{"title":"加纳青少年网络诈骗活动的流行程度及机制差异关联视角下的日常活动、空间转换与理性选择","authors":"H. Zhon, Aikins Amoako Asiama","doi":"10.1109/ISTAS55053.2022.10227127","DOIUrl":null,"url":null,"abstract":"This study examines the impact of four components of a refined routine activity theory model, namely the offenders’ motivations, suitable targets, capable guardians, and online routines, on the desistance desires of cyberfraudsters. A largescale self-report survey of 515 cyberfraudsters in Ghana is utilized. The results suggest that traditional criminological theories are still applicable for analyzing cybercrime, especially cyber fraud, even though it is a more sophisticated form of traditional crime with criminals employing various tactics and security experts putting various preventive measures in place. Due to a variety of reasons, cybercriminals continue to target unprotected internet users. The study concludes that depending just on police patrol is insufficient for stopping cyber fraud attempts and that investing in secure systems and solutions is essential for protecting netizens’ assets and data from cyber dangers.","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Prevalence and Mechanisms of cyber fraud activities among Ghanaian Youths; Routine Activity, Space Transition, and Rational Choice from Differential Association Perspective\",\"authors\":\"H. Zhon, Aikins Amoako Asiama\",\"doi\":\"10.1109/ISTAS55053.2022.10227127\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study examines the impact of four components of a refined routine activity theory model, namely the offenders’ motivations, suitable targets, capable guardians, and online routines, on the desistance desires of cyberfraudsters. A largescale self-report survey of 515 cyberfraudsters in Ghana is utilized. The results suggest that traditional criminological theories are still applicable for analyzing cybercrime, especially cyber fraud, even though it is a more sophisticated form of traditional crime with criminals employing various tactics and security experts putting various preventive measures in place. Due to a variety of reasons, cybercriminals continue to target unprotected internet users. The study concludes that depending just on police patrol is insufficient for stopping cyber fraud attempts and that investing in secure systems and solutions is essential for protecting netizens’ assets and data from cyber dangers.\",\"PeriodicalId\":180420,\"journal\":{\"name\":\"2022 IEEE International Symposium on Technology and Society (ISTAS)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Symposium on Technology and Society (ISTAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTAS55053.2022.10227127\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Symposium on Technology and Society (ISTAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTAS55053.2022.10227127","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Prevalence and Mechanisms of cyber fraud activities among Ghanaian Youths; Routine Activity, Space Transition, and Rational Choice from Differential Association Perspective
This study examines the impact of four components of a refined routine activity theory model, namely the offenders’ motivations, suitable targets, capable guardians, and online routines, on the desistance desires of cyberfraudsters. A largescale self-report survey of 515 cyberfraudsters in Ghana is utilized. The results suggest that traditional criminological theories are still applicable for analyzing cybercrime, especially cyber fraud, even though it is a more sophisticated form of traditional crime with criminals employing various tactics and security experts putting various preventive measures in place. Due to a variety of reasons, cybercriminals continue to target unprotected internet users. The study concludes that depending just on police patrol is insufficient for stopping cyber fraud attempts and that investing in secure systems and solutions is essential for protecting netizens’ assets and data from cyber dangers.