This paper sets out with the aim of developing and improving upon existing taxonomies used in cybercrimeCybercrime Cybercrime is a crime related to technology, computers, and the Internet. Typical cybercrime are performed by a computer against a computer, or by a hacker using software to attack computers or networks. scholarship.
Listed in prevalence of cybercrime perpetrators, Nigeria, the UK and the USA (in ascending order of significance) are on top of the ‘league table’ (ICCC, 2006, ICCC, 2008, ICCC, 2009, ICCC, 2010). Considering Nigeria as an exemplary social context – representing the Sub-Saharan world region – this article will emphasize the need to incorporate social and contextual factors into the classification schemas. Whilst the establishing of the particularities of cybercrime in Nigeria will concomitantly suggest problems with prevailing taxonomies of cybercrime, it will also render problematic, the basis for ICCC, 2006, ICCC, 2008, ICCC, 2009, ICCC, 2010 claim on the prevalence of cybercrime perpetrators.
Whilst cybercrime primarily operates in the realm of cyberspace, terrestrial crimes operate in physical spaces (Manjikian, 2010). Seeking to summarise and encapsulate various conceptualizations within cybercrime literature, Yazdanifard et al. (2011) defined ‘cybercrime’ as ‘any type of intentional criminalCriminal A criminal is any person who through a decision or act engages in a crime. This can be complicated, as many people break laws unknowingly, however, in our context, it is a person who makes a decision to engage in unlawful acts or to place themselves with others who do this. A criminal always has the ability to decide not to break the law, or if they initially engage in crime to stop doing it, but instead continues. scheme that is computer or/and internet-mediated’. However, whilst such a description describes a wide spectrum of cybercrime, it fails to account for the dual model of criminal schemes within 1cyberspace. Ogwezzy (2012, p.91) elaborated that the term ‘cybercrime’ implies “offenses committed through the use of the computer in contrast to ‘computer crime’ which refers to offenses against the computer and data or program therein”. Whilst the computer and its content are the primary targets in computer crimes, the meaning of cybercrime is wrapped around the use of a computer or/and the Internet to commit age-old crimes (Ogwezzy, 2012, McGuire and Dowling, 2013).
Conceptions of ‘computer crime’ and ‘cybercrime’ interpenetrate one another; their entities are intertwined and therefore difficult to disentangle. The intertwining of computer crime and cybercrime further challenges the simplistic rendering of cyberspace and physical space as two different entities with easily defined boundaries. Regarding ‘cybercrime’, there are over 30 types identified in existing literature, since cyberspace-crime linkage was first constructed in cyberpunk stories (Wall, 2008). Most of them are listed in Table 1 below. These numerous variances are implicated in obscuring the effective conceptualization of ‘cybercrime’. Yet, whilst the existing dichotomized categories (Gordon and Ford, 2006, McGuire and Dowling, 2013) adhere to the basic psychological principle of categorization (Rosch, 1978), they fail to acknowledge the roles of motivations in offending. Relatedly, when the existing motivational categories (Chawki et al., 2015a, Wall, 2013) do consider the motivational element of offending, they take for granted the basic psychological principle of categorization. Insights from Rosch’s (1978, p.28) general and basic principles for the formation of categories stipulate that:
“the task of category systems is to provide maximum information with the least cognitive effort [and] the perceived world comes as structured information rather than as arbitrary attributes. Thus maximum information with least cognitive effort is achieved if categories map the perceived world structure as closely as possible. This condition can be achieved either by the mapping of categories to given attribute structures or by the definition or redefinition of attributes to render a given set of categories appropriately structured”.
Table 1. Tripartite cybercrime framework (TCF).
|Socioeconomic cybercrime||Psychosocial cybercrime||Geopolitical cybercrime|
|*Hackers and crackers||*Hackers and crackers||*Hackers -‘Hacktivist’|
|Cyber fraudFraud In law, fraud is intentional deception to secure unfair or unlawful gain (money or other assets), or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensation) or criminal law (e.g., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities), or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong. The purpose of fraud may be monetary gain or other benefits, for example by obtaining a passport, travel document, or driver's license, or mortgage fraud, where the perpetrator may attempt to qualify for a mortgage by way of false statements. A fraud can also be a hoax, which is a distinct concept that involves deliberate deception without the intention of gain or of materially damaging or depriving a victim.||Child pornography||Cyberspies|
|Cyber embezzlement||Cyberstalking||Cyber espionage|
|Cyber piracy||CyberbullyingCyberbullying Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyber harassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital universe has expanded and technology has advanced. Cyberbullying is when someone bullies or harasses others on the internet and other digital spaces, particularly on social media sites. Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims' personal information (Doxing), or pejorative labels (i.e. hate speech). Bullying or harassment can be identified by repeated behavior and an intent to emotional harm. Victims of cyberbullying may experience lower self-esteem, increased suicidal ideation, and various negative emotional responses, including being scared, frustrated, angry, depressed, or PTSD.||***Cyber terrorism|
|Cyber blackmail||Revenge porn||Cyber Vandalism|
|Romance scamScam A Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost.||Cyber rape||Cyber assault|
|Online drug trafficking||*Cyberhate speech||*Cyberhate speech|
|Cyber prostitution||*Cyber extortion||Cyber riot|
|*Cyber extortion||Obscenity||Cyber sabotage|
|Illegal online gambling||*Cyber-prostitution||Cyber-colonialism|
|*Cyber Trespass||*Cyber Trespass||Cyber rebellion|
|***Cyber terrorism||*Cyber homicide|
*Where the type of cybercrime appears in more than one column.
***Where the type of cybercrime appears in more than two columns.
In line with motivational theories framed within the basic psychological framework of categorization, this current endeavor will, firstly, aim not only to complement the existing categories but also offer a more conceptually robust framework for grouping cybercrime. The implication being that whilst cybercrimesCybercrimes Cybercrime is a crime related to technology, computers, and the Internet. Typical cybercrime are performed by a computer against a computer, or by a hacker using software to attack computers or networks. constitute a global problem, recognizing the limits of a ‘one size fits all’ binary of taxonomies is of utmost importance. Secondly, Nigeria will be presented as an exemplary cultural context to illustrate certain aspects of these limitations (binary model) and the importance of social/contextual factors in the classification schemas. Through the precise delineation of the particularities of cybercrime in Nigeria, this article aims to determine the extent to which this exemplar problematizes or contradicts prevailing taxonomies of cybercrime. At its core, this paper has three research questions, which it will aim to answer: firstly, how useful are the existing cybercrime taxonomies in making sense of social and contextual factors (such as the category of cybercrimes that the Nigerian cybercriminals exclusively commit)? Secondly, since ‘cybercrime’ is a globalized phenomenon, how is the Nigerian case – representing the Sub-Saharan region, any different from Western regions? Thirdly, what exactly is ‘cybercrime’ in a Nigerian context?
2. A Dual Model Of Cybercrime
The word ‘cybercrime’ comprises a wide range of online crimes. For McGuire and Dowling (2013, p.5), “[C]yber-dependent crimes are offenses that can only be committed by using a computer, computer networks or other forms of ICT [Information and Communications Technology]” such as creation or/and distribution of malwareMalware Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts./viruses. On the other hand, cyber-enabled crimesCyber-enabled Crimes A Cyber-enabled crime is one where technology facilitates a criminal to commit a crime against an individual or a business. These are where there is a one to one relationship between the criminal and the victim. Romance scams, email fraud, and many other types of scams are considered cyber-enabled crimes. The technology used can be the Internet, a computer, a phone, or other devices. “can still be committed without the use of ICT″ such as cyber fraud. These dual categories are illustrated in Fig. 1. Unlike traditional crimes however, one criminal scheme in the realm of cyberspace may involve multiple nations and actors and even impact on multiple nations simultaneously (Yazdanifard et al., 2011). Thus whilst traditional crime tends to be regarded locally, cybercrime is usually considered on a global scale (Yar and Jewkes, 2010). For example, if a person in Russia creates computer ‘viruses/malware’ while another person in Nigeria rents it to send credit scam e-mails and a third party in the USA transfers funds using the illegally acquired data, (Wall, 2013), all three individuals are implicated in different strands of cybercrime. Whilst all three actors are motivated by monetary benefits, they are in fact involved in cyberspace in varying degrees. The virusVirus A computer program that can replicate itself and spread from computer to computer or file to file. It comes to life only when you take a specific action, such as running a particular program./malware creator has committed a cyber-dependent offense, whereas the other two have committed cyber-enabled offenses. This existing traffic between cyber-enabled and cyber-dependent categories clearly illustrates the complexity of cybercrime and how one criminal act can impact on multiple nations and involve various networks of actors simultaneously.
Closely related to cyber-enabled and cyber-dependent categories are ‘techno-centric (type I) and people-centric (type II) subsets’. Gordon and Ford (2006, p.15) specifically posited that techno-centric and people-centric cybercrime is at the opposite ends of a continuum; dichotomizing cybercrime based on the strength of the cyber-element versus people-component of the criminal act in question. They distinguished Type I (techno-centric) crimes such as e-commerce fraud, cyber-vandalism, data manipulations through hacking, phishing, from Type II (people-centric) crimes such as cyber fraud, cyberbullying, and cyber-stalking as illustrated in Fig. 1. The latter being less technologically oriented than the former and therefore grounded in perpetrator-victim interactions. These binary models (people-centric and techno-centric; cyber-enabled and cyber-dependent), anchoring on a basic psychological principle of categorization, have no doubt offered a useful tool in looking at voluminous cybercrime variances.
However, motivational elements are not configured in the properties of these binary typologies. As a result, they are ill-equipped to differentiate between the psychological-motivated cybercrimes such as cyberstalking and cyberbullying from financially motivated ones such as cyber fraud and cyber embezzlement. Simply put, they have taken for granted the motivational lens of looking at cybercrime, which renders them unable to answer a simple question: how exactly is a digital crime that is primarily geared towards defrauding a person or a group of persons, different to another online scheme intended to fundamentally disrupt a person’s psychological state of mind? It is essential to isolate the primary motive behind cybercrimes in the meaning-making of what any particular cybercrime is in a given context, as illustrated in Table 2 below.
Table 2. Perpetrators’ benefits and victims’ losses.
|Perpetrator (primary benefits)||Economic gain||Psychological gain||Geopolitical, economic & psychological losses|
|Victim (primary loss)||Economic loss||Psychological distress||Geopolitical, economic & psychological losses|
|Perpetrators (secondary benefits)||Both economic & psychological gains||Psychological gain||Geopolitical, economic & psychological gains|
|Victim (secondary loss)||Both economic & psychological losses||Both economic & psychological losses||Geopolitical, economic & psychological losses|
It is reasonable therefore to argue for grouping cybercrimes according to criminals’ motivations. This could and would sharpen the distinction between cybercrimes that are rooted in financial gains such as cyber fraud, and psychologically motivated cybercrimes such as cyberstalking. However, conceptually, the above binary models appear to be ‘explanatory-tools’, which cannot capture the differences between cybercrimes primarily driven by financial rewards and cybercrimes fundamentally propelled by psychological benefits as shown in Table 2. Based on these rationales, it is reasonable to complement these models – ‘techno-centric and people-centric (Gordon and Ford, 2006) and cyber-enabled crimeCyber-enabled Crime A Cyber-enabled crime is one where technology facilitates a criminal to commit a crime against an individual or a business. These are where there is a one to one relationship between the criminal and the victim. Romance scams, email fraud, and many other types of scams are considered cyber-enabled crimes. The technology used can be the Internet, a computer, a phone, or other devices. and cyber-dependent (McGuire and Dowling, 2013). That said, the existing motivational categories, despite usefulness in acknowledging the motivational element of cybercrime, have their limitations too.
3. Some Existing Motivational Taxonomies
In endorsing motivational categories, Chawki et al. (2015a, p.16–17) argued that it is crucial to understand a person’s profile in the case of a particular cybercrime. Particular educational attainment, occupation, and childhood experiences, he argued, help shed light on the individual implicated in any cybercrime. As Chawki et al. (2015a) further postulated that cybercriminals can be categorized as: [a] children and adolescents [b] organized hackers [c] professional hackers [d] discontent employees. Whilst Chawki et al.’s (2015a) categories tell us about different levels of sophistication involved in offending (e.g., professional hackers and organized hackers), they also reveal the extent to which cybercriminals could be age-graded.
However, cross-cultural insights from young offenders have pointed out that age is not lived similarly across cultures and age-related behaviors are constituted differently across cultures (Cain, 2000, Brathwaite, 1996). For example, in line with Tade and Aliyu’s (2011) sociological work in Nigeria and Armstrong’s (2011) anthropological analysis in Ghana, most ‘young people’ in Nigerian and Ghanaian universities involved in cybercrime, in general, are involved in cyber fraud in particular. In contrast, studies on Canadian undergraduates (Cunningham et al., 2014, Faucher et al., 2014) university students in the USA (Lindsay and Krysik, 2012) ‘young people’ in Finland (Oksanen and Keipi, 2013) and higher education students in Britain (Benson et al., 2015, Boulton et al., 2012) suggest that young people in Canada, Finland, the USA, and Britain – the Western world region, are more involved in psychological-oriented cybercrime such as cyberbullying and cyber harassment than cyber-fraud. The key point is that “young people” as a category is insensitive to the differentiation between ‘what is true of all societies’ and ‘what is true of one society at one point in time and space’ (Nelken, 2010). Another limitation is that Chawki et al.’s (2015a) taxonomy does not adhere to the basic principles of categorization.
In a similar vein, Wall 2007 (2013, p.62–65) proposed seven different motivational subsets, based on: self-satisfaction; the need for peer respect; to impress potential employers; criminal gain, or commercial advantage; revenge; distance from the victim; politically motivated protest. These motivational signposts help to illustrate that the specific motivations behind cybercrime are diverse. An equally important issue is that the seven subsets for cyber offenders, as revealed by their titles, shed more light on the drives, the ‘push and pull factors’ of cybercriminals to cybercrime (Wall, 2013). The value of this grouping is most evident in the ‘criminal gain or commercial advantage’, and ‘politically motivated’ categories. For example, whilst some types of cybercrime such as cyber extortion, cyber fraud, and cyber embezzlement fit squarely under the canopy of the former, cyber espionage, cyber terrorism, cyber rebellion, can be located smoothly in the sphere of the latter.
There is, however, a primary limitation of this taxonomy, as aforementioned, in that it neglects the basic principle of categorization. Some of the proposed groups, such as ‘distance from the victim’, involve almost all types of cybercrime. Indeed, ‘distance from the victim’ is a specific aspect of most cybercrimes as Brown (2001) intimated in the analysis of cost-benefits and economics of criminal conduct. Similarly, ‘self-satisfaction’ – rooted in the utilitarian maximization principle – may be in the form of tangible things such as monetary reward or intangible ones such as psychological thrill. Either way, ‘self-satisfaction’ is integral to almost all types of cybercrime, and arguably does not seem to represent a specific category of cybercrimes.
In the same vein, ‘revenge’ as a category could be the driver of cyberstalking, cyber fraud, or hacking. Whilst ‘revenge’ may be a principal impetus behind this range of cybercrimes, it requires a lot of cognitive effort to see the ‘rope’ that binds them together as a distinct subset. ‘Thus maximum information with the least cognitive effort is only achievable if categories map the perceived world structure as closely as possible’ (Rosch, 1978, p.28). The crux is that existing motivational categories (Chawki et al., 2015a, Wall, 2013) have ignored a basic psychological principle of categorization (Rosch, 1978, p.28): ‘to simplify a complex set of data and increase information intake with the least cognitive effort’.
4. The Tripartite Cybercrime Framework (TCF)
In complementing the above taxonomies, this current endeavor anchors on the basic psychological principles of categorization alongside motivational insights to offer a 2tripartite-cybercrime-framework (TCF). An individual is said to be motivated when such an individual is moved, energized, or inspired to do something (Deci and Ryan, 2011, Deci and Ryan, 2000, Deci and Ryan, 1985). Motivation is orientation graded; it varies according to the underlying variable behind the actions in question. It can also vary in terms of the intensity of occurrence, i.e., whether a person is highly motivated or otherwise. Whilst the latter centers on the amount or size of the impetus behind the action, the former is concerned with the reason for the action. Arguably motivation can be conceptualized as the foundation of most crimes; it is reasonable therefore to offer a social/contextual basis for the categorizing of cybercrime. Self-Determination Theory (Deci and Ryan, 2011; 1985) specifically argues that motivational types – intrinsic and extrinsic, define the strength or intensity of motivation.
Motivation therefore can be schematized as a dual phenomenon; incorporating intrinsic and extrinsic motivations. This binary model is necessary for the precision of illustrations and the discussion that follows. Whilst extrinsic motivation is the doing of an activity solely to achieve a distinct result, intrinsic motivation is the demonstration of actions inherently for the mere satisfaction of doing them (Deci and Ryan, 2011; 1985). For example, a poet is more likely to write poems for the inherent satisfaction of such an activity rather than for the approval of his/her parents – intrinsic motivation; whereas a student is more likely to study hard for good grades and a better future – extrinsic motivation. The majority of activities are generally propelled by extrinsic motivation, i.e., people fundamentally motivated to do something due to the direct and expected consequence of their actions (Deci and Ryan, 2011; 1985).
However, as Kshetri (2006), in describing cybercriminals – hackers – emphasized, intrinsic motivation may have a superior impact compared to extrinsic motivation. This paper conceptualizes extrinsic and intrinsic motivations of cyber crimes as twin interlocking entities, which are difficult to disentangle, and, as Wehmeyer and Little (2009) note, extrinsically motivated behaviors can parallel intrinsically motivated activities if actors internalize their actions and experience flow in their activities. Nevertheless, Layous et al. (2013) pointed out that intrinsically motivated people are more likely to experience flow than those who are extrinsically motivated. Nakamura and Csikszentmihalyi (2002, p.95) defined flow as “the balance of challenges and skills when both are above average levels for the individual”. This suggests that it is a state of profound task-absorption and task-enjoyment experience, most likely to condition the actor involved to lose the sense of time in doing the task in question (Csikszentmihalyi, 1990, Csikszentmihalyi, 2000, Csikszentmihalyi, 2014). Flow experience has the following nine components: [a] Clarity of goals at every stage [b] Availability of immediate feedback [c] a balance between challenges and skills [d] Interpenetrations of action and awareness [e] Limited distractions from consciousness [f] Absence of concern in terms of failure [g] The disappearance of self-consciousness [h] The distortion of the sense of time [i] The activity is autotelic (Csikszentmihalyi, 1990, Csikszentmihalyi, 2000, Csikszentmihalyi, 2014). Arguably, flow experience is crucial to the understanding of cybercrime motivations.
Given that the type of primary motivation behind an action matters in relation to the opposing forces that could inhibit the intended action underlines the importance of incorporating social factors into classification schemas. This paper also acknowledges that certain types of cybercrimes listed in Table 1 fit into two or more motivational categories. Although there are some degrees of overlap between the categories, the primary motivation behind the action is the basic tool to differentiate between types of cybercrimes. For example, whilst cyber fraud is under the socioeconomic cybercrime category, revenge porn is under the umbrella of psychosocial cybercrime, as illustrated in Table 1. Theoretically therefore, in complementing the existing categories, this paper provides a more refined motivational taxonomy based on perpetrators’ primary benefits as well as victims’ primary loss, as shown in Table 2.
As Table 1, Table 2 fundamentally illustrates, in socioeconomic cybercrimes, the perpetrator often has a direct contact with his/her victim; this can be defined as financially motivated crimes that are computer or/and internet-mediated, such as online fraud, romance scam, and e-embezzlement. Psychosocial cybercrime are cybercrimes, which are principally psychologically driven such as cyberstalking, cyber harassment, and cyber rape. Whilst socioeconomic cybercriminals may aim to deflate the economy of their victims, psychosocial cybercriminals focus fundamentally on inflicting psychological distress (full analysis of the implications of the TCF, can be found further down).
Yet there remains a considerable amount of similarity between the two loose categories. Unlike the viewpoint that not all actors are economically motivated (Hayward, 2007), the analysis of the motivational drives and economic decision-making in relation to crime in general is more refined (Farrell, 2010). According to Farrell (2010), the application of utility maximization rather than the monetary benefit or economic maximization is a more appropriate term to deploy in conceptualizing the general costs and benefits of crime. Hence, psychological benefits, including expressive emotional elements and sensations, are critical in determining if the crime is economically motivated or not. Flowing from the above, different primary motivations underpin different types of cybercrimes identified in the literature – listed in Table 1. Collaterally, victims of cybercrimes may suffer differently based on the primary motivation – the perpetrators of cybercrime in question as shown in Table 2. Therefore, this current paper proposes that cybercrimes are motivated in three different ways: socioeconomic, psychosocial, and geopolitical.
In terms of the penetrator-victim transactions, the primary driving forces behind cyberbullying, online harassment and cyberstalking are psychological in nature. Unlike fraud-based cybercrimes, the injuries as well as the benefits lie within the realm of the mind. The above distinction is not to suggest that acquisitive motivations involved in financial crimes are absolutely non-psychological. Insights from health psychology (Lazarus, 2006, Lazarus and Folkman, 1984a, Lazarus and Folkman, 1984b) support the fact that financial loss (e.g. due to cyber fraud) can manifest physiologically as distress. However, the key element of differentiation between socioeconomic and psychosocial categories is that the primary benefits of the perpetrators as well as the primary losses of victims are different, as illustrated in Table 2. In contrast, under the binary model discussed above, both socioeconomic and psychosocial cybercrimes are grouped as one, that is, cyber-enabled crimes. Whereas the lens of the TCF can further differentiate between the two, as well as a third category: geopolitical (as discussed further below).
For example, when these 3cybercriminals deploy the ‘Freestyle trick’ using accounts on dating sites to befriend/condition unsuspecting victims to the point that they ‘fall in love’ with them and support them financially, the victims of Nigerian cybercriminals’ ‘Freestyle trick’, may suffer psychological distress as well as financial loss, but the primary aim of the perpetrators is commercial gain. In terms of the predicament of victims, economic losses are more grounded in the quantifiable realm than psychosocial cybercrimes that are in the sphere of the mind.
On the other hand, geopolitical cybercrimes can be defined as those e-crimes that involve agents of statecraft or/and industrial representatives (e.g. cyber espionage). Yet even geopolitical cybercrimes constitute some elements of socioeconomic and psychological cybercrimes as illustrated in Table 2. For example, Hacktivists, primarily aiming to make a political statement could expose sensitive data from the law enforcement agencies and their actions could have economic, psychosocial and geopolitical consequences on a person or group of people. The collective consequences of the tripartite categories could lead to a security fault, which this paper calls ‘cyber insecurity’, defined as a situation where security mechanisms in both the existing cyberspace and physical space cannot guarantee perfect security, nor have the full capacity to resist and respond to both intentional and unintentional cyberspace threats and hazards. In terms of victim-perpetrator interaction, while socioeconomic and psychosocial cybercrimes are fundamentally engineered and executed on individual levels, geopolitical cybercrimes, broadly speaking, are actions of state agents, groups of individuals against other groups, nations or industrial entities acting on behalf of more complex statecraft or vested interests. In other words, each group – especially but not limited to, socioeconomic and psychosocial cybercrimes – may involve individual actors or group actors as both targets and perpetrators. A crucial element of these categories – as illustrated in Table 2, is their capacity to simplify complex sets of information, given that there are over 30 types of cybercrimes identified in the existing literature. The TCF also help to enhance our understanding of ‘cybercriminals’, and their geopolitical, socioeconomic, and psychosocial factors. Another significant issue is that, unless they go against the grain that constitutes ‘normality’ in their home country, agents of statecraft that commit geopolitical cybercrimes are rarely considered ‘criminals’ at all. The assumption underpinning this is that they represent authority, rather than subversion. Therefore it is the nation they represent that is categorized as criminal, unlike individual subcultural rule-breakers such as the Nigerian 4419419 An advance fee scam or fraud (419 scam) is a form of fraud and is one of the most common types of online confidence tricks. The scam typically involves promising the victim a significant share of a large sum of money, in return for a small up-front payment, which the fraudster claims will be used to obtain the large sum. If a victim makes the payment, the fraudster either invents a series of further fees for the victim or simply disappears. The 419 comes from the Nigerian law against this type of scam. cybercriminals.
5. What Is ‘Cybercrime’ In Nigeria?
Drawing on the TCF as shown in Table 1, Table 2, the focus of this discourse confines itself to an examination of Nigeria – representing the Sub-Saharan region, as an exemplary cultural context. It is critical therefore to underscore the peculiar economic-benefit induced trend of cybercrime in Nigeria – generalizable to other Sub-Saharan nations such as 5Ghana, which may not represent squarely the hydra-headed nature of cybercrime in Western societies. Although there are multiple variations on how ‘419 fraud’ happens (e.g. Adogame, 2007, Igwe, 2007, Aransiola and Asindemade, 2011, FBIFBI FBI - Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, the FBI is also a member of the U.S. Intelligence Community and reports to both the Attorney General and the Director of National Intelligence. A leading U.S. counter-terrorism, counterintelligence, and criminal investigative organization, the FBI has jurisdiction over violations of more than 200 categories of federal crimes, including financial fraud., 2016), monetary benefit is central to the Nigerian 419 fraud as illustrated in Fig. 2 (for fuller accounts on how 419 happens, see the above authors). Although cybercrime is a global phenomenon, in most Western nations, in addition to socioeconomic cybercrime, the term cybercrime represents a range of computer/Internet-mediated crimes under the umbrella of psychosocial and geopolitical cybercrimes – see Table 1, Table 2. Couched within the aim of establishing the particularities of cybercrime in Nigeria is a wider critique of prevailing taxonomies of cybercrime. Nigerian cybercriminals to date, have been consistently implicated in money-oriented rather than psychosocial and geopolitical cybercrimes. In fact, the convergence of emerging evidence reinforces that perpetrators of cybercrimes in Nigeria focus exclusively on cyber-fraud (Ojedokun and Eraye, 2012, Smith, 2008, Tade and Aliyu, 2011, Adogame, 2007, Doyon-Martin, 2015; Chawki et al., 2015b, Akpome, 2015, Ellis, 2016, Ibrahim, 2016). Arguably, the Nigerian 419 fraud invented and revolutionized by Nigerian kingpins such as Fred Ajudua (Longe et al., 2010) is rooted in socioeconomics.
Given the foregoing remarks, cybercrime in Nigeria can be conceptualized simply as the use of computer/Internet to commit fraud. According to the yardstick of the binary model, the use of computer/Internet to commit fraud falls under the scaffolding of cyber-enabled crime (see Fig. 1). Unlike ICCC’s (2010) survey, which concentrated mainly on a range of 6cyber-enabled crimes as shown in Table 3, some recent inquiries which focused exclusively on cyber-dependent crimes could not locate Nigeria at the upper part of the cybercrime perpetrators’ hierarchy (e.g. Kaspersky, 2016). This comparison between these observations supports the notion that Nigerian cybercriminals are more implicated in cyber-enabled than cyber-dependent (or techno-centric cybercrime) listed in Fig. 1. Does this not suggest problems with prevailing taxonomies of cybercrime?
Table 3. Top ten types of cybercrime covered by ICCC (2010).
|1. Non-delivery Merchandise||21.1%||The purchaser did not receive items purchased, or the seller did not receive payment for items|
|2. FBI-Related ScamsScams A Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost.||16.6%||Scams in which a criminal poses as the FBI to defraud victims|
|3. Identity TheftIdentity Theft Identity theft is when someone uses another person's personal identifying information, without their permission, to commit fraud or other crimes. In both the U.K. and the United States it is the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.||10.1%||Unauthorized use of victim’s personally-identifying information to commit fraud|
|4. Computer Crimes||9.3%||1) Crimes that target computer networks or devices directly
2) Crimes facilitated by computer networks or devices
|5. Miscellaneous Fraud||7.7%||Variety of scams meant to defraud the public such as work-at-home scams and fraudulent contests|
|6. Advance Fee FraudAdvance Fee Fraud An advance fee scam or fraud is a form of fraud and is one of the most common types of online confidence tricks. The scam typically involves promising the victim a significant share of a large sum of money, in return for a small up-front payment, which the fraudster claims will be used to obtain the large sum. If a victim makes the payment, the fraudster either invents a series of further fees for the victim or simply disappears.||6.1%||Criminals convince victims to pay a fee to receive something of value but do not deliver anything of value to the victim|
|7. Spam||4.1%||Mass-produced, unsolicited bulk messages|
|8. Auction||4.0%||Fraudulent transactions that occur in the context of an online auction|
|9. Credit Card FraudCard Fraud Card Fraud is one of the most commonly referenced fraud definitions. It occurs when a fraudster uses a card (debit or credit) to make a purchase without the authorization of the cardholder. Card fraud can occur in-person or through digital channels.||3.6%||Fraudulent, unauthorized charging of goods and services to a victim’s credit card|
|10. Overpayment Fraud||3.4%||An incident in which the complainant receives an invalid monetary instrument with instructions to deposit it in a bank account and send the deposited money back to the sender|
If we look at the Nigerian case through the lens of the binary model (see Fig. 1), the problem is that we would be led to conclude that cybercrime in Nigeria is just cyber-enabled. Cybercrime in Nigeria is fundamentally rooted in socioeconomics, whereas the cyber-enabled crime framework encompasses a range of other crimes such as cyber-bullying and cyber rape. This is problematic. In terms of cyber-bullying and cyber rape, the perpetrators’ gains and the victims’ losses, as illustrated in Table 2, are primarily psychosocial unlike cyber-fraud (which is primarily rooted in economic gains/losses). It suggests problems with the binary model because these other crimes under the umbrella of psychosocial cybercrime may not be primarily rooted in economic gains/loss (as illustrated in Table 2). In other words, whilst socioeconomic cybercrime constitutes only a sub-category of cyber-enabled crime, a cyber-enabled conceptual framework comprises a range of crimes other than cyber-fraud. Therefore, clearly, the existing binary categories discussed above are ill-equipped to differentiate between psychosocial, socioeconomic, and geopolitical cybercrime. The crux is that the evidence that supports the centrality of socioeconomic cybercrime in Nigeria, concomitantly suggests problems with the dual model of cybercrime. These illustrations highlight the usefulness or utility of the TCF, which is more robust than the prevailing taxonomies in dealing with the complexities of numerous varieties of cybercrime.
6. Internet Crime Complaint Center: The Critique Of Evidence
Having offered a theoretical critique of the prevailing models of cybercrime, this article will render problematic the basis for 7ICCC, 2006, ICCC, 2008, ICCC, 2009, ICCC, 2010 claim on ‘cybercrime perpetrators’ league table’, i.e., Nigeria being the third-worst nation in the world. The FBI in partnership with the National White Collar Crime Center, aiming to reduce the volume of economic loss by Internet crime, established the Internet Crime Complaint Centre (ICCC or IC3) in May 2000. As its name implies, the ICCC is a center to receive victims’ complaints concerning ‘cybercrime’ and over the past years, the ICCC received about 300,000 responses annually (ICCC, 2008, ICCC, 2009, ICCC, 2010, ICCC, 2011, ICCC, 2012, ICCC, 2013, ICCC, 2014, FBI, 2015). These data appear to be robust because they come directly from the people who experience the offense. However, the accuracy of responses were only self-reportedly measured, which highlights the ICCC’s over-reliance on participants’ honesty and accuracy. Secondly, given that it is only a small percentage of people who voluntarily report themselves as victims of cybercrime (Bohme and Moore, 2012) or crime in general (Reiner, 2010), the generalisability of the populist claim is questionable. In fact, according to the FBI (2014), less than 10% of people report themselves as victims of cybercrime globally. Apart from cybercrime being underreported, the vast bulk of cybercrime as Brenner, 2007, Brenner, 2012 pointed out, is undetected. Arguably, even if an average of 300,000 respondents could be seen as a huge sample size in itself, it is far from being representative of the general population of all victims of cybercrime on earth. Additionally, there is the possibility that a majority of responses obtained by the ICCC may represent a selective group. For example, people who perceive themselves as ‘victims’ of the law are unlikely to channel their predicaments to the FBI. Also, Asian and African populations in the ICCC’s global research were not significantly represented in comparison to North American and European populations. As Stevens (2011, p.9) reminded us, “statistics, even when they represent the underlying reality, are socially and selectively constructed, and cannot (or should not) simply speak for themselves”. Therefore, regarding the cases that come to light, even if their statistical basis should be taken at face value, the claim is far from straightforward. A league table, therefore, is a pictorial representation of that construction, which not only renders invisible the process of construction but also obscures the entirety of what it represents.
Thirdly, whilst the media and the political discourses tend to amplify the moral panic on the Nigerian 419 fraud (e.g. Adogame, 2007), Akpome (2015), in ‘unsettling the myth of Nigerian exceptionalism’ contended, there is an impossibility of knowing if every cyber-criminal using the Nigerian 419 letter/email templates is actually a 8 Nigerian citizen. It is reasonable also to point out that, there is an impossibility of knowing if some of those perpetrators grouped as ‘Americans’ or ‘British’ are not citizens of other nations. The key point here is that it is challenging to isolate cybercriminals from other nations and world regions who may have as Adogame (2007, p.7) pointed out, ‘masked themselves as Nigerians and entered the theatre of 419 fraud as actors’. One of the implications is that, as Reiner (2010) noted, most people depend on the media, law enforcement agencies, and politicians for ‘authentic’ information on issues such as crime. Regarding the Nigerian case, bearing in mind that some victims may not have accurate information about the actual perpetrators’ identities, suggests that the media and political rhetoric on the ‘Nigerian’ fraud letter/emails may have unintended knock-on-effects on some victims reporting cybercriminals disproportionately as Nigerians. Given that ‘there is a long-standing demonization of Nigeria in the West as being full of criminals’ (Agozino, 2003, p. 231) reinforces the notion that the ICCC’s league table framed with a loose term ‘cybercrime perpetrators’ may have factored and impacted on some victims’ perceptions.
Lastly, as shown in Table 3, over 90% of crimes covered (2006–2010) were primarily ‘cyber-fraud’ and under this specific category (which this article called socioeconomic cybercrime), Nigeria was found to be the third-worst nation. Could the outcome be any different if geopolitical and psychosocial categories were covered? Given the limitations of the binary model, could the effect of the ICCC’s report on various discourses be any different if the exclusion of geopolitical and psychosocial categories were made explicitly? This highlights the usefulness of the tripartite framework as it helps to simplify such league-table-claim into a nuanced umbrella (e.g. socioeconomic cybercrime). Unlike the popular representation of the ICCC’s report in various discourses such as the media (e.g. ‘Nigeria ranked third in the world for cybercrime’ in Balancing Act, 2014), if we should view ICCC, 2006, ICCC, 2008, ICCC, 2009, ICCC, 2010 reports through the lens of the TCF, we could interpret it differently: ‘cybercrimes are motivated by three possible factors: socioeconomic, psychosocial and geopolitical. As regards to the socio-economic category, Nigeria was found to rank third in the world’. The term ‘cybercrime’ embodies multiple strands of crimes other than the socioeconomic category.
7. Further Justifications For The Usefulness Of The TCF
In turn, this paper has developed another scope for categorizing cybercrime (TCF), having critiqued the prevailing taxonomies and rendered problematic the statistics relied on to inform the prevalence of cybercrime perpetrators across nations. Accordingly, it will henceforth offer further justifications for the usefulness of the TCF. One of the implications is that if the ICCC’s reports and the likes are framed with TCF, the outcomes could be most precise. Concurrently, both the immediate outcomes and their subsequent knock-on-effects could be different and to a great extent, less ambiguous.
Let us suppose, hypothetically, that river A, B, and C have between them the greatest numbers of ‘animals’ (fishes and reptiles) in the world: river A has 4000 fishes, and 2000 reptiles, river B has 2000 fishes and 8000 reptiles, river C has 3000 fishes and 6000 reptiles. If we were required to count the numbers of all the ‘animals’ in them and reported only our findings about fish, without applying the basic categorization of ‘animals’ already in place, which includes reptiles as well as fish, we could and would be led to say that: ‘regarding animals that live only in water, river A has 2000 more animals than river B and 1000 animals more than river C’. By the same token, river A, river C, and river B – in descending order of significance, have the greatest numbers of animals that live only in water. We would then be led to conclude that river A has the greatest number of animals in the world when it is only in ‘fish’ category that river A is dominant. River B and river C both have more animals than river A in terms of the other category of animals called ‘reptiles’. In fact, regarding the overall population of animals in these three rivers, in ascending order of rank, river A, C, and B have the greatest number of animals in the world. This information is made easy because categories map the perceived world structure closely. The TCF could help to showcase data in a clear light by funneling information into nuanced umbrellas.
Beyond abstraction, TCF could be useful in policy-making processes, given that to simplify a complex set of data and maximize information intake with the least mental effort are at the heart of the TCF. The utilitarian value of the TCF could translate into policy-making processes because the instruments of persuasion in policy-making arenas are often constructed with ‘killer-charts’ rather than elaborate text and analysis. ‘Many policy documents transmitted between policy-making civil servants are mostly characterized by bullet points and simple diagrams – they do not grant lengthy analysis of imprecise nature of knowledge’ (Stevens, 2011, p.9). Arguably, bearing in mind the foregoing remarks on the nature of policy-making operational-practice, the TCF could be a useful ‘storytelling’ tool in the hands of policymakers. This specific usefulness of the TCF emphasizes that a robust taxonomy in cybercrime scholarship is by no means a sign of regress but on the contrary, an indication of progress.
Furthermore, given that everyone who may be interested in cybercrime reports may not be an ‘expert’ in cybercrime, the TCF would provide a simplified tool of making sense of the complexities around the conceptualization of cybercrime. Simply put, the TCF would have helped to showcase the statistical results of the ICCC’s endeavors (and other cybercrime oriented undertakings) in a clearer light. In turn, it reinforces the elementary principles and the psychological benefits of categorization (Rosch, 1978), which is central to the TCF. Therefore, the inability to differentiate between socioeconomic, geopolitical, and psychosocial cybercrime is not a feature of the binary models alone: it limits the precision and clarity of ICCC, 2008, ICCC, 2009, ICCC, 2010 reports as well. The crux is that the ICCC’s umbrella term: ‘cybercrime’ or ‘cybercrime perpetrators’ is ambiguous and misleading at best.
It is not only misleading: it has consequences on the emerging academic discourse in Nigeria over the years. Specifically, it has influenced the framing of most scholarly endeavors in Nigeria (e.g. Adomi and Igun, 2008), which echo a sense of ‘moral panic’ on ‘419’ phenomenon. Relatedly, the ICCC’s reports could be implicated in supplying ‘ammunitions’ to ‘Western propaganda machinery, which often blows the Nigerian 419 fraud-news out of proportion’ (Adogame, 2007, p.7). Given that repeating discourses normalize their claim, the problem is deep. Whilst there is a total absence of social/contextual taxonomies in cybercrime scholarship, it is not difficult to notice the presence of ‘league tables’ as well as the binary models discussed above. This mismatch could be implicated in the uncritical representation of ‘Nigeria as the third-worst nation’ in cybercrime literature (Aransiola and Asindemade, 2011, Adomi and Igun, 2008). Based on the premise that conceptualizing cybercrime is challenging, this article, therefore, aims to stimulate contemporary scholarly endeavors from Nigeria and elsewhere to look beyond the ‘league tables’ and the binary models and consider contextual/social nuances at play. This is one of the usefulness of the TCF as it has the capacity to enable a clearer conceptualization of cybercrime in Nigeria and beyond.
Unlike geopolitical and psychosocial categories, socioeconomic cybercrime is prevalent in Nigeria. Bearing in mind that the recognition of the socio-cultural fabric elements of a given situation is at the core of this paper, reinforces its value. The over-reliance on the populist ‘league table’ and the binary models in cybercrime scholarship has led some authors (e.g. Adomi and Igun, 2008, Chawki et al., 2015b) to overlook jurisdictional cultures and nuances. It has possibly misled some people in policy arenas. As Lagazio et al. (2014) observed, the orchestration of the fear of cybercrime in itself stimulates over-spending on defense measures as strategic responses by various states. Hyped rates of cybercrime in Nigeria by various discourses (academic, media) framed with the limitations of the prevailing taxonomies above have possibly influenced people in policy-making arenas. These conditions could be implicated in having knock-on-effects as AllAfrica (2013) pointed out, on the rise of the Nigerian government’s budgets/expenses on cyber security-oriented issues. Bearing in mind that there is a general ‘paranoia’ on the social ‘problem’ of Nigerian criminals (e.g. Agozino, 2003, Adogame, 2007), the concerns of international communities could creep into regional policy responses against the cybercrime ‘problem’. In turn, international communities’ concerns help to stretch the already over-stretched Nigerian expenses on a wide spectrum of cybercrime problem. The TCF would not only help to question the taken-for-granted assumptions on Nigerian cybercriminals’ position on the global map but also help policymakers to funnel down resources to cope with the specific category where Nigeria is most vulnerable. The key point is that the benefits of the TCF in coping with the complexities around cybercrime conceptualization outweigh that of the prevailing cybercrime taxonomies.
8. Historical Perspectives: The Nigerian 419 Fraud
Having problematized ICCC, 2006, ICCC, 2008, ICCC, 2009, ICCC, 2010 claim, it is worth considering the background to the Nigerian 419 fraud. ‘Scam’ is an age-old game in all human societies and the Nigerian 419 fraud, like its historical antecedents such as the Spanish Prisoner Swindle (Ogwezzy, 2012; Whitaker, 2013), has emerged from a particular history. Therefore, to dismiss long-term historical perspectives is vulnerable to omit critical factors necessary to understand the social and contextual platforms on which ‘419 fraud’ has emerged. The underlying idea is to further develop the socioeconomic theory of Nigerian cybercriminals – answer to the question, what is a cybercrime in Nigeria? Historically, socioeconomic cybercrime in contemporary Nigerian society metamorphized as Igwe (2007) narrated, from various types of deceptive ‘games’ played in pre-colonial Nigeria. Like all human societies, the contemporary Nigerian society that has sprouted from the ruins of three ancient West African kingdoms: Benin kingdom, Bornu empire, and Songhai empire, (Shuter, 2008) has not done away with the relics of scam. Such scam-games of pre-colonial Nigeria are called the ancient relics of scam, as illustrated in Fig. 3 below. These relics of the scam may be conceptualized as ancient assemblages of beliefs and practices that have evolved over time and entangled with the contemporary Nigerian democracy and politics, to become a common ‘toolbox’ for money success. Drawing from Robinson and McAdams (2015), in order to communicate this theoretical position beyond abstraction, the relics of the scam hypothesis is simplified down to a set of verbal postulates, a box-and-arrow diagram – as illustrated in Fig. 3 below. One of the primary rationales being to enhance our understanding with the least cognitive effort. During the colonial period in Nigeria, whilst some commentators observed that ‘crime’ made little appeal to young Nigerians (e.g. Paterson, 1944), others noticed that Nigerian schoolboys were very gifted in the psychology of manipulations (e.g. US Consulate 1949). It could be that the former were referring to the general population of Nigerian youth, whereas the latter were referring to a specific group of young Nigerians – those who had the opportunity to embrace Western education in the 1940s. Besides, a majority of these reports on schoolboys were generated directly from their headteachers. The key point is that ‘schoolboys’ rather than ‘illiterates’ were principally implicated in authoring various kinds of letters, claiming as Ellis (2016) commented, to be sellers of diamonds, ivory, gold, and other exotic items from ‘Africa’, whereas they were the ‘Wayo trickers’ – fraudsters. However, the ‘destiny’ of ‘Wayo trickers’ changed drastically when petroleum was found in Nigeria (Adogame, 2007).
Petroleum was discovered in Nigeria four years prior to the official end of colonial rule in 1960. Consequently, petroleum became the dominant pillar of the Nigerian economy (Adogame, 2007). In turn, as Saro-wiwa (1989, p.21) commented, most political elites saw the oil-money as ‘a national cake, already baked, ready to be shared’. For them, ruling the nation has nothing to do with nation-building but has everything to do with the funneling of federal money into personal bank accounts. While corruption is a global phenomenon, there is a long-standing view that Nigeria is not one of the ‘cleanest’ nations in the world (Transparency International, 2014). Although the petroleum boom has boosted the magnitude of corrupt practices in Nigeria, it also has some benefits.
As Smith (2008) described, the Nigerian petroleum boom was responsible for boosting the fertility rate as well as increasing the inflow of foreign scholars and workers in the 1970s. Consequently, the number of educated people in Nigeria increased massively. However, nothing lasts indefinitely, and in the 1980s the price of oil fell drastically, rapidly deflating the Nigerian economy, but not corrupt practices. As the oil boom became oil doom, the International Monetary Fund (IMF) entered the equation. To paraphrase Adogame (2007, p.8) ‘IMF by prescribing deregulation exercises, austerity measures as the only panacea to economic reconstruction, ensnared Nigeria into a vicious circle of perpetual money borrowing and interest-paying’. The misappropriation of these loans further deteriorated the economy. This was how the IMF, 9corrupt practices of some politicians, and political impunity became hopelessly interwoven with 419 fraud.
Specifically, Apfer (1999), in his analysis of ‘IBB = 419’, elaborated that, under General Ibrahim Badamasi Babangida (a.k.a. IBB), the longest-serving Nigerian Military regime (1985–1993) supported 419 kingpins and benefited directly from them. IBB’s alleged elevated bribery-corruption scheme, political impunity, and a range of kickbacks between other politicians and some foreign companies created real-life ‘scripts’, which added layers of authenticity to early 419 criminals’ schemes. These layers of authenticity made the Nigerian 419 fraud templates invaluable/attractive to swindlers – Nigerians and non-Nigerians. It is easier for swindlers to modify/use the ‘authentic’ templates with a track record of success than to reinvent the wheel of the game. In other words, many of the fraud templates originated from plausible, or even genuine, crime scenarios. Evidently, as Adogame (2007) and Bretton (1962) observed, whilst numerous foreign companies found bribery and falsifying of paperwork as keys to benefit from Nigeria, the politicians saw foreigners as a means of acquiring abundant wealth. The marriage between them over the years has produced voluminous ‘419 fraud templates’ and reinforces the idea that cybercrime in Nigeria is rooted in socioeconomics. As a result therefore of a sequence of events that interpenetrate one another to worsen the state of the economy, unemployed graduates, predominantly male, became a part of the equation.
Given the condition of the Nigerian economy in the 1980s, it was not difficult for most unemployed graduates to become vulnerable to 419 scamming (e.g. Adogame, 2007, Smith, 2008). It could be that the petroleum boom in the 1970s provided an elevated aspirational-level for university students. In consequence, higher expectations made the acceptance of unemployment-induced destitution ‘harder’ for recent graduates than for control groups, that is, average unemployed individuals. This echoes the discrepancy theory of satisfaction (Michalos,1985) in positive psychology, which postulates that upward social comparisons create a discrepancy between expectations and actual life events – upward social comparisons are most likely to stimulate lesser rather than greater satisfaction (see also Cooper & Artz, 1995, Perales & Tomaszewski, 2015).
The ‘gap’ or discrepancy between expectations and actual rewards chiefly determines whether people have low or high levels of satisfaction (Michalos, 1985, Cooper & Artz, 1995). However, this is not to concede that there is a causal relationship between unemployment and offending rates. The links between them despite showing some fairly clear patterns are far from straightforward (e.g. Newburn, 2016). The most consistent view is that online crimes (as well as terrestrial crimes) in Nigeria are male-dominated (e.g. Ojedokun and Eraye, 2012, Aransiola and Asindemade, 2011). This is important because the male-domination of cyber-fraud in Nigeria is linked to the socioeconomic cybercrime theory of Nigerian cyber-criminals, which, in turn, suggests fundamental problems with the prevailing binary category of cybercrime.
9. Socio-Fabric Elements And Cultural Landscapes
The explanations as to why adult males in Nigeria have been implicated in the bulk of socioeconomic cybercrime demands the application of cultural insights. The rationale being that there is an intersectionality of issues of interpersonal relationships in physical spaces and cyberspace. Cultural constellations of people in social contexts affect people’s activities in cyberspace. The centrality of socioeconomic cybercrime in Nigeria is linked to the centrality of the patriarchal system. As Ibrahim (2015) pointed out, the strong patriarchal system and customary ‘common sense’ in Nigeria among other factors, encourage men culturally, unlike women, to be the breadwinners. Due to men’s cultural positionality in society in relation to women, men are generally more ‘desperate’ to achieve financial success. Indeed, contemporary scholars articulate that some cyber-criminals in the Sub-Saharan region go as far as deploying mystical/spiritual powers to enhance their exploits online (e.g. Tade, 2013 in Nigeria; Armstrong, 2011 in Ghana). The key point here is that regarding cybercrime, the primary aims of most Nigerian cyber-criminals converge on defrauding as many victims as possible (Smith, 2008, Akpome, 2015), which is illustrative of socioeconomic cybercrime, rather than for example, psychosocial cybercrime (please see Table 2 for victim-perpetrator primary and secondary loss/benefits).
One of the considerations that shape this trend is the local philosophy and demonstrable reality that, if a man is financially successful, he has ‘unlimited’ privileges in multiple facets of life-domains, unlike in Western society. For example, a man who has the means, regardless of his age, under customary and Islamic marriages can marry multiple wives. He can even marry wives as young as fourteen or thirteen years old, in some cases, depending on his ‘tastes’ (Nigerian Marriage Act, 1990, Ogunde, 2016, Monk et al., 2016). Apart from the Nigerian common-sense custom allowing polygamy, a man’s adultery is socio-culturally perceived as ‘a heroic feat’ (Chinwuba, 2015, p.305). These types of relationships shape the manner in which a given society perceives its adult females at a particular historical point in time and how women are expected to relate to adult males (Ajayi and Owumi, 2013, Ibrahim, 2015, Chinwuba, 2015, Ogunde, 2016). It also extends to future generations and impacts on the children – the 10image-of-childhood in the Sub-Saharan region (Rwezaura, 1998, Ibrahim and Komulainen, 2016). A strong patriarchal system helps to perpetuate these types of cultural landscapes, which in turn shape the socioeconomic crime in Nigeria. Unlike in some Western nations, the cultural landscapes inherent in Nigeria invoke relatively positive societal reactions, towards any man who has financial success (irrespective of the source of such a success – e.g. cyber-fraud) (see also Becker, 1967 on social reactions). Such background evidence reinforces that the Nigerian cybercriminals’ are primarily monetary-driven as illustrated in Table 2. Therefore, the Nigerian cybercriminals (popularly ranked third) are under one nuanced umbrella of cybercrime – cyber-fraud (socioeconomic cybercrime), which is not made clear through the lens of the binary model as the well as ICCC, 2008, ICCC, 2009, ICCC, 2010 observations.
The above social and contextual factors informed the core of present-day cybercrime in Nigeria. Arguably, these forms of cultural landscapes are possibly the explanations for the centrality of socioeconomic cybercrime in Nigeria, which suggests problems with the existing binary model of cybercrime as aforementioned. The implication is that what is cybercrime in Britain or in the USA – ranked second and first respectively, (ICCC, 2010) does not fit squarely within the contextual meaning of cybercrime in Nigeria. For instance, unlike the Sub-Saharan region, as Sheridan et al. (2014) pointed out, in most Western nations, cyberstalking is a social problem. Another implication is that these social and contextual factors also challenge the simplistic rendering of cyberspace and physical space as two different entities with easily defined boundaries as they are intertwined, as shown in Fig. 3. Evidently, the particularities of cybercrime in Nigeria support the incorporation of social and contextual factors into cybercrime classifications and consequently, render problematic the existing taxonomies.
This article has aimed to establish the particularities of cybercrime in Nigeria and whether these suggest problems with prevailing taxonomies of cybercrime. It has examined the explanatory capacity of the existing taxonomies in making sense of what is true of all societies, and what is true of one society at one point in time and space. Thus, these analyses have helped to propose that whilst in Nigeria, cybercrime is fundamentally rooted in socioeconomics, the lenses of the existing cybercrime taxonomies are not well equipped to project the pattern of this phenomenon clearly. Therefore, in line with motivational theories framed within the basic psychological framework of categorization, this paper has not only complimented the existing taxonomies but has also offered a more conceptually robust alternative for grouping cybercrime: the TCF. It has argued that cybercrime can be motivated in three possible ways: socioeconomic, psychosocial, and geopolitical. Whilst what constitutes cybercrime in most Western nations such as the UK and the USA may involve these three groups, cybercrime in Nigeria is fundamentally rooted in socioeconomics. Therefore, the conceptual ‘pipelines’ of the cybercrime framework in the Global North may not hold water in Nigeria – representing the Sub-Saharan region. Drawing together and extending categories of cybercrime, this article has provided a more holistic taxonomy incorporating socioeconomic, psychosocial, and geopolitical motivations. This contribution offers new ways of making sense of numerous variances of cybercrime listed in Table 1. It also provides a clearer way of conceptualizing cybercrime in Nigeria and elsewhere because jurisdictional cultures and nuances apply online as they do offline.
I am grateful to Professor Robert Reiner and Dr. Jessica Morgan for their comments on my draft, and I also thank the anonymous reviewers for their insightful and thoughtful comments. I thank my friends, Nicola Baldwin, Shervin Vencatachellum, Andreas Haggman, and Stephen Wyatt, for proofreading different parts of my draft and Dr. Laura Christie for proofreading the final version of this article as a whole. I am grateful to the journal’s production manager (Sneha Mohan) for her patience. I also thank the organizers and participants of the 4th International Conference on Cybercrime & Computer Forensics – Vancouver, where I presented this paper in June 2016 (at Simon Fraser University). My sincere gratitude goes to my mentor, Professor Ravinder Barn, for her comments when I was working under her (The CyberRoad Map Project from 2014 to 2015); a fragment of this paper was my unpublished contribution to the Project. I also thank the EPSRC and the UK government as part of the Center for Doctoral Training in Cyber Security at Royal Holloway, University of London.
- Adogame, 2007
A. Adogame The 419 code as business unusual: youth and the unfolding of the advance fee fraud online discourseInt. Sociol. Assoc. e-bull (2007)http://www.isa-sociology.org/publ/e-bulletin/E-bulletin_7.pdf(accessed 10.07.16.)
- Adomi and Igun, 2008
E.E. Adomi, S.E. Igun Combating cyber crime in NigeriaElectron. Libr., 26 (5) (2008), pp. 716-725(Emerald Publishing)
- Agozino, 2003
B. Agozino Counter-colonial Criminology: a Critique of Imperialist ReasonPluto Press, London (2003)
- Ajayi and Owumi, 2013
J. Ajayi, B. Owumi Socialization and child rearing practices among nigerian ethnic groupsAcad. J. Interdiscip. Stud., 2 (2) (2013), pp. 249-256
- Akpome, 2015
A. Akpome What is Nigeria? unsettling the myth of exceptionalismAfr. Spectr., 50 (1) (2015), pp. 65-78
- AllAfrica, 2013
AllAfrica Nigeria: Budget – Security Vote Shoots up to N1 Trillionavailable at:(2013)http://allafrica.com/stories/201210151017.html(accessed 11.05.16.)
- Apfer, 1999
A. Apfer IBB=419: nigerian democracy and the politics of illussionJohn Comaroff, John Comaroff (Eds.), Civil Society and the Political Imagination in Africa: Critical Perspectives, University of Chicago Press, Chicago (1999)
- Aransiola and Asindemade, 2011
J.O. Aransiola, S.O. Asindemade Understanding cybercrime perpetrators and the strategies they employ in NigeriaCyberpsychology, Behav. Soc. Netw., 14 (12) (2011), pp. 759-763
- Armstrong, 2011
A. Armstrong ‘Sakawa’ Rumours: Occult Internet Fraud and Ghanaian Identity (No. 8). UCL [online](2011)https://www.ucl.ac.uk/anthropology/research/working-papers/082011.pdf(accessed 11.02.16.)
- Balancing Act, 2014
Balancing Act Nigeria Ranked Third in the World for Cybercrimeavailable at:(2014)http://www.balancingact-africa.com/news/en/issue-no-302/computing/nigeria-ranked-third/en(accessed 30.05.16.)
- Benson et al., 2015
V. Benson, G. Saridakis, H. Tennakoon Purpose of social networking use and victimisation: are there any differences between university students and those not in HE?Comput. Hum. Behav., 51 (2015), pp. 867-872
- Bohme and Moore, 2012
R. Bohme, T. Moore How do consumers react to cybercrime?eCrime Researchers Summit (ECrime), 2012 (2012), pp. 1-12IEEE Xplore
- Boulton et al., 2012
M. Boulton, J. Lloyd, J. Down, H. Marx Predicting undergraduates’ self-reported engagement in traditional and cyberbullying from attitudesCyberpsychology, Behav. Soc. Netw., 15 (3) (2012), pp. 141-147
- Brathwaite, 1996
F. Brathwaite Some aspects of sentencing in the criminal justice system of BarbadosCaribb. Quart, 42 (2/3) (1996), pp. 101-118
- Brenner, 2007
S.W. Brenner Cybercrime: Re-thinking crime control strategiesY. Jewkes (Ed.), Crime Online, Willan, Cullompton (2007), pp. 12-28
- Brenner, 2012
S.W. Brenner Cybercrime and the Law: Challenges, Issues, and OutcomesNortheastern University Press, New England (2012)
- Bretton, 1962
H.L. Bretton Power and Stability in Nigeria: the Politics of DecolonizationFrederick A. Praeger, London (1962)
- Brown, 2001
K.V. BrownThe determinants of crime in South AfricaSouth Afr. J. Econ., 69 (2) (2001), pp. 269-298
- Cain, 2000
M. Cain Orientalism, occidentalism and the sociology of crimeBr. J. Criminol., 40 (2) (2000), pp. 239-260
- Chawki et al., 2015a
M. Chawki, A. Darwish, M.A. Khan, S. Tyagi Cybercrime: introduction, motivation and methodsCybercrime, Digital Forensics and Jurisdiction, Springer International Publishing (2015), pp. 3-23
- Chawki et al., 2015b
M. Chawki, A. Darwish, M.A. Khan, S. Tyagi 419 scam: an evaluation of cybercrime and criminal code in NigeriaCybercrime, Digital Forensics and Jurisdiction, Springer International Publishing (2015), pp. 129-144
- Chinwuba, 2015
N.N. Chinwuba Human identity: child rights and the legal framework for marriage in NigeriaMarriage & Fam. Rev., 51 (4) (2015), pp. 305-336
- Cooper & Artz, 1995
A.C. Cooper, K.W. Artz Determinants of satisfaction for entrepreneursJournal of Business Venturing, 10 (6) (1995), pp. 439-457
- Csikszentmihalyi, 1990
M. Csikszentmihalyi Flow: the Psychology of Optimal ExperienceHarper and Collins, New York (1990)
- Csikszentmihalyi, 2000
M. Csikszentmihalyi Beyond Boredom and Anxiety: Experiencing Flow in Work and Play(second ed.), Jossey Bass, San Francisco (2000)
- Csikszentmihalyi, 2014
M. Csikszentmihalyi Toward a psychology of optimal experienceFlow and the Foundations of Positive Psychology, Springer, Netherlands (2014), pp. 209-226
- Cunningham et al., 2014
C.E. Cunningham, Y. Chen, T. Vaillancourt, H. Rimas, K. Deal, L.J. Cunningham, J. Ratcliffe Modeling the Anti-cyberbullying Preferences of University Students: Adaptive Choice-based Conjoint AnalysisAggressive behaviorBehavior Behavior / Behavioral Actions Otherwise known as habits, behavior or behavioral actions are strategies to help prevent online exploitation that target behavior, such as social engineering of victims. Changing your behavior is the ONLY effective means to reduce or prevent scams.(2014)
- Deci and Ryan, 1985
E.L. Deci, R.M. Ryan Intrinsic Motivations and Self-determination in Human BehaviourPlenum, New York (1985)
- Deci and Ryan, 2000
E.L. Deci, R.M. Ryan The ‘what’ and ‘why’ of goal pursuits: human needs and the self-determination of behaviourPsychol. Inq., 11 (4) (2000), pp. 227-268
- Deci and Ryan, 2011
E.L. Deci, R.M. Ryan Self-determination theoryHandb. Theor. Soc. Psychol., 1 (2011), pp. 416-433
- Doyon-Martin, 2015
J. Doyon-Martin Cybercrime in West africa as a result of transboundary e-wasteJ. Appl. Secur. Res., 10 (2) (2015), pp. 207-220
- Ellis, 2016
S. Ellis This Present Darkness: a History of Nigerian Organized CrimeOxford University Press, Oxford (2016)
- Farrell, 2010
G. Farrell Situational crime prevention and its discontents: rational choice and harm reduction versus ‘cultural criminology’Soc. Policy & Adm., 44 (1) (2010), pp. 40-66
- Faucher et al., 2014
C. Faucher, M. Jackson, W. CassidyCyberbullying Among University Students: Gendered Experiences, Impacts, and Perspectives, vol. 2014, Education Research International (2014)
- FBI, 2014
FBI African Cybercriminal Enterprise Members Using School ImpersonationImpersonation An impersonator is someone who imitates or copies the behavior or actions of another. There are many reasons for impersonating someone, such as: part of a criminal act such as identity theft, online impersonation scam, or other fraud. This is usually where the criminal is trying to assume the identity of another, in order to commit fraud, such as accessing confidential information or to gain property not belonging to them. Also known as social engineering and impostors. to Defraud Retailersavailable at:(2014)http://www.ic3.gov/media/2014/140904.aspx(accessed 30.05.16.)
- FBI, 2015
FBI Mission Statementavailable at:(2015)https://www.ic3.gov/about/default.aspx(accessed 28.05.16.)
- FBI, 2016
FBI Internet Crime Schemesavailable at:(2016)https://www.ic3.gov/crimeschemes.aspx#item-13(accessed 27.05.16.)
- Gordon and Ford, 2006
S. Gordon, R. Ford On the definition and classification of cybercrimeJ. Comput. Virol., 2 (1) (2006), pp. 13-20
- Hayward, 2007
K. Hayward Situational crime prevention and its discontents: rational choice theory versus the ‘culture of now’Soc. Policy & Adm., 41 (3) (2007), pp. 232-250
- Ibrahim, 2015
S. Ibrahim A binary model of broken home: parental death-divorce hypothesis of male juvenile delinquency in Nigeria and GhanaS.R. Maxwell, S.L. Blair (Eds.), Violence and Crime in the Family: Patterns, Causes, and Consequences, Contemporary Perspectives in Family Research, vol. 9, Emerald Group Publishing Limited, New York (2015), pp. 311-340
- Ibrahim and Komulainen, 2016
S. Ibrahim, S. Komulainen Physical punishment in Ghana and Finland: criminological, sociocultural, human rights and child protection implicationsInt. J. Hum. Rights Const. Stud., 4 (1) (2016), pp. 54-74
- Ibrahim, 2016
S. Ibrahim Causes of Socioeconomic Cybercrime in Nigeria (Parents’ Perspectives). The 4th International Conference on Cybercrime & Computer ForensicsIEEE Xplore Publishing, Canada, Vancouver (2016)
- Igwe, 2007
Igwe C.N. Taking Back Nigeria from 419: what to Do about the Worldwide E-mail Scam–advance-fee FraudiUniverse, Toronto (2007)
- ICCC, 2006
- Internet Crime Complaint Centre – ICCC (2006), ‘Internet Crime Complaint Centre’, available at: https://pdf.ic3.gov/2006_IC3Report.pdf, (accessed 04.04.15.).
- ICCC, 2008
- Internet Crime Centre Complaint Centre – ICCC (2008) ‘Internet Crime Centre Complaint Centre’, available: https://pdf.ic3.gov/2008_IC3Report.pdf, (accessed 27.05.16.).
- ICCC, 2009
- Internet Crime Centre Complaint Centre – ICCC (2009) ‘Internet Crime Centre Complaint Centre’, available at: https://pdf.ic3.gov/2009_IC3Report.pdf, (accessed 28.05.16.).
- ICCC, 2010
- Internet Crime Centre Complaint Centre – ICCC (2010) ‘Internet Crime Report’, available at: https://pdf.ic3.gov/2010_IC3Report.pdf, (accessed 26.05.16.).
- ICCC, 2011
- Internet Crime Centre Complaint Centre – ICCC (2011) ‘Internet Crime Report’, available at: https://www.its.ny.gov/sites/default/files/documents/2011_IC3Report.pdf, (accessed 29.05.16.).
- ICCC, 2012
- Internet Crime Centre Complaint Centre – ICCC (2012) ‘Internet Crime Report’, available at: https://pdf.ic3.gov/2012_IC3Report.pdf, (accessed 29.05.16.).
- ICCC, 2013
- Internet Crime Centre Complaint Centre – ICCC (2013) ‘The Internet Crime Centre Report 2013’, available at: https://pdf.ic3.gov/2013_IC3Report.pdf, (accessed 27.05.16.).
- ICCC, 2014
- Internet Crime Centre Complaint Centre – ICCC (2014) ‘The Internet Crime Centre Report 2014’, available at: https://pdf.ic3.gov/2014_IC3Report.pdf, (accessed 27.05.16.).
- Kaspersky, 2016
Kaspersky The Overall Statistics for 2015available at:(2016)https://securelist.com/analysis/kaspersky-security-bulletin/73038/kaspersky-security-bulletin-2015-overall-statistics-for-2015/(accessed 09.01.16.)
- Kshetri, 2006
N. Kshetri The simple economics of cybercrimesSecur. Priv. IEEE, 4 (1) (2006), pp. 33-39
- Lagazio et al., 2014
M. Lagazio, N. Sherif, M. Cushman A multi-level approach to understanding the impact of cyber crime on the financial sectorComput. Secur., 45 (2014), pp. 58-74
- Layous et al., 2013
K. Layous, S.K. Nelson, S. Lyubomirsky What is the optimal way to deliver a positive activity intervention? the case of writing about one’s best possible selvesJ. Happiness Stud., 14 (2) (2013), pp. 635-654
- Lazarus, 2006
R.S. Lazarus Stress and Emotion: a New SynthesisSpringer Publishing Company (2006)
- Lazarus and Folkman, 1984a
R. Lazarus, S. Folkman Stress, Appraisal and CopingSpringer, New York (1984)
- Lazarus and Folkman, 1984b
R. Lazarus, S. Folkman Stress, Coping and AdaptationSpringer, New York (1984)
- Lindsay and Krysik, 2012
M. Lindsay, J. Krysik Online harassment among college students: a replication incorporating new Internet trendsInf. Commun. Soc., 15 (5) (2012), pp. 703-719
- Longe et al., 2010
O.B. Longe, V. Mbarika, M. Kourouma, F. Wada, R. Isabalija Seeing beyond the surface, understanding and tracking fraudulent cyber activities(2010)arXiv preprint arXiv:1001.1993
- Manjikian, 2010
M.M. Manjikian From global village to virtual battlespace: the colonizing of the internet and the extension of realpolitikInt. Stud. Quart, 54 (2) (2010), pp. 381-401
- McGuire and Dowling, 2013
M. McGuire, S. Dowling Cyber crime: A review of the evidenceavailable at:(2013)https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246749/horr75-summary.pdf(accessed 28.09.14.)
- Michalos, 1985
A. Michalos Multiple discrepancies theory (MDT)Soc. Indic. Res., 16 (1985), pp. 347-413
- Monk et al., 2016
C. Monk, S. Ibrahim, M. Rush, E. T Dibiana Unequal sociocultural penalties of divorce in Nigeria and citizenship implications. Special issueJ. Comp. Fam. Studies (2016)(in press)
- Nakamura and Csikszentmihalyi, 2002
J. Nakamura, M. Csikszentmihalyi The concept of flowC.R. Snyder, S.J. Lopez (Eds.), Handbook of Positive Psychology, Oxford University Press, New York (2002), pp. 89-105
- Nelken, 2010
D. Nelken Comparative Criminal Justice: Making Sense of DifferenceSAGE, London (2010)
- Newburn, 2016
T. Newburn Social disadvantage: crime and punishmentH. Dean, L. Platt (Eds.), Social Advantage and Disadvantage, Oxford University Press, Oxford (2016)
- Nigerian Marriage Act, 1990
Nigerian Marriage Act Marriage Actavailable at:(1990)http://www.placng.org/new/laws/M6.pdf(accessed 22.01.16.)
- Ogunde, 2016
O. Ogunde Protecting the interest of the girl-child in Nigeria: matters arisingInt. J. Hum. Rights Const. Stud., 4 (1) (2016), pp. 17-30
- Ogwezzy, 2012
M.C. Ogwezzy Cyber crime and the proliferation of yahoo addicts in NigeriaAGORA Int. J. Jurid. Sci., 1 (2012), pp. 86-102
- Ojedokun and Eraye, 2012
U.A. Ojedokun, M.C. Eraye Socioeconomic lifestyles of the yahoo-boys: a study of perceptions of university students in NigeriaInt. J. Cyber Criminol., 6 (2) (2012), pp. 1001-1013
- Oksanen and Keipi, 2013
A. Oksanen, T. Keipi Young people as victims of crime on the internet: a population-based study in FinlandVulnerable Child. Youth Stud., 8 (4) (2013), pp. 298-309
- Paterson, 1944
A. Paterson National Archives of Nigeria, Ibadan, Oyo Prof.1, 4113: “Crime and its Treatment”(1944)report to the Governor by Alexander Paterson, February 1944
- Perales & Tomaszewski, 2015
F. Perales, W. Tomaszewski Happier with the same: job satisfaction of disadvantaged workersBritish Journal of Industrial Relations (2015)http://espace.library.uq.edu.au/view/UQ:341908/UQ341908_OA.pdf
- Reiner, 2010
R. Reiner The Politics of the PoliceOxford University Press, Oxford (2010)
- Robinson and McAdams, 2015
O.C. Robinson, Dan P. McAdams Four functional roles for case studies in emerging adulthood researchEmerg. Adulthood, 3 (6) (2015), pp. 413-420
- Rosch, 1978
E. Rosch Principles of categorizationEleanor Rosch, Barbara B. Lloyd (Eds.), Cognition and Categorization 27–48, Lawrence Erlbaum, Hillsdale, NJ (1978)
- Rwezaura, 1998
B. Rwezaura Competing ‘images’ of childhood in social and legal systems of contemporary Sub-Saharan AfricaInt. J. Law Policy Fam., 12 (3) (1998), pp. 253-278
- Saro-wiwa, 1989
K. Saro-wiwa On a Darkling Plain: an Account of the Nigerian Civil WarSaros International Publishers, Port Harcourt (1989)
- Sheridan et al., 2014
L. Sheridan, A.J. Scott, K. Nixon Police Officer Perceptions of Harassment in England and ScotlandLegal and Criminological Psychology (2014)
- Shuter, 2008
J. Shuter Ancient West African KingdomsHeinemann Educational Books, London (2008)
- Smith, 2008
D.J. Smith A Culture of Corruption: Everyday Deception and Popular Discontent in NigeriaPrinceton University Press, Princeton (2008)
- Stevens, 2011
A. Stevens Telling policy stories: an ethnographic study of the use of evidence in policy-making in the UKJ. Soc. Policy, 40 (02) (2011), pp. 237-255
- Tade, 2013
O. Tade A spiritual dimension to cybercrime in Nigeria: the ‘yahoo plus’ phenomenonHum. Aff., 23 (4) (2013), pp. 689-705
- Tade and Aliyu, 2011
O. Tade, I. Aliyu Social organization of internet fraud among university undergraduates in NigeriaInt. J. Cyber Criminol., 5 (2) (2011), pp. 860-875
- Transparency International, 2014
Transparency International The 2014 Corruption Perception Index(2014)Available athttp://www.transparency.org/cpi2014accessed 30.12.15.
- US consulate, 1949
US consulate NARA II RG 84, records of the US consulate, Lagos, 1940 to 1963 Box 1: C. Porter Kuykendall, consul-general, to Secretary of State(1949)16 May 1949
- Wall, 2008
D.S. Wall Cybercrime and the culture of fear: social science fiction (s) and the production of knowledge about cybercrimeInf. Commun. Soc., 11 (6) (2008), pp. 861-884
- Wall, 2013
D.S. Wall Cybercrime2007, Polity Press, Cambridge (2013)
- Wehmeyer and Little, 2009
M. Wehmeyer, T. Little Self-determinationS. Lopez (Ed.), Encyclopedia of Positive Psychology, Blackwell Publishing Ltd, Chichester (2009), pp. 868-874
- Whitaker, 2013
R. Whitaker Proto-Spam: Spanish prisoners and confidence gamesAppendix, 1 (4) (2013)available at:http://theappendix.net/issues/2013/10/proto-spam-spanish-prisoners-and-confidence-games(accessed 12.12.15.)
- Yar and Jewkes, 2010
M. Yar, Y. Jewkes Histories and Contexts. Handbook of Internet CrimeRouthledge Books, London (2010)
- Yazdanifard et al., 2011
Rashad Yazdanifard, Tele Oyegoke, Arash Pour Seyedi Cyber-crimes: Challenges of the Millennium Age.” Advances in Electrical Engineering and Electrical MachinesSpringer, Berlin Heidelberg (2011), pp. 527-534http://link.springer.com/chapter/10.1007/978-3-642-25905-0_68(accessed 30.03.15.)
Cyberspace is a borderless global space, a site for the globalization of threats as well as benefits (Manjikian, 2010).
This article uses the tripartite cybercrime framework (TCF) or the tripartite conceptual framework (TCF) interchangeably.
- The ‘Freestyle trick’ is a preferred/common method of operation among the early career cybercriminals in Nigeria, possibly because it is the simplest one among a multitude of others.
“419 is coined from section 419 of the Nigerian criminal code (part of Chapter 38: Obtaining Property by false pretenses; Cheating) dealing with fraud. Nowadays, the axiom ‘419’ generally refers to a complex list of offenses which in ordinary parlance are related to stealing, cheating, falsification, impersonation, counterfeitingCounterfeiting Counterfeiting is defined as the planned attempt to duplicate a real and authentic article such as a symbol, trademark or even money with the purpose to distort and convince the purchaser or the recipient to believe that he or she is really purchasing or receiving the real article itself. In the ecommerce and financial services industry, this often refers to counterfeit cards and checks., forgery, and fraudulent representation of facts” (Chawki et al., 2015b, pp.129).
‘Nigeria and Ghana are Anglophone Sub-Saharan nations separated and surrounded by Francophone nations. Despite multiple ethnic variations within and across these two countries, they have similarities: British colonization, English language, relatively, similar time of independence’ (Ibrahim, 2015, p.312).
Cyber-enabled crime and people-centric cybercrime will henceforth be interchangeably used.
It is noteworthy that unlike ICCC, 2006, ICCC, 2008, ICCC, 2009, ICCC, 2010, ICCC, 2011, ICCC, 2012, ICCC, 2013, ICCC, 2014 reports exclude the perpetrators’ league table.
For example, the first known exponent of the present-day 419 fraud, a former employee of the Marine Department of the colonial government of Lagos in 1920 – ‘Professor’ Crentsil, came from Ghana (Ellis, 2016).
For example, General Sanni Abacha, Nigerian president from 1993 to 1998 corruptly amassed a personal wealth of up to 4 billion USD (Igwe, 2007).
The ‘image-of-childhood’ refers broadly to the manner in which a given society perceives its children at a particular historical point in time and how children are expected to relate to the adult world (Ibrahim and Komulainen, 2016).
Publisher’s Notes: modified from the original to correct grammar and spelling, converting to American English. Table of Contents added.
PLEASE SHARE OUR ARTICLES WITH YOUR FRIENDS & FAMILY
HELP OTHERS STAY SAFE ONLINE – YOUR KNOWLEDGE CAN MAKE THE DIFFERENCE!
THE NEXT VICTIM MIGHT BE YOUR OWN FAMILY MEMBER OR BEST FRIEND!
Leave A Comment