{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:40:47Z","timestamp":1732041647267},"reference-count":61,"publisher":"Mary Ann Liebert Inc","issue":"8","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.liebertpub.com\/nv\/resources-tools\/text-and-data-mining-policy\/121\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2022,8,1]]},"DOI":"10.1089\/cyber.2021.0332","type":"journal-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T16:36:39Z","timestamp":1656347799000},"page":"504-511","source":"Crossref","is-referenced-by-count":14,"title":["Tweets and Reactions: Revealing the Geographies of Cybercrime Perpetrators and the North-South Divide"],"prefix":"10.1089","volume":"25","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1721-8519","authenticated-orcid":false,"given":"Suleman","family":"Lazarus","sequence":"first","affiliation":[{"name":"The Mannheim Centre for Criminology, Department of Social Policy, London School of Economics and Political Science, London, United Kingdom."}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4169-2619","authenticated-orcid":false,"given":"Mark","family":"Button","sequence":"additional","affiliation":[{"name":"The Centre for Counter Fraud Studies, Institute of Criminal Justice Studies, University of Portsmouth, Portsmouth, United Kingdom."}]}],"member":"278","reference":[{"key":"B1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIMA.2020.106046"},{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1177\/0163443715608259"},{"key":"B3","doi-asserted-by":"publisher","DOI":"10.1089\/big.2017.0038"},{"key":"B4","doi-asserted-by":"publisher","DOI":"10.1177\/0163443720926040"},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2016.0402"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.11.009"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.09.005"},{"key":"B8","doi-asserted-by":"publisher","DOI":"10.1089\/tmj.2019.0128"},{"key":"B9","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.10.006"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.1177\/0894439319864898"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1177\/0894439319828011"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2017.1399807"},{"key":"B13","first-page":"881","volume":"29","author":"Mason S","year":"2019","journal-title":"Issues in Educational Research"},{"key":"B14","unstructured":"14. Robinson J, Algie J, Dean BA, et al. (2018). Twitter and assessment: does engagement affect outcomes? In Conduit J, Plewa C, Wilkie D, eds. ANZMAC Conference Proceedings. Adelaide: University of Adelaide, pp. 1\u20134."},{"key":"B15","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e02569"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.1177\/0022002718824636"},{"key":"B17","doi-asserted-by":"crossref","unstructured":"17. Ibrahim S. (2016) Causes of socioeconomic cybercrime in Nigeria. In 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE, June 12, 2016, pp. 1\u20139.","DOI":"10.1109\/ICCCF.2016.7740439"},{"key":"B18","doi-asserted-by":"publisher","DOI":"10.1177\/2631309X211004567"},{"key":"B19","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-019-09855-4"},{"key":"B20","volume-title":"This present darkness: a history of Nigerian organized crime","author":"Ellis S","year":"2018"},{"key":"B21","first-page":"27","volume":"24","author":"Obi-Ani NA","year":"2016","journal-title":"Nsukka Journal of the Humanities"},{"key":"B22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijlcj.2016.07.002"},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20671-0_28"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.3390\/rel10030146"},{"key":"B25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65021-0_14"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.5749\/j.ctv18r6w5j"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.4324\/9781315743981-3"},{"key":"B28","volume-title":"CTRL + Z: The right to be forgotten","author":"Jones ML","year":"2018"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.1145\/3351159"},{"key":"B30","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106310"},{"key":"B31","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1111\/issj.12201","volume":"69","author":"Lazarus S","year":"2019","journal-title":"International Social Science Journal"},{"key":"B32","doi-asserted-by":"publisher","DOI":"10.1111\/hojo.12485"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.1007\/s12117-020-09392-w"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0307"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1163\/156853109X460192"},{"key":"B36","doi-asserted-by":"publisher","DOI":"10.1080\/20421338.2016.1147209"},{"key":"B37","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.04.009"},{"key":"B38","first-page":"68","volume":"19","author":"Lazarus S","year":"2018","journal-title":"Criminology, Criminal Justice, Law and Society"},{"key":"B39","doi-asserted-by":"crossref","unstructured":"39. Melvin AO, Ayotunde T. (2010) Spirituality in cybercrime (Yahoo Yahoo) activities among youths in South West Nigeria. In Dunkels E, Franberg GM, Hallgren C, eds. Youth culture and net culture: online social practices. Hershey, PA: IGI Global, pp. 357\u2013380.","DOI":"10.4018\/978-1-60960-209-3.ch020"},{"key":"B40","first-page":"309","volume":"13","author":"Ogunleye YO","year":"2019","journal-title":"International Journal of Cyber Criminology"},{"key":"B41","doi-asserted-by":"publisher","DOI":"10.1057\/s41284-017-0095-0"},{"key":"B42","doi-asserted-by":"publisher","DOI":"10.1525\/jpms.2022.34.1.44"},{"key":"B43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15150-2_9"},{"key":"B44","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDEG.2019.8734329"},{"key":"B45","first-page":"17","volume":"12","author":"Obuah E","year":"2010","journal-title":"African Studies Quarterly"},{"key":"B46","doi-asserted-by":"publisher","DOI":"10.1215\/9780822374541"},{"key":"B47","first-page":"1","volume":"4","author":"Umar I","year":"2016","journal-title":"Asian Journal of Multidisciplinary Studies"},{"key":"B49","doi-asserted-by":"publisher","DOI":"10.3138\/jcfs.48.3.351"},{"key":"B50","volume-title":"25 Years after Biafra","author":"Igbokwe J","year":"1955"},{"key":"B51","first-page":"181","volume":"3","author":"Ojukwu C","year":"2009","journal-title":"African Journal of Political Science and International Relations"},{"key":"B52","doi-asserted-by":"publisher","DOI":"10.9734\/BJEMT\/2014\/7080"},{"key":"B56","doi-asserted-by":"publisher","DOI":"10.1177\/0306396815608127"},{"key":"B57","doi-asserted-by":"publisher","DOI":"10.4324\/9781003004424-8"},{"key":"B58","volume-title":"Key concepts in post-colonial studies","author":"Ashcroft B","year":"1998"},{"key":"B59","doi-asserted-by":"publisher","DOI":"10.1023\/B:CRIS.0000025766.99876.4c"},{"key":"B60","doi-asserted-by":"publisher","DOI":"10.1177\/1049732305276687"},{"key":"B61","first-page":"79","volume-title":"The ethics of online research. advances in research ethics and integrity (2)","author":"Ahmed W","year":"2019"},{"key":"B62","doi-asserted-by":"publisher","DOI":"10.1177\/17470161221076948"},{"key":"B63","first-page":"45","volume":"30","author":"Muhammad AS","year":"2015","journal-title":"Hemispheres"},{"key":"B67","unstructured":"67. Lazarus S. (2020) Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments. Doctoral dissertation, University of Portsmouth."},{"key":"B68","doi-asserted-by":"crossref","unstructured":"68. Hall T, Hudson R. (2022) The economic geographies of transactional organised crime. In Allum F, Gilmour S, eds. The Routledge handbook of transnational organized crime. Abingdon, Oxon: Routledge, pp. 183\u2013199.","DOI":"10.4324\/9781003044703-14"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.liebertpub.com\/doi\/full-xml\/10.1089\/cyber.2021.0332","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.liebertpub.com\/doi\/pdf\/10.1089\/cyber.2021.0332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T20:19:38Z","timestamp":1700770778000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.liebertpub.com\/doi\/10.1089\/cyber.2021.0332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"references-count":61,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,8,1]]}},"alternative-id":["10.1089\/cyber.2021.0332"],"URL":"https:\/\/doi.org\/10.1089\/cyber.2021.0332","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,1]]}}}