You are on page 1of 27

CHAPTER ONE

BACKGROUND OF THE STUDY

1.1 INTRODUCTION
2 Rational Choice Approach to Theory Building
3 Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
4 science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
5 disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
6 example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
7 specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan
& Vos 2003).
8 Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
9 specific theory is based. They assume different variations of rationality, from full
rationality, bounded
10 rationality, and procedural rationality to social rationality. Theories with full
rationality assume that
11 individuals have complete knowledge about their decision alternatives, the
probabilities of their
12 outcomes, and their consequences. In turn, theories of bounded rationality assume
that the decision
13 makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
14 choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
15 1990). Finally, many RCT theories assume that individuals have preferences
ranging from selfishness,
16 opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
17 individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
18 are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
19 defined goals (Akers 1990). Other types of RCTs have also been proposed
(Gigerenzer & Selten 2001;
20 Hodgson 2012; McCarthy 2002).
21 IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et
al. 2010; Willison
22 & Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
23 attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
24 IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized
specificity, in terms of the

1|Page
25 information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
26 progress is an attempt to develop a specific rational choice process theory of
Internet scamming, by
27 focusing on the offenders’ perspective. The research methodology is described in the next
section.
Crime appears to be a permanent feature of modern society. Despite efforts of social
workers, law enforcement agency, personal and criminal justice professionals to minimize it,
the world is becoming a more terrible place. Where crimes such as homicide, kidnapping,
robbery, assault, sex offences, child molestation, burglary, environmental crime, arson are
crimes without a victim, economic crime, political crime and internet fraud are the order of
the day.

Internet fraud is one of the most rapidly increasing forms of computer crime. The advent
of the “Yahoo boys” subculture in tertiary institution has introduced another dimensions of
students involvement in internet fraud. Studies of internet fraud in Nigeria have been biased
to the emergence of “Yahoo boys” subculture while neglecting the importance of the
structure sustaining it. Internet fraud is a type of cybercrime fraud or deception which makes
use of the Internet and could involve hiding of information or providing incorrect information
for the purpose of tricking victims out of money, property, and inheritance Internet fraud is
not considered a single, distinctive crime but covers a range of illegal and illicit actions that
are committed in cyberspace. It is however, differentiated from theft since, in this case, the
victim voluntarily and knowingly provides the information, money or property to the
perpetrator. It is also distinguished by the way it involves temporally and spatially separated
offenders, A prime example was the global 2008 Beijing Olympic Games ticket fraud run by
US-registered "Xclusive Leisure and Hospitality", sold through a professionally designed
website with the name "Beijing 2008 Ticketing". On 4th August it was reported that more than
$50 million worth of fake tickets had been sold through the website. On 6th August it was
reported that the person behind the scam, which was wholly based outside China, was a
British ticket tout, Terance Shepherd.

Fraud is not a new phenomenon because it has always been around since human history.
Its definition and outcomes on victims have not changed with the use of the internet for
commercial purpose, the method of perpetration of fraudulent activities has evolved to
include online capabilities (Lee 2003). In other words, the internet has opened up a door for
the development of a criminal sector of fraud. The scary aspect of this type of new fraud is
that perpetrators can now use the anonymous advantage of the internet to cause harm (PBI
Media 2003). Since the internet works on the real time, a prospective victim can be harmed
much more easily and quickly. It is even possible for the criminal to harm the same victim
again and again because the fraudulent electronic transactions can be repeatedly processed
within a short period of time.

Internet fraud is defined as (i) computer-aided crime originating in the Nigeria internet
domain space (ii) computer-aided crime perpetrated by Nigerians located outside the
Nigerian internet domain space. In collaboration with Nigerians within the Nigerian internet

2|Page
domain space and crimes aimed at information and telecommunication technology (ICT),
infrastructure in Nigeria, from any location.

Like any other criminal act, Internet fraud, especially those involving youths in Nigeria,
has grown in leaps and bounds, winning more souls from partner agencies, who now
contribute to the successful execution of Internet fraud. Many undergraduates in Nigerian
Universities including Usmanu Danfodiyo University Sokoto have embraced Internet fraud as
a way of life. Many of them have become rich while some others have been caught by the
law. For example in the year 2019 some undergraduate students of Usmanu Danfodiyo
University suspected to be Yahoo boys were seen buying all the entire goods at the IBB
refreshment centre and giving it out to their fellow colleague, which caught the attention of
the school security. In Nigeria, youths, especially undergraduates and the unemployed have
embraced the ICT inventions, such that the Internet medium now takes larger part of their
days when compared to their other daily activities. The varieties of application offered by the
Net, such as, electronic mailing, ‘chat’ systems and Internet messaging (IM), often serve as
veritable grounds for carrying out nefarious ‘webonomics’ and other fraudulent activities by
the youths (Adeniran, 2008). This has significantly given birth to the emergence of ‘yahoo-
boys’ sub-culture among Nigerian youths, particularly in urban centres. The focus of this
research is to investigate the perception of undergraduate students who engage in internet
fraud (yahoo-boys) about their activities; understand the informal network sustaining Internet
fraud; and determine how it is organized into different areas of specialization among students
in tertiary institutions. The informal network has become important for planning,
implementing and executing organized criminal acts in Nigeria.

The modern world of the twenty-first century has come a long way from the days when
there was no internet, with most individuals unable to recollect how most activities were
completed before the internet. Current undergraduate students, for example, are always
commended for their educational experiences prior to the use or availability of the internet for
reasons such as term papers, assignments, research, and even communication. In essence, the
Internet's creation is regarded as a pivotal innovation because it has aided various
international advancements, including globalization. This has benefited people all throughout
the world, especially those in Africa.

In 1996, seven years after the internet was first introduced in the United States of
America, it was also introduced in Nigeria and with it came amenities, job opportunities and
the emergence of network providers. It is general knowledge that every development has its
beneficial and adverse effect; the latter for Nigeria is the rampant use of the internet as a
medium for fraudulent activities termed “Internet fraud” which is criminal activities majorly
for the purpose of exploiting individuals. It is a multi-dimensional and intrinsically
complicated problem. It has taken different forms containing numerous facets such as Online
intellectual property theft, Identity theft, phishing, Page jacking, Advance fee scams, Bad
check scams, Fake money orders, Wire transfer fraud, anonymous servers, hijacked emails,
fake websites being used as tools and medium for fraud by perpetrators. In the last decade,
the image of Nigeria and Nigerians took a very hard hit as internet scams and fraud assumed
increasingly alarming and frightening dimensions. As internet scams and fraud got on the

3|Page
rise, the image of Nigeria seems to be synonymous with these scams. In 1989 and 1990
before the internet age, Nigerians were involved in cross border defrauding with the use of
telex and written letter which is why with the advent of the internet Nigerians were
wrongfully viewed as the progenitors of most internet scams because of how notorious
citizens of the country became in the act all over the world. The Federal Bureau of
Investigation took an interest in the investigation of internet fraud and as stated on their
website (www.fbi.gov) the “Nigerian letter or 419 fraud” is of major target due to its
notoriety. The name ‘419’comes from the section of the Nigerian Criminal Code dealing with
fraud. In some cases this type of fraud is referred to as advance-fee fraud.

Cyber fraud is the dominant and most popular form of cybercrime among undergraduates in
Nigeria that is resulting into a huge economic and financial loss annually (Babatunde &
Olanrewaju, 2015; Idehen, Ojewumi, & Olasupo, 2013; Okeshola & Adeta, 2013; Anyawnu,
Oforegbu, Igbo & Obiyo, 2012; Amosun & Ige, 2009). The Nigerian Deposit Insurance
Corporation’s (NDIC) 2014 report indicated that cases of cyber frauds recorded on the
Nigerian banking sector’s e-payment platform between 2013 and 2014 increased by 183%
(This Day, 2016). Similarly, the 2014 annual report of the Centre for Strategic and
International Studies, UK estimated the annual cost of cybercrime in Nigeria to about 0.08%
of the gross domestic product (GDP), representing about N127 billion (This Day, 2016).
Indeed, the advancement in technology is increasingly transforming the nature, dimension,
intensity and the magnitude of internet fraud in Nigeria (Aderinto & Ojedokun, 2017; Tade &
Aliyu, 2011; Adeniran, 2008). Koong, Liu, and Wei (2006) view Internet (cyber) fraud as any
type of fraudulent scheme that involves using one or more components of the Internet to
perpetuate a crime. In their own submission, Tade and Aliyu (2011) articulate that the
Internet is presenting a new opportunity for the development of another criminal sector of
fraud. Similarly, Lee (2003) observes that the adoption of the Internet for commercial
purposes is also facilitating the successful perpetration of fraudulent activities online. Smyth
and Carleton (2011) assert that Internet fraud may occur under a wide a range of
circumstances which may include the presentation of misleading or deceitful information
online, failing to honour contractual agreements entered into online, or misappropriation of
funds transmitted electronically. Equally, Dzomira (2014) submits that the growing patronage
of e-banking services globally is contributing to the occurrence of financially motivated high
profile attacks. Levi and Burrows (2008) classified the two major victims of cyber fraud as
primary victims and secondary victims.

Primary victims are individuals and businesses or public bodies who initially suffer the harms
of fraud, while secondary victims include financial institutions, insurance companies, and
others who, by contract or regulation, agree to reimburse some or all of the costs to primary
victims (Levi & Burrows, 2008). Duffield and Grabosky (2001) divide cyber fraud into four
major categories: (a) fraud committed against an organisation by a principal or senior official
of that organisation; (b) fraud committed against an organisation by an “insider” or a
“outsider” such as a client; (c) fraud committed by one individual against another in the
context of face-to-face interaction; and (d) fraud committed against a number of individuals
through print or electronic media or by other indirect means. Fraud perpetration typically

4|Page
requires some specialised skills because it takes the forms of trick, cunning, deceit and unfair
means by which another is cheated (Singleton & Singleton, 2010). Cybercrimes that are
financially driven usually requires a high degree of organization and specialization (United
Nations Office on Drugs and Crime, 2013). In their analysis of the problem, (Jegede,
Oyesomi, &Olorunyomi, 2013) assert that internet fraud constitutes a major threat to the
modern global economy because of its attraction to criminal elements ranging from those
committing simple fraud crimes to major organised crime activities. McConnel (2000) cited
in Okeshola and Adeta (2013) posits that cyber fraud differ from other forms of crimes due to
the fact that it is simple to learn and understand; it requires little resources to support the
talent to cause damage or destruction; it can be committed in an environment or an area
without the physical appearance of the criminal; and the illegality of the case may be difficult
to prove. Generally, online fraudsters create their markets and products through surfing the
Internet, and by maintaining complex relationship within the web through spatial interactions
globally (Jegede, Oyesomi, & Olorunyomi, 2016).

1.2 STATEMENT OF THE PROBLEM

The contribution s of internet to the academic development among Nigerian


undergraduate students has been marred by the conscious evolution of new waves of crime.
The internet has also become an environment where the most productive and safest offence
thrives. Internet fraud has come as a surprise and a strange appearance that lives with us in
Nigeria, especially among undergraduate students of Nigeria universities. With eaoch passing
day, we experience incessant cases of internet fraud and cyber-crimes perpetrated by
Nigerian undergraduate students especially students of Usmanu Danfodiyo University
Sokoto, with each new case more shocking than the previous ones.

It has become a stubborn mouth which causes us a lot of pain and shame because it is
observed that criminally minded undergraduate students in Usmanu Danfodiyo university are
stealing and committing all sorts of academic and economic atrocities through the aid of the
internet online contact and transactions. In most cases, various forms of crimes are being
witnessed ranging from examination malpractice, rape, robbery and stealing, sexual
molestation, onslaught, hooliganism amongst others. With this ugly happening, the face of
the departments and the institution at large has suffered a lot of setbacks in their academic
pursuit. In the light of this circumstance, this study examines the internet fraud among
undergraduate students of Usmanu Danfodiyo University.

1.3 Objectives of the Studies

The main objective of this study is to examine Internet fraud among undergraduate
students of Usmanu Danfodio University Sokoto. while the specific objectives are to:

1. Determine the factors responsible for students’ indulgence in internet Fraud in Usman
Danfodiyo University Sokoto.

5|Page
2. Find out the consequences of internet fraud on academic achievements of
undergraduate students of Usman Danfogiyo University Sokoto.
3. Proffer possible measures to be taken in order to remedy the problems of internet
fraud among students of Usmanu Danfodiyo University, Sokoto.

1.4 Research Questions

The following research questions were raised to guide the study:

1. What are the factors responsible for students’ indulgence in internet fraud in Usmanu
Danfodiyo University?

2. What are the consequences of internet fraud on students academic achievements at


Usmanu Danfodiyo University Sokoto?

3. What are the possible measures to be taken to remedy the problems of internet fraud
among students of Usmanu Danfodio University?

1.5 Significance of the Study

The research is important in studying different factors, that triggers student (undergraduate)
to engage in internet fraud and criminal activities. It is of significance in the sense that it
studies factors responsible for internet fraud and focuses on the causes and consequences of
internet fraud on students in Usmanu Danfodiyo University. It also provides strategies and
how the policy makers and law enforcement agents can reduce internet related crimes.

The study is of great significance in the following ways: The study will expose various means
adopted by miscreant who indulge in internet fraud. Not that alone, the study will reveal the
negative influence of internet fraud on undergraduate students in its entirety. The study will
serve as a guide to future researchers on similar or related topics.Similarly, the study will
assist the school management of Usmanu Danfodiyo University, stakeholders, government
and policy makers to modify the existing policy which will in turn lead to a more improved
policy as relate to internet fraud.

Finally the study will serve as one of the strongest instruments to fight a successful war
against internet fraud among undergraduate students of Usmanu Danfodiyo University in
particular and Nigerian Universities in general.

1.6 Scope and Limitations of the Study

The study focuses on student involvement in internet fraud and other related offences in
Usmanu Danfodiyo University Sokoto

The study is limited to investigate students from different faculties in the school premises
also other student at the city campus , by studying their involvement in internet fraud in

6|Page
Usmanu Danfodiyo University sokoto. This study basically focuses only on Usmanu
Danfodiyo university student and purposely to study the negative impact of internet fraud in
the university.

1.7 /Operational Definition of Terms

INTERNET: An electronic communications network that connects computer networks and


organization computer facilities around the world. (Meriam Webster)

CRIME: Crime is an illegal acts that goes contrary to the norms and values of a given
society.

FRAUD: Fraud is any acts of deceptipon carried out for the purpose of unfair, undeserved
and unlawful gain (Oxford)

INFLUENCE: the power to cause changes without directly forcing them to happen .

STUDENT: A person who attend a school, college or University.

UNDEGRADUATE: A student at a university or college who is studying for his or her first
degree.

CYBERCRIME: is a criminal activity that either targets or uses a computer, a computer


network or a networked device.

FRAUDSTER: a person who commits fraud, especially in business dealings.

7|Page
CHAPTER TWO

REVIEW OF RELATED LITERATURE

INTRODUCTION

The purpose of this Section is to provide the readers with a comprehensive review of
the related literature problems on investigation the review of related literature will briefly
expand upon the introduction and background information presented in chapter one. This
chapter will contain theories and models relevant to the problem, a historical overview of the
problem, current trends related to the problems, and significance research data publish about
the problem

2.1 Literature Review

According to the FBI's 2017 Internet Crime Report, the Internet Crime Complaint Center
(IC3) received about 300,000 complaints. Victims lost over $1.4 billion in online fraud in
2017.[4] According to a study conducted by the Center for Strategic and International Studies
(CSIS) and McAfee, cybercrime costs the global economy as much as $600 billion, which
translates into 0.8% of total global GDP.[5] Online fraud appears in many forms. It ranges
from email spam to online scams. Internet fraud can occur even if partly based on the use of
Internet services and is mostly or completely based on the use of the Internet.

Internet fraudsters in Nigeria have recognized online opportunities to perpetrate


online frauds. The National Fraud Information Centre (NFIC), in 2007 listed top ten reported
Internet scams to include: fake cheque scams (29%), general merchandise (23%), auctions
(13%), Nigerian money offers (11%), lotteries (7%), advance fee loans (3%),
prizes/sweepstakes (3%), phishing (3%), friendship and sweetheart swindles (1%) and
Internet access services scam (1%)5Of these, $4, 043.14 is lost by victims of the Nigerian
money transfer scam. Katyal (2002) posits that, at present, the damage caused by computer
fraud runs to billions of dollars each year, making it one of the most economically damaging
forms of crime in human history. Each day, more than half a billion people around the world
log on to the Internet to buy and sell goods, to exchange ideas and to communicate promising
opportunities and innovative solutions.

As billions of dollars cross across the Internet each day, a small group of predators
have chosen to make cyberspace a place for crime and fraud. Ige (2008) examined secondary
school students’ perceptions of incidences of Internet crimes among school-age children in
Oyo and Ondo States, Nigeria. The study indicated that students are being initiated into
Internet crime by their friends in the universities, polytechnics, and colleges of education.
Furthermore, male students are more involved than their female counterparts, a reflection of
what happens worldwide. Also, senior secondary school students’ involvement in Internet
crime is not a function of the socioeconomic status of their parents, as students from both rich
and poor homes engage in the crime.

In addition to this, the involvement of students in Internet crime has no effect on their
academic performance, as the students’ higher level of cognitive thinking being used to scam

8|Page
people on the Internet is being exploited to enhance their academic standard. Adeniran (2008)
contends that in Nigeria, unlike the traditional criminal groups, both sexes are functionally
involved in Internet fraud in Nigeria, with varying specialized functions. Reddick and King
(2000) and Adeniran (2006) claim that the anonymity and privacy that the Internet provides
for potential users has excessively enhanced the degree of fluidity and structural complexity
of the ‘yahoo-boys’ operations in Nigeria. Today, they get access to the Internet without
leaving the home.

Embezzlements, electronic frauds, fictitious sales of properties and cars are all being
carried out without leaving a trace. Also, gender switching – a new sense of self that is
“decentred and multiple” – has emerged among the yahoo-boys in Nigeria. This is essentially
for the purpose of facilitating their nefarious activities. At a single point in time, an individual
could claim to be a “beautiful lady” or a “big man” or a “celebrity”, all depending on his/her
immediate needs. Arowosaiye (2008) avers that fraudsters in Nigeria and their foreign
counterparts are perfect exploiter of global financial growth and ICT advancement which
renders traditional geographical expression meaningless.

Today, it is possible to plan a crime in one country, carry it out in another and move
the proceeds from one country to another or more countries, all from a personal computer.
The categories of economic and financial crimes in Nigeria are too wide to be exhausted here.
However, the recent phenomenon of phishing, identity theft, credit card fraud, which are
closely related forms of cyber or internet frauds and internet piracy are emerging economic
crimes which need to be addressed by the existing Nigerian criminal law. Michael (2006)
asserts that phishing, credit card fraud and identity fraud are not really distinct form of ICT
enabled or internet economic crimes but rather another method of online fraud scheme. Using
this method, fraudsters create websites that appear legitimate but in reality are scam designed
to defraud or obtain information that can be used to commit further economic crimes.
Evidently, there is a gap in the literature on studies concerning the organization of internet
fraud among undergraduates. This is what this investigation tries to fill.

INTERNET FRAUD IN NIGERIA

The history and growth of internet in Nigeria can be traced to 1995, when The Nigerian
Internet Group was formed; this is a non-governmental organization, with the objective of
facilitating the full access to internet in Nigeria. This group was formed after the first internet
workshop organized by the Yaba College of Technology in collaboration with a number of
organizations including the Nigerian Communications Commission, National Data Bank,
Literacy Training and Development Program for Africa (University of Ibadan) and
Administrative Staff College of Nigeria (ASCON), with direct assistance from the United
States Information Service (USIS), Regional Information Network for Africa (RINAF) and
the British Council. In 1996, seven years after the introduction of internet service in United
States, the Nigerian Communications Commission decided to license 38 internet service
providers to sell internet services in Nigeria. The very first internet service provider “Link
serve Limited” began operation in 1st of January 1997. (Vanguard Nigeria, 2010) Another
major African seminar was held in May 1999, where internet policies were made for African

9|Page
countries. It was organized by the Ministry of Communication and titled Africa Internet
Summit (AFRINET 99). The research on the growth of internet usage in Nigeria was carried
out by the International Communication Union between the periods of 1996 -2009. They
reported as follows; in 2000, it was 0.3% it moved up a little between 2002 and 2004, when it
rose to 1.5%, by 2007 it had escalated to 7% and by 2008, it rose speedily to 15%.

EFCC (2006) reported the rate of internet crime in Nigeria and the position of the
country amongst other countries where cybercrime is prevalent. The publication reported a
retired civil servant with two other accomplices who defrauded a German citizen, Klaus
Wagner a sum of USD 1, 714,080 through the internet. Ribadu (2007) the pioneer Chairman
of EFFC posited that the prominent forms of cybercrime in Nigeria are cloning of websites,
false representations, internet purchase and other e-commerce kind of fraud. His position was
later corroborated by the statement of Olugbodi (2010) where he opined that the most
prevalent forms of cybercrime are website cloning, financial fraud, identity theft, credit card
theft, cyber theft, cyber harassment, fraudulent electronic mails, cyber laundering and virus/
worms/ Trojans.

REASONS FOR GETTING INVOLVED IN CYBERCRIME BY


UNDERGRADUATES

When the internet was developed, the founding fathers of internet hardly had any inclination
that internet could be misused for criminal activities. Today, there are many disturbing things
happening in the cyberspace . However, scholars have attributed the causes of cybercrime in
the world to the following: that the causes of cybercrime include unemployment, negative
role model, lack of adequate policing facilities and social gratification . According to him, all
these reasons serve to facilitate cybercrime in most of the world. The widespread of
corruption, harsh economic climate, high underemployment, disregard for the rule of law,
lack of transparency and accountability in governance are the main causes of cybercrime in
most countries of the world . Cybercrime could be associated with two causes which are the
primary and secondary. The primary causes include the prevalence of poverty and weak
educational system . The secondary cause can be trace to greed, corruption and get rich quick
syndrome. The high level of corruption and the spread of poverty is seen as the main cause of
cybercrime in Nigeria among university undergraduates . Most Nigeria undergraduate is said
to be living below the poverty line (below $1 (#360.50) per day). Over 5 million Nigerian
university undergraduate have no hope of what to do when they graduate from the university.
Hence they resort to cybercrime as a means of paving ways for tomorrow.

Problems associated with cybercrime

Life is a mix of good and bad. So is the internet despite its advantages, the internet has its
dark side. Cybercrime is not without cost and these cost increase daily. Cybercrime manifest
in various ways such as loss of life, loss of dignity and loss of employment. The impact of
cybercrime is not only limited to the victim; it spreads its impact on the society. The

10 | P a g e
consequences of cybercrime on the economy to include loss of revenue, wasted time,
damaged the reputation and reduced productivity among others [30].

Loss of Revenue

One of the main effects of cybercrime on an economy is the loss of revenue. For example in
financial institutions or multinational co-operations, loss of revenue can be caused by an
outside party who obtain sensitive financial information and uses it to withdraw funds from
the account of such an institution. Cybercrime can occur when a business’ ecommerce site
become compromise while inoperable, valuable income is lost when consumers are unable to
use the site.

Damaged Reputation

In cases where customers records are compromised by a security breach associated with
cybercrime, a company’s reputation can take a major hit. Customers whose credit card or
other financial data become intercepted by hackers or other infiltrators lose confidence in
such an organisation and often begin taking their business elsewhere. Due to these problems,
foreign investors often consider Nigeria as an unattractive market, and it has a detrimental
impact on Nigeria citizenry when they travel outside to do business.

Reduce productivity

Due to the measures that many companies must implement to counteract cybercrime, there is
often a negative effect on employee productivity. This is because, due to security measures,
employees must enter more passwords and perform other time-consuming acts in other to do
their jobs. Every second wasted performing this task is a second not spent working
productively. The impact of cybercrime already has a detrimental influence on Nigerian
Citizenry/Economy. Global anti-corruption body, such as Transparency International has
listed Nigeria as one of the most corrupt countries in the world [31]. Private companies
around the world are beginning to take steps geared to blocking email traffic originating from
Nigeria. Nigerian financial instruments are now accepted with extreme due to diligence
around the world and some international banks have completely denied access to theirwebsite
if the traffic originates from Nigeria.

2.2 Theoretical Framework

2.2.1 RATIONAL CHOICE THEORY

Rational choice theory and its assumptions about human behavior have been integrated into
numerous criminological theories and criminal justice interventions. Rational choice theory
originated during the late 18th century with the work of Cesare Beccaria in the late 18 th
century The rational choice perspective has been applied to a wide range of crimes, including
robbery, internet fraud drug use, vandalism, and white-collar crime.

Rational Choice Approach to Theory Building

11 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.
Rational Choice Approach to Theory Building

12 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.
Rational Choice Approach to Theory Building

13 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.
Rational Choice Approach to Theory Building

14 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.
Rational Choice Approach to Theory Building

15 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.
Rational Choice Approach to Theory Building

16 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.
Rational Choice Approach to Theory Building

17 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.
Rational Choice Approach to Theory Building

18 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.
Rational Choice Approach to Theory Building

19 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.
Rational Choice Approach to Theory Building

20 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.
Rational Choice Approach to Theory Building

21 | P a g e
Rational choice theories (RCTs) have a long history in disciplines such economics,
sociology, political
science, and criminology (Akers 1990). Because different RCT theories have been
developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For
example, when Cornish and Clarke (1986) developed an RCT in criminology, it was
developed to explain a
specific form of street crime, e.g., burglaries in specific neighborhoods (de Haan &
Vos 2003).
Nevertheless, many of the RCTs in different disciplines share a common core
assumption on which the
specific theory is based. They assume different variations of rationality, from full
rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that
individuals have complete knowledge about their decision alternatives, the probabilities
of their
outcomes, and their consequences. In turn, theories of bounded rationality assume that
the decision
makers do not have complete knowledge, are limited by time and their own cognitive
abilities, and will
choose a course of action that they believe will maximize their benefits (Cornish &
Clarke 1986; Akers
1990). Finally, many RCT theories assume that individuals have preferences ranging
from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an
individual will readily break rules (e.g., cheat) to maximize his or her benefits. In most
RCTs, individuals
are regarded as self-interested agents with the ability to make judgments about
achieving subjectively
defined goals (Akers 1990). Other types of RCTs have also been proposed (Gigerenzer
& Selten 2001;
Hodgson 2012; McCarthy 2002).
IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu et al.
2010; Willison
& Siponen 2009). When adapting theories from other disciplines to an IS setting, it is
important to pay
attention to the context by refining the theory based on the context (Hong et al. 2013).
Similarly, several
IS researchers (e.g., Orlikowski & Iacono 2001; Weber 2003) have emphasized specificity, in
terms of the
information technology (IT) artifact in IS theory development. Following this idea,
this research-in-
progress is an attempt to develop a specific rational choice process theory of Internet
scamming, by
focusing on the offenders’ perspective. The research methodology is described in the next
section.

22 | P a g e
Rational Choice Approach to Theory Building Rational choice theories (RCTs) have a
long history in disciplines such economics, sociology, political science, and criminology
(Akers 1990). Because different RCT theories have been developed in different
disciplines and sometimes within different contexts within those disciplines, various
approaches exist. For example, when Cornish and Clarke (1986) developed an RCT in
criminology, it was developed to explain a specific form of street crime, e.g., burglaries
in specific neighborhoods (de Haan & Vos 2003). Nevertheless, many of the RCTs in
different disciplines share a common core assumption on which the specific theory is
based. They assume different variations of rationality, from full rationality, bounded
rationality, and procedural rationality to social rationality. Theories with full rationality
assume that individuals have complete knowledge about their decision alternatives, the
probabilities of their outcomes, and their consequences. In turn, theories of bounded
rationality assume that the decision makers do not have complete knowledge, are limited
by time and their own cognitive abilities, and will choose a course of action that they
believe will maximize their benefits (Cornish & Clarke 1986; Akers 1990). Finally,many
RCT theories assume that individuals have preferences ranging from selfishness,
opportunism, egoism, and linked-utility to solidarity. A selfishness assumption, for
example, implies an individual will readily break rules (e.g., cheat) to maximize his or her
benefits. In most RCTs, individuals are regarded as self-interested agents with the ability
to make judgments about achieving subjectively defined goals (Akers 1990). Other types
of RCTs have also been proposed (Gigerenzer & Selten 2001; Hodgson 2012; McCarthy
2002). IS researchers have adopted economic and criminal versions of RCTs (e.g., Bulgurcu
et al. 2010; Willison & Siponen 2009). When adapting theories from other disciplines to an
IS setting, it is important to pay attention to the context by refining the theory based on the
context (Hong et al. 2013). Similarly, several IS researchers (e.g., Orlikowski & Iacono 2001;
Weber 2003) have emphasized specificity, in terms of the information technology (IT)
artifact in IS theory development. Following this idea, this research-in-progress is an
attempt to develop a specific rational choice process theory of Internet scamming, by
focusing on the offenders’ perspective. The research methodology is described in the
nextsection.

2.2.2 PSYCHOLOGICAL MECHANISM THEORY

The majority of previous research conducted in this area predominantly focus on the
persuasive influence of the scam message employed by the fraudster (Chang and Chong
2010) or the knowledge of scams held by the potential victim . The purpose of this systematic
review is to extend that focus to incorporate variables related to individual psychological
differences, i.e. those which make people more vulnerable to be deceived by fraudulent
communications (see Judges et al. 2017). Research by Modic and colleagues has highlighted
individual differences to scam compliance through the lens of susceptibility to persuasion and
wider theoretical links with social influence (see Modic et al. 2018; Modic and Lea 2013).
The development of the Susceptibility to Persuasion (StP) scale has demonstrated good
construct validity in relation to self-report scam plausibility across large samples. The second
iteration (StP-II; see Modic et al. 2018) incorporates 10 subscales measuring individual

23 | P a g e
differences in a range of mechanisms, including sensation seeking, risk preferences, and
social influence. However, we are still some way from achieving a robust and testable model
of online fraud susceptibility. Dispositional factors currently assessed in the literature
predominantly focus on demographic factors, such as age, gender, income, and education
(Purkait et al. 2014), in conjunction with individual characteristics, such as low selfcontrol
(Holtfreter et al. 2008), high levels of perceived loneliness (Buchanan and Whitty 2014), and
impulsivity (Pattinson et al. 2011). The application of Petty and Cacioppo’s (1986)
elaboration likelihood model (ELM) to explain how psychological mechanisms impact
deception likelihood is common (see Vishwanath et al. 2011), although few have applied this
theoretical model to explore how dispositional factors influence an individual’s cognitive
processing associated with ictimization. Similarly, there are a limited number of
experimental designs or use of large secondary data sets in this field, both of which would
provide the vital understanding of ‘how’ these influences occur. Upon reflection, much of the
literature exploring dispositional factors and vulnerability to fraud is limited in scope in terms
of understanding the psychological mechanisms that lead people to become victims of these
scams. Without sufficient grounding in established psychological mechanisms, attempts to
prevent or limit ictimization will likely underperform. The aim of this systematic review is
to collate and analyse the key research in relation to the psychology of Internet fraud to
ascertain the baseline theoretical and research knowledge in this growing area, focusing on
established psychological theories and empirically based methodologies.

24 | P a g e
CHAPTER THREE

RESEARCH METHODOLOGY

Introduction

This Section describes and justifies various research methodological process applied in the
study, Oguonu & Anugwom view methodology as the framework of activity or operations of
research. The discussion in this chapter focuses on the research design, population of the
study, sample size and sample techniques, instrument for data collection, validity of the
instrument, reliability of the instrument, methods of data collection and methods of data
analysis.

3.1 Research Design

The research design adopted for this study was a survey method. This method requires a
large number of respondents and describes its population by selecting a sample from the
population study. It involves the use of questionnaires to allocate data from the sample and
input result from the data of population.

3.2 Study Area/Setting

The study area is situated in Usmanu Danfodiyo University, Sokoto which is of 12


faculties and over 50 departments. The university was situated in the Northern part of Nigeria
and established in 1975, the school is a public research university located in the city of
Sokoto, Nigeria. It is one of the initial twelve universities founded in Nigeria by the federal
government in 1975.

25 | P a g e
Usmanu Danfodiyo has three (3) different campuses; the permanent site, The City
campus, and the Usmanu Danfodiyo Teaching Hospital Campus.institution has post graduate,
undergraduate, diploma and pre-degree programs.

3.3 Study Population

The study population of this study only focused on undergraduate student of the university to
investigate internet fraud, cyber crime and related activities within the campus.

3.4 Sampling Size and Procedures

The study will use stratified sampling method, It involves dividing the population in strata
(subgroup). It is used when we have to select sample from a heterogeneous population. The
sample size of 10 respondents each from 20 selected departments which applies quantitative
method of research.

3.5 Methods of Data Collection

With the aid of necessary and relevant information that will gathered systematically to the
subject matter. The method was decided on the basis of the objective of the study. The
questionnaire Method will be the tool of data collection, which will be used for the purpose
of collecting data from the respondents.

3.6 Methods of Analysis

The quantitative data was analyzed with the aid of special package for social science
(SPSS). The data was analyzed by this software to find out the percentage and necessary
analysis of the data gathered.

3.7 Ethical Considerations

Taking cognizance of the nature and effect of internet fraud among undergraduate in Usmanu
Danfodiyo University, there will always be new and unexpected challenges to stay ahead of
internet criminal and internet fraudster, but we can only do this successfully by partnership
and collaboration of both individuals and government. There is much we can do to ensure a
safe, secure, and trust worthy computing environment. It is crucial not only to our general
sense of well being but also to our national security and economy..

The remarkable development in human history through computer technology has no


doubt brought transformation in all aspect of life especially in communication and
information technology.

26 | P a g e
27 | P a g e

You might also like