IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v24y2022i2d10.1007_s10796-020-10051-2.html
   My bibliography  Save this article

How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?

Author

Listed:
  • Martin Offei

    (Koforidua Technical University)

  • Francis Kofi Andoh-Baidoo

    (The University of Texas Rio Grande Valley)

  • Emmanuel W. Ayaburi

    (The University of Texas Rio Grande Valley)

  • David Asamoah

    (Kwame Nkrumah University of Science and Technology (KNUST))

Abstract

Online romance fraud (ORF) is a growing concern with such serious negative consequences as financial loss or suicide to the victim. Majority of empirical studies on online romance fraud using attachment, deception, protection motivation and relation theories focus on the victim. While neutralization offers insights into how individuals justify their deviant behaviors, the results have not been consistent in different contexts. In the ORF context, offenders may not only rely on justifying techniques but also rationalize their actions by denying risk both to the victim and the offender. Thus, drawing from the neutralization and denial of risk theories, we develop a research model to explain how online romance offenders justify and rationalize their intended criminal activities. To confirm our theoretical model, we collected 320 responses from individuals at Internet Cafés alleged to be online romance fraud hotspots. Our results highlight the boundary conditions of neutralization techniques in the context of online romance fraud. The study shows that denial of risk, a rationalization mechanism, moderates the relationship between denial of victim, a justification technique, and intention to commit romance fraud. This insight advances the frontiers of neutralization theory. We offer both theoretical and managerial implications of the findings.

Suggested Citation

  • Martin Offei & Francis Kofi Andoh-Baidoo & Emmanuel W. Ayaburi & David Asamoah, 2022. "How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?," Information Systems Frontiers, Springer, vol. 24(2), pages 475-491, April.
  • Handle: RePEc:spr:infosf:v:24:y:2022:i:2:d:10.1007_s10796-020-10051-2
    DOI: 10.1007/s10796-020-10051-2
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-020-10051-2
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-020-10051-2?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Ruochen Liao & Shenaz Balasinorwala & H. Raghav Rao, 2017. "Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests," Information Systems Frontiers, Springer, vol. 19(3), pages 443-455, June.
    2. Fariborz Farahmand & Eugene H. Spafford, 2013. "Understanding insiders: An analysis of risk-taking behavior," Information Systems Frontiers, Springer, vol. 15(1), pages 5-15, March.
    3. Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
    4. Reinartz, Werner & Haenlein, Michael & Henseler, Jörg, 2009. "An empirical comparison of the efficacy of covariance-based and variance-based SEM," International Journal of Research in Marketing, Elsevier, vol. 26(4), pages 332-344.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Emmanuel W. Ayaburi & Francis Kofi Andoh-Baidoo & Yogesh K. Dwivedi & Banita Lal, 2022. "Editorial: Special Issue on “Bright ICT: Security, Privacy and Risk Issues”," Information Systems Frontiers, Springer, vol. 24(2), pages 371-373, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Wilawan Jansri, 2019. "Perception of Residents, Community Participation and Support for Tourism Development in the Old Town Muang Songkhla, Thailand," Proceedings of the 13th International RAIS Conference, June 10-11, 2019 07WJ, Research Association for Interdisciplinary Studies.
    2. Philippe Cohard, 2020. "Information Systems Values: A Study of the Intranet in Three French Higher Education Institutions," Post-Print hal-02987225, HAL.
    3. Kautish, Pradeep & Paço, Arminda & Thaichon, Park, 2022. "Sustainable consumption and plastic packaging: Relationships among product involvement, perceived marketplace influence and choice behavior," Journal of Retailing and Consumer Services, Elsevier, vol. 67(C).
    4. Groza, Mark D. & Groza, Mya Pronschinske, 2018. "Salesperson regulatory knowledge and sales performance," Journal of Business Research, Elsevier, vol. 89(C), pages 37-46.
    5. Younès El Manzani & Mohamed Larbi Sidmou & Jean-Jack Cegarra, 2018. "Does IS0 9001 quality management system support product innovation? An analysis from the sociotechnical systems theory," Post-Print hal-03080217, HAL.
    6. Mäntymäki, Matti & Salo, Jari, 2013. "Purchasing behavior in social virtual worlds: An examination of Habbo Hotel," International Journal of Information Management, Elsevier, vol. 33(2), pages 282-290.
    7. Gauguier, Jean-Jacques, 2009. "L’industrialisation de l’Open Source," Economics Thesis from University Paris Dauphine, Paris Dauphine University, number 123456789/4388 edited by Toledano, Joëlle.
    8. Mahadzirah Mohamad & Asyraf Afthanorhan* & Zainudin Awang & Morliyati Mohammad, 2019. "Comparison Between CB-SEM and PLS-SEM: Testing and Confirming the Maqasid Syariah Quality of Life Measurement Model," The Journal of Social Sciences Research, Academic Research Publishing Group, vol. 5(3), pages 608-614, 03-2019.
    9. Dafna Kariv & Carlo Giglio & Vincenzo Corvello, 2025. "Fostering Entrepreneurial intentions: exploring the interplay of education and endogenous factors," International Entrepreneurship and Management Journal, Springer, vol. 21(1), pages 1-27, December.
    10. Xuelin Chen & Mohammad Masukujjaman & Abdullah Al Mamun & Jingzu Gao & Zafir Khan Mohamed Makhbul, 2023. "Modeling the significance of work culture on burnout, satisfaction, and psychological distress among the Gen-Z workforce in an emerging country," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-12, December.
    11. Osama Sohaib & Kyeong Kang & Mohammad Nurunnabi, 2018. "Gender-Based iTrust in E-Commerce: The Moderating Role of Cognitive Innovativeness," Sustainability, MDPI, vol. 11(1), pages 1-16, December.
    12. Thac Dang‐Van & Tan Vo‐Thanh & Jianming Wang & Ninh Nguyen, 2023. "Luxury hotels' green practices and consumer brand identification: The roles of perceived green service innovation and perceived values," Business Strategy and the Environment, Wiley Blackwell, vol. 32(7), pages 4568-4583, November.
    13. Ana León-Gómez & José Manuel Santos-Jaén & Daniel Ruiz-Palomo & Mercedes Palacios-Manzano, 2022. "Disentangling the impact of ICT adoption on SMEs performance: the mediating roles of corporate social responsibility and innovation," Oeconomia Copernicana, Institute of Economic Research, vol. 13(3), pages 831-866, September.
    14. Abdullah Al Mamun & Syed Ali Fazal & Muhammad Mehedi Masud & Ganeshsree Selvachandran & Noor Raihani Zainol & Quek Shio Gai, 2020. "The Underlying Drivers of Underprivileged Households’ Intention and Behavior towards Community Forestry Management: A Study Using Structural Equation Modelling and Artificial Neural Network Approach," Sustainability, MDPI, vol. 12(18), pages 1-26, September.
    15. Petschnig, Martin & Heidenreich, Sven & Spieth, Patrick, 2014. "Innovative alternatives take action – Investigating determinants of alternative fuel vehicle adoption," Transportation Research Part A: Policy and Practice, Elsevier, vol. 61(C), pages 68-83.
    16. Carly L. Huth & David W. Chadwick & William R. Claycomb & Ilsun You, 2013. "Guest editorial: A brief overview of data leakage and insider threats," Information Systems Frontiers, Springer, vol. 15(1), pages 1-4, March.
    17. Abdul Alem Mohammed & Basri B. Rashid & Shaharuddin B. Tahir, 2017. "Customer relationship management and hotel performance: the mediating influence of marketing capabilities—evidence from the Malaysian hotel industry," Information Technology & Tourism, Springer, vol. 17(3), pages 335-361, September.
    18. Ringle, Christian M. & Sarstedt, Marko & Schlittgen, Rainer & Taylor, Charles R., 2013. "PLS path modeling and evolutionary segmentation," Journal of Business Research, Elsevier, vol. 66(9), pages 1318-1324.
    19. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," Review of Economic Studies, Oxford University Press, vol. 81(4), pages 1518-1542.
    20. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:24:y:2022:i:2:d:10.1007_s10796-020-10051-2. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.