Full Paper View Go Back
Analysis of 419 Scams: The Trends and New Variants in Emerging Types
Polra Victor Falade1
Section:Research Paper, Product Type: Journal-Paper
Vol.11 ,
Issue.5 , pp.60-74, Oct-2023
Online published on Oct 31, 2023
Copyright © Polra Victor Falade . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Polra Victor Falade, “Analysis of 419 Scams: The Trends and New Variants in Emerging Types,” International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.5, pp.60-74, 2023.
MLA Style Citation: Polra Victor Falade "Analysis of 419 Scams: The Trends and New Variants in Emerging Types." International Journal of Scientific Research in Computer Science and Engineering 11.5 (2023): 60-74.
APA Style Citation: Polra Victor Falade, (2023). Analysis of 419 Scams: The Trends and New Variants in Emerging Types. International Journal of Scientific Research in Computer Science and Engineering, 11(5), 60-74.
BibTex Style Citation:
@article{Falade_2023,
author = {Polra Victor Falade},
title = {Analysis of 419 Scams: The Trends and New Variants in Emerging Types},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2023},
volume = {11},
Issue = {5},
month = {10},
year = {2023},
issn = {2347-2693},
pages = {60-74},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3287},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3287
TI - Analysis of 419 Scams: The Trends and New Variants in Emerging Types
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Polra Victor Falade
PY - 2023
DA - 2023/10/31
PB - IJCSE, Indore, INDIA
SP - 60-74
IS - 5
VL - 11
SN - 2347-2693
ER -
Abstract :
The rapid advancement of technology has brought about significant transformations in various facets of human existence, ushering in an era of improved communication, streamlined business operations, enhanced healthcare, accessible education, and efficient environmental monitoring. Nonetheless, this escalating reliance on technology has also given rise to a notable upsurge in cybercrime, with cyber scams proliferating as a concerning subset of these criminal activities. Among the enduring cyber scams, the "419 scam," colloquially known as the Nigerian scam, has persisted for decades, encompassing a spectrum of fraudulent activities such as advance fee scams, counterfeit lotteries, and black money schemes. Originally disseminated via postal mail and subsequently through fax, this fraudulent endeavour has now transitioned to email as its primary medium of operation. This research endeavour seeks to discern contemporary manifestations of 419 scam emails, particularly in the aftermath of the COVID-19 pandemic, and delve into the prevalent email subjects employed in these deceptive communications. Examination of a sample of 419 scam emails has unveiled an array of trending scams, which include but are not limited to the "lucky winner," "threat of exposure," "business/partnership proposals," "investment," "cancer/long-term illness," "fund," and "compensation" scams. Concurrently, emerging scams in the post-pandemic landscape encompass COVID-related scams, cryptocurrency schemes, marketing contact swindles, and fraudulent software development offers. Irrespective of the specific scam archetype, a shared facet is the recurring utilization of specific email subjects such as `Re,` `Good day,` `Greetings,` `Dear friend,` `Confirm,` `Attention,` and `Hello dear` by these fraudulent actors. The implications of cybercrime, particularly the tenacious 419 scams, are profound, encompassing the erosion of trust, substantial financial losses incurred by individuals and organizations alike, and detriment to Nigeria`s international reputation and economic progress. Consequently, it is imperative to undertake concerted efforts to combat cyber scams and bolster cybersecurity measures. These endeavours are indispensable in safeguarding individuals and entities against the perils of these deceptive schemes, ultimately contributing to the preservation of digital integrity and security.
Key-Words / Index Term :
Scams, 419 scams, cybercrime, emails, Nigerian scams, cybersecurity
References :
[1] O.C. Agbo, S. Ugwuanyi, And U. Isaac, “Evaluating Cybercrime Based On Internet Of Things Technology,” Vol.10, No.1, pp. 93–101, 2022.
[2] S. Ibrahim, “Causes of Socioeconomic Cybercrime in Nigeria,” no. June, 2019, doi: 10.1109/ICCCF.2016.7740439.
[3] N.Y. Conteh and P.J. Schmick, “Cybersecurity?: risks , vulnerabilities and countermeasures to prevent social engineering attacks Cybersecurity?: risks , vulnerabilities and countermeasures to prevent social engineering attacks,” no. February, 2016, doi: 10.19101/IJACR.2016.623006.
[4] A. Ojilere and I. K. E. Oraegbunam, “Conceptualizing cyber scam in nigeria,” no. November 2018, 2021.
[5] P. Bisht and M.S. Rauthan, “Machine Learning and Natural Language Processing Based Web Application Firewall for Mitigating Cyber Attacks in Cloud,” vol. 11, no. 3, pp. 1–15, 2023.
[6] NCC, “NCC Hinges Nigeria’s 122 million Internet users’ protection on effective governance,” 2019. (accessed Jun. 15, 2023).
[7] E. Eze-Michael, “internet fraud and its effect on nigeria’s image in international relations,” Vol.12, No.1, 2021.
[8] K. Mohammed, Y. Mohammed, and A. Solanke, “Cybercrime and Digital Forensics?: Bridging the gap in Legislation , Investigation and Prosecution of Cybercrime in Nigeria Cybercrime and Digital Forensics?: Bridging the gap in Legislation , Investigation and Prosecution of Cybercrime in Nigeria,” Vol.2, No.1, pp.56–63, 2019.
[9] A. B. Hassan, F. D. Lass, and J. Makinde, “Cybercrime in Nigeria?: Causes , Effects and the Way Out,” Vol.2, No.7, pp.626–631, 2012.
[10] R.E. Yoro, F. O. Aghware, M. I. Akazue, and A. E. Ibor, “Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian,” no. December 2022, pp.1943–1953, 2023, doi: 10.11591/ijece.v13i2.pp1943-1953.
[11] T.M. Ajayi, “Anti-language , Slang and Cyber Scam Subculture among Urban Youth in Southwestern Nigeria,” Vol.13, No.2, pp.511–533, 2019, doi: 10.5281/zenodo.3709011.
[12] O. Tade and I. Aliyu, “Social Organization of Internet Fraud among University Undergraduates in Nigeria,” Vol.5, No. December, pp.860–875, 2011.
[13] M.K. Adu, B. K. Alese, and O. S. Adewale, “Mitigating Cybercrime and Online Social Networks Threats in Nigeria,” Vol.1, pp.22–24, 2014.
[14] S. Lazarus, M. Button, and A. Adogame, “Advantageous comparison?: using Twitter responses to understand similarities between cybercriminals ( ‘ Yahoo Boys ’ ) and politicians ( ‘ Yahoo men ’ ),” Heliyon, Vol.8, no. September, p.e11142, 2022, doi: 10.1016/j.heliyon.2022.e11142.
[15] S.J. Oluwafemi, “Cybercrimes In Nigeria And Counter Measures,” Vol.4, No.4, pp.327–332, 2017.
[16] S. Abdullahi, G. Ph, and A. Rukayyat, “A Historical Assessment of Cybercrime in Nigeria?: Implication for Schools and National Development,” Vol.9, No.9, pp.84–94, 2021.
[17] O. George, R. A. Ngwoke, D. Ph, M. Ll, and B. Ll, “Combating the Menace of Cybercrime in Nigeria?: A Review of the Cybercrime ( Prohibition , Prevention etc ) Act 2015 and Other Legislations,” Vol.119, no. March, pp.1–17, 2022, doi: 10.7176/JLPG/119-01.
[18] U.A. Ojedokun and M. C. Eraye, “Socioeconomic Lifestyles of the Yahoo-Boys?: A Study of Perceptions of University Students in Nigeria,” Vol.6, no.2, pp.1001–1013, 2012.
[19] A. Omotubora, “Comparative perspectives on cybercrime legislation in Nigeria and the UK - a case for revisiting the " hacking " offences under the Nigerian Cybercrime Act 2015,” Vol.7, No.3, pp.1–15, 2016.
[20] U.V Awhefeada and O. O. Bernice, “Appraising the Laws Governing the Control of Cybercrime in Nigeria,” Vol.8, No.1, pp.30–49, 2020, doi: 10.15640/jlcj.v8n1a3.
[21] J. Isacenkova, O. Thonnard, A. Costin, A. Francillon, and D. Balzarotti, “Inside the scam jungle?: a closer look at 419 scam email operations,” pp.1–18, 2014.
[22] Y. Park, J. Jones, D. Mccoy, E. Shi, and M. Jakobsson, “Scambaiter?: Understanding Targeted Nigerian Scams on Craigslist,” no. February, pp.23–26, 2014.
[23] T. Meder, “The Nigerian Scam 2 . 0 How an improved online scam trick made an unsuspecting Dutch man over 20 , 000 euros poorer,” pp.47–60, doi: 10.17345/elop202247-60.
[24] T. Neuhaus, “A (Nudge) Psychological Reading Of The ‘Nigerian Scam,’” Vol.3, No.3, pp.7–28, 2020.
[25]J.R. Saini, “Identification and Analysis of Most Frequentlyoccurring significant proper nouns in 419 Nigerian Scams.pdf,” 2012.
[26] P. V. Falade, “Trend and Emerging Types of ‘ 419 ’ SCAMS,” pp.105–114, 2023.
[27] A. M. A and C. C. Adaobi, “Role of Digitalization in Balancing Work during Pandemic?: Case of Microsoft,” Vol.10, No.2, pp.30–37, 2022.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.