EFFECT OF DATA PROTECTION FRAMEWORKS AGAINST CYBERCRIMES ON CYBER SECURITY IN NIGERIA
Abiodun Adebanjo (DoP) , PhD Student City University, Cambodia Gloria Chigbu , Lecturer ESFAM-BENIN University, Benin Republic Christopher M Osazuwa , PhD Student City University, CambodiaAbstract
The paper Effect of Data Security Frameworks against Cybercrimes and Cyber Security in Nigeria critically examines the various data protection frameworks in Nigeria and how these are impacting curtailing cybercrimes in the country. The paper examined the institutions responsible for data security and how they carry it out. The work utilized both the secondary and primary sources of data collection. Key Informant Interview (KII) and the observation method were deployed to collect primary data for the study. Information on data protection was also collected from (NDPC) and other relevant agencies. Information from reports from the internet, scholarly articles in journals, and information from websites and books were used in the paper. The paper utilised the Social Strain Theory (SST) as the theoretical framework for the study. The paper observed that data protection regulations in Nigeria make it mandatory for all Public Institutions (PIs) in Nigeria to have a comprehensive cyber security framework, which is to protect against unauthorized access. Several factors are responsible for data insecurity and the attendant increase in cybercrimes in the country. These include, among others: i. Lack of knowledge on the part of most officers of the penalty for data breach allowed by them. ii. Poor dissemination of the content of the NDPA. iii. The poor economic condition of the country makes many officers to seek means of getting extra money, this also includes their volunteering information that they should not disclose in the first place. The paper observed that though cyber security in Nigeria is not within the mandate of the EFCC, the Commission plays very important role in dealing with the threat of cybercrimes in Nigeria. Records shows that of the 12,394 convictions of the EFCC from inception till 31st December 2023. Over 80% of them are on cybercrime and related offences. The paper concluded that inspire of the efforts of the EFCC and other agencies in tackling cybercrimes in Nigeria, the failure of the data protection frameworks in the country in ensuring confidentiality, integrity and security of the data at their disposal is the reason for the spiralling of cybercrimes in the country. The paper recommends that the Nigerian government adopt the best practice policies and regulations, promote awareness, and continuously update cyber security practices, which is germane to enhancing data protection in the country.
Keywords
Cyber Crime, Data Protection Framework, Cyber Security
References
Adeshina, S. O. (2017) “Cybercrime and Poverty in Nigeria” April 2017, 13(4):19-29 https://www.researchgate.net/publication/317139515
Advance Fee Fraud and Other Fraud Related Offences Act https://placng.org/lawsofnigeria/print.php?sn=18
Araujo, M.S.D., Machado, B.A.S., Passos, F.U. (2024) "Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance" March 2024Applied Sciences 14(5):2116 DOI:10.3390/app14052116 https://www.researchgate.net/publication/378709279
Anthonia, O. (May 2, 2024) “A Literature Review on Emerging Cybercrime in Nigeria”. Available at SSRN: https://ssrn.com/abstract=4814920 or http://dx.doi.org/10.2139/ssrn.4814920 file:///C:/Users/aadebanjo/Downloads/SSRN-id4814920.pdf
Al-Emran, M. & Deveci, M. (2024) "Unlocking the potential of cybersecurity behaviour in the metaverse: Overview, opportunities, challenges, and future research agendas" March 2024, Technology in Society DOI:10.1016/j.techsoc.2024.102498 https://www.researchgate.net/publication/378607333
Abubakar, M.M., Umar, A.Z.. & Abubakar, M. (2022) "Personal Data and Privacy Protection Regulations: State of compliance with Nigeria Data Protection Regulations (NDPR) in Ministries, Departments, and Agencies (MDAs)". Proceedings of the 5th International Conference on Information Technology for Education and Development: Changing the Narratives through Building a Secure Society with Disruptive Technologies, ITED 2022
Adisa, M. and Dadam D. (2023) "Cyber security and Data Protection Laws in Nigeria: Safeguarding Your Business" https://trustedadvisorslaw.com/cybersecurity-and-data-protection-laws-in-nigeria-safeguarding-your-business/
Anton, A. I., Julia B. Earp, and Jessica D. Young. (2010). How Internet users’ privacy concerns have evolved since 2002. IEEE Security and Privacy 8 (1): 21–27.
Afifuddin, M. and Adriyanto, A (2023) “Challenges and Cybersecurity Threats in Digital Economic Transformation” International Journal of Humanities Education and Social Sciences (IJHESS) 2(6), June 2023, 2(6), DOI:10.55227/ijhess.v2i6.515
Blanchfield, D. (2023) "Data Security is the New Cybersecurity" https://elnion.com/2023/07/19/data-security-is-the-new-cybersecurity/
Cisco (2023) “What is Cyber security” https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html#
Cybercrimes (Prohibition, Prevention) Act, 2015 downloaded from https://www.nfiu.gov.ng/images/Downloads/downloads/cybercrime.pdf
DLA Piper's Data Protection Laws of the World Handbook (2024) “Data Protection Laws in Nigeria” https://www.dlapiperdataprotection.com/index.html?
Economic and Financial Crimes Commission, Annual Reports, 2010 – 2023 from the Department of Planning, Policy, Research and Statistics
Egemonye, C., Adekunle, S. & Izuchukwu, A. (2023) “Better Late than Never – Nigeria Finally Passes the Data Protection Act” https://globallawexperts.com/better-late-than-never-nigeria-finally-passes-the-data-protection-act/
European Union’s “General Data Protection Regulation (GDPR)” https://gdpr.eu/
“E-payment Transactions in Nigeria hit monthly all time High” https://nibss-plc.com.ng/e-payment-transactions-in-nigeria-hit-monthly-all-time-high-of-n33-2-trillion-in-august-2022/
Ec-Council Cyber Security Exchange (2022) “Understanding the Five Phases of the Penetration Testing Process” https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/penetration-testing-phases/#
Ellison, N.B., J. Vitak, C. Steinfield, R. Gray, and C. Lampe. 2011. Negotiating privacy concerns and social capital needs in a social media environments. In Privacy Online, ed. S. Trepte and L. Reinecke, 19–32. Berlin: Springer.
Gambo, A.Z. & Adebanjo, A. (2021) Developing the Security Conscious Mindset, Abuja: Accurate Press
Itgovernance (2023) “What is Cyber Security? Definition and Best Practices” ://www.itgovernance.co.uk/what-is-cybersecurity
International Telecommunication Union (ITU) (2023) “Definition of cyber security” https://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx
Jang, S.J. and Agnew, R. (2017) “Strain Theories and Crime” https://www.researchgate.net/publication/275271730_Strain_Theories_and_Crime
Kelley, K. (2024) “What is Cybersecurity and Why It is Important?” https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-cybersecurity
Kumar J.B. (2024) “What is Ethical Hacking? A Comprehensive Guide” https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-ethicalhacking
Komminoth, L (2023) "Africa’s Cybersecurity Threat" https://african.business/2023/02/technology-information/africas-cybersecurity-threat
Krasnova, Hanna, Natasha F. Veltri, and Oliver Günther. 2012. Self-disclosure and privacy calculus on social networking sites: The role of culture. Business & Information Systems Engineering 4 (3): 127–135.
Kramer, F.D.; Starr, S.H.; Wentz, L.K. (2009). “Cyberpower and National Security” National Defense University Press.
Merton, R.K., (1938). “Social Structure and Anomie”. American Sociological Review, Vol. 3, No. 5. (Oct., 1938), pp. 672-682. Stable URL: http://links.jstor.org/sici?
Malhotra, Naresh K., Sung S. Kim, and James Agarwal. 2004. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research 15 (4): 336–355.
NBISS (2024) "Nigeria’s e-Payment Transactions Soar To N234 Trillion In Q1 2024, Reflecting 89.3% Year-on-Year Growth" https://www.arise.tv/nigerias-e-payment-transactions-soar-to-n234-trillion-in-q1-2024-reflecting-89-3-year-on-year-growth/
Nigeria Data Protection Act online at https://placng.org/i/wp-content/uploads/2023/06/Nigeria-Data-Protection-Act-2023.pdf
Nigerian Communication Commission https://www.ncc.gov.ng/contactncc
Ngwu, S. (2023) “Data Protection Laws and Regulations” https://iclg.com/practice-areas/data-protection-laws-and-regulations/nigeria an International Comparative Legal Guides (ICLG) Publication
Onadeko, O.A. & Afolayan, A.F. (2015) “A Critical Appraisal of the Cybercrimes Act, 2015 in Nigeria” Being a paper presented at the 29th International Conference of the International Society for the Reform of Criminal Law (ISRCL) held at Halifax, Nova Scotia, Canada July 24 – 28, 2016 https://www.isrcl.com/wp-content/uploads/2021/05/Onadeko-Afolaya-A-critical-appraisal-of-the-cybercrimes-act-in-Nigeria.pdf
One Trust Data Guidiance (2024) “Nigeria: Data Protection Overview” https://www.dataguidance.com/notes/nigeria-data-protection-overview
Omoruyi, O. (2023) “Nigeria sees 64% increase in data breaches, recording an outstanding 82,000 episodes in Q1 2023”, https://technext24.com/2023/05/23/nigeria-records-82000-data-breach-in-q1/
Oyewole, S, & Salami, A (2024) “Data Protection Act” https://www.dlapiperdataprotection.com/?t=law&c=NG
Osoro, P & Co (2023) “Overview of Data Protection in Nigeria” https://www.paulusoro.com/resources/overview-of-data-protection-in-nigeria/
Proshre (2020) “Cybercrime in Nigeria: Causes and Effects” https://proshare.co/articles/cybercrime-in-nigeria-causes-and-effects#
“Nigeria Data Protection Regulation (NDPR)” https://nitda.gov.ng/
“Nigeria Data Protection Act” https://ndpc.gov.ng/Files/Nigeria_Data_Protection_Act_2023.pdf
Nigerian Data Protection Commission (NDPC) https://ndpc.gov.ng/
Sule, M., Zennaro, M. & Thomas, G (2021) “Cyber security through the lens of Digital Identity and Data Protection: Issues and Trend” Technology in Society, Vol. 67, November 2021:
Sharp, R. (2023) Introduction to Cyber Security: A Multidisciplinary Challenge, London: Springer Publishers
United Nations Office on Counter Terrorism (2024) “Cyber security and New Technologies” https://www.un.org/counterterrorism/cybersecurity
Vitak, J. (2012) “The Impact of Context Collapse and Privacy on Social Network Site Disclosures”. Journal of Broadcasting & Electronic Media, 56 (4): 451–470.
Viko, I.J.L (2021) “Analysis of the Legal and Institutional Framework for Fighting Cybercrime in Nigeria” IJOCLLEP 3 (2) 2021, pp: 153 – 162 online at Nigerian Journals Online https://www.nigerianjournalsonline.com ›
Wang, V. Nnaji, H. & Jung, J. (2019) “Internet Banking in Nigeria: Cyber Security Breaches, Practices and Capability” https://pure.port.ac.uk/ws/portalfiles/portal/21217684/Manuscript_Internet_Banking_in_Nigeria.pdf
“What is Cybersecurity?” https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
"What is cyber resilience?" ://www.ibm.com/topics/cyber-resilience
“What is the social strain theory?” (2024) https://www.restonyc.com/what-is-the-social-strain-theory/
Wisniewski, J.P, & Page, X. (2022) “Privacy Theories and Frameworks,” First Online: 09 February 2022, online at https://link.springer.com/chapter/10.1007/978-3-030-82786-1_2
Wood, S., et al (2022) Review of Literature relevant to Data Protection harms plumconsulting.co.uk
Article Statistics
Downloads
Copyright License
Copyright (c) 2024 Abiodun Adebanjo (DoP), Gloria Chigbu, Christopher M Osazuwa
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.