Abstract

Purpose The purpose of this paper is to critically examine the evolution of a particular variant of cyber fraud known as the Nigerian prince scam and to demonstrate its socio-cultural impact. These scams are also referred to as yahoo scams. This paper traces the history of the Nigerian prince scam and how the scheme has evolved over the years to become more sophisticated, audacious and damaging to its victims. Design/methodology/approach The analytic approach is conceptual, drawing on institutional anomie theory, social learning theory and routine activity theory to explain this unique typology of cybercrime. Data were collected and analysed from books, journal articles, newspaper articles and other electronic Web sources. Findings The ineffective political leadership of Nigeria’s present elected and past military leaders could be attributed to creating culturally induced pressures to secure monetary success by the scammers. A significant number of people involved in this malfeasance justify these crimes with the argument of being owed reparations for colonisation, which might explain why international and local agencies may not be effective at eradicating this crime problem. Originality/value Despite the continued perpetration of the Nigerian prince scam, current research has not presented an evolutionary view of this fraudulent operation. This paper adds to the literature by explaining the origins of the scam, how they have developed over time and how internet technology has advanced the sophistication of the scam.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.