Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Oct 18;8(11):e11142.
doi: 10.1016/j.heliyon.2022.e11142. eCollection 2022 Nov.

Advantageous comparison: using Twitter responses to understand similarities between cybercriminals ("Yahoo Boys") and politicians ("Yahoo men")

Affiliations

Advantageous comparison: using Twitter responses to understand similarities between cybercriminals ("Yahoo Boys") and politicians ("Yahoo men")

Suleman Lazarus et al. Heliyon. .

Abstract

This article is about the manifestations of similarities between two seemingly distinct groups of Nigerians: cybercriminals and politicians. Which linguistic strategies do Twitter users use to express their opinions on cybercriminals and politicians? The study undertakes a qualitative analysis of 'engaged' tweets of an elite law enforcement agency in West Africa. We analyzed and coded over 100,000 'engaged' tweets based on a component of mechanisms of moral disengagement (i.e., advantageous comparison), a linguistic device. The results reveal how respondents defend the actions of online fraudsters ("the deviant group") by strategically comparing them to the wrongful acts of corrupt politicians ("the respectable group"). Similarly, the results show how respondents positioned this linguistic strategy to compare "the powerless group" (online fraudsters) and "the powerful group" (politicians) in society. Indeed, tweet responses suggest that the Economic and Financial Crimes Commission (EFCC) generally looks downwards for culprits (i.e., online fraudsters) while ignoring fraudulent politicians. We conclude that the process by which some actions are interpreted as a crime compared to others is a moral enterprise.

Keywords: 419 fraud; Business email compromise; Corruption; Cyber criminology; Cybercrime; Moral disengagement mechanism; Nigeria; Online fraud; Public opinion; Rationalization; Romance scam; Sociology of deviance; Tweets; West Africa.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

References

    1. Adibe R., Ike C.C., Udeogu C.U. Press Freedom and Nigeria’s Cybercrime Act of 2015: An Assessment. Africa Spectrum. 2017;52(2):117–127.
    1. Adogame A. The 419 code as business unusual: youth and the unfolding of the advance fee fraud online discourse. Asian J. Soc. Sci. 2009;37(4):551–573.
    1. Adeduntan A. Rhyme, reason, rogue: Yoruba popular music and the hip hop amoral turn. J. Popular Music Stud. 2022;34(1):44–67.
    1. Ahmed S., Cho J., Jaidka K. Leveling the playing field: the use of Twitter by politicians during the 2014 Indian general election campaign. Telematics Inf. 2018;34(7):1377–1386.
    1. Akanle, O., Adesina, J. O., & Akarah, E. P. Towards human dignity and the internet: The cybercrime (yahoo yahoo) phenomenon in Nigeria. African Journal of Science, Technology, Innovation and Development. 2016;8(2):213–220.

LinkOut - more resources