Scam Susceptibility: Determining the Dominant Factor for an Adolescent’s Decision-making
DOI:
https://doi.org/10.47611/jsrhs.v10i4.1938Keywords:
Income, Personality Type, Scam SusceptibilityAbstract
This research seeks to investigate the dominant factor in adolescent scam susceptibility using personality type–assessed by the NERIS type explorer–and income. The data consisted of 73 participants, all of whom were utilized for income, while 52 were analyzed for their personality type, from a suburban high school. Each individual accessed an online survey where they differentiated between genuine and scam emails through a multiple-choice question, followed by a free-response question to express their reasoning behind their decisions. Findings revealed that income exhibited a significant effect on scam vulnerability, while personality does not; however, qualitative data suggests that personality may influence one’s perception of scams. Through this study, governmental intervention programs can be implemented to garner greater awareness of scams to educate people.
Downloads
References or Bibliography
Bennett, J., Fry, R., & Kochhar, R. (2020). Are you in the American middle class? Find out with our income calculator. Retrieved from https://www.pewresearch.org/fact-tank/2020/07/23/are-you-in-the-american-middle-class/
Bílek, J., Nedoma, J., & Jirásek, M. (2018). Representativeness Heuristics: A Literature Review of Its Impacts on the Quality of Decision-Making. Scientific Papers of the University of Pardubice. Series D, Faculty of Economics & Administration, 25(43), 29–38. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=asn&AN=132031636&site=ehost-live.
Chen, Y., YeckehZaare, I., & Zhang, A. F. (2018). Real or bogus: Predicting susceptibility to phishing with economic experiments. PLoS ONE, 13(6), 1–18. Retrieved from https://doi.org/10.1371/journal.pone.0198213
Department of Education. (2019). Federal Student Aid: Annual Report FY 2019. Retrieved from https://www2.ed.gov/about/reports/annual/2019report/fsa-report.pdf
Fatima, R., Yasin, A., Liu, L., & Wang, J. (2019). How persuasive is a phishing email? A phishing game for phishing awareness. Journal of Computer Security, 27(6), 581–612. Retrieved from https://doi.org/10.3233/JCS-181253
Federal Trade Commission. (2008). Consumer Sentinel Network. Retrieved from https://www.ftc.gov/sites/default/files/documents/reports_annual/sentinel-cy-2008/sentinel-cy2008.pdf
Federal Trade Commission. (2019). Consumer Sentinel Network. Retrieved from https://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-2019/consumer_sentinel_network_data_book_2019.pdf
Gavett, B. E., Zhao, R., John, S. E., Bussell, C. A., Roberts, J. R., & Yue, C. (2017). Phishing suspiciousness in older and younger adults: The role of executive functioning. PLoS ONE, 12(2), 1–16. Retrieved from https://doi.org/10.1371/journal.pone.0171620
Goddings, A., Beltz, A., Peper, J. S., Crone, E. A., & Braams, B. R. (2019). Understanding the Role of Puberty in Structural and Functional Development of the Adolescent Brain. Journal of Research on Adolescence (Wiley-Blackwell), 29(1), 32–53. Retrieved from https://doi.org/10.1111/jora.12408
Greif, M. (2018). Introduction: Cons And Scams In American Culture. Social Research, 85(4), 695–697. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db= asn&AN=1346355 10&site=ehost-live.
Hoffmann, A. O. I., & McNair, S. J. (2019). How Does Consumers’ Financial Vulnerability Relate to Positive and Negative Financial Outcomes? The Mediating Role of Individual Psychological Characteristics. Journal of Consumer Affairs, 53(4), 1630–1673. Retrieved from https://doi.org/10.1111/joca.12233
Jones, H. S., Towse, J. N., Race, N., & Harrison, T. (2019). Email fraud: The search for psychological predictors of susceptibility. PLoS ONE, 14(1), 1–15. Retrieved from https://doi.org/10.1371/journal.pone.0209684
José Loureiro, R. (2020). Decision making in adolescents: a multifaceted construct. Revista Brasileira de Crescimento e Desenvolvimento Humano, 30(2), 160–163.Retrieved from https://doi.org/10.7322/jhgd.v30.10362
Kleitman, S., Law, M. K. H., & Kay, J. (2018). It’s the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling. PLoS ONE, 13(10), 1–29. Retrieved from https://doi.org/10.1371/journal.pone.0205089
Lee, J., & Soberon-Ferrer, H. (1997). Consumer vulnerability to fraud: Influencing factors. Journal of Consumer Affairs, 31(1), 70. Retrieved from https://doi.org/10.1111/j.1745-6606.1997.tb00827.x
NERIS Type Explorer. (n.d.) Retrieved from https://www.16personalities.com/free-personality-test
Pendás, M. G. (2018). Introduction: Cons, Scams, and the Arts–Aesthetics and Techniques of Delusion. Social Research, 85(4), 823–826. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=asn&AN=134635512&site=ehost-live.
Reitter, D., & Grossklags, J. (2019). The Positive Impact of Task Familiarity, Risk Propensity, and Need For Cognition on Observed Timing Decisions in a Security Game. Games (20734336), 10(4), 49. Retrieved from https://doi.org/10.3390/g10040049
Resnik, D. B., & Finn, P. R. (2018). Ethics and Phishing Experiments. Science & Engineering Ethics, 24(4), 1241–1252. Retrieved from https://doi.org/10.1007/s11948-017-9952-9
Rodrigo, M. J., Padrón, I., de Vega, M., & Ferstl, E. (2018). Neural Substrates of Counterfactual Emotions After Risky Decisions in Late Adolescents and Young Adults. Journal of Research on Adolescence (Wiley-Blackwell), 28(1), 70–86. Retrieved from https://doi.org/10.1111/jora.12342
Sevier, J., & Williams, K. A. (2018). Consumers, Seller-Advisors, and the Psychology of Trust. Boston College Law Review, 59(3), 932–992. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=asn&AN=128936108&site=ehost-live.
Steele, E. H. (1975). The Dilemma of Consumer Fraud: Prosecute or Mediate. American Bar Association Journal, 61(10), 1230. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=asn&AN=4815861&site=ehost-live.
Williams, E. J., & Polage, D. (2019). How persuasive is phishing email? The role of authentic design, influence and current events in email judgements. Behaviour & Information Technology, 38(2), 184–197. Retrieved from https://doi.org/10.1080/0144929X.2018.1519599
Published
How to Cite
Issue
Section
Copyright (c) 2021 Arianna Guerra; Kelly Taylor
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.