Cybercrime: Responding Sensibly in the Age of Uncertainty

Akpan Abasiama G., Eneji Samuel E.

Abstract


Cybercrime is now threatening the very existence of Information Technology critical infrastructure, the greatest human innovation after the industrial revolution. Wrong value system has been identified as key factor encouraging cybercrime in Nigeria and the desire to get rich quick without working for it.  Cyber crime is complex and committed mostly from remote locations making it difficult to police. The absence of enabling law makes policing even more difficult.  This paper has proposed several recommendations including the fact that the National Orientation Agency should shift focus to national re-orientation of the psyche of the whole population and particularly the youths in post-primary and tertiary institutions and to parents, towards raising crop of children with strong religious training, belief and trust in God as well as the infusion of religious training in the curriculum of our educational system at all levels. Cyber-security awareness training should now constitute part of the school curriculum. Government-Private sector partnership should be formed to develop appropriate strategies towards cyber crime monitoring, control and prevention. This is the responsibility of all citizens - government, private sector and individuals.  The paper contends that if action is not taken urgently, Nigeria will head towards self-destruct and the African continent may turn out to become a desolate colony!

Full Text:

PDF

References


Osuagwu O.E. (2007, 2008) Global Internet Terrorism & Fraud Pandemic: E-Commerce Bottlenecks and the Challenge of Computer Forensics, M.S/PhD Dissertation, American Heritage University of Southern California, San Bernardino, California.

Osuagwu O.E. (2008) Software Engineering: A Pragmatic and Technical Perspective, Olliverson Industrial Publishing House, (OIPH) Owerri, Nigeria, pp.478-499

Osuagwu O.E. (2008) Insight into the New Frontiers of Computer Forensics & Cyber-Criminality ( with Case Studies), OIPH, Owerri, Nigeria.

Osuagwu O.E. et.al. (2007) Blocking Credit Card Fraud via Biometric Authentication Systems, Proceedings of the International Conference of the Nigeria Computer Society, Concord Owerri June 2007

U.S. Federal Trade Commission (FTC)

A U.S. FTC survey released in September 2003

www.Incardtechnologies.com

Computer crime, October 2006 Number 271 Page 2

2002/03 British Crime Survey

Osuagwu O.E. et.al. (2007) Blocking Credit Card Fraud via Biometric Authentication Systems, Proceedings of the International Conference of the Nigeria Computer Society, Concord Owerri June 2007

http://www.webopedia.com/term/c/cyber_FORENSICS.htm http://www.iwar.org.uk/cip/resources/pcipb/cyberstrategy.htm “2003 Computer Crime and Security Survey,” Federal Bureau of Investigation, J. Edgar Hoover Building, 935 Pennsylvania Avenue, NW, Washington, D.C. 20535-0001, 2003.

Ken Baiman (2006).

Robbins, Judd,(20040) “An Explanation of Computer Forensics,” National Forensics Center, 774 Mays Blvd. #10 143, Incline Village, NV 89451, 2004 [The Computer Forensics Expert Expert Witness Network, 472 Scenic Drive, Ashland,OR] (©2004, National Forensics Center. All rights reserved), 2001.

Vacca, John R.(2002), The Essential Guide to Storage Area Networks, Prentice Hall, New York, 2002

Alfred C. Weaver (2006) Biometric authentication, Computer Feb 2006.

Anil K. Jain & Sharathchandra Pankanti (2006) A Touch of Money, IEEE Spectrum July 2006.

Willie D. Jones (2006) Blood Test – Vascular Patterns Provide New Means of Identification and Authentication. IEEE Spectrum

Federal Ministry of Justice (2004) IT Bill 2004

Noblett, Michael G., Pollitt, Mark M., and presley, Lawrence A. (2002) Recovering and Examining computer Forensic Evidence, US. Department of Justice, Federal Bureau of Investigation, Forensic Science Communications, Vol. 2, No. 4 (www.Fbi.gov).

Nelson, Bill, Phillips, Amelia, Enfinger, Frank, and Steward, Chris (2004), Guide to Computer Forensics and Investigations Thomson, Course Technology, Boston.

New Technologies, Inc (Forensics-intl.com).

Rude, Thomas, (2000) Guidance Seizure Methodology for Computer Forensics, http://www.crazy nights.com/seizure.html.

Wolfe, Henry B., (2003). Computers and Security, El Servier Science, Ltd., pp. 26-28 (www.sciencedirect.com).

http://www.protegga.com/services.html.

Osuagwu O.E., Anyanwu E. (2003) Management of Information Technology at Periods of Technological Discontinuity, OIPH, Owerri, Nigeria, p.23.

FIB Anthrax Report (2001)

https://www.securitymetrics.com/docs/IDSWhitepaper.pdf

Osuagwu O.E. Ogiemien T & Okide S (2010) Deploying Forensics Science & Technology for Resolving National Cyber-Security Challenges, International Journal of Mathematics & Technology, Azibijan, Russia, August 2010.

ChiChao Lu, Wen Yuan Jen & Weiping Chang, Shihchieh Chou(2006), Journal of Computers, Vol. 1. No. 6, Sept. 2006, Academicy Publisher, USA.

Denise Marcia Chatam (2007) The Study on Cybercrime’s Impact in the Workplace, Campus Technology, USA. URL

Whitney, S. (2004, December 1). Trend turns, more purchase coverage for cybercrime. Best’s Review, 105(8):90. Oldwick, NJ: A.M. Best Co. Inc.

Williams, P. (2002). Organized crime and cybercrime: Implications for business.Retrieved electronically October 15, 2007, from URL: http://www.cert.org/archive/pdf/cybercrimebusiness.pdf#search='FBI%20cyber%20crime%20profit'.

Bigelow, B. V. (2005, February 3). Computer theft may put workers’ data in danger.Knight Ridder Tribune Business News. Washington, DC: Knight Ridder Tribune Information Services.

ibid

US copyright and privacy laws, Health Insurance Portability and Accountability Act (HIPAA), and the Gramm Leach-Bliley Act (GLBA) (Electronic Privacy Information Center, 2004

McConnell, B. W. (2001, March 6). Hearing on cybercrime, Committee on Legal Affairs and Human Rights, Parliamentary Assembly of the Council of Europe. Paris, France: McConnell International.

United States Department of Health and Human Services. (2003, May). Office for Civil Rights (OCR) Privacy Brief, Summary of the HIPAA Privacy Rule, HIPAA Compliance Assistance. Retrieved electronically December 29, 2006, from URL: http://www.hhs.gov/ocr/privacysummary.rtf.

Bigelow, B. V. (2005, February 3). Computer theft may put workers’ data in danger.Knight Ridder Tribune Business News. Washington, DC: Knight Ridder Tribune Information Services

Evans, M. P., and Furnell, S. M. (2000). Internet-based security incidents and the potential for false alarms. Internet Research: Electronic Networking Applications and Policy, (10)3, pp. 238 – 245. Plymouth, UK: MCB University Press

McNeil Solida, M. (2003, February 18). Ex-pension employee is charged. Retrieved electronically December 28, 2006, from URL:http://www.carlbrizzi.com /news/display.php3?NewsID=71

Barr, J. G. (2003, December). Monitoring employee computer usage. Retrieved electronically December 27, 2004, from URL: http://80www.faulkner.com.ezproxy.apollolibrary.com/products/securitymgt/docs/monitoring1203.htm.

McConnell, B. W. (2001, March 6). Hearing on cybercrime, Committee on Legal Affairs and Human Rights, Parliamentary Assembly of the Council of Europe. Paris, France: McConnell International.

United States Department of Justice. (2005, December 28). Man pleads guilty to infecting thousands of computers using worm program then launching them in denial of service attacks. Retrieved electronically April 17, 2006, from URL: http://www.cybercrime.gov/clarkPlea.htm.

ibid

McConnell, B. W. (2001, March 6). Hearing on cybercrime, Committee on Legal Affairs and Human Rights, Parliamentary Assembly of the Council of Europe. Paris, France: McConnell International

White, G. A., & Kern, R. W. (2006, February 28). Cleveland, Ohio man sentenced to prison for bank fraud and conspiracy. Retrieved electronically April 17, 2006, from URL: http://www.cybercrime.gov/flurySent.htm.

Evers, J. (2006, January 19). Computer Crime Costs $67 Billion, FBI Says. Cnet News.com. Retrieved electronically September 30, 2006, from URL:

http://news.com.com/Computer+crime+costs+67+billion%2C+FBI+says/21007349_3-6028946.html?tag=cd.top.

Citrano, V. (2006, January 20). Mueller’s FBI puts computer crime losses at $32M. Retrieved electronically September 1, 2006, from URL:http://www.forbes.com/facesinthenews/2006/01/20/fbi-computer-securitycx_vc_0120autofacescan07.html?partner=vnu.

Akpan AG et. al. (2018). Cybercrime and Cybersecurity: A Painted Scenario of a New Type of War. Journal of Scientific and Engineering Research, 2018, 5(10): 185 – 197. ISSN: 2394 – 2630. CODEN (USA): JSERBR. Retrieved from: www.jsaer.com.




DOI: https://doi.org/10.23956/ijarcsse.v9i4.983

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.