2018
DOI: 10.1108/jfc-12-2016-0079
|View full text |Cite
|
Sign up to set email alerts
|

Borderless crimes and digital forensic: Nigerian perspectives

Abstract: Purpose This paper aims to determine the extent to which the myriad of cybercrimes is within the purview of extant Nigerian laws against the backdrop of the modicum of legal and institutional mechanisms available at international law for combating cybercrimes. Design/methodology/approach This study is library based. It relies on secondary data generated by the variegated multilateral agencies, law reports of international and municipal tribunals, relevant books, journals, monographs policy papers and so forth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…As web browser sessions have become a common vehicle for cyber-attacks (Umar, Yudhana, & Faiz, 2018), advancing digital forensics to collect and store cybercrime evidence (Arewa, 2018) is of critical importance to privacy protection as e-commerce becomes increasingly borderless.…”
Section: Increasing Need For Digital Forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…As web browser sessions have become a common vehicle for cyber-attacks (Umar, Yudhana, & Faiz, 2018), advancing digital forensics to collect and store cybercrime evidence (Arewa, 2018) is of critical importance to privacy protection as e-commerce becomes increasingly borderless.…”
Section: Increasing Need For Digital Forensicsmentioning
confidence: 99%
“…The model follows the NIST incident handling guide and streams incident handling phases in a pipeline. The proposed model meets the criteria of minimizing the impact of cyberattacks (Khanuja & Adane, 2019) and gathering evidence from multiple sources (Arewa, 2018). As most e-commerce firms lack digital forensic capabilities to respond to security incidents in a timely manner (Hutchings, 2012), this research provides two major contributions to enhancing cybersecurity in this era of rapid expansion and increasing complexity of cross-border e-commerce: (1) automatic detection of suspicious behaviors and events and (2) generation of timely forensic reports to facilitate efficient handling of cyber incidents.…”
Section: Conclusion and Future Researchmentioning
confidence: 99%
“…Most of the literature on this area are based on the researches conducted in the Western world (Gaither, 2018;Nicolae, 2017;Arežina, 2014;Ahadiat, 2010;Davis, 2010;Akers, 2003;McMullen, 2010;Caliyurt and Crowther, 2006;Brooks and Labelle, 2006;Seda and Kramer, 2014;KrameR, Seda and Bobashev, 2017) and African countries (Ademola, 2017;Kodongo, Mokaleli-Mokoteli and Maina, 2014;Okoye and Akenbor, 2009;Dada, 2016;Arewa, 2018;Kingdom and Aduwo, 2016;Oladejo and Oluwaseun, 2015;Okoye and Jugu, 2010).…”
Section: Practical Implications Of the Studymentioning
confidence: 99%
“…Nigeria has, in fact, suffered from a reputation of being a haven of cyber-enabled fraudulent activities (Ebenezer et al, 2016;Ojedokun and Eraye, 2012). These would include the notorious 419 scam that spread around the world from 1980s onwards (Arewa, 2018) and more recently 'online advanced fee fraud' (Osho and Onoja, 2015).…”
Section: Introductionmentioning
confidence: 99%