The Prevalence and Mechanisms of cyber fraud activities among Ghanaian Youths; Routine Activity, Space Transition, and Rational Choice from Differential Association Perspective
{"title":"The Prevalence and Mechanisms of cyber fraud activities among Ghanaian Youths; Routine Activity, Space Transition, and Rational Choice from Differential Association Perspective","authors":"H. Zhon, Aikins Amoako Asiama","doi":"10.1109/ISTAS55053.2022.10227127","DOIUrl":null,"url":null,"abstract":"This study examines the impact of four components of a refined routine activity theory model, namely the offenders’ motivations, suitable targets, capable guardians, and online routines, on the desistance desires of cyberfraudsters. A largescale self-report survey of 515 cyberfraudsters in Ghana is utilized. The results suggest that traditional criminological theories are still applicable for analyzing cybercrime, especially cyber fraud, even though it is a more sophisticated form of traditional crime with criminals employing various tactics and security experts putting various preventive measures in place. Due to a variety of reasons, cybercriminals continue to target unprotected internet users. The study concludes that depending just on police patrol is insufficient for stopping cyber fraud attempts and that investing in secure systems and solutions is essential for protecting netizens’ assets and data from cyber dangers.","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Symposium on Technology and Society (ISTAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTAS55053.2022.10227127","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This study examines the impact of four components of a refined routine activity theory model, namely the offenders’ motivations, suitable targets, capable guardians, and online routines, on the desistance desires of cyberfraudsters. A largescale self-report survey of 515 cyberfraudsters in Ghana is utilized. The results suggest that traditional criminological theories are still applicable for analyzing cybercrime, especially cyber fraud, even though it is a more sophisticated form of traditional crime with criminals employing various tactics and security experts putting various preventive measures in place. Due to a variety of reasons, cybercriminals continue to target unprotected internet users. The study concludes that depending just on police patrol is insufficient for stopping cyber fraud attempts and that investing in secure systems and solutions is essential for protecting netizens’ assets and data from cyber dangers.