25
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Unveiling the Terrain of Fraud: Exploring the Association Between Physical Topography and Consumer Fraud Victimization

, , , &
Received 28 Dec 2023, Accepted 03 Jun 2024, Published online: 10 Jun 2024

References

  • Abraham, J. and V. Ceccato. 2022. “Crime and Safety in Rural Areas: A Systematic Review of the English-Language Literature 1980–2020.” Journal of Rural Studies 94:250–73. doi:10.1016/j.jrurstud.2022.05.010
  • Bar Lev, E., L. G. Maha, and S. C. Topliceanu. 2022. “Financial frauds’ Victim Profiles in Developing Countries.” Frontiers in Psychology 13:999053. doi:10.3389/fpsyg.2022.999053
  • Brady, P. Q., R. Randa, and B. W. Reyns. 2016. “From WWII to the World Wide Web: A Research Note on Social Changes, Online “Places,” and a New Online Activity Ratio for Routine Activity Theory.” Journal of Contemporary Criminal Justice 32(2):129–47. doi:10.1177/1043986215621377
  • Burke, J., C. Kieffer, G. Mottola, and F. Perez-Arce. 2022. “Can Educational Interventions Reduce Susceptibility to Financial Fraud?” Journal of Economic Behavior & Organization. 198:250–66. doi:10.1016/j.jebo.2022.03.028
  • Button, M., C. Lewis, and J. Tapley. 2014. “Not a Victimless Crime: The Impact of Fraud on Individual Victims and Their Families.” Security Journal 27(1):36–54. doi:10.1057/sj.2012.11
  • Chen, S., C. Gao, D. Jiang, M. Hao, F. Ding, T. Ma, S. Zhang, and S. Li. 2021. “The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in China.” ISPRS International Journal of Geo-Information 10(12):802. doi:10.3390/ijgi10120802
  • Chen, M., Y. Gong, Y. Li, D. Lu, and H. Zhang. 2016. “Population Distribution and Urbanization on Both Sides of the Hu Huanyong Line: Answering the Premier’s Question.” Journal of Geographical Sciences 26(11):1593–610. doi:10.1007/s11442-016-1346-4
  • Cherniwchan, J. 2012. “Economic Growth, Industrialization, and the Environment.” Resource and Energy Economics 34(4):442–67. doi:10.1016/j.reseneeco.2012.04.004
  • Cho, J.-H., H. Cam, and A. Oltramari 2016. “Effect of Personality Traits on Trust and Risk to Phishing Vulnerability: Modeling and Analysis.” 2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 7–13. 10.1109/COGSIMA.2016.7497779
  • Cohen, L. E. and M. Felson. 1979. “Social Change and Crime Rate Trends: A Routine Activity Approach.” Crime: Critical Concepts in Sociology 1(4):316. doi:10.2307/2094589
  • Cross, C. 2015. “No Laughing Matter: Blaming the Victim of Online Fraud.” International Review of Victimology 21(2):187–204. doi:10.1177/0269758015571471
  • Cross, C. 2016. “‘They’re Very Lonely’: Understanding the Fraud Victimisation of Seniors.” International Journal for Crime, Justice & Social Democracy 5(4):60–75. doi:10.5204/ijcjsd.v5i4.268
  • Cross, C. 2020. “‘Oh We Can't Actually Do Anything About that’: The Problematic Nature of Jurisdiction for Online Fraud Victims.” Criminology & Criminal Justice 20(3):358–75. doi:10.1177/1748895819835910
  • DeLiema, M., D. Burnes, L. Langton, and S. M. Albert. 2021. “The Financial and Psychological Impact of Identity Theft Among Older Adults.” Innovation in Aging 5(4):igab043. doi:10.1093/geroni/igab043
  • Edwards, M., G. N. S. de Tangil Rotaeche, C. Peersman, G. Stringhini, A. Rashid, and M. Whitty 2018. “The Geography of Online Dating Fraud.” Workshop on technology and consumer protection (ConPro), 1–8. https://www.ieee-security.org/TC/SPW2018/ConPro/papers/edwards-conpro18.pdf
  • Fang, Y. and B. Ying. 2016. “Spatial Distribution of Mountainous Regions and Classifications of Economic Development in China.” Journal of Mountain Science 13(6):1120–38. doi:10.1007/s11629-015-3714-4
  • Fan, J. X. and Z. Yu. 2021. “Understanding Aging and Consumer Fraud Victimization in the Chinese Context: A Two-Stage Conceptual Approach.” Journal of Elder Abuse & Neglect 33(3):230–47. doi:10.1080/08946566.2021.1937428
  • Gan, L., Z. Yin, N. Jia, S. Xu, S. Ma, and L. Zheng. 2014. Data You Need to Know About China. Berlin Heidelberg: Springer. doi:10.1007/978-3-642-38151-5
  • Ganzini, L., B. H. McFarland, and D. Cutler. 1990. “Prevalence of Mental Disorders After Catastrophic Financial Loss.” The Journal of Nervous and Mental Disease 178(11):680–85. doi:10.1097/00005053-199011000-00002
  • Götz, F. M., S. Stieger, S. D. Gosling, J. Potter, and P. J. Rentfrow. 2020. “Physical Topography Is Associated with Human Personality.” Nature Human Behaviour 4(11):1135–44. doi:10.1038/s41562-020-0930-x
  • Guth, P. L. 2006. “Geomorphometry from SRTM.” Photogrammetric Engineering & Remote Sensing 72(3):269–77. doi:10.14358/PERS.72.3.269
  • Harris, D. B. 1944. “Review of Juvenile Delinquency and Urban Areas [Review of the Book Juvenile Delinquency and Urban areas, by C. R. Shaw & H. D. McKay].” Psychological Bulletin 41(1):69–71. doi:10.1037/h0052736
  • Harrison, B., E. Svetieva, and A. Vishwanath. 2016. “Individual Processing of Phishing Emails: How Attention and Elaboration Protect Against Phishing.” Online Information Review 40(2):265–81. doi:10.1108/OIR-04-2015-0106
  • Hindelang, M. J., M. R. Gottfredson, and J. Garofalo. 1978. Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization. Cambridge, MA: Ballinger Publishing Company.
  • Holtfreter, K., M. D. Reisig, and T. C. Pratt. 2008. “Low Self-Control, Routine Activities, and Fraud Victimization.” Criminology 46(1):189–220. doi:10.1111/j.1745-9125.2008.00101.x
  • Irvin-Erickson, Y. and A. Ricks 2019. “Identity Theft and Fraud Victimization: What We Know About Identity Theft and Fraud Victims from Research-And Practice-Based Evidence.” https://ncvc.dspacedirect.org/handle//20.500.11990/1544
  • James, B. D., P. A. Boyle, and D. A. Bennett. 2014. “Correlates of Susceptibility to Scams in Older Adults without Dementia.” Journal of Elder Abuse & Neglect 26(2):107–22. doi:10.1080/08946566.2013.821809
  • Jobes, P. C., E. Barclay, H. Weinand, and J. F. Donnermeyer. 2004. “A Structural Analysis of Social Disorganisation and Crime in Rural Communities in Australia.” Australian & New Zealand Journal of Criminology 37(1):114–40. doi:10.1375/acri.37.1.114
  • Judges, R. A., S. N. Gallant, L. Yang, and K. Lee. 2017. “The Role of Cognition, Personality, and Trust in Fraud Victimization in Older Adults.” Frontiers in Psychology. 8. doi:10.3389/fpsyg.2017.00588
  • Kadoya, Y., M. S. R. Khan, J. Narumoto, and S. Watanabe. 2021. “Who Is Next? A Study on Victims of Financial Fraud in Japan.” Frontiers in Psychology 12:649565. doi:10.3389/fpsyg.2021.649565
  • Kerley, K. R. and H. Copes. 2002. “Personal Fraud Victims and Their Official Responses to Victimization.” Journal of Police and Criminal Psychology 17(1):19–35. doi:10.1007/BF02802859
  • Kitayama, S., L. G. Conway, P. R. Pietromonaco, H. Park, and V. C. Plaut. 2010. “Ethos of Independence Across Regions in the United States: The Production-Adoption Model of Cultural Change.” American Psychologist 65(6):559–74. doi:10.1037/a0020277
  • Kitayama, S., K. Ishii, T. Imada, K. Takemura, and J. Ramaswamy. 2006. “Voluntary Settlement and the Spirit of Independence: Evidence from Japan’s “Northern Frontier.” Journal of Personality and Social Psychology 91(3):369–84. doi:10.1037/0022-3514.91.3.369
  • Kubrin, C. E. 2009. “Social Disorganization Theory: Then, Now, and in the Future.” Pp. 225–36 in Handbook on Crime and Deviance, edited by Marvin D. Krohn, Alan J. Lizotte and Gina Penly Hall. New York, NY: Springer New York.
  • Lee, C. S. 2021. “How Online Fraud Victims Are Targeted in China: A Crime Script Analysis of Baidu Tieba C2C Fraud.” Crime & Delinquency 68(13–14):2529–53. doi:10.1177/00111287211029862
  • Lee, K., and M. C. Ashton.2004. “Psychometric Properties of the HEXACO Personality Inventory.” Multivariate Behavioral Research 39(2):329–58. https://doi.org/10.1207/s15327906mbr3902_8
  • Liu, L., C. Zhang, J. Feng, L. Xiao, Z. He, and S. Zhou. 2017. “The Spatial-Temporal Distribution and Influencing Factors of Fraud Crime in ZG City, China.” Acta Geographica Sinica. 72:315–28. doi:10.11821/dlxb201702011
  • Marriott, C. 2018. “Through the Net: Investigating How User Characteristics Influence Susceptibility to Phishing.” Masters dissertation. Technological University Dublin.
  • McCann, S. J. H. 2008. “Societal Threat, Authoritarianism, Conservatism, and U.S. State Death Penalty Sentencing (1977-2004).” Journal of Personality and Social Psychology 94(5):913–23. doi:10.1037/0022-3514.94.5.913
  • Mesch, G. S. and M. Dodel. 2018. “Low Self-Control, Information Disclosure, and the Risk of Online Fraud.” American Behavioral Scientist 62(10):1356–71. doi:10.1177/0002764218787854
  • Modic, D. and S. E. G. Lea. 2012. “How Neurotic Are Scam Victims, Really? The Big Five and Internet Scams.” SSRN Electronic Journal. doi:10.2139/ssrn.2448130
  • Norris, G. and A. Brookes. 2021. “Personality, Emotion and Individual Differences in Response to Online Fraud.” Personality and Individual Differences. 169:109847. doi:10.1016/j.paid.2020.109847
  • Norris, G., A. Brookes, and D. Dowell. 2019. “The Psychology of Internet Fraud Victimisation: A Systematic Review.” Journal of Police and Criminal Psychology 34(3):231–45. doi:10.1007/s11896-019-09334-5
  • Office of Fair Trading. 2009. The Psychology of Scams: Provoking and Committing Errors of Judgement. OFT Report. http://webarchive.nationalarchives.gov.uk/20140402142426/http://www.oft.gov.uk/shared_oft/reports/consumer_protection/oft1070.pdf
  • Piquero, A. R., J. MacDonald, A. Dobrin, L. E. Daigle, and F. T. Cullen. 2005. “Self-Control, Violent Offending, and Homicide Victimization: Assessing the General Theory of Crime.” Journal of Quantitative Criminology 21(1):55–71. doi:10.1007/s10940-004-1787-2
  • Pratt, T. C., K. Holtfreter, and M. D. Reisig. 2010. “Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory.” Journal of Research in Crime and Delinquency 47(3):267–96. doi:10.1177/0022427810365903
  • Rentfrow, P. J. and M. Jokela. 2016. “Geographical Psychology: The Spatial Organization of Psychological Phenomena.” Current Directions in Psychological Science 25(6):393–98. doi:10.1177/0963721416658446
  • Reyns, B. W. 2013. “Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory Beyond Direct-Contact Offenses.” Journal of Research in Crime and Delinquency 50(2):216–38. doi:10.1177/0022427811425539
  • Reyns, B. W., B. S. Fisher, and R. Randa. 2018. “Explaining Cyberstalking Victimization Against College Women Using a Multitheoretical Approach: Self-Control, Opportunity, and Control Balance.” Crime & Delinquency 64(13):1742–64. doi:10.1177/0011128717753116
  • Scheibe, S., N. Notthoff, J. Menkin, L. Ross, D. Shadel, M. Deevy, and L. L. Carstensen. 2014. “Forewarning Reduces Fraud Susceptibility in Vulnerable Consumers.” Basic and Applied Social Psychology 36(3):272–79. doi:10.1080/01973533.2014.903844
  • Schuler, M., E. Stucki, O. Roque, and M. Perlik 2004. “Mountain Areas in Europe: Analysis of Mountain Areas in EU Member States, Acceding and Other European Countries (No. REP_WORK).” https://infoscience.epfl.ch/record/113427
  • Scott, L. M. and M. V. Janikas. 2010. “Spatial Statistics in ArcGIS.” Pp. 27–41 in Handbook of Applied Spatial Analysis, edited by M. M. Fischer and A. Getis. Berlin Heidelberg: Springer. doi:10.1007/978-3-642-03647-7_2
  • Shadel, D. and K. B. S. Pak 2007. “The Psychology of Consumer Fraud.” Doctoral dissertation, Universiteit van Tilburg.
  • Shang, Y., K. Wang, Y. Tian, Y. Zhou, B. Ma, and S. Liu. 2023. “Theoretical Basis and Occurrence of Internet Fraud Victimisation: Based on Two Systems in Decision-Making and Reasoning.” Frontiers in Psychology. 14:1087463. doi:10.3389/fpsyg.2023.1087463
  • Shao, J., W. Du, T. Lin, X. Li, J. Li, and H. Lei. 2019. “Credulity Rather Than General Trust May Increase Vulnerability to Fraud in Older Adults: A Moderated Mediation Model.” Journal of Elder Abuse & Neglect 31(2):146–62. doi:10.1080/08946566.2018.1564105
  • Shao, J., Q. Zhang, Y. Ren, X. Li, and T. Lin. 2019. “Why Are Older Adults Victims of Fraud? Current Knowledge and Prospects Regarding Older adults’ Vulnerability to Fraud.” Journal of Elder Abuse & Neglect 31(3):225–43. doi:10.1080/08946566.2019.1625842
  • Shaw, C. R. and H. D. McKay. 1942. Juvenile Delinquency and Urban Areas. University of Chicago Press.
  • Sng, O., S. L. Neuberg, M. E. W. Varnum, and D. T. Kenrick. 2018. “The Behavioral Ecology of Cultural Psychological Variation.” Psychological Review 125(5):714–43. doi:10.1037/rev0000104
  • Song, H., M. J. Lynch, and J. K. Cochran. 2016. “A Macro-Social Exploratory Analysis of the Rate of Interstate Cyber-Victimization.” American Journal of Criminal Justice 41(3):583–601. doi:10.1007/s12103-015-9308-4
  • Strobl, C., J. Malley, and G. Tutz. 2009. “An Introduction to Recursive Partitioning: Rationale, Application, and Characteristics of Classification and Regression Trees, Bagging, and Random Forests.” Psychological Methods 14(4):323–48. doi:10.1037/a0016973
  • Suarez-Tangil, G., M. Edwards, C. Peersman, G. Stringhini, A. Rashid, and M. Whitty. 2020. “Automatically Dismantling Online Dating Fraud.” IEEE Transactions on Information Forensics and Security. 15:1128–37. doi:10.1109/TIFS.2019.2930479
  • Tallarida, R. J. and R. B. Murray. 1987. “Chi-Square Test.” Pp. 140–42 in Manual of Pharmacologic Calculations, edited by R. J. Tallarida and R. B. Murray. Springer New York. doi:10.1007/978-1-4612-4974-0_43
  • Van de Weijer, S. G. A. and E. R. Leukfeldt. 2017. “Big Five Personality Traits of Cybercrime Victims.” Cyberpsychology, Behavior, and Social Networking 20(7):407–12. doi:10.1089/cyber.2017.0028
  • Wang, J., S. Zhang, Y. Lan, C. Wu, Y. Xia, and L. Chen 2020. “Crime Analysis of Spatial-Temporal Distribution Based on KNN Algorithm.” 2020 International Conference on Information Science and Education (ICISE-IE), 150–154. 10.1109/ICISE51755.2020.00038
  • Wei, W., J. G. Lu, A. D. Galinsky, H. Wu, S. D. Gosling, P. J. Rentfrow, W. Yuan, Q. Zhang, Y. Guo, M. Zhang, et al. 2017. “Regional Ambient Temperature Is Associated with Human Personality.” Nature Human Behaviour 1(12):890–95. doi:10.1038/s41562-017-0240-0
  • Whitty, M. T. 2018. “Do You Love Me? Psychological Characteristics of Romance Scam Victims.” Cyberpsychology, Behavior, and Social Networking 21(2):105–09. doi:10.1089/cyber.2016.0729
  • Whitty, M. T. and T. Buchanan. 2016. “The Online Dating Romance Scam: The Psychological Impact on Victims – Both Financial and Non-Financial.” Criminology & Criminal Justice 16(2):176–94. doi:10.1177/1748895815603773
  • Williams, E. J., A. Beardmore, and A. N. Joinson. 2017. “Individual Differences in Susceptibility to Online Influence: A Theoretical Review.” Computers in Human Behavior. 72:412–21. doi:10.1016/j.chb.2017.03.002
  • Wright, R., S. Chakraborty, A. Basoglu, and K. Marett. 2010. “Where Did They Go Right? Understanding the Deception in Phishing Communications.” Group Decision and Negotiation 19(4):391–416. doi:10.1007/s10726-009-9167-9
  • Xing, T., F. Sun, K. Wang, J. Zhao, M. Wu, and J. Wu. 2020. “Vulnerability to Fraud Among Chinese Older Adults: Do Personality Traits and Loneliness Matter?” Journal of Elder Abuse & Neglect 32(1):46–59. doi:10.1080/08946566.2020.1731042
  • Xu, L., J. Wang, D. Xu, and L. Xu. 2022. “Integrating Individual Factors to Construct Recognition Models of Consumer Fraud Victimization.” International Journal of Environmental Research and Public Health 19(1):461. doi:10.3390/ijerph19010461
  • Xu, L., X. Wen, J. Shi, S. Li, Y. Xiao, Q. Wan, and X. Qian. 2021. “Effects of Individual Factors on Perceived Emotion and Felt Emotion of Music: Based on Machine Learning Methods.” Psychology of Music 49(5):1069–87. doi:10.1177/0305735620928422
  • Xu, L., S. Zeng, Z. Jiang, Z. Sun, H. Li, and L. Xu. 2023. “From Peaks to People: The Association Between Physical Topography and Generalized Trust in China.” Journal of Environmental Psychology. 91:102136. doi:10.1016/j.jenvp.2023.102136
  • Yasemin, I.-E. and R. Alexandra 2019. “Identity Theft and Fraud Victimization: What We Know About Identity Theft and Fraud Victims from Research-And Practice-Based Evidence.” Center for Victim Research Repository. https://ncvc.dspacedirect.org/handle/20.500.11990/1544
  • Zhang, C., L. Liu, and S. Zhou. 2018. “Gender Difference on Relative Probability of Non-Contact Fraud in ZG City.” Scientia Geographica Sinica. 38:1218–26. doi:10.13249/j.cnki.sgs.2018.08.003
  • Zhang, C., L. Liu, S. Zhou, J. Feng, J. Chen, and L. Xiao. 2022. “Contact-Fraud Victimization Among Urban Seniors: An Analysis of Multilevel Influencing Factors.” ISPRS International Journal of Geo-Information 11(3):201. doi:10.3390/ijgi11030201
  • Zhou, B., N. Wang, Z. Zhang, W. Liu, W. Lu, R. Xu, and L. Li. 2022. “Research on the Spatial-Temporal Differentiation and Path Analysis of China’s Provincial Regions’ High-Quality Economic Development.” Sustainability 14(10):6348. doi:10.3390/su14106348
  • Zhu, F., Y. Fang, X. Yang, X. Qiu, and H. Yu. 2018. “Effects of Altitude on County Economic Development in China.” Journal of Mountain Science 15(2):406–18. doi:10.1007/s11629-017-4393-0
  • Zunzunegui, M. V., E. Belanger, T. Benmarhnia, M. Gobbo, A. Otero, F. Béland, F. Zunzunegui, and J. M. Ribera-Casado. 2017. “Financial Fraud and Health: The Case of Spain.” Gaceta Sanitaria 31(4):313–19. doi:10.1016/j.gaceta.2016.12.012

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.