Skip to main content

2024 | OriginalPaper | Buchkapitel

2. Cyber Crime in Nigeria—Reviewing the Problems

verfasst von : Robinson Tombari Sibe, Christian Kaunert

Erschienen in: Cybercrime, Digital Forensic Readiness, and Financial Crime Investigation in Nigeria

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter presents a scholarly review of the cybercrime challenge in Nigeria. The chapter starts with a historical background of cybercrime and progresses to the foundational concepts and definitions. This is followed by a review of the growing threat of cybercrime and the factors driving the surge in cybercrime statistics. This chapter also drills into the internet fraud challenge in Nigeria, and the various reforms made to effectively tackle the challenge. The reforms made cover institutional, structural, and legal dimensions. Specifically, the chapter presents various reforms such as the Economic and Financial Crimes Commission (EFCC), the Independent Corrupt Practices Commission (ICPC), the Advanced Fee Fraud and Other Fraud Related Offences Act, the Cybercrime (Prevention, Prohibition, etc.) Act 2015, the Evidence (Amendment) Act 2023, and others. The chapter also presented a review of available literature on technology and cybercrime investigation. The chapter ended by identifying and presenting the gaps in the literature reviewed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abdul-Rasheed SL, Lateef I, Yinusa MA, Abdullateef R (2016) Cybercrime and Nigeria’s external image: a critical assessment. J Pan Afr Stud 9(6):119–133 Abdul-Rasheed SL, Lateef I, Yinusa MA, Abdullateef R (2016) Cybercrime and Nigeria’s external image: a critical assessment. J Pan Afr Stud 9(6):119–133
2.
Zurück zum Zitat Abdulkadir AB, Abdulkadir AO (2019) Cybercrimes act in Nigeria: experimenting compliance with internationally recognized human rights provisions. J Int Stud 15:117–132CrossRef Abdulkadir AB, Abdulkadir AO (2019) Cybercrimes act in Nigeria: experimenting compliance with internationally recognized human rights provisions. J Int Stud 15:117–132CrossRef
4.
Zurück zum Zitat Achimugu H, Muhammed U, Ogirima II (2020) Economic and financial crimes commission (EFCC) and the challenge of public service corruption in nigeria [Conference session]. The International Seminar on Regional Politics, Administration and Development 2020, STISIPOL Raja Haji, Riau, Indonesia Achimugu H, Muhammed U, Ogirima II (2020) Economic and financial crimes commission (EFCC) and the challenge of public service corruption in nigeria [Conference session]. The International Seminar on Regional Politics, Administration and Development 2020, STISIPOL Raja Haji, Riau, Indonesia
8.
Zurück zum Zitat Adesina OS (2017) Cybercrime and poverty in Nigeria. Canadian social science, 13(4):19–29 Adesina OS (2017) Cybercrime and poverty in Nigeria. Canadian social science, 13(4):19–29
9.
Zurück zum Zitat Adeyoju A (2019) Cybercrime and cybersecurity: finTech’s greatest challenges. Available at SSRN 3486277 Adeyoju A (2019) Cybercrime and cybersecurity: finTech’s greatest challenges. Available at SSRN 3486277
11.
Zurück zum Zitat Ajayi EFG (2016) Challenges to enforcement of cyber-crimes laws and policy. J Internet Inf Syst 6(1):1–12CrossRef Ajayi EFG (2016) Challenges to enforcement of cyber-crimes laws and policy. J Internet Inf Syst 6(1):1–12CrossRef
13.
Zurück zum Zitat Akanle O, Adesina JO, Akarah EP (2016) Towards human dignity and the internet: the cybercrime (yahoo yahoo) phenomenon in Nigeria. Afr J Sci Technol Innov Dev 8(2):213–220CrossRef Akanle O, Adesina JO, Akarah EP (2016) Towards human dignity and the internet: the cybercrime (yahoo yahoo) phenomenon in Nigeria. Afr J Sci Technol Innov Dev 8(2):213–220CrossRef
14.
Zurück zum Zitat Akanle O, Shadare BR (2019) Yahoo-plus in Ibadan: meaning, characterization and strategies. Int J Cyber Criminol 13(2) Akanle O, Shadare BR (2019) Yahoo-plus in Ibadan: meaning, characterization and strategies. Int J Cyber Criminol 13(2)
15.
Zurück zum Zitat Al-Khateeb H, Epiphaniou G, Daly H (2019) Blockchain for modern digital forensics: the chain-of-custody as a distributed ledger. In: Jahankhani H, Kendzierskyj S, Jamal A, Epiphaniou G, Al-Khateeb H (eds) Blockchain and clinical trial. Springer International Publishing, pp 149–168. https://doi.org/10.1007/978-3-030-11289-9_7 Al-Khateeb H, Epiphaniou G, Daly H (2019) Blockchain for modern digital forensics: the chain-of-custody as a distributed ledger. In: Jahankhani H, Kendzierskyj S, Jamal A, Epiphaniou G, Al-Khateeb H (eds) Blockchain and clinical trial. Springer International Publishing, pp 149–168. https://​doi.​org/​10.​1007/​978-3-030-11289-9_​7
17.
Zurück zum Zitat Arshad H, Jantan AB, Abiodun OI (2018) Digital forensics: review of issues in scientific validation of digital evidence. J Inf Process Syst 14(2) Arshad H, Jantan AB, Abiodun OI (2018) Digital forensics: review of issues in scientific validation of digital evidence. J Inf Process Syst 14(2)
19.
Zurück zum Zitat Awhefeada UV, Bernice OO (2020) Appraising the laws governing the control of cybercrime in Nigeria. J Law Crim Justice 8(1):30–49 Awhefeada UV, Bernice OO (2020) Appraising the laws governing the control of cybercrime in Nigeria. J Law Crim Justice 8(1):30–49
22.
Zurück zum Zitat Bello M, Griffiths M (2021) Routine activity theory and cybercrime investigation in Nigeria: how capable are law enforcement agencies? In: Rethinking cybercrime. Palgrave Macmillan, Cham, pp 213–235 Bello M, Griffiths M (2021) Routine activity theory and cybercrime investigation in Nigeria: how capable are law enforcement agencies? In: Rethinking cybercrime. Palgrave Macmillan, Cham, pp 213–235
23.
Zurück zum Zitat Brenner SW (2010) Cybercrime: criminal threats from cyberspace. Bloomsbury Publishing USA Brenner SW (2010) Cybercrime: criminal threats from cyberspace. Bloomsbury Publishing USA
24.
Zurück zum Zitat Broadhead S (2018) The contemporary cybercrime ecosystem: a multi-disciplinary overview of the state of affairs and developments. Comput Law Secur Rev 34(6):1180–1196CrossRef Broadhead S (2018) The contemporary cybercrime ecosystem: a multi-disciplinary overview of the state of affairs and developments. Comput Law Secur Rev 34(6):1180–1196CrossRef
25.
Zurück zum Zitat Brown CS (2015) Investigating and prosecuting cyber crime: forensic dependencies and barriers to justice. Int J Cyber Criminol 9(1):55 Brown CS (2015) Investigating and prosecuting cyber crime: forensic dependencies and barriers to justice. Int J Cyber Criminol 9(1):55
26.
Zurück zum Zitat Button M, Nicholls CM, Kerr J, Owen R (2014) Online frauds: learning from victims why they fall for these scams. Aust N Z J Criminol 47(3):391–408CrossRef Button M, Nicholls CM, Kerr J, Owen R (2014) Online frauds: learning from victims why they fall for these scams. Aust N Z J Criminol 47(3):391–408CrossRef
27.
Zurück zum Zitat Casey E (2019) The chequered past and risky future of digital forensics. Aust J Forensic Sci 51(6):649–664CrossRef Casey E (2019) The chequered past and risky future of digital forensics. Aust J Forensic Sci 51(6):649–664CrossRef
28.
Zurück zum Zitat Caviglione L, Wendzel S, Mazurczyk W (2017) The future of digital forensics: challenges and the road ahead. IEEE Secur Priv 15(6):12–17CrossRef Caviglione L, Wendzel S, Mazurczyk W (2017) The future of digital forensics: challenges and the road ahead. IEEE Secur Priv 15(6):12–17CrossRef
31.
Zurück zum Zitat Chandra A, Snowe MJ (2020) A taxonomy of cybercrime: theory and design. Int J Account Inf Syst 38:100467CrossRef Chandra A, Snowe MJ (2020) A taxonomy of cybercrime: theory and design. Int J Account Inf Syst 38:100467CrossRef
32.
Zurück zum Zitat Chigozie-Okwum C, Ugboaja S, Micheal D, Osuo-Genseleke M (2017) Proliferation of cyber insecurity in Nigeria: a root cause analysis. AFRREV STECH Int J Sci Technol 6(2):53–60CrossRef Chigozie-Okwum C, Ugboaja S, Micheal D, Osuo-Genseleke M (2017) Proliferation of cyber insecurity in Nigeria: a root cause analysis. AFRREV STECH Int J Sci Technol 6(2):53–60CrossRef
33.
Zurück zum Zitat Choi KS, Lee CS, Louderback ER (2020) Historical evolutions of cybercrime: from computer crime to cybercrime. In: The Palgrave handbook of international cybercrime and cyberdeviance, pp 27–43 Choi KS, Lee CS, Louderback ER (2020) Historical evolutions of cybercrime: from computer crime to cybercrime. In: The Palgrave handbook of international cybercrime and cyberdeviance, pp 27–43
35.
Zurück zum Zitat Cross C (2018) Victims’ motivations for reporting to the ‘fraud justice network.’ Police Pract Res 19(6):550–564CrossRef Cross C (2018) Victims’ motivations for reporting to the ‘fraud justice network.’ Police Pract Res 19(6):550–564CrossRef
36.
Zurück zum Zitat Danjuma MH, Sarki ZM, Lalu AU (2018) Forensic science, electronic evidence and cybercrime prosecution in Nigeria. In: Ndubueze PN (ed) Cyber criminology and technology-assisted crime control: a reader. Ahmadu Bello University Press, pp 367–382 Danjuma MH, Sarki ZM, Lalu AU (2018) Forensic science, electronic evidence and cybercrime prosecution in Nigeria. In: Ndubueze PN (ed) Cyber criminology and technology-assisted crime control: a reader. Ahmadu Bello University Press, pp 367–382
37.
Zurück zum Zitat Dortmans PJ, Thakur N, Ween A (2015) Conjectures for framing cyberwarfare. Def Secur Anal 31(3):172–184CrossRef Dortmans PJ, Thakur N, Ween A (2015) Conjectures for framing cyberwarfare. Def Secur Anal 31(3):172–184CrossRef
38.
Zurück zum Zitat Ebegbulem JC (2012) Corruption and leadership crisis in Africa: Nigeria in focus. Int J Bus Soc Sci 3(11) Ebegbulem JC (2012) Corruption and leadership crisis in Africa: Nigeria in focus. Int J Bus Soc Sci 3(11)
39.
Zurück zum Zitat Eboibi FE (2017) A review of the legal and regulatory frameworks of Nigerian Cybercrimes Act 2015. Comput Law Secur Rev 33(5):700–717CrossRef Eboibi FE (2017) A review of the legal and regulatory frameworks of Nigerian Cybercrimes Act 2015. Comput Law Secur Rev 33(5):700–717CrossRef
40.
Zurück zum Zitat Eboibi FE (2021) Cybercriminals and coronavirus cybercrimes in Nigeria, the United States of America and the United Kingdom: cyber hygiene and preventive enforcement measures. Commonw Law Bull 47(1):113–142CrossRef Eboibi FE (2021) Cybercriminals and coronavirus cybercrimes in Nigeria, the United States of America and the United Kingdom: cyber hygiene and preventive enforcement measures. Commonw Law Bull 47(1):113–142CrossRef
44.
Zurück zum Zitat Eriksen-Jensen M (2013) Holding back the tidal wave of cybercrime. Comput Fraud Secur 2013(3):10–16CrossRef Eriksen-Jensen M (2013) Holding back the tidal wave of cybercrime. Comput Fraud Secur 2013(3):10–16CrossRef
45.
Zurück zum Zitat Farquhar JD (2012) Case study research for business. Sage Farquhar JD (2012) Case study research for business. Sage
49.
Zurück zum Zitat Fell J (2017) Cyber crime-history: hacking through history. Eng Technol 12(3):30–31CrossRef Fell J (2017) Cyber crime-history: hacking through history. Eng Technol 12(3):30–31CrossRef
51.
Zurück zum Zitat Hadlington L, Lumsden K, Black A, Ferra F (2021) A qualitative exploration of police officers’ experiences, challenges, and perceptions of cybercrime. Policing J Policy Pract 15(1):34–43 Hadlington L, Lumsden K, Black A, Ferra F (2021) A qualitative exploration of police officers’ experiences, challenges, and perceptions of cybercrime. Policing J Policy Pract 15(1):34–43
52.
Zurück zum Zitat Hawdon J, Parti K, Dearden TE (2020) Cybercrime in america amid COVID-19: the initial results from a natural experiment. Am J Crim Justice 1–17 Hawdon J, Parti K, Dearden TE (2020) Cybercrime in america amid COVID-19: the initial results from a natural experiment. Am J Crim Justice 1–17
53.
Zurück zum Zitat Hinchliffe A (2017) Nigerian princes to kings of malware: the next evolution in Nigerian cybercrime. Comput Fraud Secur 2017(5):5–9CrossRef Hinchliffe A (2017) Nigerian princes to kings of malware: the next evolution in Nigerian cybercrime. Comput Fraud Secur 2017(5):5–9CrossRef
54.
Zurück zum Zitat Holt TJ, Bossler AM, Seigfried-Spellar KC (2022) Cybercrime and digital forensics: an introduction. Routledge Holt TJ, Bossler AM, Seigfried-Spellar KC (2022) Cybercrime and digital forensics: an introduction. Routledge
62.
Zurück zum Zitat Irons A, Lallie HS (2014) Digital forensics to intelligent forensics. Future Internet 6(3):584–596CrossRef Irons A, Lallie HS (2014) Digital forensics to intelligent forensics. Future Internet 6(3):584–596CrossRef
63.
Zurück zum Zitat Jamo IA (2021) Economic and financial crimes commission (EFCC) and anti-corruption crusade in Nigeria: success and challenges. Gusau international J Manag and Soc Sci 4(2):13–13. Jamo IA (2021) Economic and financial crimes commission (EFCC) and anti-corruption crusade in Nigeria: success and challenges. Gusau international J Manag and Soc Sci 4(2):13–13.
64.
Zurück zum Zitat Joffee R (2010) Cybercrime: the global epidemic at your network door. Netw Secur 2010(7):4–7CrossRef Joffee R (2010) Cybercrime: the global epidemic at your network door. Netw Secur 2010(7):4–7CrossRef
65.
Zurück zum Zitat Kademi AMA (2018) Strengthening strategic approach to counter cyberspace threats in Nigeria. In: Proceedings of the international conference on cyber warfare & security, Mar 2018, pp 328–337 Kademi AMA (2018) Strengthening strategic approach to counter cyberspace threats in Nigeria. In: Proceedings of the international conference on cyber warfare & security, Mar 2018, pp 328–337
66.
Zurück zum Zitat Karie NM, Venter HS (2015) Taxonomy of challenges for digital forensics. J Forensic Sci 60(4):885–893 Karie NM, Venter HS (2015) Taxonomy of challenges for digital forensics. J Forensic Sci 60(4):885–893
67.
Zurück zum Zitat Karyda M, Mitrou L (2007) Internet forensics: legal and technical issues. In: Second international workshop on digital forensics and incident analysis (WDFIA 2007), Aug 2007. IEEE, pp 3–12 Karyda M, Mitrou L (2007) Internet forensics: legal and technical issues. In: Second international workshop on digital forensics and incident analysis (WDFIA 2007), Aug 2007. IEEE, pp 3–12
69.
Zurück zum Zitat Kshetri N (2019) Cybercrime and cybersecurity in africa. J glob inf technol manage 22(2):71–81 Kshetri N (2019) Cybercrime and cybersecurity in africa. J glob inf technol manage 22(2):71–81
70.
Zurück zum Zitat Lazarus S, Okolorie GU (2019) The bifurcation of the Nigerian cybercriminals: narratives of the Economic and Financial Crimes Commission (EFCC) agents. Telematics Inform 40:14–26CrossRef Lazarus S, Okolorie GU (2019) The bifurcation of the Nigerian cybercriminals: narratives of the Economic and Financial Crimes Commission (EFCC) agents. Telematics Inform 40:14–26CrossRef
71.
Zurück zum Zitat Li JX (2017) Cybercrime and legal countermeasures: a historical analysis. Int J Crim Justice Sci 12(2):196–207 Li JX (2017) Cybercrime and legal countermeasures: a historical analysis. Int J Crim Justice Sci 12(2):196–207
72.
Zurück zum Zitat Manky D (2013) Cybercrime as a service very modern business. Comput Fraud Secur 2013(6):9–13CrossRef Manky D (2013) Cybercrime as a service very modern business. Comput Fraud Secur 2013(6):9–13CrossRef
75.
Zurück zum Zitat Meyers A (2018) Not your fairy-tale prince: the Nigerian business email compromise threat. Comput Fraud Secur 2018(8):14–16CrossRef Meyers A (2018) Not your fairy-tale prince: the Nigerian business email compromise threat. Comput Fraud Secur 2018(8):14–16CrossRef
78.
Zurück zum Zitat Mohammed KH, Mohammed YD, Solanke AA (2019) Cybercrime and digital forensics: bridging the gap in legislation, investigation, and prosecution of cybercrime in Nigeria. Int J Cybersecur Intell Cybercrime 2(1):56–63CrossRef Mohammed KH, Mohammed YD, Solanke AA (2019) Cybercrime and digital forensics: bridging the gap in legislation, investigation, and prosecution of cybercrime in Nigeria. Int J Cybersecur Intell Cybercrime 2(1):56–63CrossRef
79.
Zurück zum Zitat Montasari R, Hill R (2019) Next-generation digital forensics: challenges and future paradigms. In: 2019 IEEE 12th international conference on global security, safety and sustainability (ICGS3), Jan 2019. IEEE, pp 205–212 Montasari R, Hill R (2019) Next-generation digital forensics: challenges and future paradigms. In: 2019 IEEE 12th international conference on global security, safety and sustainability (ICGS3), Jan 2019. IEEE, pp 205–212
80.
Zurück zum Zitat Mu’azu-Abdullahi S (2016) An overview of the legal framework of advanced fee fraud and cybercrime in Nigeria. Hasanuddin Law Rev 2(2):195–212 Mu’azu-Abdullahi S (2016) An overview of the legal framework of advanced fee fraud and cybercrime in Nigeria. Hasanuddin Law Rev 2(2):195–212
81.
Zurück zum Zitat Naidoo R (2020) A multi-level influence model of COVID-19 themed cybercrime. Eur J Inf Syst 1–16 Naidoo R (2020) A multi-level influence model of COVID-19 themed cybercrime. Eur J Inf Syst 1–16
91.
Zurück zum Zitat Obuah E (2010) Combatting corruption in Nigeria: the Nigerian economic and financial crimes (EFCC). Afr Stud Q 12(1) Obuah E (2010) Combatting corruption in Nigeria: the Nigerian economic and financial crimes (EFCC). Afr Stud Q 12(1)
93.
Zurück zum Zitat Ojukwu SD, Agu OC (2020) Legality of the cybercrimes (Prrohinition, Prevention, etc) act as an instrument for internet crimes control in Nigeria. J Commercial and Property Law 7(2) Ojukwu SD, Agu OC (2020) Legality of the cybercrimes (Prrohinition, Prevention, etc) act as an instrument for internet crimes control in Nigeria. J Commercial and Property Law 7(2)
95.
Zurück zum Zitat Olayemi OJ (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria. Int J Sociol Anthropol 6(3):116–125CrossRef Olayemi OJ (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria. Int J Sociol Anthropol 6(3):116–125CrossRef
96.
Zurück zum Zitat Omodunbi BA, Odiase PO, Olaniyan OM, Esan AO (2016) Cybercrimes in Nigeria: analysis, detection, and prevention. J Eng Technol 1(1):37–42 Omodunbi BA, Odiase PO, Olaniyan OM, Esan AO (2016) Cybercrimes in Nigeria: analysis, detection, and prevention. J Eng Technol 1(1):37–42
97.
Zurück zum Zitat Omotubora AO (2016) Comparative perspectives on cybercrime legislation in Nigeria and the UK—a case for revisiting the “hacking” offences under the Nigerian Cybercrime Act 2015. Eur J Law Technol 7(3) Omotubora AO (2016) Comparative perspectives on cybercrime legislation in Nigeria and the UK—a case for revisiting the “hacking” offences under the Nigerian Cybercrime Act 2015. Eur J Law Technol 7(3)
98.
Zurück zum Zitat Oni S, Berepubo KA, Oni AA, Joshua S (2019) E-government and the challenge of cybercrime in Nigeria. In: 2019 sixth international conference on eDemocracy & eGovernment (ICEDEG), Apr 2019. IEEE, pp 137–142 Oni S, Berepubo KA, Oni AA, Joshua S (2019) E-government and the challenge of cybercrime in Nigeria. In: 2019 sixth international conference on eDemocracy & eGovernment (ICEDEG), Apr 2019. IEEE, pp 137–142
99.
Zurück zum Zitat Onoja EO (2018) Issues on exclusionary rules of evidence under the evidence act 2011. Afr J Law Hum Rights 2 Onoja EO (2018) Issues on exclusionary rules of evidence under the evidence act 2011. Afr J Law Hum Rights 2
101.
Zurück zum Zitat Oraegbunam IK (2015) The Nigerian police and problems of cybercrime investigation: need for adequate training. Niger Law J 18(1):1–28 Oraegbunam IK (2015) The Nigerian police and problems of cybercrime investigation: need for adequate training. Niger Law J 18(1):1–28
102.
Zurück zum Zitat Parker D (1976) Crime by computer. Scribner, New York Parker D (1976) Crime by computer. Scribner, New York
103.
Zurück zum Zitat Pichan A, Lazarescu M, Soh ST (2018) Towards a practical cloud forensics logging framework. J Inf Secur Appl 42:18–28 Pichan A, Lazarescu M, Soh ST (2018) Towards a practical cloud forensics logging framework. J Inf Secur Appl 42:18–28
106.
Zurück zum Zitat Reed TS (2019) Cybercrime and technology losses: claims and potential insurance coverage for modern cyber risks. Tort Trial Insur Pract Law J 54(1):153–209 Reed TS (2019) Cybercrime and technology losses: claims and potential insurance coverage for modern cyber risks. Tort Trial Insur Pract Law J 54(1):153–209
108.
Zurück zum Zitat Ricci J, Baggili I, Breitinger F (2019) Blockchain-based distributed cloud storage digital forensics: where’s the beef? IEEE Secur Priv 17(1):34–42CrossRef Ricci J, Baggili I, Breitinger F (2019) Blockchain-based distributed cloud storage digital forensics: where’s the beef? IEEE Secur Priv 17(1):34–42CrossRef
109.
Zurück zum Zitat Rufai A, Modi S, Wadata B (2020) A survey of cyber-security practices in Nigeria. International research J Adv Eng Sci 5(3):222–226 Rufai A, Modi S, Wadata B (2020) A survey of cyber-security practices in Nigeria. International research J Adv Eng Sci 5(3):222–226
110.
Zurück zum Zitat Sabeil E, Manaf AA, Ismail Z (2012) Development of Malaysian digital forensics investigator competency identification methods. In: Advanced machine learning technologies and applications: first international conference, AMLTA 2012, Cairo, Egypt, 8–10 Dec 2012. Proceedings 1. Springer Berlin Heidelberg, pp 554–565 Sabeil E, Manaf AA, Ismail Z (2012) Development of Malaysian digital forensics investigator competency identification methods. In: Advanced machine learning technologies and applications: first international conference, AMLTA 2012, Cairo, Egypt, 8–10 Dec 2012. Proceedings 1. Springer Berlin Heidelberg, pp 554–565
111.
Zurück zum Zitat Sabillon R, Cano J, Cavaller V, Serra J (2016) Cybercrime and cybercriminals: a comprehensive study. Int J Comput Netw Commun Secur 4(6) Sabillon R, Cano J, Cavaller V, Serra J (2016) Cybercrime and cybercriminals: a comprehensive study. Int J Comput Netw Commun Secur 4(6)
112.
Zurück zum Zitat Sarmah A, Sarmah R, Baruah AJ (2017) A brief study on cybercrime and cyber laws of India. Int Res J Eng Technol (IRJET) 4(6):1633–1640 Sarmah A, Sarmah R, Baruah AJ (2017) A brief study on cybercrime and cyber laws of India. Int Res J Eng Technol (IRJET) 4(6):1633–1640
113.
Zurück zum Zitat Shaw A, Browne A (2013) A practical and robust approach to coping with large volumes of data submitted for digital forensic examination. Digit Investig 10(2):116–128CrossRef Shaw A, Browne A (2013) A practical and robust approach to coping with large volumes of data submitted for digital forensic examination. Digit Investig 10(2):116–128CrossRef
116.
Zurück zum Zitat Stoyanova M, Nikoloudakis Y, Panagiotakis S, Pallis E, Markakis EK (2020) A survey on the Internet of Things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun Surv Tutor 22(2):1191–1221CrossRef Stoyanova M, Nikoloudakis Y, Panagiotakis S, Pallis E, Markakis EK (2020) A survey on the Internet of Things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun Surv Tutor 22(2):1191–1221CrossRef
117.
Zurück zum Zitat Suleiman AO (2019) The impulsive upsurge of yahoo-yahoo in the 21st century in Nigeria: Islamic perspective. Afr J Criminol Justice Stud 12(1) Suleiman AO (2019) The impulsive upsurge of yahoo-yahoo in the 21st century in Nigeria: Islamic perspective. Afr J Criminol Justice Stud 12(1)
120.
Zurück zum Zitat Tonye WS (2018) Cyber forensic and data collection challenges in Nigeria. Glob J Comput Sci Technol 18(3) Tonye WS (2018) Cyber forensic and data collection challenges in Nigeria. Glob J Comput Sci Technol 18(3)
122.
Zurück zum Zitat Umar I, Samsudin RS, Mohamed M (2016) Understanding the successes and challenges of Anti-Corruption Agency (ACA) in Nigeria: a case of Economic and Financial Crimes Commission (EFCC). Asian J Multidiscip Stud 4(5):27–33 Umar I, Samsudin RS, Mohamed M (2016) Understanding the successes and challenges of Anti-Corruption Agency (ACA) in Nigeria: a case of Economic and Financial Crimes Commission (EFCC). Asian J Multidiscip Stud 4(5):27–33
125.
Zurück zum Zitat Urhibo K (2021) Combating and addressing the menace of cybercrime in Nigeria: an overview of applicable laws. Afr J Crim Law Jurisprud 6 Urhibo K (2021) Combating and addressing the menace of cybercrime in Nigeria: an overview of applicable laws. Afr J Crim Law Jurisprud 6
127.
Zurück zum Zitat Viko IJ (2021) Analysis of the legal and institutional framework for fighting cybercrime in Nigeria. Int J Comp Law Legal Philos (IJOCLLEP) 3(2) Viko IJ (2021) Analysis of the legal and institutional framework for fighting cybercrime in Nigeria. Int J Comp Law Legal Philos (IJOCLLEP) 3(2)
128.
Zurück zum Zitat Wall DS (2001) Cybercrimes and internet. In: Wall DS (ed) Crime and the internet. Routledge, pp 1–17 Wall DS (2001) Cybercrimes and internet. In: Wall DS (ed) Crime and the internet. Routledge, pp 1–17
131.
Zurück zum Zitat Zainal Z (2007) Case study as a research method. Jurnal Kemanusiaan 5(1) Zainal Z (2007) Case study as a research method. Jurnal Kemanusiaan 5(1)
132.
Zurück zum Zitat Zawoad S, Hasan R (2015) Digital forensics in the age of big data: challenges, approaches, and opportunities. In: 2015 IEEE 17th international conference on high performance computing and communications, 2015 IEEE 7th international symposium on cyberspace safety and security, and 2015 IEEE 12th international conference on embedded software and systems, pp 1320–1325. https://doi.org/10.1109/HPCC-CSS-ICESS.2015.305 Zawoad S, Hasan R (2015) Digital forensics in the age of big data: challenges, approaches, and opportunities. In: 2015 IEEE 17th international conference on high performance computing and communications, 2015 IEEE 7th international symposium on cyberspace safety and security, and 2015 IEEE 12th international conference on embedded software and systems, pp 1320–1325. https://​doi.​org/​10.​1109/​HPCC-CSS-ICESS.​2015.​305
Metadaten
Titel
Cyber Crime in Nigeria—Reviewing the Problems
verfasst von
Robinson Tombari Sibe
Christian Kaunert
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-54089-9_2

Premium Partner