Access the full text.
Sign up today, get DeepDyve free for 14 days.
Z. Liao, Wing-Keung Wong (2008)
The determinants of customer interactions with internet-enabled e-banking servicesJournal of the Operational Research Society, 59
Chiemeke, Evwiekpaefe, Chete (2006)
The Adoption of Internet Banking in Nigeria: An Empirical InvestigationThe Journal of Internet Banking and Commerce, 11
African Journal of Computer and ICT, 4
International Journal of Cybercriminology, 5
A. Normandeau (1968)
TRENDS AND PATTERNS IN CRIMES OF ROBBERY (WITH SPECIAL REFERENCE TO PHILADELPHIA, PENNSYLVANIA, 1960 TO 1966)
Maryke Nuth (2008)
Taking advantage of new technologies: For and against crimeComput. Law Secur. Rev., 24
O. Tade (2013)
A spiritual dimension to cybercrime in Nigeria: The ‘yahoo plus’ phenomenonHuman Affairs, 23
E. Uslaner (2004)
Trust and Social Bonds: Faith in Others and Policy Outcomes ReconsideredPolitical Research Quarterly (formerly WPQ), 57
2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken
N. Denzin (1977)
The research act: A theoretical introduction to sociological methods
R. Proctor, M. Lien, K. Vu, E. Schultz, G. Salvendy (2002)
Improving computer security for authentication of users: Influence of proactive password restrictionsBehavior Research Methods, Instruments, & Computers, 34
A. Normandeau (1968)
Patterns In RobberyCriminology, 6
M. Bogdanowicz, J. Burgelman, C. Centeno, Elisavetta Gourova, G. Carat (2003)
Building the Information Society in Candidate Countries? A Prospective Analysis on Potential Trajectories To Realise the Lisbon Goals. IPTS Experts Workshop Report, February 23-25, 2003, Sevilla.
R. Meier, Terance Miethe (1993)
Understanding Theories of Criminal VictimizationCrime and Justice, 17
N. Bohm, Ian Brown, B. Gladman (2000)
Electronic Commerce: Who Carries the Risk of Fraud?J. Inf. Law Technol., 2000
K. Jaishankar (2010)
The Future of Cyber Criminology: Challenges and Opportunities1International Journal of Cyber Criminology, 4
N. Davinson, Elizabeth Sillence (2014)
Using the health belief model to explore users' perceptions of 'being safe and secure' in the world of technology mediated financial transactionsInt. J. Hum. Comput. Stud., 72
J. Creswell (2010)
Research Design: Qualitative, Quantitative, and Mixed Methods Approaches
L. Curtis (1974)
Victim Precipitation and Violent CrimeSocial Problems, 21
Sunday Punch, 14
R. Maloney, M. Paolisso (2001)
What Can Digital Audio Data Do for You?Field Methods, 13
E. Okafor, Favour Ezeani (2012)
Empirical Study of the Use of Automated Teller Machine (ATM) Among Bank Customers in Ibadan Metropolis, South Western NigeriaEuropean Journal of Business and Management, 4
PurposeThis paper aims to investigate automated teller machine (ATM) fraud in southwest Nigeria, as extant studies have not examined the unintended consequences of ATM subscription particularly the effect of the identity of fraudsters and the strategies for defrauding.Design/methodology/approachUsing sequential exploratory strand of mixed method, data were collected from both ATM users and victims of ATM fraud using multi-stage sampling procedure. This involved purposive selection of Lagos and Oyo states.FindingsResults showed that fraudsters were typically lovers, friends, relatives and sometimes children of victims. Strategies for defrauding included card cloning, swapping of cards and physical attacks at ATM galleries.Research limitations/implicationsBecause of the size of the sample which is small, the research results may lack generalizability. More expansive works are needed across Nigeria in this regard.Practical implicationsThe paper includes implications for policy initiative concerning the deployment and use of payment systems such as ATM in Nigeria.Social implicationsThe paper reveals the limits of trust in cashless policy. It raises salient policy issues concerning the need for the governance of trust to engender adoption.Originality/valueThe paper characterizes fraudsters and their strategies for defrauding.
Journal of Financial Crime – Emerald Publishing
Published: Oct 3, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.