Skip to main content

Globalization and Internet Fraud in Ghana

Interrogating the Political Economy of Survival, Subaltern Agency, and their Ramifications

  • Chapter
Book cover Neoliberalism and Globalization in Africa

Abstract

Globalization has had a tremendous impact not only on the speed and organization of transnational interactions among different actors around the world in the social, economic, and political spheres, but has also created, as it interlaces with neoliberalism, constraints on livelihoods as well as new possibilities for subaltern agents to reconfigure their connections to the global (Petras and Veltmeyer 2001). These transformations have produced qualitative shifts in how transnational interactions are organized as they reconfigure the spatiotemporal environment within which those interactions occur (McGrew 2000, 48). “Part of the reason behind the developments noted above are technological innovations that allow the flow of capital and information to traverse physical boundaries with alacrity and to be integrated at an unprecedented level” (Tettey 2006, 33). Granova and Eloff (2004, 7) point out that “one of the most important enabling infrastructures of the globalised economy is without a doubt the Internet. The Internet revolutionized many industries in all corners of the world, with developing countries being no exception.”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Abhilash, C. M. 2003. E-Commerce law in developing countries: An Indian perspective. Information and Communication Technology Law 11 (3): 269–81.

    Article  Google Scholar 

  • Allison, Stuart F. H., Amie M. Schuck, and Kim M. Lersch. 2005. Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice 33:19–29.

    Article  Google Scholar 

  • Antiphishing Working Group. 2007. Substantial spike in phishing campaigns greets the fall. http://www.antiphishing.org/.

  • BBC. 2005. Talk is profitable in Ghana. http://news.bbc.co.uk/2/hi/programmes/from_our_own_correspondent/4473073.stm.

  • —. 2007. UK police in Nigerian scam haul. http://newsvote.bbc.co.uk/mpapps/pagetools/print/news.bbc.co.uk/2/hi/uk_news/7027088.stm.

  • Blommaert, Jan, and Tope Omoniyi. 2006. Email fraud: Language, technology, and the indexicals of globalisation. Social Semiotics 6 (4): 573–605

    Article  Google Scholar 

  • Bluestein. 2003. U.S. targets internet crime, arresting 135 in broad sweep. The Wall Street Journal, May 19, B4

    Google Scholar 

  • Burawoy, Michael, Joseph A. Blum, Sheba George, Zsuzsa Gille, Teresa Gowan, Lynne Hanney, Maren Klawiter, Steven H. Lopez, Sean O. Riain, and Millie Thayer. 2000. Global ethnography: Forces, connections, and imaginations in a postmodern world. Berkeley: University of California Press.

    Google Scholar 

  • Burden, Kit, and Creole Palmer. 2003. Internet crime: Cyber crime—A new breed of criminal? Computer Law & Security Report 19 (3): 222–27.

    Google Scholar 

  • Castells, Mauel. 2001. Internet galaxy. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Chapkis Wendy. 1997. Live sex acts: Women performing erotic labor. New York: Routledge.

    Google Scholar 

  • Chua, Cecil Eng Huang, Jonathan Wareham, and Daniel Robey. 2007. The role of online trading communities in managing Internet auction fraud. MIS Quarterly 31 (4): 759–81.

    Google Scholar 

  • Computer Fraud and Society. 2007. U.S. Fraud victims face Internet auction rip-off. Computer Fraud and Society, April, 4–6.

    Google Scholar 

  • Consumer Reports. 2007. Net threats: Why going online remains risky. Consumer Reports, September, 28–34.

    Google Scholar 

  • Durkin, Keith F. 2007. Show me the money: Cybershrews and on-line money masochists. Deviant Behavior 28: 355–78.

    Article  Google Scholar 

  • Edelson, Eve. 2003. The 419 scam: Information warfare on the spam front and a proposal for local filtering. Computers and Security 22 (5): 392–401.

    Article  Google Scholar 

  • Falk, Richard. 1993. The making of global citizenship. In Global visions: Beyond the new world order, ed. J. Brecher, J. Childs, and J. Cutler, 39–50. Boston: South End.

    Google Scholar 

  • Furnell, Steven. 2007. Identity impairment: The problems facing victims of identity fraud. Computer Fraud and Security, December, 6–11.

    Google Scholar 

  • Ghanaweb. 2007a. Cyber fraud: Two nabbed. September 14. http://www.ghanaweb.com/GhanaHomePage/NewsArchive/printnews.php?ID=130650.

  • —. 2007b [September 20] The $75,000 “419” orphanage. http://www.ghanaweb.com/GhanaHomePage/NewsArchive//artikel.php?ID=130998

  • —. 2007c [January 8] Police bust Nigerian 419 con. http://www.ghanaweb.com/GhanaHomePage/NewsArchive/artikel.php?ID=116945.

  • —. November 5, 2006. Online dating scams from Ghana on the rise. http://www.ghanaweb.com/GhanaHomePage/NewsArchive/artikel.php?ID=113372.

  • —. January 13, 2004. Two Nigerians attempt to dupe the bank of Ghana. http://www.ghanaweb.com/GhanaHomePage/NewsArchive/artikel.php?ID=49779.

  • —. July 1, 2003. Fraud gang busted. http://www.ghanaweb.com/GhanaHomePage/NewsArchive/printnews.php?ID=38456.

  • —. December 20, 2001. Nigeria mail scam—Turn $5,000 into $10 million, honest. http://www.ghanaweb.com/GhanaHomePage/NewsArchive/artikel.php?ID=20373.

  • Giddens, Anthony. 1991. Modernity and self-identity: Self and society in the late modern age. Stanford, CA: Stanford University Press.

    Google Scholar 

  • Goldsborough, Reid. 2007. Beware e-Mail scams seeking your financial information. Community College Week, November 5, 21.

    Google Scholar 

  • Granova, Anna, and J. H. Eloff. 2004. Online banking and identity theft: Who carries the risk? Computer Fraud and Society 11:7–11.

    Article  Google Scholar 

  • Hall, Mark. 2007. Criminal negligence. Computerworld, August 13, 4.

    Google Scholar 

  • Hinde, Stephen. 2005. Identity theft: Theft, loss, and giveaways. Computer Fraud and Security, May, 18–20.

    Google Scholar 

  • Huey, Laura, and Richard S. Rosenberg. 2004. Watching the Web: Thoughts on expanding police surveillance opportunities under the cyber-crime convention. Canadian Journal of Criminology and Criminal Justice, October, 597–606.

    Google Scholar 

  • Internet Crime Complaint Center. 2007. 2006 Internet crime report—January 1, 2006-December 31, 2006. http://www.ic3.gov/media/annualreport/2006_IC3Report.pdf.

  • Internet Fraud Complaint Center of the Federal Bureau of Investigation (IFCCFBI). 2003. Internet Fraud Complaint Center referred more than 48,000 fraud complaints to law enforcement in 2002. http://www.ifccfbi.gov/strategy/wn030409.asp.

  • Interpol. n.d. African regional working party on information technology crime. http://www.interpol.int/Public/TechnologyCrime/WorkingParties/default.asp#africa.

  • Irish Times. 2007. Irish hostage rescued in Ghana. http://www.ireland.com/newspaper/breaking/2007/1031/breaking90.html.

  • ITNews. 2006. US$2m 419 spam scammer in the slammer. http://www.itnews.com.au/News/35668,us2m-419-spam-scammer-in-the-slammer.aspx.

  • —. 2007. Aussies still being slammed. http://www.itnews.com.au/News/52685,aussies-still-being-scammed.aspx.

  • Kaplan, David E. 2001. A land where con is king. US News and World Report 130 (18): 28–29.

    Google Scholar 

  • Korsell, Emanuelsson L., and Krister Soderman. 2001. IT-related crime—Old crimes in a new guise, but new directions too! Journal of Scandinavian Studies in Criminology & Crime Prevention 2 (1): 5–14.

    Google Scholar 

  • Kuisma, Tuire, Tommi Laukkanen, and Mika Hiltunen. 2006. Mapping the reasons for resistance to Internet banking: A means-end approach. International Journal of Information Management 27:75–85.

    Article  Google Scholar 

  • Lake Sun Leader. 2002. Secret service joins Morgan probe. http://lakesunleader.com/articles/2002/07/15/news/export11999.txt.

  • Marshall, Angus M., and Brian C. Tompsett. 2005. Identity theft in an online world. Computer Law and Security Report 21:128–37.

    Article  Google Scholar 

  • McGrew, Anthony. 2000. Sustainable globalization? The global politics of development and exclusion in the New World order. In Poverty and development into the 21st century, ed. T. Allen and A. Thomas, 345–64. Oxford: Oxford University Press.

    Google Scholar 

  • Myfoxtampabay. 2007. Internet scam snares Sarasota woman. http://www.myfoxtampabay.com/myfox/pages/ContentDetail?contentId=4402946.

  • Myjoyonline. 2007. 419 gang busted. http://www.myjoyonline.com/news/200710/9378.asp.

  • National White Collar Crime Center and the Federal Bureau of Investigation. 2003. IFCC 2002 Internet fraud report: January 1, 2002-December 31, 2002. The National White Collar Crime Center.

    Google Scholar 

  • New York Times. Russian used list of richest Americans to find targets for theft. Late Edition, East Coast, August 17, 2007, B3.

    Google Scholar 

  • Ojedokun, Ayoku A. 2005. The evolving sophistication of Internet abuses in Africa. The International Information and Library Review 37:11–17.

    Article  Google Scholar 

  • Petras, James, and Henry Veltmeyer. 2001. Globalization unmasked: Imperialism in the 21st century. Halifax: Fernwood Publishing; London: Zed Books.

    Google Scholar 

  • Reuters. 2003. Cybercrime sweep nets 125 arrests, November 21. http://www.ghanaweb.com/GhanaHomePage/NewsArchive/artikel.php?ID=47020.

  • Sandywell, Barry. 2006. Monsters in cyberspace: Cyberphobia and cultural panic in the information age. Information, communication, and society 9 (1): 39–61.

    Article  Google Scholar 

  • Schneider, Jacqueline. 2003. Hiding in plain sight: An exploration of the illegal? Activities of a drugs newsgroup. The Howard Journal 42:374–89.

    Article  Google Scholar 

  • Shelley, Louise. 2003. Combating transnational crime and corruption in Europe. Hearing before the U.S. Senate Committee on Foreign Relations, Subcommittee on European Affairs. Testimony presented October 30, 2003. http://www.american.edu/traccc/Publications/Shelley%20Pubs/Testimony/Testimony_Oct_03.pdf.

  • Sofaer, Abraham D., and Seymor E. Goodman, eds. 2001. The transnational dimension of cyber crime and terrorism. Stanford, CA: Hoover Institution Press.

    Google Scholar 

  • Tettey, Wisdom J. 2006. Globalization, the economy of desire, and cybersexual activity among Ghanaian youth. Studies in Political Economy 77: 33–55.

    Google Scholar 

  • Thisdayonline. 2004. The 242m scam. http://www.thisdayonline.com/archive/2004/02/07/20040207cov01.html.

  • Thompson, James. 2004. Cyber crime crackdown. http://www.crime-research.org/library/Thompson.html.

  • Thompson, Nicholas. 2003. You’ve got fraud. Foreign Policy, May-June, 93

    Google Scholar 

  • Times Online. 2007. How online fraudsters helped themselves on Christmas day. http://business.timesonline.co.uk/tol/business/money/consumer_affairs/artic1e3095537.ece.

  • Todorovic, Alex. 2000. Hot outlet for Belgrade youth: Internet crime. Christian Science Monitor 92:122.

    Google Scholar 

  • Ultrascan. 2007. 419 advance fee fraud: The worlds most successful scam. http://www.ultrascan.nl/assets/applets/2006_Stats_on_419_AFF_jan_23_2007_1.pdf.

  • United Nations. 2000. Tenth congress tackles cyber-sabotage. UN Chronicle 2:21.

    Google Scholar 

  • —. 1996. Safe enough to rest upon? UN Chronicle 33 (3): 32–33.

    Google Scholar 

  • Vijayan, Jaikumar. 2007. Phishers nearly puff off $10M scam of grocer. Computerworld, October 29, 14.

    Google Scholar 

  • Wolfe, Jonathan B. 2000. War games meets the Internet: Chasing 21st century cybercriminals with old laws and little money. American Journal of Criminal Law 28 (95): 95–117.

    Google Scholar 

  • Zook, Matthew. 2007. Your urgent assistance is requested: The intersection of 419 spam and new networks of imagination. Ethics, Place, and Environment 10 (1): 65–88.

    Article  Google Scholar 

Download references

Authors

Editor information

Joseph Mensah

Copyright information

© 2008 Joseph Mensah

About this chapter

Cite this chapter

Tettey, W.J. (2008). Globalization and Internet Fraud in Ghana. In: Mensah, J. (eds) Neoliberalism and Globalization in Africa. Palgrave Macmillan, New York. https://doi.org/10.1057/9780230617216_13

Download citation

Publish with us

Policies and ethics