[目的/意义] 基于个体信息行为发生动力理论,深入研究受害人诈骗信息接受意愿及其诈骗信息分享行为过程中不同影响因素间的作用机理,对于做好电信诈骗犯罪预防具有重要意义。 [方法/过程] 基于"动机-机会-能力"(motivation-opportunity-ability,MOA)模型逻辑框架,从受害人动机因素、机会因素、能力因素三方面建构影响受害人欺诈信息接受意愿及其对欺诈信息分享行为的理论模型,借助IBM-SPSS23.0和AMOS23.0统计软件,通过问卷调查方法、多元统计回归方法对1 398个受害人调查样本进行实证分析和数据处理。 [结果/结论] 性别和婚姻状况对于受害人接受欺诈信息意愿存在显著影响;虚假信息"权威性"、对欺诈人员的信任度以及自身贪利心理等动机因素是受害人产生欺诈信息接受意愿的重要驱动力;受害人自我效能感和网络安全识别能力对其欺诈信息接受意愿分别具有正向和负向显著影响,且两者均对欺诈信息接受意愿与其欺诈信息分享行为之间关系具有显著正向调节作用;受害人智能手机依赖程度、个体时间成本均对欺诈信息接受意愿与其欺诈信息分享行为之间的作用关系具有显著正向调节作用。结果表明,打击电信诈骗要多措并举,加强针对虚假信息、名人代言与各类媒体的监管,增强受害人网络安全识别能力,防范智能手机网络金融非理性投资。
[Purpose/significance] From the perspective of information transmission, it is of great significance to analyze the mechanism of the process of "Persuading" the victims by the fraud information and sharing the fraud information, which is of great significance for the prevention of telecom fraud. [Method/process] Based on the logic framework of motivation-opportunity-ability (MOA) model, a theoretical model was constructed from three aspects of the victim’s motivation, opportunity and ability factors, which affected the victim’s willingness to receive fraud information and their behavior of sharing fraud information. With the help of IBM-SPSS23.0 and AMOS23.0 statistical software, questionnaire survey and multivariate statistics were conducted regression analysis and data processing were carried out on 1398 victims survey samples. [Result/conclusion] Gender and marital status have significant influence on the victim’s intention to receive fraud related information; the "authority" of false information, the trust of fraud related personnel and their own greedy psychology are the important driving forces of the victims’ intention to receive fraud related information; the victim’s self-efficacy and network security identification ability have a significant positive and negative impact on their intention to receive fraud related information, and both of them have a significant positive moderating effect on the receiving intention of fraud related information and the sharing behavior of fraud related information; the frequency of the victim’s smartphone use and individual time cost have a significant positive moderating effect on the intention to receive fraud related information and the behavior of sharing fraud related information. The results show that to crack down on telecom fraud, we should take various measures simultaneously, strengthen the supervision of false information, celebrity endorsements and various media, enhance the network security identification ability of victims, and prevent the irrational investment of smart phone network finance.
[1] 靳高风,守佳丽,林晞楠.中国犯罪形势分析与预测(2018-2019)[J].中国人民公安大学学报(社会科学版),2019,35(3):1-11.
[2] 张莹,程传杰.涉众型非法集资犯罪的实证分析与防控建议[J].中国检察官,2019(9):40-42.
[3] 殷明.电信诈骗案件受害人的实证研究——基于受害人笔录的量化统计分析[J].中国刑警学院学报,2017(3):57-62.
[4] 苑景惠.基于"二八定律"的电信诈骗犯罪防范机制研究[J].长春师范大学学报,2019, 38(5):34-37.
[5] 高蕴嶙,周玉玲.大数据背景下电信诈骗犯罪侦防对策实证研究——以C市公安机关立案情况为分析样本[A]//中国犯罪学学会预防犯罪专业委员会,上海政法学院刑事司法学院-警务学院.犯罪学论坛(第五卷).上海:中国法制出版社,2018:880-887.
[6] 马忠红.论网络犯罪案件中的抽样取证——以电信诈骗犯罪为切入点[J].中国人民公安大学学报(社会科学版),2018,34(6):69-78.
[7] 纪熙全.电信网络诈骗犯罪的打击与防范——以福建省三明市为例[J].中国刑事警察, 2019(6):6-10.
[8] 葛悦炜.电信网络诈骗防范宣传策略研究——基于电信网络诈骗被害人角度[J].公安学刊(浙江警察学院学报),2018(4):78-84.
[9] 蔡国芹,赵增田.论电信诈骗犯罪立体防控体系的构建[J].犯罪研究,2011(4):99-105.
[10] 宋平.电信网络诈骗的心理解析及其防控[J].广西警察学院学报,2017,30(1):121-125.
[11] MACINNIS D J, JAWORSKI B J. Information processing from advertisements:toward an integrative framework[J]. Journal of marketing, 1989, 53(4):1-23.
[12] 贾明霞,熊回香.虚拟学术社区知识交流与知识共享探究——基于整合S-O-R模型与MOA理论[J].图书馆学研究,2020(2):43-54.
[13] 陈则谦.MOA模型的形成、发展与核心构念[J].图书馆学研究,2013(13):53-57.
[14] MACLNNIS D J, MOORMAN C, JAWORSKI B J. Enhancing and measuring consumers' motivation, opportunity, and ability to process brand information from ads[J]. Journal of marketing, 1991, 55(4):32-53.
[15] HALLAHAN K. Enhancing motivation, ability, and opportunity to process public relations messages[J]. Public relations review, 2000, 26(4):463-480.
[16] HUNG K, SIRAKAYA-TURK E, INGRAM L J. Testing the efficacy of an integrative model for community participation[J]. Journal of travel research, 2011, 50(3):276-288.
[17] ADLER P S, KWON S-W. Social capital:prospects for a new concept[J]. Academy of management review, 2002, 27(1):17-40.
[18] 宋小康,赵宇翔,宋士杰,等.基于MOA理论的健康谣言分享意愿影响因素研究[J].情报学报,2020,39(5):511-520.
[19] LUO X, ZHANG W, BURD S, et al. Investigating phishing victimization with the heuristic-systematic model:a theoretical framework and an exploration[J]. Computers & security, 2013, 38(5):28-38.
[20] FISCHER P, LEA S E G, EVANS K M. Why do individuals respond to fraudulent scam communications and lose money? the psychological determinants of scam compliance[J]. Journal of applied social psychology, 2013, 43(10):2060-2072.
[21] BARANOWSKI T, SMITH M, BARANOWSKI J, et al. Low validity of a seven-item fruit and vegetable food frequency questionnaire among third-grade students[J]. Journal of the American Dietetic Association, 1997, 97(1):66-68.
[22] MCALEXANDER J H, SCHOUTEN J W, KOENIG H F. Building brand community[J]. Journal of marketing, 2002, 66(1):38-54.
[23] VISHWANATH A. Mobile device affordance:Explicating how smartphones influence the outcome of phishing attacks[J]. Computers in human behavior, 2016, 63(5):198-207.
[24] REINHOLT M, PEDERSEN T, FOSS N J. Why a central network position isn't enough:the role of motivation and ability for knowledge sharing in employee networks[J]. Academy of management journal, 2011, 54(6):1277-1297.
[25] BRENNAN L L. Understanding the knowledge-sharing challenge:is a "bottleneck" perspective the answer?[J]. Academy of management perspectives, 2008, 22(3):112-114.
[26] WRIGHT R T, MARETT K. The influence of experiential and dispositional factors in phishing:an empirical investigation of the deceived[J]. Journal of management information systems, 2010, 27(1):273-303.
[27] MAYER R C, DAVIS J H. The effect of the performance appraisal system on trust for management:a field quasi-experiment[J]. Journal of applied psychology, 1999, 84(1):123-136.
[28] GOULD-WILLIAMS J. The importance of hr practices and workplace trust in achieving superior performance:a study of public-sector organizations[J]. The international journal of human resource management, 2003, 14(1):28-54.
[29] 马李芬,吕尧.高校电信诈骗犯罪的解析及治理路径[J].北京警察学院学报,2017(4):110-114.
[30] WANG J, HERATH T, CHEN R, et al. Research article phishing susceptibility:an investigation into the processing of a targeted spear phishing email[J]. IEEE transactions on professional communication, 2012, 55(4):345-362.
[31] 明均仁,余世英,杨艳妮,等.面向移动图书馆的技术接受模型构建[J].情报资料工作,2014, 35(5):49-55.
[32] HARRISON B, SVETIEVA E, VISHWANATH A. Individual processing of phishing emails:how attention and elaboration protect against phishing[J]. Online information review, 2016, 40(2):265-281.
[33] 周浩,龙立荣.共同方法偏差的统计检验与控制方法[J].心理科学进展,2004(6):942-950.
[34] AHUJA G. Collaboration networks, structural holes and innovation:a longitudinal study[J]. Academy of management proceedings, 2000,45(3):425-455.