论文

网络诈骗受害过程及其影响因素

摘要

本研究通过招募选取16名网络诈骗亲历者进行访谈,经过质性分析探讨网络诈骗受害的过程及其影响因素。文本分析的结果显示,网络诈骗受害的过程可以分为三个阶段:成为目标、信任—怀疑交互、发现骗局。其中,信任—怀疑交互阶段是网络诈骗受害的关键期。网络诈骗受害涉及四个影响因素:受骗情境构成的情境特征,受害者经验和个人动机等受害者特征,信任获取途径和行骗手段等行骗者策略,以及质疑角度、核实措施、补救措施等受害者策略。网络诈骗受害是情境特征、受害者特征、行骗者策略和受害者策略协同作用的结果。

作者

赵辉 ,中国政法大学社会学院。
李朱恺幸 ,中国政法大学社会学院。
孙楚然 ,中国政法大学社会学院。
杨佳楠 ,中国政法大学社会学院。
杨波 ,中国政法大学社会学院。
张卓 ,女,中国政法大学社会学院副教授。

参考文献 查看全部 ↓
  • 褚红玲,周云仙,倪凯文,李凤卫,赵一鸣.(2021).基于信息效能模型定性访谈的样本量确定.中国全科医学,24(10),1274-1276. doi:10.12114/j.issn.1007-9572.2020.00.415
  • 贡喆,刘昌.(2016).恶意创造力:概念、测量方法、影响因素以及研究展望.心理科学,39(1),63-68. doi:10.16719/j.cnki.1671-6981.20160110
  • 猎网平台—警民联合网络诈骗举报平台.(2021).https://110.360.cn/.
  • 刘笑,张峰,赵刚,陈永生,杨波,张卓.(2017).诈骗犯、暴力犯的黑暗三人格与创造力及标新立异的关系.中国健康心理学杂志,25(8),1183-1186. doi:10.13342/j.cnki.cjhp.2017.08.018
  • 饶育蕾,陈地强,彭叠峰,朱锐.(2021).幸福感能降低中老年人受骗风险吗?——基于CHARLS数据的实证研究.计量经济学报,1(2),303-317. doi:10.12012/CJoE2020-0006
  • 杨航,邵景进,张乾寒,蒋悦,李加美,白学俊.(2019).老化恐惧与老年人受骗易感性:安全感和掌控感的中介作用.中国临床心理学杂志,27(5),1036-1040. doi:10.16128/j.cnki.1005-3611.2019.05.037
  • 张林,牟忠琛,刘燊,高飞.(2017).社会支持与老年人受骗倾向的关系:一个有中介的调节模型.心理与行为研究,15(6),766-773. doi:10.3969/j.issn.1672-0628.2017.06.007
  • 中国司法大数据研究院.(2019).司法大数据专题报告之网络犯罪特点和趋势(2016.1—2018.12).http://data.court.gov.cn/pages/.
  • Atkins,B.,& Huang,W.(2013). A study of social engineering in online frauds. Open Journal of Social Sciences,1(3),23-32. doi:10.4236/jss.2013.13004
  • Bond,C.F.,& DePaulo,B.M.(2006). Accuracy of deception judgments. Personality & Social Psychology Review,10(3),214-234. doi:10.1207/s15327957pspr1003_2A
  • Cohen,L.E.,& Felson,M.(1979). Social change and crime rate trends:A routine activity approach. American Sociological Review,44,588-607. doi:10.2307/2094589
  • Corritore,C.L.,Kracher,B.,& Wiedenbeck,S.(2003). On-line trust:concepts,evolving themes,a model. International Journal of Human-computer Studies,58(6),737-758. doi:10.1016/S1071-5819(03)00041-7
  • Fransen,M.L.,& Fennis,B.M.(2014). Comparing the impact of explicit and implicit resistance induction strategies on message persuasiveness. Journal of Communication,64(5),915-934. doi:10.1111/jcom.12118
  • Holtfreter,K.,Reisig,M.D.,& Pratt,T.C.(2008). Low self-control,routine activities,and fraud victimization. Criminology,46(1),189-220. doi:10.1111/j.1745-9125.2008.00101.x
  • Hong,K.W.,Kelley,C.M.,Tembe,R.,Murphy-Hill,E.,& Mayhorn,C.B.(2013). Keeping up with the Joneses:Assessing phishing susceptibility in an email task. Proceedings of the Human Factors and Ergonomics Society Annual Meeting,57(1),1012-1016. doi:10.1177/1541931213571226
  • Mayer,R.C.,Davis,J.H.,& Schoorman,F.D.(1995). An integrative model of organizational trust. Academy of Management Review,20(3),709-734. doi:10.2307/258792
  • Norris,G.,Brookes,A.,& Dowell,D.(2019). The psychology of internet fraud victimization:A systematic review. Journal of Police and Criminal Psychology,34(3),231-245. doi:10.1007/s11896-019-09334-5
  • Pattinson,M.R.,Jerram,C.,Parsons,K.,Mccormac,A.,& Butavicius,M.(2011). Managing phishing emails:A scenario-based experiment. Proceedings of the Fifth International Symposium on Human Aspects of the Information Security & Assurance.
  • Pratt,T.C.,Holtfreter K.,& Reisig,M.D.(2010). Routine online activity and internet fraud targeting:Extending the generality of routine activity theory. Journal of Research in Crime & Delinquency,47(3),267-296. doi:10.1177/0022427810365903
  • Roberts,J.A.,& Manolis,C.(2012). Cooking up a recipe for self-control:the three ingredients of self-control and its impact on impulse buying. The Journal of Marketing Theory and Practice,20(2),173-188. doi:10.2753/MTP1069-6679200204
  • Whitty,M.T.,& Buchanan,T.(2016). The online dating romance scam:The psychological impact on victims-both financial and non-financial. Criminology & Criminal Justice,16(2),176-194. doi:10.1177/1748895815603773
  • Williams,E.J.,Beardmore,A.,& Joinson,A.N.(2017). Individual differences in susceptibility to online influence:A theoretical review. Computers in Human Behavior,72,412-421. doi:10.1016/j.chb.2017.03.002
  • Wright,R.T.,& Marett,K.(2010). The influence of experiential and dispositional factors in phishing:An empirical investigation of the deceived. Journal of Management Information Systems,27(1),273-303. doi:10.2753/MIS0742-1222270111
  • Zhang,L.,Welte,J.W.,& Wieczorek,W.F.(2001). Deviant lifestyle and crime victimization. Journal of Criminal Justice,29(2),133-143. doi:10.1016/S0047-2352(00)00089-1

网络诈骗受害过程及其影响因素

可试读20%内容 PDF阅读 阅读器阅览

试读已结束,剩余80%未读

¥8.29 查看全文 >

VIP免费