A socio-technological analysis of cybercrime and cyber security in Nigeria

John Olayemi Odumesi
<span title="2014-03-31">2014</span> <i title="Academic Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nsjxwc3ngbbfvljddawomacibq" style="color: black;">International Journal of Sociology and Anthropology</a> </i> &nbsp;
The Global Information Infrastructure creates unlimited opportunities for commercial, social and other human activities. However, it is increasingly under attack by cybercriminals; as the number, cost, and sophistication of attacks are increasing at an alarming rate. This study sets out to examine the sociological and technological factors that impact cybercrime and cybersecurity and thereby articulates the relevant circumstances and threats of cybercrime in Nigeria. The study approached the
more &raquo; ... ue of cybercrime from theoretical and investigative points of views. Structured interviews with law enforcement agencies and governmental institution for cyber security were also conducted. Data obtained through these research instruments were subjected to descriptive analysis and frequency counts in order to explain the activities of Nigerian cybercriminals based on existing theories of crime, and to understand their intents, purposes and methods. Four theories of crime, namely, Structural Functionalism Theory, Marxian Theory, Routine Activity Theory and Technology Enabled Crime Theory were all found to be relevant to Nigerian cybercrime. At the level of existing laws, the study established that there are no existing laws in the Nigerian statues that directly address cybercrime.
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5897/ijsa2013.0510">doi:10.5897/ijsa2013.0510</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/casxu3n2mffzda63qhv6j7xmeu">fatcat:casxu3n2mffzda63qhv6j7xmeu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427143905/https://academicjournals.org/journal/IJSA/article-full-text-pdf/A79763043710" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/97/3d/973d76dcc41cfd4060fc20f7cee0bfc0f21e87b4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5897/ijsa2013.0510"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>