Results for ' cybercrime'

42 found
Order:
  1. Cybercrime pandemic.Marites V. Fontanilla - 2020 - Eubios Journal of Asian and International Bioethics 30 (4):161-165.
    With the rising of the reported cases of COVID-19 and home quarantine being implemented, the Internet became a channel for effective human interaction. Doing most of the work online brought an increasing number of online fraudsters to exploit the public fear of the pandemic to attack people through cybercrime. This paper introduces what cybersecurity is all about. It also lists some of the cybersecurity issues that are being faced at this time. Further, it discusses forms of attacks being encountered (...)
     
    Export citation  
     
    Bookmark  
  2.  6
    Cybercrime: A Challenge to Law Enforcement.Besa Arifi & Dora Arifi - 2020 - Seeu Review 15 (2):42-55.
    When comparing 100 years ago and today, we always mention the social, economic and political changes that have influenced the emergence and development of the opportunities that we have today, with special emphasis on technological changes. Technology has evolved so fast that it seems that in the blink of an eye something new has just hit the market. Whether we like it or not, technology has become part of us, part of our lives, where we upon spend a great deal (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  69
    A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenon.Oludayo Tade - 2013 - Human Affairs 23 (4):689-705.
    Cybercrime in Nigeria is largely perpetrated by young people and students in tertiary institutions, and are socially tagged yahoo yahoo or yahoo boys. Yahoo boys rely on their computer dexterity to victimise unsuspecting persons in cyberspace. A new phenomenon in cybercrime is mixing spiritual elements with internet surfing to boost cybercrime success rates. This paper examines the factors underlying this spiritual dimension to cybercrime, and discusses some of the strategies employed in perpetuating cyber crime. Using Space (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  4.  18
    Legislation on Cybercrime in Lithuania: Development and Legal Gaps in Comparison with Convention on Cybercrime.Darius Sauliūnas - 2010 - Jurisprudencija: Mokslo darbu žurnalas 122 (4):203-219.
    The Convention on Cybercrime (the Convention) adopted in the framework of the Council of Europe is the main international legislative tool in the fight against cybercrime. It is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. Lithuania is among its signatory states, therefore, the provisions of the Convention have become binding on its legislator, obliging it to take (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  49
    Examination of cybercrime and its effects on corporate stock value.Katherine Taken Smith, Amie Jones, Leigh Johnson & Lawrence Murphy Smith - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):42-60.
    Purpose Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company’s reputation, which in turn may affect the company’s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  3
    International Conference on Cyberlaw, Cybercrime & Cybersecurity.Pavan Duggal - 2016 - International Review of Information Ethics 25.
    This article reports from the International Conference on Cyberlaw, Cybercrime & Cybersecurity. The Conference was addressed by more than 150 speakers backed by more than 80 supporters. It was a wonderful opportunity to network with international thought leaders under one roof.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  8
    ‘We Attempted to Deliver Your Package’: Forensic Translation in the Fight Against Cross-Border Cybercrime.Rui Sousa-Silva - forthcoming - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique:1-27.
    Cybercrime has increased significantly, recently, as a result of both individual and group criminal practice, and is now a threat to individuals, organisations, and democratic systems worldwide. However, cybercrime raises two main challenges for legal systems: firstly, because cybercriminals operate online, cybercrime spans beyond the boundaries of specific jurisdictions, which constrains the operation of the police and, subsequently, the conviction of the perpetrators; secondly, since cybercriminals can operate from anywhere in the world, law enforcement agencies struggle to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  10.  23
    Exploring the value of feminist theory in understanding digital crimes: Gender and cybercrime types.Suleman Lazarus, Mark Button & Richard Kapend - 2022 - Howard Journal of Crime and Justice 1 (1):1-18.
    Do men and women perceive cybercrime types differently? This article draws on the distinction between socio-economic and psychosocial cybercrime proposed by Lazarus (2019) to investigate whether men and women hold different perceptions of digital crimes across these two dimensions. Informed by the synergy between feminist theory and the Tripartite Cybercrime Framework (TCF), our survey examined respondents’ differential perceptions of socio-economic cybercrime (online fraud) and psychosocial cybercrime (cyberbullying, revenge porn, cyberstalking, online harassment) among men and women (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  11.  21
    Tweets and reactions: revealing the geographies of cybercrime perpetrators and the North-South divide.Suleman Lazarus & Mark Button - 2022 - CyberPsychology, Behavior, and Social Networking 8 (1):1-8.
    How do tweets reflect the long-standing disparities between the northern and southern regions of Nigeria? This study presents a qualitative analysis of Twitter users' responses (n = 101,518) to the tweets of the Economic and Financial Crimes Commission (EFCC) regarding the production and prosecution of cybercrime. The article uses postcolonial perspectives to shed light on the legacies of British colonial efforts in Nigeria, such as the amalgamation of the northern and southern protectorates in 1914. The results revealed significant discrepancies (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Strategies of displacement and other violations of territoriality : cybercrime, the World Wide Web and the ambit of criminal law.Gareth Sansom - 2009 - In Albert Breton (ed.), Multijuralism: Manifestations, Causes, and Consequences. Ashgate.
     
    Export citation  
     
    Bookmark  
  13.  6
    Assessing the Factors Associated With the Detection of Juvenile Hacking Behaviors.Jin Ree Lee & Thomas J. Holt - 2020 - Frontiers in Psychology 11.
    Research on delinquency reduction often highlights the importance of identifying and sanctioning antisocial and illegal activities so as to reduce the likelihood of future offending. The rise of digital technology complicates the process of detecting cybercrimes and technology enabled offenses, as individuals can use devices from anywhere to engage in various harmful activities that may appear benign to an observer. Despite the growth of cybercrime research, limited studies have examined the extent to which technology enabled offenses are detected, or (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. What Nigerian hip-hop lyrics have to say about the country’s Yahoo Boys.Suleman Lazarus - 2019 - The Conversation.
    The article is based on lyrics from 2007 to 2017 involving 18 hip-hop artists. All the songs I studied were by male singers apart from one entitled, “Maga no need pay,” which involved seven multiple artists. In all the songs, the glamorization of cybercrime and cybercriminals was one of the most significant themes. The implications are discussed.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Book review: 'The law relating to financial crime in the United Kingdom (Second edition)'. [REVIEW]Sally Ramage - 2017 - Current Criminal Law 9 (4):02-27.
    Professor Nicholas Ryder (see Appendix A for a list of his published works) and Dr Karen Harrison (see Appendix B for a list of her published works) have produced this second edition of The Law relating to financial crime in the United Kingdom (published by Routledge of Taylor & Francis Group) in order to bring the work up-to-date; to include recent legislation and government policy developments; and also to add the financial crime topics of tax evasion, market manipulation (including insider (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  9
    A crisis that changed the banking scenario in India: exploring the role of ethics in business.Sushma Nayak & Jyoti Chandiramani - 2022 - Asian Journal of Business Ethics 11 (1):7-32.
    Digital business has marked an era of transformation, but also an unprecedented growth of cyber threats. While digital explosion witnessed by the banking sector since the COVID-19 pandemic has been significant, the level and frequency of cybercrimes have gone up as well. Cybercrime officials attribute it to remote working—people using home computers or laptops with vulnerable online security than office systems; malicious actors relentlessly developing their tactics to find new ways to break into enterprise networks and grasping defence evasion; (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  11
    Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses.Alexander Wentland & Nina Klimburg-Witjes - 2021 - Science, Technology, and Human Values 46 (6):1316-1339.
    Today, social engineering techniques are the most common way of committing cybercrimes through the intrusion and infection of computer systems. Cybersecurity experts use the term “social engineering” to highlight the “human factor” in digitized systems, as social engineering attacks aim at manipulating people to reveal sensitive information. In this paper, we explore how discursive framings of individual versus collective security by cybersecurity experts redefine roles and responsibilities at the digitalized workplace. We will first show how the rhetorical figure of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  32
    Legal dilemmas of Estonian artificial intelligence strategy: in between of e-society and global race.Tanel Kerikmäe & Evelin Pärn-Lee - forthcoming - AI and Society:1-12.
    Estonia has successfully created a digital society within the past 2 decades. It is best known for its eGovernment achievements, but it is also home for four unicorn star-ups. While the state is aiming to attract tech investments with e-Residency program and has recently started to invest into protecting national IP and safeguarding data from cybercrime by applying blockchain technology and creating its “digital embassy” in Luxembourg, emerging technologies such as and applications of artificial intelligence but also internet of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  34
    Consumer protection and electronic commerce in the Sultanate of Oman.Rakesh Belwal, Rahima Al Shibli & Shweta Belwal - 2021 - Journal of Information, Communication and Ethics in Society 19 (1):38-60.
    PurposeWithin a larger mandate of reviewing the key global trends concerning consumer protection in the electronic commerce (e-commerce) literature, this study aims to study the legal framework concerning e-commerce and consumer protection in the Sultanate of Oman and to analyse the current regulations concerning e-commerce and consumer protection.Design/methodology/approachThis study followed the normative legal research approach and resorted to the desk research process to facilitate content analysis of literature containing consumer protection legislation and regulatory provisions in Oman in particular and the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  30
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare.George R. Lucas - 2016 - New York, US: Oxford University Press USA.
    From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence cyber warfare, developing a practical moral code for this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  13
    Academic Information Security Researchers: Hackers or Specialists?Mehdi Dadkhah, Mohammad Lagzian & Glenn Borchardt - 2018 - Science and Engineering Ethics 24 (2):785-790.
    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  18
    Security and privacy of adolescents in social applications and networks: legislative aspects and legal practice of countering cyberbullying on example of developed and developing countries.Ahmad Ghandour, Viktor Shestak & Konstantin Sokolovskiy - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):433-445.
    Purpose This paper aims to study the developed countries’ experience on the cyberbullying legal regulation among adolescents, to identify existing shortcomings in the developing countries’ laws and to develop recommendations for regulatory framework improvement. Design/methodology/approach The authors have studied the state regulatory practice of the UK, the USA, Canada, Malaysia, South Africa, Turkey, UAE and analyzed the statistics of 2018 on the cyberbullying manifestation among adolescents in these countries. Findings The study results can encourage countries to create separate cyberbullying legislation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  3
    Cyber law and ethics: regulation of the connected world.Mark Grabowski - 2021 - New York: Taylor & Francis. Edited by Eric P. Robinson.
    A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence, and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in journalism, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  11
    New Modes of Governance in the Global System: Exploring Publicness, Delegation and Inclusiveness.Mathias Koenig-Archibugi & Michael Zürn (eds.) - 2006 - Palgrave-Macmillan.
    Globalization processes are propelling a transformation of governance. As political problems become more transnational, public as well as private actors increasingly perform governance activities beyond the level of individual states. This book examines the wide variety of forms that governance can take in the global system and their consequences. An overarching analytical framework is applied to global institutions and initiatives in areas such as trade liberalization, financial market regulation, privacy protection, cybercrime, and food safety.
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  4
    A ghost in the machine: Tracing the role of ‘the digital’ in discursive processes of cybervictimisation.Simon Lindgren - 2018 - Discourse and Communication 12 (5):517-534.
    The study of discursive understandings of cybervictimisation draws on a dataset of crime news reporting and asks the question of if and how cybervictimisation is construed in ways that differ from other types of victimisation. Building on a critical discourse perspective employing corpus-based text analysis methods, the composition of news discourses about cybervictimisation are analysed, alongside the relationship between such representations and news media discourse on crime victimisation generally. The aim is to see what effect the presence of a digital (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  6
    1 Timothy 6:6–14 and materialism amongst Nigerian Christian youths.Chidinma P. Ukeachusim - 2022 - HTS Theological Studies 78 (3).
    Increasing involvement of Nigerian youths in cybercrime and fraud, ritual activities, prostitution, human and drug trafficking, kidnapping, robbery and hired killings reveal the growing materialism of a significant number of Nigerian youths, including uncountable numbers of professed Nigerian Christian youths. There is the need to address materialism amongst Nigerian youths with special reference to Nigerian Christian youths. Paul’s moral instructions to Timothy are still relevant for Nigerian Christian youths to emulate. Therefore, this study employs a redaction critical method of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  1
    Proverbs 4:10–19 and the growing spate of Internet fraud amongst Nigerian youths.Favour C. Uroko - 2021 - HTS Theological Studies 77 (4):7.
    This research article examines the increasing spate of youths who engage in fraudulent Internet activities in Nigeria in the light of Proverbs 4:10–19. Nigerian youths are fast becoming impatient with their quest for wealth. This had led many of them to engage in high-level fraudulent Internet activities. It has come to a point where Internet fraudsters opened schools to teach prospecting youths how to make money fast. The circle keeps expanding on a daily basis. Their victims include the rich, the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  14
    Privacy concerns in integrating big data in “e-Oman”.Stuti Saxena - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):385-396.
    Purpose Whereas integration of big data in “e-Oman” – the e-government face of Oman – is a significant prospect, this paper aims to underscore the challenges of privacy concerns in effecting such integration. Design/methodology/approach Providing a brief description about the concepts of e-government and big data, the paper follows a discussion on “e-Oman”. While drawing a framework for integration of big data in “e-Oman”, the paper throws light on the privacy concerns in effecting such an integration following a qualitative approach. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  63
    Cyberbullying in Nigeria: Examining the Adequacy of Legal Responses.Adejoke O. Adediran - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 34 (4):965-984.
    Cyberbullying has been defined as the “process of using the internet, cell phones or other devices to send or post text or images intended to hurt or embarrass another person.” The word “cyberbullying” is often used interchangeably with “cyber stalking” and in fact the Cybercrimes Act 2015 of Nigeria, uses the word “cyber stalking” which it defines as any course of conduct directed at a specific person that would cause a reasonable person to feel fear. By the provisions of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Balance or Trade-off? Online Security Technologies and Fundamental Rights.Mireille Hildebrandt - 2013 - Philosophy and Technology 26 (4):357-379.
    In this contribution, I will argue that the image of a balance is often used to defend the idea of a trade-off. To understand the drawbacks of this line of thought, I will explore the relationship between online security technologies and fundamental rights, notably privacy, nondiscrimination, freedom of speech and due process. After discriminating between three types of online security technologies, I will trace the reconfiguration of the notion of privacy in the era of smart environments. This will lead to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  31.  21
    Cheques or dating scams? Online fraud themes in hip-hop songs across popular music apps.Suleman Lazarus, Olaigbe Olaigbe, Ayo Adeduntan, Tochukwu Dibiana, Edward & Uzoma OKolorie, Geoffrey - 2023 - Journal of Economic Criminology 2:1-17.
    How do hip-hop songs produced from 2017 to 2023 depict and rationalize online fraud? This study examines the depiction of online fraudsters in thirty-three Nigerian hip-hop songs on nine popular streaming platforms such as Spotify, Deezer, iTunes, SoundCloud, Apple Music, and YouTube. Using a directed approach to qualitative content analysis, we coded lyrics based on the moral disengagement mechanism and core themes derived from existing literature. Our findings shed light on how songs (a) justify the fraudulent actions of online fraudsters, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  27
    African youths and the dangers of social networking: a culture-centered approach to using social media.Philip Effiom Ephraim - 2013 - Ethics and Information Technology 15 (4):275-284.
    With rising numbers of Facebook, Twitter and MXit users, Africa is increasingly gaining prominence in the sphere of social networking. Social media is increasingly becoming main stream; serving as important tools for facilitating interpersonal communication, business and educational activities. Qualitative analyses of relevant secondary data show that children and youths aged between 13 and 30 constitute Africa’s heaviest users of social media. Media reports have revealed cases of abuse on social media by youths. Social networks have severally been used as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  63
    Open Sourcing Normative Assumptions on Privacy and Other Moral Values in Blockchain Applications.Georgy Ishmaev - 2019 - Dissertation, Delft University of Technology
    The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler for revolutionary positive social transformations of all kinds. Such technological determinism, however, hardly provides insights of sufficient depth on the moral significance of blockchain technology. This thesis argues rather, that very much like the cryptographic tools before them, blockchains develop in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  13
    Philosophy in an Age of Crisis.Marie Pauline Eboh - 2019 - Dialogue and Universalism 29 (3):113-123.
    Crisis means “decisive moment,” a dangerous time when action must be taken to avoid a complete disaster. In the digital age, the influx of information is extremely rapid. Many people lack the wisdom and prudence to process data correctly and to take timely moral decisions. Too much information is driving people crazy as increase in knowledge goes with an upsurge in crime rate, particularly cybercrime. This historic period is an era of multiple crises, especially crisis of human values, particularly (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  4
    Yahooism or Internet Fraud in the Nigerian Higher Education System.Peter Eshioke Egielewa - 2022 - Journal of Ethics in Higher Education 1:75-101.
    This study interrogates narrow-mindedness and laziness leading many of the Nigerian undergraduates to be tempted to cheat and fraud on Internet instead of working hard for their studies. The author proposes a contextual survey around a tendency also called “yahooism”, “yahoo-yahooism”, as most of the first attempted cybercrimes were realized by sending yahoo emails. This harmful tendency is contrasted with Prof Obiora Ike’s teaching on the value of hard work as the road to wealth. The study used the quantitative survey (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  8
    Economic crime in the information environment.Vera Evgenievna Shumilina, Tatyana Alexandrovna Scherbakova & Alexandr Yaroslavovich Kochetov - 2021 - Kant 39 (2):121-126.
    The purpose of the study is to reveal the essence of economic security in the Internet environment, to identify and analyze statistical data on this issue. The scientific novelty of the study lies in the fact that for the first time a comparison with foreign practice is made. As a result, some places that require improvement in this area are identified, the essence and understanding of new terms are revealed, and the principle of neural networks is explained. This work is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  38.  24
    Cyber terrorism: A case study of islamic state.Zaheema Iqbal & Khurram Iqbal - 2017 - Journal of Social Sciences and Humanities 56 (2):67-79.
    In today’s postmodern world with the latest and top notch internet technologies in the market, if it has become easy and accessible for everyone to communicate with others sitting at the other corner of the world, it has also given rise to the cybercrimes including cyber terro rism which has not only provided grave threats to the whole world but also posed a question of whether with the manipulation of cyber space, cyber terrorists can damage or destroy the physical infrastructure (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  40. Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”).Suleman Lazarus, Mark Button & Afe Adogame - 2022 - Heliyon Journal 8 (11):1-10.
    This article is about the manifestations of similarities between two seemingly distinct groups of Nigerians: cybercriminals and politicians. Which linguistic strategies do Twitter users use to express their opinions on cybercriminals and politicians? The study undertakes a qualitative analysis of ‘engaged’ tweets of an elite law enforcement agency in West Africa. We analyzed and coded over 100,000 ‘engaged’ tweets based on a component of mechanisms of moral disengagement (i.e., advantageous comparison), a linguistic device. The results reveal how respondents defend the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  61
    The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  97
    Neutralization theory and online software piracy: An empirical analysis. [REVIEW]Sameer Hinduja - 2007 - Ethics and Information Technology 9 (3):187-204.
    Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly related (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations