419-it's just a game: Pathways to cyber-fraud criminality emanating from west africa

MT Whitty - International Journal of Cyber Criminology, 2018 - research.monash.edu
Cyber-enabled mass-marketing frauds (eg, romance scam, investment scam, 419) are
believed to emanate from West Africa, especially from Nigeria. There has been some …

Predatory journals and publishers: Characteristics and impact of academic spam to researchers in educational sciences

J Sureda‐Negre, A Calvo‐Sastre… - Learned …, 2022 - Wiley Online Library
This study focuses on the phenomenon of presumed predatory scientific publications in the
field of Educational Sciences, and the utilization of email by editors to request manuscripts. It …

Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”)

S Lazarus, M Button, A Adogame - Heliyon, 2022 - cell.com
This article is about the manifestations of similarities between two seemingly distinct groups
of Nigerians: cybercriminals and politicians. Which linguistic strategies do Twitter users use …

Tweets and reactions: revealing the geographies of cybercrime perpetrators and the North-South divide

S Lazarus, M Button - Cyberpsychology, Behavior, and Social …, 2022 - liebertpub.com
How do tweets reflect the long-standing disparities between the northern and southern
regions of Nigeria? This study presents a qualitative analysis of Twitter users' responses (n …

Phishing email strategies: understanding cybercriminals' strategies of crafting phishing emails

T Stojnic, D Vatsalan, NAG Arachchilage - Security and privacy, 2021 - Wiley Online Library
It is a known fact that cybercriminals often manipulate people to steal sensitive information.
However, there has been a lack of research in investigating cybercriminals' strategies and …

Profiling consumers who reported mass marketing scams: demographic characteristics and emotional sentiments associated with victimization

M DeLiema, P Witt - Security Journal, 2024 - Springer
We examine the characteristics of consumers who reported scams to the US Federal Trade
Commission. We assess how consumers vary demographically across six scam types, and …

The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents

S Lazarus, GU Okolorie - Telematics and Informatics, 2019 - Elsevier
While this article sets out to advance our knowledge about the characteristics of Nigerian
cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the …

[HTML][HTML] Cheques or dating scams? Online fraud themes in hip-hop songs across popular music apps

S Lazarus, O Olaigbe, A Adeduntan, ET Dibiana… - Journal of Economic …, 2023 - Elsevier
How do hip-hop songs produced from 2017 to 2023 depict and rationalize online fraud?
This study examines the depiction of online fraudsters in thirty-three Nigerian hip-hop songs …

Tactics, techniques and procedures of cybercrime: A methodology and tool for cybercrime investigation process

G Sarkar, H Singh, S Kumar, SK Shukla - Proceedings of the 18th …, 2023 - dl.acm.org
Individuals, organizations and nation-states are increasingly falling victim to cyberattacks. A
lot of research on how to understand the modus operandi of a cyber attacker through the …

Birds of a feather flock together: the Nigerian cyber fraudsters (Yahoo Boys) and hip hop artists

S Lazarus - Criminology, Crim. Just. L & Soc'y, 2018 - HeinOnline
Fraudster:" Honey, your sparkle always lights up my heart." Victim:" Oh, hmmm, I love you,
darling." Fraudster:" Me too. I can't wait to hold you in my arms. But there's a little problem." …