Matches in SemOpenAlex for { <https://semopenalex.org/work/W2023265233> ?p ?o ?g. }
Showing items 1 to 76 of
76
with 100 items per page.
- W2023265233 endingPage "763" @default.
- W2023265233 startingPage "759" @default.
- W2023265233 abstract "A lot has been written on cybercrime and its prevention, but the problem has proved particularly resilient to remedial action. Desperate and vulnerable individuals in every continent continue to fall into its trap. Despite this, there is dearth of descriptive study that attempts to unravel the strategies employed by the perpetrators in Nigeria, as an important precondition for workable and reliable policy direction to address the problem. This article has filled this gap by using data from 40 cybercrime perpetrators selected with snowballing technique. The findings revealed that most of the cybercrime perpetrators in Nigeria are between the age of 22 and 29 years who were undergraduates and have distinctive lifestyles from other youths. Their strategies include collaboration with security agents and bank officials, local and international networking, and the use of voodoo that is, traditional supernatural power. It was clear that most perpetrators of cybercrime were involved in on-line dating and buying and selling with fake identity among others. The article discussed the need for reorientation of Nigerian youths in higher institutions, and various methods as guiding principles for potential victims. It recommended a complete reorganization of the Nigerian Police Force and Economic and Financial Crime Commission, as some of the officers in the institutions aid and abet cybercrime. It finally suggested a review of the Nigerian law guiding the operations of banking, poster agencies, and various speed post services in the country, as these are necessary preconditions to effectively combat the problem." @default.
- W2023265233 created "2016-06-24" @default.
- W2023265233 creator A5042896966 @default.
- W2023265233 creator A5053495866 @default.
- W2023265233 date "2011-12-01" @default.
- W2023265233 modified "2023-10-10" @default.
- W2023265233 title "Understanding Cybercrime Perpetrators and the Strategies They Employ in Nigeria" @default.
- W2023265233 cites W4241764137 @default.
- W2023265233 doi "https://doi.org/10.1089/cyber.2010.0307" @default.
- W2023265233 hasPubMedId "https://pubmed.ncbi.nlm.nih.gov/22007957" @default.
- W2023265233 hasPublicationYear "2011" @default.
- W2023265233 type Work @default.
- W2023265233 sameAs 2023265233 @default.
- W2023265233 citedByCount "42" @default.
- W2023265233 countsByYear W20232652332013 @default.
- W2023265233 countsByYear W20232652332014 @default.
- W2023265233 countsByYear W20232652332015 @default.
- W2023265233 countsByYear W20232652332016 @default.
- W2023265233 countsByYear W20232652332017 @default.
- W2023265233 countsByYear W20232652332018 @default.
- W2023265233 countsByYear W20232652332019 @default.
- W2023265233 countsByYear W20232652332020 @default.
- W2023265233 countsByYear W20232652332021 @default.
- W2023265233 countsByYear W20232652332022 @default.
- W2023265233 countsByYear W20232652332023 @default.
- W2023265233 crossrefType "journal-article" @default.
- W2023265233 hasAuthorship W2023265233A5042896966 @default.
- W2023265233 hasAuthorship W2023265233A5053495866 @default.
- W2023265233 hasConcept C110875604 @default.
- W2023265233 hasConcept C136764020 @default.
- W2023265233 hasConcept C144024400 @default.
- W2023265233 hasConcept C144133560 @default.
- W2023265233 hasConcept C17744445 @default.
- W2023265233 hasConcept C199539241 @default.
- W2023265233 hasConcept C2776034101 @default.
- W2023265233 hasConcept C2779390178 @default.
- W2023265233 hasConcept C38652104 @default.
- W2023265233 hasConcept C39549134 @default.
- W2023265233 hasConcept C41008148 @default.
- W2023265233 hasConcept C522325796 @default.
- W2023265233 hasConcept C73484699 @default.
- W2023265233 hasConceptScore W2023265233C110875604 @default.
- W2023265233 hasConceptScore W2023265233C136764020 @default.
- W2023265233 hasConceptScore W2023265233C144024400 @default.
- W2023265233 hasConceptScore W2023265233C144133560 @default.
- W2023265233 hasConceptScore W2023265233C17744445 @default.
- W2023265233 hasConceptScore W2023265233C199539241 @default.
- W2023265233 hasConceptScore W2023265233C2776034101 @default.
- W2023265233 hasConceptScore W2023265233C2779390178 @default.
- W2023265233 hasConceptScore W2023265233C38652104 @default.
- W2023265233 hasConceptScore W2023265233C39549134 @default.
- W2023265233 hasConceptScore W2023265233C41008148 @default.
- W2023265233 hasConceptScore W2023265233C522325796 @default.
- W2023265233 hasConceptScore W2023265233C73484699 @default.
- W2023265233 hasIssue "12" @default.
- W2023265233 hasLocation W20232652331 @default.
- W2023265233 hasLocation W20232652332 @default.
- W2023265233 hasOpenAccess W2023265233 @default.
- W2023265233 hasPrimaryLocation W20232652331 @default.
- W2023265233 hasRelatedWork W1559396486 @default.
- W2023265233 hasRelatedWork W1648378477 @default.
- W2023265233 hasRelatedWork W197818113 @default.
- W2023265233 hasRelatedWork W2032900633 @default.
- W2023265233 hasRelatedWork W2911255625 @default.
- W2023265233 hasRelatedWork W2981402749 @default.
- W2023265233 hasRelatedWork W3214845967 @default.
- W2023265233 hasRelatedWork W4382995152 @default.
- W2023265233 hasRelatedWork W4383958775 @default.
- W2023265233 hasRelatedWork W4387348233 @default.
- W2023265233 hasVolume "14" @default.
- W2023265233 isParatext "false" @default.
- W2023265233 isRetracted "false" @default.
- W2023265233 magId "2023265233" @default.
- W2023265233 workType "article" @default.