410
Views
1
CrossRef citations to date
0
Altmetric
Research Article

The Espouse of Women in the Online Romance Fraud World: Role of Sociocultural Experiences and Digital Technologies

Pages 708-735 | Received 18 Mar 2023, Accepted 21 Sep 2023, Published online: 25 Sep 2023

References

  • Aborisade, R. A. and S. F. Oni. 2020. “Sociological Profiling of Armed Robbery Convicts in Kirikiri Female Prisons, Lagos, Nigeria.” International Annals of Criminology 58(1):39–54. doi:10.1017/cri.2020.15.
  • Abubakari, Y. 2021. “The Reasons, Impacts and Limitations of Cybercrime Policies in Anglophone West Africa: A Review.” Social Space Journal 1(20):1–22.
  • Agnew, R. 1999. “A General Strain Theory of Community Differences in Crime Rates.” Journal of Research in Crime and Delinquency 36(2):123–55. doi:10.1177/0022427899036002001.
  • Agyemang, K., S. Pokhrel, C. Victor, and N. K. Anokye. 2021. “Determinants of Obesity in West Africa: A Systematic Review.” MedRxiv 2021–4. doi:10.1101/2021.04.27.21255462.
  • Alhassan, A. R. K. and A. Ridwan. 2021. “Identity Expression—The Case of ‘Sakawa’ Boys in Ghana.” Human Arenas 6(2):242–63. doi:10.1007/s42087-021-00227-w.
  • Alsariera, Y. A., A. V. Elijah, and A. O. Balogun. 2020. “Phishing Website Detection: Forest by Penalizing Attributes Algorithm and its Enhanced Variations.” Arabian Journal for Science and Engineering 45(12):10459–70. doi:10.1007/s13369-020-04802-1.
  • Apau, R. and F. N. Koranteng. 2020. “An Overview of the Digital Forensic Investigation Infrastructure of Ghana.” Forensic Science International: Synergy 2:299–309. doi:10.1016/j.fsisyn.2020.10.002.
  • Armstrong, A. 2018. “Sakawa’ Rumours: Occult Internet Fraud and Ghanaian Identity.” Pp 67–92 in Cosmos, Gods and Madmen: Frameworks in the Anthropologies of Medicine. 1th ed., edited by Roland Littlewood, and Rebecca Lynch. Berghahn Books. doi:10.2307/j.ctvpj7h19.
  • Asamoah, B. 2018. Sakawa. Movement Publishing. https://www.amazon.com/Sakawa-Ben-Asamoah/dp/1513628445.
  • Atta-Asamoah, A. 2009a. “Understanding the West African Cyber Crime Process.” African Security Review 18(4):105–14. doi:10.1080/10246029.2009.9627562.
  • Atta-Asamoah, A. 2009b. “Understanding the West African Cyber Crime Process.” African Security Review 18(4):105–14. doi:10.1080/10246029.2009.9627562.
  • Bachmann, M. 2010. “The Risk Propensity and Rationality of Computer Hackers.” International Journal of Cyber Criminology 4(1/2):643–56.
  • Barnor Barno, J. N., R. Boaten, E. A. Kolog, and A. Afful-Dadzie (2020). “Rationalizing Online Romance Fraud.” In The Eyes of the Offender AMCIS 2020 Proceedings August, Salt Lake City, Utah.
  • Baugher, A. R. and J. A. Gazmararian. 2015. “Masculine Gender Role Stress and Violence: A Literature Review and Future Directions.” Aggression and Violent Behavior 24:107–12. doi:10.1016/J.AVB.2015.04.002.
  • Blumer, H. 1969. Symbolic Interactionism: Perspective and Method. Englewood Cliffs, New Jersey: Prentice Hall.
  • Boateng, R., O. Longe, V. Mbarika, and I. Avevor. 2011. “Cyber Crime and Criminality in Ghana: Its Forms and Implications.” Amcis 2:85–100. April 2015 (http://works.bepress.com/richardboateng/1/).
  • Braun, V. and V. Clarke. 2012. “Thematic Analysis.” APA Handbook of Research Methods in Psychology 2. doi: 10.1037/13620-004
  • Buchanan, T. and M. T. Whitty. 2014. “The Online Dating Romance Scam: Causes and Consequences of Victimhood.” Psychology, Crime and Law 20(3):261–83. doi:10.1080/1068316X.2013.772180.
  • Burrell, J. 2011. “User Agency in the Middle Range: Rumors and the Reinvention of the Internet in Accra, Ghana.” Science Technology and Human Values 36(2):139–59. doi:10.1177/0162243910366148.
  • Burrell, J. 2012. Invisible Users: Youth in the Internet Cafés of Urban Ghana. Pp. 248. Cambridge, Massachusetts: The MIT Press. doi:10.7551/mitpress/9780262017367.001.0001.
  • Byers, E. S. 2008. “Evidence for the Importance of Relationship Satisfaction for Women’s Sexual Functioning.” Women & Therapy 24(1–2):23–26. doi:10.1300/J015v24n01_04.
  • Cassiman, A. 2018. “Browsers and Phone Girls: The Intricate Socialities of Friendship, Trust and Cyberlove in Nima (Accra).” Africa 88(S1):S72–S89. doi:10.1017/S0001972017001152.
  • Cassiman, A. 2019. “Spiders on the World Wide Web: Cyber Trickery and Gender Fraud Among Youth in an Accra Zongo.” Social Anthropology 27(3):486–500. doi:10.1111/1469-8676.12678.
  • Chaikin, D. 2017. “Money Laundering and Tax Evasion – The Assisting of the Banking Sector.” Pp. 237–54 in The Handbook of Business and Corruption, Emerald Publishing Limited. doi:10.1108/978-1-78635-445-720161012
  • Chan, W. and G. S. Rigakos. 2002. “Risk, Crime and Gender.” British Journal of Criminology 42(4):743–61. doi:10.1093/bjc/42.4.743.
  • Chesney-Lind, M. and R. G. Shelden. 2013. Girls, Delinquency, and Juvenile Justice. Hoboken, New Jersey: John Wiley and Sons Inc.
  • Comfort, N. (2017). “Internet Fraud and Its Socio-Economic Implications for Peace and Development of Agona Swedru (Ghana).” [University of cape coast]. https://erl.ucc.edu.gh/jspui
  • Daly, K. and M. Chesney-Lind. 1988. “Feminism and Criminology.” Justice Quarterly 5(4):497–538. doi:10.1080/07418828800089871.
  • Defleur, L. B., F. Adler, and R. J. Simon. 1976. “Sisters in Crime: The Rise of the New Female Criminal.” Contemporary Sociology 5(5):581. doi:10.2307/2063296.
  • Dixon, L., L. Harkins, and D. Wegerhoff. 2019. “Incorporating Sociocultural and Situational Factors into Explanations of Interpersonal Violent Crime.” Psychology, Crime & Law 25(6):675–92. doi:10.1080/1068316X.2018.1557183.
  • Donner, C. M. 2016. “The Gender Gap and Cybercrime: An Examination of College Students’ Online Offending.” Victims and Offenders 11(4):556–77. doi:10.1080/15564886.2016.1173157.
  • Dukku, M. K. 2019. “The Nature, Causes and Consequences of Cyber Crime in Tertiary Institutions in Gombe, Gombe State, Nigeria.” International Journal of Educational Research and Management Technology 4(1):100–15.
  • Ebenezer, A., A. Oluwadamilola, E. Ibunkunoluwa, and B. Roberts. 2016. “Gendered Alternative to Cyber Fraud Participation: An Assessment of Technological Driven Crime in Lagos State, Nigeria.” Gender and Behaviour 14(3):7672–92.
  • Elwér, S., L. Aléx, and A. Hammarström. 2012. “Gender (In)equality Among Employees in Elder Care: Implications for Health.” International Journal for Equity in Health 11(1):1. doi:10.1186/1475-9276-11-1.
  • Ferguson, J. (2022). “Houston Man Accused of Running $5M Romance Fraud Scheme.” Houston Chronicles. https://www.houstonchronicle.com/news/houston-texas/houston/article/Houston-man-accused-of-running-5M-romance-fraud-17306284.php
  • Flick, U., E. von Kardorff, and I. Steinke (2004). A Companion to Qualitative Research, edited by U. Flick E. Von Kardoff, I. Steinke. London; Thousand Oaks, Calif: SAGE Publications Inc.
  • Frey, B. S. and A. Stutzer. 2012. “The Use of Happiness Research for Public Policy.” Social Choice and Welfare 38(4):659–74. doi:10.1007/s00355-011-0629-z.
  • Fukuyama, F. 1995. “Trust: The Social Virtues and the Creation of Prosperity.” The World and I 10:264–68.
  • Ghana-Statistics-Service. (2013). 2010 Population & Housing Census Summary Report of Final Results.
  • Hazan, C. and P. R. Shaver 1994. “Attachment as an Organizational Framework for Research on Close Relationships.” Psychological Inquiry 5(1):1–22. doi:10.1207/s15327965pli0501_1.
  • Homer, E. M. 2019. “Testing the Fraud Triangle: A Systematic Review.” Journal of Financial Crime 27(1):172–87. doi:10.1108/JFC-12-2018-0136.
  • Hübschle, A. 2014. “Of Bogus Hunters, Queenpins and Mules: The Varied Roles of Women in Transnational Organized Crime in Southern Africa.” Trends in Organized Crime 17(1–2):31–51. doi:10.1007/s12117-013-9202-8.
  • Hutchings, A. and Y. T. Chua. 2017. “Gendering 10 cybercrime.” Pp. 167–188 in Cybercrime Through an Interdisciplinary Lens, edited by Holt Thomas J. Milton Park, Abingdon, Oxfordshire: Routledge.
  • Internet Crime Complaint Centre. (2018). 2017 Internet Crime Report.
  • Jaishankar, K. 2008. “Establishing a Theory of Cyber Crimes.” Zenodo January 2008 doi: 10.5281/ZENODO.18792.
  • Krebs, A. and M. Warr. 2018. “Differential association.” Pp. 110–14 in The Routledge Companion to Criminological Theory and Concepts. Routledge. doi:10.4324/9781315744902-25.
  • Lazarus, S. 2018. “Birds of a Feather Flock Together: The Nigerian Cyber Fraudsters (Yahoo Boys) and Hip Hop Artists.” Criminology, Criminal Justice, Law & Society 19(2):63–80.
  • Lazarus, S., M. Button, and R. Kapend. 2022. “Exploring the Value of Feminist Theory in Understanding Digital Crimes: Gender and Cybercrime Types.” The Howard Journal of Crime and Justice 61(3):381–98. doi:10.1111/hojo.12485.
  • Lee, J. and H. Soberon-Ferrer. 2005. “Consumer Vulnerability to Fraud: Influencing Factors.” Journal of Consumer Affairs 31(1):70–89. doi:10.1111/j.1745-6606.1997.tb00827.x.
  • Leukfeldt, E. R., A. Lavorgna, and E. R. Kleemans. 2017. “Organised Cybercrime or Cybercrime That is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime.” European Journal on Criminal Policy and Research 23(3):287–300. doi:10.1007/s10610-016-9332-z.
  • Longhurst, R. 2019. “Semi Structured Interview and Focus Group.” Key Methods in Georgraphy 53(9):1689–99.
  • Marcum, C. D., G. E. Higgins, T. L. Freiburger, and M. L. Ricketts. 2014. “Exploration of the Cyberbullying Victim/Offender Overlap by Sex.” American Journal of Criminal Justice 39(3):538–48. doi:10.1007/s12103-013-9217-3.
  • Maxfield, S., M. Shapiro, V. Gupta, and S. Hass. 2010. “Gender and Risk: Women, Risk Taking and Risk Aversion.” Gender in Management: An International Journal 25(7):586–604. doi:10.1108/17542411011081383.
  • McCarthy, B. and T. Casey. 2008. “Love, Sex, and Crime: Adolescent Romantic Relationships and Offending.” American Sociological Review 73(6):944–69. doi:10.1177/000312240807300604.
  • Moss-Racusin, C. A., J. F. Dovidio, V. L. Brescoll, M. J. Graham, and J. Handelsman. 2012. “Science Faculty’s Subtle Gender Biases Favor Male Students.” Proceedings of the National Academy of Sciences 109(41):16474–79. doi:10.1073/pnas.1211286109.
  • Mowen, T. J., R. Stansfield, and J. H. Boman. 2019. “Family Matters: Moving Beyond ‘if’ Family Support Matters to ‘Why’ Family Support Matters During Reentry from Prison.” Journal of Research in Crime and Delinquency 56(4):483–523. doi:10.1177/0022427818820902.
  • Neissl, K., E. V. Botchkovar, O. Antonaccio, and L. A. Hughes. 2019. “Rational Choice and the Gender Gap in Crime: Establishing the Generality of Rational Choice Theory in Russia and Ukraine.” Justice Quarterly 36(6):1096–121. doi:10.1080/07418825.2018.1543723.
  • Öberg, S. 2017. “Too Many is Not Enough: Studying How Children are Affected by Their Number of Siblings and Resource Dilution in Families.” The History of the Family 22(3):157–74. doi:10.1080/1081602X.2017.1302890.
  • Oduro-Frimpong, J. 2014. “Sakawa Rituals and Cyberfraud in Ghanaian Popular Video Movies.” African Studies Review 57(2):131–47. doi:10.1017/asr.2014.51.
  • Olukolu, R. O. 2019. “An Assessment of the Impact of Municipal Laws on the Policing of Cybercrimes in Nigeria.” African Journal of Legal Studies 11(2–3):234–53. doi:10.1163/17087384-12340034.
  • Parker, C., S. Scott, and A. Geddes. 2019. “Snowball Sampling.” SAGE Research Methods Foundations. doi:10.4135/URL.
  • Reckdenwald, A. and K. F. Parker. 2008. “The Influence of Gender Inequality and Marginalization on Types of Female Offending.” Homicide Studies 12(2):208–26. doi:10.1177/1088767908314270.
  • Renzetti, C. 2013. Feminist Criminology. Routledge.
  • Rock, P. 2014. “Sociological Theories of Crime.” The Oxford Handbook of Criminology 39–80. doi:10.1093/he/9780199590278.003.0002.
  • Rountree, P. W. and B. Warner. 1999. “Social Ties and Crime: Is the Relationship Gendered?” Criminology 37(4):789–814. doi:10.1111/j.1745-9125.1999.tb00505.x.
  • Schaefer, B. P. 2017. “Social Networks and Crime: Applying Criminological Theories.” Pp. 46–67 in Social Networking as a Criminal Enterprise, edited by Marcum Catherine D, and Higgins George E. New York: Routledge. 10.1201/b16912.
  • Shaari, A. H., M. R. Kamaluddin, W. F. Paizi@fauzi, and M. Mohd. 2019. “Online-Dating Romance Scam in Malaysia: An Analysis of Online Conversations Between Scammers and Victims.” GEMA Online® Journal of Language Studies 19(1):97–115. doi:10.17576/gema-2019-1901-06.
  • Shechory, M., G. Perry, and M. Addad. 2011. “Pathways to Women’s Crime: Differences Among Women Convicted of Drug, Violence and Fraud Offenses.” The Journal of Social Psychology 151(4):399–416. doi:10.1080/00224545.2010.503721.
  • Sofo, F., M. Berzins, S. Ammirato, and A. P. Volpentesta. 2010. “Investigating the Relationship Between consumers’ Style of Thinking and Online Victimization in Scamming.” International Journal of Digital Content Technology & Its Applications 4(7):38–49. doi:10.4156/jdcta.vol4.issue7.4.
  • Spreitzer, G. M. and A. K. Mishra. 1999. “Giving Up Control without Losing Control: Trust and Its Substitutes’ Effects on Managers’ Involving Employees in Decision Making.” Group and Organization Management 24(2):155–87. doi:10.1177/1059601199242003.
  • Steffensmeier, D. J., J. Schwartz, and M. Roche. 2013. “Gender and Twenty-First-Century Corporate Crime: Female Involvement and the Gender Gap in Enron-Era Corporate Frauds.” American Sociological Review 78(3):448–76. doi:10.1177/0003122413484150.
  • Tade, O. 2013. “A Spiritual Dimension to Cybercrime in Nigeria: The “Yahoo plus” Phenomenon.” Human Affairs 23(4):689–705. doi:10.2478/s13374-013-0158-9.
  • Tambo, E. 2017. “Promoting Cybersecurity Awareness and Resilience Approaches, Capabilities and Actions Plans Against Cybercrimes and Frauds in Africa.” International Journal of Cyber-Security and Digital Forensics 6(3):126–38. doi:10.17781/P002278.
  • Tan, Y. and X. Li. 2022. “The Impact of Internet on Entrepreneurship.” International Review of Economics & Finance 77:135–42. doi:10.1016/j.iref.2021.09.016.
  • Taylor, P. A. 1999. Hackers: Crime in the Digital Sublime. New York: Routlege.
  • Thibaut, John W. and Harold H. Kelley. 2017. The Social Psychology of Groups. Routledge.
  • Tickner, P. and M. Button. 2021. “Deconstructing the Origins of Cressey’s Fraud Triangle.” Journal of Financial Crime 28(3):722–31. doi:10.1108/JFC-10-2020-0204.
  • Tittle, C. R., A. Ward David, and G. Grasmick. Harold. 2003. “Gender, Age, and Crime/Deviance: A Challenge to Self-Control Theory.” Journal of Research in Crime and Delinquency 40(4):426–53. doi:10.1177/0022427803256074.
  • United Nations. 2022. World Population Prospects 2022. Retrieved from: https://population.un.org/wpp/
  • Van de Bunt, H. G. 2008. “The Role of Hawala Bankers in the Transfer of Proceeds from Organised Crime.” Pp. 113–26 in In Organized Crime: Culture, Markets and Policies. Springer. doi:10.1007/978-0-387-74733-0_9.
  • Veneziani, R. 2013. “Exploitation, Inequality and Power.” Journal of Theoretical Politics 25(4):526–45. doi:10.1177/0951629813477275.
  • Villora, B., S. Yubero, and R. Navarro. 2019. “Associations Between Feminine Gender Norms and Cyber Dating Abuse in Female Adults.” Behavioral Sciences 9(4):35. doi:10.3390/bs9040035.
  • Warner, J. 2011. “Understanding Cyber-Crime in Ghana: A View from Below.” Understanding Cyber-Crime in Ghana: A View from Below 5(1):736–49.
  • Whitty, M. T. 2015. “Anatomy of the Online Dating Romance Scam.” Security Journal 28(4):443–55. doi:10.1057/sj.2012.57.
  • Whitty, M. T. 2018. “Do You Love Me? Psychological Characteristics of Romance Scam Victims.” Cyberpsychology, Behavior, and Social Networking 21(2):105–09. doi:10.1089/cyber.2016.0729.
  • Whitty, M. T. and T. Buchanan. 2012. “The Online Romance Scam: A Serious Cybercrime.” Cyberpsychology, Behavior, and Social Networking 15(3):181–83. doi:10.1089/cyber.2011.0352.
  • Whitty, M. T. and T. Buchanan. 2016. “The Online Dating Romance Scam: The Psychological Impact on Victims – Both Financial and Non-Financial.” Criminology and Criminal Justice 16(2):176–94. doi:10.1177/1748895815603773.
  • Wyse, J. J., D. J. Harding, and J. D. Morenoff. 2014. “Romantic Relationships and Criminal Desistance: Pathways and Processes.” Sociological Forum 29(2):365–85. doi:10.1111/socf.12088.
  • Young, L. A. and L. A. Young. 2016. Rational Choice Theory and Religion: Summary and Assessment. Routledge. doi:10.4324/9781315538877.
  • Zingerle, A. and L. Kronman (2011). Transmedia Storytelling and Online Representations - Issues of Trust on the Internet. Proceedings - 2011 International Conference on Cyberworlds, Cyberworlds 2011, 144–51. doi: 10.1109/CW.2011.32

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.