Cybercrime and Cyber-Security in Nigeria

Authors

https://doi.org/10.22105/masi.v2i3.77

Abstract

Different activities, such as commercial, social, and human, among others, are afforded limitless options via the Global Information Infrastructure (GII). However, hackers are increasingly attacking the GII, and the frequency of these attacks raises concerns regarding their quantity, cost, and complexity. In order to explain the pertinent conditions and risks of cybercrime in Nigeria, this study aims to investigate the social and technological aspects of cybersecurity and cybercrime. The research used a theoretical and investigative approach to the problem of cybercrime. Structured interviews were targeted at law enforcement agents organizational organizations on cybersecurity. To comprehend the objectives and tactics of Nigerian cybercriminals and to explain their actions in light of current theories of crime, data collected through these study instruments were submitted to descriptive analysis and frequency counts. Four theories of crime were found to be influenced by Nigerian cybercrime: the technology enabled crime theory, the routine activity theory, the Marxian Theory, and the Structural Functionalism Theory. The examination of current legislation revealed that there are presently no provisions in Nigerian statutes that particularly address cybercrime.

Keywords:

Cybercrime, Cyber-security, Information, Nigeria

References

  1. [1] Adeniran, A. O., Jadah, H. M., & Mohammed, N. H. (2020). Impact of information technology on strategic management in the banking sector of Iraq. Insights into regional development, 2(2), 592–601. https://dx.doi.org/10.9770/IRD.2020.2.2(7)

  2. [2] Brenner, S. (2007). Law in an era of smart technology. Oxford University Press. https://doi.org/10.1093/acprof:oso/9780195333480.001.0001

  3. [3] Longe, O. B., Chiemeke, S. C. (2008). Cyber crime and criminality in Nigeria: What roles are internet access points in playing? Journal of information technology impact, 9(3), 155–172. https://www.researchgate.net/deref/https%3A%2F%2Fwww.researchgate.net%2Fpublication%2F228876250_Criminal_Uses_of_Information_Communication_Technologies_in_Sub-Saharan_Africa_Trends_Concerns_and_Perspectives%3FenrichId%3Drgreq-1e01304b72b5b1f9a0cc601d6b3e6315-XXX%26enrichSource%3DY292ZXJQYWdlOzIyODg3NjI1MDtBUzoxMDIyOTg2OTI4ODI0MzZAMTQwMTQwMTMxNzQ1Mw%253D%253D%26el%3D1_x_2%26_esc%3DpublicationCoverPdf?_tp=eyJjb250ZXh0Ijp7ImZpcnN0UGFnZSI6InB1YmxpY2F0aW9uIiwicGFnZSI6InB1YmxpY2F0aW9uIn19

  4. [4] Adeniran, A. O., Onuajah, S. I., Adeniran, A. A., & Ogunmola, M. A. (2024). Implementing cloud-centric IoT transformations: Merits and demerits. Systemic analytics, 2(2), 174–187. https://doi.org/10.31181/sa22202422

  5. [5] Adeniran, A. O. (2018). Assessment of federal governments’ effort on looted assets recovery in nigeria as a means of fighting corruption and terrorism. Discovery, 54(276), 453–462. https://www.researchgate.net/publication/329453250_Assessment_of_federal_governments’_effort_on_looted_assets_recovery_in_Nigeria_as_a_mea

  6. [6] Adeniran, A. O., & Obembe, O. E. (2020). The significance of strategic management accounting on the performance of transport businesses in Nigeria. Insights into regional development, 2(3), 677–688. https://dx.doi.org/10.9770/ird.2020.2.3(5)

  7. [7] Aluko, M. (2004). 17 ways of stopping financial corruption in Nigeria. https://dawodu.com/aluko103.htm

  8. [8] Ullah, F., Ali, A., & Umar, Z. (2021). Understanding cybercrime and youth: A perception based approach. Pakistan journal of social research, 3(3), 130–136. https://pdfs.semanticscholar.org/529a/dc0cadf9741234f5a89c5dde7713c2368a86.pdf

  9. [9] Matthew, O. F. (2016). Sociological and technological factors that enhance cybercrime and cyber security in Nigeria. International journal of law and legal studies, 4(5), 207–216. https://www.internationalscholarsjournals.com/articles/sociological-and-technological-factors-that-enhance-cybercrime-and-cyber-security-in-nigeria.pdf

  10. [10] Yar, M. (2005). The Novelty of ‘cybercrime’ an assessment in light of routine activity theory. European journal of criminology, 2(4), 407–427. https://doi.org/10.1177/147737080556056

  11. [11] Smith, R., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial. Criminal justice matters, 58(1), 22–23. https://doi.org/10.1080/09627250408553240

  12. [12] Wall, D. (2003). Maintaining order and law on the internet David Wall. In Crime and the internet (p. 167). Routledge. https://doi.org/10.4324/9780203299180-14

  13. [13] Lastowka, F. G., & Hunter, D. (2004). Virtual crimes. New york law school law review, 49(1), 306–310. https://doi.org/10.18574/nyu/9780814739075.003.0009

  14. [14] Grabosky, P. N. (2017). Virtual criminality: Old wine in new bottles? In Cyberspace crime (pp. 75–81). Routledge. https://doi.org/10.1177/a017405

  15. [15] Cernomoreț, S., & Nastas, A. (2023). Comparative analysis of cybercrime in the criminal law system. Adjuris-International Academic Publishers. https://www.adjuris.ro/books/cacc/Comparative%20Analysis%20of%20Cybercrime%20in%20the%20Criminal%20Law%20System.pdf

  16. [16] Mann, D., & Sutton, M. (1998). Netcrime: More change in the organisation of thieving. British journal of criminology, 38(2), 201–229. https://irep.ntu.ac.uk/id/eprint/25206

  17. [17] Loader, B. D., & Thomas, D. (2013). Cybercrime: Law enforcement, security and surveillance in the information age. Routledge. https://doi.org/10.4324/9780203354643

  18. [18] Canada, S. (2002). Canadian community health survey cycle 1.2: Mental health and well-being. https://www150.statcan.gc.ca/n1/en/catalogue/82C0026

  19. [19] ka Mtuze, S., & Musoni, M. (2023). An overview of cybercrime law in South Africa. International cybersecurity law review, 4(3), 299–323. https://doi.org/10.1365/s43439-023-00089-8

  20. [20] Odumesi, J. O. (2014). Combating the menace of cybercrime. International journal of computer science and mobile computing, 3(6), 980–991. https://www.researchgate.net/profile/John-Odumesi/publication/263967391_Combating_the_Menace_of_Cybercrime/links/00b4953c7613e08fbd000000/Combating-the-Menace-of-Cybercrime.pdf

  21. [21] Khan, E. R. (1999). Developing the theoretical and conceptual framework. http:// journclasses.pbworks.com/f/theoretical+framewor.ppt

  22. [22] Merton, R. K. (1938). Social structure and anomie. American sociological review, 3(5), 672–682. https://doi.org/10.2307/2084686

  23. [23] Giddens, A. (2001). The scope of sociology. Politics & Social Sciences. https://www.amazon.com/Sociology-Anthony-Giddens/dp/0745623115

  24. [24] Bonger, W. A. (1916). Criminality and economic conditions. Boston: Little, Brown. https://books.google.com/books?hl=en&lr=lang_en&id=CMAtAAAAIAAJ&oi=fnd&pg=PR11&dq=Bonger,+W.+A.+(1916).+Criminality+and+economic+conditions&ots=ycwC3z1W-O&sig=iEbzGhhBX5gaqyLWzLDElqJPAR0

  25. [25] Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American sociological review, 44(4), 588–608. https://doi.org/10.2307/2094589

  26. [26] Miller, J. (2013). Individual offending, routine activities, and activity settings: Revisiting the routine activity theory of general deviance. Journal of research in crime and delinquency, 50(3), 390–416. https://doi.org/10.1177/0022427811432641

  27. [27] McQuade, S. (2001). Technology-enabled crime, policing and security. Abingdon: Routledge. https://doi.org/10.21061/jots.v32i1.a.5

  28. [28] McQuade, S. C., & Wellford, C. F. (2006). Understanding and managing cybercrime. Pearson/Allyn and Bacon Boston. https://www.ojp.gov/ncjrs/virtual-library/abstracts/understanding-and-managing-cybercrime

  29. [29] Creswell, J. W., & Creswell, J. D. (2017). Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. https://spada.uns.ac.id/pluginfile.php/510378/mod_resource/content/1/creswell.pdf

  30. [30] Adeniran, A. O., Muraina, J. M., Ilugbami, J. O., & Adeniran, A. A. (2023). Government policy: Meaning, types, manifestations, theories, and policy cycles. Insights into regional development, 5(2), 83–99. http://doi.org/10.9770/IRD.2023.5.2(6)

  31. [31] Ehimen, O. R., & Bola, A. (2010). Cybercrime in Nigeria. Business intelligence journal, 3(1), 93–98. https://www.academia.edu/download/31076494/BIJ-Vol3No1.pdf#page=95

  32. [32] Ayofe, A. N., & Oluwaseyifunmitan, O. (2009). Approach to solving cybercrime and cybersecurity. (IJCSIS) International journal of computer science and information security, 3(1), 1–11. https://doi.org/10.48550/arXiv.0908.0099

  33. [33] Adeniran, A. O., & Olorunfemi, S. O. (2020). The essence of knowledge management in the air transportation sector. International journal of human capital in urban management, 5(2), 176–186. https://doi.org/10.22034/IJHCUM.2020.02.08

  34. [34] United Nations. (2005). UN recommendations on fighting cybercrime. http://www.crime-research.org/news/13.05.2005/1225/ 25th

Published

2025-07-25

How to Cite

Ilugbami, O. J. ., Olanrewaju Tolu , O., Ayobami Abdulmateen, . G., & Odeyinka, Y. V. . (2025). Cybercrime and Cyber-Security in Nigeria. Management Analytics and Social Insights, 2(3), 230-244. https://doi.org/10.22105/masi.v2i3.77

Similar Articles

1-10 of 24

You may also start an advanced similarity search for this article.