185
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Politicization of Economic Cybercrime: Perceptions Among Ghanaian Facebook Users

Pages 483-502 | Received 13 Apr 2023, Accepted 25 Aug 2023, Published online: 06 Sep 2023

References

  • Abdulai, R. T. and A. Gyima. 2021. ““Afa-Tibrisi”: An Exploratory Study of the Role of Charismatic Religious Leaders in Sakawa Cybercrime in Tamale, Ghana.” Journal of Qualitative Criminal Justice and Criminology 9(1):1–24.
  • Aboagye, P. Y. and J. Bolt. 2021. “Long-Term Trends in Income Inequality: Winners and Losers of Economic Change in Ghana, 1891–1960.” Explorations in Economic History 82:101405. doi:10.1016/j.eeh.2021.101405.
  • Abubakari, Y. 2021. “The Reasons, Impacts and Limitations of Cybercrime Policies in Anglophone West Africa: A Review.” Social Space Journal 1(20):1–22.
  • Acemoglu, D. and V. Thierry. 1998. “Property Rights, Corruption and the Allocation of Talent: A General Equilibrium Approach.” The Economic Journal 108(450): 1381–403. doi:10.1111/1468-0297.00347.
  • Agnew, R. 2017. “General Strain Theory.” Preventing Crime and Violence 21–30. doi:10.1007/978-3-319-44124-5_3.
  • Akuta, E. A., I. Monari, and C. R. Jones. 2011. “Combating Cyber Crime in Sub-Sahara Africa ; A Discourse on Law, Policy and Practice.” Gender and Development 1(May):129–37.
  • Alhassan, A. R. K. and A. Ridwan. 2021. “Identity Expression—The Case of ‘Sakawa’ Boys in Ghana.” Human Arenas 6(2): 242–63. doi:10.1007/s42087-021-00227-w.
  • Anderson, R., C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. 2013. “Measuring the Cost of Cybercrime.” The Economics of Information Security and Privacy 265–300. doi:10.1007/978-3-642-39498-0_12.
  • Antwi-Boasiako, A. 2020, October 1. Ghana Records Over 11,000 Cybercrime Cases Since 2019 - Graphic Online. (https://www.graphic.com.gh/news/general-news/ghana-records-over-11-000-cybercrime-cases-in-a-year.html).
  • Block, F. 2021. “The Ruling Class Does Not Rule: Notes on the Marxist Theory of the State.“ The Political Economy: Readings in the Politics and Economics of American Public Policy, Pp. 32–46. New York: Routledge.
  • Boateng, R., O. Longe, V. Mbarika, and I. Avevor. 2011. “Cyber Crime and Criminality in Ghana: Its Forms and Implications.” Amcis 2(April 2015):85–100. (http://works.bepress.com/richardboateng/1/).
  • Boes, S. and E. R. Leukfeldt. 2017. “Fighting Cybercrime: A Joint Effort.” Cyber-Physical Security 185–203. doi:10.1007/978-3-319-32824-9_9.
  • Bossler, A. A. and T. J. Holt. 2012. “Patrol officers’ Perceived Role in Responding to Cybercrime.” Policing 35(1): 165–81. doi:10.1108/13639511211215504.
  • Bouvier, G. 2015. “What is a Discourse Approach to Twitter, Facebook, YouTube and Other Social Media: Connecting with Other Academic Fields?” Journal of Multicultural Discourses 10(2):149–62. doi:10.1080/17447143.2015.1042381.
  • Braga, A. A., B. C. Welsh, and C. Schnell. 2015. “Can Policing Disorder Reduce Crime? A Systematic Review and Meta-Analysis.” Journal of Research in Crime and Delinquency 52(4):567–88. doi:10.1177/0022427815576576.
  • Braun, V. and V. Clarke. 2012. “Thematic Analysis.” Pp. 57–71 in Handbook of Research Methods in Psychology, Vol. 2. doi:10.1037/13620-004.
  • Buchanan, T. and M. T. Whitty. 2014. “The Online Dating Romance Scam: Causes and Consequences of Victimhood.” Psychology, Crime and Law 20(3):261–83. doi:10.1080/1068316X.2013.772180.
  • Cairns, C. M. (2017). China’s Weibo Experiment: Social Media (Non-) Censorship and Autocratic Responsiveness [Cornell University]. (https://search.proquest.com/openview/e5c10b110b6b42d449a809daa5a2e703/1?pq-origsite=gscholar&cbl=18750).
  • Chairul, M., B. Umanailo, W. Nwankwo, I. Fachruddin, D. Mayasari, R. Kurniawan, N. Agustin, R. Ganefwati, P. Daulay, A. Meifilina, et al. 2019. “Cybercrime Case as Impact Development of Communication Technology That Troubling Society.” Academia Education 8(9):1224–28. (https://www.academia.edu/download/60752583/Cybercrime-Case-As-Impact-Development-Of-Communication-Technology-That-Troubling-Society20190930-46380-p00svz.pdf).
  • Chaudhry, I. and A. Gruzd. 2020. “Expressing and Challenging Racist Discourse on Facebook: How Social Media Weaken the “Spiral of Silence” Theory.” Policy & Internet 12(1):88–108. doi:10.1002/POI3.197.
  • Childs, K. M. 2022. ““The Shade of It All”: How Black Women Use Instagram and YouTube to Contest Colorism in the Beauty Industry.” Social Media + Society 8(2):205630512211076. doi:10.1177/20563051221107634.
  • Chiluwa, I. M., I. Kamalu, and S. Anurudu. 2020. “Deceptive Transparency and Masked Discourses in Ponzi Schemes: A Critical Discourse Analysis of MMM Nigeria.” Critical Discourse Studies 19(1): 55–72. doi:10.1080/17405904.2020.1816481.
  • Cross, C., T. Holt, A. Powell, and M. Wilson. 2021. Responding to Cybercrime: Perceptions and Need of Australian Police and the General Community. Australian Institute of Criminology. (https://www.aic.gov.au/sites/default/files/2021-08/CRG_Respondingtocybercrime_0.pdf).
  • Csonka, P. 2006. “The Council of Europe’s Convention on Cyber-Crime and Other European Initiatives.” Revue Internationale de Droit Penal 77(3): 473–501. doi:10.3917/RIDP.773.0473.
  • Danny, P. (2022, March 28). Man Linked to Multi-Million Dollar Ransomware Attacks Gets 66 Months in Prison for Online Fraud. ZDNet. (https://www.zdnet.com/article/man-linked-to-multi-million-dollar-ransomware-attacks-gets-66-months-in-prison-for-online-fraud/).
  • Davis, B. and K. Dossetor. 2010. “(Mis)perceptions of Crime in Australia.” Trends & Issues in Crime & Criminal Justice 396. (https://www.aic.gov.au/publications/tandi/tandi396).
  • Duah, F. A. and A. M. Kwabena. 2015. “The Impact of Cyber Crime on the Development of Electronic Business in Ghana.“ European Journal of Business and Social Sciences 4(1):22–34.
  • Dukku, M. K. 2019. “The Nature, Causes and Consequences of Cyber Crime in Tertiary Institutions in Gombe, Gombe State, Nigeria.” International Journal of Educational Research and Management Technology 4(1):100–15.
  • Dukoa, S. 2021. Ghana: Active Social Media Users 2017-2021 | Statista. Statista. (https://www.statista.com/statistics/1171445/number-of-social-media-users-ghana/).
  • Eboibi, F. E. 2017. “A Review of the Legal and Regulatory Frameworks of Nigerian Cybercrimes Act 2015.” Computer Law & Security Review 33(5):700–17. doi:10.1016/j.clsr.2017.03.020.
  • Enoghomwanse, A. 2019. “Cyber Crime and Its Economic Impact in Nigeria.” Journal, South Eastern Development Sustainable Development 2(September):16–31. (http://sejrsd.org/index.php/SEJRSD/article/download/15/11).
  • Facepager. 2020. “Introduction to Facepager: Automatic Data Collection Using APIs.“ (https://www.youtube.com/watch?v=4f9yC4ug8ZU).
  • Friedrichs, D. O. 2009. Trusted Criminals: White Collar Crime in Contemporary Society. Cengage Learning.
  • Furnell, S. 2020. “Technology Use, Abuse, and Public Perceptions of Cybercrime.” Pp. 45–66 in The Palgrave Handbook of International Cybercrime and Cyberdeviance T. Holt and A. Bossler edited by. Palgrave Macmillan. doi:10.1007/978-3-319-78440-3_9.
  • Glickman, H. 2005. “The Nigerian “419” Advance Fee Scams: Prank or Peril?” Canadian Journal of African Studies / Revue canadienne des études africaines 39(3): 460–89. doi:10.1080/00083968.2005.10751326.
  • Gründler, K. and P. Niklas. 2019. “Corruption and Economic Growth: New Empirical Evidence.” European Journal of Political Economy 60:101810. doi:10.1016/j.ejpoleco.2019.08.001.
  • Hasan, M. S., Rahman, R. A., Abdillah, S. F. H. B. T. and Omar, N. 2015. “Perception and Awareness of Young Internet Users towards Cybercrime: Evidence from Malaysia.“ Journal of Social Sciences 11(4): 395–404. doi:10.3844/jssp.2015.395.404.
  • Hilbert, M. 2009. “The Maturing Concept of E-Democracy: From E-Voting and Online Consultations to Democratic Value Out of Jumbled Online Chatter.” Journal of Information Technology & Politics 6(2):87–110. doi:10.1080/19331680802715242.
  • Holt, T. J. and A. M. Bossler. 2020. “The Palgrave Handbook of International Cybercrime and Cyberdeviance.” in The Palgrave Handbook of International Cybercrime and Cyberdeviance. doi:10.1007/978-3-319-78440-3.
  • Huntington, S. 1968. Political Order in Changing Societies. New Haven: Yale U. Political Order in Changing Societies.
  • Ibrahim, S. 2016. “Social and Contextual Taxonomy of Cybercrime: Socioeconomic Theory of Nigerian Cybercriminals.” International Journal of Law, Crime and Justice 47:44–57. doi:10.1016/j.ijlcj.2016.07.002.
  • Imamgaiazova, D. I. 2020. “Framing of Cybercrimes in Russian and English Media Texts.“ Vestnik of Samara University. History, Pedagogics, Philology, 26(4): 109–114. doi:10.18287/2542-0445-2020-26-4-109-114.
  • Iqbal, I. and P. Charles. 2017. “A North-South Struggle: Political and Economic Obstacles to Sustainable Development.” Sustainable Development Law & Policy 16(2):4.
  • Jerome Orji, U. 2019. “An Inquiry into the Legal Status of the ECOWAS Cybercrime Directive and the Implications of Its Obligations for Member States.” Computer Law & Security Review 35(6): 105330. doi:10.1016/j.clsr.2019.06.001.
  • Johnson-Odim, C. 2009. ““For Their freedoms”: The Anti-Imperialist and International Feminist Activity of Funmilayo Ransome-Kuti of Nigeria.” Women’s Studies International Forum 32(1): 51–59. doi:10.1016/j.wsif.2009.01.004.
  • Kapuściński, G. and B. Richards. 2016. “News Framing Effects on Destination Risk Perception.” Tourism Management 57:234–44. doi:10.1016/j.tourman.2016.06.017.
  • Katyal, N. K. 2001. “Criminal Law in Cyberspace.” University of Pennsylvania Law Review 149(4): 1003–114. doi:10.2307/3312990.
  • Lastowka, F. and D. Hunter. 2004. “The Laws of the Virtual Worlds.” California Law Review 92(1): 1–73. doi:10.2307/3481444.
  • Lazarus, S., M. Button, and R. Kapend. 2022. “Exploring the Value of Feminist Theory in Understanding Digital Crimes: Gender and Cybercrime Types.” The Howard Journal of Crime and Justice 61(3): 381–98. doi:10.1111/hojo.12485.
  • Lee, Y. Y., C. L. Gan, and T. W. Liew. 2022. “Phishing Victimization Among Malaysian Young Adults: Cyber Routine Activities Theory and Attitude in Information Sharing Online.” Journal of Adult Protection 24(3/4):179–94. doi:10.1108/JAP-06-2022-0011.
  • Leff, N. H. 1964. “Economic Development Through Bureaucratic Corruption.” American Behavioral Scientist 8(3): 8–14. doi:10.1177/000276426400800303.
  • Leukfeldt, E. R., A. Lavorgna, and E. R. Kleemans. 2017. “Organised Cybercrime or Cybercrime That is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime.” European Journal on Criminal Policy and Research 23(3):287–300. doi:10.1007/s10610-016-9332-z.
  • Mazrouei, M. K. Al, Piper, D. C., & Connolly, L. Y. 2022. “Beware of Titles: Analysing Media Reporting of Cybercrime in UK and UAE. 2022 Cyber Research Conference - Ireland (Cyber-RCI).“ 1–5. doi:10.1109/Cyber-RCI55324.2022.10032681.
  • Mensah, R. O. 2019. “Cybercrime in Ghana and the Reaction of the Law.” Journal of Law, Policy and Globalization May, doi:10.7176/jlpg/84-04.
  • Michalowski, R. J. 2016. “What is Crime?” Critical Criminology 24(2):181–99. doi:10.1007/S10612-015-9303-6.
  • Office, H. (2018). A Call to Action: The Cyber Aware Perception Gap. (https://www.gov.uk/government/publications/cyber-aware-perception-gap-report).
  • Olukolu, R. O. 2019. “An Assessment of the Impact of Municipal Laws on the Policing of Cybercrimes in Nigeria.” African Journal of Legal Studies 11(2–3): 234–53. doi:10.1163/17087384-12340034.
  • Parker, D. 1976. Crime by Computer. New York: Scribner.
  • Payne, B. K. 2020. “Defining Cybercrime.” Pp. 3–25 in Handbook of International Cybercrime and Cyberdeviance, The Palgrave. doi:10.1007/978-3-319-78440-3_1
  • Pype, K., V. Bernal, and D. Rodima-Taylor. 2023. “Introduction: Cryptopolitics and Digital Media in Africa.” Pp. 2–23 in Cryptopolitics: Exposure, Concealment, and Digital Media, edited by Katrien Pype, David Rodima-Taylor. Oxford, New York: Berghahn Books.
  • Riccardi, M. 2014. “When Criminals Invest in Businesses: Are We Looking in the Right Direction? An Exploratory Analysis of Companies Controlled by Mafias.” Organized Crime, Corruption and Crime Prevention 9783319018:197–206. doi:10.1007/978-3-319-01839-3_23.
  • Ridwan, A. 2019. “Sakawa’ and the Making of a Nigerian Internet Hustler: The Negotiation of Stigma, Identity, and Cultural Representation.” African Identities 17(2):119–35.
  • Ruggiero, V. and S. Nigel. 2010. “Green Criminology and Dirty Collar Crime.” Critical Criminology 18(4):251–62. doi:10.1007/s10612-010-9122-8.
  • Sabell, E., A. B. Manaf, and Z. Ismail. 2012. “Development of Malaysian Digital Forensics Investigator Competency Identification Methods”. Pp. 554–65 in Advanced Machine Learning Technologies and Applications, in A. E. Hassanien, Abdel-Badeeh M. Salem, R. Ramadan, and T. Kim edited by, Berlin Heidelberg: Springer. doi:10.1007/978-3-642-35326-0_55.
  • Silberman, R. and I. Fournier. 2008. “Second Generations on the Job Market in France: A Persistent Ethnic Penalty - a Contribution to Segmented Assimilation Theory.” Revue Française de Sociologie 49(5): 45–94. doi:10.3917/rfs.495.0045.
  • Steve, M. (2020, November 13). Cybercrime to Cost the World $10.5 Trillion Annually by 2025. Cybercrime Magazine.
  • Tade, O. 2013. “A Spiritual Dimension to Cybercrime in Nigeria: The “Yahoo plus” Phenomenon.” Human Affairs 23(4): 689–705. doi:10.2478/s13374-013-0158-9.
  • Tade, O. and I. Aliyu. 2011. “Under a Creative Commons Attribution-Noncommercial-Share Alike 2.5 India License 860 Social Organization of Internet Fraud Among University Undergraduates in Nigeria.” International Journal of Cyber Criminology 5(2):860–75.
  • Tankebe, J. 2013. “In Search of Moral Recognition? Policing and Eudaemonic Legitimacy in Ghana.” Law & Social Inquiry 38(3):576–97. doi:10.1111/LSI.12025.
  • Tettey, W. J. 2008. “Globalization and Internet Fraud in Ghana”. Pp. 241–66 in Neoliberalism and Globalization in Africa, New York:Palgrave Macmillan US. doi:10.1057/9780230617216_13.
  • Uyheng, J., D. Bellutta, and K. M. Carley. 2022. “Bots Amplify and Redirect Hate Speech in Online Discourse About Racism During the COVID-19 Pandemic.” Social Media + Society 8(3):205630512211047. doi:10.1177/20563051221104749.
  • Verma, M., S. Hussein, and S. Krushwa. 2012. “Cyber Law: Approach To Prevent Cyber Crime.” International Journal of Research Review in Engineering Science and Technology 1(3): 123–129.
  • Viosca, R. C., B. J. Bergiel, and P. Balsmeier. 2004. “Effects of the Electronic Nigerian Money Fraud on the Brand Equity of Nigeria and Africa.” Management Research News 27(6):11–20. doi:10.1108/01409170410784167.
  • Vojinovic, I. 2022, March 14. “More Than 70 Cybercrime Statistics - A $6 Trillion Problem.“ DataProt. (https://dataprot.net/statistics/cybercrime-statistics).
  • Wall, D. S. 2008. “Cybercrime, Media and Insecurity: The Shaping of Public Perceptions of Cybercrime1.” International Review of Law, Computers and Technology 22(1–2):45–63. doi:10.1080/13600860801924907.
  • Wang, Z. 2012. Method for Providing Terminals of Ims Network with Firewall and Firewall System (Patent No. 12/998). Google Patents (12/998). Washington DC. https://patents.google.com/patent/US20120047569A1/en
  • Warner, J. 2011. “Understanding Cyber-Crime in Ghana: A View from Below.” Understanding Cyber-Crime in Ghana: A View from Below 5(1):736–49.
  • Webb, W. 2010. “Public Management Reform and the Management of Ethics: Incompatible Ideals for the Developing State?” International Journal of Public Sector Management 23(7): 669–84. doi:10.1108/09513551011078914.
  • Whitty, M. T. 2015. “Anatomy of the Online Dating Romance Scam.” Security Journal 28(4):443–55. doi:10.1057/sj.2012.57.
  • Whitty, M. T. 2019. “Who Can Spot an Online Romance Scam?” Journal of Financial Crime 26(2):623–33. doi:10.1108/JFC-06-2018-0053.
  • Whitty, M. T. and T. Buchanan. 2012. “The Online Romance Scam: A Serious Cybercrime.” Cyberpsychology, Behavior, and Social Networking 15(3):181–83. doi:10.1089/cyber.2011.0352.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.