Cyber Crime Management among Students An Evaluation of Legal Correlates of Cyber Crime Management among Tertiary Institutions Students in Nigeria (A Case Study of Delta State)

Main Article Content

Ngboawaji Daniel Nte
https://orcid.org/0000-0002-1331-3511
Urowayinor Kelita Esq
Bribena Kelvin Enokie
Onyeka Bienose
https://orcid.org/0000-0002-5079-0202

Abstract

This study investigated examined the legal correlates of cybercrime management amongst higher institution students in Nigeria with special reference to some selected tertiary institutions in Delta State, Nigeria. A correlation approach of survey research design was adopted in this study. In order to address the problem of this study, seven research questions were raised and seven research hypotheses were formulated and tested at a .05 level of significance. This study revealed that the law can provide solutions to Cyber Crime management in Nigeria. Poverty is a factor responsible for cybercrime in Nigeria. The law can promote intellectual property and ensure privacy rights. There are existing laws that adequately address challenges relating to cybercrimes. The study revealed that youths who are mostly male are the major perpetrator of cyber-crimes and the crime can be committed at any time of the day. The study found that unemployment, poverty, absence of effectual law, and corruption are the major causes of cyber-crime in the study area. Based on the findings of this study, it was therefore recommended that collective vigilance detect and report to law enforcement agencies anyone suspected to be involved in cyber-crime. The Federal Government should empower the youths in terms of job creation and regularly engage the IT organizations to develop strategies to curtail cyber-crime.

Article Details

How to Cite
Nte, N. D., Esq, U. K., Enokie, B. K., & Bienose, O. (2020). Cyber Crime Management among Students. Journal of Indonesian Legal Studies, 5(2), 295-334. https://doi.org/10.15294/jils.v5i2.34005
Section
Research Articles
Author Biographies

Ngboawaji Daniel Nte, Department of Intelligence and Security Studies, Novena University, Delta State

Ngboawaji Daniel Nte is Professor and Head of Department of Intelligence and Security Studies, Novena University, Delta State. He also a professional researcher at Security Studies.

Urowayinor Kelita Esq, Novena University, Department of Intelligence and Security Studies

Urowayinor Kelita Esq is a full professor of intelligence and Security studies at Novena University, Nigeria. He has written extensively on different areas of public safety and national security. He has over seventy journal articles to his credit. He also now serving as a professional lecturer and researcher at the Department of Intelligence and Security Studies, Novena University, Delta State, Nigeria.

Bribena Kelvin Enokie, Faculty of Law, Niger Delta University

Bribena Kelvin Enokie is a Lecturer at the Faculty of Law Niger Delta University, Wilberforce Island, Amasoma, Bayelsa State, Nigeria. 

Onyeka Bienose, Global Intelligence, Peace and Security Institute

Onyeka Bienose, is Director, Business Development, African Regional Office, Global Intelligence, Peace and Security Institute, Nigeria.

References

Abdulhamid, S.M, Haruna, C. and Abubakar, A. (2011) Cybercrimes and the Nigeria Academic Institution Networks. The IUP Journal of Information Technology, 7(1), 1-36.

Ahmed, A.A. (2010). Hack No More, Internet Security: Attacks and Defence. Nigeria: Ahmadu Bello University Press Limited.

Aghatise, E.J. (2006). Cyber-crime Definition, Computer Crime Research Centre. Retrieved September 20, 2011 from www.crime-research.org

Akande, F.F. (2007). Issue in Humanities and Technology. Ilorin: Integrity Publication.

Akpabio, I.I. & Ebong, F.S. (2009). Research Methodology and Statistics in Health and Behavioural Sciences. Calabar Nigeria: UNICAL Printing Press.

Ajewole, A. (2010). Curbing Cybercrime in Nigeria. Fighting the Masked Enemy and Promoting Productive Alternative for the Youth. Retrieved October 8, 2011 from http/www.primopdf.com.

Arase, S., & Obaedo, A. (2009), Policing Nigeria in the 21st Century. Ibadan, Nigeria: Spectrum Book.
Awe, J. (2009). Fighting Cybercrime in Nigeria. Retrieved September 10, 2011 from http://www.jidaw.com/itsolutions/security3.html.

Ayantokun, O. (2006). Fighting Cyber-Crime in Nigeria, Information-System, Retrieved September 10, 2011 from www.tribune.com.

Broadhurst, R. G., & Grabosky, P. N. (2005). Cyber-Crime: The Challenge in Asia. Hong Kong: Hong Kong University Press.

Dambazau, A. B, Jumare, M. M., & Yakubu, A. M. (1996). Issues in Crime Prevention and Control in Nigeria. Kaduna, Nigeria: Baraka Press and Publishers Ltd.

Ehimen, O. R., & Bola, A. (2010). Cybercrime in Nigeria, Business Intelligence Journal, 3(1), 85-124.

Erinosho, L, Obasi, I. N., & Maduekwe, A. (2002). Interdisciplinary Methodologies in the Social Sciences. Abuja, Nigeria: Auscon Fireseed and Co Ltd.

Fischer, J.R, Halibozek, E., & Green, G (2008). Introduction to Security, Oxford: Linacre House, Jordan Hill.

Gyong, J.E (2011). Basic Component of a Research Project in Sociology, A Paper Presentation at the In-House Training, Department of Sociology, ABU, Nigeria.

Haralanbos, M, Holborn, M. & Heald, R. (2008). Sociology: Theme and Perspectives. London, UK: Harper Collins Publishers.

Hidayatullah, K (2000). Cyber Crime and Its Consequences, National Law University Raipur (Chhattisgarh) village Upperwara, Tehsil Abhanpur, New Raipur (C.G).

Imhof, R. (2010). Cybercrime and Telecommunication Law, Rochester Institute of Technology USA. Information and Communication Technology.

Internet Crime Complaint Center, (2010). Internet crime report, retrieved from http://www.ic3.report.nw3c.org/docs/2010_ic3_report_02_10_11_low_res_pdf.2011

Kumar, K. (2003). Cyber Laws, International Property and E-commerce Security. New Delhi: Dominant Publishers and Distributors.

Longe O. S., & Chiemeke S. C. (2008). Cyber Crime and Criminality in Nigeria. What Roles are Internet Access Points in Playing? European Journal Social Sciences, 6(4), 132-139.

Matsueda, R. L. (2000). Differential Association Theory. Seattle, WA: University of Washington.

McConnell, (2000). Cybercrime and Punishment, Archaic Laws Threaten Global Information, www.mcconnellinformation.com.mcconnellinternational L.L.C.

McQuade, S. (2009). The Encyclopedia of Cybercrime. Westpoint Connecticut, London: Green Wood Press.

Morley, D., & Parker, C.S. (2007). Understanding Computers, Today and Tomorrow. USA: Thomson Course Technology.

National Population Commission (2006), 2006 Population and Housing Census of the Federal Republic of Nigeria, national population Commission.

Ogbunwezeh, E.F. (2006). EFCC and Cybercrime The True Lesson, Retrieved from www.nigeriavillagesquare.com.

Olaide, M. and Adewole, R. (2004). Cyber Crime Embarrassing for Victims. Retrieved September 2011 from http//www.heraldsun.com.au

Olayiwola, A.O. (2007). Procedures in Educational Research. Kaduna, Nigeria: Hanijam Publications, Ahmadu Bello Way.

Olugbodi, K. (2010). Fighting Cyber Crime in Nigeria, Retrieved September 10, 2011 from http://www.guide2nigeria.com/news_articles_about_Nigeria.

Osuala, E.C. (1992). Introduction to Methodology. Nigeria: African Fep Publishers Limited.

Oyesanya, F. (2004). Nigerian Internet 419 On The Loose. Retrieved October 8, 2011 from http://www.nigeriavillagesquare.com.

Oyewole, A.S. and Obeta, A. (2002). An Introduction to Cyber Crime. Retrieved September 2011 from http//www.crime-research.org/articules/cyber-crime.

Pati, P. (2003), Cybercrime. Retrieved from wwwnivi.org.

Planetindia, (2001). Introduction to Cyber Crime. Retrieved October 9, 2011 http://cybercrime.planetindia.net/intro.htm.

Ribadu, N. (2007). Cybercrime and Commercial Fraud: A Nigerian Perspective, A paper presentation at the Modern Law for Global Commerce, Vienna 9-12 July 2007.

Ringwelski, M. (2008). Effects of Cyber Crime. Retrieved from http://www.ehow.com/about_5052659_effects-cyber-crime.html#ixzz1gaX6daue.

Roger, E. (1995). Diffusion of Innovation, Retrieved September 12, 2011 from http://enwikibooks.org/wiki/communication_Theory/Diffusion_of_Innovations.

Rogers M.K. (2001). A Social Learning Theory and Moral Disengagement Analysis of Criminal Computer Behaviour. An Exploratory Study. Winnipeg, Manitoba: University of Manitoba.

Salihu, T. (2006). Impact of Computer Appreciation in Military Technology, A Commandant’s Paper submitted to Nigerian Army School of Military Police, Nigeria. School of Postgraduate Studies.

ABU (2010), Regulations Governing Higher Degree Studies, Nigeria. Nigeria: ABU Press Limited.

Schell, B.H. and Martin, C. (2004). Cybercrime: A Reference Handbook. Santa Barbara, California: ABC-CLIO Inc.

Sesan, G. (2010). The New Security War, retrieved from http://www.pcworld.com/article/122492/the_new_security_war.htm#tk.mod-rel.

Shinder, D.L. (2002). Scene of the Cybercrime: Computer Forensics Handbook. USA: Syngress Publishing Inc.

Tade, O., & Aliyu, I. (2011), Social Organization of Internet fraud among University Undergraduates in Nigeria. International Journal of Cyber Criminology, 5(2), 860-875.

Thomas, D. (2011). Cybercrime in Nigeria, Retrieved September, 2011 from http://www.idgnews,net/

Umar-Ajijola, J, (2010a). Microsoft Combats Cybercrime in Nigeria, retrieved from http://www.pcworld.com/businesscenter/article/205051/cybercrime.

Umar-Ajijola, J. (2010b). Fighting Cybercrime in Nigeria, retrieved from http://blogs.technet.com/b/microsoft_on_theissues_africa/archive/2010/12/9/fighting-cybercrime-in-nigeria-aspx.

Vladimir, G. (2005). International Cooperation in Fighting Cyber Crime, retrieved from www.crimeresearch.org.

Wall, D.S (2001), Crime and The Internet. London: Routledge Publisher.

Wall, D.S. (2007). Cybercrime: The Transformation of Crime in the Information Age. Cambridge, UK: Polity Press.

Yar, M. (2006). Cybercrime and Society. London: Sage Publication Ltd.

Young Media Association (2007). The Internet: Benefits, Danger, and Strategies. Australia: Australia Young Association.

Zero Tolerance (2006), The Portrait of a Yahoo Boy. Economic and Financial Crime Commission, 1(3), 38-39.