Nigeria cybercrime and ICT development And Internet Service Provider

Authors

  • Yakubu Ajiji Makeri School of Computing and Information Technology, Kampala International University, Uganda

DOI:

https://doi.org/10.18034/ra.v6i1.320

Keywords:

Intermediary, ICT, Internet Cybercrime, Nigeria

Abstract

The identification of Information and Communication Technology (ICT) as an essential tool for sustainable development has proved to be worth every investment in Nigeria.  Unfortunately, ’the ’country’s ’image ’has ’also suffered as a result of the nefarious activities of some Nigerians, who has turn the internet into a cheap ’channel ’for ’the ’perpetration ’of ’criminal activities, ’ranging ’from ’range ’from ’phishing, online ’trickery ’and ’the ’‘Advanced ’Fee ’Fraud (AFF)’ popularly known as ‘419 spam’. At the forefront ’these ’development ’Internet ’Service Providers ’(ISPs). ’Despite ’their ’many ’laudable contributions ’as ’facilitators ’of ’Internet ’usage, ISPs ’serving ’Nigeria ’seem ’to ’stand ’aloof ’or seemingly ’remain ’oblivious ’of ’the ’damaging implications ’resultant ’from ’the ’use ’ ’of ’their infrastructure for online criminal activities. Using questionnaires, ’we ’conducted ’a ’research ’to determine ’the ’level ’of ’awareness ’of ’ISPs ’in Nigeria about intermediary liabilities. The Analysis ’of ’our ’findings ’using ’descriptive statistics ’ ’and ’chi-square ’at ’0.05 ’level ’of significance ’revealed ’that ’the ’level ’of ’security provided against crime by ISPs are relatively low resulting in a positive relationships between the level of internet crime and the attitudes of ISPs to protecting their networks. 

Downloads

Download data is not yet available.

References

Aghatise, E. (2006):Cyber crime Definition. Computer Crime Research Center. June 28, 2006. Available online at www.crime-research.org

Akinola, A. 2006. Cyber criminals on the loose. Punch Newspapers, Wednesday, January 4, 2006

Cooper, A., McLaughlin, I.P., & Campbell, K.M. (2000). Sexuality in cyberspace: update for the 21 century. CyberPsychology & Behavior Vol st34 Pp521–536.

CP80 (2005): Port Channeling Technology: The Next Evolutionary Stage of the Internet. Available online at www.cp80.org.

BCP80 (2007): BEmpowering BFamilies Bon Bthe Internet. Available online at http://www.intgovforum.org/May_contributions/CP8020Foundation contribution.pdf

Geoff, H., Anthony, P., Gopalakrishnan, S. and Manav, M.(2005). Trends in Spam Products and Methods. Conference on e-mail and Antispam . Available online at www.ceas.org

Jonathan Z. (2004): Internet Points of Control, 44 .C.L.RE. 653. Available online at:

Longe, O, Omoruyi, I & Longe, F (2003); Restoring alance to Intellectual Property Laws. Journal of Industrial and Scientific Studies. Vol1, No. 3. pp 6-9

Longe, O.B (2004): Software Protection and

Copyright BIssues Bin BContemporary BInformation Technology. BProceedings Bof Bthe B2B BAnnual ndEngineering Conference, School of Engineering, Auchi Polytechnic, Auchi, Nigeria.

Longe F.A (2004) An Appraisal of Risks Associated With IT Applications. Unpublished Thesis Submitted for the Award of a Master of Technology Degree at the Federal University of Technology, Akure, Nigeria.

Longe, O.B and Longe, F.A. (2004): Trends in Internet Spamming Techniques. Paper Presented at the 5th Annual National Conference of the Academic Staff of Nigerian Polytechnics, 11-13, thSeptember 2004. Bida, Nigeria

Longe, O, Omoruyi, I & Longe, F (2005): Implications of the Nigeria Copyright Law for Software Protection. The Nigerian Academic Forum Multidisciplinary Journal. Vol. 5, No. 1. pp 7-10.

Longe, O.B & Chiemeke, S.C. (2006): The Design and Implementation of An E-Mail Encryptor for Com-bating Internet Spam. Proceedings of the Ist International Conference of the International Institute of Mathematics and Computer Sciences. Pp 1 – 7. Covenant University, Ota, Nigeria. June, 2006

Longe, O., Chiemeke, S., Onifade, O., Balogun, F., Longe, F. and Otti, V.U. (2007a): Exposure of Children and Teenagers To Internet Pornography In South BWestern BNigeria B– BConcerns, BTrends B& Im-plications. JITI, Vol. 7, No. 3. Available online at www.jiti.net.

Longe O.B & Longe F.A (2005): The Nigerian Web Content: Combating the Pornographic Malaise Using Content Filters. Journal of Information Technology Impact, Vol. 5, No. 2, pp. 59-64, 2005

Longe, O. B. 2006. SPAMAng : A domain specific collaborative Antispam for filtering indegeneous 419 mails”. Seminar Paper presented at the Department of Computer Science, University of Benin, Benin City, September, 2006

Longe, O.B, Chiemeke, S.C., Onifade, O.F and Longe, F.A. (2007c): Text manipulations and spamicity measures: implications for designing effective filtering systems for fraudulent 419 scam mails. Paper presented at the International Conference on Adaptive Science and Technology, Accra, Gha-na-10th - 12 th December, 2007. www:home.vicnet.net

Longe O., Onifade O., Chiemeke S., and Longe F.A. (2007d): User Acceptance of Web-Marketing in Nigeria: Significance of Factors. Proceedings of the International Conference on Applied usiness and Eco-nomics. Piraeus, Greece, September, 2007.

Matthew B. , Lee, H. and Arthur, M. Keller (2005): Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot. Proceedings of the In-ternational Conference on E-mail and Antispam, California, July, 2006. Available online at www.ceas.cc

Omolola, BA B(2005): BCyber-fraud BLeads Bto lockage of Nigeria’s Internet protocol Addresses. Lagos: The Punch Newspaper, Wednesday, January 4, 2005.

O’Brien, C. and Vogel, C. 2003. Spam filters: ayes vs. chi-squared; letters vs. words” In ISICT ’03: Proceedings of the 1 International Symposium on st Information and communication technologies. Trinity College Dublin,.

Peter, C, Kenneth, P, Lucasz, M, Tom, P. & Michael, W (2006): SPAMALOT: A Toolkit for Consuming Spammers Resources. Proceedings of the 3 Conference on E-mail and Antispam, July, 2006. rdAvailable online at www.ceas.org.

BRavi, BK. B(1996): BFrontiers Bof BElectronic Commerce. The University of Rochester Addison-Wesley Publishing Company, New York

Smith, R. G., Holmes, M. N. And Kaufmann, P. (1999): Nigerian Advance Fee Fraud., Trends and Issues in Crime and Criminal Justice, No. 121, Australian BInstitute Bof BCriminology, BCanberra (republished in The Reformer February 2000, pp. 17-19). Available online t http://www.aic.gov.au

Sylvester, Linn (2001): The Importance of Victimology in Criminal Profiling. Available online at: http://isuisse.ifrance.com/emmaf/base/impvic.html

Smith, R. G. (2002) .Regulating Professionals in the Digital Age., Crime in the Professions, Ashgate Publishing Ltd, Aldershot, 227-49.

Smith, R. G., Wolanin, N. and Worthington, G. (2003) .e-Crime Solutions and Crime Displacement., in Trends and Issues in Crime and Criminal Justice, No. 243, Australian Institute of Criminology, Canberra.

--0--

Downloads

Published

2018-04-30

How to Cite

Makeri, Y. A. (2018). Nigeria cybercrime and ICT development And Internet Service Provider. ABC Research Alert, 6(1), Uganda. https://doi.org/10.18034/ra.v6i1.320

Issue

Section

Research Paper