Internet Fraud, Human Trafficking, and the Youth Question in Warri Metropolis: An Integrated Empirical Analysis
Keywords:
internet fraud, human trafficking, cybercrime, routine activity theory, youth, Warri Metropolis, NigeriaAbstract
This study examines the interrelationship between internet fraud and human trafficking among youths in Warri metropolis, Delta State, Nigeria. Guided by Routine Activity Theory, the research investigates how socioeconomic conditions — particularly unemployment and weak law enforcement — create environments that facilitate both offenses. Using a cross-sectional survey design, data were collected from 389 respondents purposively sampled from identified youth clusters in Warri. Variables were operationalized at the ordinal level using Likert-type scales, and Spearman's rank-order correlation was employed to test the hypotheses. Findings reveal statistically significant associations between unemployment and internet fraud participation (rs = 0.442, p < 0.01), weak law enforcement and the prevalence of human trafficking (rs = 0.371, p < 0.01), and digital facilitation and trafficking recruitment (rs = 0.491, p < 0.01). The study demonstrates that both offenses share overlapping structural enablers, with digital platforms increasingly serving as a conduit linking fraud networks to trafficking operations. The conclusion recommends integrated policy responses addressing youth economic inclusion, digital literacy, and strengthened law enforcement. The study contributes an empirically grounded, integrated framework to the literature on cybercrime and trafficking in Nigeria.
Downloads
References
1. Adomi, E. E., Omodeko, F. S., & Otolo, P. U. (2004). The use of cybercafé at Delta State University, Abraka, Nigeria. Library Hi Tech, 22(4), 383–388. https://doi.org/10.1108/07378830410570882
2. Agbu, O. (2003). Sex trafficking and the African child: The Nigerian experience. In C. Udechukwu (Ed.), Child trafficking in Nigeria: The way forward (pp. 1–24). Child Rights Information Network.
3. Ayoola, O., F., Avenda, B., T., Ulo, E., & Olaniyi, A. (2024). Human Trafficking and Cybercrimes Recruitment in Nigeria: An Implication of Cyberspace Anonymity. FUOYE Journal Of Criminology And Security Studies,3(2): 191-209
4. Broadhurst, R., Grabosky, P., Alazab, M., & Chon, S. (2014). Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime. International Journal of Cyber Criminology, 8(1), 1–20.
5. Bryman, A. (2016). Social research methods (5th ed.). Oxford University Press.
6. Chikwendu, S. C., Oli, N. P. & Ohazulike, G. A. (2023).Youths’ Negotiation of Livelihoods and
7. Cloward, R. A., & Ohlin, L. E. (1960). Delinquency and opportunity: A theory of delinquent gangs. Free Press.
8. Cochran, W. G. (1977). Sampling techniques (3rd ed.). John Wiley & Sons.
9. Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589
10. Cybercrimes (Prohibition, Prevention, etc.) Act (2015). Federal Republic of Nigeria Official Gazette.
11. Cybercrimes in Nigeria. Greener Journal of Social Sciences, 13(1), pp. 4-9.
12. Eboibi, F. E. (2019). A review of the legal and regulatory frameworks combating cybercrime in Nigeria and Cameroon. Computer Law & Security Review, 35(4), 432–450. https://doi.org/10.1016/j.clsr.2019.03.005
13. Economic and Financial Crimes Commission. (2015). Establishment and functions of the commission. Abuja, Nigeria.
14. Europol. (2020). Internet Organized Crime Threat Assessment (IOCTA) 2020. European Union Agency for Law Enforcement Cooperation.
15. Federal Republic of Nigeria. (2019). National Youth Policy (revised). Federal Ministry of Youth and Sports Development.
16. Field, A. (2018). Discovering statistics using IBM SPSS Statistics (5th ed.). SAGE.
17. Ibaba, I. S. (2011). Unholy alliances in Nigeria's Niger Delta region: Petro-capitalism, militancy, and oil company-community conflict. Journal of Third World Studies, 28(2), 155–175.
18. International Organization for Migration. (2018). How the internet is used to exploit migrant workers and trafficking victims.
19. Iyanda, R. O. (2012). Human trafficking: Causes, consequences, and government responses in Nigeria. International Journal of Social Science Tomorrow, 1(6), 1–12.
20. Kalanj, S. (2025). Gender-based violence in armed conflicts. International Journal of Contemporary Security Studies, 1(1), 125–138. https://doi.org/10.18485/fb_ijcss.2025.1.1.9
21. Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication, Leadership and Policy.
22. National Agency for the Prohibition of Trafficking in Persons. (2020). Annual report on human trafficking in Nigeria. Abuja, Nigeria.
23. National Population Commission. (2006). Population and housing census of the Federal Republic of Nigeria: Priority tables. NPC.
24. Ngo, F. T., & Jaishankar, K. (2017). Commemorating a decade in existence of the International Journal of Cyber Criminology: A research agenda to advance the scholarship on cyber crime. International Journal of Cyber Criminology, 11(1), 1–9.
25. Obokata, T. (2006). Trafficking of human beings from a human rights perspective: Towards a holistic approach. Martinus Nijhoff.
26. Ojedokun, U. A., & Eraye, M. C. (2012). Socioeconomic lifestyles of the Yahoo-boys: A study of perceptions of university students in Nigeria. International Journal of Cyber Criminology, 6(2), 1001–1013.
27. Okojie, C., Idem, J., Oriaifo, S., & Laetitia, K. (2003). Trafficking of Nigerian girls to Italy: Report of research study. United Nations Interregional Crime and Justice Research Institute.
28. Omolaoye, S. (2023). Olu of Warri laments poverty level in N’Delta despite huge oil deposit. The Guardian. https://guardian.ng/news/olu-of-warri-laments-poverty-level-in-ndelta-despite-huge-oil-deposit/#:~:text=Ogiame%2DAtuwatse%2DIII.%20The%20Olu%20of%20Warri%2C%20Ogiame%20Atuwatse,of%20access%20to%20education%2C%20accessible%20healthcare%20and
29. Petrović, T. (2025). (Re)Constructing Europe: Has a common identity integrated Europe? International Journal of Contemporary Security Studies, 1(1), 139–148. https://doi.org/10.18485/fb_ijcss.2025.1.1.10
30. Ramli, F. Nashril-Abaidah, T. & Ramli, S. I. (2025). Policy Coordination in Combating Human Trafficking: A Systematic Review of Institutional Frameworks and Multi-Agency Collaboration.International Journal of Research and Innovation in Social Science (IJRISS) , 9(11), https://doi.org/10.47772/IJRISS.2025.91100205.
31. Smith, D. J. (2009). Reframe the debate: Agency, structure, and moral reasoning in responses to 419 email fraud. Journal of Contemporary African Studies, 27(4), 461–476.
32. Tade, O., & Aliyu, I. (2011). Social organization of internet fraud among university undergraduates in Nigeria. International Journal of Cyber Criminology, 5(2), 860–875.
33. Trafficking in Persons (Prohibition) Enforcement and Administration Act (2015). Federal Republic of Nigeria Official Gazette.
34. Ulo, E (2023). Cyberspace Anonymity: The Root Cause of Internet Fraud among Nigerian Youths. Ilorin Journal of Criminology and Security Studies Criminology & Security, 1(2), 1-14.
35. Ulo, E. (2025). Internet Fraud and Human Trafficking in Contemporary Nigeria. African Journal Of Strategy, Defence And Security Studies (AJSDSS),1(1) 51-65, DOI: https://doi.org/10.31920/2978-3364/2025/v1n1a3
36. United Nations Office on Drugs and Crime. (2013). Transnational Organized Crime in the West African Region. https://www.unodc.org/pdf/transnational_crime_west-africa-05.pdf
37. United Nations. (2000). Protocol to prevent, suppress and punish trafficking in persons, especially women and children, supplementing the United Nations Convention against Transnational Organized Crime. United Nations Treaty Collection.
38. Vidović, N., & Beriša, H. (2025). Economic aspects of cyber security: Socio-financial consequences of cyber attacks. International Journal of Contemporary Security Studies, 1(1), 149–162. https://doi.org/10.18485/fb_ijcss.2025.1.1.11
39. Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Polity Press.
Published
Issue
Section
License
Copyright (c) 2026 Edafe Ulo, Richard Abayomi Aborisade (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
By submitting a manuscript to the International Journal of Contemporary Security Studies, authors acknowledge and agree to the following copyright terms and conditions:
-
Author Rights and Ownership
- Authors retain the copyright to their submitted work. However, by submitting their manuscript, authors grant the International Journal of Contemporary Security Studies a non-exclusive right to publish, distribute, and archive the work in any format (print, digital, or electronic).
- Authors are free to share, reproduce, and distribute their published work, provided proper credit is given to the original publication in this journal.
-
Licensing and Open Access Policy
- The journal publishes under the [insert applicable license, e.g., Creative Commons Attribution License (CC BY)], which allows others to share and adapt the work with appropriate attribution.
- Authors are responsible for ensuring that their submission complies with the journal's licensing terms and does not violate any third-party rights.
-
Originality and Permissions
- The submitted work must be original and not previously published or under consideration elsewhere.
- If the manuscript includes copyrighted materials (e.g., figures, tables, excerpts), authors must obtain the necessary permissions for reproduction and provide appropriate attribution.
-
Author Warranties
- By submitting, authors confirm that their work does not infringe on any intellectual property rights, is free from plagiarism, and adheres to ethical publishing standards.
- The journal is not responsible for any legal disputes arising from copyright infringement, misrepresentation, or unauthorized use of third-party materials.
-
Editorial and Publication Rights
- The International Journal of Contemporary Security Studies reserves the right to make editorial modifications to ensure clarity, consistency, and compliance with journal standards.
- If accepted, the manuscript will be published online and made publicly available according to the journal’s open-access policy.
By proceeding with submission, authors confirm that they have read and agreed to the terms outlined in this Copyright Notice.