A., & Thomas, J. (2009). You can't Cheat an Honest Man: Making ($$$s and) Sense of the Nigerian E-mail Scams. In F. Schmallegar, & M. Pittaro (Eds.). Crimes of the Internet (pp. 206-224). Saddle River, NJ: Pearson Education.
Mann, I. (2008). Hacking the Human: Social Engineering Techniques and Security Measures. Burlington, VT: Gower Publishing Company.
Manson, L. (2011). Crimes of persuasion: Scams and their victims. Edinburgh: The Scottish Association of Citizens Advice Bureaux - Citizens Advice Scotland. Retrieved from
http://www.cas.org.uk/system/files/publications/crimes-of-persuasion.pdf
National White Collar Crime Center (2014). Internet crime report. Washington, DC: Bureau of Justice Assistance. Retrieved from https://www.fbi.gov/news/news_blog/2014-ic3-annual-report
Nigeria - The 419 Coalition Website. (n.d.). The Nigerian Scam (419 Advance Fee Fraud) Defined. Retrieved March 28, 2015 from http://home.rica.net/alphae/419coal/
Perloff, R. M. (2010). The Dynamics of Persuasion: Communication and Attitudes in the 21st Century (4th ed.). New York, NY: Routledge.
Raman, K. (2008). Ask and You Will Receive. McAfee Security Journal, Fall, 9-12.
Ross, D. (2009). ARS Dictaminis Perverted: The Personal Solicitation E-mail as a Genre. Journal of Technical Writing and Communication, 39(1), 25-41.
Rovinelli, R. J., & Hambleton, R. K. (1977). On the Use of Content Specialists in the Assessment of Criterion-referenced Test Item Validity. Dutch Journal of Educational Research. 2, 49-60.
Sandler, C. (2010). Teen’s Guides: Living with the Internet and Online Dangers. New York: Facts on File.
Stajano, F., & Wilson, P. (2009). Understanding Scam Victims: Seven Principles for Systems Security (Report No. 754). Cambridge: University of Cambridge Computer Laboratory.
Thompson, S. (2006). Helping the Hacker? Library Information, Security, and Social Engineering. Information Technology and Libraries. 25(4), 222-225.
Upton, T. A. & Connor, U. (2001). Using Computerised Corpus Analysis to Investigate the Textlinguistic Discourse Moves of a Genre. English for Specific Purposes. 20, 313-319.
Viosca, R.C., Bergiel, B.J. & Balsmeier, P. (2004). Effects of the Electronic Nigerian Money Fraud on the Brand Equity of Nigeria and Africa. Management Research News. 27(6), 11-20.
Workman, M. (2008). Wisecracker: A Theory-grounded Investigation of Phishing and Pretext Social Engineering Threats to Information Security. Journal of Personality and Social Psychology. 9(2), 1-27.
Downloads
Published
Issue
Section
License
If the article is accepted for publication, copyright of this article will be vested to UKM Press, National University of Malaysia (UKM).
All articles published in this journal are licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license, unless otherwise stated.