Abstract
This study examines the impact of four components of a refined routine activity theory model, namely the offenders' motivations, suitable targets, capable guardians, and online routines, on the desistance desires of cyberfraudsters. A largescale self-report survey of 515 cyberfraudsters in Ghana is utilized. The results suggest that traditional criminological theories are still applicable for analyzing cybercrime, especially cyber fraud, even though it is a more sophisticated form of traditional crime with criminals employing various tactics and security experts putting various preventive measures in place. Due to a variety of reasons, cybercriminals continue to target unprotected internet users. The study concludes that depending just on police patrol is insufficient for stopping cyber fraud attempts and that investing in secure systems and solutions is essential for protecting netizens' assets and data from cyber dangers.
Original language | English |
---|---|
Title of host publication | ISTAS 2022: IEEE International Symposium on Technology and Society 2022: Digital and Societal Transformations |
Editors | T V GOPAL, Laurie LAU, Lennon CHANG, Greg ADAMSON |
Publisher | IEEE |
Number of pages | 7 |
ISBN (Electronic) | 9781665484107 |
ISBN (Print) | 9781665484114 |
DOIs | |
Publication status | Published - 2022 |
Externally published | Yes |
Event | 2022 IEEE International Symposium on Technology and Society, ISTAS 2022 - Virtual, Online, Hong Kong Duration: 10 Nov 2022 → 12 Nov 2022 |
Conference
Conference | 2022 IEEE International Symposium on Technology and Society, ISTAS 2022 |
---|---|
Country/Territory | Hong Kong |
City | Virtual, Online |
Period | 10/11/22 → 12/11/22 |
Bibliographical note
Publisher Copyright:© 2022 IEEE.
Keywords
- criminological theories
- cyber fraud
- cybercrime
- motivation
- police patrol
- vulnerable victims