Articles | Open Access | DOI: https://doi.org/10.37547/tajpslc/Volume06Issue09-07

EFFECT OF DATA PROTECTION FRAMEWORKS AGAINST CYBERCRIMES ON CYBER SECURITY IN NIGERIA

Abiodun Adebanjo (DoP) , PhD Student City University, Cambodia
Gloria Chigbu , Lecturer ESFAM-BENIN University, Benin Republic
Christopher M Osazuwa , PhD Student City University, Cambodia

Abstract

The paper Effect of Data Security Frameworks against Cybercrimes and Cyber Security in Nigeria critically examines the various data protection frameworks in Nigeria and how these are impacting curtailing cybercrimes in the country. The paper examined the institutions responsible for data security and how they carry it out. The work utilized both the secondary and primary sources of data collection. Key Informant Interview (KII) and the observation method were deployed to collect primary data for the study. Information on data protection was also collected from (NDPC) and other relevant agencies. Information from reports from the internet, scholarly articles in journals, and information from websites and books were used in the paper. The paper utilised the Social Strain Theory (SST) as the theoretical framework for the study. The paper observed that data protection regulations in Nigeria make it mandatory for all Public Institutions (PIs) in Nigeria to have a comprehensive cyber security framework, which is to protect against unauthorized access. Several factors are responsible for data insecurity and the attendant increase in cybercrimes in the country. These include, among others: i. Lack of knowledge on the part of most officers of the penalty for data breach allowed by them. ii. Poor dissemination of the content of the NDPA. iii. The poor economic condition of the country makes many officers to seek means of getting extra money, this also includes their volunteering information that they should not disclose in the first place. The paper observed that though cyber security in Nigeria is not within the mandate of the EFCC, the Commission plays very important role in dealing with the threat of cybercrimes in Nigeria. Records shows that of the 12,394 convictions of the EFCC from inception till 31st December 2023. Over 80% of them are on cybercrime and related offences. The paper concluded that inspire of the efforts of the EFCC and other agencies in tackling cybercrimes in Nigeria, the failure of the data protection frameworks in the country in ensuring confidentiality, integrity and security of the data at their disposal is the reason for the spiralling of cybercrimes in the country. The paper recommends that the Nigerian government adopt the best practice policies and regulations, promote awareness, and continuously update cyber security practices, which is germane to enhancing data protection in the country.

Keywords

Cyber Crime, Data Protection Framework, Cyber Security

References

Adeshina, S. O. (2017) “Cybercrime and Poverty in Nigeria” April 2017, 13(4):19-29 https://www.researchgate.net/publication/317139515

Advance Fee Fraud and Other Fraud Related Offences Act https://placng.org/lawsofnigeria/print.php?sn=18

Araujo, M.S.D., Machado, B.A.S., Passos, F.U. (2024) "Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance" March 2024Applied Sciences 14(5):2116 DOI:10.3390/app14052116 https://www.researchgate.net/publication/378709279

Anthonia, O. (May 2, 2024) “A Literature Review on Emerging Cybercrime in Nigeria”. Available at SSRN: https://ssrn.com/abstract=4814920 or http://dx.doi.org/10.2139/ssrn.4814920 file:///C:/Users/aadebanjo/Downloads/SSRN-id4814920.pdf

Al-Emran, M. & Deveci, M. (2024) "Unlocking the potential of cybersecurity behaviour in the metaverse: Overview, opportunities, challenges, and future research agendas" March 2024, Technology in Society DOI:10.1016/j.techsoc.2024.102498 https://www.researchgate.net/publication/378607333

Abubakar, M.M., Umar, A.Z.. & Abubakar, M. (2022) "Personal Data and Privacy Protection Regulations: State of compliance with Nigeria Data Protection Regulations (NDPR) in Ministries, Departments, and Agencies (MDAs)". Proceedings of the 5th International Conference on Information Technology for Education and Development: Changing the Narratives through Building a Secure Society with Disruptive Technologies, ITED 2022

Adisa, M. and Dadam D. (2023) "Cyber security and Data Protection Laws in Nigeria: Safeguarding Your Business" https://trustedadvisorslaw.com/cybersecurity-and-data-protection-laws-in-nigeria-safeguarding-your-business/

Anton, A. I., Julia B. Earp, and Jessica D. Young. (2010). How Internet users’ privacy concerns have evolved since 2002. IEEE Security and Privacy 8 (1): 21–27.

Afifuddin, M. and Adriyanto, A (2023) “Challenges and Cybersecurity Threats in Digital Economic Transformation” International Journal of Humanities Education and Social Sciences (IJHESS) 2(6), June 2023, 2(6), DOI:10.55227/ijhess.v2i6.515

Blanchfield, D. (2023) "Data Security is the New Cybersecurity" https://elnion.com/2023/07/19/data-security-is-the-new-cybersecurity/

Cisco (2023) “What is Cyber security” https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html#

Cybercrimes (Prohibition, Prevention) Act, 2015 downloaded from https://www.nfiu.gov.ng/images/Downloads/downloads/cybercrime.pdf

DLA Piper's Data Protection Laws of the World Handbook (2024) “Data Protection Laws in Nigeria” https://www.dlapiperdataprotection.com/index.html?

Economic and Financial Crimes Commission, Annual Reports, 2010 – 2023 from the Department of Planning, Policy, Research and Statistics

Egemonye, C., Adekunle, S. & Izuchukwu, A. (2023) “Better Late than Never – Nigeria Finally Passes the Data Protection Act” https://globallawexperts.com/better-late-than-never-nigeria-finally-passes-the-data-protection-act/

European Union’s “General Data Protection Regulation (GDPR)” https://gdpr.eu/

“E-payment Transactions in Nigeria hit monthly all time High” https://nibss-plc.com.ng/e-payment-transactions-in-nigeria-hit-monthly-all-time-high-of-n33-2-trillion-in-august-2022/

Ec-Council Cyber Security Exchange (2022) “Understanding the Five Phases of the Penetration Testing Process” https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/penetration-testing-phases/#

Ellison, N.B., J. Vitak, C. Steinfield, R. Gray, and C. Lampe. 2011. Negotiating privacy concerns and social capital needs in a social media environments. In Privacy Online, ed. S. Trepte and L. Reinecke, 19–32. Berlin: Springer.

Gambo, A.Z. & Adebanjo, A. (2021) Developing the Security Conscious Mindset, Abuja: Accurate Press

Itgovernance (2023) “What is Cyber Security? Definition and Best Practices” ://www.itgovernance.co.uk/what-is-cybersecurity

International Telecommunication Union (ITU) (2023) “Definition of cyber security” https://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx

Jang, S.J. and Agnew, R. (2017) “Strain Theories and Crime” https://www.researchgate.net/publication/275271730_Strain_Theories_and_Crime

Kelley, K. (2024) “What is Cybersecurity and Why It is Important?” https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-cybersecurity

Kumar J.B. (2024) “What is Ethical Hacking? A Comprehensive Guide” https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-ethicalhacking

Komminoth, L (2023) "Africa’s Cybersecurity Threat" https://african.business/2023/02/technology-information/africas-cybersecurity-threat

Krasnova, Hanna, Natasha F. Veltri, and Oliver Günther. 2012. Self-disclosure and privacy calculus on social networking sites: The role of culture. Business & Information Systems Engineering 4 (3): 127–135.

Kramer, F.D.; Starr, S.H.; Wentz, L.K. (2009). “Cyberpower and National Security” National Defense University Press.

Merton, R.K., (1938). “Social Structure and Anomie”. American Sociological Review, Vol. 3, No. 5. (Oct., 1938), pp. 672-682. Stable URL: http://links.jstor.org/sici?

Malhotra, Naresh K., Sung S. Kim, and James Agarwal. 2004. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research 15 (4): 336–355.

NBISS (2024) "Nigeria’s e-Payment Transactions Soar To N234 Trillion In Q1 2024, Reflecting 89.3% Year-on-Year Growth" https://www.arise.tv/nigerias-e-payment-transactions-soar-to-n234-trillion-in-q1-2024-reflecting-89-3-year-on-year-growth/

Nigeria Data Protection Act online at https://placng.org/i/wp-content/uploads/2023/06/Nigeria-Data-Protection-Act-2023.pdf

Nigerian Communication Commission https://www.ncc.gov.ng/contactncc

Ngwu, S. (2023) “Data Protection Laws and Regulations” https://iclg.com/practice-areas/data-protection-laws-and-regulations/nigeria an International Comparative Legal Guides (ICLG) Publication

Onadeko, O.A. & Afolayan, A.F. (2015) “A Critical Appraisal of the Cybercrimes Act, 2015 in Nigeria” Being a paper presented at the 29th International Conference of the International Society for the Reform of Criminal Law (ISRCL) held at Halifax, Nova Scotia, Canada July 24 – 28, 2016 https://www.isrcl.com/wp-content/uploads/2021/05/Onadeko-Afolaya-A-critical-appraisal-of-the-cybercrimes-act-in-Nigeria.pdf

One Trust Data Guidiance (2024) “Nigeria: Data Protection Overview” https://www.dataguidance.com/notes/nigeria-data-protection-overview

Omoruyi, O. (2023) “Nigeria sees 64% increase in data breaches, recording an outstanding 82,000 episodes in Q1 2023”, https://technext24.com/2023/05/23/nigeria-records-82000-data-breach-in-q1/

Oyewole, S, & Salami, A (2024) “Data Protection Act” https://www.dlapiperdataprotection.com/?t=law&c=NG

Osoro, P & Co (2023) “Overview of Data Protection in Nigeria” https://www.paulusoro.com/resources/overview-of-data-protection-in-nigeria/

Proshre (2020) “Cybercrime in Nigeria: Causes and Effects” https://proshare.co/articles/cybercrime-in-nigeria-causes-and-effects#

“Nigeria Data Protection Regulation (NDPR)” https://nitda.gov.ng/

“Nigeria Data Protection Act” https://ndpc.gov.ng/Files/Nigeria_Data_Protection_Act_2023.pdf

Nigerian Data Protection Commission (NDPC) https://ndpc.gov.ng/

Sule, M., Zennaro, M. & Thomas, G (2021) “Cyber security through the lens of Digital Identity and Data Protection: Issues and Trend” Technology in Society, Vol. 67, November 2021:

Sharp, R. (2023) Introduction to Cyber Security: A Multidisciplinary Challenge, London: Springer Publishers

United Nations Office on Counter Terrorism (2024) “Cyber security and New Technologies” https://www.un.org/counterterrorism/cybersecurity

Vitak, J. (2012) “The Impact of Context Collapse and Privacy on Social Network Site Disclosures”. Journal of Broadcasting & Electronic Media, 56 (4): 451–470.

Viko, I.J.L (2021) “Analysis of the Legal and Institutional Framework for Fighting Cybercrime in Nigeria” IJOCLLEP 3 (2) 2021, pp: 153 – 162 online at Nigerian Journals Online https://www.nigerianjournalsonline.com

Wang, V. Nnaji, H. & Jung, J. (2019) “Internet Banking in Nigeria: Cyber Security Breaches, Practices and Capability” https://pure.port.ac.uk/ws/portalfiles/portal/21217684/Manuscript_Internet_Banking_in_Nigeria.pdf

“What is Cybersecurity?” https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html

"What is cyber resilience?" ://www.ibm.com/topics/cyber-resilience

“What is the social strain theory?” (2024) https://www.restonyc.com/what-is-the-social-strain-theory/

Wisniewski, J.P, & Page, X. (2022) “Privacy Theories and Frameworks,” First Online: 09 February 2022, online at https://link.springer.com/chapter/10.1007/978-3-030-82786-1_2

Wood, S., et al (2022) Review of Literature relevant to Data Protection harms plumconsulting.co.uk

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Abiodun Adebanjo (DoP), Gloria Chigbu, & Christopher M Osazuwa. (2024). EFFECT OF DATA PROTECTION FRAMEWORKS AGAINST CYBERCRIMES ON CYBER SECURITY IN NIGERIA. The American Journal of Political Science Law and Criminology, 6(09), 64–84. https://doi.org/10.37547/tajpslc/Volume06Issue09-07