SlideShare a Scribd company logo
Presented by: Pelumi Apantaku
CYBERCRIME IN NIGERIA -
TECHNOLOGY AND SOCIETY
• Introduction
• Understanding Cybercrime
• Cybercrime in Nigeria
• The Nigerian Society
• Technology in the Nigerian Case
• The Cybercrime Market Potential
• Society Responses
• Conclusion
TABLE OF CONTENT
• Nigeria lost N6.2billion (approximately £180million)
• Nigeria remains one of leading source of cybercrime (Hammersley, 2015)
• Nigeria has one of the fastest rate of internet penetration across the globe
• Cyber fraud is the strength of Nigerian cybercrime market
• Nigeria is not part of top 10 cyber attack countries (Kaspersky, 2014)
• Cybercrime has become an active part of the Nigerian social fabrics
• Cybercrime generate jobs in Nigeria
• Victims is in every part of the world.
INTRODUCTION
• Nigeria is in Western part of Africa
• Nigeria has over 177 million in population
• 46% of the population is poor
• Over 70% of this population is between 18 and 35
• Urban poverty is prominent in Nigeria
• Social Infrastructure is poor
• Cybercrime is an opportunity to get out of poverty
• Nigerians are Sociable and more outgoing
THE NIGERIAN SOCIETY
• Cybercrime is the ‘computer-mediated activities which are either illegal
or considered illicit by certain parties and which can be conducted
through global electronic networks’ (Thomas and Loader, 2000)
• Cybercrime signify a range of illicit activities whose common
denominator is the central role played by networks of information and
communication technology (ICT) in their commission (Yar, 2005)
• All crimes performed or resorted to by abuse of computer network or
Internet with the purpose of influencing the functioning of the computer
system and also for financial gains (Abdulhamid et al., 2011)
UNDERSTANDING CYBERCRIME
• Cybercrime expanded through cyber cafes
• It is a loosely coordinated sector
• Initial victims were outside the country
• Cybercrime has become a national security threat
• Cybercrime is rampant among Nigerian youths
• Financial reward is the primary motivation
• Cheap internet have increased perpetration
• African Voodoo is being deployed
CYBERCRIME IN NIGERIA
• Internet connection has become cheap
• Continuous access to the internet has enhanced crime
• 90% of internet connection is mobile devices
• Technical education is becoming accessible
• Technological incubation centres are increasing
• E-commerce has become prominent
• Mobile application are becoming popular
– Financial Sector
– Communication
TECHNOLOGY IN THE NIGERIAN CASE
• Local Victims are more focused
• Variation in the types of crime
• Dark data is enormous
• Social media is another
• State organisations are being focused
• Money is no more the primary motivation
• Organised cybercriminals
THE CYBERCRIME MARKET IN NIGERIA
• Society accommodates cybercrime
• Cyber fraud is the most emphasised
• Financial gain makes it attractive
• Government attempted surveillance
• Cybercrime act 2015 has been signed into law
• Poor knowledge of cybercrime within Judiciary
• Low local victims reducing societal discouragement
SOCIETY RESPONSE
• Cybercrime is prominent in Nigeria
• Technological access has enhanced prominence
• It is a response from the poor
• It enriches the Nigerian economy
• Change in crime and motivation is occurring
• The potential for cybercrime is high
• Law is not enough but awareness is required
CONCLUSION
THANKS
ANY QUESTION?

More Related Content

What's hot

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
Abdul Manaf Vellakodath
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
anilinvns
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
Vasundhara Singh Gautam
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
Net at Work
 
Cyber security
Cyber security Cyber security
Cyber security
ZwebaButt
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
Sibghatullah Khattak
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
Prof. (Dr.) Tabrez Ahmad
 
Network Security
Network Security Network Security
Network Security
Abdul Qadir Pattal
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 

What's hot (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Network Security
Network Security Network Security
Network Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 

Viewers also liked

Comtechchange
ComtechchangeComtechchange
Comtechchangeraphmay
 
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
Marcos Ortiz Valmaseda
 
Nigeria Position Paper
Nigeria Position PaperNigeria Position Paper
Nigeria Position Paperguest374665
 
Mechanical Technology Grade 12 Chapter 2 Technology, Society & Environment
Mechanical Technology Grade 12 Chapter 2 Technology, Society & EnvironmentMechanical Technology Grade 12 Chapter 2 Technology, Society & Environment
Mechanical Technology Grade 12 Chapter 2 Technology, Society & Environment
Future Managers
 
Importance of technology
Importance of technologyImportance of technology
Importance of technology
Mariilou
 
Comp - Wk 2 - Technology in Society
Comp - Wk 2 - Technology in SocietyComp - Wk 2 - Technology in Society
Comp - Wk 2 - Technology in SocietyJamie Hutt
 
Technology & Society – More Questions Than Answers
Technology & Society – More Questions Than AnswersTechnology & Society – More Questions Than Answers
Technology & Society – More Questions Than Answers
Tal Lavian Ph.D.
 
Pros and cons of technology
Pros and cons of technologyPros and cons of technology
Pros and cons of technology
Sultan Ghani
 
Science Technology and society
Science Technology and societyScience Technology and society
Science Technology and society
Manvi Yadav
 
Philosophy of Science, Technology and Society
Philosophy of Science, Technology and Society Philosophy of Science, Technology and Society
Philosophy of Science, Technology and Society Universiteit Twente
 
Sociology & Engineering
Sociology & EngineeringSociology & Engineering
Sociology & EngineeringNewForum
 
Bi 140 science, technology and society module 1
Bi 140 science, technology and society module 1Bi 140 science, technology and society module 1
Bi 140 science, technology and society module 1Michael Matthews, RAC
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
 
Science, Technology, & Society in the 20th century
Science, Technology, & Society in the 20th centuryScience, Technology, & Society in the 20th century
Science, Technology, & Society in the 20th century
Sushmita Mae Leones
 
Technological Determinism
Technological DeterminismTechnological Determinism
Technological Determinism
_
 
Changes made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our SocietyChanges made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our Society
Jigyasa Singh
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
The effect of technology on today's society ppt
The effect of technology on today's society pptThe effect of technology on today's society ppt
The effect of technology on today's society pptoacore
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

Viewers also liked (20)

Comtechchange
ComtechchangeComtechchange
Comtechchange
 
50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
 
Nigeria Position Paper
Nigeria Position PaperNigeria Position Paper
Nigeria Position Paper
 
Mechanical Technology Grade 12 Chapter 2 Technology, Society & Environment
Mechanical Technology Grade 12 Chapter 2 Technology, Society & EnvironmentMechanical Technology Grade 12 Chapter 2 Technology, Society & Environment
Mechanical Technology Grade 12 Chapter 2 Technology, Society & Environment
 
Importance of technology
Importance of technologyImportance of technology
Importance of technology
 
Comp - Wk 2 - Technology in Society
Comp - Wk 2 - Technology in SocietyComp - Wk 2 - Technology in Society
Comp - Wk 2 - Technology in Society
 
Technology & Society – More Questions Than Answers
Technology & Society – More Questions Than AnswersTechnology & Society – More Questions Than Answers
Technology & Society – More Questions Than Answers
 
Pros and cons of technology
Pros and cons of technologyPros and cons of technology
Pros and cons of technology
 
Science Technology and society
Science Technology and societyScience Technology and society
Science Technology and society
 
Philosophy of Science, Technology and Society
Philosophy of Science, Technology and Society Philosophy of Science, Technology and Society
Philosophy of Science, Technology and Society
 
Sociology & Engineering
Sociology & EngineeringSociology & Engineering
Sociology & Engineering
 
Bi 140 science, technology and society module 1
Bi 140 science, technology and society module 1Bi 140 science, technology and society module 1
Bi 140 science, technology and society module 1
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Science, Technology, & Society in the 20th century
Science, Technology, & Society in the 20th centuryScience, Technology, & Society in the 20th century
Science, Technology, & Society in the 20th century
 
Technological Determinism
Technological DeterminismTechnological Determinism
Technological Determinism
 
Science, Technology And Society
Science, Technology And SocietyScience, Technology And Society
Science, Technology And Society
 
Changes made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our SocietyChanges made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our Society
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
The effect of technology on today's society ppt
The effect of technology on today's society pptThe effect of technology on today's society ppt
The effect of technology on today's society ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similar to Cybercrime in Nigeria - Technology and Society

Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Johann Lo
 
Shaping the Future of the Internet in Africa
Shaping the Future of the Internet in AfricaShaping the Future of the Internet in Africa
Shaping the Future of the Internet in Africa
Internet Society
 
Innovation is everywhere - Nigeria startup ecosystem (2014)
Innovation is everywhere - Nigeria startup ecosystem (2014)Innovation is everywhere - Nigeria startup ecosystem (2014)
Innovation is everywhere - Nigeria startup ecosystem (2014)
Innovation is Everywhere
 
Developments in the African Digital Economy - Fola Odufuwa
Developments in the African Digital Economy - Fola OdufuwaDevelopments in the African Digital Economy - Fola Odufuwa
Developments in the African Digital Economy - Fola Odufuwa
Fola Odufuwa
 
Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023
KharimMchatta
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
Endcode_org
 
StartUp West Africa Report - Nigeria
StartUp West Africa Report -  NigeriaStartUp West Africa Report -  Nigeria
StartUp West Africa Report - Nigeria
Seye Akinnaike
 
Cyber security awareness - iWeek2017
Cyber security awareness  - iWeek2017Cyber security awareness  - iWeek2017
Cyber security awareness - iWeek2017
dotZADNA
 
African Digital Market Research 2016 - Amanda
African Digital Market Research 2016 - AmandaAfrican Digital Market Research 2016 - Amanda
African Digital Market Research 2016 - Amanda
Amanda Louw Bester
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
Business intelligence and global access through e marketing
Business intelligence and global access through e marketingBusiness intelligence and global access through e marketing
Business intelligence and global access through e marketing
Sufi Nouman Riaz
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tushar Malhotra
 
Impact of the Internet in Nigeria - Mobile Monday Nigeria
Impact of the Internet in Nigeria - Mobile Monday NigeriaImpact of the Internet in Nigeria - Mobile Monday Nigeria
Impact of the Internet in Nigeria - Mobile Monday Nigeria
Mobile Monday Nigeria
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
 
Women and ICT - UNOCHA (ROSEA)
Women and ICT - UNOCHA (ROSEA)Women and ICT - UNOCHA (ROSEA)
Women and ICT - UNOCHA (ROSEA)
nicholas njoroge
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
Chinatu Uzuegbu
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
chiragsahoo5
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
smita mitra
 

Similar to Cybercrime in Nigeria - Technology and Society (20)

Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Shaping the Future of the Internet in Africa
Shaping the Future of the Internet in AfricaShaping the Future of the Internet in Africa
Shaping the Future of the Internet in Africa
 
Innovation is everywhere - Nigeria startup ecosystem (2014)
Innovation is everywhere - Nigeria startup ecosystem (2014)Innovation is everywhere - Nigeria startup ecosystem (2014)
Innovation is everywhere - Nigeria startup ecosystem (2014)
 
Developments in the African Digital Economy - Fola Odufuwa
Developments in the African Digital Economy - Fola OdufuwaDevelopments in the African Digital Economy - Fola Odufuwa
Developments in the African Digital Economy - Fola Odufuwa
 
Cyber threat in Africa | 2023
Cyber threat in Africa | 2023Cyber threat in Africa | 2023
Cyber threat in Africa | 2023
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
StartUp West Africa Report - Nigeria
StartUp West Africa Report -  NigeriaStartUp West Africa Report -  Nigeria
StartUp West Africa Report - Nigeria
 
Cyber security awareness - iWeek2017
Cyber security awareness  - iWeek2017Cyber security awareness  - iWeek2017
Cyber security awareness - iWeek2017
 
African Digital Market Research 2016 - Amanda
African Digital Market Research 2016 - AmandaAfrican Digital Market Research 2016 - Amanda
African Digital Market Research 2016 - Amanda
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Business intelligence and global access through e marketing
Business intelligence and global access through e marketingBusiness intelligence and global access through e marketing
Business intelligence and global access through e marketing
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Impact of the Internet in Nigeria - Mobile Monday Nigeria
Impact of the Internet in Nigeria - Mobile Monday NigeriaImpact of the Internet in Nigeria - Mobile Monday Nigeria
Impact of the Internet in Nigeria - Mobile Monday Nigeria
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Women and ICT - UNOCHA (ROSEA)
Women and ICT - UNOCHA (ROSEA)Women and ICT - UNOCHA (ROSEA)
Women and ICT - UNOCHA (ROSEA)
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 

Cybercrime in Nigeria - Technology and Society

  • 1. Presented by: Pelumi Apantaku CYBERCRIME IN NIGERIA - TECHNOLOGY AND SOCIETY
  • 2.
  • 3. • Introduction • Understanding Cybercrime • Cybercrime in Nigeria • The Nigerian Society • Technology in the Nigerian Case • The Cybercrime Market Potential • Society Responses • Conclusion TABLE OF CONTENT
  • 4. • Nigeria lost N6.2billion (approximately £180million) • Nigeria remains one of leading source of cybercrime (Hammersley, 2015) • Nigeria has one of the fastest rate of internet penetration across the globe • Cyber fraud is the strength of Nigerian cybercrime market • Nigeria is not part of top 10 cyber attack countries (Kaspersky, 2014) • Cybercrime has become an active part of the Nigerian social fabrics • Cybercrime generate jobs in Nigeria • Victims is in every part of the world. INTRODUCTION
  • 5. • Nigeria is in Western part of Africa • Nigeria has over 177 million in population • 46% of the population is poor • Over 70% of this population is between 18 and 35 • Urban poverty is prominent in Nigeria • Social Infrastructure is poor • Cybercrime is an opportunity to get out of poverty • Nigerians are Sociable and more outgoing THE NIGERIAN SOCIETY
  • 6. • Cybercrime is the ‘computer-mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks’ (Thomas and Loader, 2000) • Cybercrime signify a range of illicit activities whose common denominator is the central role played by networks of information and communication technology (ICT) in their commission (Yar, 2005) • All crimes performed or resorted to by abuse of computer network or Internet with the purpose of influencing the functioning of the computer system and also for financial gains (Abdulhamid et al., 2011) UNDERSTANDING CYBERCRIME
  • 7. • Cybercrime expanded through cyber cafes • It is a loosely coordinated sector • Initial victims were outside the country • Cybercrime has become a national security threat • Cybercrime is rampant among Nigerian youths • Financial reward is the primary motivation • Cheap internet have increased perpetration • African Voodoo is being deployed CYBERCRIME IN NIGERIA
  • 8. • Internet connection has become cheap • Continuous access to the internet has enhanced crime • 90% of internet connection is mobile devices • Technical education is becoming accessible • Technological incubation centres are increasing • E-commerce has become prominent • Mobile application are becoming popular – Financial Sector – Communication TECHNOLOGY IN THE NIGERIAN CASE
  • 9. • Local Victims are more focused • Variation in the types of crime • Dark data is enormous • Social media is another • State organisations are being focused • Money is no more the primary motivation • Organised cybercriminals THE CYBERCRIME MARKET IN NIGERIA
  • 10. • Society accommodates cybercrime • Cyber fraud is the most emphasised • Financial gain makes it attractive • Government attempted surveillance • Cybercrime act 2015 has been signed into law • Poor knowledge of cybercrime within Judiciary • Low local victims reducing societal discouragement SOCIETY RESPONSE
  • 11. • Cybercrime is prominent in Nigeria • Technological access has enhanced prominence • It is a response from the poor • It enriches the Nigerian economy • Change in crime and motivation is occurring • The potential for cybercrime is high • Law is not enough but awareness is required CONCLUSION