1Egwu, Francis Ogbonnia
Department of Criminology and Security Studies,
Alex Ekwueme Federal University, Ndufu-Alike, Ebonyi State, Nigeria
Email: francis.egwu@funai.edu.ng
ORCID: https://orcid.org/0009-0009-8519-8303
2**Nlemchukwu Emmanuel Chigozirim***
Department of Criminology and Security Studies,
Alex Ekwueme Federal University, Ndufu-Alike, Ebonyi State, Nigeria
Email: nlemchukwu.emmanuel@funai.edu.ng
Corresponding author***
ORCID: https://orcid.org/0009-0002-6403-6507
3Adinde, Kenneth Umezulike
Department of Criminology and Security Studies,
Alex Ekwueme Federal University, Ndufu-Alike, Ebonyi State, Nigeria
Email: kenneth.adinde@funai.edu.ng
ORCID: https://orcid.org/0009-0002-7458-7847
4Daniel Chidiebere Onwe
Department of Criminology and Security Studies,
Alex Ekwueme Federal University, Ndufu-Alike, Ebonyi State, Nigeria
Email: onwedaniel1990@gmail.com
ORCID: https://orcid.org/0009-0003-4168-148X
5Idam, Gabriel Ogbonnia
Department of Criminology and Security Studies,
Alex Ekwueme Federal University, Ndufu-Alike, Ebonyi State, Nigeria
Email: libertymovieproduction@gmail.com
ORCID: https://orcid.org/0009-0006-7825-7596
Abstract
Cybercrime has become a growing global concern, affecting individuals, corporations, and governments alike, with its reach extending far beyond national borders. The paper adopted a theoretical approach to examine the prevalence of cybercriminality among undergraduates of universities in Southeastern Nigeria. The paper used two theoretical approaches: the routine activity theory and the differential-association theory. The routine activity theory stipulates three necessary conditions for most crime: a likely offender (cybercriminals), a suitable target (victims) and the absence of a capable guardian (unprotected information), coming together in time and space. That is, for a crime to occur, a likely offender must find a suitable target in the absence of capable guardians. And the differential-association theory asserts that an individual is influenced to participate in criminal behaviour through watching and interacting with other individuals who are engaging in the criminal behaviour. The study revealed that the high level of corruption and the spread of poverty are seen by university undergraduates as the principal cause of cybercrime. Findings also show that the effort to get rich quickly by most Nigerians, especially the youths, is often exploited by cyber fraudsters. Again, findings also show that many security personnel, instead of looking at how to arrest this cybercrime operator, serve as bodyguards to them and cover them up in order to gain cash rewards. The conclusion is that cybercrime can adequately be controlled if law enforcement agencies are trained on the use of technology. The study recommends that there should be a more proactive approach that will allow law enforcement agencies to track and investigate students’ involvement in cybercrime within and outside the institution.
Keywords: Prevalence of cybercrime, Forms of cybercrime, Cybercrime, Undergraduate Students, Nigeria universities
Introduction
Cybercrime is one of the most evolving high-technology crimes of the twenty-first century in the world. Cybercrime has become a growing global concern, affecting individuals, corporations, and governments alike, with its reach extending far beyond national borders. As technology continues to advance, so too do the tactics employed by cybercriminals. In Europe, cybercrime encompasses a wide array of illegal activities, including identity theft, financial fraud, data breaches, and even cyber terrorism. The European Union has made efforts to combat these challenges by introducing stringent regulations such as the General Data Protection Regulation (GDPR), as well as cybersecurity initiatives (European Union, 2016). However, despite these efforts, cybercrime remains a persistent threat due to the evolving nature of technology and the increasingly sophisticated methods used by criminals (Böhme, 2020). In Africa, the rapid growth of internet access and mobile technology has brought both opportunities and challenges. Many African nations face widespread poverty, unemployment, and a lack of adequate educational opportunities, which have contributed to the rise of cybercrime. Countries such as South Africa, Kenya, and Nigeria have witnessed an alarming increase in cybercriminal activities, including phishing, online scams, and hacking. In 2019, the African Union reported that cybercrime cost the continent approximately $3.5 billion annually (African Union, 2020).
Nigeria, Africa’s most populous nation, has been significantly impacted by the growing threat of cybercrime. Nigerian youths, in particular, have become increasingly involved in various forms of online crime, with financial fraud, phishing, and scams being the most common offences. The term “Yahoo boys” has become synonymous with internet fraud in Nigeria, referring to young people who engage in fraudulent schemes to scam people out of money (Adebayo, 2020).
These impacts have taken different shapes and forms over the years. It has contributed to the invention of other information and communication technology (ICT) solutions and services, such as emails, e-commerce, social media, the Internet of Things (IoT), and its smart services, among others. Aside from the numerous positive aspects of the internet, such as social networking, worldwide linkages, job creation, improving medical and education access, expansion of the commercial landscape and so on (Chen et al., 2023), it has also contributed to a series of criminal activities in our society in the form of internet crimes or cybercrimes (Garba, 2023). Cyber activities have both positive and negative impacts on the users as individuals, organisations, groups, people and society at large. According to Alansari, Aljazzaf, and Sarfraz (2019), cybercrime is any Internet-related crime that is always directed against individuals, groups, and/or the state and its economy, motivated by the criminal intention that can cause damage/destruction that may be of different types, including physical, mental, and loss of money, and also it involves the unlawful accessing of information of the victims using electronic devices. Cybercrimes are not entirely new with their widespread nature, nor are they peculiar to developing nations like Nigeria. For instance, the first highly publicised cybercrimes occurred in November 1988 in the United States (U.S.), when a 23-year-old student, Robert Morris, launched a virus (“Morris Worm”) on the internet. Over 6,000 computers of the estimated 60,000 systems linked to the internet at that time were infected, and it cost about $100 million to repair the infected systems. As a consequence, Morris got a sentence of 3 years’ probation and a $10,000 fine (Stambaugh et al., 2001). Subsequently, cybercrimes gradually evolved into a serious global problem.
In Nigeria, Rotimi (2015) asserted that the menace is very rampant among the youths within the age of 18 to 35 years, and it would be inappropriate to describe youths in Nigeria based on the temporal relation of age because of the timeline and multiplicity of opinion on this issue. Cybercrimes have become a serious problem in Nigeria, culminating in the listing of Nigeria as third on the roll of the top ten cybercrime hot spots in the world by a 2009 Internet Crime Report (FBI, 2010). The seriousness of this problem can be better appreciated when we consider the fact that in spite of the several interventions made by the Nigerian government and Non-Governmental Organisations (NGOs) in tackling cybercrime, such as the co-operation between Microsoft Corporation and the Economic and Financial Crimes Commission (EFCC) of Nigeria to fight cybercrime, the enactment of cybercrime laws by the Nigerian government aimed at ensuring the security of computer systems and networks in Nigeria has not produced much result (Balogun & Obe, 2010). Nigeria has for four consecutive years (2006, 2007, 2008 and 2009) ranked third on the list of world cybercrime perpetrator countries (FBI, 2010). Thus, Debarati and Jaishanka (2011) stressed that cybercrimes are offences that are committed against individuals or groups of individuals with criminal motives to intentionally harm the reputations of their victims or cause physical or mental harm to their victims directly or indirectly using modern telecommunication networks such as the internet (chat rooms, e-mails, etc.) and mobile phones (SMS/MMS). The use of modern applications has enhanced cyber criminality such as facebook, yahoo messenger, tinder, twitter, instagram, snapchat, telegram, among others. However, there are no generally accepted typologies of cybercrime, but scholars of criminology typified two main kinds of internet-related crime, such as (1) Advanced Cybercrime (or high-tech crime), sophisticated attacks against computer hardware and software, and (2) Cyber Realm Enabled Crime (Interpol, 2016). What this implies is that many traditional crimes have taken a new turn with the emergence of the internet, such as crimes against children, financial crimes and even terrorism (Oyesanya, 2015). In view of the aforementioned problems, the age category of people that indulges in cybercrimes and other related activities is undergraduate students of universities; hence, this study aims at evaluating the prevalence of cybercrimes among undergraduate students of universities in southeastern Nigeria.
Problem Statement
A global concern today is the issue of cybercrime among undergraduates of Nigerian universities. This social phenomenon has been constituting huge security, economic and mental health threats to individuals, corporate and government organisations in different countries. A global economic crime survey by Armin, Thompson, Ariu, Giacinto, Roli and Kijewski (2015) puts the annual cost of cybercrime to the global economy at more than €300 billion, while the cost of cybercrime for the European Union (EU) was estimated to be 0.4% of its GDP, amounting to €13 billion per annum. This report claimed that Poland, Germany and the United Kingdom lost €377 million, €2.6 billion and €2 billion per annum, respectively (Armin et al., 2015). These figures, among others, showed that cybercrime globally constitutes a serious financial threat to the economy and the wellbeing of their innocent victims. It also follows logically that a crime of this magnitude is possible when individuals remove self-censure and self-sanctions from their behaviour. However, with respect to the undergraduates in Nigerian universities, the contribution of the internet to the academic development of Nigerian undergraduates has been marred by the conscious evolution of new waves of crime.
The internet has also become an environment where the most productive and safest offence thrives. Thus, the ubiquity of social media platforms in recent times has further aggravated the extent of cybercrime involvement among undergraduates in Nigeria (Akor, 2017). Indeed, the trend and patterns of this crime are fast changing with the increasing involvement of female students. For instance, in November 2018, the Economic and Financial Crimes Commission (EFCC) arrested 34 undergraduates, including nine females suspected to be involved in cyber fraud perpetration at Awa-Ijebu, Ogun State (Akinkuotu, 2018). Moreover, Tade and Aliyu (2011) submit that cyber fraud, a form of cybercrime, has literally become a way of life for many undergraduates in 44 Nigerian universities. Aghatise (2006) contends that 80% of cybercrime perpetrators in Nigeria are students in various institutions. The reported cases range from fake lotteries to the biggest internet scams. In July 2001, the Economic and Financial Crime Commission (EFCC) arrested four Nigerians suspected to be involved in cybercrime that duped unsuspecting foreign investors in Ghana. Two young men were recently arrested after making an online purchase of two laptops advertised by a woman on her website under false claims. They were arrested at the point of delivery by government officials. Recently, the Ibadan zonal office of the Economic and Financial Crime Commission (EFCC) arrested a 26-year-old student of Ekiti State University, Ado-Ekiti, for internet fraud, deceiving unsuspecting victims on military dating sites while posing as a Nigeria-based US Army officer by the name Sergeant Frank McGhee (EFCC, 2016).In view of the aforementioned problems, this study evaluates the prevalence of cybercrimes among undergraduate students of universities in southeastern Nigeria.
The Conceptual Overview of Cybercrimes
Cybercrime refers to illegal activities carried out using computers, networks, or the internet. It has emerged as a significant issue in the digital age, with the rise of technology increasing the potential for cybercriminals to exploit vulnerabilities in systems. Cybercrime can affect individuals, businesses, governments, and even entire nations. The anonymity provided by the internet makes it easier for criminals to operate without being identified, presenting significant challenges for law enforcement (Smith, 2010). Cybercrime is a global issue that frequently surpasses national borders, necessitating international cooperation for effective prevention. It is not surprising that a large number of youths are involved in cybercrime, as they are found to constitute the largest user of the internet. According to the NCA report (2018), the average age of people involved in cybercrime is between 17 and 22 years. This implies that the youths, especially the university undergraduate students, dominate the population of cybercriminals. Various studies (Lowry et al., 2016; Emma et al., 2015; Matti et al., 2015) have been conducted to examine cybercrime of different forms among university students. Cybercrime is mainly committed by our youths in order to make life earnings easier, thereby defrauding individuals or all organisations of all kinds. Some cybercriminals are well organised, use advanced strategies and are highly technically skilled. Their goal is to make money and is usually done by individuals or an organisation at large.
Cybercrime offences made their way into Nigeria in the 1990s. Such crimes were generally referred to as Advance Fee Fraud, or simply ‘419’. Advance fee fraud was a means by which some dubious Nigerians deceived foreigners into parting with their money by promising them non-existent oil contracts. Fraudsters perpetrate such illicit acts by sending emails to their prospective victims whom they promise oil well contracts and demand upfront payments to facilitate the process. Most times, the foreigners are invited into Nigeria and treated to make-believe official receptions during which they are made to sign fictitious contract papers. However, after being put through such make-believe shady deals and upon return to their country of origin, the foreign businessmen would later discover to their discomfiture that they have been conned by Nigerian fraudsters who, thereafter, discontinue further communication with their victims. Beyond the advance fee fraud, or 419 scams, the growth in information communication technology has led to an unprecedented rise in other cybercrime offences such as extortion, identity theft, cyber trespassing, digital piracy, Yahoo-Yahoo Plus and email scams, among many others. Thus, the ubiquity of social media platforms in recent times has further aggravated the extent of cybercrime involvement among undergraduates in Nigeria (Akor, 2017). Indeed, the trend and patterns of this crime are fast changing with the increasing involvement of female students. For instance, in November 2018, the Economic and Financial Crimes Commission (EFCC) arrested 34 undergraduates, including nine females suspected to be involved in cyber fraud perpetration at Awa-Ijebu, Ogun State (Akinkuotu, 2018). Moreover, Tade and Aliyu (2011) submit that cyber fraud, a form of cybercrime, has literally become a way of life for many undergraduates in 44 Nigerian universities. Aghatise (2006) contends that 80% of cybercrime perpetrators in Nigeria are students in various institutions.
Theoretical Framework
The major theories considered in this work include routine activity theory and differential-association theory. Routine activity theory is a crime of opportunity theory that focuses on situations of crimes. It was developed by Marcus Felson and Lawrence Cohen in 1979. This theory attempts to show that crime rates are not generally affected by macro changes such as economic recessions, unemployment rates, poverty, etc. This theory stipulates three necessary conditions for most crime: a likely offender (cybercriminals), a suitable target (victims) and the absence of a capable guardian (unprotected information), coming together in time and space. That is, for a crime to occur, a likely offender must find a suitable target in the absence of capable guardians. According to Felson and Cohen (1979), the reason for the increase is that it offers more opportunities for crime to occur, as there is much to steal. Routine activity theory provides a simple and powerful insight into the causes of cybercrime. The idea is that in the absence of effective controls, offenders will prey upon attractive targets. To have a crime, a motivated offender must come to the same place as an attractive target. For property crimes, the target is a thing or an object (usually cash in the case of cybercriminals), while for personal crimes, the target is a person (wealthy people). If an attractive target is never in the same place as a motivated offender, the target will not be taken, damaged or assaulted. There are controllers whose presence can prevent internet crime, such as anti-virus, password or encryption, but if the controllers are absent or present but powerless, cybercrime is possible, as posited by Eric (2016).
According to Sutherland (1939; 1960), of differential association theory, criminal behaviour is learned in interaction with other persons in a process of communication. This would mean an individual is influenced to participate in criminal behaviour through watching and interacting with other individuals who are engaging in the criminal behaviour. The principal part of the learning of criminal behaviour occurs within intimate personal groups. When criminal behaviour is learned, the learning includes techniques of committing the crime, which are sometimes very complicated and sometimes simple, and they learn the specific direction of motives, drives, rationalisations and attitudes for committing a crime. Differential association theory asserts that an individual is more likely to commit crime when the individual learns favourable definitions towards violations of the law in excess of the definitions unfavourable to violations of the law. That is, people learn to engage in crime, primarily through their association with others, and weigh the benefits between. They learn beliefs that are favourable to crime and, as a result, are exposed to criminality (McLeod, 2016). Differential Association theory views crime as something that is desirable or at least justifiable in certain situations. It explains both the process by which a given person(s) learns to engage in crime and the content of what is learned. According to Sutherland (1960), an individual’s environment influences one to learn appropriate behaviours to survive within the environment. This mostly occurs in groups where people within a specific reference group or association display norms of deviance or conformity (Siegel, 2013). According to Siegel (2013), the differential association theory applies to several types of behaviours, including cybercrime. This is because they view themselves as young and innovative; therefore, they commit crimes, such as hacking, advance fee fraud, identity theft, malicious coding and outside or inside espionage as a way to express their creativity cum the anonymous nature of the cyber realm (Moore, 2012). Thus, in relation to the study, the undergraduate student views himself as young and innovative; therefore, he commits cybercrimes such as hacking, advance fee fraud, identity theft, flash bank credit alerts, coding and outside or inside espionage as a way to express his creativity through the anonymous nature of the cyber realm. This theory is relevant in explaining the emergence of cybercrimes among undergraduates because they learn these deviant behaviours from their interactions with others and the environment around them. Cybercriminals acquire deviant behaviour on cyber or computer-related crimes from people they associate with within their daily lives. Today, people rely on computer devices to do almost every daily activity, including communicating, studying, researching and working. Consequently, this environment provides a suitable environment for undergraduates to engage in cybercrimes. Routine theory and differential association theory have been adopted as the theoretical framework in this study because they are the most suitable, adequate, appropriate, and relevant and best explain the phenomenon of cybercrimes.
Results
Motivating Factors and Evaluating the Performance of Institutional Frameworks and Proactive Measures that could Ameliorate the Menace of Criminality Among University Undergraduates
There are various factors that influence the prevalence of cybercrimes among undergraduate students of universities in Nigeria. The founding fathers of the internet, when the Internet was developed, were not willing to misuse the internet for criminal activities. Nowadays in cyberspace, there are numerous troubling events. Scholars have nevertheless attributed the world’s causes of cybercrime to the following: unemployment, the negative role model, insufficient police facilities and social gratification are causes of cybercrime. All these reasons, according to him, are used in most parts of the world to facilitate cybercrime. The major causes of cybercrime in most countries around the world are widespread corruption, harsh economic conditions, disregard for the law, and lack of transparency and accountability in governance. Two primary and secondary causes could be associated with cybercrime. Poverty prevailing and the weak education system are the main causes (Folashade and Abimbola, 2013). Habitat, corruption and rapid syndrome are the secondary causes.
In Nigeria, for example, the high level of corruption and the spread of poverty are seen by university undergraduates as the principal cause of cybercrime. The majority of Nigerian students live below the poverty line (less than one dollar a day (#360.50)). Over five million university undergraduates in Nigeria have no hope of what they will do when they are university graduates; as a means of paving the way forward, they use cybercrime (Szde, 2014). Nigeria was ranked the third most corrupt country in the whole world until 1999, when Nigerians created some financial crime monitoring agencies like EFCC (Economic and Financial Crime Commissions, etc.). Again, Nigeria is regarded globally as a third-world country due to its high poverty rate index, which is alarming. This poverty rate is increasing day by day; the rich are getting richer while the poor are getting poorer. Inadequate provision of basic amenities and an epileptic supply of power have put the small and medium enterprise into a pause.
· Peer group influence: This is usually showcased in certain environments where everyone wants to belong to a certain group or upper class without consideration of his/her background, and this is grinding the moral upbringing of many youth in Nigeria. They try to emulate their mate in how to defraud individuals and organisations without consideration of its negative effect on them. All they want is that I am driving life without the consideration that they say that “the ends justify the means”.
· Negative role models and parental influence: This is caused by some parents who compare their children with other children and think that all they need from them is to make money, whether good or bad. Money is all they want; money speaks. This usually lures these children into committing crimes.
· Security men collaborating with fraudsters: Many security men and women, instead of looking at how to arrest this cybercrime operator, serve as bodyguards to them and cover them up in order to gain cash rewards. They go a long way to teach them the best way to invest this illegally acquired wealth without being arrested by the government. According to Ebeleogu, Ojo, Andeh and Agu (2019), the occurrence of a high economic condition and bad educational system also contributes immensely to the proliferation of cybercrime in Nigeria. Other causes of cybercrime in Nigeria as a society include a high rate of urban migration, poor infrastructure, weak laws, and quick-money syndrome.
Evaluating the performance deals with security awareness as an essential part of the fighting and prevention of cybercrimes. Edwards et al. (2016) suggested that the frequency of data breaches has increased over time and continues to expose the personal information of hundreds of millions of people. Wiley et al. (2020) suggested that organisations should focus on security culture rather than organisational culture to improve information security awareness and save time and resources, which depends on the importance of leaders in the encouragement of positive security behaviours through strategic management and planning, communication, and transparent decision-making processes. Sabillon et al. (2019) estimated that a cybersecurity awareness programme must include adequate training aligned with the organisation’s objectives and long-term investment to help create a cybersecurity culture if training is delivered continuously. Security awareness training programs’ success depends on how they are delivered. The security awareness approach may differ from one country to another. Tambo and Adama (2017) estimated that 11 out of 54 African countries had taken concrete actions essential in preventing and counteracting cybercrimes by implementing laws and regulations about cybersecurity. Moreover, the continent has seen cybercrimes and mobile money fraud increase significantly over time due to the absence of laws and regulations in that regard and the rise of internet penetration, which has contributed to enormous financial losses in terms of cyberattacks for countries like South Africa, Morocco, and Uganda. In that regard, the need to increase cybersecurity capabilities and cooperation by investing in building safe, reliable, and persistent cyberspace decision-making platforms and frameworks and releasing the cybersecurity leadership role and commitment is essential to create cybersecurity and operating platforms for all stakeholders that include Microsoft, Google, Apple, Facebook, banks, governments, and other private sectors on cyberattack incidents that affect the local and global market and share losses (Bouveret, 2019). Furthermore, the cybercrimes can be reduced by building public and community cybersecurity communication and engagement resilience, readiness, and capability to promote public and community cybersecurity and cyber-wellness policy and capabilities, awareness campaigns, meetings, and empowerment. Person-Centred Information Security Awareness (PCISA) is helpful to maintain information security and protect data assets for organisations. Ki-Aries and Faily (2017) suggested the PCISA contributes to the identification of the audience needs and security risks and enables a tailored approach to business-specific awareness activities, which contributes to the reduction of information security risks through security and allows a better adaptation to the time and resources needed for its implementation within the organisation. Information security can be maintained by building a security-conscious culture, providing end-user training to reinforce security awareness, developing proper guidelines for disposal of storage media, performing audits of security systems regularly and testing staff, and developing procedures that will help to report an incident. Policies and Procedures. With the rise of cybercrime activities, the adoption of policies and procedures becomes relevant in fighting and preventing such a phenomenon. Aldawood and Skinner (2019) suggested that policies and procedures play a huge role in the security awareness education training by demonstrating the ability of the organisation to provide training to employees through a general session on security awareness for all the new employees by focusing on commitment to ethical business behaviour. Kayser et al. (2019) suggested the importance of having solid policies and procedures related to cybercrime protection and the necessity of working with private and government entities to ensure that human rights standards will be applied in the cyberspace environment. Addressing any change in policies and procedures and intensive training for specific employees for areas of responsibility is helpful to refresh from time to time exposed employees of the organisation by explaining any committed crimes and monitoring and reporting them (Aldawood & Skinner, 2019).
· Cyber Detection: Daily routines characteristic of a population affect the quantity and location of crime by determining how frequently potential offenders are victimised. The development of the Internet changed the lifestyle and routine activities of the population and opened a decrease in traditional police-based crime prevention strategies (Caneppele & Aebi, 2017). Malik and Younis (2016) suggested that cyber detection techniques such as checking mistakes from many authorities’ claims, the email inspection through internet protocol, and the use of a network intrusion detection system to track and detect incoming and outgoing traffic on the network system help in the prevention of cybercrimes. Malik and Younis (2016) suggested that imposing local law regarding the report of cyber incidents to the state police allows them to fight more efficiently against cybercrimes by collecting information about the victims to develop an incident response plan to manage cyber risks better. Chavez and Bichler (2019) suggested that the increasing disadvantages over anticipated rewards would lead potential offenders to refrain from committing a specific crime, influencing the rational decision-making process to prevent crime. As businesses start to take into account very seriously the impacts of cybercrimes on their daily activities, it becomes more vital for them to make that issue a priority as part of their social change culture, which will contribute to waking up and making their employees aware of the necessity to keep their eyes open for security threats that they may face on a daily basis. Positive Social Change Implication. Many researchers have addressed the importance of positive social change in the reduction of cybercrimes. Payne et al. (2019) suggested that the evolution of cybercrimes is the result of building a broad effort and the use of a category of presumption as a guide in the understanding of traditional crime, white-collar crime, international crime, and socially constructed crime as part of positive social change. According to Barosy (2019), social change can be viewed positively when it includes a safe and secure environment in which business and consumer confidence are increased, strengthened by protecting personal and confidential information.
· Safe Internet Environment: Having a safe internet environment is essential to prevent cybercrimes. Barosy (2019) suggested that establishing and sustaining a secure Internet environment may create a climate of trust and safety for the online community. Kakucha and Buya (2018) indicated that establishing a comprehensive framework to enable the development, institutionalisation, assessment, and improvement of an information security programme is a way to develop a typical information security strategy. Besides, there should be a need to deploy countermeasures that will block all attacks on the organisation, which can be used to avoid information leakage (Kakucha & Buya, 2018).
· Network Protection: Cyber attackers infiltrate organisation networks that are not protected from committing cybercrimes. Malware is any software used to disrupt computer operation, gather sensitive information, gain unauthorised access to private computer systems, and make illegal profit for malware owners (Bai et al., 2019). Holt et al. (2018) suggested that wireless networks as part of any organisation’s network infrastructure should be secured to prevent malware from spraying when users engage in downloading activities that are not securely monitored. Critical elements contribute to cybercrimes and different approaches to mitigate them through a culture of prevention and security awareness that is very useful. Leukfeldt et al. (2017) suggested that cybercriminals can use malware such as viruses, worms, Trojan horses, and spyware to access credentials or manipulate the entire system sessions. Although there are many tools to detect and prevent malware, it remains, however, one of the most common ways that cybercriminals infiltrate and cause significant harm to businesses and organisations computers around the world, which needs to be taken into account when building and implementing security strategies in the prevention of cybercrimes.
· Artificial Intelligence in the Prevention of Cybercrimes: Artificial intelligence applications are being found efficient in the prevention of cybercrimes. According to Hamet and Tremblay (2017), artificial intelligence is a general term that implies using a computer to model intelligent behaviour with minimal human intervention. Siddiqui et al. (2018) suggested that artificial intelligence is helping humanity in addressing the issues of cybersecurity because of its intelligent nature and flexibility. Artificial intelligence techniques and applications such as heuristics, data mining, neural networks, and artificial immune systems have proven efficient in preventing and mitigating cybercrimes (Siddiqui et al., 2018).
· Situational Prevention Factors and Social Bond Factors: Safa et al. (2018), by examining information security concerns for organisations, suggested that situational prevention factors and social bond factors such as a commitment to organisational policies and procedures, involvement in information security activities, and personal norms for organisations promoted the adoption of negative attitudes toward misbehaviour, which influenced the employees’ intentions towards engaging in misconduct positively, and this, in turn, reduced insider threat behaviour. In addition, surveillance in cyberspace may contribute to preventing situational crime. Testa et al. (2017) suggested that a situational deterring indication reduced the probability of system trespassers with fewer administration privileges on the attacked computer system entering activity commands. In contrast, these indications in the attacked system did not affect the probability of system trespassers with the administration level of privileges to enter activity commands. Moeller et al. (2016) suggested that gaining access to counter-surveillance information and human capital by cybercriminals that directly affect people’s success in online forums reduces the likelihood of capture and diminishes informal threats of burglaries. They also proposed that the fear of sanctions may motivate some criminals to cut off their ties to unfamiliar people and reinforce ties to other criminals due to restrictive prevention that emphasises a behaviour change.
· Data Privacy Prevention: Data are valuable assets for an organisation and represent constituents that are the most targeted by cybercriminals. Fraudulent access to organisation data without authorisation can lead to data breaches. Martin et al. (2017) estimated that data breaches are bad for performance, and the effect of data breaches reaches a worse level when a firm is affected more than one time. Thomas et al. (2017) also estimated that data breaches at primary online services had become a regular occurrence in recent years. Based on a survey, 26% of adults affirmed that they had received a notice related to a data breach in the past year. Alotaibi et al. (2016) suggested that the very high cost of cybercrimes affects many consumers through the breach of data privacy and may drive them to use mobile gaming applications in the creation and learning of cybersecurity awareness. Therefore, it is vital to limit access to sensitive data by granting access only to authorised entities and monitoring any existing data storage system access. Besides, organisations should adopt an information assurance approach to ensure data protection regarding confidentiality, integrity, authentication, and availability. Muller and Lind (2020) suggested that compliance with information security rules among information assurance professionals may prevent organisational data from risks.
· Alerts and Anti-phishing: Anti-phishing methods are more used and taught in security awareness training, such as interactive game methods to allow users to identify risky emails and websites. The importance of human factors in the fight against cybercrimes is essential in reducing cyberattacks by learning security best practices and security awareness training. Phishing is an activity that consists of stealing sensitive information online, such as usernames, passwords, and online banking details, from its victims (Arachchilage et al., 2016). Martin et al. (2018) suggested that understanding and quantifying end-user phishing susceptibility relative to their failure to incorporate expectation factors are crucial preconditions for developing adequate protection. Besides, Arachchilage et al. (2016) suggested that cybercriminals use the technique of phishing to attack victims. Therefore, alerting end-users about any phishing activity may prevent them from opening any phishing emails (Jansen & Leukfeldt, 2016). Thus, alerts are a way to avoid phishing, which contributes to the prevention of cybercrimes.
· Honeypot: A honeypot is a system intentionally initiated to probably target cyberattacks and designed to attract intruders’ attention and gather and report information. Litchfield et al. (2016) suggested that honeypots derive much value from their ability to fool attackers into believing they are authentic machines. According to the Pothumani and Anuradha (2017) decoy method, a new technique to detect the insider attacker and reduce the amount of focus information to the attacker and redirect the attacker from the original data appears as the best method to solve the threats of data security. Honeypots are vital in terms of keeping away data from any inside or outside intrusion.
Conclusion
In conclusion, cybercrime is a trend and still very rampant among youths or students in Nigerian universities, considering what it has contributed negatively to the society. Though it cannot be eradicated, it can be adequately controlled if law enforcement agencies are trained on the use of technology, as the constraints confronting them in doing the needful should be critically addressed by the policymakers. Nigerian law enforcement agencies are endowed with certain responsibilities in controlling the spread of cybercrime among youths or students in Nigeria, as this will sensitise them to collaborate with other sister agencies in controlling cybercrime effectively. With the increase of cybercrimes, individuals, organisations, businesses, and governments are seeking relevant and efficient solutions to prevent or fight against their data being compromised.
Recommendations
1. To reduce the prevalence of cybercrime among youths or students at Nigerian universities, there should be adequate technological training for law enforcement agents in the forensic department. Nevertheless, in the process of recruiting law enforcement agents, those with computer know-how should be enlisted adequately. It is important and timely to adopt and create new law enforcement agencies that will be saddled to regulate and control certain cyber activities, as apprehending cybercriminals becomes difficult due to the complexity in cyberspace.
2. There should be a more proactive approach that will allow law enforcement agencies to track and investigate students involved in cybercrime within and outside the institution. Besides, most of these students that practice such acts can be easily tracked within their hostels in the institutions.
3. School management should be allowed to report students detected to be involved in cybercrime to avert its escalation, because by doing so it will reduce the perpetration of cybercrime within the school. This can only be achieved through effective collaboration between school management and law enforcement agencies.
REFERENCES
Adebayo, A. (2020). The rise of internet fraud among Nigerian youths: A socio-economic analysis. Journal of Social Sciences and Humanities, 14(2), 67-82. https://doi.org/10.1080/01436597.2020.1733567
Ajah, B.O., Ogar, J.A., Ojong-Ejoh, M.U., Ejimonye, J.C., Onwuchekwe, S.I., Ngwu, G.E., Okoye, C. A., Obioji, J.N & Asadu, A. (2025)Exploring the Legal Rights of Expatriates on Taxation in Their Host Countries: The Case of Uganda Journal of Somali Studies : Research on Somalia and the Greater Horn of African Countries Vol. 12, No. 3, pp 9-29 https://doi.org/10.31920/2056-5682/2025/v12n3a1
Ajah, Onwuchekwe and Ugwu (2017) Gender Dimensions and Victims of Property Crime by Commercial Motorcycle Riders in Anambra State, Nigeria, IOSR Journal Of Humanities And Social Science (IOSR-JHSS) Volume 22, Issue 9, Ver. 5 PP 59-66 e-ISSN: 2279- 0837, p-ISSN: 2279-0845, http://www.iosrjournals.org DOI: 10.9790/0837-2209055966
Areh, Ajah, Oguejiofo, Onwuchekwe&Eze (2021) The Troubling Epidemic In Ogbaru and Onitsha North Local Area of Anambra State, Nigeria. International Journal of Criminology and Sociology, Vol-10, pp.1349-1361. Available online at: https://doi.org/10.6000/1929-4409.2021.10.155.
Alansari, M.H, Alansari, Z.A & Sarfraz, M. (2019). On Cyber Crimes and Cyber Security.
Adeleke, G. R. (2017). Perception of Cybercrime among Nigerian Youths: A Case Study of
Caritas University. Retrieved from https://uniprojects.net/project.
Akinkuotu, E. (2018). EFCC arrests 23 OOU students, 12 others for internet fraud. The Punch, Retrieved from https://punchng.com/efcc-arrests-23-oou-students12-othersfor-internet-fraud on 11th March, 2021
Akor, L. (2017). The social media, deviance and youth in Nigeria. In P. N. Ndubueze (ed.), Cyber Criminology and Technology-Assisted Crime Control, (pp. 47-64).
Armin, J., Thompson, B., Ariu, D., Giacinto, G., Roli, F., & Kijewski, P. (2015). Cybercrime economic costs: No measure no solution, 10th International conference on Availability, Reliability and Security. Cyber Road Project, 701-710.
Balogun, V. F. & Obe, O. O. (2010). E-Crime in Nigeria: Trends, tricks and treatment.The Pacific Journal of Science and Technology, 11 (1), 343 – 355.
Bengal, S., Babatunde, S, and Bankable, F (2012). Economic Cost of Cybercrime in Nigeria. University of Toronto. Monk School of Global Affairs.
Böhme, R. (2020). Cybersecurity and the European Union: Policy responses to an evolving threat. European Journal of Information Systems, 29(2), 142-158. https://doi.org/10.1057/s41303-019-00126-7.
Debarati, H. & Jaishankar, K. (2011).Cybercrime and victimization of women: Laws, rights and regulations. USA: Hershey, IGI Global.
Ebeleogu, C.U, Ojo, S.D. Andeh, C.P And Agu, E.O (2019) Cybercrimes, Its Adherent Negative Effects On Nigerians Youth And The Costly at Large, Possible Solution. International Journals of Advances in Scientific Research and Engineering (Ijasre). E-Issn: 2454-8006, Volume 5, Issue 12, December 2019
Eya, I. I. & Odo, I. C. (2019). Public perceptions on the determinants of youths’ involvement in cybercrime in Enugu Urban, Enugu Sate: A framework for social workers. International Journal of Innovative Research in Social Sciences and Strategic Management Techniques2, (1) 161-177.
Eze & Ezedikachi. N. (2021) Internet fraud and its effect on nigeria’s image in international
relations. Covenant Journal of Business & Social Sciences (CJBSS)12 (1), 22-37
FBI (2010). Internet Crime Complaints on the Rise.
Felson, M and Cohen, L. (1979).Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review.
International Journal of Economics, Business and Management Research Vol. 2, No. 04; 2018 ISSN: 2456-7760 http://www.ijebmr.com Page 573
Interpol (2016). Cybercrime: connecting police for a safer world. Retrieved from http://www.interpol.com on 13th April, 2022.
Iremeka, F.U., Eseadi, C., Ezenwaji, C. et al. Effect of School-based Rational-Emotive Behaviour Program on Burnout Among Adult Learners: Moderating Influence of Participants’ Demographic Variables. Journal of Rational –Emotive &Cognitive-Behavior Therapy, Vol.39, issue 4. Available online at https://doi.org//10.1007/s10942-021- 00393-4
Lowry, P., Zhang, J., Wang, C., and Siponen, M. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning (SSSL) model. Information Systems Research, 27, 962-986.
Madu, Okafor & Onwuchekwe (2020) Engaging ECOWAS In Managing The Conflict In The Niger Delta: A Perception Study, Journal of African Studies, Vol. 2 No. 2, 2020 (ISSN: 2734-3146)
Maitanmi. O., Ogunleye, S., & Ayande, S. (2013). Impact of cyber crimes in Nigerian Economy. The International Journal of Engineering and Science (IJES,vol. 2(4, 45-51).
Martins, L (2016). General Introduction to Cybercrime Effects in Nigeria Sector. Retrieved from http://www.MartinLibrary.com International Journal of Economics, Business and Management Research.
Merton, R. K. (1968). Social theory and social structure, enlarged education. New York, Free press.
Ndubueze, P. N (2013). Social Values and the Yahoo boys’ Subculture in Nigeria: Towards a Paradigm Shift for National Value Re-Orientation. The Nigerian Journal of Sociology and Anthropology. Vol. 11, No 1
Nwosu,S.U, Abnike,U.E, Onwuchekwe, S.I., Onuchukwu,G., 2022: Police Accountability in the Post-ENDSARS Protest: Perceptions of Youths in
Southeast, Nigeria, International Journal of Health and Social Inquiry, Vol. 8, No.1, 2022
Odo, C. R., & Odo, A. I. (2015). The extent of involvement in cybercrime activities among students’ in tertiary institutions in Enugu State of Nigeria. Global Journal of Computer Science and Technology: Information & Technology, 15(3), 1-6.
Okesola, F. B and Abimbola, K. A (2013). The Nature, Causes and Consequences of Cybercrime in Tertiary Institutions in Zaria-Kaduna State of Nigeria. American International Journal of Contemporary Research 3(9), 98-114.
Oguejiofo, C. P., Onwuchekwe, S. I., Enweonwu, O. A., 2022: Roots of Public Unrest In Nigeria, EPRA International Journal of Multidisciplinary Research (IJMR)-Peer Reviewed Journal, Volume:8, Issue:1(January 2022) Journal DOI: 1036713/epra2013, SJF Impact Factor 2021:8.047//ISN Volume:1.188
Onwuchekwe, S. I (2009) Seven Point Agenda; an empty package, Vanguard Newspaper opinion article, July 31st, 2009, page 59
Onwuchekwe, S.I, Okafor, F. C. and Madu, E.T (2020) A Perception Study Of The Niger-Delta Community On An ECOWAS Role In The Niger Delta Security Crisis, Nigerian Journal of African Studies, Vol. 2 No. 2, 2020 (ISSN: 2734
Onwuchekwe, S.I, Okoronta, C.C., Ibekwe, C. C, Onwuchekwe, P. T. 2022: Prevalence of Armed Attacks And Security Implications In Anambra State, Nigeria, International Journal of Research In Education, Humanities and Commerce, Volume 03, Issue 01:Jan- Feb.2022, ISSN 25830333
Onwuchekwe, S.I., Onyeoziri,V., Ibekwe, C. C., Madu, T.E., Nweke, G. I., & Agbodike, M. (2025) Influence of Peer Pressure on Youth Involvement in Cybercrime in Onitsha North Local Government Area of Anambra State, Nigeria, International Journal of Research (IJR) p-ISSN: 2348-795X, Vol. 12 Issue 10, October 2025 https://doi.org/10.5281/zenodo.17621126
Onwuchekwe,S.1., Ibekwe, C.C., Ezeh, S.S., & Okpala, F.C (2023) Public Perception of Ex- Convicts Reintegration in Idemili-North Local Government Area of Anambra State, Nigeria, Journal of Law and Judicial System 2023;6(1): 15-29 https://doi.org/10.22259/2637-5893.0601002
Onwwuchekwe,S.I, et al (2017), Public Perception on Property Crimes: A Study of Okada Riders in Anambra State, Nigeria. IOSR International Journal of Humanities And Social Science (IOSR-JHSS) Volume 22, Issue 9,Ver.5(September,2017)PP15-24. ~ISSN-2279- 0837, P-ISSN:2279-0845. www.iosrjournals.org.
Oyesanya, F (2015). Nigerian Internet 419 on the loose. USA: Gettysburg PA.
Sutherland, E. H (1960). A theory of differential association. Criminological theory: Past to present. New York City: Columbia University Press.
Suleiman I., (2016). Although cybercrime is a global phenomenon, in most Western nations, in Sustainable Development. National Conference on Youth Development in Nigeria. Abuja.
Tade, O. & Aliyu, I. (2011). Social organization of cyber crime among university undergraduates in Nigeria. International Journal of Cyber Criminology, 5 (2), 860- 875.
Umeozulu, F. (2012). Perception of cybercrime among Nigerian youths, Unpublished B.Sc. Project, Department of Mass Communication, Caritas University.
Rotimi, O. (2015). Cybercrime: The Greatest Challenge of Nigeria Youths. Retrieved on the 19th of October, 2016 from http://www.TheNigeriaVoice.com.
Yesinia, F (2015). Nigerian Internet 419 on the Loose. USA: Gettysburg
The news (2016). Cybercrime: Nigeria’s Ranking gets Worse. Retrieved from http://www.thenewsnigeria.com.ng on the 28th of June 2016.
