References
[1]. Ablon, L., Libicki, M. C., & Golay, A. A. (2014). Markets for cybercrime tools and stolen data: Hackers' bazaar. Rand Corporation.
[2]. Adesina, O. S. (2017). Cybercrime and Poverty in Nigeria,13(4). Retrieved from http://www.cscanada.net/ index.php/css/article/view/9394/pdf
[3]. Akinyokun, O. K., Alese, B. K., Oluwadare, S. A., Iyare, M. O., & Iwasokun, G. B. (2015). Contributory indices to cybercrime activities in Nigeria. In Proceedings of Informing Science and IT Education Conference 2015 (pp. 59-77).
[4]. Allodi, L., Shim, W., & Massacci, F. (2013, May). Quantitative assessment of risk reduction with cybercrime black market monitoring. In 2013 IEEE Security and Privacy Workshops (pp. 165-172). IEEE.
[5]. Amaefule, E. (2015). Buyers of preregistered SIM cards face jail term. Retrieved from https://www.nairaland.com/ 2636985/buyers-preregistered-sim-cards-face
[6]. Aransiola, J. O., & Asindemade, S. O. (2011). Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychology, Behavior, and Social Networking, 14(12), 759-763.
[7]. Boone, H. N., & Boone, D. A. (2012). Analyzing likert data. Journal of Extension, 50(2), 1-5.
[8]. cwadmin. (2013). NCC Looks Elsewhere as Sale of Preregistered Sim Cards Booms. Nigeria Communications Week, Retrieved from http://nigeriacommunicationsweek. com.ng/ncc-looks-elsewhere-as-sale-of-preregisteredsim- cards-booms/
[9]. Donovan, K., & Martin, A. (2014). The rise of African SIM registration: The emerging dynamics of regulatory change. First Monday, 19(2).
[10]. Frank, I., & Odunayo, E. (2013). Approach to cyber security issues in Nigeria: challenges and solution. International Journal of Cognitive Research in Science, Engineering and Education, 1(1).
[11]. Gercke, M. (2011). Understanding cybercrime: a guide for developing countries. International Telecommunication Union (Draft), 89, 93.
[12]. Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2(1), 13-20.
[13]. Grier, C., Ballard, L., Caballero, J., Chachra, N., Dietrich, C. J., Levchenko, K., ... & Provos, N. (2012, October). Manufacturing compromise: The emergence of exploit-as-a-service. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 821-832). ACM.
[14]. Haque, A., Khatibi, A., & Rahman, S. (2009). Factors influencing buying behavior of piracy products and its impact to Malaysian market. International Review of Business Research Papers, 5(2), 383-401.
[15]. Hassan, A. B., Lass, F. D., & Makinde, J. (2012). Cybercrime in Nigeria: Causes, effects and the way out. ARPN Journal of Science and Technology, 2(7), 626-631.
[16]. Ibrahim, S. (2016). Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47, 44-57.
[17]. Jiow, H. J. (2013). Cyber crime in Singapore: An Analysis of regulation based on Lessig's four Modalities of Constraint. International Journal of Cyber Criminology, 7(1), 18-27.
[18]. Lessig, L. (2006). Code (Version 2.0). New York: Basic Books, Retrieved from http://codev2.cc/download+ remix/Lessig-Codev2.pdf
[19]. Liang, T. P., & Huang, J. S. (1998). An empirical study on consumer acceptance of products in electronic markets: A transaction cost model. Decision Support Systems, 24(1), 29-43.
[20]. Ngo, F., & Jaishankar, K. (2017). Commemorating a decade in existence of the International Journal of Cyber Criminology: A research agenda to advance the scholarship on cyber crime. International Journal of Cyber Criminology, 11(1), 1-9.
[21]. Nigerian Communications Commission. (2011). Registration of Telephone Subscribers Regulation. Retrieved from https://toluogunlesi.files.wordpress.com/ 2015/11/legal-regulations-registration_telecom_ subscribers_2011.pdf
[22]. Nigerian Communications Commission. (2012). NCC arrests six suspects with Pre-Registered SIM cards in Niger State. The Communicator Magazine. Retrieved from https://www.ncc.gov.ng/thecommunicator/ index.php?option=com_content&view=article&id=240 :ncc-arrests-six-suspects-with-pre-registered-sim-cardsin- niger-state&catid=32&Itemid=179
[23]. Niranjanamurthy, M., Kavyashree, N., Jagannath, S., & Chahar, D. (2013). Analysis of e-commerce and mcommerce: advantages, limitations and security issues. International Journal of Advanced Research in Computer and Communication Engineering, 2(6), 2360- 2370.
[24]. Okeshola, F. B., & Adeta, A. K. (2013). The nature, causes and consequences of cyber crime in tertiary institutions in Zaria-Kaduna state, Nigeria. American International Journal of Contemporary Research, 3(9), 98-114.
[25]. Oluwafemi, O., Adesuyi, F. A., & Shafi'i, M. A. (2013). Combating terrorism with cybersecurity: The Nigerian perspective. World Journal of Computer Application and Technology, 1(4), 103-109.
[26]. Osborne, J. W., Costello, A. B., & Kellow, J. T. (2008). Best practices in exploratory factor analysis. Best Practices in Quantitative Methods, 86-99.
[27]. Osho, O., & Adepoju, S. A. (2016). Cybercafés in Nigeria: Curse to the Internet? ICTA 2016, 117-123.
[28]. Sood, A. K., & Enbody, R. J. (2013). Crimeware-as-a-service- a survey of commoditized crimeware in the underground market. International Journal of Critical Infrastructure Protection, 6(1), 28-38.
[29]. Sood, A. K., Bansal, R., & Enbody, R. J. (2013). Cybercrime: Dissecting the state of underground enterprise. IEEE Internet Computing, 17(1), 60-68.
[30]. Soudijn, M. R., & Zegers, B. C. T. (2012). Cybercrime and virtual offender convergence settings. Trends in Organized Crime, 15(2-3), 111-129.
[31]. Tade, O. (2013). A spiritual dimension to cybercrime in Nigeria: The 'yahoo plus' phenomenon. Human Affairs, 23(4), 689-705.
[32]. Why NCC Acted. (2015). Retrieved from https://www.nairaland.com/2701693/why-ncc-fined-mtn
[33]. Zhuge, J., Holz, T., Song, C., Guo, J., Han, X., & Zou, W. (2009). Studying malicious websites and the underground economy on the Chinese web. In Managing Information Risk and the Economics of Security (pp. 225-244). Springer, Boston, MA.