Nigeria cybercrime and ICT development And Internet Service Provider
DOI:
https://doi.org/10.18034/ra.v6i1.320Keywords:
Intermediary, ICT, Internet Cybercrime, NigeriaAbstract
The identification of Information and Communication Technology (ICT) as an essential tool for sustainable development has proved to be worth every investment in Nigeria. Unfortunately, ’the ’country’s ’image ’has ’also suffered as a result of the nefarious activities of some Nigerians, who has turn the internet into a cheap ’channel ’for ’the ’perpetration ’of ’criminal activities, ’ranging ’from ’range ’from ’phishing, online ’trickery ’and ’the ’‘Advanced ’Fee ’Fraud (AFF)’ popularly known as ‘419 spam’. At the forefront ’these ’development ’Internet ’Service Providers ’(ISPs). ’Despite ’their ’many ’laudable contributions ’as ’facilitators ’of ’Internet ’usage, ISPs ’serving ’Nigeria ’seem ’to ’stand ’aloof ’or seemingly ’remain ’oblivious ’of ’the ’damaging implications ’resultant ’from ’the ’use ’ ’of ’their infrastructure for online criminal activities. Using questionnaires, ’we ’conducted ’a ’research ’to determine ’the ’level ’of ’awareness ’of ’ISPs ’in Nigeria about intermediary liabilities. The Analysis ’of ’our ’findings ’using ’descriptive statistics ’ ’and ’chi-square ’at ’0.05 ’level ’of significance ’revealed ’that ’the ’level ’of ’security provided against crime by ISPs are relatively low resulting in a positive relationships between the level of internet crime and the attitudes of ISPs to protecting their networks.Downloads
References
Aghatise, E. (2006):Cyber crime Definition. Computer Crime Research Center. June 28, 2006. Available online at www.crime-research.org
Akinola, A. 2006. Cyber criminals on the loose. Punch Newspapers, Wednesday, January 4, 2006
Cooper, A., McLaughlin, I.P., & Campbell, K.M. (2000). Sexuality in cyberspace: update for the 21 century. CyberPsychology & Behavior Vol st34 Pp521–536.
CP80 (2005): Port Channeling Technology: The Next Evolutionary Stage of the Internet. Available online at www.cp80.org.
BCP80 (2007): BEmpowering BFamilies Bon Bthe Internet. Available online at http://www.intgovforum.org/May_contributions/CP8020Foundation contribution.pdf
Geoff, H., Anthony, P., Gopalakrishnan, S. and Manav, M.(2005). Trends in Spam Products and Methods. Conference on e-mail and Antispam . Available online at www.ceas.org
Jonathan Z. (2004): Internet Points of Control, 44 .C.L.RE. 653. Available online at:
Longe, O, Omoruyi, I & Longe, F (2003); Restoring alance to Intellectual Property Laws. Journal of Industrial and Scientific Studies. Vol1, No. 3. pp 6-9
Longe, O.B (2004): Software Protection and
Copyright BIssues Bin BContemporary BInformation Technology. BProceedings Bof Bthe B2B BAnnual ndEngineering Conference, School of Engineering, Auchi Polytechnic, Auchi, Nigeria.
Longe F.A (2004) An Appraisal of Risks Associated With IT Applications. Unpublished Thesis Submitted for the Award of a Master of Technology Degree at the Federal University of Technology, Akure, Nigeria.
Longe, O.B and Longe, F.A. (2004): Trends in Internet Spamming Techniques. Paper Presented at the 5th Annual National Conference of the Academic Staff of Nigerian Polytechnics, 11-13, thSeptember 2004. Bida, Nigeria
Longe, O, Omoruyi, I & Longe, F (2005): Implications of the Nigeria Copyright Law for Software Protection. The Nigerian Academic Forum Multidisciplinary Journal. Vol. 5, No. 1. pp 7-10.
Longe, O.B & Chiemeke, S.C. (2006): The Design and Implementation of An E-Mail Encryptor for Com-bating Internet Spam. Proceedings of the Ist International Conference of the International Institute of Mathematics and Computer Sciences. Pp 1 – 7. Covenant University, Ota, Nigeria. June, 2006
Longe, O., Chiemeke, S., Onifade, O., Balogun, F., Longe, F. and Otti, V.U. (2007a): Exposure of Children and Teenagers To Internet Pornography In South BWestern BNigeria B– BConcerns, BTrends B& Im-plications. JITI, Vol. 7, No. 3. Available online at www.jiti.net.
Longe O.B & Longe F.A (2005): The Nigerian Web Content: Combating the Pornographic Malaise Using Content Filters. Journal of Information Technology Impact, Vol. 5, No. 2, pp. 59-64, 2005
Longe, O. B. 2006. SPAMAng : A domain specific collaborative Antispam for filtering indegeneous 419 mails”. Seminar Paper presented at the Department of Computer Science, University of Benin, Benin City, September, 2006
Longe, O.B, Chiemeke, S.C., Onifade, O.F and Longe, F.A. (2007c): Text manipulations and spamicity measures: implications for designing effective filtering systems for fraudulent 419 scam mails. Paper presented at the International Conference on Adaptive Science and Technology, Accra, Gha-na-10th - 12 th December, 2007. www:home.vicnet.net
Longe O., Onifade O., Chiemeke S., and Longe F.A. (2007d): User Acceptance of Web-Marketing in Nigeria: Significance of Factors. Proceedings of the International Conference on Applied usiness and Eco-nomics. Piraeus, Greece, September, 2007.
Matthew B. , Lee, H. and Arthur, M. Keller (2005): Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot. Proceedings of the In-ternational Conference on E-mail and Antispam, California, July, 2006. Available online at www.ceas.cc
Omolola, BA B(2005): BCyber-fraud BLeads Bto lockage of Nigeria’s Internet protocol Addresses. Lagos: The Punch Newspaper, Wednesday, January 4, 2005.
O’Brien, C. and Vogel, C. 2003. Spam filters: ayes vs. chi-squared; letters vs. words” In ISICT ’03: Proceedings of the 1 International Symposium on st Information and communication technologies. Trinity College Dublin,.
Peter, C, Kenneth, P, Lucasz, M, Tom, P. & Michael, W (2006): SPAMALOT: A Toolkit for Consuming Spammers Resources. Proceedings of the 3 Conference on E-mail and Antispam, July, 2006. rdAvailable online at www.ceas.org.
BRavi, BK. B(1996): BFrontiers Bof BElectronic Commerce. The University of Rochester Addison-Wesley Publishing Company, New York
Smith, R. G., Holmes, M. N. And Kaufmann, P. (1999): Nigerian Advance Fee Fraud., Trends and Issues in Crime and Criminal Justice, No. 121, Australian BInstitute Bof BCriminology, BCanberra (republished in The Reformer February 2000, pp. 17-19). Available online t http://www.aic.gov.au
Sylvester, Linn (2001): The Importance of Victimology in Criminal Profiling. Available online at: http://isuisse.ifrance.com/emmaf/base/impvic.html
Smith, R. G. (2002) .Regulating Professionals in the Digital Age., Crime in the Professions, Ashgate Publishing Ltd, Aldershot, 227-49.
Smith, R. G., Wolanin, N. and Worthington, G. (2003) .e-Crime Solutions and Crime Displacement., in Trends and Issues in Crime and Criminal Justice, No. 243, Australian Institute of Criminology, Canberra.
--0--
Downloads
Published
Issue
Section
License
ABC Research Alert is an Open Access journal. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal the right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of their work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal. We require authors to inform us of any instances of re-publication.