2017
DOI: 10.1016/j.clsr.2017.03.020
|View full text |Cite
|
Sign up to set email alerts
|

A review of the legal and regulatory frameworks of Nigerian Cybercrimes Act 2015

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Carrier and Spafford [11] further divided forensic readiness into operational and infrastructural readiness, with the former being concerned with adequate training and equipment and the latter with efficient data preservation. There are different ways to view digital forensic readiness, such as time, cost, training, and technology [19]. To be adequately empowered to investigate Nigeria's growing Internet fraud cases, the country's financial crime agencies must attain considerable forensic readiness.…”
Section: Digital Forensic Readinessmentioning
confidence: 99%
“…Carrier and Spafford [11] further divided forensic readiness into operational and infrastructural readiness, with the former being concerned with adequate training and equipment and the latter with efficient data preservation. There are different ways to view digital forensic readiness, such as time, cost, training, and technology [19]. To be adequately empowered to investigate Nigeria's growing Internet fraud cases, the country's financial crime agencies must attain considerable forensic readiness.…”
Section: Digital Forensic Readinessmentioning
confidence: 99%
“…(1) The concept of computer cybercrime Computer cybercrime is the use of computer technology to attack systems and information, destroy the network or implement other network-assisted crimes (Aaron, 2018;Eboibi, 2017). From the perspective of specific criminal methods, computer network crimes include criminal acts in which criminals use technologies or tools on the Internet to program, encrypt, and decrypt (Parah, 2017).…”
Section: Concepts Related To Computer Cybercrimementioning
confidence: 99%
“…Another aspect which needs to be considered is that enacting an Act and enforcing one, are very different matters. Regardless of the innate shortcomings within the Cybercrime Act 2015, it is worth asking whether the Nigerian authorities are capable of implementing and enforcing this Act (Eboibi, 2017).…”
Section: Figure 6: Key Challenges In Managing Appropriate Responses To Cyber Security Threats (N = 80)mentioning
confidence: 99%