Abstract
This chapter presents the background, contexts, and overview of the cybercrime challenge in Nigeria. The chapter presents foundational information of the rising caseloads of cybercrime in Nigeria. Specific challenges as well as the various reforms by government to tackle this, are also presented in this chapter. This chapter also presented the various institutional reforms, including the Economic and Financial Crimes Commission (EFCC), the Independent Corrupt Practices Commission (ICPC), and others with the mandate to tackle cybercrime in Nigeria. This chapter presents the two theoretical framework that shapes this study—Cohen and Felson’s (Am Sociol Rev 588–608, 1979 [20]) Routine Activity Theory (RAT) and Technology Organisation and Environment framework developed by Tornatzky et al. (Processes of technological innovation. Lexington Books, 1990 [86]). This chapter also presented the conceptual framework for this study, the digital forensic readiness model, first introduced by Tan (Forensic readiness. @ Stake, Cambridge, MA, pp. 1–23, 2001 [84]). Using this conceptual model, the chapter presents a major challenge faced in the fight against cybercrime, which is the lack of forensic resources at the financial crimes agencies in Nigeria. The chapter ends by summarizing this challenge and the need to study the specifics of the lack of forensic readiness of the cybercrime agencies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdul-Rasheed SL, Lateef I, Yinusa MA, Abdullateef R (2016) Cybercrime and Nigeria’s external image: a critical assessment. J Pan Afr Stud 9(6):119–133
Ahmed I (2020) Technology organization environment framework in cloud computing. TELKOMNIKA 18(2):716–725
Ajayi EFG (2016) Challenges to enforcement of cyber-crimes laws and policy. J Internet Inf Syst 6(1):1–12
Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50(2):179–211
Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice Hall, Englewood Cliffs, NJ
Akanle O, Adesina JO, Akarah EP (2016) Towards human dignity and the Internet: the cybercrime (yahoo yahoo) phenomenon in Nigeria. Afr J Sci Technol Innov Dev 8(2):213–220
Akanle O, Shadare BR (2019) Yahoo-plus in Ibadan: meaning, characterization and strategies. Int J Cyber Criminol 13(2)
Al-Hujran O, Al-Lozi EM, Al-Debei MM, Maqableh M (2018) Challenges of cloud computing adoption from the TOE framework perspective. Int J E-Bus Res (IJEBR) 14(3):77–94
Alenezi A, Hussein RK, Walters RJ, Wills GB (2017) A framework for cloud forensic readiness in organizations. In: 2017 5th IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud), pp 199–204. https://doi.org/10.1109/MobileCloud.2017.12
Almarzooqi A, Jones A (2016) A framework for assessing the core capabilities of a digital forensic organization. In: IFIP international conference on digital forensics, Jan 2016. Springer, Cham, pp 47–65
Arshad H, Jantan AB, Abiodun OI (2018) Digital forensics: review of issues in scientific validation of digital evidence. J Inf Process Syst 14(2)
Associated Press (2016) Nigerian man charged with hacking Los Angeles county emails. Guardian Newspaper. https://www.theguardian.com/us-news/2016/dec/18/los-angeles-county-email-hack-kelvin-onaghinor
Barboza T (2016) L.A. County targeted in phishing cyberattack; private information of 750,000 people compromised. Los Angeles Times. https://www.latimes.com/local/lanow/la-me-ln-county-cyberattack-20161217-story.html
Baxter P, Jack S (2008) Qualitative case study methodology: study design and implementation for novice researchers. Qual Rep 13(4):544–559
Bello M, Griffiths M (2021) Routine activity theory and cybercrime investigation in Nigeria: how capable are law enforcement agencies? In: Rethinking cybercrime. Palgrave Macmillan, Cham, pp 213–235
Carrier B, Spafford E (2004) An event-based digital forensic investigation framework. Digital Investigation. https://dfrws.org/wp-content/uploads/2019/06/2004_USA_paper-an_event-based_digital_forensic_investigation_framework.pdf
Carrier BD, Spafford EH (2005, August) Automated digital evidence target definition using outlier analysis and existing evidence. Digital Forensic Research Workshop, New Orleans, LA.
Chau PY, Tam KY (1997) Factors affecting the adoption of open systems: an exploratory study. MIS Q 21(1)
Choi KS, Lee CS, Louderback ER (2020) Historical evolutions of cybercrime: from computer crime to cybercrime. In: The Palgrave handbook of international cybercrime and cyberdeviance, pp 27–43
Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 588–608
Cross C (2018) Victims’ motivations for reporting to the ‘fraud justice network.’ Police Pract Res 19(6):550–564
Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 319–340
Digital Forensics Research Workshop (2001) Defining digital forensic examination and analysis tools. https://www.dfrws.org/sites/default/files/session-files/pres-defining_digital_forensic_examination_and_analysis_tools.pdf
Dortmans PJ, Thakur N, Ween A (2015) Conjectures for framing cyberwarfare. Def Secur Anal 31(3):172–184
Eboibi FE (2017) A review of the legal and regulatory frameworks of Nigerian Cybercrimes Act 2015. Comput Law Secur Rev 33(5):700–717
Economic and Financial Crimes Commission (2023) EFCC secures 3785 convictions in 2022. https://www.efcc.gov.ng/efcc/index.php/news-and-information/news-release/8781-efcc-secures-3785-convictions-in-2022
Ehimen OR, Bola A (2010) Cybercrime in Nigeria. Bus Intell J 3(1):93–98
Elyas M, Maynard SB, Ahmad A, Lonie A (2014) Towards a systemic framework for digital forensic readiness. J Comput Inf Syst 54(3):97–105
Englbrecht L, Meier S, Pernul G (2019) Towards a capability maturity model for digital forensic readiness. Wireless Netw 1–13
Farquhar JD (2012) Case study research for business. Sage
Federal Bureau of Investigation (n.d.) Internet fraud. www.fbi.gov/scams-and-safety/common-scams-and-crimes/internet-fraud
Federal Bureau of Investigation (2019) Business email compromise the $26 billion scam. https://www.ic3.gov/Media/Y2019/PSA190910
Federal Bureau of Investigation (2023) Internet crime report. https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf
Felson M (1998) Crime and everyday life. Thousand Oaks
Garba AA, Bade AM (2019) A recommended digital forensics readiness framework for Nigerian banks. Int J Dev Res 9(08)
Garba AA, Siraj MM (2015) A holistic-based digital forensic readiness framework for Zenith Bank, Nigeria. In: International conference on computational and social sciences, pp 551–560
Grabosky PN (2001) Virtual criminality: old wine in new bottles? Soc Leg Stud 10(2):243–249
Grabosky P, Smith R (2001) Telecommunication fraud in the digital age: the convergence of technologies. In: Wall D (ed) Crime and the Internet. Routledge
Guardian Newspaper (2021) 80% of EFCC’s 978 convictions cybercrime related. https://guardian.ng/news/80-of-efccs-978-convictions-cybercrime-related/
Guardian Newspaper (2022) NCC puts cybercrime losses in Nigeria at $500m, sets to implement DMS. https://guardian.ng/news/ncc-puts-cybercrime-losses-in-nigeria-at-500m-sets-to-implement-dms/
Hinchliffe A (2017) Nigerian princes to kings of malware: the next evolution in Nigerian cybercrime. Comput Fraud Secur 2017(5):5–9
Hutchings A, Hayes H (2009) Routine activity theory and phishing victimisation: who gets caught in the ‘net’? Curr Issues Crim Just 20(3):433–452
ICPC (2012) ICPC establishes forensic laboratory. https://icpc.gov.ng/2012/09/07/icpc-establishes-forensic-laboratory/
ICPC (2022) ICPC arraigns impersonator of ex-primate of anglican communion, others over N30.4m fraud. https://icpc.gov.ng/2022/04/10/cpc-arraigns-impersonator-of-ex-primate-of-anglican-communion-others-over-n30-4m-fraud/
Iacovou CL, Benbasat I, Dexter AS (1995) Electronic data interchange and small organizations: adoption and impact of technology. MIS Q 465–485
International Telecommunication Union (2012) Understanding cybercrime: phenomena, challenges and legal response. http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf
International Telecommunication Union (2020) Statistics. https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx
Interpol (2017) Global cybercrime strategy. https://www.interpol.int/en/Crimes/Cybercrime
Interpol (2023) African cyberthreat assessment report cyberthreat trends. www.interpol.int
Joffee R (2010) Cybercrime: the global epidemic at your network door. Netw Secur 2010(7):4–7
Kigerl A (2020) Spam-based scams. In: Holt T, Bossler A (eds) The Palgrave handbook of international cybercrime and cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_42
Kigerl A (2012) Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30(4):470–486
Leukfeldt ER, Yar M (2016) Applying routine activity theory to cybercrime: a theoretical and empirical analysis. Deviant Behav 37(3):263–280
Leung D, Lo A, Fong LHN, Law R (2015) Applying the technology-organization-environment framework to explore ICT initial and continued adoption: an exploratory study of an independent hotel in Hong Kong. Tour Recreat Res 40(3):391–406
Makutsoane MP, Leonard A (2014) A conceptual framework to determine the digital forensic readiness of a cloud service provider. In: Proceedings of PICMET’14 conference: Portland international center for management of engineering and technology; infrastructure and service integration, July 2014, pp 3313–3321
Manky D (2013) Cybercrime as a service very modern business. Comput Fraud Secur 2013(6):9–13
Meyers A (2018) Not your fairy-tale prince: the nigerian business email compromise threat. Computer Fraud & Security, 2018(8):14–16
Mihai IC, Pruna Ș, Petrica G (2017) A comprehensive analysis on cyber-threats against elearning systems. ELearn Softw Educ 3:344–351. https://doi.org/10.12753/2066-026X-17-225
Mohammed KH, Mohammed YD, Solanke AA (2019) Cybercrime and digital forensics: bridging the gap in legislation, investigation, and prosecution of cybercrime in Nigeria. Int J Cybersecur Intell Cybercrime 2(1):56–63
National Information Technology Development Agency (2019) National cybersecurity policy/strategy implementation guidelines for ministries, departments & agencies (MDAs) & private ICT organizations. https://nitda.gov.ng/wp-content/uploads/2020/03/National-Cybersecurity-Strategy-Implementation-GuidelinesFinal.pdf
News Agency of Nigeria (2016) Police to create special unit to tackle cybercrime. Guardian Newspaper. https://guardian.ng/news/police-to-create-special-unit-to-tackle-cybercrime/
Ngobeni S, Venter H, Burke I (2010) A forensic readiness model for wireless networks. In: Chow K-P, Shenoi S (eds) Advances in digital forensics VI, vol 337. Springer Berlin Heidelberg, pp 107–117. https://doi.org/10.1007/978-3-642-15506-2_8
Nigerian Communications Commission (2004) An overview of the Nigerian telecommunications environment. https://www.ncc.gov.ng/archived/speeches/NCC%20CEO%20Presentation%20on%20Overview%20of%20Nigerian%20Telecoms%20Industry.pdf
Nigerian Communications Commission (2023) Subscriber data. https://ncc.gov.ng/statistics-reports/subscriber-data#monthly-subscriber-technology-data
Nigerian Deposit Insurance Company (2019) NDIC annual report 2018. https://ndic.gov.ng/wp-content/uploads/2019/09/NDIC-2018-ANNUAL-REPORT.pdf
Obuah E (2010) Combatting corruption in Nigeria: the Nigerian economic and financial crimes (EFCC). Afr Stud Q 12(1)
Office of the National Security Adviser (2021) National cybersecurity policy and strategy. https://cert.gov.ng/ngcert/resources/NATIONAL_CYBERSECURITY_POLICY_AND_STRATEGY_2021.pdf
Okolorie GR (2020) Uncovering patterns in complex investigations is no match for Nigeria’s Economic and Financial Crimes Commission (EFCC) [Interview]. Cellebrite, 22 Dec 2020. https://www.cellebrite.com/en/uncovering-patterns-in-complex-investigations-is-no-match-for-nigerias-economic-and-financial-crimes-commission-efcc/
Olayemi OJ (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria. Int J Sociol Anthropol 6(3):116–125
Oliveira T, Martins MF (2011) Literature review of information technology adoption models at firm level. Electron J Inf Syst Eval 14(1):110–121
Omodunbi BA, Odiase PO, Olaniyan OM, Esan AO (2016) Cybercrimes in Nigeria: analysis, detection, and prevention. J Eng Technol 1(1):37–42
Omotubora AO (2016) Comparative perspectives on cybercrime legislation in Nigeria and the UK—a case for revisiting the “hacking” offences under the Nigerian Cybercrime Act 2015. Eur J Law Technol 7(3)
Oraegbunam IK (2015) The Nigerian police and problems of cybercrime investigation: need for adequate training. Niger Law J 18(1):1–28
Pooe A, Labuschagne L (2012) A conceptual model for digital forensic readiness. In: 2012 information security for South Africa, Aug 2012. IEEE, pp 1–8
Pratt TC, Holtfreter K, Reisig MD (2010) Routine online activity and Internet fraud targeting: extending the generality of routine activity theory. J Res Crime Delinq 47(3):267–296
Punch Newspaper (2022) IGP shakes up cybercrime unit. https://punchng.com/igp-shakes-up-cybercrime-unit/
Ramdani B, Chevers D, Williams DA (2013) SMEs’ adoption of enterprise applications: a technology-organisation-environment model. J Small Bus Enterpr Dev
Reed TS (2019) Cybercrime and technology losses: claims and potential insurance coverage for modern cyber risks. Tort Trial Insur Pract Law J 54(1):153–209
Reyns BW (2015) A routine activity perspective on online victimisation. J Financ Crime
Sabillon R, Cano J, Cavaller V, Serra J (2016) Cybercrime and cybercriminals: a comprehensive study. Int J Comput Netw Commun Secur 4(6)
Samonas S (2013) Insider fraud and routine activity theory. LSE Research Online. http://eprints.lse.ac.uk/50344/1/Samonas_Insider_fraud_routine_2013.pdf
Straub ET (2009) Understanding technology adoption: theory and future directions for informal learning. Rev Educ Res 79(2):625–649
Symantec Corporation and African Union (2016) Cybercrime & cybersecurity trends in Africa. www.thehaguesecuritydelta.com/media/com_hsd/report/135/document/Cyber-security-trends-report-Africa-en.pdf
Tan J (2001) Forensic readiness. @ Stake, Cambridge, MA, pp 1–23
Tellis W (1997) Application of a case study methodology. Qual Rep 3(3):1–19
Tornatzky LG, Fleischer M, Chakrabarti AK (1990) Processes of technological innovation. Lexington Books
Tseloni A, Wittebrood K, Farrell G, Pease K (2004) Burglary victimization in England and Wales, the United States and the Netherlands: a cross-national comparative test of routine activities and lifestyle theories. Br J Criminol 44(1):66–91
Umar I, Samsudin RS, Mohamed M (2016) Understanding the successes and challenges of Anti-Corruption Agency (ACA) in Nigeria: a case of Economic and Financial Crimes Commission (EFCC). Asian J Multidiscip Stud 4(5):27–33
United Nations Office on Drugs and Crime (2013) Comprehensive study on cybercrime https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
Vanguard Newspaper (2020) Nigeria police, interpol arrest three suspects over cybercrime. Vanguard Newspaper. https://www.vanguardngr.com/2020/07/nigeria-police-interpol-arrest-3-suspects-over-cybercrime/
Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 425–478
Von Solms R, Van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97–102
Yar M (2005) The novelty of ‘cybercrime’: an assessment in light of routine activity theory. Eur J Criminol 2(4):407–427
Yin RK (2003) Case study research: design and methods, 3rd edn. Sage, Thousand Oaks, CA
Yin RK (2009) Case study research: design and methods, 4th edn. Sage, Thousand Oaks, CA
Zainal Z (2007) Case study as a research method. J Kemanusiaan 5(1)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sibe, R.T., Kaunert, C. (2024). Background and Introduction. In: Cybercrime, Digital Forensic Readiness, and Financial Crime Investigation in Nigeria. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-54089-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-54089-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-54088-2
Online ISBN: 978-3-031-54089-9
eBook Packages: Law and CriminologyLaw and Criminology (R0)