Combating cyber crime in Nigeria
Pages | 716-725 |
Published date | 03 October 2008 |
Date | 03 October 2008 |
DOI | https://doi.org/10.1108/02640470810910738 |
Author | Esharenana E. Adomi,Stella E. Igun |
Subject Matter | Information & knowledge management,Library & information science |
Combating cyber crime in Nigeria
Esharenana E. Adomi
Department of Library and Information Science, Delta State University,
Abraka, Nigeria, and
Stella E. Igun
Delta State University Library, Abraka, Nigeria
Abstract
Purpose – The purpose of this paper is to describe cyber crime and techniques adopted for
combating it in Nigeria.
Design/methodology/approach – Reviews the state of cyber crime in Nigeria, and how it is being
stemmed in the country.
Findings – The types of cyber crime in Nigeria are revealed together with the efforts geared towards
combating/preventing cyber crime in the country. The paper also draws attention to the possibility of
libraries that offer public internet access service being victims of cyber crime as well as unknown
perpetrators. The paper recommends how cyber crime can be brought under control.
Originality/value – It reveals factors that contribute to perpetration of cyber crime in Nigeria and
efforts being made to combat it. This will enable various countries, in developing and developed world,
to be sensitized to the menace of cyber crime and take relevant steps to fight against it.
Keywords Communicationtechnologies, Crimes, Nigeria
Paper type General review
Introduction
The information technology (IT) infrastructure is growing rapidly by the day with
more and more people, as well as corporate organizations, adopting them as veritable
tools for commerce, business growth and other purposes. Depending on whose side the
pendulum swings, IT tools may be to people’s advantages or a diss entive, as they often
leave soured tastes on their trails (Aragba-Akpore, 2006a, b). The internet creates
unlimited opportunities for commercial, social, education, political and other activities.
However, the convenience associated with IT and indeed the internet is now being
exploited to serve criminal purpose (Ayantokun, 2006).
Cyber crime refers to unlawful conduct carried out with the use of computers,
electronic and ancillary devices. It involves disruption of network traffic – denial of
service attacks/e-mail bombing, creation/distribution of viruses, identity theft, cyber
stalking, cyber squatting, (Fanawopo, 2004), pornography, extortion, fraud and
impersonation (Awe, 2004). Any unlawful act carried out on the internet is cyber crime.
Pati (2007) classifies the cyber crimes, which can be committed against various groups.
These are:
(1) Against individuals:
.harassment via e-mails;
.cyber-stalking;
The current issue and full text archive of this journal is available at
www.emeraldinsight.com/0264-0473.htm
TEL
26,5
716
Received 8 May 2007
Revised 24 October 2007
Accepted 31 October 2007
The Electronic Library
Vol. 26 No. 5, 2008
pp. 716-725
qEmerald Group Publishing Limited
0264-0473
DOI 10.1108/02640470810910738
To continue reading
Request your trial