fraudulent actions by the youth, and in contrast to the traditional felony groups, both equally gender are functionally concerning it (Adeniran, 2008). The antics of the вЂyahoo yahoo boys', also known as вЂyahoo yahoo millionaires' has increased a new generation of lazy youths, whom spend several hours on the internet perfecting their particular game and literally eradicating their prey (Nkanga, 2008); cyber crime has become one of the most effective growing-internet (fraudulent? )businesses in Nigeria (Aghatise, 2006).
Numerous crimes will be committed about daily basis on the internet with Nigerians at the forefront of mailing fraudulent and bogus financial proposals around the globe (Longe & Chiemeke, 2008). According to a 2007 net crime statement released by Internet Criminal offense Complaint Middle (IC3), Nigeria ranks third among internet crime doing countries in the world. The statement indicates which the " Nigerian letter fraudвЂќ (Email Scams) received in the United States, constituted 1 . 1% and the individuals revealing fraud-type economic loss in 2007 puts Nigerian page fraud at 6. 4%, amounting to at least one, 922. 99 million US dollars (Odapu, 2008).
In the same way, the Chief of Nigeria's Economic and Financial Crimes Commission (EFCC), Ibrahim Lamorde, has recently announced that more than 288 persons have already been convicted over various internet crimes in Nigeria, whilst 234 are still being prosecuted in different courts across the country (EFCC, 2012). In a related expansion, the EFCC also lately arrested two university undergraduates, Hope Olusegun and Tunde Wasiu Sodiq in Lagos, on the 4th January, 2013 for apparently belonging to two syndicates, who have specialize in defrauding unsuspecting Nigerians and foreign people through internet scams (Soni, 2013). Adeniran (2008) observes that the technological advances possess brought striking changes to Nigerian cultures, habits of socialization, social establishments and interpersonal interactions. According to him, youths, especially undergraduates plus the unemployed have got embraced the knowledge and conversation inventions, such that the internet is usually accessed for most part of the time. Ibrahim (2006) notes that cyber bad guys in Nigeria are usually inside the ages of 18 and 30 years, and are youths, who are outside the second schools, but are either in the university and/or about to become admitted in to the university. In the same way, a study carried out by the Youth against Cyber Crimes and Fraud in Nigeria (2008) shows that one out of every five youths in many cities in Nigeria is known as a cyber legal. Reddick and King (2000) and Adeniran (2006) declare that the invisiblity and privateness that the net provides for potential users has excessively improved the degree of fluidity and strength complexity in the вЂyahoo-boys' functions in Nigeria. Longe and Chiemeke (2008) similarly posit that the majority of cyber crimes perpetrated in Nigeria are mostly geared towards individuals and never necessarily personal computers, hence, they need less technological expertise. They will further be aware that human weakness, such as avarice and gullibility are generally exploited by web criminals; thus, damage completed their victim is usually monetary and internal.
International Diary of Internet Criminology
Volume 6 Concern 2 This summer - Dec 2012
В© 2012 Worldwide Journal of Cyber Criminology. All rights reserved. Within creative commons Attribution-Noncommercial-Share Likewise 2 . a few India Certificate 1003
Aransiola and Asindemade (2011) say that cyber crime perpetrators in Nigeria have unique lifestyles from other youths and the strategies usually include cooperation with security agents and bank officials, local and international marketing, and the utilization of voodoo (the traditional great power). Tade and Aliyu (2011) similarly observe that yahoo-boys in Nigeria enjoy a position of big kids; they are socially recognized amongst friends/lecturers and their flamboyant lifestyle entices others to prefer to belong to the clique.
The best scale involvement of Nigerians in...
Recommendations: Achebe, C. (1983). The problem with Nigeria, Enugu: Fourth Dimension Publishers.
Adeniran, A. (2006). A nondependent Construction for Creation, This day, www.thisdayonline.com
Alder Consulting Report (2003)
Adalemo, I actually. A. (1999). Youth plus the City: A great Urban Environment Perspective, Workshop
Proceedings on Youth and City: A Study of Lagos: Development Researchers' Cooperative, Lagos.
Adeniyi, G. O. (1999). Youth and Nation Building: A Continue Challenge in Nigeria. Workshop Proceedings in Youth as well as the City: A Study of Lagos: Development Researchers' Cooperative, Lagos.
Africa Atlases (2002). Nigeria. Paris: Des Edition L. A.
Bammeke, F. (2004). Leadership through Education. Confident Leadership Monograph Series No . 12: Lagos Centre for Social Science Research and Development.
Blau, F. Deb., & Ferber M. A. (1986). The Economics of Women, Men and Work. New Jersey: Prentice Hall.
Cooper, A. (1997). The net and Sexuality: Surfing its ways into the New Centuries. Journal of Sex, Education and Therapy, 22, 5-6.
Elster, T. (1990). Merton's functionalism plus the unintended implications of sociable action. In J. Clark simon, C. Modgil & H. Modhil (Eds. ). Robert Merton: Opinion and Controversy (pp. 129-35). New York: Falmer Press.
Global Reach (2003)
Haines, V. (1998). Is Spencer's theory a great evolutionary theory? American Log of Sociology. 93(3), 1200-1223.
Karofi, U. A., & Mwanza, T. (2006). Globalisation and criminal offense. Bangladesh e-Journal of Sociology, 3(1), 70-87, January 06\.
Lenski, G., Lenski, J., & Nolan, P
Mabogunje, A. L. (1998). Challenges of the U-Turn Era: Youth and National Eco friendly Development. Countrywide Conference on Youth Creation in Nigeria. Abuja.
Ninalowo, A. (2004). Essays around the State and Civil Society. Lagos: First Academic Marketers.
Ogburn Watts. F. (1922). Social Transform with Respect to Lifestyle and Unique Nature. Nyc: Huebsch.
Piller, C. (2000). Cybercrime Loss at Firms Doubles to $10 Billion dollars. Los Angeles Times. May 22, 2000, pp. C1, C4.
Reddick, R., & King, Elizabeth
Ritzer, G. (1996). Sociological Theory. New york city: The McGraw-Hill Companies, Inc.
Shapiro, A. L. (1999). The Internet, in Foreign Insurance plan, No . 115 (Summer 1999), pp. 14-27.
Schaefer, 3rd there’s r. T. (2005). Sociology (9th Edition). Nyc: McGraw Mountain.
Interpersonal Development Plan for Nigeria (1989)
United Nations (2007). UN-HABITAT's State of the World Cities Survey 2006/7.
ADVANCEMENT AN A/C SYSTEM USING WASTE WARMTH OF AN IC ENGINE Jabinth. J, third Mechanical St . Xaviers catholic college of engineering, Chunkadai. ABSTRACT The refrigerating…...
п»їArellano School 2600 Legarda St . Sampaloc, Manila College of Hospitality and Travel Management In partial fulfilment of Requirements In Ways of Research Submitted…...
Review Project is known as a group of activities undertaken in order to meet one or more specific objectives. These objectives could possibly be solving a problem, creating…...
Research Daily news Bernie Madoff's Ponzy Scheme Contemporary Organization Ethics Modern Business Ethics Contemporary Business Ethics Summer 16, 2012 Table of Contents Moral issues involvedвЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦.. 3 Relevant factsвЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦вЂ¦.…...
English Essay Term 2 2013 " Society has changed into a drab, darker conformist environment where human beings and mother nature have been used in order to sustain and enhance…...
1 Computer Hardware and Design EE3A1 RISC MICROPROCESSOR 2 Table of Contents We. II. 3. IV. Versus. VI. VII. VIII. IX. Abstract.................................................................................................................................... a few Introduction..........................................................................................................................…...