<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="nlm-ta">Rea Press</journal-id>
      <journal-id journal-id-type="publisher-id">null</journal-id>
      <journal-title>Rea Press</journal-title><issn pub-type="ppub">3009-4496</issn><issn pub-type="epub">3009-4496</issn><publisher>
      	<publisher-name>Rea Press</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">https://doi.org/10.22105/masi.v2i3.77</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group><subject>Cybercrime, Cyber-security, Information, Nigeria</subject></subj-group>
      </article-categories>
      <title-group>
        <article-title>Cybercrime and Cyber-Security in Nigeria Authors Olanrewaju Joseph Ilugbami *</article-title><subtitle>Cybercrime and Cyber-Security in Nigeria Authors Olanrewaju Joseph Ilugbami *</subtitle></title-group>
      <contrib-group><contrib contrib-type="author">
	<name name-style="western">
	<surname> Ilugbami</surname>
		<given-names>Olanrewaju Joseph</given-names>
	</name>
	<aff>Rufus Giwa Polytecnic, Owo, Ondo State, Nigeria.</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname> Tolu</surname>
		<given-names>Omigbodun Olanrewaju</given-names>
	</name>
	<aff>Department of Transport Planning and Logistics, University of Ilesa, Ilesa, Nigeria.</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname>Abdulmateen</surname>
		<given-names>Gbadegesin Ayobami </given-names>
	</name>
	<aff>Department of Transport Planning and Logistics, University of Ilesa, Ilesa, Nigeria.</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname>Odeyinka </surname>
		<given-names>Yetunde Victoria</given-names>
	</name>
	<aff>Department of Agricultural and Resource Economics, Federal University of Technology, Akure, Nigeria.</aff>
	</contrib></contrib-group>		
      <pub-date pub-type="ppub">
        <month>07</month>
        <year>2025</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>25</day>
        <month>07</month>
        <year>2025</year>
      </pub-date>
      <volume>2</volume>
      <issue>3</issue>
      <permissions>
        <copyright-statement>© 2025 Rea Press</copyright-statement>
        <copyright-year>2025</copyright-year>
        <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.5/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</p></license>
      </permissions>
      <related-article related-article-type="companion" vol="2" page="e235" id="RA1" ext-link-type="pmc">
			<article-title>Cybercrime and Cyber-Security in Nigeria Authors Olanrewaju Joseph Ilugbami *</article-title>
      </related-article>
	  <abstract abstract-type="toc">
		<p>
			Different activities, such as commercial, social, and human, among others, are afforded limitless options via the Global Information Infrastructure (GII). However, hackers are increasingly attacking the GII, and the frequency of these attacks raises concerns regarding their quantity, cost, and complexity. In order to explain the pertinent conditions and risks of cybercrime in Nigeria, this study aims to investigate the social and technological aspects of cybersecurity and cybercrime. The research used a theoretical and investigative approach to the problem of cybercrime. Structured interviews were targeted at law enforcement agents organizational organizations on cybersecurity. To comprehend the objectives and tactics of Nigerian cybercriminals and to explain their actions in light of current theories of crime, data collected through these study instruments were submitted to descriptive analysis and frequency counts. Four theories of crime were found to be influenced by Nigerian cybercrime: the technology enabled crime theory, the routine activity theory, the Marxian Theory, and the Structural Functionalism Theory. The examination of current legislation revealed that there are presently no provisions in Nigerian statutes that particularly address cybercrime.
		</p>
		</abstract>
    </article-meta>
  </front>
  <body></body>
  <back>
    <ack>
      <p>null</p>
    </ack>
  </back>
</article>