Conclusion and Recommendations for Digital Forensic Readiness of Nigerian Financial Crimes Agencies

  • Chapter
  • First Online:
Cybercrime, Digital Forensic Readiness, and Financial Crime Investigation in Nigeria

Abstract

This chapter presents a summary of the key findings of this study and the implications for financial crimes in Nigeria. The chapter started by presenting a summary of the methodology of the study. The study was structured as a qualitative case study, relying on interviews and review of official documents and records of the Economic and Financial Crimes Commission (EFCC) and the Nigeria Police Force. The chapter presented a summary of research contributions to knowledge—theory, policy, and practice. This chapter ended by presenting a set of practical recommendations for the digital forensic readiness of both the EFCC and the Nigerian Police Force.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abu SO, Lateef OM, Echobu J (2018) Determinants of cyber fraud investigation in Nigeria. Acc Taxation Rev 2(2)

    Google Scholar 

  2. Ahmed I (2020) Technology organization environment framework in cloud computing. Telkomnika 18(2):716–725

    Article  Google Scholar 

  3. Al-Hujran O, Al-Lozi EM, Al-Debei MM, Maqableh M (2018) Challenges of cloud computing adoption from the TOE framework perspective. Int J E-Bus Res (IJEBR) 14(3):77–94

    Article  Google Scholar 

  4. Bello M, Griffiths M (2021) Routine activity theory and cybercrime investigation in Nigeria: how capable are law enforcement agencies? In: Rethinking cybercrime. Palgrave Macmillan, Cham, pp 213–235

    Google Scholar 

  5. Carrier B, Spafford E (2004) An event-based digital forensic investigation framework. Digital Investigation. https://dfrws.org/wp-content/uploads/2019/06/2004_USA_paper-an_event-based_ digital_forensic_investigation_framework.pdf

  6. Chau PY, Tam KY (1997) Factors affecting the adoption of open systems: an exploratory study. MIS Q 21(1)

    Google Scholar 

  7. Chigozie-Okwum C, Ugboaja S, Micheal D, Osuo-Genseleke M (2017) Proliferation of cyber insecurity in Nigeria: a root cause analysis. AFRREV STECH Int J Sci Technol 6(2):53–60

    Article  Google Scholar 

  8. Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 588–608

    Google Scholar 

  9. Eboibi FE (2021) Cybercriminals and coronavirus cybercrimes in Nigeria, the United States of America and the United Kingdom: cyber hygiene and preventive enforcement measures. Commonw Law Bull 47(1):113–142

    Article  Google Scholar 

  10. Ehimen OR, Bola A (2010) Cybercrime in Nigeria. Bus Intell J 3(1):93–98

    Google Scholar 

  11. Grabosky PN (2001) Virtual criminality: old wine in new bottles? Soc Leg Stud 10(2):243–249

    Article  Google Scholar 

  12. Hutchings A, Hayes H (2009) Routine activity theory and phishing victimisation: who gets caught in the ‘net’? Curr Issues Crim Just 20(3):433–452

    Article  Google Scholar 

  13. Iacovou CL, Benbasat I, Dexter AS (1995) Electronic data interchange and small organizations: adoption and impact of technology. MIS Q 465–485

    Google Scholar 

  14. Karie NM, Venter HS (2015) Taxonomy of challenges for digital forensics. J Forensic Sci 60(4):885–893

    Article  Google Scholar 

  15. Kigerl A (2012) Routine activity theory and the determinants of high cybercrime countries. Soc Sci Comput Rev 30(4):470–486

    Article  Google Scholar 

  16. Kingsley N, Enumah A (2021) Shake-up imminent in EFCC as 850 Police. https://www.thisdaylive.com/index.php/2021/02/22/shake-up-imminent-in-efcc-as-850-police

  17. Leukfeldt ER, Yar M (2016) Applying routine activity theory to cybercrime: a theoretical and empirical analysis. Deviant Behav 37(3):263–280

    Article  Google Scholar 

  18. Leung D, Lo A, Fong LHN, Law R (2015) Applying the Technology-Organization-Environment framework to explore ICT initial and continued adoption: an exploratory study of an independent hotel in Hong Kong. Tour Recreat Res 40(3):391–406

    Google Scholar 

  19. Marshall C, Rossman GB (2014) Designing qualitative research. Sage Publications

    Google Scholar 

  20. Mihai IC, Pruna Ș, Petrica G (2017) A comprehensive analysis on cyber-threats against elearning systems. ELearning Softw Educ 3:344–351. https://doi.org/10.12753/2066-026X-17-225

  21. Mohammed KH, Mohammed YD, Solanke AA (2019) Cybercrime and digital forensics: bridging the gap in legislation, investigation, and prosecution of cybercrime in Nigeria. Int J Cybersecur Intell Cybercrime 2(1):56–53

    Article  Google Scholar 

  22. NIST (2022) Digital investigation techniques: a nist scientific foundation review. https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8354.pdf

  23. NIST (2023) Computer forensics tools & techniques catalog. https://toolcatalog.nist.gov/index.php

  24. National Information Technology Development Agency (2022) Nigeria to require social media platforms to open local offices. https://www.reuters.com/world/africa/nigeria-require-social-media-platforms-open-local-offices-2022-06-14/

  25. News Agency of Nigeria (2016) Police to create special unit to tackle cybercrime. Guardian Newspaper. https://guardian.ng/news/police-to-create-special-unit-to-tackle-cybercrime/

  26. Nigeria Data Protection Act (2023). https://ndpc.gov.ng/Files/Nigeria_Data_Protection_Act_2023.pdf

  27. Obuah E (2010) Combatting corruption in Nigeria: the Nigerian economic and financial crimes (EFCC). Afr Stud Q 12(1)

    Google Scholar 

  28. Office of the National Security Adviser (2021) National cybersecurity policy and strategy. https://cert.gov.ng/ngcert/resources/NATIONAL_CYBERSECURITY_POLICY_AND_STRATEGY_2021.pdf

  29. Okolorie GR (2020, December 22) Uncovering patterns in complex investigations is no match for Nigeria’s Economic and Financial Crimes Commission (EFCC) [Interview]. Cellebrite. https://www.cellebrite.com/en/uncovering-patterns-in-complex-investigations-is-no-match-for-nigerias-economic-and-financial-crimes-commission-efcc/

  30. Olayemi OJ (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria. Int J Sociol Anthropol 6(3):116–125

    Article  Google Scholar 

  31. Oraegbunam IK (2015) The Nigerian police and problems of cybercrime investigation: need for adequate training. Niger Law J 18(1):1–28

    Google Scholar 

  32. Oyedele T (2014) Nigeria: Nigeria’s 2014 budget—tax and economic analyses. https://www.mondaq.com/nigeria/tax-authorities/288146/nigerias-2014-budget---tax-and-economic-analyses

  33. Percy WH, Kostere K, Kostere S (2015) Generic qualitative research in psychology. Qualitative Rep 20(2):76–85

    Google Scholar 

  34. Pooe A, Labuschagne L (2012, August) A conceptual model for digital forensic readiness. In: 2012 Information security for South Africa. IEEE, pp 1–8

    Google Scholar 

  35. Pratt TC, Holtfreter K, Reisig MD (2010) Routine online activity and Internet fraud targeting: extending the generality of routine activity theory. J Res Crime Delinq 47(3):267–296

    Article  Google Scholar 

  36. Ramdani B, Chevers D, Williams DA (2013) SMEs’ adoption of enterprise applications: a technology-organisation-environment model. J Small Bus Enterprise Dev

    Google Scholar 

  37. Reyns BW (2015) A routine activity perspective on online victimisation. J Finan Crime

    Google Scholar 

  38. Samonas S (2013) Insider fraud and routine activity theory. LSE Research Online. http://eprints.lse.ac.uk/50344/1/Samonas_Insider_fraud_routine_2013.pdf

  39. Straub ET (2009) Understanding technology adoption: theory and future directions for informal learning. Rev Educ Res 79(2):625–649

    Article  Google Scholar 

  40. Tan J (2001) Forensic readiness. Cambridge, MA:@ Stake, 1–23

    Google Scholar 

  41. The World Bank (2022a) Population, total—Nigeria. https://data.worldbank.org/indicator/SP.POP.TOTL?locations=NG

  42. The World Bank (2022b) United States. https://data.worldbank.org/country/united-states?view=chart

  43. Tonye WS (2018) Cyber forensic and data collection challenges in Nigeria. Glob J Comput Sci Technol 18(3)

    Google Scholar 

  44. Tornatzky LG, Fleischer M, Chakrabarti AK (1990) Processes of technological innovation. Lexington Books

    Google Scholar 

  45. Tseloni A, Wittebrood K, Farrell G, Pease K (2004) Burglary victimization in England and Wales, the United States and the Netherlands: a cross-national comparative test of routine activities and lifestyle theories. Br J Criminol 44(1):66–91

    Article  Google Scholar 

  46. Umar I, Samsudin RS, Mohamed M (2016) Understanding the successes and challenges of Anti-Corruption Agency (ACA) in Nigeria: a case of Economic and Financial Crimes Commission (EFCC). Asian J Multidisc Stud 4(5):27–33

    Google Scholar 

  47. United States Department of Justice (2016) Publicly funded forensic crime laboratories: resources and services, 2014. https://bjs.ojp.gov/content/pub/pdf/pffclrs14.pdf

  48. Vanguard Newspaper (2020) Nigeria police, interpol arrest three suspects over cybercrime. Vanguard Newspaper. https://www.vanguardngr.com/2020/07/nigeria-police-interpol-arrest-3-suspects-over-cybercrime/

  49. Yar M (2005) The novelty of ‘cybercrime’: an assessment in light of routine activity theory. Eur J Criminol 2(4):407–427

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Kaunert .

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sibe, R.T., Kaunert, C. (2024). Conclusion and Recommendations for Digital Forensic Readiness of Nigerian Financial Crimes Agencies. In: Cybercrime, Digital Forensic Readiness, and Financial Crime Investigation in Nigeria. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-54089-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-54089-9_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-54088-2

  • Online ISBN: 978-3-031-54089-9

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics

Navigation