Market Dealers or Perpetrators of Cybercrimes? Investigating Cybercriminal Activities in Information Technology Markets in Nigeria

Oluwafemi Osho*, Benjamin M. O. Eneche**
*-**Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria.
Periodicity:December - February'2019
DOI : https://doi.org/10.26634/jit.8.1.15715

Abstract

This study explores the roles of IT markets in the promotion and proliferation of cybercrimes in Nigeria. Essentially, it seeks to identify cybercriminal activities perpetrated within the physical confines of markets of Information Technology (IT) products and services, assess the perception of dealers in these markets of the illegality of the cybercrimes, and identify factors that influence perpetrators at the markets to engage in criminal behaviours. Considering a mini size IT market in Minna, Niger State, Nigeria, it adopts the use of observation, disguised participation, questionnaire, and unstructured interview to collate relevant data. Findings reveal that content- and copyright-related offences, including illegal activities, such as sale of pre-registered SIM cards, cracking of Internet modems and distribution of cracked modems, and distribution of pirated software, games, music and videos, were perpetrated at the market. Most respondents agreed or strongly agreed the identified cybercrimes were illegal. The factors that influenced perpetrators centered primarily on economic gains.

Keywords

Cybercrime, Advance Fee Fraud, Market, Digital Piracy, Copyright

How to Cite this Article?

Osho, O., Eneche, B. M. O. (2019) Market Dealers or Perpetrators of Cybercrimes? Investigating Cybercriminal Activities in Information Technology Markets in Nigeria, 8(1), 11-19. https://doi.org/10.26634/jit.8.1.15715

References

[1]. Ablon, L., Libicki, M. C., & Golay, A. A. (2014). Markets for cybercrime tools and stolen data: Hackers' bazaar. Rand Corporation.
[2]. Adesina, O. S. (2017). Cybercrime and Poverty in Nigeria,13(4). Retrieved from http://www.cscanada.net/ index.php/css/article/view/9394/pdf
[3]. Akinyokun, O. K., Alese, B. K., Oluwadare, S. A., Iyare, M. O., & Iwasokun, G. B. (2015). Contributory indices to cybercrime activities in Nigeria. In Proceedings of Informing Science and IT Education Conference 2015 (pp. 59-77).
[4]. Allodi, L., Shim, W., & Massacci, F. (2013, May). Quantitative assessment of risk reduction with cybercrime black market monitoring. In 2013 IEEE Security and Privacy Workshops (pp. 165-172). IEEE.
[5]. Amaefule, E. (2015). Buyers of preregistered SIM cards face jail term. Retrieved from https://www.nairaland.com/ 2636985/buyers-preregistered-sim-cards-face
[6]. Aransiola, J. O., & Asindemade, S. O. (2011). Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychology, Behavior, and Social Networking, 14(12), 759-763.
[7]. Boone, H. N., & Boone, D. A. (2012). Analyzing likert data. Journal of Extension, 50(2), 1-5.
[8]. cwadmin. (2013). NCC Looks Elsewhere as Sale of Preregistered Sim Cards Booms. Nigeria Communications Week, Retrieved from http://nigeriacommunicationsweek. com.ng/ncc-looks-elsewhere-as-sale-of-preregisteredsim- cards-booms/
[9]. Donovan, K., & Martin, A. (2014). The rise of African SIM registration: The emerging dynamics of regulatory change. First Monday, 19(2).
[10]. Frank, I., & Odunayo, E. (2013). Approach to cyber security issues in Nigeria: challenges and solution. International Journal of Cognitive Research in Science, Engineering and Education, 1(1).
[11]. Gercke, M. (2011). Understanding cybercrime: a guide for developing countries. International Telecommunication Union (Draft), 89, 93.
[12]. Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2(1), 13-20.
[13]. Grier, C., Ballard, L., Caballero, J., Chachra, N., Dietrich, C. J., Levchenko, K., ... & Provos, N. (2012, October). Manufacturing compromise: The emergence of exploit-as-a-service. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 821-832). ACM.
[14]. Haque, A., Khatibi, A., & Rahman, S. (2009). Factors influencing buying behavior of piracy products and its impact to Malaysian market. International Review of Business Research Papers, 5(2), 383-401.
[15]. Hassan, A. B., Lass, F. D., & Makinde, J. (2012). Cybercrime in Nigeria: Causes, effects and the way out. ARPN Journal of Science and Technology, 2(7), 626-631.
[16]. Ibrahim, S. (2016). Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47, 44-57.
[17]. Jiow, H. J. (2013). Cyber crime in Singapore: An Analysis of regulation based on Lessig's four Modalities of Constraint. International Journal of Cyber Criminology, 7(1), 18-27.
[18]. Lessig, L. (2006). Code (Version 2.0). New York: Basic Books, Retrieved from http://codev2.cc/download+ remix/Lessig-Codev2.pdf
[19]. Liang, T. P., & Huang, J. S. (1998). An empirical study on consumer acceptance of products in electronic markets: A transaction cost model. Decision Support Systems, 24(1), 29-43.
[20]. Ngo, F., & Jaishankar, K. (2017). Commemorating a decade in existence of the International Journal of Cyber Criminology: A research agenda to advance the scholarship on cyber crime. International Journal of Cyber Criminology, 11(1), 1-9.
[21]. Nigerian Communications Commission. (2011). Registration of Telephone Subscribers Regulation. Retrieved from https://toluogunlesi.files.wordpress.com/ 2015/11/legal-regulations-registration_telecom_ subscribers_2011.pdf
[22]. Nigerian Communications Commission. (2012). NCC arrests six suspects with Pre-Registered SIM cards in Niger State. The Communicator Magazine. Retrieved from https://www.ncc.gov.ng/thecommunicator/ index.php?option=com_content&view=article&id=240 :ncc-arrests-six-suspects-with-pre-registered-sim-cardsin- niger-state&catid=32&Itemid=179
[23]. Niranjanamurthy, M., Kavyashree, N., Jagannath, S., & Chahar, D. (2013). Analysis of e-commerce and mcommerce: advantages, limitations and security issues. International Journal of Advanced Research in Computer and Communication Engineering, 2(6), 2360- 2370.
[24]. Okeshola, F. B., & Adeta, A. K. (2013). The nature, causes and consequences of cyber crime in tertiary institutions in Zaria-Kaduna state, Nigeria. American International Journal of Contemporary Research, 3(9), 98-114.
[25]. Oluwafemi, O., Adesuyi, F. A., & Shafi'i, M. A. (2013). Combating terrorism with cybersecurity: The Nigerian perspective. World Journal of Computer Application and Technology, 1(4), 103-109.
[26]. Osborne, J. W., Costello, A. B., & Kellow, J. T. (2008). Best practices in exploratory factor analysis. Best Practices in Quantitative Methods, 86-99.
[27]. Osho, O., & Adepoju, S. A. (2016). Cybercafés in Nigeria: Curse to the Internet? ICTA 2016, 117-123.
[28]. Sood, A. K., & Enbody, R. J. (2013). Crimeware-as-a-service- a survey of commoditized crimeware in the underground market. International Journal of Critical Infrastructure Protection, 6(1), 28-38.
[29]. Sood, A. K., Bansal, R., & Enbody, R. J. (2013). Cybercrime: Dissecting the state of underground enterprise. IEEE Internet Computing, 17(1), 60-68.
[30]. Soudijn, M. R., & Zegers, B. C. T. (2012). Cybercrime and virtual offender convergence settings. Trends in Organized Crime, 15(2-3), 111-129.
[31]. Tade, O. (2013). A spiritual dimension to cybercrime in Nigeria: The 'yahoo plus' phenomenon. Human Affairs, 23(4), 689-705.
[32]. Why NCC Acted. (2015). Retrieved from https://www.nairaland.com/2701693/why-ncc-fined-mtn
[33]. Zhuge, J., Holz, T., Song, C., Guo, J., Han, X., & Zou, W. (2009). Studying malicious websites and the underground economy on the Chinese web. In Managing Information Risk and the Economics of Security (pp. 225-244). Springer, Boston, MA.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.