By
Abu-Ubaida Sani
And
Jibril Yusuf
And
Muhammad Sulaiman Abdullahi
A scam constitutes a deceptive strategy employed to manipulate individuals into relinquishing financial assets, information, or items of value, with the perpetrator securing permanent gain. Conversely, the internet represents a contemporary technological framework comprising interconnected systems (including networks, devices, and services) whose convergence generates complex phenomena spanning sectors such as communication, education, banking, commerce, and retail, alongside interactions involving human and non-human entities.
The global proliferation of the
internet has precipitated the advent of a distinct form of fraudulent activity:
online scams. These predominantly target users engaging with digital platforms,
social media networks, and software applications. Notably, a substantial
segment of the Hausa demographic actively participates in online economic,
social, academic, and informational exchanges. Consequently, the Hausa
community has become increasingly vulnerable to online fraudulent schemes,
necessitating scholarly inquiry and research to enhance awareness regarding
protective mechanisms against such exploitation.
This book is structured into six
chapters. Chapter One delineates the conceptual framework of scams,
followed by an exposition on the internet’s historical evolution and expansion.
Chapter Two critically examines monetization strategies within digital
spaces, with particular attention to online entrepreneurial ventures pertinent
to Hausa users. Empirical observations indicate heightened susceptibility to
fraudulent practices among individuals engaged in internet-based income
generation (kasuwancin kan intanet).
Chapter
Three presents a typological analysis of online scams,
positing that comprehension of their operational modalities constitutes a
fundamental safeguard against victimization. Chapter Four investigates
prominent case studies of Hausa-targeted online scams, frequently perpetrated
under the pretext of e-commerce (online businesses). The analytical examination
of these cases facilitates discernment between legitimate and spurious online
business operations, particularly for Hausa readers.
Chapter
Five evaluates specific instances of financially motivated
cyber fraud (notably cryptocurrency-related schemes) that have impacted Hausa
populations. Deceptive models such as Insknation, Telegram P2P,
and AI Mining are deconstructed to enable differentiation between
authentic and fraudulent cryptographic enterprises.
Chapter Six
articulates proactive countermeasures against online fraudulent activities,
encompassing identification protocols for deceptive communications and
counterfeit platforms. Furthermore, it prescribes defensive measures for
securing digital assets across web-based interfaces (websites and blogs), computer
and mobile applications, and social media platforms.
It is the scholarly contention of this
work that its contents shall prove instrumental in elucidating defensive
paradigms against the pervasive threat of internet-facilitated fraud (online
scams).

0 Comments