314
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Neutralizations, Altercasting, and Online Romance Fraud Victimizations

&
Pages 736-751 | Received 17 Jul 2023, Accepted 21 Sep 2023, Published online: 26 Sep 2023

References

  • Agnew, R. 1985. “A Revised Strain Theory of Delinquency.” Social Forces 64(1):151–67. doi:10.2307/2578977.
  • Agnew, R. 1994. “The Techniques of Neutralization and Violence.” Criminology 32(4):555–80. doi:10.1111/j.1745-9125.1994.tb01165.x.
  • Ahmed, E., N. Harris, J. Braithwaite, and V. Braithwaite. 2001. Shame Management Through Reintegration. Melbourne: Cambridge University Press.
  • Alvarez, A. 1997. “Adjusting to Genocide: The Techniques of Neutralization and the Holocaust.” Social Science History 21(2):139–78. doi:10.2307/1171272.
  • Beckhouse, L., J. Tanur, J. Weiler, and E. Weinstein. 1975. “… and Some Men Have Leadership Thrust Upon Them.” Journal of Personality and Social Psychology 31(3):557–66. doi:10.1037/h0076478.
  • Bennell, C., L. J. Alison, K. L. Stein, E. K. Alison, and D. V. Canter. 2001. “Sexual Offenses Against Children as the Abusive Exploitation of Conventional Adult-Child Relationships.” Journal of Social and Personal Relationships 18(2):155–71. doi:10.1177/0265407501182001.
  • Benson, M. L. 1985. “Denying the Guilty Mind: Accounting for Involvement in a White‐Collar Crime.” Criminology 23(4):583–607. doi:10.1111/j.1745-9125.1985.tb00365.x.
  • Bergen, R. 1998. Issues in Intimate Violence. Bergen, R. K. Ed., SAGE Publications, Inc. doi: 10.4135/9781483328348.
  • Blumstein, P. W., K. G. Carssow, J. Hall, B. Hawkins, R. Hoffman, and E. Ishem, … D. L. Zimmerman, D. Spens, J. Taylor, D. L. Zimmerman. 1974. “The Honoring of Accounts.” American Sociological Review 39(4):551–66. doi:10.2307/2094421.
  • Bohner, G., M. A. Reinhard, S. Rutz, S. Sturm, B. Kerschbaum, and D. Effler. 1998. “Rape Myths as Neutralizing Cognitions: Evidence for a Causal Impact of Anti‐Victim Attitudes on Men’s Self‐Reported Likelihood of Raping.” European Journal of Social Psychology 28(2):257–68. doi:10.1002/(SICI)1099-0992(199803/04)28:2<257:AID-EJSP871>3.0.CO;2-1.
  • Budd, C. and J. Anderson. 2011. “Consumer Fraud in Australasia: Results of the Australasian Consumer Fraud Taskforce Online Australia Surveys 2008 and 2009.” Technical and Background Paper 43.
  • Burkey, R. C. and T. T. Bensel. 2015. “An Examination and Comparison of Rationalizations Employed by Solo and Co-Offending Female Sex Offenders.” Violence and Gender 2(3):168–78. doi:10.1089/vio.2015.0018.
  • Carter, E. 2021. “Distort, Extort, Deceive and Exploit: Exploring the Inner Workings of a Romance Fraud.” The British Journal of Criminology 61(2):283–302. doi:10.1093/bjc/azaa072.
  • Chartrand, T. L. and J. L. Lakin. 2013. “The Antecedents and Consequences of Human Behavioral Mimicry.” Annual Review of Psychology 64(1):285–308. doi:10.1146/annurev-psych-113011-143754.
  • Chibnall, S. and P. Saunders. 1977. “Worlds Apart: Notes on the Social Reality of Corruption.” The British Journal of Sociology 28(2):138–54. doi:10.2307/590207.
  • Cohen, S. 2001. States of Denial: Knowing About Atrocities and Suffering. Hoboken: John Wiley and Sons.
  • Coleman, J. W. 1994. Neutralization Theory: An Empirical Application and Assessment. [ Doctoral Dissertation, Oklahoma State University]. Stillwater.
  • Coleman, J. W. 2002. The Criminal Elite: The Sociology of White-Collar Crime. New York: St. Martin’s.
  • Copes, H. 2003. “Societal Attachments, Offending Frequency, and Techniques of Neutralization.” Deviant Behavior 24(2):101–27. doi:10.1080/01639620390117200.
  • Copes, H., L. Vieraitis, and J. M. Jochum. 2007. “Bridging the Gap Between Research and Practice: How Neutralization Theory Can Inform Reid Interrogations of Identity Thieves.” Journal of Criminal Justice Education 18(3):444–59. doi:10.1080/10511250701705404.
  • Copley, L. 2014. “Neutralizing Their Involvement: Sex traffickers’ Discourse Techniques.” Feminist Criminology 9(1):45–58. doi:10.1177/1557085113501849.
  • Craven, A., S. Brown, and E. Gilchrist. 2006. “Sexual Grooming of Children: Review of the Literature and Theoretical Considerations.” Journal of Sexual Aggression 12(3):287–99. doi:10.1080/13552600601069414.
  • Cressey, D. 1953. Other People’s Money: A Study in the Social Psychology of Embezzlement. Glencoe, IL: Free Press.
  • Cromwell, P. and Q. Thurman. 2003. “The Devil Made Me Do It: Use of Neutralizations by Shoplifters.” Deviant Behavior 24(6):535–50. doi:10.1080/713840271.
  • Cross, C., M. Dragiewicz, and K. Richards. 2018. “Understanding Romance Fraud: Insights from Domestic Violence Research.” The British Journal of Criminology 58(6):1303–22. doi:10.1093/bjc/azy005.
  • Cross, C. and T. J. Holt. 2021. “The Use of Military Profiles in Romance Fraud Schemes.” Victims and Offenders 16(3):385–406. doi:10.1080/15564886.2020.1850582.
  • Cross, C. and M. Lee. 2022. “Exploring Fear of Crime for Those Targeted by Romance Fraud.” Victims and Offenders 17(5):735–55. doi:10.1080/15564886.2021.2018080.
  • Dickinson, T. 2015. “Exploring the Drugs/Violence Nexus Among Active Offenders: Contributions from the St. Louis School.” Criminal Justice Review 40(1):67–86. doi:10.1177/0734016814562422.
  • Dickinson, T. 2017. “Non-Violent Threats and Promises Among Closed-Market Drug Dealers.” International Journal of Drug Policy 42:7–14. doi:10.1016/j.drugpo.2016.12.005.
  • Dickinson, T. and S. Jacques. 2019. “Drug sellers’ Neutralizations of Guiltless Drug Sales and Avoidance of “Drug dealer” Identities.” International Journal of Drug Policy 73:16–23. doi:10.1016/j.drugpo.2019.07.012.
  • Felson, R. B. 1978. “Aggression as Impression Management.” Social Psychology 41(3):205–13. doi:10.2307/3033557.
  • Felson, R. B. 1982. “Impression Management and the Escalation of Aggression and Violence.” Social Psychology Quarterly 45(4):245–54. doi:10.2307/3033920.
  • Ferraro, K. J. and J. M. Johnson. 1983. “How Women Experience Battering: The Process of Victimization.” Social Problems 30(3):325–39. doi:10.2307/800357.
  • Fritsche, I. 2002. “Account Strategies for the Violation of Social Norms: Integration and Extension of Sociological and Social Psychological Typologies.” Journal for the Theory of Social Behaviour 32(4):371–94. doi:10.1111/1468-5914.00194.
  • Garfinkel, H. 1956. “Conditions of Successful Degradation Ceremonies.” American Journal of Sociology 61(5):420–24. doi:10.1086/221800.
  • Goffman, E. 1959. “The Moral Career of the Mental Patient.” Psychiatry 22(2):123–42. doi:10.1080/00332747.1959.11023166.
  • Goffman, E. 1961. Encounters: Two Studies in the Sociology of Interaction. Indianapolis: Bobbs-Merrill.
  • Goffman, E. 1967. Interaction Ritual: Essays on Face-To-Face Interaction. Milton Park: Routledge.
  • Goffman, E. 1969. Strategic Interaction. Philadelphia: University of Pennsylvania Press.
  • Green, G. S. 1997. Occupational Crime. Chicago, IL: Nelson-Hall Publishers.
  • Hatfield, E., J. T. Cacioppo, and R. L. Rapson. 1994. Emotional contagion. New York: Cambridge University Press. doi:10.1017/CBO9781139174138.
  • Henry, S. Ed. 1990. Degrees of Deviance: Student Accounts of Their Deviant Behavior. Salem: Sheffield Publishing Company.
  • Herbert, T. B., R. C. Silver, and J. H. Ellard. 1991. “Coping with an Abusive Relationship: I. How and Why Do Women Stay?” Journal of Marriage and the Family 53(2):311–25. doi:10.2307/352901.
  • Hewitt, J. P. and R. Stokes. 1975. “Disclaimers.” American Sociological Review 40(1):1–11. doi:10.2307/2094442.
  • Higginson, J. G. 1999. “Defining, Excusing, and Justifying Deviance: Teen mothers’ Accounts for Statutory Rape.” Symbolic Interaction 22(1):25–44. doi:10.1525/si.1999.22.1.25.
  • Holt, T. J. and H. Copes. 2010. “Transferring Subcultural Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates.” Deviant Behavior 31(7):625–54. doi:10.1080/01639620903231548.
  • Hunter, C. H. 1984. “Aligning Actions: Types and Social Distribution.” Symbolic Interaction 7(2):155–74. doi:10.1525/si.1984.7.2.155.
  • Inbau, F., J. Reid, J. Buckley, and B. Jayne. 2011. Criminal Interrogation and Confessions. Burlington: Jones and Bartlett Publishers.
  • Jacobs, B. A. and H. Copes. 2015. “Neutralization without Drift: Criminal Commitment Among Persistent Offenders.” British Journal of Criminology 55(2):286–302. doi:10.1093/bjc/azu100.
  • James, V. and J. Gossett. 2018. “Of Monsters and Men: Exploring Serial murderers’ Discourses of Neutralization.” Deviant Behavior 39(9):1120–39. doi:10.1080/01639625.2017.1409980.
  • Järvinen, M. and M. L. Kessing. 2021. “Self-Casting and Alter-Casting: Healthcare professionals’ Boundary Work in Response to Peer Workers.” Current Sociology 71(3):414–31. doi:10.1177/00113921211048532.
  • Junger, M. 1987. “Women’s Experiences of Sexual Harassment: Some Implications for Their Fear of Crime.” The British Journal of Criminology 27(4):358–83. doi:10.1093/oxfordjournals.bjc.a047688.
  • Kamar, E., D. Maimon, D. Weisburd, and D. Shabat. 2022. “Parental Guardianship and Online Sexual Grooming of Teenagers: A Honeypot Experiment.” Computers in Human Behavior 137(2022):107386. doi:10.1016/j.chb.2022.107386.
  • Kassin, S. M. 2005. “On the Psychology of Confessions: Does Innocence Put Innocents at Risk?” American Psychologist 60(3):215. doi:10.1037/0003-066X.60.3.215.
  • Kemper, T. D. and R. Collins. 1990. “Dimensions of Microinteraction.” American Journal of Sociology 96(1):32–68. doi:10.1086/229492.
  • Klenowski, P. M. 2012. “Learning the Good with the bad” are Occupational White-Collar Offenders Taught How to Neutralize Their Crimes?” Criminal Justice Review 37(4):461–77. doi:10.1177/0734016812465874.
  • Klockars, C. B. 1974. The Professional Fence. New York: Free Press.
  • Knoll, J. 2010. “Teacher Sexual Misconduct: Grooming Patterns and Female Offenders.” Journal of Child Sexual Abuse 19(4):371–86. doi:10.1080/10538712.2010.495047.
  • Koon, T. H. and D. Yoong. 2013. “Preying on Lonely Hearts: A Systematic Deconstruction of an Internet Romance Scammer’s Online Lover Persona.” Journal of Modern Languages 23(1):28–40.
  • Kopp, C., J. Sillitoe, and I. Gondal. 2017. “I Am Your Perfect Online Partner.” Analysis of Dating Profiles Used in Cybercrime APJABSS 3(2).
  • Kopp, C., J. Sillitoe, I. Gondal, and R. Layton. 2016. “The Online Romance Scam: A Complex Two-Layer Scam.” Journal of Psychological and Educational Research 24(2):144.
  • Lea, S., P. Fischer, and K. Evans. 2009, The Psychology of Scams: Provoking and Committing Errors of Judgement. Report for the Office of Fair Trading. www.oft.gov.uk/shared_oft/reports/consumer_protection/oft1070.pdf.
  • Leo, R. A. 1995. “Inside the Interrogation Room.” The Journal of Criminal Law and Criminology (1973-) 86(2):266. doi:10.2307/1144028.
  • Leo, R. A. 1996. “Inside the Interrogation Room.” Journal of Criminal Law & Criminology 86(2):266–303.
  • Lyman, S. 2000. “Accounts: Roots and Foundations.” Pp. 7–13 in Encyclopedia of Criminology and Deviant Behavior, edited by C.D Bryant. Philadelphia: Brunner - Routledge.
  • Maruna, S. and H. Copes. 2005. “What Have We Learned from Five Decades of Neutralization Research?” Crime and Justice 32:221–320. doi:10.1086/655355.
  • Mills, R. B. and K. Malley-Morrison. 1998. “Emotional Commitment, Normative Acceptability, and Attributions for Abusive Partner Behaviors.” Journal of Interpersonal Violence 13(6):682–99. doi:10.1177/088626098013006002.
  • Minor, W. W. 1981. “Techniques of Neutralization: A Reconceptualization and Empirical Examination.” Journal of Research in Crime and Delinquency 18(2):295–318. doi:10.1177/002242788101800206.
  • Presser, L. 2008. Been a Heavy Life: Stories of Violent Men. Champaign: University of Illinois Press.
  • Quayle, E., S. Allegro, L. Hutton, M. Sheath, and L. Lööf. 2014. “Rapid Skill Acquisition and Online Sexual Grooming of Children.” Computers in Human Behavior 39:368–75. doi:10.1016/j.chb.2014.07.005.
  • Ross, S. and R. G. Smith. 2011. “Risk Factors for Advance Fee Fraud Victimization.” Trends & Issues in Crime & Criminal Justice 420:1–6.
  • Scherer, K. R. 1984. “On the Nature and Function of Emotion: A Component Process Approach.” Approaches to Emotion 2293(317):31.
  • Schlenker, B. R. and B. W. Darby. 1981. “The Use of Apologies in Social Predicaments.” Social Psychology Quarterly 44(3):271–78. doi:10.2307/3033840.
  • Schönbach, P. 1990. Account Episodes: The Management or Escalation of Conflict. Cambridge: Cambridge University Press.
  • Scott, M. B. and S. M. Lyman. 1968. “Accounts.” American Sociological Review 33(1):46–62. doi:10.2307/2092239.
  • Sitkin, S. B. and R. J. Bies. 1993. “Social Accounts in Conflict Situations: Using Explanations to Manage Conflict.” Human Relations 46(3):349–70. doi:10.1177/001872679304600303.
  • Sorell, T. and M. Whitty. 2019. “Online Romance Scams and Victimhood.” Security Journal 32(3):342–61. doi:10.1057/s41284-019-00166-w.
  • Spitzer, S. P. and B. A. Volk. 1971. “Altercasting the Difficult.” AJN the American Journal of Nursing 71(4):732–38. doi:10.1097/00000446-197104000-00038.
  • Stadler, W. A. and M. L. Benson. 2012. “Revisiting the Guilty Mind: The Neutralization of White-Collar Crime.” Criminal Justice Review 37(4):494–511. doi:10.1177/0734016812465618.
  • Stokes, R. and J. P. Hewitt. 1976. “Aligning Actions.” American Sociological Review 41(5):838–49. doi:10.2307/2094730.
  • Sutherland, Edwin. 1947. Principles of Criminology. 4th ed. Philadelphia: Lippincott.
  • Sykes, G. M. and D. Matza. 1957. “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22(6):664–70. doi:10.2307/2089195.
  • Tedeschi, J. T. and M. Riess. 1981. “Identities, the Phenomenal Self, and Laboratory Research.” Impression Management Theory and Social Psychological Research 3:22.
  • Tomita, S. K. 1990. “The Denial of Elder Mistreatment by Victims and Abusers: The Application of Neutralization Theory.” Violence and Victims 5(3):171–84. doi:10.1891/0886-6708.5.3.171.
  • Tomita, S. K. 2000. “Elder Mistreatment: Practice Modifications to Accommodate Cultural Differences.” Journal of Multicultural Social Work 8(3–4):305–26. doi:10.1300/J285v08n03_06.
  • Topalli, V. 2005. “When Being Good is Bad: An Expansion of Neutralization Theory.” Criminology 43(3):797–836. doi:10.1111/j.0011-1348.2005.00024.x.
  • Topalli, V. 2006. “The Seductive Nature of Autotelic Crime: How Neutralization Theory Serves as a Boundary Condition for Understanding Hardcore Street Offending.” Sociological Inquiry 76(4):475–501. doi:10.1111/j.1475-682X.2006.00167.x.
  • Wang, F., C. J. Howell, D. Maimon, and S. Jacques. 2021. “The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach.” International Journal of Cyber Criminology 15(1):1–16.
  • Wang, F. and V. Topalli. 2022. “Understanding Romance Scammers Through the Lens of Their Victims: Qualitative Modeling of Risk and Protective Factors in the Online Context.” American Journal of Criminal Justice 1–37. doi: 10.1007/s12103-022-09706-4.
  • Warner, S. 2000. Understanding Child Sexual Abuse: Making the Tactics Possible. Gloucester: Handsell.
  • Weinstein, E. A. and P. Deutschberger. 1963. “Some Dimensions of Altercasting.” Sociometry 26(4):454–66. doi:10.2307/2786148.
  • Weiss, K. G. 2009. ““Boys Will Be boys” and Other Gendered Accounts: An Exploration of victims’ Excuses and Justifications for Unwanted Sexual Contact and Coercion.” Violence Against Women 15(7):810–34. doi:10.1177/1077801209333611.
  • Weiss, K. G. 2011. “Neutralizing Sexual Victimization: A Typology of victims’ Non-Reporting Accounts.” Theoretical Criminology 15(4):445–67. doi:10.1177/1362480610391527.
  • Whittle, H., C. Hamilton-Giachritsis, A. Beech, and G. Collings. 2013. “A Review of Online Grooming: Characteristics and Concerns.” Aggression and Violent Behavior 18(1):62–70. doi:10.1016/j.avb.2012.09.003.
  • Whitty, M. T. 2013a. “Anatomy of the Online Dating Romance Scam.” Security Journal 28(4):443–55. doi:10.1057/sj.2012.57.
  • Whitty, M. T. 2013b. “The Scammers Persuasive Techniques Model: Development of a Stage Model to Explain the Online Dating Romance Scam.” British Journal of Criminology 53(4):665–84. doi:10.1093/bjc/azt009.
  • Whitty, M. T. 2018. “Do You Love Me? Psychological Characteristics of Romance Scam Victims.” Cyberpsychology, Behavior, and Social Networking 21(2):105–09. doi:10.1089/cyber.2016.0729.
  • Whitty, M. T. and T. Buchanan. 2016. “The Online Dating Romance Scam: The Psychological Impact on Victims–Both Financial and Non-Financial.” Criminology and Criminal Justice 16(2):176–94. doi:10.1177/1748895815603773.
  • Wright, R. and S. Decker. 1994. Burglars on the Job. Boston: Northeastern University Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.