FACTORS CONTRIBUTING TO ONLINE DATING ROMANCE SCAM VICTIMIZATION: A QUALITATIVE STUDY
DOI:
https://doi.org/10.61841/2p4x6282Keywords:
online dating,, romance scam, victims, fraud, self-awarenessAbstract
Commercial crimes especially frauds and scams although not directly causing physical harms to human, they can ruin victims economically thus affecting their psychosocial well-being. Along this line of thought, online dating romance also known as Nigerian scam is where the scammer pretends to initiate a relationship with the aim to lure the potential victims of large sums of money. This mass marketing fraud will subsequently give negative impacts to the victims where the victims not only lose huge sums of money but also suffer psychological distress such as depression and stress. Although many researches have explored this area of study, studies in Malaysia is still limited. The aim of this study is to explore the vulnerability of the victims that led to this scam. Using a qualitative research design; victims, public prosecutors, the police, and non-government organization leaders were interviewed. Based on the data obtained from the informants, several themes were identified as contributory factors for this scam: loneliness, agreeableness, sensational seeking, lack of knowledge, and romantic belief. These factors can play a key role to authorities and the general public to curb this scam to some point and to educate and create self-awareness among the public.
Downloads
References
1. Ali Salman., & Siti Minanda Pulungan. (2017). Pendedahan diri, motivasi dan kepuasan penggunaan Facebook dalam menjalin persahabatan. Jurnal Komunikasi: Malaysian Journal of Communication, 33(1), 438-459.
2. Azianura, H. S., Mohammad Rahim, K., & Yeap, Y.P., (2018). Jenayah Cinta Siber. Penerbit Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia.
3. Azianura, H.S., Mohammad Rahim, K., Wan Fariza, P., Paizi@Fauzi., & Masnizah, M. (2019). Online- Dating Romance Scam in Malaysia: An Analysis of Online Conversations between Scammers and Victims. GEMA Online® Journal of Language Studies, 19 (1), 97-115.
4. Tiwari R, Tiwari G, Rai AK. "Probiotic Novel Beverages and Their Applications." Systematic Reviews in Pharmacy 2.1 (2011), 30-36. Print. doi:10.4103/0975-8453.83436
5. Blackhart, G.C., Fitzpatrick, J., & Williamson, J. (2014). Dispositional Factors Predicting Use of Online Dating Sites and Behaviors Related to Online Dating. Computers in Human Behavior, 33, 113-118.
6. Buchanan, T., & Whitty, M.T. (2014). The online dating romance scam: Causes and consequences of victimhood. Psychology, Crime & Law 20 (3), 261-283.
7. Cacioppo, J.T., Fowler, J.H., & Christakis N.A.(2009). Alone in the crowd: the structure and spread of loneliness in a large social network. Journal of personality and social psychology, 97(6), pp 977-991.
8. Chang, J.S., & Chong, M.D. (2010). Psychological Influences in E-mail Fraud. Journal of Financial Crime, 17(3), 337-350.
9. Durand, C. (2010). A Comparative Study of Self-Disclosure in Face-to-Face and Email Communication between Americans and Chinese. University of Rhode Island: Senior Honors Projects. Paper 197.
10. Glaser, B.G., & Strauss, A.L. (1967). The Discovery of Grounded Theory: Strategies for Qualitative Research. Chicago Aldine Publishing Company
11. Graziano, W. G., & Eisenberg, N. (1997). Agreeableness: A dimension of personality. In R. Hogan, J. A. Johnson, & S. R. Briggs (Eds.), Handbook of personality psychology (p. 795–824).
12. Gupta, S., Gupta, P., Ahamad, M., & Kumaraguru, P. (2015). Abusing Phone Numbers and Cross- application Features for Crafting Targeted Attacks. In CoRR abs/1512.07330 (2015)
13. Hamsi, A.S., Bahry, S.D.F., Tobi, M.N.S., and Masrom, M. (2015). Cybercrime over Internet Love Scams in Malaysia: A Discussion on the Theoretical Perspectives Connecting Factors and Keys to the Problem. Journal of Management Research, Vol 7(2), pp 169.
14. Jackson, S.L. (2017). Senate Special Committee on Aging hearings and GAO reports. In X.Q. Dong (Ed.) Elder abuse: research, practice, and policy. Springer, New York, pp 595–613
15. Koon, T.H. & Yoong, D. (2013). Preying on lonely hearts: A systematic Deconstruction of an Internet Romance Scammer’s Online Lover Persona. Journal of Modern Languages 23 (1): 28-40
16. Kim, F. K. (2019). Truecaller Insights: Top 20 Countries afftected by spam calls & SMS in (2019)
17. Mohammad Rahim Kamaluddin., Nadiah Syariani Mohd Sharif., Azizah Othman., & Geshina Ayu Mat Saat. (2013a). Factorial validation of “How I Think” questionnaire among male inmates in Malaysia. Malays J Psychiatry, 22, 19-31.
18. Mohammad Rahim, K., Nadiah Syariani Mohd Sharif., & Geshina Ayu Mat Saat. (2013b). A validity study of Malay translated Zuckerman-Kuhlman personality questionnaire cross-cultural 50 items (ZKPQ-50-CC). Health Environ Journal, 4, 37-52.
19. Norazlina Zainal, A., Mohammad Rahim, K., Azianura, H.S., Norazura, D., & Saravanan, R. (2018).Pengetahuan dan Amalan Perlindungan Pengguna Facebook Wanita Terhadap Penipuan Cinta di Malaysia. Jurnal Komunikasi: Malaysian Journal of Communication, 34(4), 113-133.
20. Norris, G., Brookes, A., & Dowell, D. (2019). The Psychology of Internet Fraud Victimization: a Systematic Review. Journal of Police and Criminal Psychology, Volume 34, Issue 3, pp. 231–245.
21. New Straits Times. (10th December 2019). Woman loses RM230,000 to future hubby, a Macau scammer impersonating a pilot. From https://www.nst.com.my/news/crime-courts/2019/12/546502/woman-loses- rm230000-future-hubby-macau-scammer-impersonating-pilot.
22. Peslak, A.R. (2015). Can We Live Without The Internet? An Overall and Demographic Analysis of Internet Usage and Dependence. Issues in Information Systems Volume 16(11) pp.176-184
23. Roberti, J. W. (2004). A review of behavioral and biological correlates of sensation seeking. Journal of Research in Personality, 38, 256–279.
24. Rege, P. A. (2009). Cyber Crimes against Critical Infrastructures: A Study of Online Criminal Organization and Techniques. Criminal Justice Studies, 22 (3), 261-271.
25. Ross, S., & Smith, R. G. (2011). Risk factors for advance fee fraud victimisation. Canberra: Australian Government: Australian Institute of Criminology, 420.
26. Sonderby L.C., Wagoner B. (2013). Loneliness: An integrative approach. The Journal of Integrated Social Sciences. 2013;3(1):1–29
27. Saodah Wok., Junaidah Hashim., & Kalthom Abdullah. (2016). Social media influence on Malay family resilience towards challenges of the Internet. Jurnal Komunikasi: Malaysian Journal of Communication, 32(2), 648-669.
28. Harikesh maurya, tirath kumar (2016) a review on comprehensive overview in the management of nephrotic disorders. Journal of Critical Reviews, 3 (2), 34-43.
29. Steve, B. (2018). A Better Business Bureau Study on How Scammers Use Impersonation Blackmail and Trickery to Steal Unsuspecting Daters. Better Business Bureau
30. Siti Nurkhairina Mohd Nor., Mohammad Rahim Kamaluddin., & Wan Shahrazad Wan Sulaiman. (2019). Profil Jenayah Banduan Wanita di Malaysia: Satu Kajian Kualitatif. Akademika 89(2), 43-56.
31. Whitty, M.T & T. Buchanan,. (2012). The Online Romance Scam: A Serious Cybercrime.
Cyberpsychology, Behavior and Social networking. 15. 181-3.
32. Whitty, M.T. (2018). Do you love me? Psychology characteristics of romance scam victims.
Cyberpsychology, Behaviour and Social networking, Volume 21(2),105-109
33. Williamson M. J., (2018). Self-Reflection as a Way of Improving Instruction. Teaching to Individual Differences in Science and Engineering Librarianship. Elsevier, Pp 133-145.
34. Whitty, M. T. (2013) The Scammers Persuasive Techniques Model: Development of a Stage Model to Explain the Online Dating Romance Scam. The British Journal of Criminology, Volume 53(4), Pages 665– 684.
35. Perfilova, O.V., Magomedov, G.O., Magomedov, M.G., Babushkin, V.A.Quality of jelly marmalade from fruit and vegetable semi-finished products(2018) International Journal of Pharmaceutical Research, 10 (4), pp.721724.https://www.scopus.com/inward/record.uri?eid=2s2.085059878666&partnerID=40&md5=c194f cb7368c87a09ea5a3ead64aa183
36. Zuckerman, M. (1994). Behavioral expressions and biosocial bases of sensation seeking. New York: Cambridge University Press.
37. Yasvanthkumaar,V.,Sabitha,S.,&NithyaKalyani,S. (2018). Parallel and Multiple E-Data Distributed Process with Progressive Duplicate Detection Model. Bonfring International Journal of Software Engineering and Soft Computing, 8(1), 23-25.
38. Kanaga Sundar, R., Joe Paul, J., Krishna Kumar, M., & Laser, L. (2014).Secured POR for Flooding Attack Prevention in Extremely Dynamic Ad Hoc Networks. The SIJ Transactions on Computer Networks & Communication Engineering (CNCE), 2(2), 5-9.
39. Erol, M.Schrödinger wave equation and function: Basics and concise relations with consciousness/mind(2010) NeuroQuantology, 8 (1), pp. 101-109.
40. Mender, D.Post-classical phase transitions and emergence in psychiatry: Beyond George Engel's model of psychopathology(2010) NeuroQuantology, 8 (1), pp. 29-36.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.