Cybercrimes and Economic Crisis in Nigeria: Essentialising Containment Beyond the Rhetoric

  • Emmanuel U. Awak Department Of General Studies, Akwa Ibom State Polytechnic, Ikot Osurua, Nigeria
Keywords: Cybercrimes, containment, CRAVED, economic crisis, SCP intervention techniques

Abstract

Just as the emergence of Internet and ICT innovates, instigates and transforms all facets of life and sectors of the society; so also, is the tenacity, tempo and geometric penetration of cybercrimes. The devastating consequences including economic doldrum, low gross domestic product (GDP), inclement investment environment, loss of billions and confidence through e-fraud, e-scams, data interception, and system and data interference, among others beckon decisive inhibition. However, slow and ill-implementation of legislation, lack of virtual evidence, knowledge of investigation and parochialism has continued to define most actions to protect the cyberspace. The paper qualitatively through social survey and multi-stage sampling methods examines parameters of cybercrimes as one of the enablers of economic crisis in Nigeria, using Akwa Ibom State as a specific study site. The discourse is shaped within theoretical frame of Situational Crime Prevention (SCP), since its strands are descriptive of the ravaging circumstances of cybercrimes, cybercriminals, and the obtuse and ductile tactics toward containment of cybercrimes. The result indicates that cybercrimes have strangulated the economy, and that its prevalence and spate annihilate germane quest for economic recovery. Therefore, utilisation of data surveillance technologies, SCP intervention techniques, cybercrimes’ awareness and education, intelligence-policing, faithful legislation and implementation are recommended.

References

1. Adepetun, A. (2020, July 9). Nigeria lags behind Mauritius, Ghana and others in cybersecurity ranking. https://m.guardian.ng/technology/nigeria-lags-behind-mauritius-ghana-others-in-cybersecurity-ranking/amp/.
2. Agency Report (2017, August 22). Nigeria ranks 3rd in global internet crimes behind UK, US - NCC. https://www.premiumtimesng.com/news/top-news/241160-nigeria-ranks-3rd- global-internet-crimes-behind-uk-u-s-ncc. Hmtl.
3. Akosile, A. (2005, November 18). $242M scam: Nwude pleads guilty, bags 25 yrs. jail term. In This Day Newspaper (Nigeria), p. 25.
4. Anonymous (2021, February 22). Editorial: Rising cyber fraud in Nigeria and banks’ losses. https://businessday.ng/editorial/article/ rising-cyber-fraud-in-nigeria-and-banks-losses/.
5. Awak, E. U. (2019a). Threats of cybercrimes in Nigeria and the theoretical disposition of RAT (Routine Activity Theory). CEKA International Journal of Social Sciences & Organisational Behaviour, 7(2).
6. Awak, E. U. (2019b). The role of the family and educational institutions in curbing social vices in Nigeria. AKWAPOLY Journal of Communication and Scientific Research, 4(1).
7. Awe, O. (2006, January 4). Cyber fraud leads to blockage of Nigeria’s IP address. In The Punch Newspaper (Nigeria), p. 31.
8. Bowers, K., & Johnson, S. (2005). Using publicity for preventive purposes. In N. Tilley (Ed.), Handbook of Crime Prevention and Community Safety. Willan Publishing.
9. Braga, A., & Kennedy, D. (2012). Linking situational crime prevention and focused deterrence strategies. In N. Tilley & G. Farrell (Eds.), The reasoning criminologist: Essays in honor of Ronald V. Clarke. Routledge.
10. Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime policing. An International Journal of Police Strategies and Management, 29(2), 408-433.
11. Clarke, R. V. G. (1999). Hot products: Understanding, anticipating and reducing the demand forstolen goods. Police Research Series, 98. Home Office.
12. Clarke, R. V. G., & Goldstein, H. (2003). Thefts from cars in center-city parking facilities: A case study in implementing problem-oriented policing. Crime Prevention Studies, 15, 257-298.
13. Clarke, R. V. G., & Newman, G. R. (2005a). Modifying criminogenic products: What role for government? In R. V. G. Clarke & G. R. Newman (Eds.), Designing out crime from products and systems. Crime Prevention Studies, Vol. 18. Willan Publishing.
14. Clarke, R. V. G., & Newman, G. R. (Eds.). (2005b). Designing out crime from products and systems. Crime Prevention Studies, Vol. 18. Willan Publishing.
15. Comer, D. (2006). The Internet Book. Prentice Hall.
16. Eck, J. E., & Madensen, T. (2012). Situational crime prevention makes problem-oriented policing work: The importance of interdependent theories for effective policing. In N. Tilley & G. Farrell (Eds.), The reasoning criminologist: Essays in honour of Ronald V. Clarke (Crime Science Series). Routledge.
17. Ekblom, P. (2012a). Happy returns: Ideas brought back from situational crime prevention’s exploration of design against crime. In N. Tilley & G. Farrell (Eds.), The reasoning criminologist: Essays in honour of Ronald V. Clarke. Routledge.
18. Ekblom, P. (Ed.). (2012b). Design against crime: Crime proofing everyday products. Crime Prevention Studies, Vol. 27. Lynne Rienner Publishers.
19. Edelson, E. (2003). The 419 scam: Information warfare on the spam front and a proposal for local filtering. Computers & Security, 22(5), 392-401.
20. Felson, M. (2008). Routine activity approach. In R. Wortley & L. Mazerolle (Eds.), Environmental criminology and crime analysis, 70-77. Willan Publishing.
21. Freilich, J. D., & Newman, G. R. (2016). Transforming piecemeal social engineering into “grand” crime prevention policy: Toward a new criminology of social control. Journal of Criminal Law and Criminology, 105(1), 209-238.
22. Freilich, J. D., & Newman, G. R. (2017). Situational crime prevention. https://doi.org/10.1093/acrefore/9780190264079.013.3
23. Froehling, O. (1997). The cyberspace war of ink and Internet in Chiapas. The Geographical Review, 87, 291-307.
24. Fuller, J. R. (2005). Criminal Justice: Mainstream and Crosscurrents. Prentice Hall.
25. Furnell, S. (2002). Cybercrime: Vandalizing the Information Society. Addison Wesley.
26. Gantz, J., & Rochester, J. B. (2005). Pirates of the Millennium. Prentice Hall.
27. Gehring, V. V. (2004). The Internet in Public Life. Rowman and Littlefield.
28. Goodin, D. (2008). Fake subpoenas harpoon 2,100 corporate fat cats. The Register. http://www.theregister.co.uk
29. Goodman, M. D. (2001). Making computer crime count. FBI Law Enforcement Bulletin, 27, 31-42.
30. Grabosky, P. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10, 243- 9.
31. Hardie, J., & Hobbs, B. (2005). Partners against crime- the role of the corporate sector in tacking crime. Crime Prevention Studies, 18, 85-140.
32. Hollinger, R. (1988). Computer hackers follow a Guttman-like progression. Social Sciences Review, 72, 199-200.
33. Joseph, J. (2003). Cyberstalking: An International Perspective. In Y. Jewkes (Ed.) Dot.cons:Crime, Deviance and Identity on the Internet. Willan Press.
34. Koziol, J. (2003). Intrusion Detection with Snort. Sams Publishing.
35. Krebs, B. (2006). Flaws in financial sites aid scammers. Security Fix. http://blog.washingtonpost.com/securityfix
36. Marshall, J. A. (1999). Internet crimes encountered by novice surfers. Journal of Industrial Technology, 15(2), 1-5.
37. Mazerolle, L. G., & Roehl, J. (Eds.). (1998). Crime prevention studies, Vol. 9. Special Issue on Civil Remedies and Crime Prevention. Criminal Justice Press.
38. Newman, G. R. (2012). Designing markets for crime reduction. Crime Prevention Studies, 27, 87–106.
39. Rehmeyer, J. J. (2007). Mapping a medusa: The internet spreads its tentacles. Science News, Vol.171, 15.
40. Olokor, F., & Okere, A. (2021, August 29). Thisday disowns fake publication on Uzodinma, seeks culprit’s arrest. https://punchng.com/thisday-disowns-fake-publication-on-uzodinma-seeks- culprits-arrest/
41. Pease, K. (2001). Cracking crime through design. Design Council.
42. Smith, A. D. & Rupp, W. T. (2002). Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers. Information Management & Computer Security,10(4),178-183.
43. Snail, S. (2009). Cybercrime in South Africa–hacking, cracking, and other unlawful online activities. Journal of Information, Law & Technology (JILT), 1, 89-96.
44. Turkle, S. (1995). Life on the Screen: Identity in the Age of the Internet. Simon & Schuster.
45. Ukoka, L., & Awak, E. U. (2016). Professional ethics & social responsibility: The social construction of consciousness for professionals and society. Anikzo Global Ventures.
46. Ukoka, L., & Awak, E. U. (2015). Contemporary research methodologies. Anikzo Global Ventures.
47. Wall, D. S. (2006). Cybercrimes. Polity Press.
48. Wall, D. S. (2003). Mapping out cybercrimes in a cyberspatial surveillant assemblage. In F. Webster and K. Ball (Eds.), The Intensification of Surveillance: Crime Terrorism and Warfare in the Information Age, 112-136. Pluto Press.
49. Wall, D. S. (2001). Cybercrimes and the Internet. In D. Wall (Ed.), Crime and the Internet. Routledge.
50. Yar, M. (2006). Cybercrime and society. Sage.
Published
2022-06-25
How to Cite
Awak, E. U. (2022). Cybercrimes and Economic Crisis in Nigeria: Essentialising Containment Beyond the Rhetoric. International Journal on Economics, Finance and Sustainable Development, 4(6), 121-136. https://doi.org/10.31149/ijefsd.v4i6.3284
Section
Articles