Persuasion Strategies: Use of Negative Forces in Scam E-mails

Authors

  • Chitchanok Naksawat King Mongkut's University of Technology North Bangkok (KMUTNB) Department of Languages, Faculty of Applied Arts 1518 Pracharat 1 Road, Bangsue, Bangsue Bangkok 10800 Thailand
  • Songyut Akkakoson King Mongkut's University of Technology North Bangkok (KMUTNB) Department of Languages, Faculty of Applied Arts 1518 Pracharat 1 Road, Bangsue, Bangsue Bangkok 10800 Thailand
  • Chek Kim Loi Universiti Malaysia Sabah

Keywords:

spam, Nigerian 419 scam, e-mail, fraud, persuasion strategies

Abstract

The 21st century globalisation strongly influences the world as a result of highly improved technology and communications which made it possible for everyone involved to have equal access to a global market and information exchange via English. As a result, electronic communication has become part of the present-day multinational professionals of all fields who work daily in front of their digital monitors. At times, these professionals may receive Nigerian 419 scam e-mails in which fraudsters target victims to make advance payments for financial gains that do not materialise. In these e-mails, situations in which persuasion techniques are intertwined are well crafted. As a result, the victim who is susceptible to the offer is more likely to respond and be lured into losing money eventually. The present study, consequently, analysed a corpus of 50 Nigerian 419 scam e-mails through a textual analysis to examine language aspects in terms of persuasion strategies fraudsters used as a compelling force to achieve their communicative purposes of lures and deceits. The study has revealed two major types of deceptive techniques which are used in combination, namely framing-rhetoric triggers, disguised as the traditional genre of electronic communications and human weakness-exploiting triggers, intended as incitement of recipients' emotions. Finally, the paper includes not only pedagogical suggestions for business English teachers when implementing classroom activities, but also warnings for either pre-experienced or experienced business professionals in relation to interpreting the unknown e-mails' messages they receive with great caution. 

Author Biographies

Chitchanok Naksawat, King Mongkut's University of Technology North Bangkok (KMUTNB) Department of Languages, Faculty of Applied Arts 1518 Pracharat 1 Road, Bangsue, Bangsue Bangkok 10800 Thailand

Chitchanok Naksawat is presently a Master's student in English for Business and Industry Communication, King Mongkut's University of Technology North Bangkok, Thailand.

Songyut Akkakoson, King Mongkut's University of Technology North Bangkok (KMUTNB) Department of Languages, Faculty of Applied Arts 1518 Pracharat 1 Road, Bangsue, Bangsue Bangkok 10800 Thailand

Songyut Akkakoson is an assistant professor of English at the Department of Languages, Faculty of Applied Arts, King Mongkut's University of Technology North Bangkok, Thailand. He obtained his PhD degree in Applied Linguistics from University of Otago, Dunedin, New Zealand. His research interests lie in learning strategies, learning styles, reading in EFL, English for business communication, English speaking anxiety, ESP genre analysis, World Englishes.

Chek Kim Loi, Universiti Malaysia Sabah

Chek K. Loi is presently a senior lecturer at Universiti Malaysia Sabah. She obtained her PhD degree in Linguistics from University of Otago, Dunedin, New Zealand in 2011. She pursued her postdoctoral program in the United Kingdom in 2014. She has published papers in some international journals, namely Journal of Pragmatics, Journal of English for Academic Purposes. Her research interests include genre analysis, intercultural communication, bilingualism and discourse analysis.

References

Atkins, B. & Huang, W. (2013). A Study of Social Engineering in Online Frauds. Open Journal of Social Sciences. 1(3), 23-32.

Brown, J. D. (1996). Testing in Language Programs. New Jersey, NJ: Prentice Hall Regents.

Cukier, W. L., Nesselroth, E. J., & Cody, S. (2007). Genre, narrative and the "Nigerian Letter" in electronic mail. HICSS 2007 Conference Proceedings, 3-6 January, Hawaii doi: 10.1109/HICSS.2007.238

Cukier, W. L., Ngwenyama, O. & Nesselroth-Woyzbun, E. J. (2008). Genres of Spam: Expectations and Deceptions. Scandinavian Journal of Information Systems. 20(1), 69-92.

Dion, M. (2010). Advance Fee Fraud Letters as Machiavellian/Narcissistic Narratives. International Journal of Cyber Criminology. 4(1&2), 630-642.

Dyrud, M. A. (2005). "I bought you a good news": An analysis of Nigerian 419 letters. ABC 70th Annual Conference Proceedings, 20-22 October, Irvine. Retrieved from

http://www.businesscommunication.org/conventions/Proceedings/2005/PDFs/07ABC05.pdf

Fraud.org. (n.d.a). Top Scam of 2014. Retrieved from http://www.fraud.org/images/PDF/2014_fraud_report.pdf

Fraud.org. (n.d.b). Top Scam of 2011. Retrieved from http://fraudresearchcenter.org/wp-content/uploads/2012/02/National-Consumers-League-2011-Top-Scams-of-2011.pdf

Fraud.org. (n.d.c). Nigerian Money Offers. Retrieved from http://www.fraud.org/scams/direct-marketing/nigerian-money-offers

Gillespie, A. (2012, July 16). Using Spam Emails in your Classroom [Weblog post]. Retrieved from http://www.theguardian.com/teacher-network/2012/jul/16/spam-emails-classroom

Huang, W., & Brockman, A. (2011). Social Engineering Exploitations in Online Communications: Examining Persuasions Used in Fraudulent E-mails. In T. Holt (Ed.). Crime Online: Correlates, Causes, and Context (pp. 87-111). Durham, NC: Carolina Academic Press.

Kiang, N. Y. (2003). A Discourse Analysis of E-mail Messages in a Malaysian Business Community. GEMA Online® Journal of Language Studies. 3(1), 1-12.

King, A., & Thomas, J. (2009). You can't Cheat an Honest Man: Making ($$$s and) Sense of the Nigerian E-mail Scams. In F. Schmallegar, & M. Pittaro (Eds.). Crimes of the Internet (pp. 206-224). Saddle River, NJ: Pearson Education.

Mann, I. (2008). Hacking the Human: Social Engineering Techniques and Security Measures. Burlington, VT: Gower Publishing Company.

Manson, L. (2011). Crimes of persuasion: Scams and their victims. Edinburgh: The Scottish Association of Citizens Advice Bureaux - Citizens Advice Scotland. Retrieved from

http://www.cas.org.uk/system/files/publications/crimes-of-persuasion.pdf

National White Collar Crime Center (2014). Internet crime report. Washington, DC: Bureau of Justice Assistance. Retrieved from https://www.fbi.gov/news/news_blog/2014-ic3-annual-report

Nigeria - The 419 Coalition Website. (n.d.). The Nigerian Scam (419 Advance Fee Fraud) Defined. Retrieved March 28, 2015 from http://home.rica.net/alphae/419coal/

Perloff, R. M. (2010). The Dynamics of Persuasion: Communication and Attitudes in the 21st Century (4th ed.). New York, NY: Routledge.

Raman, K. (2008). Ask and You Will Receive. McAfee Security Journal, Fall, 9-12.

Ross, D. (2009). ARS Dictaminis Perverted: The Personal Solicitation E-mail as a Genre. Journal of Technical Writing and Communication, 39(1), 25-41.

Rovinelli, R. J., & Hambleton, R. K. (1977). On the Use of Content Specialists in the Assessment of Criterion-referenced Test Item Validity. Dutch Journal of Educational Research. 2, 49-60.

Sandler, C. (2010). Teen’s Guides: Living with the Internet and Online Dangers. New York: Facts on File.

Stajano, F., & Wilson, P. (2009). Understanding Scam Victims: Seven Principles for Systems Security (Report No. 754). Cambridge: University of Cambridge Computer Laboratory.

Thompson, S. (2006). Helping the Hacker? Library Information, Security, and Social Engineering. Information Technology and Libraries. 25(4), 222-225.

Upton, T. A. & Connor, U. (2001). Using Computerised Corpus Analysis to Investigate the Textlinguistic Discourse Moves of a Genre. English for Specific Purposes. 20, 313-319.

Viosca, R.C., Bergiel, B.J. & Balsmeier, P. (2004). Effects of the Electronic Nigerian Money Fraud on the Brand Equity of Nigeria and Africa. Management Research News. 27(6), 11-20.

Workman, M. (2008). Wisecracker: A Theory-grounded Investigation of Phishing and Pretext Social Engineering Threats to Information Security. Journal of Personality and Social Psychology. 9(2), 1-27.

Downloads

Published

2016-02-25