LET US DANCE TO LIVE: THE INFLUENCE OF AFRO-POP-MUSIC ON PROMOTION OF THE NORMS OF CYBERCRIME AMONG YOUNG PEOPLE IN NIGERIA
DOI:
https://doi.org/10.53555/nnssh.v9i4.1658Keywords:
Afro Pop-music, Cybercrime, Cybercrime Themes, Cybercrime SlangsAbstract
Music is an integral part of every culture that serves entertainment, cultural transmission, and mood moderation in every society and is enhanced by globalisation and the internet. Beyond these purposes, music has equally been the instrument for transmitting cultural values with high tendencies to positively and negatively affect human behaviour. This study explores how Afro-Pop music promotes the Norms of Cybercrime in Nigeria through the musicians' content, slangs, and personae. The study used cognitive dissonance and constructivism theories to explain how music has influenced youth involvement in Cybercrime. This is an analysis of 25 full songs and 35 other songs with at least one-sentence of cybercrime messages and the use of popular cybercrime slangs. These songs were purposively selected Cybercrime promoting songs that were released between 2007 and 2020. These songs were content-analyzed along with the singers' attributes and achievements in the entertainment world in Nigeria. The study found that contents of cybercrime songs, lifestyle, cybercrime techniques, hard work, resilience and other messages can inspire young people. It also found slangs like Japa, CC, Client, Cashout, and Aza that have become integral parts of daily communication. The majority of these songs were also popular through downloads, award nominations and awards, and others. The study also found that the singers' personalities were worthy of emulation by young individuals in society. As such, music is both functional and dysfunction and a part of the culture inseparable from society members. Therefore, it is crucial for there to be global cooperation in censoring music to reduce its influence on society members, especially the young ones.
References
Adjirakor, N. D. (2017). Constructing the African city through hip-hop in" Nai Ni Ya Who?" by Muthoni the Drummer Queen. Research in African Literatures, 48(1), 116–134. doi:10.2979/reseafrilite.48.1.08.
Adogame, A. (2009). The 419 code as business unusual: Youth and the unfolding of the advance fee fraud online discourse. Asian Journal of Social Science, 37(4), 551–573. doi:10.1163/156853109X460192
Aghatise, E. J. (2006). Cybercrime definition. Retrieved from Computer Crime Research Center w
Agozino, B. (2017). Critical perspectives on deviance and social control in rural Africa. African Journal of Criminology and Justice Studies: AJCJS, 10(1), I. Aransiola, J. O., &
Asindemade, S. O. (2011). Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychology, Behavior, and Social Networking, 14(12), 759–763. DOI: https://doi.org/10.1089/cyber.2010.0307.
Bandura, A. (1999). Moral disengagement in the perpetration of inhumanities. Personality and Social Psychology Review, 3(3), 193–209. doi:10.1207/s15327957pspr0303_3 Bandura, A.,
Barbaranelli, C., Caprara, G. V., & Pastorelli, C. (1996). Mechanisms of moral disengagement in the exercise of moral agency. Journal of Personality and Social Psychology, 71(2), 364-374. doi:10.1037//0022- 3514.71.2.364
Bailey, J. (2014). Philosophy and hip-hop: Ruminations on the postmodern cultural form. Basingstoke, U.K.: Springer.
Barker, H., & Taylor, Y. (2007). Faking It: The quest for authenticity in popular music. New York, NY: WW Norton & Company. B.B.C. (, 2016). I went to Nigeria to meet the man who scammed me. Retrieved from http://www.bbc.co.uk/news/world-africa37632259
Becker, H. (1967/1997). Outsiders: Studies in the sociology of deviance. New York, NY: Simon and Schuster.
Blanchard, B. (1999). The social significance of rap & hip-hop culture. Retrieved from Ethics of Development in a Global Environment (EDGE) website: http://web.stanford.edu/ class/e297 c/poverty_prej udice/mediarace/socialsignificance.htm
Button, M., and Cross, C. (2017). Cyber Frauds, Scams and Their Victims. New York: Taylor & Francis. Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand journal of criminology, 47(3), 391-408.
Bourdieu, P. (1977). The economics of linguistic exchanges. Social Science Information, 16(6), 645–668. doi:10.1177/053901847701600601 76 LAZARUS Criminology, Criminal Justice, Law & Society – Volume 19, Issue 2
Chang, J. J. (2008). An analysis of advance fee fraud on the internet. Journal of Financial Crime, 15(1), 71–81. doi:10.1108/13590790810841716 Chawki, M., Darwish, A., Khan, M. A., & Tyagi, S. (2015). 419 scam: An evaluation of Cybercrime and criminal code in Nigeria. In
Chawki M., Darwish A., Khan M.A., Tyagi S (ed.) Cybercrime, digital forensics and jurisdiction (pp. 129–144). Berlin: Springer International Publishing.
Chinwuba, N. N. (2015). Human identity: Child rights and the legal framework for marriage in Nigeria. Marriage & Family Review, 51(4), 305– 336. doi:10.1080 /01494929 .2014.938286 Computer World. (2010). Nigeria uses celebrity to stem Cybercrime. Retrieved from https://d321cxw853vaeo.cloudfront.net/article/33 5168/nigeria_uses_ celebrity_power_stem_cyber crime/
Cross, C. (2016). Using financial intelligence to target online fraud victimization: Applying a tertiary prevention perspective. Criminal Justice Studies, 29(2), 125–142. doi:10.1080/1478601x.2016.1170278
Daily Post. (2017). 9ice reacts to Falz' condemnation of his song allegedly glorifying 'Yahoo' boys. Retrieved from http://dailypost.ng/2017/06/23/9ice-reacts-falzcondemnation-song-allegedly-glorifying-yahooboys/
Daily Post. (2018). Most of the new generation record labels are founded by Yahoo boys' - D'banj. Retrieved from http://dailypost.ng/2018/03/01/nigerian-recordlabels-owned-yahoo-boys-dbanj/, accessed 02/03/2018
Davies, E. E., & Bentahila, A. (2008). Translation and code switching in the lyrics of bilingual popular songs. The Translator, 14(2), 247–272. doi:10.1080/13556509.2008.10799258
Dimou, E. (2017). Friendship, love and hip hop: An ethnography of African American men in psychiatric custody. The British Journal of Criminology, Volume 58, Issue 3, (6) 760– 763. https://doi.org/10.1093/bjc/azx038
Dion, M. (2010). Advance fee fraud letters as Machiavellian/Narcissistic narratives. International Journal of Cyber Criminology, 4(1/2), 630.
Duncan, D. (2017). Australian singer, American features: Performing authenticity in country music. Language & Communication, 52, 31–44. doi:10.1016/j.langcom.2016.08.004
Eboiyehi, F. A., Muoghalu, C. O., & Bankole, A. O. (2016). In their husbands' shoes: Feminism and political economy of women breadwinners in IleIfe, Southwestern Nigeria. Journal of International Women's Studies, 17(4), 102–121. doi:10.4314/afrrev.v5i3.67340
Ellis, S. (2016). This present darkness: A history of Nigerian organized crime. Oxford, England: Oxford University Press.
Federal Bureau of Investigation. (2010). Internet Crime Complaint Centre. Retrieved from https://pdf.ic3.gov/2010_IC3Report.pdf.
Garson, G. D. (2015). Explaining Human Behavior: Social & Organizational Theories. Asheboro, NC: Statistical Associates Publishers.
Genius Lyrics (2018) 'The Notorious B.I.G. – Juicy Lyrics'. Retrieved from https://genius.com/ Thenotorious-big-juicy-lyrics.
George, R. J. (2014). Moral disengagement: An exploratory study of predictive factors for digital aggression and cyberbullying. (Unpublished doctoral dissertation). Denton, TX: University of North Texas.
Gritsenko, E., & Aleshinskaya, E. (2016). Translation of song lyrics as structure-related expressive device. Procedia-Social and Behavioral Sciences, 231, 165–172. doi:10.1016/j.sbspro.2016.09.087
Hall, T. (2013). Geographies of the illicit: Globalization and organized crime. Progress in Human Geography, 37(3), 366–385. doi:10.1177/0309132512460906
Hsieh, H. F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9), 1277–1288. doi:10.1177/1049732305276687 Hot T.V. Topics. (2017). Linda Ikeja's
Hot T.V. Retrieved from https://www.lindaikejisblog.com/2017/7/youcant-separate-entertainment-from-illegal-moneymost-of-the-highest-money-entertainers-make-isfrom-people-with-illegal-money-rapper-n6- says.html
Hutchings, A. (2013). Hacking and fraud: Qualitative analysis of online offending and victimization. In K. Jaishankar and Natti Ronel (Eds.) Global THE NIGERIAN CYBER FRAUDSTERS AND HIP HOP ARTISTS 77 Criminology, Criminal Justice, Law & Society – Volume 19, Issue 2 criminology: Crime and victimization in the globalized era (pp. 93–114). Boca Raton, FL: CRC Press.
Hutchings, A & Chua, Y. (2016). Gendering Cybercrime in T. J. Holt (ed.), Cybercrime through an Interdisciplinary Lens (pp. 167- 188). Oxon: Routledge.
Ibrahim, S. (2015). A Binary Model of Broken Home: Parental Death-Divorce Hypothesis of Male Juvenile Delinquency in Nigeria and Ghana, in S. R. Maxwell and S. L. Blair (ed.) Contemporary Perspectives in Family Research, Volume 9, (pp.311-340) New York: Emerald Group Publishing Limited.
Ibrahim, S. (2016a). Social and contextual taxonomy of Cybercrime: Socio-economic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47, 44–57. doi:10.1016/j.ijlcj.2016.07.002
Ibrahim, S. (2016b). Causes of socio-economic Cybercrime in Nigeria. In Cybercrime and Computer Forensic (ICCCF), IEEE International Conference on (pp. 1-9). IEEE. doi:10.1109/ICCCF.2016.7740439
Information Nigeria. (2014). Special E.D. Arrested. Retrieved from http://www.informationng.com/2014/05/mugshot -reveals-that-davidos-hypeman-special -ed-wasarrested-for-fraud-in-2011.html
Igwe, C. N. (2007). Taking back Nigeria from 419: What to do about the worldwide e-mail scam-- advance-fee fraud. New York, NY: iUniverse.
Ilan, J. (2015). Understanding street culture: Poverty, crime, youth and cool. London, UK: Palgrave Macmillan.
Inyabri, I. T. (2016). Youth and linguistic stylization in Naija afro Hip hop. Sociolinguistic Studies, 10(1/2), 89-108. doi:10.1558/sols.v10i1- 2.27931
Jaishankar, K. (2011). Introduction: Expanding cyber criminology with an avant-garde anthology. In K. Jaishankar (Ed.), Cyber criminology: Exploring Internet crimes and criminal behavior (pp. xxvii-xxxv). Boca Raton, FL: CRC Press.
Jegede, A. E., Elegbeleye, A. O., Olowookere, E. I., & Olorunyomi, B. R. (2016). Gendered alternative to cyber fraud participation: an assessment of technological driven crime in Lagos State, Nigeria. Gender and Behaviour, 14(3), 7672–7692.
Keyes, C. L. (2002). Rap music and street consciousness. Chicago, Illinois: University of Illinois Press.
Kirillova, E. A., Kurbanov, R. A., Svechnikova, N. V., Zul'fugarzade, T. E. D., & Zenin, S. S. (2017). Problems of fighting crimes on the internet. Journal of Advanced Research in Law and Economics, 8(3), 849–856.
Kopp, C., Layton, R., Sillitoe, J., & Gondal, I. (2015). The Role of Love stories in Romance Scams: A Qualitative Analysis of Fraudulent Profiles. International Journal of Cyber Criminology, 9(2), 205-217.
Kubrin, C. E. (2005). Gangstas, thugs, and hustlas: Identity and the code of the street in rap music. Social Problems, 52(3), 360–378. doi:10.1525/sp.2005.52.3.360
Lazarus, S. I., Rush, M., Dibiana, E. T. & Monks, C. P. (2017). Gendered penalties of divorce on remarriage in Nigeria: A qualitative study. Journal of Comparative Family Studies, 48(3), 351–366.
Levi, M. (2016). Assessing the trends, scale and nature of economic cybercrimes: Overview and issues. Crime, Law and Social Change, 67(1), 3– 20. doi:10.1007/s10611-016-9645-3
Longe, O. B., Mbarika, V., Kourouma, M., Wada, F., & Isabalija, R. (2010). Seeing beyond the surface, understanding and tracking fraudulent cyber activities. International Journal of Computer Science and Information Security, 6(3), 124–135. Retrieved from https://arxiv.org/abs/1001.1993
Louw, P. E. (2017). Afrikaner Music and Identity Politics in Post-Apartheid South Africa. In U. Onyebadi (Ed.), Music as a Platform for Political Communication (pp. 89–108). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-1986- 7.ch005
Mama, A. (1995). Feminism or femocracy? State feminism and democratization in Nigeria. Africa Development, 20(1), 37–58.
Matza, D. (1967). Delinquency and drift. London, England: Transaction Publishers. Matza, D., & Sykes, G. M. (1961). Juvenile delinquency and subterranean values. American Sociological Review, 26, 712–19. doi:10.2307/2090200
Melvin, A. O., & Ayotunde, T. (2010). Spirituality in Cybercrime (Yahoo Yahoo) activities among 78 LAZARUS Criminology, Criminal Justice, Law & Society – Volume 19, Issue 2 youths in South West Nigeria in Elza Dunkels, Gun-Marie Franberg, & Camilla Hallgren (ed.), Youth Culture and Net Culture: Online Social Practices (pp. 357–376). Hershey, PA: I.G.I. Global.
Morahan-Martin, J. (2000). Women and the internet: Promise and perils. CyberPsychology & Behavior, 3(5), 683-691. doi:10.1089/10949310050191683
Naijaloaded (2017) 'AS E DEY HOT!! Segun Wire Blasts Falz For Saying Musicians Should Stop Hailing Fraudsters'. Retrieved from http://www.naijaloaded.com .ng/entertainment/ edey-hot-segun-wire-blasts-falz-sayingmusicians-stop-hailing-fraudsters,accessed 7/7/17.
Neal. D. J. (2017). Nigerian pop music star Dammy Krane arrested on fraud charges. Miami Herald. Retrieved from http://www.miamiherald.com/news/local/commu nity/miami-dade/miamigardens/article157185574.html
Newburn, T. (2016) Social disadvantage: Crime and punishment. In H. Dean & L. Platt (Eds.), Social advantage and disadvantage (pp.322– 40). Oxford, England: Oxford University Press. Oduro-Frimpong, J. (2014). Sakawa rituals and cyber-fraud in Ghanaian popular video movies. African Studies Review, 57(2), 131–147. doi:10.1017/asr.2014.51
Ojedokun, U. A., & Eraye, M. C. (2012). Socio-economic lifestyles of the yahoo-boys: A study of perceptions of university students in Nigeria. International Journal of Cyber Criminology, 6(2), 1001–1013.
Oladipo, O. T. (2017). Mirroring the message of some Nigerian hip-hop music. In A. Ojo, K. Traore, & O. Longe (Eds.), Africans and globalization: Linguistic, literary, and technological contents and discontents (pp. 93– 98). Lanham, MD: Lexington Books.
Owen, T., Noble, W., & Speed, F. C. (2017). The Challenges Posed by Scammers to Online Support Groups: The 'Deserving'and the 'Undeserving'Victims of Scams. In New Perspectives on Cybercrime (pp. 213-240). London: Palgrave Macmillan.
Persaud, E. J. (2011). The signature of hip hop: A sociological perspective. International Journal of Criminology and Sociological Theory, 4(1), 626–647. Retrieved from https://ijcst.journals.yorku.ca/index.php/ijcst/arti cle/view/32157/29376
Punch. (2017a). Controversy as Falz tell singers to stop praising 'Yahoo boys.' Retrieved from http://punchng.com/controversy-as-falz-tellssingers-to-stop-praising-yahoo-boys/
Punch. (2017b). Nigerian rapper, Sauce Kid jailed in America. Retrieved from http://punchng.com/nigerian-rapper-sauce-kidgets-two-year-jail-in-america-for-stealing-15388/
Rehn, A., & Sköld, D. (2003). All about the Benjamins–hardcore rap, conspicuous consumption and the place of bragging in economic language. C.M.S. Conference. Retrieved from https://www.mngt.waikato.ac.nz/ejrot/cmsconfer ence/2003/proceedings/organization/rehn.pdf Reiner, R. (2016). Crime, the mystery of the commonsense concept. New York, NY: John Wiley & Sons.
Rich, T. (2017). You can trust me: A multimethod analysis of the Nigerian e-mail scam. Security Journal, 31(1), 208-225. doi:10.1057/s41284- 017-0095-0
Ribbens McCarthy, J., & Edwards, R. (2011). Key concepts in family studies. London, England: Sage Publications.
Ribeaud, D., & Eisner, M. (2010). Are moral disengagement, neutralization techniques, and self-serving cognitive distortions the same? Developing a unified scale of moral neutralization of aggression. International Journal of Conflict and Violence (IJCV), 4(2), 298–315.
Royster, D. M. (2016). [Review of the book Philosophy and hip-hop: Ruminations on postmodern cultural form by J. Bailey]. Journal of Hip Hop Studies, 3(1), 115-117.
Santa Ana, O. (2002). Brown tide rising: Metaphors of Latinos in contemporary American public discourse. Austin, TX: University of Texas Press. Schulz, D. (1997). Praise without enchantment: Griots, broadcast media, and the politics of tradition in Mali. Africa Today, 44 (4), 443-464.
Schoepfer, A., Baglivio, M., and Schwartz, J. (2017). Juvenile Hybrid White-Collar Delinquency: An Empirical Examination of Various Frauds. Criminology, Criminal Justice Law and Society, 18 (2), 21-38. THE NIGERIAN CYBER FRAUDSTERS AND HIP HOP ARTISTS 79 Criminology, Criminal Justice, Law & Society – Volume 19, Issue 2
Shonekan, S. (2013). The blueprint: The gift and the curse of American hip hop culture for Nigeria's millennial youth. Journal of Pan African Studies, 6(3), 181–199. Smith, D. J. (2008). A culture of corruption: Everyday deception and popular discontent in Nigeria. Princeton, NJ: Princeton University Press.
Smith, D. J. (2017). To be a man is not a one-day job: Masculinity, money, and intimacy in Nigeria. Chicago, IL: University of Chicago Press. Stratton, G., Powell, A., & Cameron, R. (2017). Crime and Justice in Digital Society: Towards a 'Digital Criminology'?. International Journal For Crime, Justice And Social Democracy, 6(2), 17- 33.
a. Swidler, A. (1990). Culture in action: Symbols and strategies. American Sociological Review, 51(2), 273–286. doi:10.2307/2095521
Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670. doi:10.2307/2089195
a. Tabu, H. (2011) Culture: Yahoo Boys – Nigerian scammers are just like us. Retrieved from https://goodmenproject.com/culture/culture-theyahoo-boys-nigerias-scammers-arent-sodifferent-after-all/
Tade, O. (2013). A spiritual dimension to Cybercrime in Nigeria: The 'yahoo plus' phenomenon. Human Affairs, 23(4), 689-705. Tade, O., & Aliyu, I. (2011). Social organization of Internet fraud among university undergraduates in Nigeria. International Journal of Cyber Criminology, 5(2), 860–875.
Tade, O. (2019). Cyber crime glamorization in Nigerian songs: 2019 internationa ljournal of cyber criminology-issn : 0974-2891. July-december 2019. Vol. 12 (2)478-492.
Tankebe, J., Hills, A., & Cole, B. (2014). Emerging issues of crime and criminal justice in sub Saharan Africa. Criminology & Criminal Justice, 14(1), 3-7.
Tayo, A. O. (2017). How Internet fraud has taken over Nigerian music. Retrieved from http://www.pulse.ng/gist/9ice-falz-how-internetfraud-has-taken-over-nigerian-musicid6886970.html
Trend Micro and INTERPOL (2017). Cybercrime in West Africa: Poised for an underground market. Retrieved from https://documents.trendmicro.com/assets/wp/wpcybercrime-in-west-africa.pdf
University of Wisconsin-Madison. (2017). Hybridity in West African popular culture. Retrieved from http://africa.wisc.edu/hybrid/2009/07/07/419- scam-nigerian-hip-hop/
a. US Consulate. (1949). Records of the U.S. consulate, Lagos, Nigeria 1940-63: NARA ii, R.G. 84, box 1, C. Porter Kuykendall, consul-general, to Secretary of State, 16 May, 1949.
Wang, X., & Krumhuber, E. G. (2017). The love of money results in objectification. British Journal of Social Psychology, 56(2), 354–372. doi:10.1111/bjso.12158
Webster, J., & Drew, J. M. (2017). Policing advance fee fraud (AFF) Experiences of fraud detectives using a victim-focused approach. International Journal of Police Science & Management, 19(1), 39–53. doi:10.1177/1461355716681810
Whitaker, R. (2013). Proto-spam: Spanish prisoners and confidence games. The Appendix, 1(4). Retrieved from http://theappendix.net/issues/2013/10/protospam-spanish-prisoners-and-confidence-games
Whitty, M. T., & Buchanan, T. (2016). The online dating romance scam: The psychological impact on victims–both financial and nonfinancial. Criminology & Criminal Justice, 16(2), 176–194. doi:10.1177/1748895815603773
Published
Issue
Section
License
Copyright (c) 2023 Journal of Advance Research in Social Science and Humanities (ISSN:2208-2387)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notificatation email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by IndiaPost and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publicationl uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.