Skip to main content
Erschienen in:
Buchtitelbild

2024 | OriginalPaper | Buchkapitel

1. Background and Introduction

verfasst von : Robinson Tombari Sibe, Christian Kaunert

Erschienen in: Cybercrime, Digital Forensic Readiness, and Financial Crime Investigation in Nigeria

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter presents the background, contexts, and overview of the cybercrime challenge in Nigeria. The chapter presents foundational information of the rising caseloads of cybercrime in Nigeria. Specific challenges as well as the various reforms by government to tackle this, are also presented in this chapter. This chapter also presented the various institutional reforms, including the Economic and Financial Crimes Commission (EFCC), the Independent Corrupt Practices Commission (ICPC), and others with the mandate to tackle cybercrime in Nigeria. This chapter presents the two theoretical framework that shapes this study—Cohen and Felson’s (Am Sociol Rev 588–608, 1979 [20]) Routine Activity Theory (RAT) and Technology Organisation and Environment framework developed by Tornatzky et al. (Processes of technological innovation. Lexington Books, 1990 [86]). This chapter also presented the conceptual framework for this study, the digital forensic readiness model, first introduced by Tan (Forensic readiness. @ Stake, Cambridge, MA, pp. 1–23, 2001 [84]). Using this conceptual model, the chapter presents a major challenge faced in the fight against cybercrime, which is the lack of forensic resources at the financial crimes agencies in Nigeria. The chapter ends by summarizing this challenge and the need to study the specifics of the lack of forensic readiness of the cybercrime agencies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abdul-Rasheed SL, Lateef I, Yinusa MA, Abdullateef R (2016) Cybercrime and Nigeria’s external image: a critical assessment. J Pan Afr Stud 9(6):119–133 Abdul-Rasheed SL, Lateef I, Yinusa MA, Abdullateef R (2016) Cybercrime and Nigeria’s external image: a critical assessment. J Pan Afr Stud 9(6):119–133
2.
Zurück zum Zitat Ahmed I (2020) Technology organization environment framework in cloud computing. TELKOMNIKA 18(2):716–725CrossRef Ahmed I (2020) Technology organization environment framework in cloud computing. TELKOMNIKA 18(2):716–725CrossRef
3.
Zurück zum Zitat Ajayi EFG (2016) Challenges to enforcement of cyber-crimes laws and policy. J Internet Inf Syst 6(1):1–12CrossRef Ajayi EFG (2016) Challenges to enforcement of cyber-crimes laws and policy. J Internet Inf Syst 6(1):1–12CrossRef
4.
Zurück zum Zitat Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50(2):179–211CrossRef Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50(2):179–211CrossRef
5.
Zurück zum Zitat Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice Hall, Englewood Cliffs, NJ Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice Hall, Englewood Cliffs, NJ
6.
Zurück zum Zitat Akanle O, Adesina JO, Akarah EP (2016) Towards human dignity and the Internet: the cybercrime (yahoo yahoo) phenomenon in Nigeria. Afr J Sci Technol Innov Dev 8(2):213–220CrossRef Akanle O, Adesina JO, Akarah EP (2016) Towards human dignity and the Internet: the cybercrime (yahoo yahoo) phenomenon in Nigeria. Afr J Sci Technol Innov Dev 8(2):213–220CrossRef
7.
Zurück zum Zitat Akanle O, Shadare BR (2019) Yahoo-plus in Ibadan: meaning, characterization and strategies. Int J Cyber Criminol 13(2) Akanle O, Shadare BR (2019) Yahoo-plus in Ibadan: meaning, characterization and strategies. Int J Cyber Criminol 13(2)
8.
Zurück zum Zitat Al-Hujran O, Al-Lozi EM, Al-Debei MM, Maqableh M (2018) Challenges of cloud computing adoption from the TOE framework perspective. Int J E-Bus Res (IJEBR) 14(3):77–94CrossRef Al-Hujran O, Al-Lozi EM, Al-Debei MM, Maqableh M (2018) Challenges of cloud computing adoption from the TOE framework perspective. Int J E-Bus Res (IJEBR) 14(3):77–94CrossRef
10.
Zurück zum Zitat Almarzooqi A, Jones A (2016) A framework for assessing the core capabilities of a digital forensic organization. In: IFIP international conference on digital forensics, Jan 2016. Springer, Cham, pp 47–65 Almarzooqi A, Jones A (2016) A framework for assessing the core capabilities of a digital forensic organization. In: IFIP international conference on digital forensics, Jan 2016. Springer, Cham, pp 47–65
11.
Zurück zum Zitat Arshad H, Jantan AB, Abiodun OI (2018) Digital forensics: review of issues in scientific validation of digital evidence. J Inf Process Syst 14(2) Arshad H, Jantan AB, Abiodun OI (2018) Digital forensics: review of issues in scientific validation of digital evidence. J Inf Process Syst 14(2)
14.
Zurück zum Zitat Baxter P, Jack S (2008) Qualitative case study methodology: study design and implementation for novice researchers. Qual Rep 13(4):544–559 Baxter P, Jack S (2008) Qualitative case study methodology: study design and implementation for novice researchers. Qual Rep 13(4):544–559
15.
Zurück zum Zitat Bello M, Griffiths M (2021) Routine activity theory and cybercrime investigation in Nigeria: how capable are law enforcement agencies? In: Rethinking cybercrime. Palgrave Macmillan, Cham, pp 213–235 Bello M, Griffiths M (2021) Routine activity theory and cybercrime investigation in Nigeria: how capable are law enforcement agencies? In: Rethinking cybercrime. Palgrave Macmillan, Cham, pp 213–235
17.
Zurück zum Zitat Carrier BD, Spafford EH (2005, August) Automated digital evidence target definition using outlier analysis and existing evidence. Digital Forensic Research Workshop, New Orleans, LA. Carrier BD, Spafford EH (2005, August) Automated digital evidence target definition using outlier analysis and existing evidence. Digital Forensic Research Workshop, New Orleans, LA.
18.
Zurück zum Zitat Chau PY, Tam KY (1997) Factors affecting the adoption of open systems: an exploratory study. MIS Q 21(1) Chau PY, Tam KY (1997) Factors affecting the adoption of open systems: an exploratory study. MIS Q 21(1)
19.
Zurück zum Zitat Choi KS, Lee CS, Louderback ER (2020) Historical evolutions of cybercrime: from computer crime to cybercrime. In: The Palgrave handbook of international cybercrime and cyberdeviance, pp 27–43 Choi KS, Lee CS, Louderback ER (2020) Historical evolutions of cybercrime: from computer crime to cybercrime. In: The Palgrave handbook of international cybercrime and cyberdeviance, pp 27–43
20.
Zurück zum Zitat Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 588–608 Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 588–608
21.
Zurück zum Zitat Cross C (2018) Victims’ motivations for reporting to the ‘fraud justice network.’ Police Pract Res 19(6):550–564CrossRef Cross C (2018) Victims’ motivations for reporting to the ‘fraud justice network.’ Police Pract Res 19(6):550–564CrossRef
22.
Zurück zum Zitat Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 319–340 Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 319–340
24.
Zurück zum Zitat Dortmans PJ, Thakur N, Ween A (2015) Conjectures for framing cyberwarfare. Def Secur Anal 31(3):172–184CrossRef Dortmans PJ, Thakur N, Ween A (2015) Conjectures for framing cyberwarfare. Def Secur Anal 31(3):172–184CrossRef
25.
Zurück zum Zitat Eboibi FE (2017) A review of the legal and regulatory frameworks of Nigerian Cybercrimes Act 2015. Comput Law Secur Rev 33(5):700–717CrossRef Eboibi FE (2017) A review of the legal and regulatory frameworks of Nigerian Cybercrimes Act 2015. Comput Law Secur Rev 33(5):700–717CrossRef
27.
Zurück zum Zitat Ehimen OR, Bola A (2010) Cybercrime in Nigeria. Bus Intell J 3(1):93–98 Ehimen OR, Bola A (2010) Cybercrime in Nigeria. Bus Intell J 3(1):93–98
28.
Zurück zum Zitat Elyas M, Maynard SB, Ahmad A, Lonie A (2014) Towards a systemic framework for digital forensic readiness. J Comput Inf Syst 54(3):97–105 Elyas M, Maynard SB, Ahmad A, Lonie A (2014) Towards a systemic framework for digital forensic readiness. J Comput Inf Syst 54(3):97–105
29.
Zurück zum Zitat Englbrecht L, Meier S, Pernul G (2019) Towards a capability maturity model for digital forensic readiness. Wireless Netw 1–13 Englbrecht L, Meier S, Pernul G (2019) Towards a capability maturity model for digital forensic readiness. Wireless Netw 1–13
30.
34.
Zurück zum Zitat Felson M (1998) Crime and everyday life. Thousand Oaks Felson M (1998) Crime and everyday life. Thousand Oaks
35.
Zurück zum Zitat Garba AA, Bade AM (2019) A recommended digital forensics readiness framework for Nigerian banks. Int J Dev Res 9(08) Garba AA, Bade AM (2019) A recommended digital forensics readiness framework for Nigerian banks. Int J Dev Res 9(08)
36.
Zurück zum Zitat Garba AA, Siraj MM (2015) A holistic-based digital forensic readiness framework for Zenith Bank, Nigeria. In: International conference on computational and social sciences, pp 551–560 Garba AA, Siraj MM (2015) A holistic-based digital forensic readiness framework for Zenith Bank, Nigeria. In: International conference on computational and social sciences, pp 551–560
37.
Zurück zum Zitat Grabosky PN (2001) Virtual criminality: old wine in new bottles? Soc Leg Stud 10(2):243–249CrossRef Grabosky PN (2001) Virtual criminality: old wine in new bottles? Soc Leg Stud 10(2):243–249CrossRef
38.
Zurück zum Zitat Grabosky P, Smith R (2001) Telecommunication fraud in the digital age: the convergence of technologies. In: Wall D (ed) Crime and the Internet. Routledge Grabosky P, Smith R (2001) Telecommunication fraud in the digital age: the convergence of technologies. In: Wall D (ed) Crime and the Internet. Routledge
41.
Zurück zum Zitat Hinchliffe A (2017) Nigerian princes to kings of malware: the next evolution in Nigerian cybercrime. Comput Fraud Secur 2017(5):5–9CrossRef Hinchliffe A (2017) Nigerian princes to kings of malware: the next evolution in Nigerian cybercrime. Comput Fraud Secur 2017(5):5–9CrossRef
42.
Zurück zum Zitat Hutchings A, Hayes H (2009) Routine activity theory and phishing victimisation: who gets caught in the ‘net’? Curr Issues Crim Just 20(3):433–452CrossRef Hutchings A, Hayes H (2009) Routine activity theory and phishing victimisation: who gets caught in the ‘net’? Curr Issues Crim Just 20(3):433–452CrossRef
45.
Zurück zum Zitat Iacovou CL, Benbasat I, Dexter AS (1995) Electronic data interchange and small organizations: adoption and impact of technology. MIS Q 465–485 Iacovou CL, Benbasat I, Dexter AS (1995) Electronic data interchange and small organizations: adoption and impact of technology. MIS Q 465–485
50.
Zurück zum Zitat Joffee R (2010) Cybercrime: the global epidemic at your network door. Netw Secur 2010(7):4–7CrossRef Joffee R (2010) Cybercrime: the global epidemic at your network door. Netw Secur 2010(7):4–7CrossRef
52.
Zurück zum Zitat Kigerl A (2012) Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30(4):470–486 Kigerl A (2012) Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30(4):470–486
53.
Zurück zum Zitat Leukfeldt ER, Yar M (2016) Applying routine activity theory to cybercrime: a theoretical and empirical analysis. Deviant Behav 37(3):263–280CrossRef Leukfeldt ER, Yar M (2016) Applying routine activity theory to cybercrime: a theoretical and empirical analysis. Deviant Behav 37(3):263–280CrossRef
54.
Zurück zum Zitat Leung D, Lo A, Fong LHN, Law R (2015) Applying the technology-organization-environment framework to explore ICT initial and continued adoption: an exploratory study of an independent hotel in Hong Kong. Tour Recreat Res 40(3):391–406 Leung D, Lo A, Fong LHN, Law R (2015) Applying the technology-organization-environment framework to explore ICT initial and continued adoption: an exploratory study of an independent hotel in Hong Kong. Tour Recreat Res 40(3):391–406
55.
Zurück zum Zitat Makutsoane MP, Leonard A (2014) A conceptual framework to determine the digital forensic readiness of a cloud service provider. In: Proceedings of PICMET’14 conference: Portland international center for management of engineering and technology; infrastructure and service integration, July 2014, pp 3313–3321 Makutsoane MP, Leonard A (2014) A conceptual framework to determine the digital forensic readiness of a cloud service provider. In: Proceedings of PICMET’14 conference: Portland international center for management of engineering and technology; infrastructure and service integration, July 2014, pp 3313–3321
56.
Zurück zum Zitat Manky D (2013) Cybercrime as a service very modern business. Comput Fraud Secur 2013(6):9–13CrossRef Manky D (2013) Cybercrime as a service very modern business. Comput Fraud Secur 2013(6):9–13CrossRef
57.
Zurück zum Zitat Meyers A (2018) Not your fairy-tale prince: the nigerian business email compromise threat. Computer Fraud & Security, 2018(8):14–16 Meyers A (2018) Not your fairy-tale prince: the nigerian business email compromise threat. Computer Fraud & Security, 2018(8):14–16
59.
Zurück zum Zitat Mohammed KH, Mohammed YD, Solanke AA (2019) Cybercrime and digital forensics: bridging the gap in legislation, investigation, and prosecution of cybercrime in Nigeria. Int J Cybersecur Intell Cybercrime 2(1):56–63CrossRef Mohammed KH, Mohammed YD, Solanke AA (2019) Cybercrime and digital forensics: bridging the gap in legislation, investigation, and prosecution of cybercrime in Nigeria. Int J Cybersecur Intell Cybercrime 2(1):56–63CrossRef
66.
Zurück zum Zitat Obuah E (2010) Combatting corruption in Nigeria: the Nigerian economic and financial crimes (EFCC). Afr Stud Q 12(1) Obuah E (2010) Combatting corruption in Nigeria: the Nigerian economic and financial crimes (EFCC). Afr Stud Q 12(1)
69.
Zurück zum Zitat Olayemi OJ (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria. Int J Sociol Anthropol 6(3):116–125CrossRef Olayemi OJ (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria. Int J Sociol Anthropol 6(3):116–125CrossRef
70.
Zurück zum Zitat Oliveira T, Martins MF (2011) Literature review of information technology adoption models at firm level. Electron J Inf Syst Eval 14(1):110–121 Oliveira T, Martins MF (2011) Literature review of information technology adoption models at firm level. Electron J Inf Syst Eval 14(1):110–121
71.
Zurück zum Zitat Omodunbi BA, Odiase PO, Olaniyan OM, Esan AO (2016) Cybercrimes in Nigeria: analysis, detection, and prevention. J Eng Technol 1(1):37–42 Omodunbi BA, Odiase PO, Olaniyan OM, Esan AO (2016) Cybercrimes in Nigeria: analysis, detection, and prevention. J Eng Technol 1(1):37–42
72.
Zurück zum Zitat Omotubora AO (2016) Comparative perspectives on cybercrime legislation in Nigeria and the UK—a case for revisiting the “hacking” offences under the Nigerian Cybercrime Act 2015. Eur J Law Technol 7(3) Omotubora AO (2016) Comparative perspectives on cybercrime legislation in Nigeria and the UK—a case for revisiting the “hacking” offences under the Nigerian Cybercrime Act 2015. Eur J Law Technol 7(3)
73.
Zurück zum Zitat Oraegbunam IK (2015) The Nigerian police and problems of cybercrime investigation: need for adequate training. Niger Law J 18(1):1–28 Oraegbunam IK (2015) The Nigerian police and problems of cybercrime investigation: need for adequate training. Niger Law J 18(1):1–28
74.
Zurück zum Zitat Pooe A, Labuschagne L (2012) A conceptual model for digital forensic readiness. In: 2012 information security for South Africa, Aug 2012. IEEE, pp 1–8 Pooe A, Labuschagne L (2012) A conceptual model for digital forensic readiness. In: 2012 information security for South Africa, Aug 2012. IEEE, pp 1–8
75.
Zurück zum Zitat Pratt TC, Holtfreter K, Reisig MD (2010) Routine online activity and Internet fraud targeting: extending the generality of routine activity theory. J Res Crime Delinq 47(3):267–296CrossRef Pratt TC, Holtfreter K, Reisig MD (2010) Routine online activity and Internet fraud targeting: extending the generality of routine activity theory. J Res Crime Delinq 47(3):267–296CrossRef
77.
Zurück zum Zitat Ramdani B, Chevers D, Williams DA (2013) SMEs’ adoption of enterprise applications: a technology-organisation-environment model. J Small Bus Enterpr Dev Ramdani B, Chevers D, Williams DA (2013) SMEs’ adoption of enterprise applications: a technology-organisation-environment model. J Small Bus Enterpr Dev
78.
Zurück zum Zitat Reed TS (2019) Cybercrime and technology losses: claims and potential insurance coverage for modern cyber risks. Tort Trial Insur Pract Law J 54(1):153–209 Reed TS (2019) Cybercrime and technology losses: claims and potential insurance coverage for modern cyber risks. Tort Trial Insur Pract Law J 54(1):153–209
79.
Zurück zum Zitat Reyns BW (2015) A routine activity perspective on online victimisation. J Financ Crime Reyns BW (2015) A routine activity perspective on online victimisation. J Financ Crime
80.
Zurück zum Zitat Sabillon R, Cano J, Cavaller V, Serra J (2016) Cybercrime and cybercriminals: a comprehensive study. Int J Comput Netw Commun Secur 4(6) Sabillon R, Cano J, Cavaller V, Serra J (2016) Cybercrime and cybercriminals: a comprehensive study. Int J Comput Netw Commun Secur 4(6)
82.
Zurück zum Zitat Straub ET (2009) Understanding technology adoption: theory and future directions for informal learning. Rev Educ Res 79(2):625–649CrossRef Straub ET (2009) Understanding technology adoption: theory and future directions for informal learning. Rev Educ Res 79(2):625–649CrossRef
84.
Zurück zum Zitat Tan J (2001) Forensic readiness. @ Stake, Cambridge, MA, pp 1–23 Tan J (2001) Forensic readiness. @ Stake, Cambridge, MA, pp 1–23
85.
Zurück zum Zitat Tellis W (1997) Application of a case study methodology. Qual Rep 3(3):1–19 Tellis W (1997) Application of a case study methodology. Qual Rep 3(3):1–19
86.
Zurück zum Zitat Tornatzky LG, Fleischer M, Chakrabarti AK (1990) Processes of technological innovation. Lexington Books Tornatzky LG, Fleischer M, Chakrabarti AK (1990) Processes of technological innovation. Lexington Books
87.
Zurück zum Zitat Tseloni A, Wittebrood K, Farrell G, Pease K (2004) Burglary victimization in England and Wales, the United States and the Netherlands: a cross-national comparative test of routine activities and lifestyle theories. Br J Criminol 44(1):66–91CrossRef Tseloni A, Wittebrood K, Farrell G, Pease K (2004) Burglary victimization in England and Wales, the United States and the Netherlands: a cross-national comparative test of routine activities and lifestyle theories. Br J Criminol 44(1):66–91CrossRef
88.
Zurück zum Zitat Umar I, Samsudin RS, Mohamed M (2016) Understanding the successes and challenges of Anti-Corruption Agency (ACA) in Nigeria: a case of Economic and Financial Crimes Commission (EFCC). Asian J Multidiscip Stud 4(5):27–33 Umar I, Samsudin RS, Mohamed M (2016) Understanding the successes and challenges of Anti-Corruption Agency (ACA) in Nigeria: a case of Economic and Financial Crimes Commission (EFCC). Asian J Multidiscip Stud 4(5):27–33
91.
Zurück zum Zitat Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 425–478 Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 425–478
92.
Zurück zum Zitat Von Solms R, Van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97–102CrossRef Von Solms R, Van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97–102CrossRef
93.
Zurück zum Zitat Yar M (2005) The novelty of ‘cybercrime’: an assessment in light of routine activity theory. Eur J Criminol 2(4):407–427CrossRef Yar M (2005) The novelty of ‘cybercrime’: an assessment in light of routine activity theory. Eur J Criminol 2(4):407–427CrossRef
94.
Zurück zum Zitat Yin RK (2003) Case study research: design and methods, 3rd edn. Sage, Thousand Oaks, CA Yin RK (2003) Case study research: design and methods, 3rd edn. Sage, Thousand Oaks, CA
95.
Zurück zum Zitat Yin RK (2009) Case study research: design and methods, 4th edn. Sage, Thousand Oaks, CA Yin RK (2009) Case study research: design and methods, 4th edn. Sage, Thousand Oaks, CA
96.
Zurück zum Zitat Zainal Z (2007) Case study as a research method. J Kemanusiaan 5(1) Zainal Z (2007) Case study as a research method. J Kemanusiaan 5(1)
Metadaten
Titel
Background and Introduction
verfasst von
Robinson Tombari Sibe
Christian Kaunert
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-54089-9_1

Premium Partner