Routine Activity Theory and Cybercrime Investigation in Nigeria: How Capable Are Law Enforcement Agencies?

  • Chapter
  • First Online:
Rethinking Cybercrime

Abstract

The evolution of the Internet amidst a rapidly growing global economy has created a completely new environment in which traditional crime prospers. Equally the convergence of computing and communication has changed the way we live, communicate and commit crime. Cybercriminals in Nigeria commonly known as ‘419 scammers’; a word coined from the Nigerian criminal code that penalises people from obtaining money under false pretence cost the Nigerian consumer $13.5 billion dollars in losses in 2012 (Clarke in European Journal on Criminal Policy and Research 10: 55–63, 2004; Sesan et al. in Economic Cost of Cybercrime in Nigeria, 2013; Grabosky in Social and Legal Studies 10: 243–249, 2001). Previous studies have focused on the causes and effects of cybercrime in Nigeria (Hassan et al. in ARPN Journal of Science and Technology 2: 626–631, 2012; Adesina in Canadian Social Science 13: 19–29, 2017); laws penalising against misuse of computer (Olusola et al. in The International Journal of Engineering and Science 2: 19–25, 2013; Saulawa and Abubakar in Journal of Law, Policy and Globalization 32: 23–33, 2014) and have focused relatively on financial cost and socio-economic effects of cybercrime (WITFOR in Social, Ethical and Legal Aspects, 2005; Sesan et al. 2012). Even though some studies have tried to explore cybercrime from the perspective of law enforcement Agencies in the UAE and Jordan (Maghaireh in Jordanian Cybercrime Investigations: A Comparative Analysis of Search for and Seizure of Digital Evidence, 2009; Alkaabi in Combating Computer Crime: An International Perspective, 2010), none has been done holistically from the view of law enforcement and members of the Cybercrime Advisory Council in Nigeria. Adopting a classical criminological framework of Routine Activity Theory (RAT), this research examined particularly cyber-enabled crime of advance fee fraud in Nigeria within the scope RAT which argued that for crime to take place, three requirements must be present namely; a motivated offender, a suitable target and an absence of a capable guardian. The research examined the factors that motivate an offender and what elements make a target (i.e. victim or computer) suitable for a crime. In the process, it considers the suitability of law enforcement officers and some members of the Cybercrime Advisory Council (CAC) as capable guardians and what factors limits their capabilities in mitigating the activities of cyber criminals. The research has been framed on an interpretivist paradigm and relativist philosophical stand, with focus on an inductive qualitative approach involving semi-structured interviews and documentation. These involved policy makers, members of parliament, telecommunications and ICT regulators on one hand; and investigators, prosecutors, forensic analyst and media practitioners particularly from the Economic and Financial Crimes Commission (EFCC), which is a leading law enforcement agency in the fight against cybercrime. The multi-dimensional evidence explains the role played by each of the stakeholders, the measures and partnership deployed in tackling cybercrime, and the challenges and recommendations needed in the international effort to tackle cybercrime globally. Findings suggest that the proliferation and lack of effective policing of the internet enabled by the greed of individuals and lack of enforcement and collaboration of relevant stakeholders have led to financial losses to victims. The findings further show how lack of proper education and awareness of individuals, and adequate training and provision of tools for law enforcement officers contributes to the high prevalence of cybercrime in Nigeria. Evidence is provided that documents the way members of the Cybercrime Advisory Council and especially the EFCC have attempted to overcome these challenges through partnership, capacity building and enforcement of relevant laws and policies aimed at addressing the issue of cybercrime in Nigeria. The finding equally extends the criminological understanding of deviant behaviours and furthers the current discussion on the role of law enforcement in policing the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 106.99
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 137.14
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 137.14
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muktar Bello .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bello, M., Griffiths, M. (2021). Routine Activity Theory and Cybercrime Investigation in Nigeria: How Capable Are Law Enforcement Agencies?. In: Owen, T., Marshall, J. (eds) Rethinking Cybercrime. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-55841-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-55841-3_11

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-55840-6

  • Online ISBN: 978-3-030-55841-3

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics

Navigation