scholarly journals Who can spot an online romance scam?

2019 ◽  
Vol 26 (2) ◽  
pp. 623-633 ◽  
Author(s):  
Monica T. Whitty

Purpose This paper aims to examine predictors (personality, belief systems, expertise and response time) of detecting online romance scams. Design/methodology/approach The online study asked 261 participants to rate whether a profile was a scam or a genuine profile. Participants were also asked to complete a personality inventory, belief scales and demographic, descriptive questions. The online study was also designed to measure response time. Findings It was found that those who scored low in romantic beliefs, high in impulsivity, high in consideration of future consequences, had previously spotted a romance scam and took longer response times were more likely to accurately distinguish scams from genuine profiles. Notably, the research also found that it was difficult to detect scams. The research also found that it was important to adapt Whitty’s (2013) “Scammers Persuasive Techniques Model” to include a stage named: “human detection of scam versus genuine profiles”. Originality/value This is the first study, to the author’s knowledge, that examines predictors of human accuracy in detecting romance scams. Dating sites and government e-safety sites might draw upon these findings to help improve human detection and protect users from this financial and psychologically harmful cyberscam.

2020 ◽  
Vol 30 (5) ◽  
pp. 1353-1382
Author(s):  
Mengli Yu ◽  
Ronggang Zhou ◽  
Zhao Cai ◽  
Chee-Wee Tan ◽  
Huiwen Wang

PurposeThis study examines the impact of response time on user experience for mobile applications and considers the moderating influence of gender and network environment on this relationship.Design/methodology/approachAn experiment was conducted with 50 young adults to evaluate their user experience of a mobile application that simulates variations in network environment and response time. User experience was evaluated based on the three constituent dimensions of tolerance, acceptance, and satisfaction.FindingsAnalytical results demonstrate that response time not only adversely affects user experience of mobile applications, but that this effect is not homogeneous across the three dimensions of tolerance, acceptance and satisfaction. The findings also illustrate that gender moderates the effect of response time on user experience, however, the negative influence is more salient for males than females, which is opposite to our hypothesis. The joint moderating influence of gender and network environment turned out to be partly significant.Practical implicationsBy illuminating users' tolerance, acceptance, and satisfaction with varied response times, findings from this study can inform the design of mobile applications such that desired levels of user experience can be assured with minimum resources.Originality/valueAlthough response time has been hailed as a key determinant of user experience for desktop applications, there is a paucity of studies that have investigated the impact of response time on user experience for mobile applications. Furthermore, prior research on response time neglects the multi-dimensional nature of user experience. This study bridges the above mentioned knowledge gaps by delineating user experience into its constituent dimensions and clarifying the effects of response time on each of these dimensions.


2019 ◽  
Vol 26 (5) ◽  
pp. 454-469 ◽  
Author(s):  
Markus F. Peschl

Purpose While many approaches in the field of unlearning aim at describing, understanding or explaining the “what” and/or “how” of unlearning, this paper aims to focus on the “where-to” and the goal of unlearning. In many cases, unlearning starts off with a specific result or goal in mind. This paper suggests that such an approach has to be challenged in the context of a highly complex and uncertain world and to introduce a mode of unlearning following a strategy of future-oriented open-endedness. Design/methodology/approach This conceptual paper draws on (both theoretical/philosophical and empirical) interdisciplinary evidence from a wide variety of fields, such as organization studies, organizational (un)learning, systems theory, cognitive science and innovation studies. Findings It turns out that open-endedness in unlearning processes plays a central role, especially if we are confronted with high levels of uncertainty and complexity. In such an environment, following a strategy of co-becoming with an unfolding environment and with an emergent goal seems to be more promising than aiming at a preconceived (un-)learning goal. Originality/value The unlearning literature provides various approaches to what unlearning is and how it can be executed. However, understanding the actual goals and outcomes of unlearning and how these goals are identified and determined is a rather under-researched field. In many cases, they are preconceived in advance finding their realization in new forms of knowledge, assumptions, belief systems, values or routines. This paper challenges this strategy and addresses the gap of how it is possible to unlearn toward an uncertain future. This has an impact on the process of unlearning itself; it has to be reframed and understood as an open-ended strategy for identifying emerging future potentials, purposes and goals in a process of co-becoming with an unfolding future.


2020 ◽  
Vol 33 (6) ◽  
pp. 1395-1422
Author(s):  
Mark Christensen ◽  
Sébastien Rocher

PurposeIn analysing the beancounter image's trajectory, from its birth to its persistence, in European French language comics between 1945 and 2016, this paper explores why artists continue beancounter image usage in popular culture.Design/methodology/approachBeancounter characters have been studied in an application of Iconology (Panofsky, 1955) in order to unravel how individuals make sense of cultural artefacts and how, in turn, the visuals shape cultural belief systems at a given time.FindingsThis study reveals that comics artists usage of the beancounter image results from their critical reactions to management and capitalism whilst at other times the usage is an indication of authenticity. Motivation for the usage is not constant over time nor is the impact of the beancounter image. Both appear dependant of the level of artistic freedom experienced by the artist.Research limitations/implicationsBased on a single media (comics) with a unique characters (European French language) this study deepens exploration of the ways in which accounting becomes entwined with the everyday and implies that further research is needed.Originality/valueExtends the work of Smith and Jacobs (2011) and Jacobs and Evans (2012) by focusing on a genre of popular culture over a long period, and by adopting a critical viewpoint. Also expands the possible applications of Panofsky's (1955) Iconology in accounting studies.


2014 ◽  
Vol 23 (4) ◽  
pp. 329-342 ◽  
Author(s):  
Evangelos Mitsakis ◽  
Iraklis Stamos ◽  
Jose Maria Salanova Grau ◽  
Georgia Aifadopoulou

Purpose – The purpose of this paper is to present and apply a methodology that optimally assigns emergency response services (ERS) stations in Peloponnesus, Greece that was severely hit by wildfires in 2007, in an effort to describe the actual emergency response in this disaster and identify disaster management possibilities that can arise from the optimal allocation of the existing fire stations. Design/methodology/approach – The methodology concerns the development of an objective function that aims to minimize maximum and average response times of ERS stations and the evaluation of developed scenarios. Simulated annealing is used for the minimization of the objective function, providing near-optimal solutions with low computation times for medium-scale networks. Findings – The findings concern the comparison of average and maximum response times of ERS stations to hearths of fire, based on their actual and optimal allocation. They reveal an overall reduction in the average and maximum response time by 20 and 30 percent, respectively, for the entire region, while there is a reduction of 15 and 35 percent in the average and maximum response time for the locations affected by the 2007 wildfires. Research limitations/implications – The methodology is formulated as a facility location problem with unitary demand and unlimited capacity in the stations, which means that the allocation does not take into account simultaneous events. Originality/value – The paper fulfills an identified need to apply innovative research solutions to actual case studies in order to identify existing gaps and future disaster management possibilities.


2014 ◽  
Vol 42 (5) ◽  
pp. 28-33 ◽  
Author(s):  
Steven H. Kenney ◽  
Bryan A. Pelley

Purpose – Much of the scenario-based planning work that is observed fails to account for the web of belief systems that powerfully shape the ways that future conditions and trends are created and acted upon. This paper aims to address this issue. Design/methodology/approach – The authors show how understanding narratives – people’s beliefs, attitudes and perceptions and the stories, images, anecdotes and aphorisms used to articulate them – provides planners and leaders an exceptional ability to anticipate with confidence the actions that can drive the real world toward one scenario or another. Findings – The process of scenario planning, when it is infused with identification and analysis of relevant narratives, can produce potent insights. Practical implications – From a scenario planning perspective, narratives are not trends as we typically define them, but rather they provide the emotional context by which individuals and groups evaluate and internalize trends and other forces at play in the environment. Originality/value – As scenarios are used in practice over time, their methodology is evolving. Bringing the analysis of narratives – the deep-seated beliefs and belief systems of organizational, national, and other cultures – into the art and science of scenario planning is a step in that evolution.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Arvid Hoffmann ◽  
Simon McNair ◽  
Jason Pallant

Purpose The purpose of the paper is to examine how psychological characteristics predict membership of and transitions between states of higher vs lower financial vulnerability – and vice versa – over time. Design/methodology/approach This research uses a dynamic latent class model (latent transition analysis) to explore the dynamics of consumers’ financial vulnerability over time using longitudinal data obtained by repeatedly administering a measure of financial vulnerability. Findings This research finds that consumers in a state of lower vulnerability are “fragile” in having a relatively high likelihood of moving to a state of higher vulnerability, whereas those in a state of higher vulnerability are “entrenched” in having a relatively low likelihood of moving to a state of lower vulnerability. This pattern of results is called the “financial vulnerability trap.” While financial self-efficacy explains state membership, the consideration of future consequences drives state transitions. Research limitations/implications Future research could follow consumers over a longer period and consider the role of alternative psychological characteristics besides those examined. Practical implications This research provides practitioners with actionable insights regarding the drivers of changes in consumers’ financial vulnerability across time, showing the value of financial self-efficacy and the consideration of future consequences when developing strategies to prevent consumers from sliding from a state of lower to higher financial vulnerability over time. Originality/value There is scant research on financial vulnerability. Further, prior research has not examined whether and how consumers’ psychological characteristics help explain their membership of and transitions between states of different levels of financial vulnerability over time.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ilgım Dara Benoit ◽  
Elizabeth G. Miller ◽  
Elika Kordrostami ◽  
Ceren Ekebas-Turedi

Purpose Public service announcements (PSAs) are frequently used tools to try to change attitudes and behaviors on social issues, including texting and driving, which has been social problem for over a decade. However, the effectiveness of such PSA campaigns often meet with varying degrees of success, suggesting changes to current anti-texting and driving campaigns are needed. This study aims to examine how to design more effective anti-texting and driving PSA campaigns by identifying the elements of existing campaigns that have the strongest impact on attitude change. Design/methodology/approach In total, 682 respondents from Amazon’s Mechanical Turk participated in an online study in which they evaluated 162 real-world anti-texting and driving ads. Respondents evaluated the ads on various ad elements (i.e. type of appeal, source of emotion, discrete emotions and perceived creativity), as well as their attitudes toward the issue after seeing the ad. Findings PSAs that use emotional (vs rational) appeals, evoke emotion through imagery (vs text) and/or use fear (vs disgust, anger or guilt) result in the largest changes in attitude. In addition, more creative PSAs are more effective at changing attitudes. Originality/value Overall, the results provide useful information to social marketers on how to design more effective anti-texting and driving campaigns.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Siew H. Chan ◽  
Qian Song

Purpose This study investigates whether consideration of future consequences (CFC), Machiavellianism (MACH) and the perceived role of ethics and social responsibility (PRESOR) enhance understanding of the impact of tax audit risk on compliance. Design/methodology/approach A between-subjects experiment is conducted to test the hypotheses. A hypothetical tax audit case (or lack thereof) is used to create a high (low) perceived tax audit risk. The usable responses of 144 participants representing the general taxpayer population are analyzed. Findings The results suggest that taxpayers with lower CFC, MACH or PRESOR scores are more compliant when tax audit risk is high than low. In contrast, taxpayers with higher CFC, MACH or PRESOR scores are indifferent toward high or low tax audit risk. Research limitations/implications Research can elicit consideration of future consequences of being detected for taxpayers with lower CFC scores to increase compliance. Additionally, increased saliency of tax audit risk and detection of noncompliance in a tax audit can enhance the compliance of taxpayers with lower MACH scores. Dissemination of information via social media on the value of ethical and social responsibility of compliance can also increase the compliance of taxpayers with higher PRESOR scores. Practical implications This study helps researchers and the tax authority better understand the complexities of compliance and the ethical dilemmas that taxpayers face, especially when a considerable amount of cash income is involved. To deter underreporting of cash income, the tax authority can use social media to explain how data analytics tools can facilitate the analysis and integration of multiple sources of a taxpayer’s income and expenses. Originality/value Prior studies present participants with objective tax audit rates, such as 5, 25 and 30 (Cullis et al., 2006; Maciejovsky et al., 2007; Trivedi et al., 2003) or 50% (Maciejovsky et al., 2012) to investigate tax compliance. However, the actual tax audit rate is very low (about 1%) due to the limited resources of the tax authority (Alm and Torgler, 2011). To attenuate perceptions of unrealistic tax audit rates, this study operationalizes high (low) tax audit risk via a hypothetical tax audit case (or lack thereof) to examine the impact of tax audit risk on compliance.


2016 ◽  
Vol 24 (4) ◽  
pp. 372-385 ◽  
Author(s):  
Melanie Volkamer ◽  
Karen Renaud ◽  
Paul Gerber

Purpose Phishing is still a very popular and effective security threat, and it takes, on average, more than a day to detect new phish websites. Protection by purely technical means is hampered by this vulnerability window. During this window, users need to act to protect themselves. To support users in doing so, the paper aims to propose to first make users aware of the need to consult the address bar. Moreover, the authors propose to prune URL displayed in the address bar. The authors report on an evaluation of this proposal. Design/methodology/approach The paper opted for an online study with 411 participants, judging 16 websites – all with authentic design: half with legitimate and half with phish URLs. The authors applied four popular widely used types of URL manipulation techniques. The authors conducted a within-subject and between-subject study with participants randomly assigned to one of two groups (domain highlighting or pruning). The authors then tested both proposals using a repeated-measures multivariate analysis of variance. Findings The analysis shows a significant improvement in terms of phish detection after providing the hint to check the address bar. Furthermore, the analysis shows a significant improvement in terms of phish detection after the hint to check the address bar for uninitiated participants in the pruning group, as compared to those in the highlighting group. Research limitations/implications Because of the chosen research approach, the research results may lack generalisability. Therefore, researchers are encouraged to test the proposed propositions further. Practical implications This paper confirms the efficacy of URL pruning and of prompting users to consult the address bar for phish detection. Originality/value This paper introduces a classification for URL manipulation techniques used by phishers. We also provide evidence that drawing people’s attention to the address bar makes them more likely to spot phish websites, but does not impair their ability to identify authentic websites.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Melanie Boyce

Purpose Self-harm can affect people of all ages, yet the high prevalence rate in adolescents and the potential risk factor of suicide in adults 60 years and above has meant research has tended to focus within these areas. Therefore, the purpose of this exploratory study is to examine the experiences of self-harm in people from early adulthood to late middle age to gain greater insight and understanding in this underexplored area. Design/methodology/approach An online open-ended survey was used to collect the data from a UK user-led moderated online forum that supports people who self-harm. Findings Thematic data analysis indicates that feelings of shame and guilt were intensified, due to the double stigma participants face as adults that self-harm. Although most participants had seen a reduction in the frequency of their self-harm many experienced an increase in the severity of harm. In not fitting the assumed typical profile of someone that self-harm participants often struggled to gain formal support. Research limitations/implications This was a small-scale online survey; hence, it is not possible to generalise the findings to all adults who self-harm. Practical implications The findings from this research provide evidence that greater recognition needs to be given to the reality that self-harm can affect people of all ages. As a result, access to support needs to be widened as a means of supporting those who do not fit the typical profile of someone who self-harms. Originality/value This exploratory online study provides insights around the tensions and challenges facing adults that self-harm, which remains an under-researched and largely ignored area.


Sign in / Sign up

Export Citation Format

Share Document