TABLE OF CONTENTS
ABSTRACT. ii
TABLE OF CONTENTS. iv
CHAPTER ONE. 1
INTRODUCTION. 1
1.1 Background to The Study. 1
1.2 Statement of The Problem.. 3
1.3 Objectives of The Study. 4
1.4 Research Questions. 4
1.5 Research Hypothesis. 5
1.6 Significance of The Study. 5
1.7 Scope of The Study. 6
1.8 Limitations of The Study. 6
1.9 Organization of The Study. 6
1.10 Definition of Terms. 7
CHAPTER TWO.. 10
REVIEW OF RELATED LITERATURE. 10
2.1 Introduction. 10
2.2 Theoretical Review.. 10
2.2.1 Routine Activity Theory. 10
2.2.2 Strain Theory. 11
2.2.3 Social Learning Theory. 11
2.2.4 Cybercrime Adaptation Theory. 11
2.3 Conceptual Review.. 12
2.3.1 Overview.. 12
2.3.2 The Rise of Cybercrime in Nigeria. 12
2.3.3 Economic Implications of Cybercrime. 13
2.3.4 Cybercrime and National Security Threats. 13
2.3.5 The Role of Technology in Cybercrime. 13
2.3.6 Legal Framework and Challenges. 14
2.3.7 Cybercrime and Social Stability. 14
2.3.8 International Dimensions of Cybercrime. 14
2.3.9 Awareness and Education. 15
2.3.10 Cybersecurity Infrastructure. 15
2.4 Empirical Review.. 15
2.5 Summary of Literature Review.. 18
CHAPTER THREE. 19
RESEARCH METHODOLOGY. 19
3.1 Introduction. 19
3.2 Research Design. 19
3.3 Population of The Study. 19
3.4 Sampling Technique. 20
3.5 Data Collection Methods. 20
3.6 Data Analysis Techniques. 21
3.7 Validity and Reliability. 21
3.8 Ethical Considerations. 22
3.9 Limitations of The Study. 22
3.10 Conclusion. 22
CHAPTER FOUR. 24
4.1 Data Presentation and Analysis. 24
4.2 Data Analysis. 24
TABLES BASED ON RESEARCH QUESTIONS. 28
4.3 Analysis of The Respondents’ Views on Research Question One: 28
4.4 Research Hypothesis. 39
4.5 Discussion of Findings. 40
CHAPTER FIVE. 43
SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATIONS 43
5.1 Summary of Findings. 43
5.2 Conclusion. 43
5.3 Recommendations. 44
REFERENCES. 46
APENDICES. 50
APENDIX I; RESEARCH QUESTIONAIRE. 50
CHAPTER ONE
INTRODUCTION
1.1 Background to The Study
Human civilization has evolved to its present position over the centuries because of human drive and the desire to use God-given intelligence to create a better life. Man's efforts have borne good fruit in various ways, including the breakthrough in information technology that has enabled wide access to information. The world has transformed so dramatically that it can now be seen as a global village, largely due to the boundless availability of information and the ease with which communication flows. Nations are more interconnected than at any other time in history. However, this unrestricted access to the Internet also has a number of negative effects, including an increase in crime and other profound changes in human existence. Since the introduction of new technologies, cyberspace has become a haven for illegal activities.
While its benefits in improving communications and other areas continue to be felt, it has become a tool in the hands of evil conspirators, particularly when technology users fail to take the most basic protective measures and when technological products lack defensive measures (Akinyetun, 2021). The spate of cybercrime has witnessed a catastrophic outbreak in Nigeria with many youths using, misusing and abusing access to the internet network. Various criminal activities have now emerged ranging from cyber stalking, cyber extortion, cyber bullying, phishing, etc.
The rise in cybercrime poses major challenges to national security, particularly in developing countries such as Nigeria. The dangers associated with increasing online activity are becoming increasingly clear as the country continues its digital transformation. Cybercriminals take advantage of these vulnerabilities, causing data breaches, financial losses and even threats to public safety. According to the Nigerian Communications Commission (NCC, 2021), cyber incidents are on the rise, highlighting the urgent need for effective tactics to combat this growing threat. The economic impact of cybercrime is profound, affecting various sectors including banking, telecommunications and government services. A report by the World Economic Forum (WEF, 2022) highlights that cybercrime costs Nigeria billions of dollars annually and undermines economic stability and investor confidence. As financial institutions grapple with the increasing threat of cyberattacks, the broader national security implications are becoming increasingly clear. The intertwining of economic resilience and national security underscores the need for a holistic approach to cybersecurity. In addition, cybercrime can exacerbate existing social tensions and contribute to political instability. Research by Eze et al. (2023) points out that cybercriminal activities such as online fraud and identity theft disproportionately impact vulnerable populations and lead to societal unrest.
Furthermore, the possibility of cybercriminals collaborating with terrorist organizations adds even more complexity to Nigeria's national security landscape (Abubakar, 2023). The intersection of cybercrime and terrorism requires a multi-pronged response that includes not only law enforcement but also community engagement and public awareness campaigns.Top of Form
Bottom of Form
1.2 Statement of The Problem
Cybercrime has emerged as a significant threat to national security in Nigeria, undermining both economic stability and public safety. With the rapid digitization of various sectors, including banking, telecommunications, and government services, the country has become increasingly vulnerable to cyberattacks. According to the Nigerian Cybersecurity Report (NCC, 2021), there was a notable increase in cyber incidents, with a 45% rise in reported cases compared to the previous year. These attacks not only result in financial losses but also compromise sensitive data, jeopardizing the trust of citizens and investors in national institutions.
Moreover, the implications of cybercrime extend beyond economic repercussions; they can exacerbate social tensions and contribute to political instability. A study by Eze et al. (2023) highlights that the pervasive nature of online fraud and identity theft disproportionately impacts marginalized communities, potentially leading to unrest and societal discord. This multifaceted threat underscores the urgency for Nigeria to develop comprehensive strategies to enhance its cybersecurity posture, protecting national interests and ensuring the safety of its citizens in an increasingly interconnected digital landscape.Top of Form
Bottom of Form
1.3 Objectives of The Study
The main objective of the study is to examine the Impact of Cybercrime on National Security in Nigeria. Specific objectives of the study are:
- To assess the prevalence and nature of cybercrimes in Nigeria.
- To examine the direct and indirect impacts of cybercrime on national security.
- To evaluate the effectiveness of current cybersecurity policies and measures in Nigeria.
1.4 Research Questions
To guide the study and achieve the objectives of the study, the following research questions were formulated:
- What are the most common types of cybercrimes prevalent in Nigeria, and how has their frequency and sophistication changed over time?
- How does cybercrime directly threaten the physical security of Nigeria, including its critical infrastructure and national sovereignty?
- Are existing cybersecurity laws and regulations in Nigeria adequate to address the challenges posed by cybercrime?
1.5 Research Hypothesis
The following research hypothesis was developed and tested for the study:
Ho: There is no significant impact of cybercrime on national security in Nigeria.
1.6 Significance of The Study
The study is important for many reasons. The following are the major stakeholders this paper through its practical and theoretical implications and findings will be of great significance:
Firstly, the paper will benefit major stakeholders and policy makers in the Criminology sector. The various analysis, findings and discussions outlined in this paper will serve as a guide in enabling major positive changes in the industry and sub-sectors.
Secondly, the paper is also beneficial to the organizations used for the research. Since first hand data was gotten and analyzed from the organization, they stand a chance to benefit directly from the findings of the study in respect to their various organizations. These findings will fast track growth and enable productivity in the organizations used as a case study.
Finally, the paper will serve as a guide to other researchers willing to research further into the subject matter. Through the conclusions, limitations and gaps identified in the subject matter, other student and independent researchers can have a well laid foundation to conduct further studies.
1.7 Scope of The Study
The study is delimited to FCT, Abuja. Findings and recommendations from the study reflects the views and opinions of respondents sampled in the area. It may not reflect the entire picture in the population.
1.8 Limitations of The Study
The major limitations of the research study are time, financial constraints and delays from respondents. The researcher had difficulties combining lectures with field work. Financial constraints in form of getting adequate funds and sponsors to print questionnaires, hold Focus group discussions and logistics was recorded. Finally, respondents were a bit reluctant in filling questionnaires and submitting them on time. This delayed the project work a bit.
1.9 Organization of The Study
The study is made up of five (5) Chapters. Chapter one of the study gives a general introduction to the subject matter, background to the problem as well as a detailed problem statement of the research. This chapter also sets the objectives of the paper in motion detailing out the significance and scope of the paper.
Chapter Two of the paper entails the review of related literature with regards to corporate governance and integrated reporting. This chapter outlines the conceptual reviews, theoretical reviews and empirical reviews of the study.
Chapter Three centers on the methodologies applied in the study. A more detailed explanation of the research design, population of the study, sample size and technique, data collection method and analysis are discussed in this chapter.
Chapter Four highlights’ data analysis and interpretation giving the readers a thorough room for the discussion of the practical and theoretical implications of data analyzed in the study.
Chapter Five outlines the findings, conclusions and recommendations of the study. Based on objectives set out, the researcher concludes the paper by answering all research questions set out in the study.
1.10 Definition of Terms
1. Cybercrime
Any illegal activity that involves a computer, networked device, or a network, including crimes such as hacking, online fraud, identity theft, and the distribution of malicious software.
2. National Security
The protection of a nation's citizens, economy, and institutions from threats, which includes safeguarding against cyber threats that can undermine governmental stability and public safety.
3. Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks, focusing on preventing unauthorized access, damage, or disruption to computer systems and sensitive information.
4. Critical Infrastructure
Essential systems and assets vital for a country's functioning, including power grids, transportation networks, and communication systems, which can be targets of cybercrime and have significant implications for national security.
5. Cyber Espionage
The act of infiltrating a computer system or network to obtain sensitive information or intelligence for strategic, political, or economic advantage, posing a direct threat to national security.
6. Digital Forensics
The process of collecting, preserving, analyzing, and presenting digital evidence in a legally acceptable manner, crucial for investigating cybercrimes and holding perpetrators accountable.
7. Public-Private Partnership (PPP)
Collaborative agreements between government entities and private sector organizations aimed at enhancing cybersecurity measures, sharing information, and developing strategies to combat cybercrime effectively.