| With the rapid development of information technology,we are now entering a more developed ubiquitous network society and in a more intense social transformation stage.The development of information technology not only brings convenience,but also provides an important basis for the implementation of telecom fraud.Telecommunication fraud refers to the crime of fabricating false information through telephone,internet and SMS,setting up a fraud,and implementing remote and non-contact fraud against the victim,to induce the victim to make money or transfer money to himself.In the current era,this kind of fraud phenomenon is very prominent.Its core is that even if it is only based on the interaction in the virtual space,the fraudster has successfully obtained the network trust of the victim in a relatively short time,and the forms of these interactions are widely rich,constantly updated,and closely related to real life.There are few studies on how to form trust in the context of telecom fraud.Therefore,it is of practical significance to explore the formation logic of trust relationship in telecommunications fraud,to improve people’s understanding and judgment of the phenomenon of telecommunications fraud,reduce the incidence of telecommunications fraud,and reduce the loss of the public,and provide some inspiration for the effective governance of the network society,as well as to enrich the relevant research of network trust to a certain extent.Based on this,this paper,on the basis of existing research and referring to the theoretical framework of existing trust research,adopts qualitative research methods,combined with snowball and purposive sampling methods,and selects 15 typical fraudsters of telecommunications fraud cases to conduct in-depth interviews.The study found that the overall formation logic of the trust relationship gradually emerged in the tracing of the specific formation stage and formation mechanism of the trust relationship in the context of telecommunications fraud.The dependence mechanism seen from the perspective of trust subject and the risk mechanism seen from the perspective of trust external environment greatly affect the formation of the deceptive party’s preset trust;From the perspective of trust object,the fraudster who invokes credibility features,as an important intermediary’s technical system,contributes to the formation of initial trust through four specific mechanisms,namely,the construction of false identity and the playing of specific roles,as well as the construction of network communication and the efficient acquisition of information.At the same time,from the perspective of the external environment of trust,the integration mechanism of traditional culture and modern culture,the coexistence mechanism of division of labor,cooperation and isolation response also shape the initial trust.At this time,the formation of initial trust is manifested as positive feedback to the fraudster and the information it sends.The types of trust formed are cognitive trust and inertia trust.The fraudsters who continue to implement policies,then use two mechanisms,namely immediate positive feedback and inertia response,and the fraudsters who use the coordination cognitive mechanism to persuade themselves,affect the development of sustainable trust.At this point,sustained trust is formed as the scammed party participates in activities organised by the scammer or responds to their calls with greater frequency and intensity,and the types of sustained trust are mainly intellectual trust,emotional trust or a combination of the two.Ultimately,the consistency of the fraudster is difficult to maintain,the persona collapses,the trust of the defrauded party breaks down,and the cost of trust increases significantly thereafter,which in turn will play a role in their future online social interactions.This study reveals the profound connotation of trust relationship in the context of telecommunications fraud.At its superficial level,it is only the trust of the deceived party in the fraudster,but in reality,it also contains a wider range of factors such as the fraudster’s trust in the technical system,the legal system,the fraudster’s impersonation and performance,or the trust in existing relationships.It is precisely based on them that the deceived party’s technological trust,institutional trust,and relational trust towards the outside world are stimulated,ultimately forming trust towards the fraudster.This reflects the significant intermediary,technical,and comprehensive characteristics of trust between them. |