Professional Documents
Culture Documents
Cyber Security Enhancement in Nigeria. A Case Study of Six States in The North Central (Middle Belt) of Nigeria
Cyber Security Enhancement in Nigeria. A Case Study of Six States in The North Central (Middle Belt) of Nigeria
ABSTRACT: Security plays an important role in human life and endeavors. Securing information and
disseminating are critical challenges in the present day. This study aimed at identifying innovative technologies
that aid cybercrimes and can constitute threats to cybersecurity in North Central (Middle Belt) Nigeria covering
its six States and the FCT Abuja. A survey research design was adopted. The researchers employed the use of
Google form in administering the structured questionnaire. The instruments were faced validated by one expert
each from ICT and security. Cronbach Alpha reliability Coefficient was employed and achieved 0.83 level of
coefficient. The population of the study was 200, comprising 100 undergraduate students from computer science
and Computer/Robotics Education, 80 ICT instructors, technologists and lecturers in the University and
Technical Colleges in the Middle Belt Nigeria using innovative technologies for their daily jobs and 20 officers
of the crime agency such as: Independent Corrupt Practices Commission (ICPC) andEconomic and Financial
Crimes Commission (EFCC). Three research purposes and questions as well as the hypothesis guided the study
on Five (5) point Likert scale. Data collected were analyzed using mean and standard deviation for the three
research questions while three hypotheses were tested using t-test at 0.05 level of significance. Major findings
revealed that serious steps are needed to better secure the cybers against cybercrimes. Motivation, types, threats
and strategies for the prevention of cybercrimes were identified. The study recommends that government,
organizations and individuals should place emphasis on moral development, regular training of its employees,
regular update of software, use strong password, back up data and information, produce strong cybersecurity
policy, install antivirus soft and security surveillance (CCTV) in offices in order to safeguard its employees and
properties from being hacked and vandalized.
KEYWORDS: Cybersecurity, cybercrime, cyberattack, cybercriminal, computer virus, Virtual Private Networks
(VPN).
I. INTRODUCTION
Cybersecurity is seen as the protection to defend internet-connected devices and services from
malicious attacks by hackers, spammers, and cybercriminals [1). The rate of cybercrime is viewed as a business
which is boosting the economy [2]. Consequently, it is rising on daily basis. The growing number of attacks are
putting lives at risk, costing companies, individuals, institutions of learning millions of money constituting
the largest transfer of economic wealth in history and is stimulating job and cyber security salaries are high [3]
andmore profitable than any legal business which is threatening national security[4].
AJHSSR Journal P a g e | 95
American Journal of Humanities and Social Sciences Research (AJHSSR) 2024
Innovative Technologies use for Cybercrime,attack methods cybercriminals use for their operation,effect of
cybercrime on business and individuals, methods of preventing/combating cybercrime attacks
RESEARCH QUESTIONS
The following research questions were answered by the study:
1. What innovative technologies can aid cybersecurity threats in the North-central Nigeria and the FCT
Abuja?
2. What type of cybercrimes are committed using innovative technologies in North-central Nigeria and
the FCT Abuja?
3. What type of cybersecurity strategies could be adopted toward reducing cybercrimes in North-central
Nigeria and the FCT Abuja?
RESEARCH HYPOTHESES
The following null hypotheses were developed to guide the study and were tested at 0.05 level of significance.
Ho1. There is no significant difference in the mean responses of the University lecturers and officers of
crime agencies in North-central Nigeria on the innovative technologies that can aid and constitute cyber security
in North-central Nigeria and the F.C.T. Abuja.
Ho2. There is no significant difference between the mean responses of the students and the officers of crime
agencies on the cybercrimes that are committed using innovative technologies in North-central Nigeria and the
F.C.T. Abuja.
PRESENTATION OF RESULTS
Table 1. Mean and t-Test analysis of the innovative technologies that can aid and constitute to cybersecurity
threats in Middle Belt Nigeria and the FCT Abuja.
S/N Items statements X SD Decision Sig Ho
Note: X = Grand mean, SD = Standard Deviation, HO = Null Hypothesis, NS = Not Significant, SA = Strongly
Agreed, A = Agree, U = Undecided, D = Disagree and SD = Strongly Disagree.
Data presented in the Table 1 shows that seven items had their mean values ranging from 3.63 – 4.53 which is
above the cut-off point of 3.50. This means that the university lecturers and officer of the crime agency in
Nigeria that the items 2,5,6,7,8, and 9 are innovative technologies that aid in cybersecurity threats. Also three
items in serial Nos 1,.3, and 4 have their mean value ranging from 2.07 – 2.66 which is below the cut-off point
of 3.50. This implies that the university lecturers and the officer of the crime agency in Nigeria did not agree
that the items are innovative technologies that aid in cybersecurity threats. Therefore, the null hypothesis which
stated that there is no significant difference in the mean responses of the university lecturers and officers of the
crime agency in Nigeria is accepted.
Table 2: Mean and t-test analysis of the cybercrimes that are committed using innovative technologies in North-
central Nigeria.
S/N Items Statements X SD Decision Sig Ho
1 Hacking 3.78 0.59 A 0.55 S
2 Charity funds fraud 4.28 0,81 SA 0.30 S
3 Bank Verification Number (BVN) Scams 3.72 0.60 A 0.31 S
4 Data Airtime (DAT) Theft from service providers 3.52 0.62 A 0.47 S
5 Cyber-plagiarism 3.57 0.88 A 0.86 S
6 Social hijacking 2.19 0.76 D 0.08 NS
7 Cyber pornography 2.26 0.76 D 0.32 NS
8 Cyber-stalking harassment and Blackmailing scam 3.92 0.82 A 0.46 S
9 Intellectual Property Theft 3.86 0.75 A 0.31 S
10 Cyber-Theft/ Banking Fraud 3.60 0.69 A 0.10 S
Source: Researchers‘ Field Work, 2024
Note: X = Grand mean, SD = Standard Deviation, HO = Null Hypothesis, NS = Not Significant, SA = Strongly
Agree, A = Agree, U = Undecided, D = Disagree, SD = Strongly Disagree.
Data presented in Table 2 shows that enlightens had their values ranging from 3.52 – 4.28 which is above the
cut-off point of 3.50. This implies that the students and the officers of crime agency agreed that the items in
serial Nos 1,2,3,4,5,8,9.10 are crime committed using innovative technologies in North-central Nigeria. Also,
AJHSSR Journal P a g e | 110
American Journal of Humanities and Social Sciences Research (AJHSSR) 2024
two items in serial Nos 6 and 7 had their mean values ranging from 2.19 – 2.26 which are below the cut-off
point of 3.50. This implies that the students and the officers of crime agency response did not agree that there
are crimes committed using innovative technologies in North-central Nigeria.
Table 2 also shows that all the 10 items had their significant value to be greater than 0.05 (p>0.05). This
indicated that there was no significant difference between the mean responses of students and the officers of
crime agency on crimes committed using innovative technologies in North-central Nigeria. This means that the
hypothesis which stated there is no significant difference in the mean response of male and female students on
the crimes committed using innovative technologies in North-central Nigeria.
Table 3: Mean and t-test analysis of the consequent cybersecurity strategies to be adopted to reduce cybercrimes
in North-central Nigeria.
REFERECES
[1) Kelley, K.(2023).What is Cybersecurity & Importance of Cyber Security. Retrieved
from:https://www.simplilearn.com › tutorials › what-is-cyber-s...
[2] Brush, K., & Cobb, M. (2021).What is cybercrime? Definition from SearchSecurity. Retrieved from:
https://www.techtarget.com › searchsecurity › cybercrime
[3] Bay Atlantic University - Washington, D.C.(2023). 6 Compelling Reasons Why You Should Study
Cyber ...Retrieved from: https://bau.edu › blog › why-study-cyber-security
[4] The University of Tulsa(2023). 8 Reasons Demand for Cybersecurity Professionals Will keep raising.
Retrieved from: https://online.utulsa.edu › blog › reasons-demand-for-cy...
[5] UNext Learning(2022).Major Causes of Cyber Crimes You Must Be Aware Of. Retrieved from:
https://u-next.com › blogs › cyber-security › major-caus...
[6] Security Intelligence (2023). 7 Reasons Global Attacks Will Rise Significantly in 2023. Retrieved
from: https://securityintelligence.com › articles › 7-reasons-glo
[7] Mathews, I.(2023). Cyber Crime Definition, Types & Statistics – Lesson. Retrieved from:
https://study.com › academy › lesson › what-is-cyber-cr..
[8] Databasix(2023). 20 Frightening Cyber Security Facts & Stats. Retrieved from:
https://www.dbxuk.com › statistics › cyber-security
[9] Alechenu,J. (2023).Cybercrime: Senate decries $500m annual loss, threats to digital ...Retrieved from:
https://www.vanguardngr.com › 2023/11 › cybercrime-s.
[10] BusinessDay (2023). Nigeria recorded a 174% increase in cybercrimes in six months. Retrieved from:
https://businessday.ng › news › article › nigeria-recorde...
[11] Deborati, & Jaishankar (2017). Computer experience, school support and computer anxieties;
Educational psychology, 17(3), 267-284.
[12] Gusen, J.N. (2019). SWOT Analysis of ICT Across the Curriculum. Jos. Byang Printing Press
[13] Baker, K.(2023).10 Most Common Types of Cyber Attacks Today - CrowdStrike. Retrieved from:
https://www.crowdstrike.com › cybersecurity-101 › most