468
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

Towards human dignity and the internet: The cybercrime (yahoo yahoo) phenomenon in Nigeria

, &

References

  • Achebe, C. 1983. The Trouble with Nigeria. London: Heinemann.
  • Adeniran, A. I. 2008. “The internet and emergence of yahoo-boys sub-culture in Nigeria.” International Journal of Cyber Criminology 2 (2): 368–381.
  • Aghatise, E. J. 2006. Cyber crime definition, Computer Crime Research Center. www.crime-research.org.
  • Akanle, O., S. Adebisi, and D. A. Busari. 2014. “The academy, student entrepreneurship and industrial development in Nigeria.” In D. O. Imhonopi, and U. M. Urim (eds.), Trajectories of industrial development in Nigeria (252–264). Ota: Department of Sociology, Covenant University, Nigeria.
  • Akanle, O., and O. B. Oladosu. 2010. “Youth restiveness and entrepreneurial orientations in Ijora-Badia, Lagos, Nigeria: A development approach.” Ibadan Journal of the Social Sciences 8 (2): 112–125.
  • Akanle, O., K. Adebayo, and O. Adetayo. 2014. “Fuel subsidy in Nigeria: Contexts of governance and social protest.” International Journal of Sociology and Social Policy 34 (1/2): 88–106. doi:10.1108/IJSSP-01-2013-0002.
  • Alder Consulting Report. 2003. Nigeria: Sigh in the dark. www.alder-consulting.com.
  • Aransiola, J. O., and S. O. Asindemade. 2011. “Understanding cybercrime perpetrators and the strategies they employ in Nigeria.” Cyberpsychology, Behavior, and Social Networking 14 (12): 759–763. doi:10.1089/cyber.2010.0307.
  • Arowosaiye, Y. I. 2008. The new phenomenon of phishing, credit card fraud, identity theft, internet piracy and Nigeria criminal law. Paper presented at the 3rd Conference on Law and Technology, Faculty of Law, University Kebangsaan, Malaysia and Faculty of Law, University of Tasmania, Australia, 11–12 November.
  • Bammeke, F. 2004. Leadership through education. Positive Leadership Monograph Series, 12. Lagos: Centre for Social Science Research and Development.
  • Burns, R. G., K. H. Whitworth, and C. Y. Thompson. 2004. “Assessing law enforcement preparedness to address internet fraud.” Journal of Criminal Justice 32 (5): 477–493. doi:10.1016/j.jcrimjus.2004.06.008.
  • Chawki, M., (2009). “Nigeria tackles advance free fraud.” Journal of Information, Law and Technology. 2009(1). http://go.warwick.ac.uk/jilt/2009_1/chawki.
  • Economic and Financial Crimes Commission (EFCC). 2012. “288 jailed for internet fraud.” EFCC. http://www.efccnigeria.org/20120416288%20jailed.html.
  • Gordon, M. P., M. P. Loef, W. Lucyshyn, and R. Richardson. 2004. CSI/FBI computer crime and security Survey. Los Angeles: Computer Security Institute.
  • Hassan, A. B., F. D. Lass, and J. Makinde. 2012. “Cybercrime in Nigeria: Causes, effects and the way out.” ARPN Journal of Science and Technology 2 (7): 626–631.
  • Ige, O. A. 2008. Secondary school students’ perceptions of incidences of internet crimes among school age children in Oyo and Ondo States, Nigeria. Master’s dissertation, Department of Teacher Education, University of Ibadan.
  • Jaishankar, K. 2008. Space transition theory of crime.” In F. Schmalleger and M. Pittaro (eds.), Crimes of the Internet (283–301). New York: Prentice Hall.
  • Katyal, K. N. 2003. “Digital architecture as crime control.” Yale Law Journal 112 (8): 2261–2289. doi:10.2307/3657476.
  • Koinange, J. (2002) Internet fleecing scams thrive in Nigeria. http://archives.cnn.com/2002/TECH/internet/08/11/nigeria.scam/index.html
  • Lee, W. A. 2003. “Progress report from BITS on fraud prevention efforts.” The American Banker 168 (60): 1.
  • Longe, O. B., and S. C. Chiemeke. 2008. “Cyber crime and criminality in Nigeria: What roles are internet access points playing?” European Journal of Soil Science 6 (4): 132–139.
  • Messner, S. F. 1988. “Merton’s ‘Social Structure and Anomie’: The road not taken.” Deviant Behavior 9 (1): 33–53. doi:10.1080/01639625.1988.9967766
  • Merton, R. K. 1957. Social theory and social structure. New York: The Free Press.
  • Messner, S. F., and R. Rosenfeld. 2001a. Crime and the American Dream. 3rd ed. Belmont, CA: Wadsworth.
  • Messner, S. F., and R. Rosenfeld. 2001b. An Institutional-Anomie Theory of Crime.” In R. Paternoster and R. Bachman (eds.), Explaining Criminals and Crime (151–160). Los Angeles, CA: Roxbury.
  • Peel, M. (2006). Nigeria Related Financial Crimes and Its links with Britain: An Africa Programme Report. http://www.chathanhouse.org.uk/pdf/research/africa/nigeria1106pdf.
  • Moses-Oke, R.O. 2012. Cyber Capacity without Cyber Security: A Case Study of Nigeria’s National Policy for Information Technology (NPFIT). The Journal of Philosophy, Science & Law. 12, www.miami.edu/ethics/jpsl.
  • National Bureau of Statistics. 2011. Gender Statistics. Newsletter, 2(2).
  • Ninalowo, A. 2004. Essays on the State and Civil Society. Lagos: First Academic Publishers.
  • Media, P. B. I. 2003. “Taking a bite out of financial fraud.” PBI Media, LLC 14 (4): 1–6.
  • Ogwezzy, M. C. 2012. Cyber crime and the proliferation of yahoo addicts in Nigeria. AGORA International Journal of Juridical Sciences. (1), 86–102.
  • Olusola, M., O. Samson, A. Semiu, and A. Yinka. 2013. “Cybercrimes and cyber laws in Nigeria.” International Journal of Engineering Science 2 (4): 19–25.
  • Olutayo, A.O. and Akanle O. (2011). Fighting the “Poverty War”: Non-governmental organizations and the challenge of poverty eradication in Nigeria. In A. P. Mutis and S.O. Okuro (eds.), Strategies against poverty: Designs from the North and alternatives from the South (245–272). Buenos Aires: CLACSCO-CROP.
  • Owasanoye, B., and O. Akanle. 2010. “ICTs, freedom of information and privacy rights in Nigeria: A legal analysis.” East African Journal of Peace and Human Rights. 16 (1): 99–123.
  • Reddick, R., and E. King. 2000. The Online Student: Making the Grade on the Internet. Fort Worth: Harcourt Brace.
  • Rosenfeld, R., and Messner, S. F. (1997). “Markets, morality, and an institutional anomie theory of crime.” In N. Passas & R. Agnew, (eds.), The future of anomie theory (207–224). Boston: Northeastern University Press.
  • Storer, N. W. 1973. Robert K. Merton: The sociology of science: Theoretical and empirical investigations. Chicago and London: The University of Chicago Press.
  • Tade, O., and I. Aliyu. 2011. “Social organization of internet fraud among university undergraduates in Nigeria.” International Journal of Cyber Criminology. 5 (2): 860–875.
  • Theel, T., G. Stephens, and M. Easland. 2001. “Demand it.” Satellite Communications 24: 26–31.
  • World Bank. 2014. Nigeria. http://data.worldbank.org/country/nigeria.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.