The Library
Online romance scams and victimhood
Tools
Sorell, Tom and Whitty, Monica T. (2019) Online romance scams and victimhood. Security Journal, 32 . pp. 342-361. doi:10.1057/s41284-019-00166-w ISSN 0955-1662.
|
PDF
WRAP-online-romance-scams-victimhood-Sorell-2018.pdf - Accepted Version - Requires a PDF viewer. Download (790Kb) | Preview |
Official URL: https://doi.org/10.1057/s41284-019-00166-w
Abstract
Online romance scams defraud dating website users of large amounts of money and inflict serious psychological harm. Victims of these scams often blame themselves for their losses and are blamed by others. We consider whether victims actually do share responsibility with the scammer for their losses. Three sorts of cases are particularly relevant: (i) where there are relatively many abortive meetings and even more fruitless money transfers in a single scam; (ii) where someone is a repeat scam victim; and (iii) where the victim has been warned by authorities that they are currently a victim of a scam and pay anyway. We argue that responsibility sometimes is shared, but that losses can be out of proportion to imprudence. Scam victims sometimes violate epistemic norms, but in ways that are peculiar to romantic attachment. The paper combines the methods of qualitative psychological research on scam victims and analytic philosophy (Research for this paper was supported by Grant EP/N028112/1 from the UK Engineering and Physical Sciences Research Council).
Item Type: | Journal Article | ||||||||
---|---|---|---|---|---|---|---|---|---|
Subjects: | H Social Sciences > HQ The family. Marriage. Woman | ||||||||
Divisions: | Faculty of Social Sciences > Politics and International Studies Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) |
||||||||
Library of Congress Subject Headings (LCSH): | Online dating, Internet users, Computer crimes | ||||||||
Journal or Publication Title: | Security Journal | ||||||||
Publisher: | Palgrave Macmillan Ltd. | ||||||||
ISSN: | 0955-1662 | ||||||||
Official Date: | 1 September 2019 | ||||||||
Dates: |
|
||||||||
Volume: | 32 | ||||||||
Page Range: | pp. 342-361 | ||||||||
DOI: | 10.1057/s41284-019-00166-w | ||||||||
Status: | Peer Reviewed | ||||||||
Publication Status: | Published | ||||||||
Reuse Statement (publisher, data, author rights): | This is a post-peer-review, pre-copyedit version of an article published in Security Journal. The definitive publisher-authenticated version Sorell, T. & Whitty, M. Secur J (2019). https://doi.org/10.1057/s41284-019-00166-w | ||||||||
Access rights to Published version: | Restricted or Subscription Access | ||||||||
Date of first compliant deposit: | 23 January 2019 | ||||||||
Date of first compliant Open Access: | 21 January 2020 | ||||||||
RIOXX Funder/Project Grant: |
|
||||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year