Skip to main content

Abstract

This chapter presents the background, contexts, and overview of the cybercrime challenge in Nigeria. The chapter presents foundational information of the rising caseloads of cybercrime in Nigeria. Specific challenges as well as the various reforms by government to tackle this, are also presented in this chapter. This chapter also presented the various institutional reforms, including the Economic and Financial Crimes Commission (EFCC), the Independent Corrupt Practices Commission (ICPC), and others with the mandate to tackle cybercrime in Nigeria. This chapter presents the two theoretical framework that shapes this study—Cohen and Felson’s (Am Sociol Rev 588–608, 1979 [20]) Routine Activity Theory (RAT) and Technology Organisation and Environment framework developed by Tornatzky et al. (Processes of technological innovation. Lexington Books, 1990 [86]). This chapter also presented the conceptual framework for this study, the digital forensic readiness model, first introduced by Tan (Forensic readiness. @ Stake, Cambridge, MA, pp. 1–23, 2001 [84]). Using this conceptual model, the chapter presents a major challenge faced in the fight against cybercrime, which is the lack of forensic resources at the financial crimes agencies in Nigeria. The chapter ends by summarizing this challenge and the need to study the specifics of the lack of forensic readiness of the cybercrime agencies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdul-Rasheed SL, Lateef I, Yinusa MA, Abdullateef R (2016) Cybercrime and Nigeria’s external image: a critical assessment. J Pan Afr Stud 9(6):119–133

    Google Scholar 

  2. Ahmed I (2020) Technology organization environment framework in cloud computing. TELKOMNIKA 18(2):716–725

    Article  Google Scholar 

  3. Ajayi EFG (2016) Challenges to enforcement of cyber-crimes laws and policy. J Internet Inf Syst 6(1):1–12

    Article  Google Scholar 

  4. Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50(2):179–211

    Article  Google Scholar 

  5. Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice Hall, Englewood Cliffs, NJ

    Google Scholar 

  6. Akanle O, Adesina JO, Akarah EP (2016) Towards human dignity and the Internet: the cybercrime (yahoo yahoo) phenomenon in Nigeria. Afr J Sci Technol Innov Dev 8(2):213–220

    Article  Google Scholar 

  7. Akanle O, Shadare BR (2019) Yahoo-plus in Ibadan: meaning, characterization and strategies. Int J Cyber Criminol 13(2)

    Google Scholar 

  8. Al-Hujran O, Al-Lozi EM, Al-Debei MM, Maqableh M (2018) Challenges of cloud computing adoption from the TOE framework perspective. Int J E-Bus Res (IJEBR) 14(3):77–94

    Article  Google Scholar 

  9. Alenezi A, Hussein RK, Walters RJ, Wills GB (2017) A framework for cloud forensic readiness in organizations. In: 2017 5th IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud), pp 199–204. https://doi.org/10.1109/MobileCloud.2017.12

  10. Almarzooqi A, Jones A (2016) A framework for assessing the core capabilities of a digital forensic organization. In: IFIP international conference on digital forensics, Jan 2016. Springer, Cham, pp 47–65

    Google Scholar 

  11. Arshad H, Jantan AB, Abiodun OI (2018) Digital forensics: review of issues in scientific validation of digital evidence. J Inf Process Syst 14(2)

    Google Scholar 

  12. Associated Press (2016) Nigerian man charged with hacking Los Angeles county emails. Guardian Newspaper. https://www.theguardian.com/us-news/2016/dec/18/los-angeles-county-email-hack-kelvin-onaghinor

  13. Barboza T (2016) L.A. County targeted in phishing cyberattack; private information of 750,000 people compromised. Los Angeles Times. https://www.latimes.com/local/lanow/la-me-ln-county-cyberattack-20161217-story.html

  14. Baxter P, Jack S (2008) Qualitative case study methodology: study design and implementation for novice researchers. Qual Rep 13(4):544–559

    Google Scholar 

  15. Bello M, Griffiths M (2021) Routine activity theory and cybercrime investigation in Nigeria: how capable are law enforcement agencies? In: Rethinking cybercrime. Palgrave Macmillan, Cham, pp 213–235

    Google Scholar 

  16. Carrier B, Spafford E (2004) An event-based digital forensic investigation framework. Digital Investigation. https://dfrws.org/wp-content/uploads/2019/06/2004_USA_paper-an_event-based_digital_forensic_investigation_framework.pdf

  17. Carrier BD, Spafford EH (2005, August) Automated digital evidence target definition using outlier analysis and existing evidence. Digital Forensic Research Workshop, New Orleans, LA.

    Google Scholar 

  18. Chau PY, Tam KY (1997) Factors affecting the adoption of open systems: an exploratory study. MIS Q 21(1)

    Google Scholar 

  19. Choi KS, Lee CS, Louderback ER (2020) Historical evolutions of cybercrime: from computer crime to cybercrime. In: The Palgrave handbook of international cybercrime and cyberdeviance, pp 27–43

    Google Scholar 

  20. Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 588–608

    Google Scholar 

  21. Cross C (2018) Victims’ motivations for reporting to the ‘fraud justice network.’ Police Pract Res 19(6):550–564

    Article  Google Scholar 

  22. Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 319–340

    Google Scholar 

  23. Digital Forensics Research Workshop (2001) Defining digital forensic examination and analysis tools. https://www.dfrws.org/sites/default/files/session-files/pres-defining_digital_forensic_examination_and_analysis_tools.pdf

  24. Dortmans PJ, Thakur N, Ween A (2015) Conjectures for framing cyberwarfare. Def Secur Anal 31(3):172–184

    Article  Google Scholar 

  25. Eboibi FE (2017) A review of the legal and regulatory frameworks of Nigerian Cybercrimes Act 2015. Comput Law Secur Rev 33(5):700–717

    Article  Google Scholar 

  26. Economic and Financial Crimes Commission (2023) EFCC secures 3785 convictions in 2022. https://www.efcc.gov.ng/efcc/index.php/news-and-information/news-release/8781-efcc-secures-3785-convictions-in-2022

  27. Ehimen OR, Bola A (2010) Cybercrime in Nigeria. Bus Intell J 3(1):93–98

    Google Scholar 

  28. Elyas M, Maynard SB, Ahmad A, Lonie A (2014) Towards a systemic framework for digital forensic readiness. J Comput Inf Syst 54(3):97–105

    Google Scholar 

  29. Englbrecht L, Meier S, Pernul G (2019) Towards a capability maturity model for digital forensic readiness. Wireless Netw 1–13

    Google Scholar 

  30. Farquhar JD (2012) Case study research for business. Sage

    Book  Google Scholar 

  31. Federal Bureau of Investigation (n.d.) Internet fraud. www.fbi.gov/scams-and-safety/common-scams-and-crimes/internet-fraud

  32. Federal Bureau of Investigation (2019) Business email compromise the $26 billion scam. https://www.ic3.gov/Media/Y2019/PSA190910

  33. Federal Bureau of Investigation (2023) Internet crime report. https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf

  34. Felson M (1998) Crime and everyday life. Thousand Oaks

    Google Scholar 

  35. Garba AA, Bade AM (2019) A recommended digital forensics readiness framework for Nigerian banks. Int J Dev Res 9(08)

    Google Scholar 

  36. Garba AA, Siraj MM (2015) A holistic-based digital forensic readiness framework for Zenith Bank, Nigeria. In: International conference on computational and social sciences, pp 551–560

    Google Scholar 

  37. Grabosky PN (2001) Virtual criminality: old wine in new bottles? Soc Leg Stud 10(2):243–249

    Article  Google Scholar 

  38. Grabosky P, Smith R (2001) Telecommunication fraud in the digital age: the convergence of technologies. In: Wall D (ed) Crime and the Internet. Routledge

    Google Scholar 

  39. Guardian Newspaper (2021) 80% of EFCC’s 978 convictions cybercrime related. https://guardian.ng/news/80-of-efccs-978-convictions-cybercrime-related/

  40. Guardian Newspaper (2022) NCC puts cybercrime losses in Nigeria at $500m, sets to implement DMS. https://guardian.ng/news/ncc-puts-cybercrime-losses-in-nigeria-at-500m-sets-to-implement-dms/

  41. Hinchliffe A (2017) Nigerian princes to kings of malware: the next evolution in Nigerian cybercrime. Comput Fraud Secur 2017(5):5–9

    Article  Google Scholar 

  42. Hutchings A, Hayes H (2009) Routine activity theory and phishing victimisation: who gets caught in the ‘net’? Curr Issues Crim Just 20(3):433–452

    Article  Google Scholar 

  43. ICPC (2012) ICPC establishes forensic laboratory. https://icpc.gov.ng/2012/09/07/icpc-establishes-forensic-laboratory/

  44. ICPC (2022) ICPC arraigns impersonator of ex-primate of anglican communion, others over N30.4m fraud. https://icpc.gov.ng/2022/04/10/cpc-arraigns-impersonator-of-ex-primate-of-anglican-communion-others-over-n30-4m-fraud/

  45. Iacovou CL, Benbasat I, Dexter AS (1995) Electronic data interchange and small organizations: adoption and impact of technology. MIS Q 465–485

    Google Scholar 

  46. International Telecommunication Union (2012) Understanding cybercrime: phenomena, challenges and legal response. http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf

  47. International Telecommunication Union (2020) Statistics. https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx

  48. Interpol (2017) Global cybercrime strategy. https://www.interpol.int/en/Crimes/Cybercrime

  49. Interpol (2023) African cyberthreat assessment report cyberthreat trends. www.interpol.int

  50. Joffee R (2010) Cybercrime: the global epidemic at your network door. Netw Secur 2010(7):4–7

    Article  Google Scholar 

  51. Kigerl A (2020) Spam-based scams. In: Holt T, Bossler A (eds) The Palgrave handbook of international cybercrime and cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_42

  52. Kigerl A (2012) Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30(4):470–486

    Google Scholar 

  53. Leukfeldt ER, Yar M (2016) Applying routine activity theory to cybercrime: a theoretical and empirical analysis. Deviant Behav 37(3):263–280

    Article  Google Scholar 

  54. Leung D, Lo A, Fong LHN, Law R (2015) Applying the technology-organization-environment framework to explore ICT initial and continued adoption: an exploratory study of an independent hotel in Hong Kong. Tour Recreat Res 40(3):391–406

    Google Scholar 

  55. Makutsoane MP, Leonard A (2014) A conceptual framework to determine the digital forensic readiness of a cloud service provider. In: Proceedings of PICMET’14 conference: Portland international center for management of engineering and technology; infrastructure and service integration, July 2014, pp 3313–3321

    Google Scholar 

  56. Manky D (2013) Cybercrime as a service very modern business. Comput Fraud Secur 2013(6):9–13

    Article  Google Scholar 

  57. Meyers A (2018) Not your fairy-tale prince: the nigerian business email compromise threat. Computer Fraud & Security, 2018(8):14–16

    Google Scholar 

  58. Mihai IC, Pruna Ș, Petrica G (2017) A comprehensive analysis on cyber-threats against elearning systems. ELearn Softw Educ 3:344–351. https://doi.org/10.12753/2066-026X-17-225

  59. Mohammed KH, Mohammed YD, Solanke AA (2019) Cybercrime and digital forensics: bridging the gap in legislation, investigation, and prosecution of cybercrime in Nigeria. Int J Cybersecur Intell Cybercrime 2(1):56–63

    Article  Google Scholar 

  60. National Information Technology Development Agency (2019) National cybersecurity policy/strategy implementation guidelines for ministries, departments & agencies (MDAs) & private ICT organizations. https://nitda.gov.ng/wp-content/uploads/2020/03/National-Cybersecurity-Strategy-Implementation-GuidelinesFinal.pdf

  61. News Agency of Nigeria (2016) Police to create special unit to tackle cybercrime. Guardian Newspaper. https://guardian.ng/news/police-to-create-special-unit-to-tackle-cybercrime/

  62. Ngobeni S, Venter H, Burke I (2010) A forensic readiness model for wireless networks. In: Chow K-P, Shenoi S (eds) Advances in digital forensics VI, vol 337. Springer Berlin Heidelberg, pp 107–117. https://doi.org/10.1007/978-3-642-15506-2_8

  63. Nigerian Communications Commission (2004) An overview of the Nigerian telecommunications environment. https://www.ncc.gov.ng/archived/speeches/NCC%20CEO%20Presentation%20on%20Overview%20of%20Nigerian%20Telecoms%20Industry.pdf

  64. Nigerian Communications Commission (2023) Subscriber data. https://ncc.gov.ng/statistics-reports/subscriber-data#monthly-subscriber-technology-data

  65. Nigerian Deposit Insurance Company (2019) NDIC annual report 2018. https://ndic.gov.ng/wp-content/uploads/2019/09/NDIC-2018-ANNUAL-REPORT.pdf

  66. Obuah E (2010) Combatting corruption in Nigeria: the Nigerian economic and financial crimes (EFCC). Afr Stud Q 12(1)

    Google Scholar 

  67. Office of the National Security Adviser (2021) National cybersecurity policy and strategy. https://cert.gov.ng/ngcert/resources/NATIONAL_CYBERSECURITY_POLICY_AND_STRATEGY_2021.pdf

  68. Okolorie GR (2020) Uncovering patterns in complex investigations is no match for Nigeria’s Economic and Financial Crimes Commission (EFCC) [Interview]. Cellebrite, 22 Dec 2020. https://www.cellebrite.com/en/uncovering-patterns-in-complex-investigations-is-no-match-for-nigerias-economic-and-financial-crimes-commission-efcc/

  69. Olayemi OJ (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria. Int J Sociol Anthropol 6(3):116–125

    Article  Google Scholar 

  70. Oliveira T, Martins MF (2011) Literature review of information technology adoption models at firm level. Electron J Inf Syst Eval 14(1):110–121

    Google Scholar 

  71. Omodunbi BA, Odiase PO, Olaniyan OM, Esan AO (2016) Cybercrimes in Nigeria: analysis, detection, and prevention. J Eng Technol 1(1):37–42

    Google Scholar 

  72. Omotubora AO (2016) Comparative perspectives on cybercrime legislation in Nigeria and the UK—a case for revisiting the “hacking” offences under the Nigerian Cybercrime Act 2015. Eur J Law Technol 7(3)

    Google Scholar 

  73. Oraegbunam IK (2015) The Nigerian police and problems of cybercrime investigation: need for adequate training. Niger Law J 18(1):1–28

    Google Scholar 

  74. Pooe A, Labuschagne L (2012) A conceptual model for digital forensic readiness. In: 2012 information security for South Africa, Aug 2012. IEEE, pp 1–8

    Google Scholar 

  75. Pratt TC, Holtfreter K, Reisig MD (2010) Routine online activity and Internet fraud targeting: extending the generality of routine activity theory. J Res Crime Delinq 47(3):267–296

    Article  Google Scholar 

  76. Punch Newspaper (2022) IGP shakes up cybercrime unit. https://punchng.com/igp-shakes-up-cybercrime-unit/

  77. Ramdani B, Chevers D, Williams DA (2013) SMEs’ adoption of enterprise applications: a technology-organisation-environment model. J Small Bus Enterpr Dev

    Google Scholar 

  78. Reed TS (2019) Cybercrime and technology losses: claims and potential insurance coverage for modern cyber risks. Tort Trial Insur Pract Law J 54(1):153–209

    Google Scholar 

  79. Reyns BW (2015) A routine activity perspective on online victimisation. J Financ Crime

    Google Scholar 

  80. Sabillon R, Cano J, Cavaller V, Serra J (2016) Cybercrime and cybercriminals: a comprehensive study. Int J Comput Netw Commun Secur 4(6)

    Google Scholar 

  81. Samonas S (2013) Insider fraud and routine activity theory. LSE Research Online. http://eprints.lse.ac.uk/50344/1/Samonas_Insider_fraud_routine_2013.pdf

  82. Straub ET (2009) Understanding technology adoption: theory and future directions for informal learning. Rev Educ Res 79(2):625–649

    Article  Google Scholar 

  83. Symantec Corporation and African Union (2016) Cybercrime & cybersecurity trends in Africa. www.thehaguesecuritydelta.com/media/com_hsd/report/135/document/Cyber-security-trends-report-Africa-en.pdf

  84. Tan J (2001) Forensic readiness. @ Stake, Cambridge, MA, pp 1–23

    Google Scholar 

  85. Tellis W (1997) Application of a case study methodology. Qual Rep 3(3):1–19

    Google Scholar 

  86. Tornatzky LG, Fleischer M, Chakrabarti AK (1990) Processes of technological innovation. Lexington Books

    Google Scholar 

  87. Tseloni A, Wittebrood K, Farrell G, Pease K (2004) Burglary victimization in England and Wales, the United States and the Netherlands: a cross-national comparative test of routine activities and lifestyle theories. Br J Criminol 44(1):66–91

    Article  Google Scholar 

  88. Umar I, Samsudin RS, Mohamed M (2016) Understanding the successes and challenges of Anti-Corruption Agency (ACA) in Nigeria: a case of Economic and Financial Crimes Commission (EFCC). Asian J Multidiscip Stud 4(5):27–33

    Google Scholar 

  89. United Nations Office on Drugs and Crime (2013) Comprehensive study on cybercrime https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf

  90. Vanguard Newspaper (2020) Nigeria police, interpol arrest three suspects over cybercrime. Vanguard Newspaper. https://www.vanguardngr.com/2020/07/nigeria-police-interpol-arrest-3-suspects-over-cybercrime/

  91. Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 425–478

    Google Scholar 

  92. Von Solms R, Van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97–102

    Article  Google Scholar 

  93. Yar M (2005) The novelty of ‘cybercrime’: an assessment in light of routine activity theory. Eur J Criminol 2(4):407–427

    Article  Google Scholar 

  94. Yin RK (2003) Case study research: design and methods, 3rd edn. Sage, Thousand Oaks, CA

    Google Scholar 

  95. Yin RK (2009) Case study research: design and methods, 4th edn. Sage, Thousand Oaks, CA

    Google Scholar 

  96. Zainal Z (2007) Case study as a research method. J Kemanusiaan 5(1)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Kaunert .

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sibe, R.T., Kaunert, C. (2024). Background and Introduction. In: Cybercrime, Digital Forensic Readiness, and Financial Crime Investigation in Nigeria. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-54089-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-54089-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-54088-2

  • Online ISBN: 978-3-031-54089-9

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics