Abstract
The Online Dating Romance Scam is a relatively new form of online fraud. This article draws from three qualitative studies: an analysis of posts from a public online support group, in-depth interviews with victims of this crime and an interview with a Serious Organised Crime Agency officer to outline the anatomy of this scam. It is argued here that there are five distinct stages of this crime. In Stage 1, the criminal creates an attractive profile to draw in the victim; in Stage 2, the criminal grooms the victim, priming them to send money; in Stage 3, the criminal begins to request funds from the victim (there a four potential trajectories at this stage); in Stage 4, which only a few went through, the victim is sexually abused via cybersex; and finally Stage 5 is the revelation. Understanding the anatomy of this scam is important for prevention as well as psychological treatment.
Similar content being viewed by others
References
Bailey, J.M., Kim, P.Y., Hills, A. and Linsenmeier, J.A.W. (1997) Butch, femme, or straight acting? Partner preferences of gay men and lesbians. Journal of Personality and Social Psychology 73 (5): 960–973.
Buss, D.M. and Barnes, M. (1986) Preferences in human mate selection. Journal of Personality and Social Psychology 50 (3): 559–570.
Cialdini, R.B. (1984) Influence: The Psychology of Persuasion. New York: William Morrow.
Cialdini, R.B., Trost, M.R. and Newsom, J.T. (1995) Preference for consistency: The development of a valid measure and the discovery of surprising behavioral implications. Journal of Personality and Social Psychology 69 (2): 318–328.
Dillon, L.M. and Saleh, D.J. (2012) Sexual strategies theory: Evidence from homosexual personal advertisements. Journal of Social, Evolutionary, and Cultural Psychology 6 (2): 203–216.
Dutton, W.H. and Helsper, E. (2007) The Internet in Britain. Oxford: Oxford Internet Institute, University of Oxford.
Dutton, W.H., Helsper, E.J., Whitty, M.T., Buckwalter, G. and Lee, E. (2008) Mate selection in the network society: The role of the Internet in reconfiguring marriages in Australia, the United Kingdom and United States, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1275810, accessed 3 January 2009.
Ellis, B. and Symons, D. (1990) Sex differences in sexual fantasy: An evolutionary psychological approach. Journal of Sex Research 27 (4): 527–555.
Freedman, J.L. and Fraser, S.C. (1966) Compliance without pressure: The foot-in-the-door technique. Journal of Personality and Social Psychology 4: 195–202.
Internet Crime Complaint Center. (2012) 2011 Internet Crime Report, http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf.
Kenrick, D.T., Sadalla, E.K., Groth, G. and Trost, M.R. (1990) Evolution, traits, and the stages of human courtship: Qualifying the parental investment model. Journal of Personality 58 (1): 97–116.
Levi, M. (2002) Money laundering and its regulation. The Annals of the American Academy of Political and Social Science 582 (1): 181–194.
National Fraud Authority. (2012) Annual fraud indicator.
Rege, A. (2009) What's love got to do with it? Exploring online dating scams and identity fraud. International Journal of Cyber Criminology 3 (2): 494–512.
Townsend, J. (1993) Sexuality and partner selection: Sex differences among college students. Ethology and Sociobiology 14 (5): 305–330.
Whitty, M.T. and Buchanan, T. (2012) The online dating romance scam: A serious crime. Cyberpsychology, Behavior, and Social Networking 15 (3): 181–183.
Whitty, M.T. and Joinson, A.N. (2009) Truth, Lies and Trust on the Internet. London: Routledge, Psychology Press.
Acknowledgements
The work reported in this article was supported by award RES-000-22-4022 from the UK Economic and Social Research Council. I would also like to acknowledge the valuable assistance provided by the UK Serious Organised Crime Agency and PARSHIP GmbH.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Whitty, M. Anatomy of the online dating romance scam. Secur J 28, 443–455 (2015). https://doi.org/10.1057/sj.2012.57
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2012.57