COVID-19, Cybercrime Proliferation, and National Security in Nigeria: Evidence from Lagos State Youths
DOI:
https://doi.org/10.25159/2663-6549/16212Keywords:
COVID-19, cybercrime, human security, Routine Activity Theory, victimizationAbstract
That security is a public good is an apophthegm. Insecurity in Nigeria has been exacerbated since the COVD-19 pandemic. This is connected to the proliferation of cybercrime among youths which increased exponentially during the pandemic. This study addresses a lacuna in previous studies by investigating COVID-19 and cybercrime proliferation, cybercrime occasioned by COVID-19, and national security in Nigeria within the frameworks of the human security and routine activity theories. This study adopts a quantitative approach that uses structured questionnaires and interviews. Purposive multistage sampling was used to select 200 youth from 10 wards in Ikeja and Badagry local government areas and data were analyzed using the Pearson correlation coefficient. The findings showed that COVID-19 had a significant relationship with cybercrime proliferation and cybercrime occasioned by COVID-19 significantly affected national security in Nigeria. The increased number of computer users during the pandemic enabled some users to exploit others amid poor cybersecurity to commit cybercrime. The article recommends a reorientation of youth to reduce their susceptibility to crime, the development of cybersecurity policies to reduce the availability of suitable targets, and the empowerment of capable guardians such as the Economic and Financial Crimes Commission.
References
Ahmad, R., and R. Thurasamy. 2022. “A Systematic Literature Review of Routine Activity Theory’s Applicability in Cybercrimes.” Journal of Cyber Security and Mobility 11 (3): 405–432. https://doi.org/10.13052/jcsm2245-1439.1133 DOI: https://doi.org/10.13052/jcsm2245-1439.1133
Akanmu, A., U. Salisu, O. Daramola, A. Ogunsesan, S. Fasina, J. A. Adajare, S. M. Sanni, and O. M. Alatunji. 2021. “The COVID-19 Pandemic and Insecurity: The Furiousness in Nigerian Communities.” Urban Planning and Transport Research 9 (1): 368–406. https://doi.org/10.1080/21650020.2021.1946420 DOI: https://doi.org/10.1080/21650020.2021.1946420
Akinyetun, T. S. 2021. “Poverty, Cybercrime, and National Insecurity in Nigeria.” Journal of Contemporary Sociological Issues 1 (2): 1–23. https://doi.org/10.19184/csi.v1i2.24188 DOI: https://doi.org/10.19184/csi.v1i2.24188
Akinyetun, T. S. 2022. “Crime of Opportunity? A Theoretical Exploration of the Incidence of Armed Banditry in Nigeria.” Insight on Africa 14 (2): 174–192. https://doi.org/10.1177/09750878221079807 DOI: https://doi.org/10.1177/09750878221079807
Akinyetun, T. S. 2023. “From Epidemic to Pandemic: Covid-19, Insecurity and Development in the Sahel.” Africa Development 48 (2): 61–86. https://doi.org/10.57054/ad.v48i2.5080 DOI: https://doi.org/10.57054/ad.v48i2.5080
Akinyetun, T. S., V. C. Ebonine, and I. O. Ambrose. 2023. “Unknown Gunmen and Insecurity in Nigeria: Dancing on the Brink of State Fragility.” Security and Defence Quarterly 42 (2): 16–34. https://doi.org/10.35467/sdq/163462 DOI: https://doi.org/10.35467/sdq/163462
Akinyetun, T. S., J. A. Salau, T. O. Bakare, A. S. Ahoton, J. A. Alausa, and D. D. Odeyemi. 2021. “The Effect of COVID-19 on Youth Unemployment, Cybercrime, and National Security in Nigeria.” African Journal of Sociological and Psychological Studies 1 (1): 31–58. https://doi.org/10.31920/2752-6585/2021/v1n1a2 DOI: https://doi.org/10.31920/2752-6585/2021/v1n1a2
Aladenusi, T. 2020. “Covid-19’s Impact on Cybersecurity.” Deloitte Nigeria. https://www2.deloitte.com/content/dam/Deloitte/ng/Documents/risk/ng-COVID-19-Impact-on-Cybersecurity-24032020.pdf
Alkire, S. 2003. A Conceptual Framework for Human Security. CRISE Working Paper 2. https://assets.publishing.service.gov.uk/media/57a08cf740f0b652dd001694/wp2.pdf
Bello, M., and M. Griffiths. 2021. “Routine Activity Theory and Cybercrime Investigation in Nigeria: How Capable Are Law Enforcement Agencies?” In Rethinking Cybercrime, edited by T. Owen and J. Marshall, 99–120. Cham: Palgrave Macmillan. https://doi.org/10.1007/978-3-030-55841-3_11 DOI: https://doi.org/10.1007/978-3-030-55841-3_11
Bou Sleiman, M., and S. Gerdemann. 2021. “Covid-19: A Catalyst for Cybercrime?” International Cybersecurity Law Review 2 (1): 37–45. https://doi.org/10.1365/s43439-021-00024-9 DOI: https://doi.org/10.1365/s43439-021-00024-9
Cohen, L., and M. Felson. 1979. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44 (4): 588–608. https://doi.org/10.2307/2094589 DOI: https://doi.org/10.2307/2094589
Cybercrimes (Prohibition, Prevention, etc) Act 2015. https://cert.gov.ng/ngcert/resources/CyberCrime__Prohibition_Prevention_etc__Act__2015.pdf
Dajahar, D., and D. Alheri. 2019. “A Theoretical Framework for Human Security in West Africa: An Assessment of the Critical Human Security Theory.” FULafia Journal of Social Sciences 1 (3): 59–70.
Eboibi, F. E. 2017. “A Review of the Legal and Regulatory Frameworks of Nigerian Cybercrimes Act 2015.” Computer Law & Security Review: The International Journal of Technology Law and Practice 33 (5): 700–717. https://doi.org/10.1016/j.clsr.2017.03.020 DOI: https://doi.org/10.1016/j.clsr.2017.03.020
“FBI: Internet Crime Report 2020.” 2021. Computer Fraud & Security, no. 4. https://doi.org/10.1016/S1361-3723(21)00038-5 DOI: https://doi.org/10.1016/S1361-3723(21)00038-5
Finstad, K. 2010. “Response Interpolation and Scale Sensitivity: Evidence against 5-Point Scales.” Journal of Usability Studies 5 (3): 104–110.
Firch, J. 2022. “Cyber Security Statistics: The Ultimate List of Stats, Data & Trends for 2022.” PurpleSec. https://purplesec.us/resources/cyber-security-statistics/
Govender, I., B. Watson, and J. Amra. 2021. “Global Virus Lockdown and Cybercrime Rate Trends: A Routine Activity Approach.” Journal of Physics: Conference Series 1828: 012107. https://doi.org/10.1088/1742-6596/1828/1/012107 DOI: https://doi.org/10.1088/1742-6596/1828/1/012107
Hawdon, J., K. Parti, and T. Dearden. 2020. “Cybercrime in America amid COVID-19: The Initial Results from a Natural Experiment.” American Journal of Criminal Justice 45: 546–562. https://doi.org/10.1007/s12103-020-09534-4 DOI: https://doi.org/10.1007/s12103-020-09534-4
Human Rights Watch. 2021. “Abuse of Cybercrime Measures Taints UN Talks.” Human Rights Watch, 5 May 2021. https://www.hrw.org/news/2021/05/05/abuse-cybercrime-measures-taints-un-talks
International Telecommunication Union. 2020. Global Cybersecurity Index 2020. Switzerland: International Telecommunication Union. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2021-PDF-E.pdf
Khan, S., T. Saleh, M. Dorasamy, N. Khan, O. T. S. Leng, and R. G. Vergara. 2022. “A Systematic Literature Review on Cybercrime Legislation [version 1; peer review: 1 approved].” F1000Research 11: 971. https://doi.org/10.12688/f1000research.123098.1 DOI: https://doi.org/10.12688/f1000research.123098.1
Kumaran, N., and S. Lugani. 2020. “Protecting Businesses against Cyber Threats during COVID-19 and Beyond.” Google Cloud, April 17, 2020. https://cloud.google.com/blog/products/identity-security/protecting-against-cyber-threats-during-covid-19-and-beyond
Miró, F. 2014. “Routine Activity Theory.” In The Encyclopedia of Theoretical Criminology, edited by J. M. Miller, 1–7. New Jersey: Blackwell Publishing Ltd. https://doi.org/10.1002/9781118517390.wbetc198 DOI: https://doi.org/10.1002/9781118517390.wbetc198
“National Cybersecurity Policy.” 2014. https://www.cert.gov.ng/ngcert/resources/national_cybesecurity_strategy.pdf
Obi, C., and A. Kabandula. 2021. “Special Issue on ‘Covid-19, Peace, and Security in Africa: Challenges and Opportunities’.” African Security 14 (4): 307–317. https://doi.org/10.1080/19392206.2021.2028116 DOI: https://doi.org/10.1080/19392206.2021.2028116
Ogbonnaya, M. 2020. “Cybercrime in Nigeria Demands Public-Private Action.” Institute for Security Studies, 19 October 2020. https://issafrica.org/iss-today/cybercrime-in-nigeria-demands-public-private-action
Peters, A. 2021. “Is Covid-19 Changing the Cybercrime Landscape?” In The Covid-19 Pandemic and Trends in Technology: Transformations in Governance and Society, edited by J. Hakmeh, E. Taylor, S. Ignatidou, and A. Peters, 18–27. London: The Royal Institute of International Affairs.
Rossmo, D. K., and L. Summers. 2015. “Routine Activity Theory in Crime Investigation.” In The Criminal Act, edited by M. A. Andresen and G. Farrell, 99–120. London: Palgrave Macmillan. https://doi.org/10.1057/9781137391322_3 DOI: https://doi.org/10.1057/9781137391322_3
Tade, O. 2021. “COVID-‘419’: Social Context of Cybercrime in the Age of COVID-19 in Nigeria.” African Security 14 (4): 460–483. https://doi.org/10.1080/19392206.2021.2004642 DOI: https://doi.org/10.1080/19392206.2021.2004642
Tanaka, A. 2015. Toward a Theory of Human Security. JICA-RI Working Paper No. 91. https://www.jica.go.jp/jica-ri/publication/workingpaper/jrft3q000000267e-att/JICA-RI_WP_No.91.pdf
United Nations. 1994. Human Development Report 1994. Oxford: Oxford University Press. https://hdr.undp.org/system/files/documents//hdr1994encompletenostatspdf.pdf
United Nations Office on Drugs and Crime. 2020. “Cybercrime: The Global Challenge.” https://www.itu.int/ITU-D/cyb/cybersecurity/docs/cybercrime.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright will be vested in Unisa Press. However, as long as you do not use the article in ways which would directly conflict with the publisher’s business interests, you retain the right to use your own article (provided you acknowledge the published version of the article) as follows:
- to make further copies of all or part of the published article for your use in classroom teaching;
- to make copies of the final accepted version of the article for internal distribution within your institution, or to place it on your own or your institution’s website or repository, or on a site that does not charge for access to the article, but you must arrange not to make the final accepted version of the article available to the public until 18 months after the date of acceptance;
- to re-use all or part of this material in a compilation of your own works or in a textbook of which you are the author, or as the basis for a conference presentation.
Accepted 2024-06-12
Published 2024-08-14