Consumer vulnerability

RP Hill, E Sharma - Journal of Consumer Psychology, 2020 - Wiley Online Library
Consumer vulnerability affects billions of consumers worldwide, yet there is no consensus
about what constitutes this state or about its consequences for consumers. Indeed, while …

Financial fraud: A literature review

A Reurink - Journal of Economic Surveys, 2018 - Wiley Online Library
This paper describes the empirical universe of financial fraud as it has been documented in
the academic literature. Specifically, it describes the different forms of fraudulent behaviour …

Persuasive Schemes for Financial Exploitation in Online Romance Scam: An Anatomy on Sha Zhu Pan (杀猪盘) in China

F Wang, X Zhou - Victims & Offenders, 2023 - Taylor & Francis
ABSTRACT Sha Zhu Pan (杀猪盘, Pig-Butchering scam) is a new online romance scam
targeting mainly Chinese-speaking individuals. While a few studies in Chinese have paid …

Do nudges reduce disparities? Choice architecture compensates for low consumer knowledge

K Mrkva, NA Posner, C Reeck… - Journal of …, 2021 - journals.sagepub.com
Choice architecture tools, commonly known as nudges, powerfully impact decisions and can
improve welfare. Yet it is unclear who is most impacted by nudges. If nudge effects are …

Mapping the conceptual and intellectual structure of the consumer vulnerability field: A bibliometric analysis

A Khare, R Jain - Journal of Business Research, 2022 - Elsevier
Consumer vulnerability (CV) has evolved into an important management research field over
the past two decades. The CV field (hereafter, the field) merits evaluation of its present state …

Building understanding of the domain of consumer vulnerability

SM Baker, JW Gentry… - Journal of …, 2005 - journals.sagepub.com
Consumer vulnerability is a sometimes misunderstood or misused concept that is equated
erroneously with demographic characteristics, stigmatization, consumer protection, unmet …

[图书][B] Cyber frauds, scams and their victims

M Button, C Cross - 2017 - taylorfrancis.com
Crime is undergoing a metamorphosis. The online technological revolution has created new
opportunities for a wide variety of crimes which can be perpetrated on an industrial scale …

Routine online activity and internet fraud targeting: Extending the generality of routine activity theory

TC Pratt, K Holtfreter, MD Reisig - Journal of research in …, 2010 - journals.sagepub.com
Routine activity theory predicts that changes in legitimate opportunity structures (eg,
technology) can increase the convergence of motivated offenders and suitable targets in the …

Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email

J Wang, T Herath, R Chen… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Research problem: Phishing is an email-based scam where a perpetrator camouflages
emails to appear as a legitimate request for personal and sensitive information. Research …

[HTML][HTML] Individual differences in susceptibility to online influence: A theoretical review

EJ Williams, A Beardmore, AN Joinson - Computers in Human Behavior, 2017 - Elsevier
Scams and other malicious attempts to influence people are continuing to proliferate across
the globe, aided by the availability of technology that makes it increasingly easy to create …