An Appraisal of Youths Cyber Crime in Nigeria
An Appraisal of Youths Cyber Crime in Nigeria
Aminu Zubairu Surajo, Department of Social Development, School of Rural Technology and
Entrepreneurship Development, Rano, Kano State Polytechnic. [email protected]
Saudat Habibu Aliyu, Department of Social Development, School of Rural Technology and
Entrepreneurship Development, Rano, Kano State Polytechnic. [email protected]
Samira Muhammad Sabo, Department of Social Development, School of Rural Technology and
Entrepreneurship Development, Rano, Kano State Polytechnic. [email protected]
Being a paper presented at 3rd International Conference & Doctoral Colloquium organized by the
Faculty of Management Sciences, Bayero University, Kano at Dantata Business School, BUK
New Site from Tuesday, 10th January to Thursday 12th, January, 2023.
1
Abstract
The paper focuses on youths’ involvement in cybercrime. Computers and internet usage are basic
essential utilities that assist people’s life. Sadly, Some Nigerian youths have turned cyberspace
into an arena for committing criminal activities. Cybercrime in Nigeria is divided into the
following; Internet frauds, software piracy, hacking, online scam, ATM or Credit card fraud,
virus dissemination, phishing, cyberstalking, and cyber-defamation. The present study aims at
identifying the causes of cybercrime by the youths, the effect of cybercrime on peace and
security of the country and the role of the government in addressing the problem of cybercrime.
The study used a mixed method of data. This involved use of questionnaires and in-depth
interviews. Therefore, three research questions and two hypotheses were formulated to guide the
study. A total of 278 participants was utilised for the study and stratified random sampling
technique was used to select the participants for the questionnaire. Similarly, 12 participants
were engaged in an interview and purposive sampling was employed in the interview. The
instruments used are self designed questionnaire tagged Youths Cybercrime Questionnaire
(YCQ). The questionnaire has a reliability coefficient of 0.82. The t-test at 0.05 level of
significance was used in testing the null hypotheses. The findings indicated that there is a
significant relationship between youth involvement in cybercrime and social problems. The
results show that the causes of cybercrime are a high rate of urbanization, unemployment, harsh
economic condition, bad educational systems and weak implementation of cybercrime laws. The
effect of cybercrime includes decreasing competitive edge of organizations, destroys the
country’s image and productivity losses and rising cost. Therefore, government plays an
important role in bringing a lasting solution to the problem.
1
1.0 Introduction
Crime is viewed as a serious social problem threatening every human society. In Nigeria, crime
patterns have changed from civil and capital crime to cybercrime. Cybercrime is a crime carried
out with the aid of Information and Communication Technology (ICT) tools (Shehu, 2017). It
refers to any unlawful behaviour committed by means of a computer system or network,
including illegal possession and offering or distributing information through a computer system
or network (Folashade et al, 2018).
Cybercrime has become a global problem and has caused immense loss to both businesses and
individuals globally. Several studies and documents have examined the costs and losses caused
by cybercrime globally (Tade and Aliyu, 2021). Most cybercrimes are carried out by the youths
in order to be able to generate earnings for cybercriminals, others are carried out against
computer devices directly to harm or disable them, at the same time as others use computers or
network to spread malware, illegal information, images or other materials (Umo, 2020).
Notably, cybercrimes are of different classes in Nigeria; they comprise of internet frauds;
hacking; software piracy; pornography; credit score card or ATM fraud; denial of service attack;
virus dissemination; phishing; cyber-plagiarism; cyber-stalking and cyber-defamation (Umana,
2015). The majority of the cybercrimes perpetrated in Nigeria generally are targeted at
individuals and not necessarily computer systems, hence they require less technical expertise.
The damage done manifests itself in the real world (Abdulhamid et al, 2021). Human
weaknesses such as greediness, idleness and carelessness are generally exploited. The damage
done is largely psychological and financial. These crimes are similar to theft, and the likes that
have existed for centuries, even before the development of high-tech equipment. Through the
internet, the same criminals or persons with criminal intents have simply been given a tool which
increases their potential pool of victims and make them all the harder to trace and apprehend
(Coomson, 2019).
The challenge in fighting cybercrimes today relates to the fact that cybercrimes have been in
existence for only as long as the Global Information Infrastructure exists. This explains the
unpreparedness of society and the world in general towards combating them. Numerous crimes
are committed daily on the Internet with Nigerians at the forefront of sending fraudulent and
2
false financial proposals all over the world. Criminals that involve in the Advance Fee Fraud
schemes (419) are now popularly referred to as “yahoo-yahoo” in Nigeria (Adeniran, 2018).
Therefore, it is against this background that the paper will find out the causes of cybercrime by
the youths, the effect of cybercrime on peace and security of the country as well as the role of the
government in solving the problem.
1.1 Objectives
The study aims to achieve the following objectives:
▪ To analyse the causes of cybercrime by the youths.
▪ To examine the effect of cybercrime on peace and security of the country.
▪ To identify the role of the government in addressing the problem of cybercrime.
1.3 Hypothesis
The two null hypotheses were formulated to guide the study as follows:
H01: There is no significant relationship between youth involvement in cybercrime and social
problems.
H02: There is no significant difference of the motives of cybercriminals to defraud innocent
victims.
The usage of the internet is growing daily in Nigeria and is associated with the increasing
3
decrease in the subscription fee. Today, most Nigerians and their business are registered on
The prevalence of cybercrime in Nigeria is worrisome not only for the citizens of the country,
but for the government, as the image of the country is tarnished as a result of this menace
(Hassan et al, 2018). The nature of cybercrime in Nigeria is continually evolving with the
emergence of new technologies. Therefore, Jaishankar (2021) posits that most cyber criminals in
Nigeria use the computer and the internet as a tool to defraud and harm others instead of
targeting the computers. He argues that this is so because Nigerians are yet to develop their
Cybercrimes in Nigeria are largely perpetrated by young men popularly called yahoo-
boys. Most of these youths are undergraduates of Nigerian universities where they involved in
hacking, cloning and defrauding unsuspecting victims using tools such as password cracker, key
loggers, network sniffers, port scanners, vulnerability scanners, exploits and so on (Longe and
Chiemeke, 2018). As an underworld criminal activity, cyber criminals in Nigeria plan their
executions in some details, as their perpetrations are deliberate with their victim-system or
network pre-chosen and identified deliberately and not randomly. Their targets are usually the
gullible, avaricious, and inexperienced and those desperate for quick money, love or
According to Kshetri (2019), cybercrimes in Nigeria are categorized into the followings:
2.2.1 Cyber Stalking: This kind of crime is generally considered as the use of internet, email or
other electronic communications device to stalk or harass a person. Cyber stalking is a form of
harassment or intimidation that makes use of modern technology like cell phones and other
4
devices to pursue their victims. The intimidation may be in the form of sharing nude pictures of a
2.2.2 Cybersquatting: The Cybersquatting involves any person who intentionally takes or
makes use of a name, business name, trademark, domain name or other word or phrase
registered, owned or in use by any individual, body corporate or belonging to either Federal,
State or local governments in Nigeria, on the internet or any other computer network for their
2.2.3 Internet Pornography: This involves the use of the web for sexual abuse. It has been
found that internet pornography is a disturbing trend, especially among the youths. It also
involves using the internet to download and transmit pornographic pictures, photos, writings etc.
Similarly, prostitutes now advertise their trade via internet by exposing their sensitive, sensual
2.2.4 Identity Theft and Impersonation: This refers to the criminal act of fraudulently
obtaining and using another person’s identity in the form of impersonation. These acts can be
carried out without the use of technical means as well as online by using internet technology. A
computer’s internet Protocol Address can be hijacked by what is known as Cyber Bullying. Also
Media Coverage, Surveys, Online Voting Systems, Social Security Numbers and Online
2.2.5 Phishing: This is a term coined by hackers who initiate legitimate companies in e-mails to
entice people to share passwords or credit card numbers. This term comes from the fact that
internet scammers are using increasingly sophisticated lures as they “fish” for “user” financial
information and password data. One common ploy is to copy the web page code from a major
site and use that code to set up a replica page that appears to be part of the company’s site. A
5
fake e-mail is sent out with a link to this page which solicits the user’s credit and data or
password when it is submitted. It sends the data to the customer while leaving the user on the
computer site.
2.2.6 ATM/Credit Card Fraud: Automated Teller Machine (ATM) is an electronic cash
dispensing machine which came to reduce the stress and trouble bank customers often encounter
while trying to withdraw cash from their respective accounts or even to check their account
balance. This machine has grown beyond the traditional role mentioned above. Through ATM
card, one can purchase items online. ATM fraud is perpetuated through ATM machines and e-
transaction system. Annually customers who have credit card numbers, lost large sums of money
to cybercriminals stolen from online databases. At times, the criminals steal the PIN of the users
and with their cards, use them to withdraw all the money in their accounts.
2.2.7 Cyber Piracy: This may also be described as intellectual property violations. Digital
technology has made it very easy to perfectly copy creative products such as music or films and
the internet provides a free and anonymous means of transmitting or exchanging these pirated
materials around the world. Cyber piracy refers to the use of internet to copy a digital document
without authorization. Some examples include: copying and distributing music or video without
the copyright holder’s permission or copying software onto a CD without paying for it.
2.2.8 Cyber Hacking: Cyber hacking is a term used to describe cybercrimes such as illegal
access, defacing, hijacking, bombing, denial of service attack, diddling super zapping,
eavesdropping, etc. Some internet users think that hacking is harmless fun and even quite clever,
2.2.9 Illegal E-lotteries: The quest to get rich quick by most Nigerians is often exploited by
online criminals who send all kinds of unsolicited and tempting messages of an existing lottery
6
bonanza (though factitious), where participants can win all sorts of items and money-ranging
from cars, houses, electronics, laptop, to mention but a few. This form of cybercrime is rampant
in Nigeria. The victim may be ask to deposit a certain amount of money to an anonymous bank
account or give bank sensitive information like BVN number, Account number, ATM card
number or pin with the pretext that the winner will receive bank alert, after winning the E-
lottery.
The routine activities theory was propounded by Cohen and Felson in 1979. The theory points
out the nexus between three variables that reflect the routine activities of a crime prone
community or society. The motivation to commit crime and the supply of offenders is constant.
That is, in every society, there are some people who are willing to break the law for gain,
revenge, greed or some other motives (Siegel, 1992). Greed and gain from both perpetrators and
victims has made cybercrimes to thrive in Nigeria. The relevance of this theory to this study is
that, it provides a simple and powerful insight into factors that aid cybercrimes in higher
institutions of learning. At its heart is the idea that in the absence of effective controls, offenders
will prey upon attractive targets.
Differential association theory was propounded by Edwin H. Sutherland in 1939. The theory is
based on the premise that criminal or deviant behaviour is a learned phenomenon (Bosiakoh and
Andoh, 2020). The theory posits that, exposure to criminal association and definitions favourable
to criminal tendencies motivates a person to take to criminal activities. These of course depend
on the communication patterns, frequency, duration, priority and intensity of learning. In
Nigeria’s higher institutions, those who engage themselves in "Yahoo-yahoo" or internet fraud
usually learn this pattern of crime from their affiliates through social interaction. For Sutherland
7
(1956), cyber criminals may not have been born criminals, they apparently learn how to carry out
these nefarious acts through constant contacts and interaction with other existing criminals.
Finally, the rational-choice theory of crime was propounded by Derek Cornish and Ronald
Clarke in 1986. The theory is anchored holistically on the crime scenario involving the
perpetrator, his or her impetus and the act, (Adler et al, 1995). For Cornish and Clarke (1986),
crime only occurs when a criminal has rationalized between different options, taking into
consideration his/her costs and benefits before making a choice with certain criteria. According
to them, before committing cyber theft, a cybercriminal may consider the following: (a) The
pool of victims made possible by ICT and the porous nature of Internet (b) His or her
proficiency in executing the crime (c) The financial gains involved (d) The available
technicality (e) The period it will take to perpetrate the crime (f) The possibility of being caught
(g) If caught, the weight of the punishment (Adler et al, 1995).
3.0 Methodology
The paper employed mixed method of data collection as a research design. Therefore the data
was sourced through questionnaires which were administered to the youths currently studying in
Kano tertiary institutions of learning such as Yusuf Maitama Sule University Kano, Federal
College of Education Kano, Kano State Polytechnic and Sa’adatu Rimi College of Education
Kumbotso. Similarly, the research was supplemented by a face to face interview with 1 2
participants. The questionnaires included both closed and open ended questions. The
researchers employed the service of the research assistants to help the participants to answer the
questionnaires. Similarly, the interview administered, gave the researcher the opportunity to
have face to face discussions with the participants and also ask follow-up questions that are not
contained in the interview schedule.
The questionnaires and interview schedule are the instruments used for data collection. The
questionnaire was developed by the researchers and tagged the Youths Cybercrime Questionnaire
(YCQ). Equally, the interview schedule comprises of the demographic information of the
participants as well as the questions designed for the participants on youth cybercrime in Nigeria.
Additionally, the in-depth interview conducted was semi-structured. The researchers employ
purposive sampling as a technique for selecting participants for the interview in order to provide
8
the desired information by knowing the minds, opinions, attitudes and feelings of the
participants. The ideal population of the study consists of one thousand (1000) youths. The
sample size for this research work are drawn from the ideal population and the research tolerates
5% margin error, thus 278 samples were used for the study based on the sample size
determination of Krejcie and Morgan (1970). To ensure gender equality, one hundred and thirty
nine (139) participants from both males and females were used to make a total of two hundred
and seventy eight (278) participants. The stratified random sampling technique was used for the
administration of the questionnaires and all the questionnaires were returned by the participants.
The instrument was validated by the experts in the area of measurement and evaluation to ensure
content validity. Meanwhile the reliability of the instrument was based on the Cronbach Alpha
which produced reliability co-efficient of 0.82. The result showed that the instrument was good
enough to be used. The data collected from the participant questionnaires were analysed using t-
test analysis. While for the interview, the data collected were analysed using thematic analysis.
Table 1: Showing the t-test analysis between youth involvement in cybercrime and social
problems.
Variables N X SD DF t.cal. t.crit. Decision
Youth
involvement in
cybercrime 192 2.63 1.17
276 6.034 0.136 Significant
The data in table one above indicated that the calculated t-test value of 6.034 is greater than the
critical t-test value of 0.136 at 0.05 level of confidence. This implies that the null hypothesis
9
which stated that there is no significant relationship between youth involvement in cybercrime
and social problems, is rejected.
Table 2: Showing the t-test analysis of the motives of cybercriminals to defraud innocent
victims.
The result in table two above shows that the calculated t-test value of 0.148 is less than the
critical t-test value of 0.843 at 0.05 level of confidence. This implies that the null hypothesis
which stated that there is no significant difference of the motives of cybercriminals to defraud
innocent victims, is accepted.
In addition to that, the results of the interview gathered were presented and analysed. The
views of the participants were examined based on the following subheadings:
While participant two (R2) explains that unemployment leads to cybercrime. She added that:
10
Cybercrime is associated with unemployment. A lot of cybercriminals are
unemployed youths who use their time and knowledge as a platform for their
criminal activity, in order to improve their livelihood and to make ends meet.
Similarly, participant three (R3) narrates that harsh economic condition is another cause of youth
cybercrime. He added that:
Economic conditions in a country represent a state of the economy that
involves a persistent increase in unemployment, insecurity, youth restiveness,
low output, slow economic growth, collapses in oil prices and a reduction in
the standard of living of Citizens.
In the same direction, another participant (R4) confirmed that bad educational systems were
among the causes of youth cybercrime. He revealed that:
Education in Nigeria suffers from several challenges, including poor funding,
inadequate classrooms, and teaching aids, a paucity of quality teachers and a
poor learning environment. All these led to students’ dropout and their
subsequent involvement in cybercrime.
Finally, participant five (R5) declares that weak implementation of cybercrime laws leads to
cybercrime by the youths. He further stated that:
It saddens that Nigeria continues to experience the great effects of cybercrime.
Internet fraud appears to be an everyday job of some Nigerians owing to weak
implementation of cybercrime laws by agencies managing the Act's operation.
Similarly, participant two (R2) reiterated that youth cybercrime in Nigeria bring damage to the
image of the country. She confirmed that:
11
Cybercrime tarnishes a country’s image. Once a country is labeled as a
harbor for cybercrime activities, potential investors are cautious in investing
in such countries.
In the same direction, participant three (R3) opined that one of the effects of cybercrime on
peace and national security is productivity losses and rising cost. She further stated that:
Cybercrime reduces the productivity of an organization, because businesses
take measures by securing their networks from the viruses and malware. The
organizations buy security software to reduce the chances of attacks. This
consumes time, increases overhead cost and reduces profit margins.
Therefore, participant four (R4) narrates that one of the roles of the government is to provide
effective legal framework on cybercrime. He continues that:
There is the need for the government to provide an effective and
comprehensive legal, regulatory and institutional framework for the
prohibition and detection of cybercrimes in Nigeria. The legal framework
needs to be constantly reviewed to align with dynamic nature of the cyber
environment.
Similarly, participant five (R5) opined that another role of the government in addressing the
problem of cybercrime is to provide intensive training for law enforcement agencies on ICT. She
further stated that:
Government needs to empower graduates through the provision of intensive
training for law enforcement agencies on Information and Communication
Technology to enable them track down cyber criminals.
In the same direction, another participant six (R6) confirmed that creation of job opportunities
for the unemployed youths is another role of the government in addressing the problem of
cybercrime. He revealed that:
12
There is the need for the government to create job opportunities for the
unemployed youths, to enable them become busy. Because, there is a popular
saying “Idle mind is the devil’s workshop”
Finally, participant seven (R7) declares that the government has a greater role to play in
addressing the problem of cybercrime, by setting up programmes aimed at re-orientating the
youths towards positive thinking. He further stated that:
The social impact of cybercrimes is so critical that various tiers of
governments have to come up with different programmes to rescue youths as
future leaders. Several initiatives directed at protecting the interests of
Nigerians in the cyberspace have to be put in place.
4.2 Discussions
The findings of the study revealed that, the causes of cybercrime by the youths are the high rate
of urbanization, unemployment and harsh economic condition. This is similar to the findings of
Warner (2017) which insists that the activities of cybercrime are motivated by the influx of
youths to the urban city where it is lucrative to be established. It’s surprising to note that
youths travel out of Nigeria to other countries for a hideout location to carry out their
nefarious activities without an easy trace. Youths in Nigeria find it difficult to get white-collar
jobs, therefore canvass for any means of survival.
Similarly, the study observes that the effects of cybercrime on peace and security of the country
comprises of the decreasing competitive edge of organizations, destroys the country’s image and
productivity losses and rising cost. This is akin to the findings of Aransiola and Asindemade
(2021) which insist that cybercrime leads to the erosion of confidence in genuine Nigerian
commercial credibility and today many western countries have denied legitimate Nigerian
businessmen and women, the rewards of e-commerce. In the same direction, this coincides with
the findings of Adeniran (2018) which believe that the majority of cybercriminals use electronic
e-mails, normally spam to defraud their victims. This involves sending sinister and deceptive e-
mails using gmail, yahoo mail and the likes. In the same way, Ani (2021) believes that cybercrime
attacks led to the upsurges in overhead cost and lower productivity of an organization. It also led
to the consumption of network resources and the cost in human time because, more attention
would be paid toward deleting unwanted messages.
13
The findings of the study also revealed that government play an important role in addressing the
problem of cybercrime. This relates to the findings of Omodunbi et al, (2016) which observe that
the government has a vital role to play in providing a lasting solution to the problem of cyber
criminals and help the country regain her international reputation and promote the Nigerian
economy. Regulating the abusive usage of the internet, will go a long way to check the excesses
of cyber risk. The government of Nigeria can relate to advanced international bodies to establish
enforcement agencies to regulate and checkmate cyber activities across the board.
There is therefore the need to take proactive steps to curb the menace. Cybercrime poses a great
risk to the economy, hence the need to institute an effective risk management system and
enhancement of the capacity to carry out forensic investigation to tackle it. Also, collaborative
efforts of governments, corporate entities and the citizenry could play a vital role in checking
cybercrimes. Cyberspace is a challenging environment that is fast and continuously evolving.
Hence, the challenge is for those charged with the responsibility of security in various quarters to
be abreast of developments in the cyber world. The economic vitality and national security
largely depend on a stable, safe and resilient cyberspace.
However, the paper made certain recommendations on youth involvement in cybercrime, with
the aim of providing a permanent solution to the problem in order to attain national security. The
paper recommended as follows:
1. Establish a computer emergency response unit.
2. Initiate the cybersecurity unit in all sections of the country.
14
3. Encourage national capacity building on cyber-attack.
4. Adopt intensive cybercrime legislation and threat counter measures nationwide.
5. Provide measures to reduce national vulnerability and protect national infrastructure.
References:
Abdulhamid, S.M, Haruna, C. and Abubakar, A. (2021) Cybercrimes and the Nigeria Academic
Institution Networks. The IUP Journal of Information Technology. Vol VII No 1. pp11.
Adeniran, A. (2018). The Internet and Emergence of Yahoo boys sub-Culture in Nigeria.
International Journal of Cyber Criminology (IJCC) 2 (2), 368–381.
Adeniran, A.I. (2018). The internet and emergence of cybercrime in Nigeria. International
Journal of Cyber Criminology 2(2), 368-381.
Adler, F., Mueller, G.O.W and Laufer, W.S. (1995). Criminology (2nd Eds.). New York:
McGraw Hill Inc.
Ajewole, A. (2020). Curbing Cybercrime in Nigeria. Fighting the Masked Enemy and Promoting
Productive Alternative for the Youth. Retrieved October 8, 2011 from
http/www.primopdf.com.
Ajewole, A. (2020). Curbing Cybercrime in Nigeria. Fighting the Masked Enemy and Promoting
Productive Alternative for the Youth. Retrieved October 8, 2011 from
http/www.primopdf.com.
Ani, L. (2021). Cybercrime and national security: The role of the penal and procedural law and
Security in Nigeria. African journal of e-crime, Vol. 1. 200-202.
Aransiola, J., and Asindemade, S. (2021). Understanding Cyber Crime Perpetrators and the
Strategies they employ in Nigeria. Cyber-psychology, Behavior, and Social Networking,
14(12), pp.759-63.
Azeez, N. A. and Osunade, O. (2019). Toward ameliorating cybercrime and cyber security.
International Journal of Computer Science Security (IJCSS), Vol. 3, No.1.P.9-10.
Balogun, V. F. and Olumide, O.O. (2020). E-Crime in Nigeria: trends, tricks, and treatment.
Pacific Journal of science and Technology. Available online at:
http;//www.akamaiuniversity.us/pJsT.html.
15
Coomson, J. (2019). Cyber Crimes in Ghana. Ghanaian Chronicle, 4 October 2006,
from http://allafrica.com/stories/200610040856.html
Cornish, D. and Clarke, R. (1986). The Reasoning Criminal. New York. Springer press.
Folashade B. Okeshola, O. and Abimbola K. A. (2018). The Nature, Causes and Consequences
of Cybercrime in Tertiary Institutions in Zaria-Kaduna State, Nigeria. American
International Journal of Contemporary Research Vol. 3 No. 9
Hassan, A. B. Lass, F. D. and Makinde, J. (2018). Cybercrime in Nigeria: Causes, Effects and
the Way Out. ARPN Journal of Science and Technology.
Krejcie, R.V and Morgan, D. W (1970). Determining sample size for research activities.
Educational and Psychological Measurement Vol. 30, pp. 607-610
Longe O.S. and Chiemeke S.C. (2018). Cyber Crime and Criminality in Nigeria. What Roles are
Internet Access Points in Playing? European Journal Social Sciences Vol 6, No 4, pp 132-
139
Martins, J. O. (2020). Cyber Crime in Nigeria: The Implication on our Economy and Social
Image. Retrieved from http://www.acta-pac.org on the 17th of July, 2020.
Omodunbi, P. A. Odiase, P. O. Olaniyan, O. M and Esan, A. O. (2016) Cybercrime in Nigeria,
Analysis, Detection, and Prevention
http://engineering.fuoye.edu.ng/journal/index.php/engineer/article/download/16/pdf
Shehu A.Y (2017): Emerging Issues in Cybercrime: Causes, Implications and Effects for the
Legal Profession. Online Journal of Social Sciences Research Volume 3,
Issue 7, pp 169180. ISSN 2277-0844.
Siegel, L. T. (1992). Criminology: theories, patterns and typologies. Fourth edition. New York,
West publishing company.
Tade, O. and Aliyu, I. (2021). Social organization of internet fraud among University
Undergraduates in Nigeria. International Journal of Cybercrime 6 (3): 420-448.
16
Umo, G. G. (2020): Cyber Threats: Implications for Nigeria’s National Interest, Retrieved
from https://docs.google.com/file/d/0B9sby6N_v5O3M2FlNWIzZjgtMDRiOS00NjI1
LThmMjItNmI0Nzg5NGVlNTM2/edit?num=50andsort=nameandlayout=listandpli=1
17