Abstract
The development and improvement of the internet with new distinctive features and abilities has widened the access to computer technology and created new opportunities for work and business activities. It has also posed threats to people using it either for business or leisure. According to Brenner (2007), the emergence of technology and electronic communication has brought a far-reaching increase in the incidence of criminal activities. As technology evolves, so does the nature of the crimes committed through the internet. There are numerous crimes of this nature committed daily on the internet. Criminal activity on the Internet is wide-ranging and can include an assortment of offenses such as illegal interception, copyright violation, stalking, money laundering, extortion, fraud, and resource theft involving the illegal use of computers (Broadhurst and Choo 2011). Internet-based cybercrime has become a huge menace threatening the socio-economic and technological advancement of Nigeria. Since the advent of the internet, cybercrime has become a recurring decimal in Nigeria. The main objective of this study is to create more awareness of cybercrime in Nigeria through a bibliometric analysis while enlightening the public on the existence of cybercrimes. The analysis was carried out through software like Harzing, VOSviewer, maxQDA, bibExcel, Mendeley, and Citespace. The software is used to establish rising scope in the field of cybersecurity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aina, L.O.: Research in Information Sciences: An African Perspective, pp. 1–31. Stirling-Horden, Ibadan (2002)
Atili, A.: Want! Law for tackling cybercrime. The Nations Newspaper, p. 41 (2011)
bibExcel. https://homepage.univie.ac.at/juan.gorraiz/bibexcel/
Brenner, S.: Law in an Era of Smart Technology, p. 374. Oxford University Press, Oxford (2007)
Dasuki, E.A.: Why EFCC is losing war on web scam. Vanguard Newspaper, p. 34 (2011)
Doyon-Martin, J.: Cybercrime in West Africa as a result of transboundary e-waste. J. Appl. Secur. Res. 10(2), 207–220 (2015). https://doi.org/10.1080/19361610.2015.1004511
Duffy, B., Duffy, V.: Data mining methodology in support of a systematic review of human aspects of cybersecurity. In: Duffy, V.G. (ed.) HCII 2020. LNCS, vol. 12199, pp. 242–253. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-49907-5_17
Fahimnia, B., Sarkis, J., Davarzani, H.: Green supply chain management: a review and bibliometric analysis. Int. J. Prod. Econ. 162(C), 101–114 (2015). https://doi.org/10.1016/j.ijpe.2015.01.003
Fanawopo, S.: FG moves to enforce cyber crime laws (2004)
Gercke, M.: The slow wake of a global approach against cybercrime. Comput. Law Rev. Int. 2(2), 141 (2006)
Geeks for Geeks. https://www.geeksforgeeks.org/
Greenwald, S.E.: Combating cybercrime in Nigeria. Electron. Libr. 26(5), 716–725 (2014)
Howell, H., Lind, U.: Customs arrest suspected hacker. The Vanguard Newspaper, p. 53 (2009)
Ifukor, M.O.: Cybercrime: a challenge to information and communication technology (ICT). Commun. J. Libr. Inf. Sci. 8(2), 38–49 (2006)
Investopedia. https://www.investopedia.com/
Kifordu, A., Nwankwo, W., Ukpere, W.: The role of public-private partnership on the implementation of national cybersecurity policies: a case of Nigeria. J. Adv. Res. Dyn. Control Syst. 11(8 Special), 1386–1392 (2019)
Kshetri, R.: Africa: a new safe harbor for cybercriminals trend micro incorporated research paper (2010). www.trendmicro.co.uk/media/misc/africa-new-safe-harbor-for-cybercriminals-en.pdf
Laver, N.: Somalia: media law in the absence of a state. Int. J. Media Cult. Polit. 8(2–3), 159–174 (2005)
Lawrence, D.: Strategy. Oxford University Press (2013). ISBN 978-0-19-932515-3
Loader, B.: Cybercrime: law enforcement, security and surveillance in the information age. J. Soc. Policy 30(1), 300 (2000)
Maitanmi, O.S.: Impact of cyber crimes on Nigerian economy. Int. J. Eng. Sci. (IJES) 2(4), 4551 (2013)
Mendeley. https://www.mendeley.com/?interaction_required=true
Moore, H.: Examining factors that influence a Youth’s potential to become a victim of online harassment. Int. J. Cyber Criminol. 4(1 and 2), 685–698 (2005). http://www.cybercrimejournal.com/mooreetal2010ijcc
NSF. https://nsf.gov/
Nwankwo, W., Ukaoha, K.C.: Socio-technical perspectives on cybersecurity: Nigeria’s cybercrime legislation in review. Int. J. Sci. Technol. Res. 8(10), 47–58 (2019)
Odunfa, A.: Nigeria: report on cyber threat calls for quick passage of bill (2014). http://www.allafrica.com/stories/201405080279.Html
Okeshola, F.B.: The nature, causes and consequences of cyber crime in tertiary institutions in Zaria-Kaduna State, Nigeria. Am. Int. J. Contemp. Res. 3(9), 98–114 (2013)
Okon, P., Kayode-Adedeji, T., Afolayan, T.-A., Iruonagbe, C.: Cybersecurity awareness among rural communities in Sango Ota, Ogun State, Nigeria. In: 14th International Conference on Cyber Warfare and Security, ICCWS 2019, pp. 294–303 (2019)
Onwuka, E.N., Afolayan, D.O., Abubakar, W., Ibrahim, J.I.: Survey of on-line risks faced by internet users in the Nigerian telecommunication space. In: CEUR Workshop Proceedings, vol. 1830, pp. 28–33 (2016)
Roger, L.B.: Second Edition Safety and Health (2006)
Scopus. https://www.scopus.com/search/form.uri?display=basic&zone=header&origin=#basic
Steffani, M.: Cyber security analysis of Turkey. Int. J. Inf. Secur. Sci. 1(4), 112–125 (2006)
Stremlau, G., Osman, W.: The privacy privilege: law enforcement, technology and the constitution. J. Technol. Law Policy 7, 123 (2015)
Veresha, R.V.: Preventive measures against computer related crimes: approaching an individual. Informatologia 51(3–4), 189–199 (2018). https://doi.org/10.32914/i.51.3-4.7
Vincintas. https://www.vicinitas.io/
VOSviewer. https://www.vosviewer.com/
Wada, T., Longe D.A., Paul, S., Danquah, O.R.: Action speaks louder than words – understanding cyber criminal behavior using criminological theories. J. Internet Bank. Commer. 17(1), 1 (2012)
Waziri, F.: Antigraft campaign: the war, the worries. The Punch, 1st March 2009, p. 1 (2009)
Weaver, C.: Principles of Cybercrime, 2nd edn. Cambridge University Press, Cambridge (1998)
Web of Science. http://login.webofknowledge.com
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Enebechi, M.O., Enebechi, C.N., Duffy, V.G. (2021). A Bibliometric Analysis on Cybercrime in Nigeria. In: Stephanidis, C., et al. HCI International 2021 - Late Breaking Papers: Design and User Experience. HCII 2021. Lecture Notes in Computer Science(), vol 13094. Springer, Cham. https://doi.org/10.1007/978-3-030-90238-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-90238-4_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90237-7
Online ISBN: 978-3-030-90238-4
eBook Packages: Computer ScienceComputer Science (R0)