Determinants of Cybercrime Awareness Among Internet users in Nigeria

International Journal of Humanities and Social Science
© 2021 by SSRG - IJHSS Journal
Volume 8 Issue 5
Year of Publication : 2021
Authors : Chibuike Ndubuisi Nwoke, Ogochukwu Favour Nzeakor, Nnamdi Green Nwoha, Obinna Ugwu, Osinachi Peter Uba-Uzoagwa, Thank God Ikenegbu
pdf
How to Cite?

Chibuike Ndubuisi Nwoke, Ogochukwu Favour Nzeakor, Nnamdi Green Nwoha, Obinna Ugwu, Osinachi Peter Uba-Uzoagwa, Thank God Ikenegbu, "Determinants of Cybercrime Awareness Among Internet users in Nigeria," SSRG International Journal of Humanities and Social Science, vol. 8,  no. 5, pp. 14-22, 2021. Crossref, https://doi.org/10.14445/23942703/IJHSS-V8I5P103

Abstract:

The study used questionnaire, supplemented with IDI to collect data from 1,104 Internet users in order to examine the demographic and situational factors that influence the quality and/or volume of cyber-security awareness as a cyber-policing measure.

Results: 1)Having falling victim of cyber-security incidents in the past significantly influences the volume and content of cyber-security awareness in the sense that more of the victims (M = 1.7, SD = 1.7) than non-victims (M = .73, SD = 1.3) of cybercrime were informed of cyber-security. 2)Educational level significantly influence awareness in the sense that more of the lowly educated (M = 1, SD = .9) than highly educated (M = .9, S.D = .8) Internet users were informed of cyber-security. 3)Marital status, age, and sex were not significant determinants of awareness, though it was shown that more of the ever married (M = 1.0; SD = .87), older (M = 1.2; SD = .86), and female (M = 1.1; SD = .88) Internet users were informed of cybercrime than their single (M = .98; SD = .88), younger (M = .96; SD = .88), and male (M = .88; SD = .87) counterparts. Increasing quality and proper awareness campaign was recommended.

Keywords:

Awareness, Cyber-security, demographic factor, situational factor, victimization experiences

References:

[1] Aichorn, A. Wayward youth. New York: Viking Press(1935).
[2] AlMindeel, R. & Martins, J. T. (2020). Information security awareness in a developing country context: Insights from the government sector in Saudi Arabia. Information Technology & People (2020).
[3] Aloul, F. A. The need for effective information security awareness. Journal of Advances in Information Technology 3(3) (2012) 176–183. https://doi.org/10.4304/jait.3.3.176-183.
[4] Amankwa, E., Loock, M. & Kritzinger, E. A conceptual analysis of information security education, information security training and information security awareness definitions. In The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) (2014) 248–252. IEEE.
[5] Aurigemma, S., Panko, R. R. (2012). A composite framework for behavioral compliance with information security policies. In: System Science (HICSS) 45th Hawaii International Conference on System Sciences. Maui, HI: 2012. p. 3248–57.
[6] Aydin, O. & Chouseinoglou, O. (2013). Fuzzy assessment of health information system users’ security awareness. Journal of Medical System, 37(6).
[7] Babbie, E. (2008). The basics of social research (4thed.). Belmont, USA: Thomson Wadsworth (2008).
[8] Boateng, R., Isabalija, R. S., Olumide, L., & Budu, J. Sakawa – Cybercrime and Criminality in Ghana. Journal of Information Technology Impact, 11(2) (2011) 85–100.
[9] Bringuel, A. & Rich, W. (2010). What role and responsibility does the government have in protecting consumer’s rights to privacy/security on the internet? In & J. J. ( T. Finnie, T. Petee (Ed.), Future challenges of cyber crime (2010) 47–50. Virginia: Futures Working Group.
[10] Chan, M., Woon, I.., Kankanhalli, A. A. Perceptions of information security at the workplace: linking information security climate to compliant behavior. J Inf Priv Secur. 1(3) (2005) 18–41.
[11] Fadilpasic, S. Cybercrime costing businesses millions every minute. Retrieved from https://informationsecurity.report (2019).
[12] Fitzgerald, J. D., & Cox, S. M. (2002). Research methods and statistics in criminal justice: An introduction (3rded.). Belmont: Wadsworth Thomson Learning.
[13] Gercke, M. Understanding cybercrime: Phenomenon, challenge and legal response. Geneva: International Telecommunication Union (ITU) (2012).
[14] Hadlington, L., Binder, J., & Stanulewicz, N. Fear of missing out predicts employee information security awareness above personality traits, age, and gender. Cyberpsychology, Behavior, and Social Networking.ahead of print, (2020) http://doi.org/10.1089/cyber.2019.0703.
[15] Hansen, J. R. Cybercrime prevention. In C. B. R. J. K. O’Shea, J. Steete, J. R. Hansen & & T. Ralgh (Eds.), Cybercrime investigations: Bridging the gaps between security Professionals,law enforcements and prosecutors (2007). 261–283, New York: SynGressPublishing.
[16] Internet crime complaint centre (2010). Internet Crime Report. Retrieved from http://www.ic3.gov/media/annualreports.aspx.
[17] Internet crime complaint center (2016). Internet Crime Report. Retrieved from http://www.ic3.gov/media/annualreports.aspx.
[18] Internet crime complaint center (2018). Internet Crime Report. Retrieved from http://www.ic3.gov/media/annualreports.aspx.
[19] Israel, G. D. Sampling: The Evidence Of Extension Program Impact. Program Evaluation and Organizational Development, IFAS, University of Florida. PEOD-6 (1992).
[20] Janczewski, L. J., & Xinli, S. F. Development of information security baselines for healthcare information systems in New Zealand. Computers & Security 21(2) (2002) 172–192.
[21] Joinson, A. N., Reips, U., Buchanan, T., & Paine Schofield, C. Privacy, trust, and self-disclosure online. Human-Computer Interaction, 25 (1) (2010).
[22] Mylonas, A., Kastania, K., Gritzalis, D. Delegate the smartphone user? Security wareness in smartphone platform. Computer & Security, 34(2013).
[23] Kazeem, Y. The FBI’s Nigerian email scam ring bust shows how the billion-dollar global fraud has evolved. (2019) Retrieved from www.quartzAfrica.com
[24] Kim, E. B. Recommendations for information security awareness training for college students. Information Management & Computer Security, 22(1) (2014) 115–126.
[25] Kritzinger, E, & von Solms, S.H. Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security 29(8) (2010) 840-847.
[26] Lee, H. Employees attitude towards cyber security and risky online behaviours: An empirical assessment in the United Kingdom. International Journal of cyber Criminology, 12(1) (2018).
[27] Leukfeldt, R. 1., Veenstra, S., & Stol, W. High Volume Cyber Crime and the Organization of the Police: The results of two empirical studies in the Netherlands. International Journal of Cyber Criminology, 7(1) (2013) 1–17.
[28] Liebel, D. The watch dog: Do you know the superagency that can best protect you from cybercrimes? (2013) Retrieved from http://www.dallasnews.com
[29] Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., & Ignatuschtschenko, E. Comprehensive Study on Cybercrime. United
Nations Office on Drugs and Crime, (February), (2013) 1–320. https://doi.org/10.1103/PhysRevLett.105.018904
[30] Mali, P. Cyber law consulting: Text book of cybercrime and penalties. (2008) Retrieved from www.cyberlawconsulting.com.
[31] Microsoft’s estimate. About one half of all adults connected to the Internet were victims of cybercrime (2014). Retrieved from https://news.microsft.com/stories/cybercrime/
[32] Moulton, E. The future of cybercrime. In T. Finnie, T. Petee, & J. Jarvis (Eds), Future challenges of cybercrime (2010) 74-76, Virginia: Futures Working Group.
[33] National Population Commission. Population and housing census of the Federal Republic of Nigeria: Priority table. 1(2006) Retrieved from www.population.gov.ng.
[34] Ndubueze, P. N. (Ed.). Cyber criminology and technology-assisted crime control: A reader. Kaduna, Nigeria: Ahmadu Bello University Press Limited (2017).
[35] Nzeakor, O. F. Awareness of cyber policing among tertiary institutions in Imo State. An M.Sc thesis presented to the department of Sociology and Anthropology, University of Nigeria, Nsukka (2016).
[36] Nzeakor, O. F., Nwokeoma, B. N., & Ezeh, P-J. Pattern of cybercrime awareness in Imo State, Nigeria: An empirical assessment. International Journal for Cyber criminology, 14(1) (2020). Retrieved from http://www.cybercrimejournal.com.
[37] Obikeze, D. S. Methods of data analysis in the social and behavioral sciences. Enugu: Auto-Century Publishing. (1990)
[38] Ogutcu, G., Testik, O. M.., Chouseinoglou, O. Analysis of personal information security behavior and awareness. Computer & Security, (2015)56.
[39] Rich, W. Seniors and cyber space. In T. Finnie, T. Petee, & J. Jarvis (Eds), Future challenges of cybercrime(59-60). Virginia: Futures Working Group (2010).
[40] Sasse, M. A., Brostoff , S., & Weirich, D. Transforming the ‘weakest link’ - a human/computer Interaction approach to usable and effective security. BT Technology Journal, 19(3) (2001) 122-131.
[41] Shiloh, J. & Fassassi, A. Cybercrime in Africa: Facts and figures. Retrieved from SciDev.Net Sub-Saharan Africa.html. (2019).
[42] Siegel, L. J. Criminology: Theories, patterns, and typologies (10th ed.). Belmont, USA: Wadsworth Cengage Learning (2010).
[43] Siponen, M..T., & Oinas-Kukkonen, H. A review of information security issues and respective research contributions. ACM SIGMIS Database, 38(1) (2007) 60.
[44] Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. Analysis of end user security behaviors. Computers and Security, 24(2) (2005) 124–133.
[45] The current state of cybercrime. An inside look at the changing threat landscape. Retrieved from http:// www.rsa.com. (2013)
[46] Tsohou, A., Kokolakis, S., Karyda, M., & Kiountouzis, E. Investigating Information Security Awareness: Research and Practice Gaps. Information Security Journal: A Global Perspective, 17(5–6) (2008) 207–227.
[47] Umuahia. (2017). Retrieved from https://en.m.wikipedia.org/wiki/Umuahia
[48] Utcu, G O., & Testik, O. M. (2015). Analysis of personal information security behavior and awareness. Journal of Computers & Security. Retrieved from: www.sciencedirect.com.
[49] Wall, D. S. Foreword. In K. Jaishankar (Ed.). Cyber criminology: Exploring Internet crimes and criminal behavior. London: CRC Press (2010).
[50] Zhang, J., Reithel, B. J., Li H. Impact of perceived technical protection on security behaviors. Inf Manag Comput Secur;17(4) (2009) 330–40.