Results for 'Suleman Shahid'

25 found
Order:
  1. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”).Suleman Lazarus, Mark Button & Afe Adogame - 2022 - Heliyon Journal 8 (11):1-10.
    This article is about the manifestations of similarities between two seemingly distinct groups of Nigerians: cybercriminals and politicians. Which linguistic strategies do Twitter users use to express their opinions on cybercriminals and politicians? The study undertakes a qualitative analysis of ‘engaged’ tweets of an elite law enforcement agency in West Africa. We analyzed and coded over 100,000 ‘engaged’ tweets based on a component of mechanisms of moral disengagement (i.e., advantageous comparison), a linguistic device. The results reveal how respondents defend the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, cyber‐fraud, revenge (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  4. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  5. Where Is the Money? The Intersectionality of the Spirit World and the Acquisition of Wealth.Suleman Lazarus - 2019 - Religions 10 (146):1-20.
    This article is a theoretical treatment of the ways in which local worldviews on wealth acquisition give rise to contemporary manifestations of spirituality in cyberspace. It unpacks spiritual (occult) economies and wealth generation through a historical perspective. The article ‘devil advocates’ the ‘sainthood’ of claimed law-abiding citizens, by highlighting that the line dividing them and the Nigerian cybercriminals (Yahoo-Boys) is blurred with regards to the use of magical means for material ends. By doing so, the article also illustrates that the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  6. Nomophobia (no-mobile-phone phobia) among the undergraduate medical students.Suleman Lazarus, Abdul Rahim Ghafari, Richard Kapend, Khalid Jan Rezayee, Hasibullah Aminpoor, Mohammad Yasir Essar & Arash Nemat - 2024 - Heliyon 10 (16):1-13.
    Nomophobia (no-mobile-phone phobia) is the fear and anxiety of being without a mobile phone. This study pioneers the investigation of nomophobia in Afghanistan using the Nomophobia Questionnaire (NMP-Q), addressing a crucial gap in the field. We collected statistical data from 754 undergraduate medical students, comprising men (56.50 %) and women (43.50 %), and analyzed the dimensions of nomophobia. While results revealed that all but two participants were nomophobic, they identified three significant dimensions affecting the level of nomophobia among participants: (a) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Betrayals in Academia and a Black Demon from Ephesus.Suleman Lazarus - 2019 - Journal of Critical Issues in Educational Practice 9 (1):1-5.
    The poem is about my PhD experience. The title and parts of the themes are derived from an incident in the Bible (Acts 19:13-20). In order to provide a deeper meaning to my story, I have deployed a biblical allusion which connects with the story of the sons of Sceva, who made unsuccessful attempts to exorcise a man from Ephesus. They failed primarily because they operated not in the spirit but in the flesh.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  8. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  9. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. ‘Some Animals Are More Equal Than Others’: The Hierarchy of Citizenship in Austria.Suleman Lazarus - 2019 - Laws 8 (14):1-20.
    While this article aims to explore the connections between citizenship and ‘race’, it is the first study to use fictional tools as a sociological resource in exemplifying the deviation between citizenship in principle and practice in an Austrian context. The study involves interviews with 73 Austrians from three ethnic/racial groups, which were subjected to a directed approach to qualitative content analysis and coded based on sentences from George Orwell’s fictional book, ‘Animal Farm’. By using fiction as a conceptual and analytical (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. (1 other version)Referent Tracking for Command and Control Messaging Systems.Shahid Manzoor, Werner Ceusters & Barry Smith - 2009 - CEUR, Volume 555.
    The Joint Battle Management Language (JBML) is an XML-based language designed to allow Command and Control (C2) systems to interface easily with Modeling and Simulation (M&S) systems. While some of the XML-tags defined in this language correspond to types of entities that exist in reality, others are mere syntactic artifacts used to structure the messages themselves. Because these two kinds of tags are not formally distinguishable, JBML messages in effect confuse data with what the data represent. In this paper we (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. What Nigerian hip-hop lyrics have to say about the country’s Yahoo Boys.Suleman Lazarus - 2019 - The Conversation.
    The article is based on lyrics from 2007 to 2017 involving 18 hip-hop artists. All the songs I studied were by male singers apart from one entitled, “Maga no need pay,” which involved seven multiple artists. In all the songs, the glamorization of cybercrime and cybercriminals was one of the most significant themes. The implications are discussed.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Assessing Cybercrime Syndicates: Understanding ‘Black Axe’ Confraternity and Cybercriminal Networks in Business Email Compromise (BEC) Scams.Suleman Lazarus - 2024 - Public Sector Counter Fraud Journal 1 (14):24-26.
    Cybercrime is a global threat affecting both public and private sectors. Business email compromise (BEC) is one of the most advanced and lucrative forms of cybercrime, exploiting vulnerabilities in corporate email systems to facilitate unauthorised financial transactions. Organisations worldwide suffer substantial losses from these attacks. This article explores the connection between Black Axe and BEC scams, providing insights into how public sector organisations can better combat these sophisticated criminal networks.
    Download  
     
    Export citation  
     
    Bookmark  
  14. Ibn Ḥazm on Heteronomous Imperatives and Modality. A Landmark in the History of the Logical Analysis of Norms.Shahid Rahman, Farid Zidani & Walter Young - 2022 - London: College Publications, ISBN 978-1-84890-358-6, pp. 97-114., 2021.: In C. Barés-Gómez, F. J. Salguero and F. Soler (Ed.), Lógica Conocimiento y Abduccción. Homenaje a Angel Nepomuceno..
    The passionate and staunch defence of logic of the controversial thinker Ibn Ḥazm, Abū Muḥammad ʿAlī b. Aḥmad b. Saʿīd of Córdoba (384-456/994-1064), had lasting consequences in the Islamic world. Indeed, his book Facilitating the Understanding of the Rules of Logic and Introduction Thereto, with Common Expressions and Juristic Examples (Kitāb al-Taqrīb li-ḥadd al-manṭiq wa-l-mudkhal ilayhi bi-l-alfāẓ al-ʿāmmiyya wa-l-amthila al-fiqhiyya), composed in 1025-1029, was well known and discussed during and after his time; and it paved the way for the studies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Laments of an Immigrant Ashore.Suleman Lazarus - 2021 - Lothlorien Poetry Journal 4:1-2.
    The poem gives a voice to many refugees who died crossing borders and many more asylum seekers who will lose their lives crossing international borders.
    Download  
     
    Export citation  
     
    Bookmark  
  16.  98
    PREFERENCE AND SATISFACTION TOWARDS TWO WHEELERS WITH SPECIAL REFERENCE TO WOMEN CONSUMERS.M. Shahid Ahmed - 2020 - Journal of Science Technology and Research (JSTAR) 1 (1):52-65.
    The producers of Automobile products innovated a new thought of designing the two- wheelers in such a way to attract the women. Today most of the women prefer to travel through two-wheelers. A wide variety of two-wheelers of all category light- weighted, medium – weighted and heavy weighted vehicles have been introduced in the market. The objective of the study is to know the preference and satisfaction of women consumers over two-wheelers and the various aspects, which determines the purchase or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, 杀猪盘).Jack Whittaker, Suleman Lazarus & Taidgh Corcoran - 2024 - Journal of Economic Criminology 3.
    This is a theoretical treatment of the term "Sha Zhu Pan" (杀猪盘) in Chinese, which translates to “Pig-Butchering” in English. The article critically examines the propagation and validation of "Pig Butchering," an animal metaphor, and its implications for the dehumanisation of victims of online fraud across various discourses. The study provides background information about this type of fraud before investigating its theoretical foundations and linking its emergence to the dehumanisation of fraud victims. The analysis highlights the disparity between academic literature, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. ‘Troubling’ Chastisement: A Comparative Historical Analysis of Child Punishment in Ghana and Ireland.Michael Rush & Suleman Lazarus - 2018 - Sociological Research Online 1 (23):177-196.
    This article reviews an epochal change in international thinking about physical punishment of children from being a reasonable method of chastisement to one that is harmful to children and troubling to families. In addition, the article suggests shifts in thinking about physical punishment were originally pioneered as part and parcel of the dismantling of national laws granting fathers’ specific rights to admonish children under conventions of patria potestas. A comparative historical framework of analysis involving two case studies of Ireland and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Referent Tracking of Portions of Reality. Docket No. 1097.015A (USPA 2009055437).Werner Ceusters, Shahid Manzoor & Barry Smith - 2008 - In Werner Ceusters, Shahid Manzoor & Barry Smith (eds.), Referent Tracking of Portions of Reality. Docket No. 1097.015A (USPA 2009055437). US Patent Office.
    Management of information is facilitated by unambiguously tracking portions of reality over time. To track the portions of reality, a referent tracking system is used. The referent tracking system is able to communicate with other tracking systems and/or tradition information systems. Errors in the referent tracking system are detected and corrected to maintain actual representations of the portions of reality.
    Download  
     
    Export citation  
     
    Bookmark  
  20. Recent trends in the study of Roseoloviruses causing diseases, complications and cancer in human.Mohammad Shahid Masroor, Mohammad Mohammad, Shagufta Parween & Mayuri Singh - 2020 - International Journal of Advanced Biochemistry Research 4 (2):08-10.
    Roseoloviruses are ubiquitous worldwide. Its infection in children is very common causing a disease named as Roseola infantum. It appears that most of the children are still being suffered by the same disease without any proper treatment all over the world. And, the situation becomes worst when these latent viruses reactivated in future to develop disease complications and cancer in human. The Present review is an attempt to describe Roseoloviruses causing diseases including cancer in human in the light of recent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Pragmatic Arguments in the Qur'an for Belief.M. Shahid Alam - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  22. CONSUMER PERCEPTION TOWARDS APPLE PRODUCTS WITH REFERENCE TO TIRUCHIRAPPALLI DISTRICT.I. Ashiq Mohamed, Y. Moydheen Sha, M. Shahid Ahmed & M. H. N. Badhusha - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):52-72.
    Consumers often buy products not because of their attributes per se but rather because of the ultimate benefits that these attributes provide, in turn leading to the satisfaction of ultimate values. And Apple is a type of company which understand their customers & future aspects of innovation in a way that no other companies do. That’s the reason that apple is at No. 1 place in Top 50 Most innovative companies. This article endeavors to recognize the consumer perception towards the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Transnational Adaptation: ‘The Dead,’ ‘Fools,’ The Dead, and Fools.Liam Kruger - 2023 - In Brandon Chua & Elizabeth Ho (eds.), The Routledge Companion to Global Literary Adaptation in the Twenty-First Century. Routledge. pp. 19-33.
    This chapter sketches a literary history of writing the colonial interregnum through the comparison of a canonical Dublin text and its filmic adaptation with a canonical Johannesburg text and its filmic adaptation. Njabulo Ndebele’s short story ‘Fools’ (1983) repurposes formal elements from Joyce’s ‘The Dead’ (1914), transposing strategies for representing late colonial Dublin to a Johannesburg township during the height of apartheid in a context of extreme racial domination; beginning with close comparative readings of both stories, my chapter argues that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Peirce and the Coimbra Jesuit Course: A Bond Far More Pervasive Than Commonly Believed.Robert Junqueira - 2023 - Phicare (Philosophy and Care Repository).
    This paper has been presented at the Charles S. Peirce Society’s 10-Minute Thesis Initiative: “His Glassy Essence in Relation” on February 18, 2023, where papers were also presented by Professor Doctor António Manuel Martins and Professor Doctor Mohammad Shafiei, respectively affiliated to the Coimbra Institute for Philosophical Studies and Shahid Beheshti University. -/- The edition “His Glassy Essence in Relation” of the Charles S. Peirce Society’s 10-Minute Thesis Initiative has been jointly organized by Aaron Wilson, António Manuel Martins, Mohammad (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Harmony and modality.Read Stephen - 2008 - In Dégremont C., Kieff L. & Rückert H. (eds.), Dialogues, Logics and Other Strange Things: Essays in Honour of Shahid Rahman. College Publications. pp. 285-303.
    Download  
     
    Export citation  
     
    Bookmark   5 citations