Hostname: page-component-848d4c4894-75dct Total loading time: 0 Render date: 2024-06-11T17:51:30.723Z Has data issue: false hasContentIssue false

Internet Scamming and the Techniques of Neutralization: Parents’ Excuses and Justifications for Children’s Involvement in Online Dating Fraud in Nigeria

Published online by Cambridge University Press:  30 August 2022

Richard Abayomi Aborisade*
Affiliation:
Department of Sociology, Olabisi Onabanjo University, Ago Iwoye, Ogun State, Nigeria
*
*Corresponding Author: Richard Abayomi Aborisade, Department of Sociology, Olabisi Onabanjo University, Ago Iwoye, Ogun State, Nigeria. E-mail: aborisade.richard@oouagoiwoye.edu.ng; ra.aborisade@gmail.com

Abstract

Techniques of neutralization have largely been used to explain the triadic relationship between cybercrimes, offenders and victims, while the possible involvement of the offenders’ social networks as accomplices has been ignored. Interviewing parents, a qualitative study of their children’s romance scam involvement was conducted in Nigeria, exploring the parents’ disposition towards their children’s delinquent behaviour. In all, 52 interviews were conducted, and a thematic analysis of the narratives was carried out. Findings indicated that parents’ initial opposition to cybercrimes and support for enforcing laws against perpetrators changed towards accepting their children’s involvement in romance fraud. Parents adopted their children’s neutralization techniques in accepting their deviance. These findings have important implications in understanding the depth of Internet scams and parents’ social expectations in controlling their children’s behaviours.

Abstracto

Abstracto

Las técnicas de neutralización se han utilizado en gran medida para explicar la relación triádica entre ciberdelitos, infractores y víctimas, mientras que se ha ignorado la posible implicación de las redes sociales de los infractores como cómplices. En Nigeria, se llevó a cabo un estudio cualitativo de la participación de hijos en estafas románticas, explorando la disposición de los padres hacia su comportamiento delictivo. Se realizaron 52 entrevistas y se realizó un análisis temático de las narrativas. Los hallazgos indicaron que la oposición inicial de los padres a los delitos cibernéticos y el apoyo para hacer cumplir las leyes contra los perpetradores cambiaron hacia la aceptación de la participación de sus hijos en fraudes románticos. Los padres adoptaron las técnicas de neutralización de sus hijos al aceptar su desviación. Estos hallazgos tienen implicaciones importantes para comprender la profundidad de las estafas en Internet y las expectativas sociales de los padres para controlar el comportamiento de sus hijos.

Abstrait

Abstrait

Les techniques de neutralisation ont largement été utilisées pour expliquer la relation triadique entre les cybercrimes, les auteurs et les victimes, tandis que lʼéventuelle implication des réseaux sociaux des auteurs comme complices a été ignorée. Une étude qualitative de l’implication de leurs enfants dans les escroqueries amoureuses a été menée au Nigéria, explorant la disposition des parents à lʼégard du comportement délinquant de leurs enfants. Cinquante-deux entretiens ont été menés et une analyse thématique des récits a été réalisée. Les résultats ont indiqué que l’opposition initiale des parents aux cybercrimes et le soutien à l’application des lois contre les auteurs ont évolué vers l’acceptation de l’implication de leurs enfants dans la fraude amoureuse. Les parents ont adopté les techniques de neutralisation de leurs enfants en acceptant leur déviance. Ces résultats ont des implications importantes pour comprendre la profondeur des escroqueries sur Internet et les attentes sociales des parents en matière de contrôle des comportements de leurs enfants.

抽象的

抽象的

中和技术在很大程度上被用来解释网络犯罪、犯罪者和受害者之间的三元关系,而犯罪者的社交网络作为共犯的可能参与却被忽略了。在尼日利亚对其孩子的浪漫骗局进行了定性研究,探讨了父母对孩子犯罪行为的态度。进行了 52 次访谈,并对叙述进行了主题分析。调查结果表明,父母最初对网络犯罪的反对和对执法打击犯罪者的支持转变为接受他们的孩子参与浪漫欺诈。父母采用了孩子的中和技巧来接受他们的偏差。这些发现对于理解网络诈骗的深度和父母在控制孩子行为方面的社会期望具有重要意义。

الملخص

الملخص

تم استخدام تقنيات التحييد إلى حد كبير لشرح العلاقة الثلاثية بين الجرائم الإلكترونية والجناة والضحايا ، في حين تم تجاهل المشاركة المحتملة للشبكات الاجتماعية للجناة كشركاء. أُجريت دراسة نوعية عن تورط أطفالهم في الاحتيال الرومانسي في نيجيريا ، لاستكشاف تصرف الوالدين تجاه سلوك أطفالهم المنحرف. تم إجراء 52 مقابلة وتحليل موضوعي للروايات. أشارت النتائج إلى أن معارضة الوالدين الأولية للجرائم الإلكترونية ودعم إنفاذ القوانين ضد الجناة تغيرت نحو قبول تورط أطفالهم في الاحتيال الرومانسي. اعتمد الآباء تقنيات تحييد أطفالهم في قبول انحرافهم. هذه النتائج لها آثار مهمة في فهم عمق عمليات الاحتيال عبر الإنترنت والتوقعات الاجتماعية للآباء والأمهات في التحكم في سلوكيات أطفالهم.

Type
Article
Copyright
© International Society of Criminology, 2022

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aborisade, Richard. 2016. Crime and Delinquency: A Sociological Introduction. Ibadan: Ibadan University Press.Google Scholar
Aborisade, Richard and Adedayo, Samuel. 2018. “Social Media and Youth Violence in Nigeria: A Psychosocial Review.” Ife PsychologIA 26(2):151–60.Google Scholar
Aborisade, Richard and Oni, Similade. 2020. “Sociological Profiling of Armed Robbery Convicts in Kirikiri Female Prisons, Lagos, Nigeria.” International Annals of Criminology 58(1):3954.Google Scholar
Aborisade, Richard and Oshileye, Temitope A.. 2020. “‘Voiceless Victims’: Children Living in the Red-Light Areas of Ibadan, Nigeria.” Journal of Victimology and Victim Justice 3(2):164–82.CrossRefGoogle Scholar
Annadorai, Kalaivani, Shaari, Azianura H., Kamaluddin, Mohammed R., and Krish, Pamela. 2020. “Factors Contributing to Online Dating Romance Scam Victimization: A Qualitative Study.” International Journal of Psychosocial Rehabilitation 24(4):4434–47.CrossRefGoogle Scholar
Arthur, Raymond. 2005. “Punishing Parents for the Crimes of their Children.” The Howard Journal of Crime and Justice 44(3):233–53.CrossRefGoogle Scholar
Boman, John H. and Freng, Adrienne. 2018. “Differential Association Theory, Social Learning Theory, and Technocrime.” Pp. 5565 in Technocrime and Criminological Theory, edited by Steinmetz, K. and Nobles, M.. New York: Routledge.Google Scholar
Braun, Virginia and Clarke, Victoria. 2006. “Using Thematic Analysis in Psychology.” Qualitative Research in Psychology 3(1):77101.CrossRefGoogle Scholar
Brewer, Russell, Fox, Sarah, and Miller, Caitlan. 2020. “Applying the Techniques of Neutralization to the Study of Cybercrime.” Pp. 547–65 in The Palgrave Handbook of International Cybercrime and Cyberdeviance, edited by Thomas, J. Holt and Adam, M. Bossler. Cham: Springer International Publishing.Google Scholar
Condry, Rachel. 2007. Families Shamed: The Consequences of Crime for Relatives of Serious Offenders. Cullompton, Devon: Willan.Google Scholar
Cressey, Donald R. 1953. Other People’s Money: A Study in the Social Psychology of Embezzlement. Glencoe, IL: The Free Press.Google Scholar
Cromwell, Paul and Thurman, Quint. 2003. “The Devil Made Me Do It: Use of Neutralization by Shoplifters.” Deviant Behavior 24(6):535–50.CrossRefGoogle Scholar
Curasi, Carolyn F. 2013. “The Relative Influences of Neutralizing Behavior and Subcultural Values on Academic Dishonesty.” Journal of Education for Business 88(3):167–75.CrossRefGoogle Scholar
Dearden, Thomas E. and Parti, Katalin. 2021. “Cybercrime, Differential Association, and Self-Control: Knowledge Transmission Through Online Social Learning.” American Journal of Criminal Justice 46(6):935–55.CrossRefGoogle Scholar
Fancy, Cheronoh. 2019. “Restoring the African Family: Inculturational Approach to Contemporary Family and Parenting Difficulties.” Journal of Humanities and Social Science 24(5):3641.Google Scholar
FBI. 2021. “Federal Bureau of Investigation: Internet Crime Report 2021.” Washington, DC: Internet Crime Complaint Center. Retrieved 28 March 2022 (https://www.ic3.gov/Home/AnnualReports).Google Scholar
Fletcher, Emma. 2022. “Reports of Romance Scams Hit Record Highs in 2021.” Federal Trade Commission. Retrieved 11 April 2022 (https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2022/02/reports-romance-scams-hit-record-highs-2021).Google Scholar
Fritsche, Immo. 2005. “Predicting Deviant Behavior by Neutralization: Myths and Findings.” Deviant Behavior 26(5):483510.CrossRefGoogle Scholar
Gauthier, Deann K. 2001. “Professional Lapses: Occupational Deviance and Neutralization Techniques in Veterinary Medical Practice.” Deviant Behavior 22(6):467–90.CrossRefGoogle Scholar
Glaser, Barney G. and Strauss, Anselm L.. 1967. “The Constant Comparative Method of Qualitative Analysis.” Pp. 101–58 in The Discovery of Grounded Theory: Strategies for Qualitative Research, edited by Glaser, B. and Strauss, A.. Chicago, IL: Aldine Publishing Company.Google Scholar
Hanoch, Yaniv and Wood, Stacey. 2021. “The Scams Among Us: Who Falls Prey and Why.” Current Directions in Psychological Science 30(3):260–6.Google Scholar
Hawdon, James, Parti, Katalin, and Dearden, Thomas E.. 2020. “Cybercrime in America Amid COVID-19: The Initial Results from a Natural Experiment.” American Journal of Criminal Justice 45(1):546–62.Google ScholarPubMed
Heath, Joseph. 2008. “Business Ethics and Moral Motivation: A Criminological Perspective.” Journal of Business Ethics 83(4):595614.Google Scholar
Kadoya, Yoshihiko, Khan, Mostafa S. R., Narumoto, Jin N., and Watanabe, Satoshi. 2021. “Who is Next? A Study on Victims of Financial Fraud in Japan.” Frontiers in Psychology 12:649565.Google Scholar
Kaptein, Muel and van Helvoort, Martien. 2019. “A Model of Neutralization Techniques.” Deviant Behavior 40(10):1260–85.CrossRefGoogle Scholar
Kemp, Steven, Miró-Llinares, Fernando, and Moneva, Asier. 2020. “The Dark Figure and the Cyber Fraud Rise in Europe: Evidence from Spain.” European Journal on Criminal Policy and Research 26(1):293–312.Google Scholar
King, Nigel and Horrocks, Christine. 2010. Interviews in Qualitative Research. London: Sage.Google Scholar
Leukfeldt, Eric R. and Yar, Majid. 2016. “Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis.” Deviant Behavior 37(3):263–80.CrossRefGoogle Scholar
Louderback, Eric R. and Antonaccio, Olena. 2021. “New Applications of Self-Control Theory to Computer-Focused Cyber Deviance and Victimization: A Comparison of Cognitive and Behavioral Measures of Self-Control and Test of Peer Cyber Deviance and Gender as Moderators.” Crime & Delinquency 67(3):366–98.CrossRefGoogle Scholar
Maruna, Shadd and Copes, Heith. 2005. “What Have We Learned from Five Decades of Neutralization Research?Crime and Justice 32(1):221320.CrossRefGoogle Scholar
Marx, Gary T. 2003. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59(2):369–90.Google Scholar
Morris, R. 2012. “Computer Hacking and the Techniques of Neutralization: An Empirical Assessment.” Pp. 457–73 in Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Morris, R.. Hershey, PA: IGI Global.Google Scholar
Nigerian Tribune. 2019. “Parents Back Yahoo Yahoo Youths, EFCC Cries Out.” Nigerian Tribune Newspapers, 18 May 2019, retrieved 10 April 2022 (https://tribuneonlineng.com/parents-back-yahoo-yahoo-youths-efcc-cries-out/).Google Scholar
Ogunleye, Yetunde O., Ojedokun, Usman, and Aderinto, Adeyinka. 2020. “Pathways and Motivations for Cyber Fraud Involvement among Female Undergraduates of Selected Universities in South-West Nigeria.” International Journal of Cyber Criminology 13(2):309–25.Google Scholar
Reporters, Sahara. 2019. “Just In: Mothers of ‘Yahoo Boys’ Now Forming Association – Magu.” Sahara Reporters, 31 October 2019, retrieved 24 March 2022 (http://saharareporters.com/2019/10/31/just-mothers-%E2%80%98yahoo-boys%E2%80%99-now-forming-association-%E2%80%93magu).Google Scholar
Somefun, Oluwaseyi D. and Odimegun, Clifford. 2019. “The Protective Role of Family Structure for Adolescent Development in Sub-Saharan Africa.” PLOS ONE 14(8):e0221723.Google ScholarPubMed
Spencer, Liz, Ritchie, Jane, and O’Connor, William. 2003. “Analysis: Practices, Principles and Processes.” Pp. 199218 in Qualitative Research Practice: A Guide for Social Science Students and Researchers, edited by Ritchie, J. and Lewis, J.. London: Sage.Google Scholar
Sykes, Gresham M. and Matza, David. 1957. “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22(6):664700.Google Scholar
Uroko, Favour C. 2021. “Proverbs 4:10–19 and the Growing Spate of Internet Fraud Amongst Nigerian Youths.” HTS Theological Studies 77(4):a6776.Google Scholar
Walstad, Lassa. 2021. “Catfish Analysis: The Countries with the Highest Rates.” TechShielder, 6 December 2021, retrieved 11 April 2022 (https://techshielder.com/catfish-analysis-the-countries-with-the-highest-rates).Google Scholar
Whitty, Monica T. 2019. “Who Can Spot an Online Romance Scam?Journal of Financial Crime 26(2):623–33.Google Scholar