ChapterPDF Available

Ethical Implications of the Techno-Social Dilemma in Contemporary Cyber-Security Phenomenon in Africa: Experience From Nigeria

Authors:

Abstract and Figures

This article examines the cyber security dimension of the global information Infrastructure which has resulted in the attainment of remarkable milestones and unlimited opportunities. However, these benefits notwithstanding, the cyberspace is increasingly under attack by cybercriminals, and the cost and damages from such attacks are increasing alarming. This article therefore, sets out to examine the ethical implications of cybersecurity phenomenon. Relying upon an extensive contemporary literature on cyber security, this study examines the phenomenon using the protection motivation theory. The article employs qualitative analysis of the current cybersecurity landscape in Nigeria. With an insight provided into understanding the independent layers of cyber security in Nigeria, a criterion on what should constitute appropriate procedure for cyber security is thus supplied. Findings posit that with the vulnerability of cyberspace, cyber security phenomenon in Africa, mirrors the existing social inequalities and widens the social division that is more apparent with the expansion of the ICTs.
Content may be subject to copyright.
DOI: 10.4018/IJICTHD.2018010102

Volume 10 • Issue 1 • January-March 2018
Copyright © 2018, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
17




Essien D. Essien, University of Uyo, Uyo, Nigeria

This article examines the cyber security dimension of the global information Infrastructure which
has resulted in the attainment of remarkable milestones and unlimited opportunities. However, these
benefits notwithstanding, the cyberspace is increasingly under attack by cybercriminals, and the cost
and damages from such attacks are increasing alarming. This article therefore, sets out to examine the
ethical implications of cybersecurity phenomenon. Relying upon an extensive contemporary literature
on cyber security, this study examines the phenomenon using the protection motivation theory. The
article employs qualitative analysis of the current cybersecurity landscape in Nigeria. With an insight
provided into understanding the independent layers of cyber security in Nigeria, a criterion on what
should constitute appropriate procedure for cyber security is thus supplied. Findings posit that with
the vulnerability of cyberspace, cyber security phenomenon in Africa, mirrors the existing social
inequalities and widens the social division that is more apparent with the expansion of the ICTs.

Cybercrime, Cybersecurity, Cyberspace, E-Fraud, Ethics, Information Infrastructure, Nigeria, Techno-Social
Dilemma

The emergence of the internet as an international technological communication tool is one of the
most significant developments in the 21st century cyberspace landscape (Wada & Odulaja, 2012). But
behind this achievement is the question of ethics, values, and norms that transcends borders, creating
a variety of challenges in today’s interconnected society which have to be addressed (DeJoode, 2011).
There are no mincing words that the rise of the Internet and new media in particular and the digital
economy in general has brought to the fore the fact that Africa is the most marginalized and excluded
region of the world and she is facing a number of threats as her own share of the global insecurity
problem. Apparently, as part of the evolving trend, Africa’s territorial sovereignty and integrity is no
longer limited to its sea and land borders but its cyberspace (John, 2013). This explains why today’s
threats to security have been globalised while their impact has been localized. Nevertheless, the
world’s growing dependence on the internet has revealed that the cyber space is now as important as
the physical space and its vulnerability to disruption and attack, has highlighted the importance and
the necessity for a coordinated response for security at all sphere, be it national, regional or global
levels (Kumar, 2010).

Volume 10 • Issue 1 • January-March 2018
18
Additionally, these threats concern the well-being of an individual whose identity is rooted
in different socio-economic and cultural backgrounds. The security concern includes the rapidly
evolving threat landscape of the cyberspace which has heightened the extent to which cyberspace
vulnerabilities and limited capacities prevent Africa from maximising the benefits of the digital
economy (Cassim, 2011). Besides, the people are facing a growing number of uncertainties related to
the use of the digital environment such as the digital security threats and incidents that have increased
the financial, privacy, and reputational consequences, and in some cases, produce physical damage.
Although stakeholders are increasingly aware of these challenges raised by digital security risk, they
often approach the problem only from the technical perspective, and in a manner that tends to play
down on the ethical implications of the social cleavages in digital use and applications that accompany
information poverty and insecurity challenges (Cassim, 2011).
Even though recent scholarship has endeavored to articulate a more nuanced conceptualization
of the nature of global cyber security today which has changed and require different thinking and
responses. It lends credence to the fact that most of the global threats we face today are rooted in the
deeper issues of ethics and values in international relation, politics and interaction (Alexander, 2008).
A good example is the cyber security with a techno-social fissure that has splintered into a multitude
of cracks with a phenomenal impact on the nature and future of Africa’s growth, development and
existence. This polysemic socio-ethical condition no doubt has a profoundly contentious security
implication for Africa that are most dramatic and urgent (Atta-Asamoah, 2010). It threatens not only
the security of the region but the security of communities and/or the entire portions of the region’s
population. It is therefore a risk to both regional/national as well as the human security.
But despite the seeming pessimism of this development, the rhetoric of the discourse concerning
the emerging pattern of cyber activity in Africa today reveals that the digital divide is not only a
technological predicament; it is also an ethical crisis. This is so because the cyber security divide and
processes are redefining security in the 21st century (Chiemeke, Evwiekpaege & Chete, 2006). This
study therefore examines some of the numerous ethical issues/challenges posed by contemporary
information society and technology to several sections of African communities. It posits that
cybersecurity though a new issue with a global dimension, has an important developmental implication
for Africa (Atta-Asamoah, 2010). Therefore, breaking it apart into its ethical underpinnings will
provide a framework for effectively addressing cyber threats and digital vulnerability in Africa.
For Africa, cyber insecurity leads to social exclusion and questions the information economy that
generates consequences for social divisions, social insecurity, diversity and differences among the
already diversified African society (Longe & Chiemeke, 2008). Though scholarly investigation into the
ethical issues concerning cyber security in Africa has regrettably been modest and disproportionate,
the solutions to today’s cyber security problems have to take into account some ethical considerations
as well as the region’s and/or individual’s cultural and socio-economic background. The cyber
security phenomenon from an African perspective, mirrors the already existing social inequalities
and widens the social division that has simply become more apparent with the expansion of the ICTs
(Olasanmi, 2010).

Several studies have demonstrated that the level of negligence and ignorance in the Information and
Communication Technologies (ICTs) sector in Africa represents a serious threat for the entire continent.
The impact of cybercrime on the region is serious; this explains why forensic experts are claiming
cyber-crime poses the biggest challenge to the growth, development, integrity and sovereignty of
Africa. This study therefore, adopts the protection motivation theory which was propounded by R.
Rogers in 1975. The theory measures the coping behavior of a person, country and/or constituency
when informed or aware of a threatening event such as cyber-criminal activities (Rippetoe & Rogers
1987). This behavior is thus directly influenced by a commensurate coping response which indicates

Volume 10 • Issue 1 • January-March 2018
19
the idea of making provision for cyber security. The coping response in this regard is the net result
of the person’s evaluation of the threat appraisal and coping appraisal. Threat appraisal in this
perspective refers to a person’s assessment of the level of danger posed by the threat (Prentice-Dunn
& McCleandon, 2001). It consists of perceived vulnerability, perceived severity, and reward such as
the intrinsic and extrinsic rewards of not adopting a recommended coping response. A good example
of reward for cybercrime involves the psychological pleasure and peer approval (Prentice-Dunn &
McClendon 2001). The second idea revolves around the coping appraisal which has something to do
with an individual, nation or regional assessment of the capacity to cope with and/or avert the loss
and damage resulting from threats and/or danger of cybercrime. It is also made up of self-efficacy,
response efficacy, and response cost of adopting cybercrime behavior. In cybercrime for example,
self-efficacy refers to criminal’s confidence being involved in the act, response efficacy to the
consequence of the act, and the response cost to pull out or stop cybercriminality. For a continent
plagued by growing level of insecurity such as food insecurity, conflict and poverty, vulnerability
and dependency in technology and scientific advancement, averting cybercrime activities, as well as
developing effective response towards cyber threats in telecommunications issues warrants appropriate
attention and high precedence (Rippetoe & Rogers, 1987).

In today’s information-centric society, the securing of information for information communication
technologies (ICT) as well as ICT users has become a matter of overriding significance. For instance,
the Internet continues to be threatened by numerous risks, such as the exploitation of private
information (Riem, 2001; De Joode, 2011). Thus, Internet users are at risk of having their private
information compromised and misused. Consequently, different stakeholders in ICTs and society
especially in Africa have long acknowledged this, and have consequently implemented some level
of information security strategies. Unfortunately, many of these information security strategies are
innately flawed, as the components of such an information security strategy and its management
involves processes, technology and people (Atkinson, Furnell & Phippen, 2009). A good example is
a scenario where the most challenging attacks exploit human vulnerabilities rather than technological
ones, which are easier to remediate. Increasingly though, cybercrime organizations use information
gleaned from social-networking sites to craft highly targeted “phishing” attacks that entice individuals
or systems administrators to click on links that will install spyware on their laptop. Cyber criminals
exploit the vulnerability of millions of inexperienced users and dupe them with unsophisticated
or well-worn scamming techniques. Although processes and technologies can be created to be
theoretically secure, how accurately secure they are depends on the people involved in their use as
well as their implementation (Klimburg, 2012). This is because, in many of these cases, laypeople
especially in Africa with high illiteracy rate are not aware of the cyber danger surrounding them. They
are just happy that they can operate their gadgets and it would seem not enough is done to train and
educate them in using these gadgets safely. This however, confirms why Jensen express fears that,
“the availability of specialist training in telecommunications is currently extremely limited on the
continent of Africa” (Jensen, 2001). Furthermore, whether people use the technologies in a secure
manner and follow the secure processes completely and correctly can drastically affect the extent to
which these components are secure, because people can consciously and unconsciously become a
threat to any information security strategy (Thomson, Von Solms & Louw, 2006). As a result of this
failing, many scholars are of the opinion that communication, education and awareness is integral
part in cyber security culture and a critical enabler for cybersecurity governance.
According to Thomson, Von Solms and Louw (2006), many users lack awareness and knowledge;
consequently, they are ignorant of the need to protect their personal and confidential information.
Moreover, users’ insecure online behaviour makes them easy targets for exploitation. The lack of
cyber-security awareness amongst adults negatively impacts their role of protecting the children

Volume 10 • Issue 1 • January-March 2018
20
in their care (Kortjan & Von Solms, 2013). In this regard, Kortjan and Von Solms (2013) further
argue that many parents are not knowledgeable of the threats apparent online; and therefore, they
are unable to teach their children about secure online behaviour. As a result, the safety of children is
also compromised. Lack of knowledge is viewed as an important factor that contributes to insecure
online behaviour by Internet users. As a result, people are seen as a severe threat to each other’s
security” (Mitnick & Simon, 2001). In addition, such lack of the relevant knowledge has made the
African population easy targets for hackers and botnet operators (Kritzinger & Von Solms, 2012). In
view of the consequences of the lack of knowledge, cyber-security and awareness therefore become
issues of fundamental importance.
Christensen (2003) affirms that promoting cyber-security awareness would contribute greatly
towards cyber-security culture and subsequently toward building a relevant and efficient cyber-security
governance system. Awareness and education can provide Internet users with the ability to recognise
and circumvent any risks that are apparent online (Kritzinger & Padayachee, 2013). Additionally,
education plays a critical part in cultivating a culture of secure behaviour amongst Internet users.
While the working class may be getting some form of cyber-security awareness and education from
industry, for home users and society at large, a national campaign for cyber-security awareness and
education is urgently required (Christensen, 2003). In this context, it is the role of the government
and other stakeholders to empower all levels of society by providing the necessary knowledge and
expertise to act securely online.

Ethical issues long preceded information communication technologies (ICTs). Nevertheless,
information communication technologies (ICTs) has heightened ethical concerns, taxed existing
social arrangements, and made some laws obsolete or severely crippled. Information technologies
and systems have also created new opportunities for criminal behavior and mischief (Cole, Chetty,
LaRose, Reitta, Schmitte & Goodman, 2008). There are four key technological trends responsible
for these ethical stresses. Cyber-attacks have the potentials of having powerful impacts on people’s
lives, as well as societies. Consequently, governments and other stakeholders are expected to have
responsibility to protect the citizens, as well as the economic activities that goes on in the society.
In short, we generally expect governments to act to protect the security of people and the society.
But as recent examples show, there is public concern about what state security agencies do in pursuit
of national security. Many potential cyberattacks and responses pertain to ethical trade-offs: security
vs. privacy, individual rights vs. an overall public good, the placing of burdens on particular groups
over others (Rowe, Reeves & Gallaher, 2009). In this regard, the critical reasoning tools found in
practical ethics play an essential role in identifying where value conflicts arise, and offer ways of
justifying responses that help to resolve such conflicts of interest in the digital environment.
Ethics implies the idea of acting as free moral agents. In this sense, one is expected to make
choices which will guide one’s behaviors. The corollary therefore is that information communication
technologies (ICTs) raise new ethical questions for both individuals and societies because they create
opportunities for intense social change, and thus threaten existing distributions of power, money,
rights, and obligations (Rein, 2001). Like other technologies, such as steam engines, electricity, the
telephone, and the radio, information communication technologies (ICTs) can be used to achieve
social progress, but it can also be used to commit crimes and threaten cherished social values. The
development of information communication technologies (ICTs) will produce benefits for many and
costs for others. Thus, ethical issues in information communication technologies (ICTs) have been
given new urgency by the rise of the Internet and electronic commerce (Tavani, 2006). Internet and
digital firm technologies make it easier than ever to assemble, integrate, and distribute information,
unleashing new concerns about the appropriate use of customer information, the protection of personal
privacy, and the protection of intellectual property. Service providers and some stakeholders with

Volume 10 • Issue 1 • January-March 2018
21
skilled and specialized understanding can manipulate the information communication technologies
(ICTs) systems by submitting phony records, and diverting cash, on a scale unimaginable in the
pre-computer era.
Other serious ethical issues raised by information communication technologies (ICTs) include
establishing accountability for the consequences of information systems, setting standards to safeguard
system quality that protects the safety of the individual and society, and preserving values and
institutions considered essential to the quality of life in an information communication technologies
(ICTs) society (Bullock, 2005). Anytime one is engaged with information communication technologies
(ICTs), it may be necessary to ask certain pertinent and salient questions, such as, “What is the ethical
and socially responsible course of action to take or expect?”
Ethical choices are decisions made by individuals who are responsible for the consequences
of their actions. Responsibility is a key element of ethical action in information communication
technologies (ICTs) environment (Essien, 2015). Responsibility means that you accept the potential
costs, duties, and obligations for the decisions you make. Accountability is another feature of
information communication technologies (ICTs) systems and social institutions. This however
means that mechanisms must have tobe put in place to determine who took responsible action, who
is responsible, etc (Nissenbaum, 2005). The information communication technologies (ICTs) systems
and institutions in which it is impossible to find out who took what action are inherently incapable
of ethical analysis or ethical action. Similarly, liability extends the concept of responsibility further
to the area of laws. Liability is a feature of political systems in which a body of laws is in place that
permits individuals to recover the damages done to them by other actors, systems, or organizations.
In addition to that is the concept of due process in which some feature of law governs the societies
and is a process in which laws are known and understood and there is an ability to appeal to higher
authorities to ensure that the laws are appropriately applied (Himanen, 2001). These basic concepts
form the underpinning of an ethical analysis of information communication technologies (ICTs) as
well as those who manage it.
It is pertinent to note that, information communication technologies (ICTs) are filtered through
social institutions, organizations, and individuals. In earnest, information communication technologies
(ICTs) do not have impacts by themselves. Whatever impacts of information communication
technologies (ICTs) that exist are the products of institutional, organizational, and individual actions
and behaviors. Similarly, responsibility for the actions, inactions, and the consequences of the usage
of information communication technologies (ICTs) clearly falls on the institutions, organizations, and
individual that manages and uses these technologies. The process of using information communication
technologies (ICTs) in a socially responsible manner means that you can and will be held accountable
for the consequences of your actions (Borge, 2002).

Cybersecurity has become a big menace in Nigeria. This is specially so because of the weak
infrastructure, poor legal framework, inadequate security facilities, derisory manpower, and deficient
resource base. Nonetheless, the fight against cybercrime requires coordinated effort among all
stakeholders such as government bodies, educational institutions, business organisations and law
enforcement authorities (Wada & Odulaja, 2012). It is worth mentioning that digital developments
in Africa in general and Nigeria in particular are already moving at a faster pace and the society
is changing profoundly. However, new challenges arise alongside this growth tempo just as the
increasing technological exposure poses its own vulnerabilities and risks. For instance, it is argued
that the volume of threat in Nigeria is massive, with 286 million different virus samples counted (783,
562 samples per day; 32, 648 samples per hour; 544 samples per minute and about nine samples per
second) on a yearly basis (Longe & Chimeke, 2008). Figure 1 shows the lifecycle of Cyber Security.

Volume 10 • Issue 1 • January-March 2018
22
This presents a very dangerous portrait as hackers could invade the airport control tower and
release information that could compromise weather and traffic signals to pilots in-flight. In this
situation, the dire consequences are that planes may disappear just as it was popularly suspected that
the Malaysian flight MH370 that departed from Kuala Lumpur International Airport on 8 March 2014
and got missing enroute to Beijing may have been a victim of cyber terror attack (Agboola, 2006).
The consequences could also be disastrous if hackers invade the defence, oil and gas, banking and
telco sectors. Considering the borderless nature of cybercrime and emerging cybersecurity threats in
contemporary time, the only viable way forward in fighting cybercrime is through multi-stakeholder,
inter-agency, bilateral and multilateral collaboration and cooperation.
Today, the challenges of information communication technologies (ICTs in Nigeria on achieving
a level of technological security in order to prevent and control risks; contribute to the economy and
guarantee access to information to individuals while at the same time creating a climate of confidence
and trust in ICTs and protecting rights and freedoms is quite enormous (Ahmed, 2008). On the
appendage of this development, the Global tracking of cyber-attacks in Africa indicate that Nigeria is
among countries with high cases of software piracy, intellectual property theft and malware attacks.
This situation presents a serious challenge to the country’s resolve to take advantage of the enormous
opportunities that Internet brings, while balancing and managing its associated risks. Table 1 shows
the Nigerian Cyber Security Threat Landscape.
This is however manifest in the 2014 Annual report of the Nigeria Deposit Insurance Corporation
(NDIC), which shows that, between 2013 and 2014, fraud on e-payment platform in the Nigerian
Figure 1. Cyber Security Lifecycle

Volume 10 • Issue 1 • January-March 2018
23
banking sector increased by 183 per cent. Similarly, a report published in 2014 by the Centre for
Strategic and International Studies, UK, estimated the annual cost of cybercrime in Nigeria to be about
0.08 per cent of our GDP, representing about N127 billion (about 402,855 million US Dollars) (Essien,
2015). Cybersecurity no doubt has become a part of our day-to-day lives in contemporary society and
it is something that can have a momentous negative impact on both individuals and organizations.
Its implications have the capacity to touch on human factors, legal and compliance, leadership and
governance, information risk management and business continuity. This explains why in May 2015,
the cybercrime bill was signed into law in Nigeria by erstwhile President Goodluck Jonathan. The
implications of this to individuals and corporations are that cybercrime is now properly defined and
legal consequences are attached to any defiance of this law.
Relatedly, several initiatives directed at protecting the interests of Nigerians in cyberspace have
been put in place, such as the National Information Technology Development Agency (NITDA),
Nigerian Communications Commission (NCC), Economic and Financial Crimes Commission (EFCC)
and more, while laying the requisite groundwork for Information and Communication Technologies
(ICTs) that would foster development and aid growth in the Nigerian society, have also been made
working (Olasanmi, 2010). In the same vein, agencies have been created to work towards curbing
the menace of cybercrime. They include a number of Ministries, Departments and Agencies (MDAs)
established to undertake various stratagems toward bringing the problem of cybercrime under control.
Some notable cybercrime initiatives include setting up a National Cybercrime Working Group
(NCWG) that had stakeholders drawn from the law enforcement agencies, the financial sector and
ICT professionals; and a scheme of Computer Emergency Response Team (CERT) center by NCWG
and NITDA (Olasanmi, 2010).
However, what is particularly intriguing about cybersecurity and its challenges is the way and
manner in which the cyber-attacks are carried out and/or sponsored. This perhaps is due to the fact
that by the nature of cyberspace, which does not have define jurisdiction by air, sea or by land,
the perpetrators of cybercrimes do not only remain ubiquitous but dangerous. A good example of
cybersecurity and its challenges in Nigeria in particular and Africa in general is the incident in August
2012, when Boko Haram, the insurgent group responsible for several thousands of deaths, kidnaps
and bombings in Nigeria reportedly hacked the personnel records and databases of the Directorate
of Secret Service, the Nigeria’s secret police popularly known with the acronym DSS or SSS. Boko
Haram group were able to successfully compromise the covert personnel data system of the DSS
(Essien, 2015). This however, culminated into database breach revealed the names, addresses, bank
information and family members of current and former personnel assigned to the country’s undercover
policy agency.
Rationalizing the show of aggression on the security outfit, the Boko Haram group held that
the security breach was carried out in order to get back at the government and protest the Nigerian
Table 1. Nigerian Cyber Security Threat Landscape
Target Sectors of the Cyber crime in
Nigeria
1. Government Agencies, Nigerian Think Tanks
2. Nigerian Media, Communication service providers
3. Various Sectors of the Nigerian economy (Financial, Petroleum/Oil and
gas, Retail, Power and energy, ICT, etc.)
4. High Profile Government Websites
5. Industries, parastatals and private establishments etc
Tactics adopt by cybercrime fraudsters
in Nigeria
1. Spear Phishing
2. Software Hijacking
3. Specific Nigerian Firewall and AV Targeting
4. Malware, Spyware and Adware
5. DDOS
6. Colluding With insiders

Volume 10 • Issue 1 • January-March 2018
24
government handling of issues involving the insurgents especially the none release of their members
detained in various prisons across the country. Interestingly, this case scenario obviously depicts
the facts that no nation is strictly speaking immune from cyberspace attacks irrespective of status.
But the preponderance swings heavier in developing economies such as Nigeria (Longe, Mbarika,
Kourouma, Wada & Isabalija, 2009).

Though cybercrime encompasses a broad range of illegal activities perpetrated electronically, it can
be generally divided into five broad categories with detachments such as intrusive offences, content-
related offences, copyright and trademark-related offences, computer-related offences, and combination
offences. However, the complexity in types and forms of cybercrime increases the difficulty to fight
back and/or provide commensurate security. According to Symantec corporation, there are several
contributing factors that attract cybercriminals to operate in specific countries and regions of the world
such as access to broadband connections and/or uninterrupted internet connectivity. Nonetheless,
the cybercrimes landscape in Nigeria can be categorised into two segments for easy comprehension
as indicated in Figure 2.
There is an endless list of possible crimes that can occur through the use of the Internet and
computer. Worldwide, the predominance of electronic pathways in most payment system has made
them ready targets for fraudsters. This study attempts a description of a good number of the widespread
forms of electronic fraud technique common in many countries especially developing countries like
Nigeria.

Identity theft is a form of fraud where a person using another person’s personal information to engage
in fraudulent activities. It can take many forms, from fraudulent credit card use, to your entire identity
being used to open accounts, obtain loans, and conduct other illegal activities. Be suspicious if anyone
asks you for your personal information. Scammers use convincing stories to explain why you need
to give them money or personal details.

Card skimming involves the illegal use of a skimming device to copy, capture and collect data from
magnetic stripe and PIN on credit and debit cards. The captured card and PIN details are encoded
onto a counterfeit card and used by an identity thief to make fraudulent account withdrawals and
transactions in the name of the actual account holder. Skimming can occur at any bank ATM or via
a compromised POS machine. Usually, fraudsters would attach false casing and PIN pad overlay
devices on genuine existing ATMs, or they can attach a disguised skimming device onto a card
reader entry used in tandem with a concealed camera to capture and record PIN Entry. This has
resulted numerous fraudulent activities across many countries especially in developing countries and
particularly in Africa with Nigeria in the forefront. That explains why the Central Bank of Nigeria
reported recently that the Nigerian banking sector lost over 20bn through internet fraud and the
impact on the nation’s cashless policy is significant (TNB, 2015). Table 2 breaks down the reported
fraud by volume and value.
Although the volume of fraud cases reported in 2015 and 2014 had increased by 78% and 70%
respectively relative to cases reported in 2013: the value of attempted fraud cases reported in 2014
and 2015 decreased by 60% and 50% respectively. The actual loss associated with fraud cases reported
in 2015 and 2014 increased by over 1000% relative to 2013 loss. Similarly, actual fraud loss as a
percentage of attempted fraud increased to 80% and 85% in 2014 and 2015 respectively from 3% in
2013. Table 3 shows the distribution of actual loss through Cyber Fraud.

Volume 10 • Issue 1 • January-March 2018
25

Phishing is a form of social engineering that attempts to steal sensitive information such as usernames,
passwords, and card numbers usually for malicious reasons, by disguising as a trustworthy entity
in an electronic communication. A fake website is created to look similar to that of a legitimate
organization, typically a financial institution such as a bank or insurance company. An email or SMS
is sent requesting that the recipient accesses the fake website and enter their personal details, including
security access codes. The page looks genuine but users entering information are inadvertently sending
their information to the fraudster.
Figure 2. Categories of Cybercrimes prevalent in Nigeria
Table 2. Reported fraud by volume and value
Year Attempted Fraud (Volume) Attempted Fraud (Value) Actual Loss (Value)
2013 882 19,148,787,069 486,194,350
2014 1,461 77,501,527,748 6,215,987,323
2015 1,912 85,412,253,761 7,546,339,281
Source: Nigeria Inter-Bank Settlement System (NIBBS) E-Payment Fraud

Volume 10 • Issue 1 • January-March 2018
26

Viruses and Trojans are harmful programmes that are loaded onto computers without the owners’
knowledge. The goal of these programmes may be to obtain or damage information, hinder the
performance of your computer, or flood you with advertising. Viruses spread by infecting computers
and then replicating. Trojans appear as genuine applications and then embed themselves into a
computer to monitor activity and collect information.

Spyware and adware is an injurious programme used by cyber criminals to attack unsuspecting
individuals and their system devices. When clicking on pop-up advertisements – ones that “pop up”
in a separate browser window – it’s possible you are also downloading “spyware” or “adware”. These
programmes often come bundled with free programmes, applications or services you may download
from the Internet. Spyware or Adware software covertly gathers your user information and monitors
your Internet activity, usually for advertising purposes.

In the emerging software-driven information society, it is difficult for any nation or institution to
shut itself out of the cyberspace. The internet as the world knows it has given birth to e-government,
e-health, e-commerce, e-education, e-agriculture, e-learning, online music, and e-banking, online
banking, and all sorts of convenience in the society. Therefore, the management and security of the
cyberspace is of paramount concern to the multi-stakeholders, driving the process, from the public to
the private entities. This is because cybercrime is costing the continent of Africa billions of dollars.
Cybersecurity exposes the limitlessness of the cyberspace and erodes the national borders. This
constitutes some of the features of the new technology which represents one of the most serious
economic and security challenges facing every nation today, Nigeria inclusive.
Today, the negative frontiers of cyberspace that Africa like the rest of the world has to contend
with as the negative outcome of cyber threats such as malware, cyber harassment, Spoofing, Phishing,
Spam, Pharming, Hacking, Viruses, Trojans, Worms, Child Online pornography and spyware. The
ubiquitous cyberspace is fast turning a danger zone in spite of the huge successes and positive attributes
that the digital environment has introduced as an integral part of the modern information society.
Nonetheless, with the exponential growth in digital connections on the African continent and the
Table 3. Distribution of Actual Loss in NGN through Cyber Fraud
Channel 2013 –value 2014 –value 2015-Value % change
ATM 54,99,829.00 2,688,669,292.00 7,744,472,198.00 4788.50%
POS 5,851,443.00 157,610,831.00 183,542,663.00 2593.54%
Across counter 13,851,780.00 140,813,927.00 162,778,429.00 916.58%
Web 109,295,898.00 1,031,239,284.00 1,473,178,246.00 843.53%
Internet banking 271,762,696.00 2,120,881,512.00 2,762,664,835.00 680.42%
E-Commerce 13,948,390.00 58,994,920.00 64,785,895.00 322.95%
Mobile 6,787,544.00 13,328,957.00 19,759,663.00 96.37%
Cheques 8,693,770.00 4,448,600.00 5,623,744.00 48.83%
Total 485,191,350.00 6,215,987,323.00 12,416,805,673.00
Source: Nigeria Inter-Bank Settlement System (NIBBS) E-Payment Fraud

Volume 10 • Issue 1 • January-March 2018
27
potential growth trajectory for cybercrime related incidence, analysts have called for improved cyber
security throughout Africa, from personal computers to corporations and indeed government digital
networks. A number of experts have however argued that the fissure between the growth in cybercrime
in Africa and cyber security awareness can be best addressed in a comprehensive multi-sectoral policy.
This will nevertheless involve the perspective of good legislation, technical measures, institutional
structures, cyber security education and international multi-stakeholder cooperation mechanisms.
Though the magnitude of cybersecurity challenges in the African continent in general and Nigeria in
particular is enormous, the capacity to win the fight against cybercrime is an overriding concern of all.

Volume 10 • Issue 1 • January-March 2018
28

Agboola, A. A. (2006). Electronic Payment Systems and Tele-banking Services in Nigeria. Journal of Internet
Banking and Commerce, 11(3). Retrieved 30 April, 2016 from http://www.arraydev.com/commerce/jibc
Ahmed, I. (2008, October 28). Nigeria: N10 Billion Lost to Bank Fraud in 2007 – NDIC, Daily Trust.
Akuta, E., Ong’oa, I., & Jones, C. (2011). Combating Cyber Crime in Sub-Sahara Africa; A Discourse on Law,
Policy and Practice. Journal of Peace, Gender and Development Studies, 1(4), 129–137.
Alexander, H. (2008). National collective action and economic performance. International Studies Quarterly,
5(3), 24–39.
Atkinson, S., Furnell, S., & Phippen, A. (2009). Securing the next generation: Enhancing e-safety awareness
among young people. Computer Fraud & Security, 12(4), 13–29. doi:10.1016/S1361-3723(09)70088-0
Atta-Asamoah, A. (2010). Understanding the West African cyber-crime process. African Security Review, 18(4),
105-114. Institute for Security Studies. Retrieved 15 February 2016 from http://www.tandfonline.com/doi/s/10.
1080/10246029.2009.9627562?journalCode=rasr20#.Uu9NOPtdx8E
Bullock, J. (2005). Introduction to Homeland Security (1st ed.). Butterworth: Heinemann.
Cassim, F. (2011). Addressing the growing spectre of cybercrime in africa: evaluating measures adopted by South
Africa and other regional role players. Comparative and International Law and Justice South Africa, 44, 123–138.
Chiemeke, S. C., Evwiekpaefe, A., & Chete, F. (2006). The Adoption of Internet Banking in Nigeria: An Empirical
Investigation. Journal of Internet Banking and Commerce, 11(3).
Cole, K., Chetty, M., LaRose, C., Rietta, F., Schmitte, D. K. & Goodman, S. E. (2008). Cybersecurity in Africa:
An Assessment. Retrieved 12/2/2016. from http://s3.amazonaws.com/zanran_storage/www.cistp.gatech.edu/
ContentPages/43945844.pdf
DeJoode, A. (2011). Effective corporate security and cybercrime. Network Security, (3), 16-28.
Essien, E. D. (2015). The Challenges of Public Administration, Good Governance and Service delivery in
the 21st Century. International Journal of Civic Engagement and Social Change, 2(2), 55–66. doi:10.4018/
IJCESC.2015040104
Himanen, P. (2001). The Hacker Ethic: A Radical Approach to the Philosophy of Busines. New York: Random
House.
Jensen, M. (2001). ICT in Africa. Retrieved 22/02/2016 from http://goo.gl/mYhTR
John, H. (2013). An Epic Year For Data Breaches With Over 800 Million Records Lost. Naked Security. Retrieved
07/03/2016 from http://nakedsecurity.sophos.com/2014/02/19/2013-an-epic-year-for-data-breaches-withover-
800-million-records-lost
Klimburg, A. (Ed.). (2012). National Cyber Security Framework Manual. NATO CCD COE Publicaions.
Kortjan, N., & von Solms, R. (2013). Cyber security education in developing countries: A South African
perspective. In e-Infrastructure and e-Services for Developing Countries (pp. 289–297). Springer.
Kritzinger, E., & Padayachee, K. (2013). Engendering an e-safety awareness culture within the South African
context. In Proceedings of AFRICON. IEEE.
Kritzinger, E. & von Solms, S. H. (2012). A framework for cyber security in Africa”. Journal of information
assurance and cybersecurity, 12(2), 37-51. doi:10.1109/AFRCON.2013.6757708
Kumar, N. (2010). Africa Could Become the Cybercrime Capital of the World. Retrieved 17 March, 2016 from
http://www.psfk.com/2010/04/africacould-become-the-cybercrime-capital-ofthe-world.html
Leeuw, F. L., & Leeuw, B. (2012). Cyber society and digital policies: Challenges to evaluation? Evaluation,
18(1), 111–127. doi:10.1177/1356389011431777
Longe, O. B. & Chiemeke, S. C. (2008). Cybercrime and Criminality in Nigeria- What roles are internet Access
Points in Playing. European Journal of Social Sciences, 6(4).

Volume 10 • Issue 1 • January-March 2018
29
Longe, O. B, Mbarika, V., Kourouma, M., Wada, F. & Isabalija, R. (2009). Seeing Beyond the Surface:
Understanding and Tracking Fraudulent Cyber Activities. International Journal of Computer Science and
Information Security, 6(3), 124-135.
McQuade, S. (2005). Understanding and Managing Cybercrime. Allyn & Bacon.
Mitnick, K. D., & Simon, W. L. (2001). The art of deception: Controlling the human element of security. John
Wiley & Sons.
Nissenbaum, H. (2005). Where Computer Security Meets National Security. Ethics and Information Technology,
7(2), 61–73. doi:10.1007/s10676-005-4582-3
Olasanmi, O. O. (2010). Computer Crimes and Counter Measures in the Nigerian Banking Sector. Journal
of Internet Banking & Commerce, 15(1). Retrieved 12/03/16. from http://www.arraydev.com/commerce/jibc/
Prentice-Dunn, S., & McClendon, B. T. (2001). Reducing Skin Cancer Risk: An Intervention Based on
Protection Motivation Theory. Journal of Health Psychology, 6(3), 321–328. doi:10.1177/135910530100600305
PMID:22049376
Reid, R., & Van Niekerk, J. (2014). Towards an Education Campaign for Fostering a Societal, Cyber Security
Culture. Plymouth: Centre for Security, Communications & Network Research Plymouth University.
Riem, A. (2001). Cybercrimes of the 21st Century. Computer Fraud & Security, 18(4), 12–35. doi:10.1016/
S1361-3723(01)00417-1
Rippetoe, S., & Rogers, R. W. (1987). Effects of Components of Protection-Motivation Theory on Adaptive
and Maladaptive Coping with a Health Threat. Journal of Personality and Social Psychology, 52(3), 596–604.
doi:10.1037/0022-3514.52.3.596 PMID:3572727
Rogers, R. W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change. The Journal of
Psychology, 91(3), 93–114. doi:10.1080/00223980.1975.9915803 PMID:28136248
Rowe, B., Reeves, D., & Gallaher, M. (2009). The Role of Internet Service Providers in Cyber Security. Institute
for Homeland Security Solutions. Retrieved 13/2/2016 from https://www.ihssnc.org/portals/0/PubDocuments/
ISP-Provided_Security_Rowe.pdf
Tavani, H. T. (2006). Ethics and Technology: Ethical Issues in an Age of Information and Communication
Technology. John Wiley & Sons, Inc.
Thomson, K. L., von Solms, R., & Louw, L. (2006). Cultivating an organizational information security culture.
Computer Fraud & Security, 7(3), 17–31.
Wada, F., & Odulaja, G. O. (2012). Assessing Cyber Crime and its Impact on E-Banking in Nigeria Using Social
Theories. African Journal of Computing and ICT, 5(1), 69–82.

Volume 10 • Issue 1 • January-March 2018
30
Essien D. Essien is an Ethicist. He holds a doctorate degree in Social and Comparative Religious Ethics from
University of Ibadan, Ibadan, Nigeria. He currently teaches Social, Christian and Comparative Religious Ethics
in University of Uyo, Uyo, Nigeria. His area of research interest includes Environmental Ethics, Political Ethics,
Community and Religious Ethics. He is a member of many professional bodies and Associations. Dr. Essien has
published two books, six book chapters, and many journal articles in peer reviewed scholarly journals.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
The identification of Information and Communication Technology (ICT) as an essential tool for sustainable development has proved to be worth every investment. As a result of this, Internet usage in Nigeria has grown rapidly resulting in the explosion of Internet Service Providers (ISPs) and Internet access points. This has had several positive impacts on the socio-economic and educational developments in the country. Unfortunately, the country's image has also suffered as a result of the nefarious activities of some Nigerians, that has now turn the Internet into a cheap channel for the perpetration of criminal spamming activities known as the 'Advanced Fee Fraud (AFF)'. This paper investigated the level of involvement and the roles of Internet access points in the facilitation of fraudulent cyberspace activities in Nigerian. A self-designed questionnaire titled "The Role of Internet Access Points in the Facilitation of Cyber crimes in Nigeria" was administered in selected locations in South Western Nigeria. Statistical analysis of data using the Smith Statistical Package (SSP) showed that spamming activities remain prevalent among Nigerian Internet users. Our findings also revealed that Cyber cafés, more than any other Internet access points, have facilitated most cyber crimes. Recommendations were made based on our findings.
Article
Full-text available
The increase in the use of the information and communication technology (ICT) facilities such as computers and the Internet in the perpetration of criminal activities like spamming, credit card frauds, ATM frauds, phishing, identity theft, denial-of-service, and a host of others has lend credence to the view that ICT is contributing to crime in the banking sector. A greater understanding of such computer crimes may complement existing security practices by possibly highlighting new areas of counter measures. This paper thus assesses whether these crimes can be totally eradicated or not and whether the new generation banks experience more computer crimes than the old generation banks in Nigeria. Based on the findings of this study, the paper concludes that total eradication of computer crimes is not possible but can be highly reduced if internal control measures are adequately put in place within a bank's organizational structure and that new generation banks seem to experience more crimes than their old generation counterparts due to the fact that majority of their services, which are automated, are subjected to technological changes at a rapid rate.
Article
Full-text available
Contemporary studies on public administration in Nigeria have revealed two dramatic findings. First, despite the moderate achievements in democratic governance and being rich in natural and human resources, there remain many politico-administrative challenges to be addressed in Nigeria. Second, ailing public administration has resulted in disturbing socio-economic indicators which are among the worst in the world. This paper examines the challenges of public administration for effective service delivery and good governance in Nigeria. The paper employs descriptive method of research and content analysis which is anchored on ‘efficiency theory' to examine the subject matter. Findings reveal that, notwithstanding the dramatic administrative reforms, citizen's confidence in government service is near an historic low because of poor service delivery and exclusionary policies. The paper submits that the label of poor performance and absence of excellence in the public service has the tendency to undermine development and good governance in Nigeria.
Article
Full-text available
Prior to the arrival of ICTs in Sub Sahara Africa (SSA), Africa was seen as the Dark Continent. The development of ICTs was therefore expected to connect Africa to the rest of the world, and establish it as part of the Global community. This endeavor exposed Africa to the unintended consequences of the Internet (cybercrime). The manifestations of cybercrime, it's far reaching and potentially devastating capacity for harm caught most governments off guard because the existing laws, legislations and institutions were unable to keep up with the alarming rate at which cybercrime has diffused. Most governments have struggled to put in place safeguards that can help combat this malaise. While efforts are under way, they have been largely ineffective at repealing cyber crime. This statement begs the question, what support can be rendered to strengthen the position of stakeholders in their fight against cybercrime in SSA. This study sought to address that question by examining three principal issues: First, it identified the various stakeholders involved in the fight against cybercrime in SSA. Second, it examined the existing laws, policies and practices employed by stakeholders to combat this malaise. Third, it discussed the impediments that these stakeholder structures and institutions face in countering cybercrime. A sound knowledge of these principal issues will provide policy makers and stakeholders with an in-depth understanding of the various structures and their existing efforts to combat cyber crime.
Conference Paper
Cyberspace has become significant to the wellbeing of the individuals, organisations and general economy of a country. It is for this reason that a country should play a leading role in securing cyberspace. However, in the face of the inherent challenges, the awareness of and education on cyber security cannot be overlooked. This paper aims to determine the current situation regarding cyber security in South Africa (SA) as a case of developing countries, specifically from an awareness and educational point of view. This will be achieved by providing a comparative analysis between two well-advanced countries and South Africa in order to abstract key points from a policy and policy implementation point of view to the actual execution of cyber security education initiatives. From the identified key points, some aspects are highlighted that a developing country should perhaps consider in engineering its cyber security education plan.
Book
Introduction to Homeland Security: Principles of All-Hazards Risk Management, Fifth Edition, provides users with a substantially updated version of previous versions, clearly delineating the bedrock principles of preparing for, mitigating, managing, and recovering from emergencies and disasters, while also offering a balanced account of all aspects of homeland security. This new edition features coverage of the Boston Marathon bombing, analysis of the NIST Cybersecurity Framework for critical infrastructure protection, and examines the DHS “Blue Campaign” to stop human trafficking. To provide added perspective, this edition features additional “another voice” sections and examines the emergence of social media as a tool for reporting on homeland security issues.
Conference Paper
Children are an extremely vulnerable sector of society and are exposed to information and communication technology (ICT) usage risks without being given the proper tools they need to navigate this minefield. It is imperative that children are educated about all risks associated with the prolonged and improper usage of mobile phones and computers. These risks are not purely technological, but may also influence their physiological, psychological and sociological wellbeing. All four dimensions have to be considered holistically to ensure the safe usage of ICTs as well as engendering an e-safety culture among ICT users within the South African context. This paper primarily focuses on the protection of minors as end users (and possible victims) of ICTs. This entailed identifying the various stakeholders that should be involved in educating children about the risks in using ICTs and delineating their responsibility to inform and protect themselves and the children who are under their supervision. Given that educators at primary school level are the key role-players in disseminating e-safety information, this paper proposes a revision of extant curricula. The paper concludes by providing an overview of a possible framework to engender an e-safety culture among all relevant role-players and an application thereof.
Article
The information communication technology (ICT) revolution has had impacts in almost every area of human endeavor. From business, industry, government to not-for-profit organizations, ICT has simplified business processes such as sorting, summarizing, coding, editing, customized and generic report generation in a real-time processing mode. However, ICT has also brought unintended consequences such as criminal activities, spamming, credit card frauds, ATM frauds, phishing, identity theft and other related cyber crimes. This study sought to assess cyber crime and its impact on the banking institutions in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This papers X-rays cybercrime policy issues and provide insight into how cybercrime impacts on E-banking from a Nigerian perspective. Social theories were then used to explain causation with a view of guiding policy makers on behavioural issues that should be considered when formulating policies to address cyber criminal activities in Nigeria.
Article
Cyber crime is thriving on the African continent. The increase in broadband access has resulted in an increase in internet users. Thus, Africa has become a 'safe haven' for online fraudsters. African countries are pre-occupied with pressing issues such as poverty, the Aids crisis, the fuel crisis, political instability, ethnic instability and traditional crimes, such as murder, rape, and theft. As a result, the fight against cyber crime is lagging behind. The lack of IT knowledge by the public and the absence of suitable legal frameworks to deal with cyber crime at national and regional levels have compounded the problem. However, attempts are being made by some African countries to address cyber crime. The South African government has taken the lead in introducing cyber legislation to address cyber crime. The ineffectiveness of the South African common law to combat cyber crime, led to the promulgation of the Electronic Communications and Transactions Act 25 of 2002 (ECT). Although South Africa has adopted the Council of Europe's Convention on Cyber Crime CETS NO 185 (CECC) it has not ratified the treaty. Other African countries such as Botswana, Kenya, Uganda and Cameroon have also taken steps to introduce cyber legislation and build regional partnerships to combat cyber crime. This is commendable. However, it is recommended that all African countries should adopt and ratify the CECCC to avoid becoming an easy target for international cyber crime. In this article, I shall examine measures addressing cyber crime in South Africa and the way forward. To this end, the ECT, the recent case law, and the efforts to combat cyber crime in the banking sector will be examined. This article will also consider measures adopted to combat cyber crime in other Southern African countries (Namibia, Botswana and Zambia) and in certain African sub-regions such as East Africa (Kenya, Uganda and Rwanda) and West Africa (Nigeria and Cameroon). The article will also propose a way forward.