Skip to main content
Log in

How Could You be so Gullible? Scams and Over-Trust in Organizations

  • Original Paper
  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

Trust is a key ingredient of business activities. Scams are spectacular betrayals of trust. When the victim is a powerful organization that does not look vulnerable at first sight, we can suspect that this organization has developed an excessive trust, or over-trust. In this article, we take over-trust as the result of the intentional production of gullibility by the scammer. The analysis of a historically famous scam case, the Elf “Great Sniffer Hoax,” suggests that the victim is made gullible by the scammer through a range of seduction and protection maneuvers that prevent the victim from developing doubts and suspicions. An integrated framework of the production of gullibility in organizations is proposed in order to further our understanding of over-trust. We discuss how these insights might be extended, beyond the case of scams, to more ordinary contexts of business activities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Akerlof, G. A., & Shiller, R. J. (2015). Phishing for phools: The economics of manipulation and deception. Princeton and Oxford: Princeton University Press.

    Book  Google Scholar 

  • Audi, R. (2008). Some dimensions of trust in business practices: From financial and product representation to licensure and voting. Journal of Business Ethics, 80(1), 97–102.

    Article  Google Scholar 

  • Barton, M. A., & Sutcliffe, K. M. (2009). Overcoming dysfunctional momentum: Organizational safety as a social achievement. Human Relations, 62(9), 1327–1356.

    Article  Google Scholar 

  • Beech, N., & Sims, D. (2007). Narrative methods for identity research. In A. Pullen, N. Beech & D. Sims (Eds.), Exploring identity—concepts and methods (pp. 288–301). New York, NY: Palgrave MacMillan.

    Google Scholar 

  • Bell, G. G., Oppenheimer, R. J., & Bastien, A. (2002). Trust deterioration in an international buyer-supplier relationship. Journal of Business Ethics, 36(1), 65–78.

    Article  Google Scholar 

  • Bennett, J. R. (1983). Corporate sponsored image films. Journal of Business Ethics, 2(1), 35–41.

    Article  Google Scholar 

  • Bews, N. F., & Rossouw, G. J. (2002). A role for business ethics in facilitating trustworthiness. Journal of Business Ethics, 39(4), 377–390.

    Article  Google Scholar 

  • Blumenfeld, W. S., & Leveto, G. A. (1975). Gullibility’s travels. Academy of Management Journal, 18(2), 370–374.

    Google Scholar 

  • Brien, A. (1998). Professional ethics and the culture of trust. Journal of Business Ethics, 17(4), 391–409.

    Article  Google Scholar 

  • Burgard, A., & Schlembach, C. (2013). Frames of fraud: A qualitative analysis of the structure and process of victimization on the Internet. International Journal of Cyber Criminology, 7(2), 112–124.

    Google Scholar 

  • Carmona, S., Donoso, R., & Reckers, P. M. (2013). Timing in accountability and trust relationships. Journal of Business Ethics, 112(3), 481–495.

    Article  Google Scholar 

  • Castaldo, S., Premazzi, K., & Zerbini, F. (2010). The meaning(s) of trust. A content analysis on the diverse conceptualizations of trust in scholarly research on business relationships. Journal of Business Ethics, 96(4), 657–668.

    Article  Google Scholar 

  • Clark, C., & Pinch, T. (1992). The anatomy of a deception: Fraud and finesse in the Mock Auction sales ‘con’. Qualitative Sociology, 15(2), 151–175.

    Article  Google Scholar 

  • Cohen, M. A., & Dienhart, J. (2013). Moral and amoral conceptions of trust, with an application in organizational ethics. Journal of Business Ethics, 112(1), 1–13.

    Article  Google Scholar 

  • Costas, J., & Grey, C. (2014). Bringing secrecy into the open: Towards a theorization of the social processes of organizational secrecy. Organization Studies, 35(10), 1423–1447.

    Article  Google Scholar 

  • Costas, J., & Grey, C. (2016). Secrecy at work. The hidden architecture of organizational life. Stanford, CA: Stanford University Press.

    Google Scholar 

  • Cowton, C. J. (1998). The use of secondary data in business ethics research. Journal of Business Ethics, 17(4), 423–434.

    Article  Google Scholar 

  • Deighton, J., & Grayson, K. (1995). Marketing and seduction: Building exchange relationships by managing social consensus. Journal of Consumer Research, 21(4), 660–676.

    Article  Google Scholar 

  • Deutsch, M. (1958). Trust and suspicion. Journal of Conflict Resolution, 2(4), 265–279.

    Article  Google Scholar 

  • Dutton, J. E., Ashford, S. J., O’Neill, R. M., & Lawrence, K. A. (2001). Moves that matter: Issue selling and organizational change. Academy of Management Journal, 44(4), 716–736.

    Google Scholar 

  • Eisenhardt, K. M., & Graebner, M. E. (2007). Theory building from cases: Opportunities and challenges. Academy of Management Journal, 50(1), 25–32.

    Article  Google Scholar 

  • Elangovan, A. R., & Shapiro, D. L. (1998). Betrayal of trust in organizations. Academy of Management Review, 23(3), 547–566.

    Article  Google Scholar 

  • Eriksson, P., & Kovalainen, A. (2008). Qualitative methods in business research. Thousand Oaks, CA: Sage.

    Book  Google Scholar 

  • Friedman, M. (1992). Confidence swindles of older consumers. Journal of Consumer Affairs, 26(1), 20–46.

    Article  Google Scholar 

  • Fryxell, G. E., Dooley, R. S., & Vryza, M. (2002). After the ink dries: The interaction of trust and control in US-based international joint ventures. Journal of Management Studies, 39(6), 865–886.

    Article  Google Scholar 

  • Fulmer, C. A., & Gelfand, M. J. (2012). At what level (and in whom) we trust: Trust across multiple organizational levels. Journal of Management, 38(4), 1167–1230.

    Article  Google Scholar 

  • Gargiulo, M., & Ertug, G. (2006). The dark side of trust. In R. Bachmann & A. Zaheer (Eds.), Handbook of trust research (pp. 165–186). Northampton, MA: Edward Elgar.

    Google Scholar 

  • Gibson, D. R. (2014). Enduring illusions. The social organization of secrecy and deception. Sociological Theory, 32(4), 283–306.

    Article  Google Scholar 

  • Goel, S., Bell, G. G., & Pierce, J. L. (2005). The perils of Pollyanna: Development of the over-trust construct. Journal of Business Ethics, 58(1–3), 203–218.

    Article  Google Scholar 

  • Goel, S., & Karri, R. (2006). Entrepreneurs, effectual logic, and over-trust. Entrepreneurship Theory and Practice, 30(4), 477–493.

    Article  Google Scholar 

  • Goffman, E. (1974). Frame analysis: An essay on the organization of experience. New York, NY: Harper and Row.

    Google Scholar 

  • Greenspan, S. (2008). Annals of gullibility. Why we get duped and how to avoid it. Connecticut: Praeger.

    Google Scholar 

  • Greenspan, S. (2009). Why we continue to fall for these financial scams. The Wall Street Journal reprinted in the Australian Wealth, February 11, 9–12.

  • Greenwood, M., & Van Buren, H. J. (2010). Trust and stakeholder theory: Trustworthiness in the organization-stakeholder relationship. Journal of Business Ethics, 95(3), 425–438.

    Article  Google Scholar 

  • Hosmer, L. T. (1995). Trust: The connecting link between organizational theory and philosophical ethics. Academy of Management Review, 20(2), 379–403.

    Article  Google Scholar 

  • Howard-Grenville, J. A. (2007). Developing issue-selling effectiveness over time: Issue selling as resourcing. Organization Science, 18(4), 560–577.

    Article  Google Scholar 

  • Inderst, R., & Ottaviani, M. (2013). Sales talk, cancellation terms and the role of consumer protection. Review of Economic Studies, 80(3), 1002–1026.

    Article  Google Scholar 

  • Ingenhoff, D., & Sommer, K. (2010). Trust in companies and in CEOs: A comparative study of the main influence. Journal of Business Ethics, 95(3), 339–355.

    Article  Google Scholar 

  • Ireland, R. D., Hitt, M. A., & Vaidyanath, D. (2002). Alliance management as a source of competitive advantage. Journal of Management, 28(3), 413–446.

    Article  Google Scholar 

  • Irlenbusch, B., & Ter Meer, J. (2013). Fooling the nice guys: Explaining receiver credulity in a public good game with lying and punishment. Journal of Economic Behavior and Organization, 93, 321–327.

    Article  Google Scholar 

  • Jaswal, V. K. (2010). Believing what you’re told: Young children’s trust in unexpected testimony about the physical world. Cognitive Psychology, 61(3), 248–272.

    Article  Google Scholar 

  • Jones, W., & Burdette, M. P. (1994). Betrayal in relationships. In A. Weber & J. Harvey (Eds.), Perspectives on close relationships (pp. 243–262). Boston: Allyn and Bacon.

    Google Scholar 

  • Kimmel, A. J., & Audrain-Pontevia, A. F. (2010). Analysis of commercial rumors from the perspective of marketing managers: Rumor prevalence, effects, and control tactics. Journal of Marketing Communications, 16(4), 239–253.

    Article  Google Scholar 

  • Kramer, R. M. (1999). Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual Review of Psychology, 50(1), 569–598.

    Article  Google Scholar 

  • Kujala, J., Lehtimäki, H., & Pučėtaitė, R. (2016). Trust and distrust constructing unity and fragmentation of organisational culture. Journal of Business Ethics, 139(4), 701–716.

    Article  Google Scholar 

  • Langenderfer, J., & Shimp, T. A. (2001). Consumer vulnerability to scams, swindles, and fraud: A new theory of visceral influences on persuasion. Psychology & Marketing, 18(7), 763–783.

    Article  Google Scholar 

  • Langfred, C. W. (2004). Too much of a good thing? Negative effects of high trust and individual autonomy in self-managing teams. Academy of Management Journal, 47(3), 385–399.

    Google Scholar 

  • Lascoumes, P. (1999). Au nom du progrès et de la nation: les «avions renifleurs». La science entre l’escroquerie et le secret d’Etat. Politix, 12(48), 129–155.

    Article  Google Scholar 

  • Lascoumes, P. (1997). Élites irrégulières: essai sur la délinquance d’affaires. Paris, Gallimard, (chapitres 2 et 4).

    Google Scholar 

  • Lee, J., & Soberon-Ferrer, H. (1997). Consumer vulnerability to fraud: Influencing factors. Journal of Consumer Affairs, 31(1), 70–89.

    Article  Google Scholar 

  • Leff, A. A. (1976). Swindling and selling. New York, NY: Free Press.

    Google Scholar 

  • Lehtimäki, H., & Karintaus, K. (2013a). The social embeddedness of strategy implementation. South Asian Journal of Business and Management Cases, 2(2), 229–239.

    Article  Google Scholar 

  • Lehtimäki, H., & Karintaus, K. (2013b). Building organizational advantage: Social capital in multinational enterprises. Competitiveness Review: An International Business Journal, 23(4/5), 314–330.

    Article  Google Scholar 

  • Lewis, M. K. (2012). New dogs, old tricks. Why do Ponzi schemes succeed? Accounting Forum, 36(4), 294–309.

    Article  Google Scholar 

  • Maguire, S., & Phillips, N. (2008). ‘Citibankers’ at Citigroup: A study of the loss of institutional trust after a merger. Journal of Management Studies, 45(2), 372–401.

    Article  Google Scholar 

  • Maitlis, S., & Lawrence, T. B. (2007). Triggers and enablers of sensegiving in organizations. Academy of Management Journal, 50(1), 57–84.

    Article  Google Scholar 

  • Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.

    Article  Google Scholar 

  • Mayer, R. N., Scammon, D. L., & Zick, C. D. (1993). Poisoning the well: Do environmental claims strain consumer credulity? Advances in Consumer Research, 20, 698–703.

    Google Scholar 

  • McAllister, D. J. (1995). Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations. Academy of Management Journal, 38(1), 24–59.

    Google Scholar 

  • Michalos, A. C. (2003). The impact of trust on business, international security and the quality of life. In Essays on the quality of life. Social indicators research series (Vol. 19). Dordrecht: Springer.

    Chapter  Google Scholar 

  • Molina-Morales, F. X., Martínez-Fernández, M. T., & Torlò, V. J. (2011). The dark side of trust: The benefits, costs and optimal levels of trust for innovation performance. Long Range Planning, 44(2), 118–133.

    Article  Google Scholar 

  • Möllering, G. (2006). Trust: Reason, routine, reflexivity. Amsterdam: Elsevier.

    Google Scholar 

  • Möllering, G. (2013). Process views of trusting and crises. In R. Bachmann and A. Zaheer (Eds.), Handbook of advances in trust research (pp. 285–305). Cheltenham: Edward Elgar.

    Google Scholar 

  • Nooteboom, B. (2002). Trust: Forms, foundations, functions, failures and figures. Cheltenham: Edward Elgar.

    Book  Google Scholar 

  • Ocasio, W. (1997). Towards an attention-based view of the firm. Strategic Management Journal, 18, 187–206.

    Article  Google Scholar 

  • Olekalns, M., Kulik, C. T., & Chew, L. (2014). Sweet little lies: Social context and the use of deception in negotiation. Journal of Business Ethics, 120(1), 13–26.

    Article  Google Scholar 

  • Patzelt, H., & Shepherd, D. A. (2008). The decision to persist with underperforming alliances: The role of trust and control. Journal of Management Studies, 45(7), 1217–1243.

    Article  Google Scholar 

  • Péan, P. (1984). V… Enquête sur l’affaire des «avions renifleurs». Paris: Fayard.

    Google Scholar 

  • Pentland, B. T. (1999). Building process theory with narrative: From description to explanation. Academy of Management Review, 24(4), 711–724.

    Article  Google Scholar 

  • Pinsker, D. M., McFarland, K., & Pachana, N. A. (2010). Exploitation in older adults: Social vulnerability and personal competence factors. Journal of Applied Gerontology, 29(6), 740–761.

    Article  Google Scholar 

  • Reuter, Y. (1997). L’analyse du récit. Paris: Dunod.

    Google Scholar 

  • Rosanas, J. M., & Velilla, M. (2003). Loyalty and trust as the ethical bases of organizations. Journal of Business Ethics, 44(1), 49–59.

    Article  Google Scholar 

  • Rossiter, J. R. (1979). Does TV advertising affect children? Journal of Advertising Research, 19(1), 49–53.

    Google Scholar 

  • Rotter, J. B. (1980). Interpersonal trust, trustworthiness, and gullibility. American Psychologist, 35(1), 1.

    Article  Google Scholar 

  • Rouleau, L. (2005). Micro-practices of strategic sensemaking and sensegiving: How middle managers interpret and sell change every day. Journal of Management Studies, 42(7), 1413–1441.

    Article  Google Scholar 

  • Rouleau, L., & Balogun, J. (2011). Middle managers, strategic sensemaking, and discursive competence. Journal of Management Studies, 48(5), 953–983.

    Article  Google Scholar 

  • Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393–404.

    Article  Google Scholar 

  • Schaper, M. T., & Weber, P. (2012). Understanding small business scams. Journal of Enterprising Culture, 20(3), 333–356.

    Article  Google Scholar 

  • Shapiro, S. P. (1987). The social control of impersonal trust. American Journal of Sociology, 93(3), 623–658.

    Article  Google Scholar 

  • Siggelkow, N. (2007). Persuasion with case studies. The Academy of Management Journal, 50(1), 20–24.

    Article  Google Scholar 

  • Silverman, D. (2006). Interpreting qualitative data (3rd edn.). London: Sage.

    Google Scholar 

  • Skinner, D., Dietz, G., & Weibel, A. (2014). The dark side of trust: When trust becomes a ‘poisoned chalice’. Organization, 21(2), 206–224.

    Article  Google Scholar 

  • Small, B., & Mallon, M. (2007). Science, society, ethics, and trust: Scientists’ reflections on the commercialization and democratization of science. International Studies of Management and Organization, 37(1), 103–124.

    Article  Google Scholar 

  • Sonenshein, S. (2006). Crafting social issues at work. Academy of Management Journal, 49(6), 1158–1172.

    Article  Google Scholar 

  • Stagner, R. (1958). The gullibility of personnel managers. Personnel Psychology, 11(3), 347–352.

    Article  Google Scholar 

  • Stahl, G. K., & Sitkin, S. B. (2005). Trust in mergers and acquisitions. In M. E. Mendenhall (Ed.), Mergers and acquisitions: Managing culture and human resources (pp. 82–102). Stanford, CA: Stanford University Press.

    Google Scholar 

  • Stolowy, H., Messner, M., Jeanjean, T., & Baker, C. R. (2014). The construction of a trustworthy investment opportunity: Insights from the Madoff Fraud. Contemporary Accounting Research, 31(2), 354–397.

    Article  Google Scholar 

  • Swift, T. (2001). Trust, reputation and corporate accountability to stakeholders. Business Ethics: A European Review, 10(1), 16–26.

    Article  Google Scholar 

  • Teoh, S. H., & Wong, T. J. (2002). Why new issues and high-accrual firms underperform: The role of analysts’ credulity. The Review of Financial Studies, 15(3), 869–900.

    Article  Google Scholar 

  • Thorgren, S., & Wincent, J. (2011). Interorganizational trust: Origins, dysfunctions and regulation of rigidities. British Journal of Management, 22(1), 21–41.

    Article  Google Scholar 

  • Volery, T., & Mansik, S. (1998). The role of trust in creating effective alliances: A managerial perspective. Journal of Business Ethics, 17(9), 987–994.

    Article  Google Scholar 

  • Weick, K. E. (1988). Enacted sensemaking in crisis situations. Journal of management studies, 25(4), 305–317.

    Article  Google Scholar 

  • Weick, K. E. (2007). The generative properties of richness. Academy of Management Journal, 50(1), 14–19.

    Article  Google Scholar 

  • Zahra, S. A., Yavuz, R. I., & Ucbasaran, D. (2006). How much do you trust me? The dark side of relational trust in new business creation in established companies. Entrepreneurship Theory and Practice, 30(4), 541–559.

    Article  Google Scholar 

  • Zhong, W., Su, C., Peng, J., & Yang, Z. (2017). Trust in interorganizational relationships: A meta-analytic integration. Journal of Management, 43(4), 1050–1075.

    Article  Google Scholar 

Download references

Funding

No funding was used for this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hervé Laroche.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

No informed consent was needed for this research.

Appendices

Appendix 1

See Table 3.

Table 3 Summary of the data collected

Appendix 2: Chronology of the “Great Oil Sniffer Hoax” Affair (Adapted from Lascoumes 1999, pp. 133–134)

February 1976: an intermediary, Maître Violet, offers Elf-Aquitaine a process invented by a Belgian count, A. de Villegas, and an Italian engineer, A. Bonassoli. The “VDS process” allegedly allows the detection of substances like water, gas, oil, and some ores, up to several thousands of meters beneath the ground.

28 May 1976: a contract is signed in Zurich between Elf-Aquitaine and the Panamanian company FISALMA, which represents the interests of the inventors. Elf-Aquitaine has exclusive rights to the Delta and Omega processes for a 12-month period and pays 400 million francs.

June 1976: the first drilling operations are carried out. Sixteen Delta missions and fourteen Omega missions are launched.

February 1977: three drilling operations begin on specific sites spotted as promising, but turn out to be failures.

September 1977: a synthesis calls for caution about the device’s technology, but the conclusions remain optimistic.

24 June 1978: a new 500-million-franc contract is signed, setting the conditions for sharing and exploitation of the VDS process. Two commercial companies are created: one is Panamanian—IOMIC—and associated FISALMA and ERAP, and the other is French—SCIT—and aims at managing a laboratory in which researchers could work.

End of 1978: a report underlines problems with the functioning of the device and points out some contradictions.

October 1978–May 1979: three new more drilling operations begin. Results are also negative.

5 April 1979: a demonstration is organized in front of the persons in charge and the President of the Republic himself.

April–May 1979: Elf-Aquitaine seizes the device and asks for a significant amount of the funds received by FISALMA to be frozen. A mediator, A. Pinay, is appointed to determine the amount frozen.

24 May 1979: J. Horowitz, a physicist who does not belong to the company, organizes a basic experiment exposing the fraud.

22 July 1979: the association between Elf and FISALMA is dissolved. The majority of the funds released following the second 1978 contract are recovered. However, the funds related to the first contract and the internal subsidies given to ensure the follow-up of the inventors cannot be recovered.

1982: the administration serves notice to Elf-Aquitaine of a 547-million-franc tax reassessment for having exported funds in breach of exchange controls.

1983: P. Péan leaks the affair in the French journal Le Canard Enchaîné. A report written on this case by the Controller and Auditor General would seem to have disappeared. The affair is publicly exposed through a parliamentary question posed to the Secretary of State in charge of the Budget, who officially confirms what happened.

16 January 1984: the Ministry of Justice opens a legal investigation into fraud.

16 May 1984: a parliamentary inquiry committee is created.

15 November 1984: the report written by the committee is published.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Laroche, H., Steyer, V. & Théron, C. How Could You be so Gullible? Scams and Over-Trust in Organizations. J Bus Ethics 160, 641–656 (2019). https://doi.org/10.1007/s10551-018-3941-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-018-3941-z

Keywords

Navigation