{"id":301,"date":"2022-05-06T09:22:39","date_gmt":"2022-05-06T09:22:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/terranceboakye\/?p=301"},"modified":"2022-05-06T09:22:40","modified_gmt":"2022-05-06T09:22:40","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/terranceboakye\/2022\/05\/06\/article-review-2\/","title":{"rendered":"Article Review 2"},"content":{"rendered":"\n<p><strong>Intro\/Social Science<br><\/strong>In this world today, due to the advancement of technology, people are able to commit<br>crimes sitting at home and usually these crimes are involved with stealing money from another<br>individual. An example of this is romance fraud. Romance scams occur when a fraudster takes a<br>counterfeit identity to manipulate their victims into sending money to them. Usually victims that<br>have been scammed go through a very emotional state after finding out that their money has been<br>taken by a false person. So this study is going to use a randomized experimental design to test<br>the restrictive deterrent effect of warning messages sent to these fraudsters on email. There are<br>three groups that are going to have 405 active email addresses distributed, which are the<br>deterrent group, the promising group, and the ambiguous group. The independent variable of the<br>next group is the deterrence. The dependent variables were responses and words used<br>represented and seeking without denial. The social principle that this relates to is objectivity<br>since they&#8217;re trying to find a deterrence with romance scams .<\/p>\n\n\n\n<p><br><strong>Hypothesis<\/strong><br>The major goal of the study presented in this article is to discover a deterrent to romance<br>scams that can mitigate some of the crimes. The first hypothesis that was stated in the article was<br>That Romance fraudsters who received the deterrence message Instead of non deterrence<br>messages the romance scammers will respond at a lower rate. The second hypothesis that was stated in the article also says that they think the romance fraudsters will use less words when<br>responding to the deterrence message group.<\/p>\n\n\n\n<p><strong>Research Method<br><\/strong>In the article they explained the methods that they are going to conduct and used<br>quantitative methods. The first thing that they did was gather data collection of active romance<br>fraudsters&#8217; email addresses by using an online dating scam list that was provided on the internet.<br>The researchers gathered the most recent ones at the time being from the year 2019. In the article<br>they also stated that they used a python scraper to gather recent Romance fraudsters. The<br>researchers were able to gather 546 emails which were distributed to the three groups and it<br>appeared that for the deterrent group 43 of those messages weren&#8217;t able to go through. With 43 of<br>those messages not going through, it has changed how many emails were sent to the three groups<br>4 the deterrent group they were responsible for 139 emails, the promising group 129, and the<br>ambiguous group 138.<\/p>\n\n\n\n<p><strong>Results<\/strong><br>After looking at the results, the hypothesis that was stating that the fraudsters will use<br>fewer words has come true. On the chart it showed that fraudsters on average responded to the<br>deterrence group with 1.8 words on average compared to the non-deterrent group that had 11<br>words on average.<\/p>\n\n\n\n<p><strong>How it relates to cybersecurity<br><\/strong>How this article relates to cybersecurity is that in cybersecurity we talk about fraudsters<br>and how they will approach people to take their money and these are one of the many things that<br>cybercriminals do to take money from Innocent people. As technology becomes more innovative<br>cybercriminals will always try to find new ways to take money from innocent people so people<br>in the cybersecurity field are trying everything that they can to help stop this happening.<\/p>\n\n\n\n<p><strong>Contribution to society<br><\/strong>This romance fraud study contributes to society because it affects millions of people<br>around the world that were vulnerable to this type of frauds and this type of fraud needs to be<br>addressed more to people so they are well informed in the future for these type of things to not<br>happen again and you&#8217;ll be prepared to identify these scams.<\/p>\n\n\n\n<p><strong>Cited Source:<\/strong> <em>International Journal of Cyber Criminology<\/em>. International Journal of Cyber Criminology (IJCC). (n.d.). Retrieved May 6, 2022, from https:\/\/www.cybercrimejournal.com\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intro\/Social ScienceIn this world today, due to the advancement of technology, people are able to commitcrimes sitting at home and usually these crimes are involved with stealing money from anotherindividual. An example of this is romance fraud. Romance scams occur when a fraudster takes acounterfeit identity to manipulate their victims into sending money to them&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/terranceboakye\/2022\/05\/06\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":21984,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/301"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/users\/21984"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/comments?post=301"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/301\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/posts\/301\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/media?parent=301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/categories?post=301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terranceboakye\/wp-json\/wp\/v2\/tags?post=301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}