Your urgent assistance is requested: The intersection of 419 spam and new networks of imagination

Ethics, Place and Environment 10 (1):65 – 88 (2007)
  Copy   BIBTEX

Abstract

This article introduces a series of measures of the geographical manifestation of a subset of unsolicited commercial email, i.e. spam, used to perpetrate 'advanced fee fraud'. Known as '419 spam', this activity has strong historic ties to Nigeria, where similar frauds were operated via physical letters and faxes during the 1970s and 1980s. This article's analysis reveals that 419 spam operates via a globally dispersed network that nevertheless contains a clear agglomeration of activity in West Africa. Building upon theories of the intersection of cyberspace, states, and individuals, this article argues that 419 spam exemplifies the challenge offered by the Internet to the dominance of states by allowing individuals and movements to create social space that transcends borders. This process is an intriguing and ironic parallel to the description of the rise of the European nation-state as an 'imagined community' that challenged medieval systems of authority and existing social epistemologies. The emerging 'networks of imagination' developed by transnational social movements and criminal networks to define their sphere of operations present a similar challenge to the primacy of existing authority embedded in the state, particularly for states in crisis such as Nigeria. The article concludes with an examination of the off-line and online implications of 419 spam and its network of imagination for the Nigerian state and its inhabitants. Ranging from strengthening public conceptions of West Africa as a sea of corruption to a decreased ability to interact with the outside world, 419 spammers are playing an important, if illicit, role in the construction and use of Nigeria's and the world's Internet.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,423

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Ethical reflections on the problem of spam.R. A. Spinello - 1999 - Ethics and Information Technology 1 (3):185-191.
What Am I?John L. Pollock - 2008 - Philosophy and Phenomenological Research 76 (2):237-309.
Is Imagination Introspective?Kevin Reuter - 2011 - Philosophia 39 (1):31-38.
Choosing a food future: Differentiating among alternative food options. [REVIEW]Jeffrey R. Follett - 2009 - Journal of Agricultural and Environmental Ethics 22 (1):31-51.
Global networks.R. J. Holton - 2008 - New York: Palgrave-Macmillan.
The ethical status of non-commercial spam.Emma Rooksby - 2007 - Ethics and Information Technology 9 (2):141-152.

Analytics

Added to PP
2009-01-28

Downloads
18 (#814,090)

6 months
8 (#347,798)

Historical graph of downloads
How can I increase my downloads?

References found in this work

Simulacra and Simulation.Jean Baudrillard - 1994 - University of Michigan Press.

Add more references