nav emailalert searchbtn searchbox tablepage yinyongbenwen piczone journalimg journalInfo journalinfonormal searchdiv searchzone qikanlogo popupnotification paper paperNew
2025, 05, No.211 84-98
“刷单类”心理操纵机制与反制劝阻话术应用
基金项目(Foundation): 重庆市科学技术局2022年度技术创新与应用发展重点项目“电信网络诈骗犯罪侦防关键技术研究”(CSTB2022TIAD-KPX0107); 重庆市新型犯罪研究中心研究项目“新型电信网络诈骗心理操纵模式与预防研究”(24XXFZX10)
邮箱(Email):
DOI:
摘要:

近年来,“刷单”类电信诈骗因引流手段多元、获利周期短,已成为发案量最大、危害最广的诈骗类型。其核心特征在于诈骗者分阶段运用心理学原理精准操控被害人心理,导致被害人深陷骗局且对民警劝阻产生抵触,传统预警劝阻措施成效受限。基于对C市Y区公安局2022—2024年立案的3700起“刷单返利类”案件分析,采用时间轴分析法将诈骗过程划分为“欲望刺激期、入群蜜月期、转台任务期、追资避险期”四个阶段,结合案例抽样与文本编码,系统揭示诈骗者的心理操纵手法以及被害人相应心理效应。在此基础上,针对民警劝阻面临的社会认知不足、信息不对称、被害人心理易感性等挑战,提出分阶段精准劝阻策略,并设计贴合各阶段心理特征的劝阻话术。研究结果为提升反诈劝阻精准性、保护民众财产安全提供理论支撑与实践参考。

Abstract:

In recent years, telecom fraud involving “brush orders” has become the most prevalent and widely harmful type of fraud, due to its diverse user-acquisition methods and short profit cycles. Its core feature lies in scammers' phased use of psychological principles to precisely manipulate victims' minds, which not only traps victims deeply in the scam but also makes them resistant to police persuasion. As a result, traditional early warning and persuasion measures have shown limited effectiveness. Based on an analysis of 3,700 “brush-order rebate” cases filed by the Public Security Bureau of District Y in City C(2022—2024), this study adopts a timeline analysis method to divide the fraud process into four stages: the “desire stimulation stage, group-entry honeymoon stage, task transfer stage, and fund-chasing risk-avoidance stage”. Combining case sampling and text coding, it systematically identifies scammers' psychological manipulation tactics and the corresponding psychological effects on victims. On this basis, addressing the challenges faced by the police in persuasion—including insufficient social awareness, information asymmetry, and victims' psychological vulnerability—this study proposes a phased and targeted persuasion strategy, and designs persuasion scripts that align with the psychological characteristics of each stage. The research findings provide theoretical support and practical references for enhancing the accuracy of anti-fraud persuasion and protecting the public's property security.

参考文献

(1)参见王华伟:《刷单炒信的刑法适用与解释理念》,《中国刑事法杂志》2018年第6期。

(2)参见《公安发布十大高发电信网络诈骗类型》,2023年6月15日,中华人民共和国公安部官网,https://www.mps.gov.cn/n2253534/n2253535/c9077804/content.html,2025年10月10日访问。

(3)参见《“贯彻二十大建设新重庆”系列主题新闻发布会(第十一场)》,2024年1月3日,华龙网,https://cq.cqnews.net/jrzb2/col1837591.html,2024年9月20日访问。

(4)参见《公安部公布十大高发电信网络诈骗类型》,2024年6月25日,载中华人民共和国公安部官网,https://www.mps.gov.cn/n2253534/n2253535/c9629527/content.html,2025年10月10日访问。

(5)See Monica T W&Tom B.The Online Dating Romance Scam:The Psychological Impact on Victims-Both Financial and Non-Financial.Criminology and Criminal Justice,2015,16(2).

(6)See Cassandra C,Karen H&Roberta L.“If U Don't Pay They Will Share the Pics”:Exploring Sextortion in the Context of Romance Fraud.Victims & Offenders,2023,18(7).

(7)See Julianne W&Jacqueline M D.Policing Advance Fee Fraud (AFF):Experiences of Fraud Detectives Using a Victim-Focused Approach.International Journal of Police Science&Management,2017,19(1).

(8)See Pengfeng N&Wei Y.A Victim-Based Framework for Telecom Fraud Analysis:A Bayesian Network Model.Computational Intelligence and Neuroscience,2022(36).

(9)See Linda M,Alves M S W&Steve R.The Effects of Loneliness on Telemarketing Fraud Vulnerability among Older Adults.Journal of Elder Abuse & Neglect,2008,20(1).

(10)See Kai L,Yuning W & Ivan Y S,et al.Telecommunication and Cyber Fraud Victimization among Chinese College Students:An Application of Routine Activity Theory.Criminology&Criminal Justice.

(11)See Jinshi C.“You are in Trouble!”:A Discursive Psychological Analysis of Threatening Language in Chinese Cellphone Fraud Interactions.International Journal for the Semiotics of Law,2021(34).

(12)See Ning Y,Le C & Yun Z.Identity Construction of Suspects in Telecom and Internet Fraud Discourse:From a Sociosemiotic Perspective.Social Semiotics,2019,29(3).

(13)See Sigi G&David L.Detecting Complex Account Fraud in the Enterprise:The Role of Technical and Non-Technical Controls.Decision Support Systems,2011,50(4).

(14)See Ron C A&Astrid J S.Venture Capital and Risk Perception.Journal of Business Economics,2012(82).

(15)See John C & John E.Some Hypotheses about Risk in Venture Capital Investing.Journal of Business,1991,6(2).

(16)See Nikolaus F,Marc G & Dietmar H.What You are is What You Like—Similarity Biases in Venture Capitalists' Evaluations of Start-Up Teams.Journal of Business Journal of Business Venturing,2006,21(6).

(17)参见张钊:《网络刷单类电信诈骗心理控制机制及其防控措施研究》,《网络技术与应用》2022年第12期。

(18)参见皮子昕、罗震雷:《刷单返利网络诈骗的心理诱导机制与防范策略》,《广西警察学院学报》2023年第4期。

(19)参见孟凡骞、周伟龙:《网络复合式刷单诈骗心理控制的形成及阻断》,《湖北警官学院学报》2023年第1期。

(20)参见向静、刘亚岚:《“杀猪盘”电信诈骗犯罪的心理控制机制剖析》,《中国人民公安大学学报(社会科学版》2021年第4期。

(21)参见赵展:《被害人心理视角下电信网络诈骗犯罪防控》,《辽宁警察学院学报》2024年第5期。

(22)参见宋平、王佳:《电信网络诈骗被害人被劝阻时心理特点及劝阻策略》,《中国刑事警察》2022年第4期。

(23)参见赵悦、蒋丽华、张汪:《电信网络诈骗劝阻困境及应对策略》,《公安研究》2024年第5期。

(24)参见谢玲:《电信网络诈骗反“洗脑”研究》,《中国刑警学院学报》2023年第1期。

(25)参见王君贤、张浩:《电信网络诈骗犯罪预警劝阻的现实意义问题检视及发展路径》,《云南警官学院学报》2023年第4期。

(26)See Gabriele S&Filippo A.A Few Misunderstandings about Reciprocal Altruism.Communicative & Integrative Biology,2010(3).

(27)See Roderick J.Commentary on“Working Onsumers:Co-Creation of Brand Identity,Consumer Identity,and Brand Cmmunity Identity”.Journal of Business Research,2017(70).

(28)See Fock H,Chan AKK,Yan DF.Member-Organization Connection Impacts in Affinity Marketing.Journal of Business Research,2011,64(7).

(29)See Asseraf Y&Shoham A.Destination Branding:The Role of Consumer Affinity.Journal of Destination Marketing & Management,2017,6(4).

(30)See Coker,B.Arousal Enhances Herding Tendencies When Decision Making.Journal of Consumer Behaviour,2020,19(3).

(31)See Pham M,Vo N K T&Tran S S T.How Does Herd Behaviour Impact the Purchase Intention?Explore the Moderating Effect of Risk Aversion in the Context of Vietnamese Consumers.Acta Psychologica,2023(241).

(32)See Oostrom J K,K?bis N C&Ronay R.False Consensus in Situationl Judgment Tests:What Would Others Do?Journal of Research in Personality,2017(71).

(33)See Edward C&Myrna W.Own Experience Bias in Evaluating the Efforts of Others.Journal of Economic Behavior & Organization,2020(173).

(34)See Bartonicek A&Colombo M.Claw-in-the-Door:Pigeons,Like Humans,Display the Foot-in-the-Door Effect.Animal Cognition,2020,23(5).

(35)See Geboers H&Depaire B.A Rational Risk Policy?Why Path Dependence Matters.Entropy(Basel).2023,25(2):202:2-19.

(36)See Jakimowicz A.Path Dependence in Neoclassical Economic Growth Theory.Acta Physicapolonicaa.2015,(127):86-94.

(37)See Abigail A,Scholer J F M&Tory H.Should We Approach Approach and Avoid Avoidance?An Inquiry from Different Levels.Psychological Inquiry,2019,30(3):111-124.

(38)See Klein J&McColl G.Cognitive Dissonance:How Self-Protective Distortions Can Undermine Clinical Judgement.Medical Education,2019,53(12).

(39)See Chung S H&Cheng K C.How Does Cognitive Dissonance Influence the Sunk Cost Effect?Psychology Research and Behavior Management,2018(11).

基本信息:

中图分类号:D918;D924.35

引用信息:

[1]向静,陈露.“刷单类”心理操纵机制与反制劝阻话术应用[J].浙江警察学院学报,2025,No.211(05):84-98.

基金信息:

重庆市科学技术局2022年度技术创新与应用发展重点项目“电信网络诈骗犯罪侦防关键技术研究”(CSTB2022TIAD-KPX0107); 重庆市新型犯罪研究中心研究项目“新型电信网络诈骗心理操纵模式与预防研究”(24XXFZX10)

检 索 高级检索

引用

GB/T 7714-2015 格式引文
MLA格式引文
APA格式引文