0% found this document useful (0 votes)
86 views18 pages

An Appraisal of Youths Cyber Crime in Nigeria

Uploaded by

patrickarua01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views18 pages

An Appraisal of Youths Cyber Crime in Nigeria

Uploaded by

patrickarua01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

AN APPRAISAL OF YOUTHS’ CYBERCRIME IN NIGERIA:

CHALLENGES AND PROSPECTS


BY

Aminu Jafaru, Department of Sociology, Ahmadu Bello University, Zaria. [email protected]

Aminu Zubairu Surajo, Department of Social Development, School of Rural Technology and
Entrepreneurship Development, Rano, Kano State Polytechnic. [email protected]

Saudat Habibu Aliyu, Department of Social Development, School of Rural Technology and
Entrepreneurship Development, Rano, Kano State Polytechnic. [email protected]

Samira Muhammad Sabo, Department of Social Development, School of Rural Technology and
Entrepreneurship Development, Rano, Kano State Polytechnic. [email protected]

Muhammad Aliyu Dalhatu, Department of Social Development, School of Rural Technology


and Entrepreneurship Development, Rano, Kano State Polytechnic. [email protected]

Being a paper presented at 3rd International Conference & Doctoral Colloquium organized by the
Faculty of Management Sciences, Bayero University, Kano at Dantata Business School, BUK
New Site from Tuesday, 10th January to Thursday 12th, January, 2023.

1
Abstract
The paper focuses on youths’ involvement in cybercrime. Computers and internet usage are basic
essential utilities that assist people’s life. Sadly, Some Nigerian youths have turned cyberspace
into an arena for committing criminal activities. Cybercrime in Nigeria is divided into the
following; Internet frauds, software piracy, hacking, online scam, ATM or Credit card fraud,
virus dissemination, phishing, cyberstalking, and cyber-defamation. The present study aims at
identifying the causes of cybercrime by the youths, the effect of cybercrime on peace and
security of the country and the role of the government in addressing the problem of cybercrime.
The study used a mixed method of data. This involved use of questionnaires and in-depth
interviews. Therefore, three research questions and two hypotheses were formulated to guide the
study. A total of 278 participants was utilised for the study and stratified random sampling
technique was used to select the participants for the questionnaire. Similarly, 12 participants
were engaged in an interview and purposive sampling was employed in the interview. The
instruments used are self designed questionnaire tagged Youths Cybercrime Questionnaire
(YCQ). The questionnaire has a reliability coefficient of 0.82. The t-test at 0.05 level of
significance was used in testing the null hypotheses. The findings indicated that there is a
significant relationship between youth involvement in cybercrime and social problems. The
results show that the causes of cybercrime are a high rate of urbanization, unemployment, harsh
economic condition, bad educational systems and weak implementation of cybercrime laws. The
effect of cybercrime includes decreasing competitive edge of organizations, destroys the
country’s image and productivity losses and rising cost. Therefore, government plays an
important role in bringing a lasting solution to the problem.

Key words: computer, cybercrime, fraud, internet, youths,

1
1.0 Introduction
Crime is viewed as a serious social problem threatening every human society. In Nigeria, crime
patterns have changed from civil and capital crime to cybercrime. Cybercrime is a crime carried
out with the aid of Information and Communication Technology (ICT) tools (Shehu, 2017). It
refers to any unlawful behaviour committed by means of a computer system or network,
including illegal possession and offering or distributing information through a computer system
or network (Folashade et al, 2018).

Cybercrime has become a global problem and has caused immense loss to both businesses and
individuals globally. Several studies and documents have examined the costs and losses caused
by cybercrime globally (Tade and Aliyu, 2021). Most cybercrimes are carried out by the youths
in order to be able to generate earnings for cybercriminals, others are carried out against
computer devices directly to harm or disable them, at the same time as others use computers or
network to spread malware, illegal information, images or other materials (Umo, 2020).

Notably, cybercrimes are of different classes in Nigeria; they comprise of internet frauds;
hacking; software piracy; pornography; credit score card or ATM fraud; denial of service attack;
virus dissemination; phishing; cyber-plagiarism; cyber-stalking and cyber-defamation (Umana,
2015). The majority of the cybercrimes perpetrated in Nigeria generally are targeted at
individuals and not necessarily computer systems, hence they require less technical expertise.
The damage done manifests itself in the real world (Abdulhamid et al, 2021). Human
weaknesses such as greediness, idleness and carelessness are generally exploited. The damage
done is largely psychological and financial. These crimes are similar to theft, and the likes that
have existed for centuries, even before the development of high-tech equipment. Through the
internet, the same criminals or persons with criminal intents have simply been given a tool which
increases their potential pool of victims and make them all the harder to trace and apprehend
(Coomson, 2019).

The challenge in fighting cybercrimes today relates to the fact that cybercrimes have been in
existence for only as long as the Global Information Infrastructure exists. This explains the
unpreparedness of society and the world in general towards combating them. Numerous crimes
are committed daily on the Internet with Nigerians at the forefront of sending fraudulent and

2
false financial proposals all over the world. Criminals that involve in the Advance Fee Fraud
schemes (419) are now popularly referred to as “yahoo-yahoo” in Nigeria (Adeniran, 2018).

Therefore, it is against this background that the paper will find out the causes of cybercrime by
the youths, the effect of cybercrime on peace and security of the country as well as the role of the
government in solving the problem.

1.1 Objectives
The study aims to achieve the following objectives:
▪ To analyse the causes of cybercrime by the youths.
▪ To examine the effect of cybercrime on peace and security of the country.
▪ To identify the role of the government in addressing the problem of cybercrime.

1.2 Research Questions


The fundamental questions that require investigation are:
▪ What are the causes of cybercrime by the youths?
▪ How did cybercrime affect peace and security of the country?
▪ What is the role of the government in addressing the problem of cybercrime?

1.3 Hypothesis
The two null hypotheses were formulated to guide the study as follows:
H01: There is no significant relationship between youth involvement in cybercrime and social
problems.
H02: There is no significant difference of the motives of cybercriminals to defraud innocent
victims.

2.0 Literature Review

2.1 The nature and dynamics of cybercrime in Nigeria

The usage of the internet is growing daily in Nigeria and is associated with the increasing

availability of broadband connections due to the advent of mobile telecommunications and

3
decrease in the subscription fee. Today, most Nigerians and their business are registered on

several social networking platforms (Ajewole, 2020).

The prevalence of cybercrime in Nigeria is worrisome not only for the citizens of the country,

but for the government, as the image of the country is tarnished as a result of this menace

(Hassan et al, 2018). The nature of cybercrime in Nigeria is continually evolving with the

emergence of new technologies. Therefore, Jaishankar (2021) posits that most cyber criminals in

Nigeria use the computer and the internet as a tool to defraud and harm others instead of

targeting the computers. He argues that this is so because Nigerians are yet to develop their

technical knowledge to accommodate, perpetrate and target cybercrimes.

Cybercrimes in Nigeria are largely perpetrated by young men popularly called yahoo-

boys. Most of these youths are undergraduates of Nigerian universities where they involved in

hacking, cloning and defrauding unsuspecting victims using tools such as password cracker, key

loggers, network sniffers, port scanners, vulnerability scanners, exploits and so on (Longe and

Chiemeke, 2018). As an underworld criminal activity, cyber criminals in Nigeria plan their

executions in some details, as their perpetrations are deliberate with their victim-system or

network pre-chosen and identified deliberately and not randomly. Their targets are usually the

gullible, avaricious, and inexperienced and those desperate for quick money, love or

relationships (Martins, 2020).

2.2 Types of Cybercrimes in Nigeria

According to Kshetri (2019), cybercrimes in Nigeria are categorized into the followings:

2.2.1 Cyber Stalking: This kind of crime is generally considered as the use of internet, email or

other electronic communications device to stalk or harass a person. Cyber stalking is a form of

harassment or intimidation that makes use of modern technology like cell phones and other

4
devices to pursue their victims. The intimidation may be in the form of sharing nude pictures of a

victim and posted it to the public.

2.2.2 Cybersquatting: The Cybersquatting involves any person who intentionally takes or

makes use of a name, business name, trademark, domain name or other word or phrase

registered, owned or in use by any individual, body corporate or belonging to either Federal,

State or local governments in Nigeria, on the internet or any other computer network for their

own personal benefit.

2.2.3 Internet Pornography: This involves the use of the web for sexual abuse. It has been

found that internet pornography is a disturbing trend, especially among the youths. It also

involves using the internet to download and transmit pornographic pictures, photos, writings etc.

Similarly, prostitutes now advertise their trade via internet by exposing their sensitive, sensual

and private parts to internet users.

2.2.4 Identity Theft and Impersonation: This refers to the criminal act of fraudulently

obtaining and using another person’s identity in the form of impersonation. These acts can be

carried out without the use of technical means as well as online by using internet technology. A

computer’s internet Protocol Address can be hijacked by what is known as Cyber Bullying. Also

Media Coverage, Surveys, Online Voting Systems, Social Security Numbers and Online

Payment Systems are major targets.

2.2.5 Phishing: This is a term coined by hackers who initiate legitimate companies in e-mails to

entice people to share passwords or credit card numbers. This term comes from the fact that

internet scammers are using increasingly sophisticated lures as they “fish” for “user” financial

information and password data. One common ploy is to copy the web page code from a major

site and use that code to set up a replica page that appears to be part of the company’s site. A

5
fake e-mail is sent out with a link to this page which solicits the user’s credit and data or

password when it is submitted. It sends the data to the customer while leaving the user on the

computer site.

2.2.6 ATM/Credit Card Fraud: Automated Teller Machine (ATM) is an electronic cash

dispensing machine which came to reduce the stress and trouble bank customers often encounter

while trying to withdraw cash from their respective accounts or even to check their account

balance. This machine has grown beyond the traditional role mentioned above. Through ATM

card, one can purchase items online. ATM fraud is perpetuated through ATM machines and e-

transaction system. Annually customers who have credit card numbers, lost large sums of money

to cybercriminals stolen from online databases. At times, the criminals steal the PIN of the users

and with their cards, use them to withdraw all the money in their accounts.

2.2.7 Cyber Piracy: This may also be described as intellectual property violations. Digital

technology has made it very easy to perfectly copy creative products such as music or films and

the internet provides a free and anonymous means of transmitting or exchanging these pirated

materials around the world. Cyber piracy refers to the use of internet to copy a digital document

without authorization. Some examples include: copying and distributing music or video without

the copyright holder’s permission or copying software onto a CD without paying for it.

2.2.8 Cyber Hacking: Cyber hacking is a term used to describe cybercrimes such as illegal

access, defacing, hijacking, bombing, denial of service attack, diddling super zapping,

eavesdropping, etc. Some internet users think that hacking is harmless fun and even quite clever,

but it can be a serious invasion of privacy and a significant threat to e-commerce.

2.2.9 Illegal E-lotteries: The quest to get rich quick by most Nigerians is often exploited by

online criminals who send all kinds of unsolicited and tempting messages of an existing lottery

6
bonanza (though factitious), where participants can win all sorts of items and money-ranging

from cars, houses, electronics, laptop, to mention but a few. This form of cybercrime is rampant

in Nigeria. The victim may be ask to deposit a certain amount of money to an anonymous bank

account or give bank sensitive information like BVN number, Account number, ATM card

number or pin with the pretext that the winner will receive bank alert, after winning the E-

lottery.

2.3 Theoretical Explanation


Several studies related to cybercrime have been acknowledged and different perspectives on
cybercrime has been clarified. These perspectives are important in providing the nature and
causes of youth cybercrime based on the perceptions and opinions of some schools of thought.

The routine activities theory was propounded by Cohen and Felson in 1979. The theory points
out the nexus between three variables that reflect the routine activities of a crime prone
community or society. The motivation to commit crime and the supply of offenders is constant.
That is, in every society, there are some people who are willing to break the law for gain,
revenge, greed or some other motives (Siegel, 1992). Greed and gain from both perpetrators and
victims has made cybercrimes to thrive in Nigeria. The relevance of this theory to this study is
that, it provides a simple and powerful insight into factors that aid cybercrimes in higher
institutions of learning. At its heart is the idea that in the absence of effective controls, offenders
will prey upon attractive targets.

Differential association theory was propounded by Edwin H. Sutherland in 1939. The theory is
based on the premise that criminal or deviant behaviour is a learned phenomenon (Bosiakoh and
Andoh, 2020). The theory posits that, exposure to criminal association and definitions favourable
to criminal tendencies motivates a person to take to criminal activities. These of course depend
on the communication patterns, frequency, duration, priority and intensity of learning. In
Nigeria’s higher institutions, those who engage themselves in "Yahoo-yahoo" or internet fraud
usually learn this pattern of crime from their affiliates through social interaction. For Sutherland

7
(1956), cyber criminals may not have been born criminals, they apparently learn how to carry out
these nefarious acts through constant contacts and interaction with other existing criminals.

Finally, the rational-choice theory of crime was propounded by Derek Cornish and Ronald
Clarke in 1986. The theory is anchored holistically on the crime scenario involving the
perpetrator, his or her impetus and the act, (Adler et al, 1995). For Cornish and Clarke (1986),
crime only occurs when a criminal has rationalized between different options, taking into
consideration his/her costs and benefits before making a choice with certain criteria. According
to them, before committing cyber theft, a cybercriminal may consider the following: (a) The
pool of victims made possible by ICT and the porous nature of Internet (b) His or her
proficiency in executing the crime (c) The financial gains involved (d) The available
technicality (e) The period it will take to perpetrate the crime (f) The possibility of being caught
(g) If caught, the weight of the punishment (Adler et al, 1995).

3.0 Methodology
The paper employed mixed method of data collection as a research design. Therefore the data
was sourced through questionnaires which were administered to the youths currently studying in
Kano tertiary institutions of learning such as Yusuf Maitama Sule University Kano, Federal
College of Education Kano, Kano State Polytechnic and Sa’adatu Rimi College of Education
Kumbotso. Similarly, the research was supplemented by a face to face interview with 1 2
participants. The questionnaires included both closed and open ended questions. The
researchers employed the service of the research assistants to help the participants to answer the
questionnaires. Similarly, the interview administered, gave the researcher the opportunity to
have face to face discussions with the participants and also ask follow-up questions that are not
contained in the interview schedule.

The questionnaires and interview schedule are the instruments used for data collection. The
questionnaire was developed by the researchers and tagged the Youths Cybercrime Questionnaire
(YCQ). Equally, the interview schedule comprises of the demographic information of the
participants as well as the questions designed for the participants on youth cybercrime in Nigeria.
Additionally, the in-depth interview conducted was semi-structured. The researchers employ
purposive sampling as a technique for selecting participants for the interview in order to provide

8
the desired information by knowing the minds, opinions, attitudes and feelings of the
participants. The ideal population of the study consists of one thousand (1000) youths. The
sample size for this research work are drawn from the ideal population and the research tolerates
5% margin error, thus 278 samples were used for the study based on the sample size
determination of Krejcie and Morgan (1970). To ensure gender equality, one hundred and thirty
nine (139) participants from both males and females were used to make a total of two hundred
and seventy eight (278) participants. The stratified random sampling technique was used for the
administration of the questionnaires and all the questionnaires were returned by the participants.
The instrument was validated by the experts in the area of measurement and evaluation to ensure
content validity. Meanwhile the reliability of the instrument was based on the Cronbach Alpha
which produced reliability co-efficient of 0.82. The result showed that the instrument was good
enough to be used. The data collected from the participant questionnaires were analysed using t-
test analysis. While for the interview, the data collected were analysed using thematic analysis.

4.0 Discussion of Results


The results of the study are based on the data collected from the two instruments used in this
research (i.e. Questionnaires and interview protocol).
4.1 Results
The two null hypotheses were tested using the t-test analysis below:

Hypothesis 1 (H01): There is no significant relationship between youth involvement in


cybercrime and social problems.

Table 1: Showing the t-test analysis between youth involvement in cybercrime and social
problems.
Variables N X SD DF t.cal. t.crit. Decision
Youth
involvement in
cybercrime 192 2.63 1.17
276 6.034 0.136 Significant

Social problems 86 1.80 0.72

The data in table one above indicated that the calculated t-test value of 6.034 is greater than the
critical t-test value of 0.136 at 0.05 level of confidence. This implies that the null hypothesis

9
which stated that there is no significant relationship between youth involvement in cybercrime
and social problems, is rejected.

Hypothesis 2 (H02): There is no significant difference of the motives of cybercriminals to


defraud innocent victims.

Table 2: Showing the t-test analysis of the motives of cybercriminals to defraud innocent
victims.

Variables N X SD DF t.cal. t.crit. Decision


Motives of
cybercriminals 176 2.78 1.22 Not
276 0.148 0.843 Significant
Innocent victims 102 2.66 1.18

The result in table two above shows that the calculated t-test value of 0.148 is less than the
critical t-test value of 0.843 at 0.05 level of confidence. This implies that the null hypothesis
which stated that there is no significant difference of the motives of cybercriminals to defraud
innocent victims, is accepted.
In addition to that, the results of the interview gathered were presented and analysed. The
views of the participants were examined based on the following subheadings:

The causes of cybercrime by the youths:


The participants gave their opinions on the causes of cybercrime by the youths. The themes that
emerged from the participant's explanation includes: high rate of urbanization, unemployment,
harsh economic condition, bad educational systems and weak implementation of cybercrime
laws. Participant one (R1) mentions that high rate of urbanization leads to cybercrime by the
youths. He further stated that:
Urbanization involves massive physical growth of urban areas as a result of
rural-urban migration in search for a better life. Due to education and the
emergence of information technology, youths find it lucrative to invest in
cybercrime because it is a business that requires less capital to invest.

While participant two (R2) explains that unemployment leads to cybercrime. She added that:

10
Cybercrime is associated with unemployment. A lot of cybercriminals are
unemployed youths who use their time and knowledge as a platform for their
criminal activity, in order to improve their livelihood and to make ends meet.

Similarly, participant three (R3) narrates that harsh economic condition is another cause of youth
cybercrime. He added that:
Economic conditions in a country represent a state of the economy that
involves a persistent increase in unemployment, insecurity, youth restiveness,
low output, slow economic growth, collapses in oil prices and a reduction in
the standard of living of Citizens.

In the same direction, another participant (R4) confirmed that bad educational systems were
among the causes of youth cybercrime. He revealed that:
Education in Nigeria suffers from several challenges, including poor funding,
inadequate classrooms, and teaching aids, a paucity of quality teachers and a
poor learning environment. All these led to students’ dropout and their
subsequent involvement in cybercrime.

Finally, participant five (R5) declares that weak implementation of cybercrime laws leads to
cybercrime by the youths. He further stated that:
It saddens that Nigeria continues to experience the great effects of cybercrime.
Internet fraud appears to be an everyday job of some Nigerians owing to weak
implementation of cybercrime laws by agencies managing the Act's operation.

The effect of cybercrime on peace and security of the country:


The participants gave their opinions on the effects of cybercrime on peace and security of the
country. The themes that emerged from the participants clarification on the effects of cybercrime
comprises of the decreasing competitive edge of organizations, destroys the country’s image and
productivity losses and rising cost. Therefore, participant one (R1) narrates that decreasing
competitive edge of organizations is one of the effects of cybercrime on peace and national
security. He continues that:
An organization can lose its competitive advantage and suffer losses when a
hacker steals its confidential information and future plans and sells it to a
competitors. So, time spent to rectify this harmful incident caused by cyber
criminals could have been used to earn profit for the organization.

Similarly, participant two (R2) reiterated that youth cybercrime in Nigeria bring damage to the
image of the country. She confirmed that:

11
Cybercrime tarnishes a country’s image. Once a country is labeled as a
harbor for cybercrime activities, potential investors are cautious in investing
in such countries.

In the same direction, participant three (R3) opined that one of the effects of cybercrime on
peace and national security is productivity losses and rising cost. She further stated that:
Cybercrime reduces the productivity of an organization, because businesses
take measures by securing their networks from the viruses and malware. The
organizations buy security software to reduce the chances of attacks. This
consumes time, increases overhead cost and reduces profit margins.

The role of the government in addressing the problem of cybercrime:


The participants gave their opinions on the role of the government in addressing the problem of
cybercrime. The themes that emerged from the participants explanation on the role of the
government in addressing the problem includes: provision of an effective legal framework on
cybercrime, provision of intensive training for law enforcement agencies on ICT, creation of job
opportunities for the unemployed youths, Setting up programmes by various tiers of
governments aimed at re-orientating the youths towards positive thinking.

Therefore, participant four (R4) narrates that one of the roles of the government is to provide
effective legal framework on cybercrime. He continues that:
There is the need for the government to provide an effective and
comprehensive legal, regulatory and institutional framework for the
prohibition and detection of cybercrimes in Nigeria. The legal framework
needs to be constantly reviewed to align with dynamic nature of the cyber
environment.

Similarly, participant five (R5) opined that another role of the government in addressing the
problem of cybercrime is to provide intensive training for law enforcement agencies on ICT. She
further stated that:
Government needs to empower graduates through the provision of intensive
training for law enforcement agencies on Information and Communication
Technology to enable them track down cyber criminals.

In the same direction, another participant six (R6) confirmed that creation of job opportunities
for the unemployed youths is another role of the government in addressing the problem of
cybercrime. He revealed that:

12
There is the need for the government to create job opportunities for the
unemployed youths, to enable them become busy. Because, there is a popular
saying “Idle mind is the devil’s workshop”

Finally, participant seven (R7) declares that the government has a greater role to play in
addressing the problem of cybercrime, by setting up programmes aimed at re-orientating the
youths towards positive thinking. He further stated that:
The social impact of cybercrimes is so critical that various tiers of
governments have to come up with different programmes to rescue youths as
future leaders. Several initiatives directed at protecting the interests of
Nigerians in the cyberspace have to be put in place.

4.2 Discussions

The findings of the study revealed that, the causes of cybercrime by the youths are the high rate
of urbanization, unemployment and harsh economic condition. This is similar to the findings of
Warner (2017) which insists that the activities of cybercrime are motivated by the influx of
youths to the urban city where it is lucrative to be established. It’s surprising to note that
youths travel out of Nigeria to other countries for a hideout location to carry out their
nefarious activities without an easy trace. Youths in Nigeria find it difficult to get white-collar
jobs, therefore canvass for any means of survival.

Similarly, the study observes that the effects of cybercrime on peace and security of the country
comprises of the decreasing competitive edge of organizations, destroys the country’s image and
productivity losses and rising cost. This is akin to the findings of Aransiola and Asindemade
(2021) which insist that cybercrime leads to the erosion of confidence in genuine Nigerian
commercial credibility and today many western countries have denied legitimate Nigerian
businessmen and women, the rewards of e-commerce. In the same direction, this coincides with
the findings of Adeniran (2018) which believe that the majority of cybercriminals use electronic
e-mails, normally spam to defraud their victims. This involves sending sinister and deceptive e-
mails using gmail, yahoo mail and the likes. In the same way, Ani (2021) believes that cybercrime
attacks led to the upsurges in overhead cost and lower productivity of an organization. It also led
to the consumption of network resources and the cost in human time because, more attention
would be paid toward deleting unwanted messages.

13
The findings of the study also revealed that government play an important role in addressing the
problem of cybercrime. This relates to the findings of Omodunbi et al, (2016) which observe that
the government has a vital role to play in providing a lasting solution to the problem of cyber
criminals and help the country regain her international reputation and promote the Nigerian
economy. Regulating the abusive usage of the internet, will go a long way to check the excesses
of cyber risk. The government of Nigeria can relate to advanced international bodies to establish
enforcement agencies to regulate and checkmate cyber activities across the board.

5.0 Conclusion and Recommendations


The rising spate of cybercrime globally and its attendant negative consequences has continued to
call for immediate actions. As technology advances, new methods are used to perpetrate cyber
related crimes. Nigeria is not immune to these attacks. Cybercrime is no doubt providing a dent
on Nigeria's image which remains a crucial source of national embarrassment for the country.
The fear of cybercrime has made several persons to avoid the use of ICT. This has a negative
impact on the welfare of the citizenry and investors.

There is therefore the need to take proactive steps to curb the menace. Cybercrime poses a great
risk to the economy, hence the need to institute an effective risk management system and
enhancement of the capacity to carry out forensic investigation to tackle it. Also, collaborative
efforts of governments, corporate entities and the citizenry could play a vital role in checking
cybercrimes. Cyberspace is a challenging environment that is fast and continuously evolving.
Hence, the challenge is for those charged with the responsibility of security in various quarters to
be abreast of developments in the cyber world. The economic vitality and national security
largely depend on a stable, safe and resilient cyberspace.

However, the paper made certain recommendations on youth involvement in cybercrime, with
the aim of providing a permanent solution to the problem in order to attain national security. The
paper recommended as follows:
1. Establish a computer emergency response unit.
2. Initiate the cybersecurity unit in all sections of the country.

14
3. Encourage national capacity building on cyber-attack.
4. Adopt intensive cybercrime legislation and threat counter measures nationwide.
5. Provide measures to reduce national vulnerability and protect national infrastructure.

References:

Abdulhamid, S.M, Haruna, C. and Abubakar, A. (2021) Cybercrimes and the Nigeria Academic
Institution Networks. The IUP Journal of Information Technology. Vol VII No 1. pp11.

Adeniran, A. (2018). The Internet and Emergence of Yahoo boys sub-Culture in Nigeria.
International Journal of Cyber Criminology (IJCC) 2 (2), 368–381.
Adeniran, A.I. (2018). The internet and emergence of cybercrime in Nigeria. International
Journal of Cyber Criminology 2(2), 368-381.

Adler, F., Mueller, G.O.W and Laufer, W.S. (1995). Criminology (2nd Eds.). New York:
McGraw Hill Inc.

Ajewole, A. (2020). Curbing Cybercrime in Nigeria. Fighting the Masked Enemy and Promoting
Productive Alternative for the Youth. Retrieved October 8, 2011 from
http/www.primopdf.com.

Ajewole, A. (2020). Curbing Cybercrime in Nigeria. Fighting the Masked Enemy and Promoting
Productive Alternative for the Youth. Retrieved October 8, 2011 from
http/www.primopdf.com.

Ani, L. (2021). Cybercrime and national security: The role of the penal and procedural law and
Security in Nigeria. African journal of e-crime, Vol. 1. 200-202.
Aransiola, J., and Asindemade, S. (2021). Understanding Cyber Crime Perpetrators and the
Strategies they employ in Nigeria. Cyber-psychology, Behavior, and Social Networking,
14(12), pp.759-63.
Azeez, N. A. and Osunade, O. (2019). Toward ameliorating cybercrime and cyber security.
International Journal of Computer Science Security (IJCSS), Vol. 3, No.1.P.9-10.

Balogun, V. F. and Olumide, O.O. (2020). E-Crime in Nigeria: trends, tricks, and treatment.
Pacific Journal of science and Technology. Available online at:
http;//www.akamaiuniversity.us/pJsT.html.

Bosiakoh, T. A. and Andoh, P. K. (2020). Differential association theory and juvenile


delinquency in Ghana’s capital city-Accra: the case of Ghana Borstal Institute.
International Journal of Sociology and Anthropology. 2.9: 198-205.

15
Coomson, J. (2019). Cyber Crimes in Ghana. Ghanaian Chronicle, 4 October 2006,
from http://allafrica.com/stories/200610040856.html
Cornish, D. and Clarke, R. (1986). The Reasoning Criminal. New York. Springer press.

Folashade B. Okeshola, O. and Abimbola K. A. (2018). The Nature, Causes and Consequences
of Cybercrime in Tertiary Institutions in Zaria-Kaduna State, Nigeria. American
International Journal of Contemporary Research Vol. 3 No. 9

Hassan, A. B. Lass, F. D. and Makinde, J. (2018). Cybercrime in Nigeria: Causes, Effects and
the Way Out. ARPN Journal of Science and Technology.

Jaishankar, K. (2021). The Future of Cyber Criminology: Challenges and


Opportunities. International Journal of Cyber Criminology 4, 26–31.

Krejcie, R.V and Morgan, D. W (1970). Determining sample size for research activities.
Educational and Psychological Measurement Vol. 30, pp. 607-610

Kshetri, N. (2019) Cybercrime and Cybersecurity in Africa, Journal of Global Information


Technology Management, 22:2, 77-81, DOI: 10.1080/1097198X.2019.1603527

Longe O.S. and Chiemeke S.C. (2018). Cyber Crime and Criminality in Nigeria. What Roles are
Internet Access Points in Playing? European Journal Social Sciences Vol 6, No 4, pp 132-
139

Martins, J. O. (2020). Cyber Crime in Nigeria: The Implication on our Economy and Social
Image. Retrieved from http://www.acta-pac.org on the 17th of July, 2020.
Omodunbi, P. A. Odiase, P. O. Olaniyan, O. M and Esan, A. O. (2016) Cybercrime in Nigeria,
Analysis, Detection, and Prevention
http://engineering.fuoye.edu.ng/journal/index.php/engineer/article/download/16/pdf

Shehu A.Y (2017): Emerging Issues in Cybercrime: Causes, Implications and Effects for the
Legal Profession. Online Journal of Social Sciences Research Volume 3,
Issue 7, pp 169180. ISSN 2277-0844.
Siegel, L. T. (1992). Criminology: theories, patterns and typologies. Fourth edition. New York,
West publishing company.

Sutherland, E. H. (1956). The Professional Thief. University of Chicago Press.

Tade, O. and Aliyu, I. (2021). Social Organisation of Cybercrime among University


Undergraduates in Nigeria. International Journal of Cyber Criminology 5, 860–875.

Tade, O. and Aliyu, I. (2021). Social organization of internet fraud among University
Undergraduates in Nigeria. International Journal of Cybercrime 6 (3): 420-448.

Umana, K. (2015) Forms and Types of Cyber Crimes in Nigeria.


https://researchcyber.com/forms-types-cyber-crimes-nigeria/

16
Umo, G. G. (2020): Cyber Threats: Implications for Nigeria’s National Interest, Retrieved
from https://docs.google.com/file/d/0B9sby6N_v5O3M2FlNWIzZjgtMDRiOS00NjI1
LThmMjItNmI0Nzg5NGVlNTM2/edit?num=50andsort=nameandlayout=listandpli=1

Warner, J. (2017). Understanding Cybercrime in Ghana: A View from Below. International


Journal of Cyber-Criminology 5(1), 736–749.

17

You might also like