The Prevalence and Mechanisms of cyber fraud activities among Ghanaian Youths; Routine Activity, Space Transition, and Rational Choice from Differential Association Perspective

Hua ZHON*, Aikins Amoako ASIAMA

*Corresponding author for this work

Research output: Book Chapters | Papers in Conference ProceedingsConference paper (refereed)Researchpeer-review

Abstract

This study examines the impact of four components of a refined routine activity theory model, namely the offenders' motivations, suitable targets, capable guardians, and online routines, on the desistance desires of cyberfraudsters. A largescale self-report survey of 515 cyberfraudsters in Ghana is utilized. The results suggest that traditional criminological theories are still applicable for analyzing cybercrime, especially cyber fraud, even though it is a more sophisticated form of traditional crime with criminals employing various tactics and security experts putting various preventive measures in place. Due to a variety of reasons, cybercriminals continue to target unprotected internet users. The study concludes that depending just on police patrol is insufficient for stopping cyber fraud attempts and that investing in secure systems and solutions is essential for protecting netizens' assets and data from cyber dangers.

Original languageEnglish
Title of host publicationISTAS 2022: IEEE International Symposium on Technology and Society 2022: Digital and Societal Transformations
EditorsT V GOPAL, Laurie LAU, Lennon CHANG, Greg ADAMSON
PublisherIEEE
Number of pages7
ISBN (Electronic)9781665484107
ISBN (Print)9781665484114
DOIs
Publication statusPublished - 2022
Externally publishedYes
Event2022 IEEE International Symposium on Technology and Society, ISTAS 2022 - Virtual, Online, Hong Kong
Duration: 10 Nov 202212 Nov 2022

Conference

Conference2022 IEEE International Symposium on Technology and Society, ISTAS 2022
Country/TerritoryHong Kong
CityVirtual, Online
Period10/11/2212/11/22

Bibliographical note

Publisher Copyright:
© 2022 IEEE.

Keywords

  • criminological theories
  • cyber fraud
  • cybercrime
  • motivation
  • police patrol
  • vulnerable victims

Fingerprint

Dive into the research topics of 'The Prevalence and Mechanisms of cyber fraud activities among Ghanaian Youths; Routine Activity, Space Transition, and Rational Choice from Differential Association Perspective'. Together they form a unique fingerprint.

Cite this