Discursive Features of Nigerian Online Ponzi Schemes’ Narratives
Although Ponzi schemes have existed since the 1800s, contemporary financial challenges have rejuvenated them while the Internet has enhanced their proliferation, particularly in developing countries. The present study analyses select discursive features for digital deception in Nigerian online Ponzi schemes. We identify the use of stance and linguistic engagement, formulaic expressions and politeness strategies, narrativity, naming, and lexical range as techniques used by scheme creators. These linguistic and discursive choices are wielded as tools to attract customers and, ultimately, to deceive. The overt propagation of financial gains has underlying ideological implications, as it projects a sense of communality and encourages financial leverage which are in turn exploited to con unsuspecting – often greedy – subscribers. We conclude that language use in Ponzi schemes is intentionally crafted to appeal to diverse individual sentiments, particularly within developing economies where poverty is widespread and people seek to make money through any means in order to survive.
Adegbija, Efurosibina. 1995. “‘I, Major-General X’. Discourse Tacts in Military Coup Speeches in Nigeria.” Text 15 (2): 253–70. https://doi.org/10.1515/text.1.19220.127.116.11.
Adomi, Esharenana, and Stella E. Igun. 2008. “Combating Cybercrime in Nigeria.” The Electronic Library 26 (5): 716–25. https://doi.org/10.1108/02640470810910738.
Al-Kadi, Abdu M. Talib, and Rashad Ali Ahmed. 2018. “Evolution of English in the Internet age.” Indonesian Journal of Applied Linguistics 7 (3): 727–36. https://doi.org/10.17509/ijal.v7i3.9823.
Ambele, Eric A., Yusop Boonsuk, and Chamaiporn Buddharat. 2018. “Processing English Formulaic Expressions in Situation-Bound Utterances: Strategies Used by Francophone ESL Learners in Thailand.” Arab World English Journal 9 (3): 163–75. https://doi.org/10.24093/awej/vol9no3.11.
Arciuli, Joanne, David Mallard, and Gina Villar. 2010. “‘Um, I can tell you’re lying’: Linguistic Markers of Deception versus Truth-Telling in Speech.” Applied Psycholinguistics 31 (3): 397–411. https://doi.org/10.1017/S0142716410000044.
Armistead, Timothy W. 2011. “Detecting Deception in Written Statements: The British Home Office Study of Scientific Content Analysis (SCAN).” Policing: An International Journal of Police Strategies & Management 34 (4): 588–605.
Basu, Kaushik. 2014. “Ponzis: The Science and Mystique of a Class of Financial Frauds.” World Bank Policy Research Working Paper (6967). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2466780.
Blommaert, Jan, and Tope Omoniyi. 2006. “Email fraud: Language, Technology, and the Indexicals of Globalization.” Social Semiotics 16 (4): 573–605. https://doi.org/10.1080/10350330601019942.
Bosley, Stacie, and Knorr Maggie. 2018. “Pyramids, Ponzis and Fraud Prevention: Lessons from a Case Study.” Journal of Financial Crime 25 (1): 81–94. https://doi.org/10.1108/JFC-10-2016-0062.
Buller, David, and Judee K. Burgoon. 1996. “Interpersonal Deception Theory.” Communication Theory 6 (3): 203–42. https://doi.org/10.1111/j.1468-2885.1996.tb00127.x.
Buller, David, Judee K. Burgoon, Aileen Buslig, and James Roiger. 1996. “Testing Interpersonal Deception Theory: The Language of Interpersonal Deception.” Communication Theory 6 (3): 268–89.
Burgoon, Judee. K., J. P. Blair, Tiantian Qin, and Jay F. Nunamaker Jr. 2003. “Detecting Deception through Linguistic Analysis.” In Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2–3, 2003 Proceedings, edited by Hsinchun Chen, Richard Miranda, Daniel D. Zeng, Chris Demchak, Jenny Schroeder, and Therani Madhusudan, 91–101. https://doi.org/10.1007/3-540-44853-5_7.
Button, Mark, Carol McNaughton Nicholls, Jane Kerr, and Rachael Owen. 2014. “Online Frauds: Learning from Victims Why They Fall for These Scams.” Australian & New Zealand Journal of Criminology 47 (3): 391–408. https://doi.org/10.1177/0004865814521224.
Chilton, Paul. 2004. Analysing Political Discourse: Theory and Practice. London: Routledge.
Chiluwa, Innocent. 2009. “The Discourse of Digital Deceptions and ‘419’ Emails.” Discourse Studies 11 (6): 635–60. https://doi.org/10.1177/1461445609347229.
—. 2010. “The Pragmatics of Hoax Email Business Proposals.” Linguistik Online 43 (3): 3–17. https://bop.unibe.ch/linguistik-online/article/view/409/648.
—. 2015a. “E-mail Fraud.” In International Encyclopedia of Language and Social Interaction, edited by Karen Tracy, Cornelia Ilie, and Todd Sandel, 503–8. Boston: Wiley Blackwell.
—. 2015b. “Radicalist Discourse: A Study of the Stances of Nigeria’s Boko Haram and Somalia’s Al Shabaab on Twitter.” Journal of Multicultural Discourses 10: 214–35. https://doi.org/10.1080/17447143.2015.1041964.
Chiluwa, Innocent, and Akin Odebunmi. 2016. “On Terrorist Attacks in Nigeria: Stance and Engagement in Conversations on Nairaland.” Communication and the Public 1 (1): 91–109. https://doi.org/10.1177/2057047315624926.
Chiluwa, Isioma M., and Innocent Chiluwa. 2020. “‘We Are a Mutual Fund:’ How Ponzi Scheme Operators in Nigeria Apply Indexical Markers to Shield Deception and Fraud on Their Websites.” Social Semiotics. https://doi.org/10.1080/10350330.2020.1766269.
Choudhury, Farzana. 2014. “Can Language Be Useful in Detecting Deception? The Linguistic Markers of Deception in the Jodi Arias Interview.” Diffusion – The UCLan Journal of Undergraduate Research 7. https://diffusion.uclan.ac.uk/wp-content/uploads/2019/07/16-58-1-PB.pdf.
Cialdini, Robert. 2001. Influence: Science and practice, 4th ed. Boston: Allyn & Bacon.
Crystal, David. 2011. Internet Linguistics: A Student Guide. London: Routledge.
DePaulo, Bella M., James Lindsay, Brian Malone, Laura Muhlenbruck, Kelly Charlton, and Harris Cooper. 2003. “Cues to Deception.” Psychological Bulletin 129: 74–118.
Drew, Jacqueline M., and Michael E. Drew. 2010. “The Identification of Ponzi Schemes.” Griffith Law Review 19 (1): 51–70. https://doi.org/10.1080/10854668.2010.10854668.
Druyd, M. 2005. “‘I Brought You a Good News’: An Analysis of Nigerian 419 Letters.” Proceedings of the 2005 Association of Business Communication Annual Convention, 1–11.
Fairclough, Norman. 2003. Analysing Discourse. Textual Analysis for Social Research. London and New York: Routledge.
Feldman Barrett Lisa, Nathan L. Williams, and Geoffrey T. Fong. 2002. “Defensive Verbal Behavior Assessment.” Personality and Social Psychology Bulletin 28 (6): 776–88. https://doi.org/10.1177%2F0146167202289007.
Fraser, Bruce. 2010. “Hedging in Political Discourse.” In Perspectives in Politics and Discourse, edited by Urszula Okulska and Piotr Cap, 201–14. Amsterdam: John Benjamins Publishing. https://doi.org/10.1075/dapsac.36.16fra.
Fried, Robert B. 2003. “Cyber Scam Artists: A New Kind of .con.” SANS Institute Information Security Reading Room. Accessed November 26, 2019. https://www.sans.org/reading-room/whitepapers/threats/cyber-scam-artists-kind-con-482.
Galasinski, Dariusz. 2000. The Language of Deception: A Discourse Analytical Study. London: Sage Publications.
Garner, Bryan A., and Henry Campbell Black. 2009. Black’s Law Dictionary. St. Paul, MN: West.
Gong, Jiong, Randolph Preston McAfee, and Michael A. Williams. 2014. “Fraud Cycles.” Social Science Research Network, February 14, 2014. https://doi.org/10.2139/ssrn.1762583.
Greenspan, Stephen. 2009. “Fooled by Ponzi (and Madoff), How Bernard Madoff Made Off with My Money.” Skeptic 14 (4). https://www.skeptic.com/eskeptic/08-12-23/#feature.
Hancock, Jeffrey T. 2007. “Digital Deception: When, Where and How People Lie Online.” In Oxford Handbook of Internet Psychology, edited by Adam N. Joinson, Katelyn Y. A. McKenna, Tom Postmes, and Ulf-Dietrich Reips, 287–301. Oxford: Oxford University Press.
Hancock, Jeffrey T., Curry Lauren E., Goorha Saurabh, and Woodworth Michael. 2007. “On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication.” Discourse Processes 45 (1): 1–23. https://doi.org/10.1080/01638530701739181.
Hess, Sarah, and Soltes Eugene. 2018. “Russia’s Greatest Ponzi Mastermind is Dead, but his Legacy Lives on in the Crypto World.” Quartz Online, April 25, 2018. https://qz.com/1259524/mmm-and-bitcoin-russian-ponzi-mastermind-sergeimavrodi-is-dead-but-his-legacy-lives-on-in-crypto/.
Heyd, Theresa. 2008. Email Hoaxes. Amsterdam/Philadelphia: John Benjamins.
Ho, Shuyuan Mary, Jeffrey T. Hancock, Cheryl Booth, and Xiuwen Liu. 2016. “Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication.” Journal of Management Information Systems 33 (2): 393–420. https://doi.org/10.1080/07421222.2016.1205924.
Holt, Thomas J., and Danielle C. Graves. 2007. “A Qualitative Analysis of Advance Free Fraud Email Schemes.” International Journal of Cyber Criminology 1 (1): 137–54.
Hyland, Ken. 2005. “Stance and Engagement: A Model of Interaction in Academic Discourse.” Discourse Studies 7: 173–92. https://doi.org/10.1177%2F1461445605050365.
Igwe, Chidi. 2007. Taking Back Nigeria from 419: What to Do about the Worldwide E-mail Scam – Advance Fee Fraud. Bloomington: iUniverse.
Jacobs, Pearl, and Linda Schain. 2011. “The Never Ending Attraction of the Ponzi Scheme.” Journal of Comprehensive Research 9: 40–46.
Krige, Detlev. 2012. “Fields of Dreams, Fields of Schemes: Ponzi Finance and Multi-Level Marketing in South Africa.” Africa 82 (1): 69–92. https://doi.org/10.1017/S0001972011000738.
Križan, Agata. 2016. “The Language of Appraisal in British Advertisements: The Construal of Attitudinal Judgement.” ELOPE 13 (2): 199–220. https://doi.org/10.4312/elope.13.2.199-220.
Leeper Piquero, Nicole, M. Lyn Exum, and Sally S. Simpson. 2005. “Integrating the Desire-For-Control and Rational Choice in a Corporate Crime Context.” Justice Quarterly 22: 252–80. https://doi.org/10.1080/07418820500089034.
Lewis, Mervyn K. 2012. “New Dogs, Old Tricks. Why Do Ponzi Schemes Succeed?” Accounting Forum 36: 294–309.
Luukkonen, Tiina. 2014. “‘This Will Not Be A Ponzi Scheme’: Persuasion in an American Ponzi Scheme.” MA Thesis, Department of Languages, University of Jyväskylä.
Martin, James R., and Peter R. White. 2005. The Language of Evaluation. Appraisal in English. Hampshire and New York: Macmillan.
Moore, Tyler, Jie Han, and Richard Clayton. 2012. “The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs.” In Financial Cryptography and Data Security, edited by Angelos D. Keromytis, 41–56. Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-32946-3_4.
Newman, Matthew L., James W. Pennebaker, Diane S. Berry, and Jane M. Richards. 2003. “Lying Words: Predicting Deception from Linguistic Styles.” Personality and Social Psychology Bulletin 29: 665–75. https://doi.org/10.1177%2F0146167203029005010.
Ochs, Elinor. 1990. “Cultural Universals in the Acquisition of Language: Keynote Address.” Papers and Reports on Child Language Development 29: 1–19.
Okafor, Godson Okwuchukwu, and Ozioma Perpetua Unachukwu. 2015. “Lying in Mobile Phone Conversations: An Emerging Social Syndrome in Nigeria.” Journal of Social Sciences & Humanities Research 1 (1): 1–7.
Onanuga, Paul. 2017. “Language Use in Nigerian Spam SMSs: A Linguistic Stylistic Analysis.” Language Matters 48 (2): 91-116. https://doi.org/10.1080/10228195.2017.1337805.
—. 2020. “When Hip-Hop Meets CMC: Digital Discourse in Nigerian Hip-Hop.” Journal of Media & Cultural Studies 34 (4): 590–600. https://doi.org/10.1080/10304312.2020.1757038.
Onanuga, Paul, and Rotimi Taiwo. 2019. “Multimodality in Selected Nigerian Ponzi Schemes’ Narratives.” Ekpoma Journal of Languages and Literary Studies 12 (1–2): 327–51.
Palasinski, Marek, and Simon Bignell. 2015. “Seeking Patterns of Digital Deception.” In Encyclopedia of Information Science and Technology, Third Edition, edited by Mehdi Khosrow-Pour, 6446–54. Hershey, PA: Information Science Reference. https://doi.org/10.4018/978-1-4666-5888-2.ch633.
Picornell, Isabel. 2011. “The Rake’s Progress: Linguistic Strategies for Deception.” In Proceedings of the International Association of Forensic Linguists’ Tenth Biennial Conference, edited by Samuel Tomblin, Nicci MacLeod, Rui Sousa-Silva and Malcolm Coulthard, 153–68. Birmingham, UK: Centre for Forensic Linguistics, Aston University. https://www.forensiclinguistics.net/IAFL10proceedings.pdf.
Rejón-Guardia, Francisco, and Francisco J. Martínez-López. 2014. “Online Advertising Intrusiveness and Consumers’ Avoidance Behaviors.” In Handbook of Strategic e-Business Management, edited by Francisco J. Martínez-López, 565–86. Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-39747-9_23.
Searle, John R. 1976. “A Classification of Illocutionary Acts.” Language in Society 5 (1): 1–23. https://www.jstor.org/stable/4166848.
Scollon, Ron, and Suzanne Wong Scollon. 1995. Intercultural Communication: A Discourse Approach. Oxford: Blackwell.
Schaffer, Deborah. 2012. “The Language of Scam Spams: Linguistic Features of ‘Nigerian Fraud’ E-Mails.” A Review of General Semantics 69 (2): 157–79. https://www.jstor.org/stable/42579182.
Smith, Andrew. 2009. “Nigerian Scam E-Mails and the Charms of Capital.” Cultural Studies 23 (1): 27–47. https://doi.org/10.1080/09502380802016162.
Smith, Daniel Jordan. 2007. A Culture of Corruption: Everyday Deception and Popular Discontent in Nigeria. Princeton, NJ: Princeton University Press.
Sorlin, Sandrine. 2017. “The Pragmatics of Manipulation: Exploiting Im/Politeness Theories.” Journal of Pragmatics 121: 132–46. https://doi.org/10.1016/j.pragma.2017.10.002.
Spencer-Oatey, Helen, ed. 2008. Culturally Speaking: Culture, Communication and Politeness Theory. New York: Continuum.
Strohm, Florian, and Roman Klinger. 2018. “An Empirical Analysis of the Role of Amplifiers, Downtoners, and Negations in Emotion Classification in Microblogs.” Paper presented at 2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA), Turin, Italy, 673–81. IEEE. https://doi.org/10.1109/DSAA.2018.00087.
Taiwo, Rotimi. 2010. “‘The Thumb Tribe’: Creativity and Social Change through SMS in Nigeria.” California Linguistic Notes XXXV (1): 1–18.
—. 2012. “Discursive Manipulation Strategies in Virtual Scams in Global Contexts.” In Computer-Mediated Communication across Cultures: InternationaI Interactions in Online Environments, edited by Kirk St. Armant and Sigrid Kelsey, 143–54. Hershey, Pennsylvania: IGI Global. https://doi.org/10.4018/978-1-60960-833-0.ch010.
—. 2016. “Cognitive Verbs and Stance Taking in Nigerian Jobs and Careers Portals Online.” Marang: Journal of Language and Literature 27: 1–19.
—. 2017. “Discursive Forms and Functions of Digital Deceptive Communication in Nigerian Online Discourse.” In Deception and Deceptive Communication, edited by Innocent Chiluwa, 245–74. New York: Nova Science Publishers.
Tanfa, Denis Yomi. 2006. "Advance Fee Fraud." PhD diss., University of South Africa, Pretoria.
Tian, Kelly, and Bill Keep. 2002. Customer Fraud and Business Responses: Let the Marketer Beware. Westport CT: Quorum Books.
Tive, Charles. 2006. 419 scam: Exploits of the Nigerian Con Man. Bloomington, IN: iUniverse.
Toma, Catalina L., and Jeffrey T. Hancock 2010. “Reading between the Lines: Linguistic Cues to Deception in Online Dating Profiles.” CSCW 2010, February 6–10, 2010, Savannah, Georgia, USA.
Tsikerdekis, Michail, and Zeadally Sherali. 2014. “Online Deception in Social Media.” Communications of the ACM 57 (9): 72–80. http://dx.doi.org/10.1145/2629612.
Urowayino, Jeremiah. 2017. “MMM: As the Bubble Bursts.” Vanguard, March 23, 2017. https://www.vanguardngr.com/2017/03/mmm-bubble-bursts/.
van Dijk, Teun A. 2006. “Ideology and Discourse Analysis.” Journal of Political Ideologies 11 (2): 115–40. https://doi.org/10.1080/13569310600687908.
Vrij, Aldert, Samantha Mann, and Sharon Leal. 2012. “Deception Traits in Psychological Interviewing.” Journal of Police and Criminal Psychology 28: 115–26. https://doi.org/10.1007/s11896-013-9125-y.
Walsh James. 1999. “How Ponzi Schemes, Pyramid Frauds Work.” Consumers’ Research Magazine 82 (6): 10–14.
Whitty, Monica T., Tom Buchanan, Adam N. Joinson, and Alex Meredith. 2012. “Not All Lies Are Spontaneous: An Examination of Deception across Different Modes of Communication.” Journal of the American Society for Information Science and Technology 63 (1): 208–16. https://doi.org/10.1002/asi.21648.
Woker, T. A. 2003. “If It Sounds Too Good to Be True It Probably Is: Pyramid Schemes and Other Related Frauds.” South African Mercantile Law Journal 15 (2): 237–49.
Zahra, Shaker A., Richard L. Priem, and Abdul A. Rasheed. 2007. “Understanding the Causes and Effects of Top Management Fraud.” Organizational Dynamics 36 (2): 122–39.
Zhou, Lina, Judee K. Burgoon, Jay F. Nunamaker, and Doug Twitchell. 2004. “Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications.” Group Decision and Negotiation 13 (1): 81–106.
Copyright (c) 2020 Paul Onanuga
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors are confirming that they are the authors of the submitting article, which will be published (print and online) in journal ELOPE by Znanstvena založba Filozofske fakultete Univerze v Ljubljani (University of Ljubljana, Faculty of Arts, Aškerčeva 2, 1000 Ljubljana, Slovenia). Author’s name will be evident in the article in journal. All decisions regarding layout and distribution of the work are in hands of the publisher.
- Authors guarantee that the work is their own original creation and does not infringe any statutory or common-law copyright or any proprietary right of any third party. In case of claims by third parties, authors commit their self to defend the interests of the publisher, and shall cover any potential costs.
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.