Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet on the communication process that takes place between perpetrator and victim. Finally, the article discusses some of the major tactics employed to appeal to each power type in predominant fraud forms, as well exploring future types of fraud.
References
Albrecht, W. S., Albrecht, C. C., Albrecht, C. O., Fraud Examination 2nd Edition, 2006. Thomson South-Western, United States of America.
Albrecht, Romney, Cherrington, Payne, and Roe. 1979. A Red Flag Approach to the Detection of Fraud, Research Monograph, Brigham Young University.
Albrecht, Romney, Cherrington, Payne, and Roe. 1981. How to Detect and Prevent Business Fraud, Prentice-Hall. Apostolon, N., and Crumbley, D. L., 2005. Fraud Surveys: Lessons for forensic Accounting. Journal of Forensic Accounting. Volume IV. Pp. 103-118.
Association of Certified Fraud Examiners. 2004. The Report to the Nation on Occupational Fraud and Abuse, (ACFE, Austin, Texas).
Bacharach, S. B., & Lawler, E.J. 1980. Power and politics in organizations. San Francisco: Jossey-Bass.
Baker. C. R. 2002, Crime, fraud and deceit on the Internet: Is there hyperreality in cyberspace? Critical Perspectives in Accounting. 13:1 pp. 1-15
Balsmeier, P., Blaise, J. B., Viosca, R. C. Jr., 2004. Internet fraud: A global perspective. Journal of E-Business, Volume 4: 1.
Bell, J.B. and B. Whaley. Cheating and Deception, Transaction Publishers, New Brunswick, USA, and London, UK, 1982, 1991.
Bowyer, J. B. (1982). Cheating. New York, NY: St. Martins Press.
Brenner, S. W., 2001. State Cybercrime Legislation in the United States of America; A Survey. Richmond Journal of Law and Technology. Volume: VI: 3.
Bywell, C.E., and Oppenheim, C. "Fraud on Internet Auctions," ASLIB Proceedings (53:7), 2001, pp. 265-272
Chua, C.E. and Wareham, J. 2004. Fighting Internet auction fraud: an assessment and proposal. IEEE Computer. Vol.37, Issue 10, pg. 31
Cohen, L. and Felson, M. 1979. Social change and crime rate trends: A routine activity approach, American Sociological Review, vol. 44, pp. 588-608. Cressey, Donald. 1953. Other People’s Money. Dapiran, P. G., Hogarth-Scott, S., 2003. Are co-operation and trust being confused with power? An analysis of food retailing in Australia and the UK. International Journal of Retail & Distribution Management, Volume 31: 5, pp. 256-267. Diller-Haas, A. 2004. Identity Theft: It Can Happen to You. The CPA Journal; Apr 2004; 74, 4; p. 42 Dinev, T. (2006) “Why Spoofing is Serious Internet Fraud”, Communications of the ACM, 49(10) p. 76-82. French, J. R. P., Jr., & Raven, B. 1959. The Bases of Social Power. Ann Arbor: University of Michigan Press.
Gibelman, M., & Gelman, G. R., 2003. Should we have faith in faith-based social services? Rhetorical verses realistic expectations, Nonprofit Management and Leadership. Volume 13: 1, Pages 49-65.
Grazioli, S., and Jarvenpaa, S.L. (2000) "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers," IEEE Transactions on Systems, Man, and CyberneticsPart A: Systems and Humans (20:4), July 2000, pp 395-410.
Grazioli, S., and Jarvenpaa, S.L. (2003a) "Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence," International Journal of Electronic Commerce (7:4) 2003a, pp 93-118.
Grazioli, S., and Jarvenpaa, S.L. (2003b) "Deceived: Under Target Online," Communications of the ACM (46:12), December 2003, pp 196-205.
Hann, I., K. Hui, Y. Lai, S. Lee, I. Png. (2006) “Who Gets Spammed?” Communications of the ACM, 49(10) pp. 83 – 87.
Internet Fraud Watch/National Fraud Information Center. 2005. Internet Fraud Statistics. January through December, 2005. Available at http://www.fraud.org/2005_Internet_Fraud_Report.pd
Johnson, P.E., Grazioli, S., Jamal, K., and Berryman, R.G. (2001) "Detecting Deception: Adversarial Problem Solving in a Low Base-Rate World," Cognitive Science (25:3), May/June 2001, pp 355-392.
Kim, P. H., Pinkley, R. L., Fragale, A. R., 2005, Power dynamics in organizations, The Academy of Management Review: 30:4, Pp 799-822.
Krambia-Kapardis, M. 2001. Enhancing the auditor’s fraud detection ability: An interdisciplinary approach, Peter Lang, Frankfurt am Main.
Lewicki, R. J., Saunders, D. M., & Minton, J. W. 1999 Negotiation (3rd edition) Boston: Irwin-McGraw Hill.
Locovich, E., 2005. Elder abuse and neglect in Israel: A comparison between the general elderly population and elderly new immigrants, Family Relations, Volume 54: 3.
Marlowe, J., Atiles, J. H., 2005. Consumer fraud and Latino immigrant consumers in the United States. International Journal of Consumer Studies, volume 29: 5.
Marwell, G., Ratcliff, K., Schmitt, D. R., 1969. Minimizing differences in a maximizing game. J. Pers. Soc. Psychol. 12: 158-163.
National White Collar Crime Center, and Federal Bureau of Investigation (2004) "IC3 2004 Internet Fraud Report: January 2004-December 2004," Washington, DC, 2004.
Nikitkov, A. N. and Stone, D. N., 2006. Online Auction Deception: A Forensic Case Study of an Opportunistic Seller. July 14, 2006. Available at SSRN: http://ssrn.com/abstract=917423
N.Y. Times. July 30, 1920. Al. 1, Column 7.
O’Conner, K. M., Arnold, J. A., Burris, E. R,. 2005. Negotiators’ bargaining histories and their effects on future negotiation performance, Journal of Applied Psychology, 90: (2)
Pavlou, Paul A. and D. Gefen (2005), "Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role," Information Systems Research, 16(4): 272-299
Politis, J. D., 2005. The influence of managerial power and credibility on knowledge acquisition attributes. Leadership & Organization Development Journal. Volume 26: 3, pp. 197-214.
Richmond, R. 2005. Internet Scams, Breaches Drive Buyers Off the Web, Survey Finds. Wall Street Journal, (Eastern Edition). New York, N. Y. : Jun 23. 2005. Pg. B.3.
Romney, M. B., Albrecht, W. S., Cherrington, D. J., 1980. Red-flagging the white-collar criminal, Management Accounting. March, 1980. Pp. 51- 57.
Schweitzer, M. E., 1997. Omission, friendship, and fraud: lies about material facts in negotiation. Presented at Annu. Meet. Acad. Manage., Boston, MA.
Snyder, J.M. "Online Auction Fraud: Are the Auction Houses Doing All They Should or Could to Stop Online Fraud?" Federal Communications Law Journal (52:2), 2000, pp. 453-472.
Sutherland, E., 1949. White Collar Crime.
Tenbrunsel, A. E., 1998. Misrepresentation and expectations in an ethical dilemma: the role of incentives and temptation. Academy of Management Journal. 41: 330-339.
Thompson, L. 2000. The Mind and Heart of the Negotiation. Prentice-Hall. United States of America.
U.S. Federal Bureau of Investigation. 2004. IC3 2004 Internet Fraud – Crime Report. Available at http://www.ic3.gov/media/annualreports.aspx
Webster’s New World Dictionary, College Edition, Cleveland and New York: World (1964), p. 380
Weber, M. 1947. The theory of social and economic organization. New York: Free Press.
Wolfe, R. J., McGinn, K. L., 2005. Perceived relative power and its influence on negotiations. Group Decision and Negotiation. Volume 14: 1, pp. 3- 20.
Recommended Citation
Albrecht, Chad; Albrecht, Conan C.; Wareham, Jonathan; and Fox, Paul
(2006)
"The Role of Power and Negotiation in Online Deception,"
Journal of Digital Forensics, Security and Law: Vol. 1
, Article 2.
DOI: https://doi.org/10.15394/jdfsl.2006.1012
Available at:
https://commons.erau.edu/jdfsl/vol1/iss4/2
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons