CYBERCRIME IN NIGERIA; A SOCIO LEGAL ANALYSIS WITH FOCUS ON JIGAWA STATE
Abstract
Cybercrime has assumed a new dimension amongst youths in recent time. It was for this reason that the National Assembly had in 2015 enacted an Act known as Cybercrimes (Prohibition and Prevention) Act, 2015 with a view to combating cyber offences in Nigeria. Despite this enactment, cybercrimes are still on the rise in Jigawa State and Nigeria at large, hence, the need to go beyond the law in a quest to find an effective way for the prohibition, prevention and detection of cybercrimes in Jigawa State. Many factors could be adduced as being responsible for the crime in Jigawa State. A sample size of 200 was selected through the use of multi stage sampling procedure. Questionnaire and In-depth interview guide were the main servants, businessmen/women and cyber operators, cyber offenders, private organizations. The specific aim is to investigate the factors responsible for cybercrime, ascertain the consequences of cybercrime, identify the various techniques used in cybercrime and examine the strategic measures that can be put in place towards reducing cybercrime. Findings were made, some of them include that there is a linkage between age and participant in cybercrime. Individuals are aware cybercrime exist. Quest for quick money is a major factor that pushes youth into committing cybercrime. The study recommended among other that the government, Non-governmental Organizations (NGOs) and stakeholders should ensure that they put relevant programmes and campaigns which will make people to be more aware about cybercrime. The governmental, Non-governmental Organizations (NGOs) and stakeholders should ensure that they provide job opportunities for all age categories. Furthermore, families being the primary agent of socialization should be willing to monitor and give their children the required education on crime and also monitor the kind of friends they keep.
Full Text:
PDFReferences
Adebusuyi, (2008). The Internet and Emergence of Yahooboys sub-Culture in
Nigeria, International Journal of Cyber-Criminology, 2, 368 – 381.
Adesina, A.D.O. & Adeyemi, B.A. (2007(. Teaching to achieve Social Studies
Values: A case of reeducation of Teachers. Retrieved Oct. 10, 2010.
Anderson, Ross, et al. (2012). Measuring the cost of cybercrime, 11th Workshop on
the Economics of Information Security (June 20, 2002), Retrieved from http://weis2012.econirrfosec.org/papers/Anderson. WEIS2012. pdf
Akogwu, S. (2012). An Assessment of the level of Awareness of Cybercrime
among Internet Users in Zaria (Unpublished B.Sc. Project/ Department of Sociology, Ahmadu Bello University, Zaria.
Alshalan & Abdullah (2006). Cybercrime fear and victimization: An analysis of a
national survey. Dissertation, Mississippi State University.
Anat, H. & John, D.A. (2003). The impact of denial-of-service attack
announcements on the market value of firms. Risk Management and Insurance Review, 6 (2), 97. CSI/FBI. (2006. Computer Crime and Security Survey XI Annual. Retrieved from http://i.cmpnet.com/gocsi/dh¬area/pdfs/fbi/FB 12006. pdf
Augustine, C., Odinma, & Mieee, (2010). Cybercrime & Cert: Issues & Probable
Policies for Nigeria, DBI Presentation.
Aggarwal, V. (2009). Lead: Cybercrimes’ rampant, Express Computer, Retrieved
from http://www.expresscomputeronline.com/20090803/markel101.shlml.
Awe, J., (2009). Fighting Cybercrime in Nigeria retrieved from
hptt://www.jidaw.com/itsolutions/security3.html.
Ayantokun, O. (2006). Fighting cybercrime in Nigeria: Information-system,
www.Tribune.Com.
Byongook, M., & John, I., mCcLUSSKEY, Cynthia, P. M., (2010). “Information
Technology/Cyber Security Solutions” Journal of Criminal Justice 38, 767 – 772.
Boom, Juridische, uitgevers Den H. (2010). Atul Bamrara HNB Garhwal
University, India Gajcndra Singh Doon University, India Copyright © 2013 International Journal of Cyber Criminology (ˆCC), 7 (1) 4961.
Bohme, Rainer, Tyler M. (2012). How do consumers react to cybercrime? 7th
APWG eCrime Res. Summit. Las Croahas, 1(2).
Bruce Schneier. Ed., Economics of Information Security and Privacy III. Springer,
New York.
Cheng, T.C. Edwin, David. Y.C., Lam, Andy, C. L. Yeung. (2006). Adoption of
Internet Banking: An empirical study bin Hong Kong. Decis.
Chiemeke, C.S. & Longe C. B. (2007). Information and Communication
Penetration in Nigeria: Prospects, Challenges and Metrics. Asian Journal of Information Technology. 6 (3), 280 287.
Cybercrime (Prohibition, Prevention, ECT) Act, 2015, Laws of the Federation of Nigeria.
Choo, K.R. (2009). High tech criminal threats to the national information
infrastructure. Information Security Technical Report, XXX, 1 – 8. Cybercrime. Retrieved from http://www.tcehterms.com/detmitio/cybercrime.
Choo, K.R. (2008). Organized crime groups in Cyberspace: A typology Springer
Science Policing and reducing Crime Unit: Research, Development and statistic Directorate.
Cohen, L.E., & Felson, M. (1979). Social change and crime rate trends: A routine
activity approach: American Sociological Review (44).
Diller-Haas, A. (2004). Identity theft: it can happen to you. The CPA Journal, 74
(4), 42.
Eastlom, C. (2006). Computer security fundamentals. Upper Saddle River, N.J:
Prentice Hall.
Ehimen, O.R. & Bola, A., (2010). Cybercrime in Nigeria. Business Intelligence
Journal, 3 (1), 5.
FBI (2005). FBI Computer Crime Survey. Retrieved from http://www.fbi.com
Donn B. & Parker, (1998) Fighting Computer Crime. New York, USA, John Wiley
& Sons, Inc.
D. I. (2001). Scene of Cybercrime: Computer Forensics Handbook. Syngress
Publishing Inc. 88Hingham Street USA.
Elijah, J., Esquibel M.a. Laurenzano, Jing, X., Ted, Z. (2005). Cybercrime activity:
Methods and Motivations 2 (2), 290 – 309.
Forencio, Dninei, Cormac, H. (2013). Sex, Lies and Cybercrime surveys
Foltz, C.B. (2004). Cyber terrorism, computer crime and reality. Information
Management & Computer Security, 12 (2), 154.
Fulcher, J. & Scoltt, J. (2007). Sociology 3rd edition. Oxford University Press
Hloltfreter, K. Reisig, M.D. & Pratt, T.C. (2008). Low self-control, outline
activities and fraud victimization. Journal of Criminology. 46, 189 – 220.
Hloltfreter, K. Beaver, K.M. Reisig, M.D. & Pratt, T.C. (2010). Low self control
and fraud offending. Journal of Financial Crime, 77 (3). 295 – 307.
Hutchings, A. & Hayes, H. (2009). Routine Activity theory and phishing
victimization: who got caught in the “net:? Current issues in Criminal Justice 20, 432 – 451.
Igbo, E.U.M (1999). Introduction to Criminology. Nsukka Afro-orbis publications.
Independent. (1994). ‘Genes linked to violence and crime condemned’. Retrieved from http://www.independentco.uk/news/genes-liked-to-violence-and crimecondemned-1573089.html
Jaishankar, K. (2008). Space Transition Theory of Cybercrimes. In Schnallangar,
F. & Pittaro, M. (Eds.). Crimes of the Internet 283 – 301). Upper Saddle River, NJ: Prentice Hall.
Kigerl, A. (2011). Routine Activity Theory and the Determinants of High
Cybercrime Countries. Social Science Computer Review. 000 (00). 1 – 17.
Koshy, E., Koshy, V, Waterman, H. (2010). Action Research for health care.
London: SAGE “Nigeria: Prospects. Challenges and Metrics. Asian Journal of Information Technology.
Laura, A. (1995) cybercrime and National Security: “The Role of the Penal and
Procedural Law” Research Fellow, Nigerian Institute of Advanced Legal Studies, Retrieved from http://nials-nigeria.org/pub/lauraani.pdf.
Longe, O. B. & Chiemeke, S. (2008). Cybercrime and Criminality in nigeria –
What Roles Are Internet Access Points In playing? European Journal of Social Sciences, 6 (4).
Mc Council (2000). Cybercrime and Punishment. Archaic Law Threaten.
Mohsin, A. (2006). Cybercrimes and solutions, Retrieved from
http://ezinearticles/?cybercrimes and solutions &id=204167.
Okonigene, R.E. & Adekanle, B. (2009). Cybercrime in Nigeria, Business
Intelligence Journal, retrieved from http://www.saycocorporatiotion.com/saycoUK/BIJ/journal/3(1)/Article7
Olaide & Adewole (2004), Cybercrime Embarrassing for Victims. Retrieved
September 2011 from http://www.heraldsun.com.au
Oliver E.O. (2010). Being Lecture Delivered at FBI/ George Mason University
Conference on Cyber Security holding, Department of Information Management Technology Federal University of Technology, Owerri.
Olumide, O. O. & Victor, F. B. (2010). E-crime in Nigeria: Trends, Tricks and
Treatments. The Pacific Journal of Science and Technology, 11, (1).
Olaide & Adewole (2- -4). Cybercrime Embarrassing for victims. Retrieved from
http://www.guide2nigeria.com/news-articles_About Nigeria.
Oyewole & Obeta (2002). An Introduction to Cybercrime. Retrieved from
http://www.crimeresearch.org/articles/cybercrime.
Orin, S. & Kerr (2003). Cybercrime’s Scope: Interpreting Access and
Authorization In Computer Misuse Statutes NYU Law review, 78 (5), 1596 – 1668.
Peter, A. A., Olugbenga, A.,Ige a. a. (2013). WODC, Commissioning Research
Division, Ministry of Security and Justice. Ministry of Security and Justice.
Ribadu, E. (2007). Cybercrime and Commercial fraud; Nigerian Perspective, A
paper presented at the Modern Law for Global Commerce.
Roseline, O. & Moses, O. (2012). Cyber capacity without cyber security: A case
study of Nigeria’s national policy for information technology (NPFIT), The Journal of Philosophy, Science and Law, 12, Retrieved from www. Miami.Edu/Ethics/Jpsi
Schaeffer, B. S. et al. (2009): cybercrime and cyber security: A while paper for
Franchisors, Licensors and others.
Sesan, G. (2010). The new security war, retrieved from
http://www.pcworld.com/article/122492/the_new_security_war.htmmod-rel.
Shinders Strassmann, P. A. (2009). Cyber Security for the Department of Defense,.
Retrieved from http://www.strassmann.com/pubs/dod/cybersecurity-dratf-vl.pdf
Stol, W. Ph., Leukfe;dt, E. R & Dommenie, M. M. L. (2011). Internet crime and
the police. Journal of police studies, 20 (3) 59 – 81.
Sutherland, H. (1939). Principles of Criminology. Fourth edition.
Symantec. (2007). Small and mid-sized business products. International Journal of
cyber criminology retrieved from http://www.symantec, com/smb/products/index.jsp
The national white collar crime center (2010) IC3 2009 internet, crime report.
Retrieved from http://www.TC3.state.gov. 1- 29.
The national White collar crime center (2002). IFCC 2001 Internet Fraud Report.
Retrieved from http://www.IC3.gov. 1 – 27.
Thompson, D. (1989). Police powers – Where’s the Evidence, Proceedings of the
Australian Computer Abuse Inaugral Conference.
Umeozulu, F. (2012). Perception of Cybercrime Among Nigerian Youths
Umo,. G. g. (2010). CYBER Threats: Implication for Nigeria’s National Interest,
Retrieved from http://docs.google.com/file/d/QB9sby6n_V503M2F INWIzZjglMDRiosoonJLLltHmjllNmlONzg5NGVINTM2/edith?num=50&sort=name&layout--list&pli=1
Van der Hulst, R. C. & Nweve , R. J. M. (2008). High-tech crime; inventarisate
van literature over soorten criminalities en hun daders. [High Tech Crime. Literature review about crimes and their offenders] Den Haag: WODC. Gaurav Misra, Permeance of ICT in Crime in India
Vladimir, G. (2005). International Cooperation in fighting cybercrime
www.crimesearch.org.
Yar, M. (2005). The Novelty of cybercrime: An assessment in light of Routine
Activity Theory. European Journal of Criminology. 2. 407 – 427.
Zero, T. (2006). Retiree in Trouble over Internet Fraud. Economic and Financial
Crime Commission, 1, (2) 8 – 12.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.