[Purpose/significance] From the perspective of information transmission, it is of great significance to analyze the mechanism of the process of "Persuading" the victims by the fraud information and sharing the fraud information, which is of great significance for the prevention of telecom fraud. [Method/process] Based on the logic framework of motivation-opportunity-ability (MOA) model, a theoretical model was constructed from three aspects of the victim’s motivation, opportunity and ability factors, which affected the victim’s willingness to receive fraud information and their behavior of sharing fraud information. With the help of IBM-SPSS23.0 and AMOS23.0 statistical software, questionnaire survey and multivariate statistics were conducted regression analysis and data processing were carried out on 1398 victims survey samples. [Result/conclusion] Gender and marital status have significant influence on the victim’s intention to receive fraud related information; the "authority" of false information, the trust of fraud related personnel and their own greedy psychology are the important driving forces of the victims’ intention to receive fraud related information; the victim’s self-efficacy and network security identification ability have a significant positive and negative impact on their intention to receive fraud related information, and both of them have a significant positive moderating effect on the receiving intention of fraud related information and the sharing behavior of fraud related information; the frequency of the victim’s smartphone use and individual time cost have a significant positive moderating effect on the intention to receive fraud related information and the behavior of sharing fraud related information. The results show that to crack down on telecom fraud, we should take various measures simultaneously, strengthen the supervision of false information, celebrity endorsements and various media, enhance the network security identification ability of victims, and prevent the irrational investment of smart phone network finance.
Li Hui
. Research on the Willingness of the Victim to Receive Fraud Information and Its Sharing Behavior in the Context of Telecom Fraud[J]. Library and Information Service, 2021
, 65(7)
: 90
-102
.
DOI: 10.13266/j.issn.0252-3116.2021.07.009
[1] 靳高风,守佳丽,林晞楠.中国犯罪形势分析与预测(2018-2019)[J].中国人民公安大学学报(社会科学版),2019,35(3):1-11.
[2] 张莹,程传杰.涉众型非法集资犯罪的实证分析与防控建议[J].中国检察官,2019(9):40-42.
[3] 殷明.电信诈骗案件受害人的实证研究——基于受害人笔录的量化统计分析[J].中国刑警学院学报,2017(3):57-62.
[4] 苑景惠.基于"二八定律"的电信诈骗犯罪防范机制研究[J].长春师范大学学报,2019, 38(5):34-37.
[5] 高蕴嶙,周玉玲.大数据背景下电信诈骗犯罪侦防对策实证研究——以C市公安机关立案情况为分析样本[A]//中国犯罪学学会预防犯罪专业委员会,上海政法学院刑事司法学院-警务学院.犯罪学论坛(第五卷).上海:中国法制出版社,2018:880-887.
[6] 马忠红.论网络犯罪案件中的抽样取证——以电信诈骗犯罪为切入点[J].中国人民公安大学学报(社会科学版),2018,34(6):69-78.
[7] 纪熙全.电信网络诈骗犯罪的打击与防范——以福建省三明市为例[J].中国刑事警察, 2019(6):6-10.
[8] 葛悦炜.电信网络诈骗防范宣传策略研究——基于电信网络诈骗被害人角度[J].公安学刊(浙江警察学院学报),2018(4):78-84.
[9] 蔡国芹,赵增田.论电信诈骗犯罪立体防控体系的构建[J].犯罪研究,2011(4):99-105.
[10] 宋平.电信网络诈骗的心理解析及其防控[J].广西警察学院学报,2017,30(1):121-125.
[11] MACINNIS D J, JAWORSKI B J. Information processing from advertisements:toward an integrative framework[J]. Journal of marketing, 1989, 53(4):1-23.
[12] 贾明霞,熊回香.虚拟学术社区知识交流与知识共享探究——基于整合S-O-R模型与MOA理论[J].图书馆学研究,2020(2):43-54.
[13] 陈则谦.MOA模型的形成、发展与核心构念[J].图书馆学研究,2013(13):53-57.
[14] MACLNNIS D J, MOORMAN C, JAWORSKI B J. Enhancing and measuring consumers' motivation, opportunity, and ability to process brand information from ads[J]. Journal of marketing, 1991, 55(4):32-53.
[15] HALLAHAN K. Enhancing motivation, ability, and opportunity to process public relations messages[J]. Public relations review, 2000, 26(4):463-480.
[16] HUNG K, SIRAKAYA-TURK E, INGRAM L J. Testing the efficacy of an integrative model for community participation[J]. Journal of travel research, 2011, 50(3):276-288.
[17] ADLER P S, KWON S-W. Social capital:prospects for a new concept[J]. Academy of management review, 2002, 27(1):17-40.
[18] 宋小康,赵宇翔,宋士杰,等.基于MOA理论的健康谣言分享意愿影响因素研究[J].情报学报,2020,39(5):511-520.
[19] LUO X, ZHANG W, BURD S, et al. Investigating phishing victimization with the heuristic-systematic model:a theoretical framework and an exploration[J]. Computers & security, 2013, 38(5):28-38.
[20] FISCHER P, LEA S E G, EVANS K M. Why do individuals respond to fraudulent scam communications and lose money? the psychological determinants of scam compliance[J]. Journal of applied social psychology, 2013, 43(10):2060-2072.
[21] BARANOWSKI T, SMITH M, BARANOWSKI J, et al. Low validity of a seven-item fruit and vegetable food frequency questionnaire among third-grade students[J]. Journal of the American Dietetic Association, 1997, 97(1):66-68.
[22] MCALEXANDER J H, SCHOUTEN J W, KOENIG H F. Building brand community[J]. Journal of marketing, 2002, 66(1):38-54.
[23] VISHWANATH A. Mobile device affordance:Explicating how smartphones influence the outcome of phishing attacks[J]. Computers in human behavior, 2016, 63(5):198-207.
[24] REINHOLT M, PEDERSEN T, FOSS N J. Why a central network position isn't enough:the role of motivation and ability for knowledge sharing in employee networks[J]. Academy of management journal, 2011, 54(6):1277-1297.
[25] BRENNAN L L. Understanding the knowledge-sharing challenge:is a "bottleneck" perspective the answer?[J]. Academy of management perspectives, 2008, 22(3):112-114.
[26] WRIGHT R T, MARETT K. The influence of experiential and dispositional factors in phishing:an empirical investigation of the deceived[J]. Journal of management information systems, 2010, 27(1):273-303.
[27] MAYER R C, DAVIS J H. The effect of the performance appraisal system on trust for management:a field quasi-experiment[J]. Journal of applied psychology, 1999, 84(1):123-136.
[28] GOULD-WILLIAMS J. The importance of hr practices and workplace trust in achieving superior performance:a study of public-sector organizations[J]. The international journal of human resource management, 2003, 14(1):28-54.
[29] 马李芬,吕尧.高校电信诈骗犯罪的解析及治理路径[J].北京警察学院学报,2017(4):110-114.
[30] WANG J, HERATH T, CHEN R, et al. Research article phishing susceptibility:an investigation into the processing of a targeted spear phishing email[J]. IEEE transactions on professional communication, 2012, 55(4):345-362.
[31] 明均仁,余世英,杨艳妮,等.面向移动图书馆的技术接受模型构建[J].情报资料工作,2014, 35(5):49-55.
[32] HARRISON B, SVETIEVA E, VISHWANATH A. Individual processing of phishing emails:how attention and elaboration protect against phishing[J]. Online information review, 2016, 40(2):265-281.
[33] 周浩,龙立荣.共同方法偏差的统计检验与控制方法[J].心理科学进展,2004(6):942-950.
[34] AHUJA G. Collaboration networks, structural holes and innovation:a longitudinal study[J]. Academy of management proceedings, 2000,45(3):425-455.