Abstract
This chapter presents a summary of the key findings of this study and the implications for financial crimes in Nigeria. The chapter started by presenting a summary of the methodology of the study. The study was structured as a qualitative case study, relying on interviews and review of official documents and records of the Economic and Financial Crimes Commission (EFCC) and the Nigeria Police Force. The chapter presented a summary of research contributions to knowledge—theory, policy, and practice. This chapter ended by presenting a set of practical recommendations for the digital forensic readiness of both the EFCC and the Nigerian Police Force.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abu SO, Lateef OM, Echobu J (2018) Determinants of cyber fraud investigation in Nigeria. Acc Taxation Rev 2(2)
Ahmed I (2020) Technology organization environment framework in cloud computing. Telkomnika 18(2):716–725
Al-Hujran O, Al-Lozi EM, Al-Debei MM, Maqableh M (2018) Challenges of cloud computing adoption from the TOE framework perspective. Int J E-Bus Res (IJEBR) 14(3):77–94
Bello M, Griffiths M (2021) Routine activity theory and cybercrime investigation in Nigeria: how capable are law enforcement agencies? In: Rethinking cybercrime. Palgrave Macmillan, Cham, pp 213–235
Carrier B, Spafford E (2004) An event-based digital forensic investigation framework. Digital Investigation. https://dfrws.org/wp-content/uploads/2019/06/2004_USA_paper-an_event-based_ digital_forensic_investigation_framework.pdf
Chau PY, Tam KY (1997) Factors affecting the adoption of open systems: an exploratory study. MIS Q 21(1)
Chigozie-Okwum C, Ugboaja S, Micheal D, Osuo-Genseleke M (2017) Proliferation of cyber insecurity in Nigeria: a root cause analysis. AFRREV STECH Int J Sci Technol 6(2):53–60
Cohen LE, Felson M (1979) Social change and crime rate trends: a routine activity approach. Am Sociol Rev 588–608
Eboibi FE (2021) Cybercriminals and coronavirus cybercrimes in Nigeria, the United States of America and the United Kingdom: cyber hygiene and preventive enforcement measures. Commonw Law Bull 47(1):113–142
Ehimen OR, Bola A (2010) Cybercrime in Nigeria. Bus Intell J 3(1):93–98
Grabosky PN (2001) Virtual criminality: old wine in new bottles? Soc Leg Stud 10(2):243–249
Hutchings A, Hayes H (2009) Routine activity theory and phishing victimisation: who gets caught in the ‘net’? Curr Issues Crim Just 20(3):433–452
Iacovou CL, Benbasat I, Dexter AS (1995) Electronic data interchange and small organizations: adoption and impact of technology. MIS Q 465–485
Karie NM, Venter HS (2015) Taxonomy of challenges for digital forensics. J Forensic Sci 60(4):885–893
Kigerl A (2012) Routine activity theory and the determinants of high cybercrime countries. Soc Sci Comput Rev 30(4):470–486
Kingsley N, Enumah A (2021) Shake-up imminent in EFCC as 850 Police. https://www.thisdaylive.com/index.php/2021/02/22/shake-up-imminent-in-efcc-as-850-police
Leukfeldt ER, Yar M (2016) Applying routine activity theory to cybercrime: a theoretical and empirical analysis. Deviant Behav 37(3):263–280
Leung D, Lo A, Fong LHN, Law R (2015) Applying the Technology-Organization-Environment framework to explore ICT initial and continued adoption: an exploratory study of an independent hotel in Hong Kong. Tour Recreat Res 40(3):391–406
Marshall C, Rossman GB (2014) Designing qualitative research. Sage Publications
Mihai IC, Pruna Ș, Petrica G (2017) A comprehensive analysis on cyber-threats against elearning systems. ELearning Softw Educ 3:344–351. https://doi.org/10.12753/2066-026X-17-225
Mohammed KH, Mohammed YD, Solanke AA (2019) Cybercrime and digital forensics: bridging the gap in legislation, investigation, and prosecution of cybercrime in Nigeria. Int J Cybersecur Intell Cybercrime 2(1):56–53
NIST (2022) Digital investigation techniques: a nist scientific foundation review. https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8354.pdf
NIST (2023) Computer forensics tools & techniques catalog. https://toolcatalog.nist.gov/index.php
National Information Technology Development Agency (2022) Nigeria to require social media platforms to open local offices. https://www.reuters.com/world/africa/nigeria-require-social-media-platforms-open-local-offices-2022-06-14/
News Agency of Nigeria (2016) Police to create special unit to tackle cybercrime. Guardian Newspaper. https://guardian.ng/news/police-to-create-special-unit-to-tackle-cybercrime/
Nigeria Data Protection Act (2023). https://ndpc.gov.ng/Files/Nigeria_Data_Protection_Act_2023.pdf
Obuah E (2010) Combatting corruption in Nigeria: the Nigerian economic and financial crimes (EFCC). Afr Stud Q 12(1)
Office of the National Security Adviser (2021) National cybersecurity policy and strategy. https://cert.gov.ng/ngcert/resources/NATIONAL_CYBERSECURITY_POLICY_AND_STRATEGY_2021.pdf
Okolorie GR (2020, December 22) Uncovering patterns in complex investigations is no match for Nigeria’s Economic and Financial Crimes Commission (EFCC) [Interview]. Cellebrite. https://www.cellebrite.com/en/uncovering-patterns-in-complex-investigations-is-no-match-for-nigerias-economic-and-financial-crimes-commission-efcc/
Olayemi OJ (2014) A socio-technological analysis of cybercrime and cyber security in Nigeria. Int J Sociol Anthropol 6(3):116–125
Oraegbunam IK (2015) The Nigerian police and problems of cybercrime investigation: need for adequate training. Niger Law J 18(1):1–28
Oyedele T (2014) Nigeria: Nigeria’s 2014 budget—tax and economic analyses. https://www.mondaq.com/nigeria/tax-authorities/288146/nigerias-2014-budget---tax-and-economic-analyses
Percy WH, Kostere K, Kostere S (2015) Generic qualitative research in psychology. Qualitative Rep 20(2):76–85
Pooe A, Labuschagne L (2012, August) A conceptual model for digital forensic readiness. In: 2012 Information security for South Africa. IEEE, pp 1–8
Pratt TC, Holtfreter K, Reisig MD (2010) Routine online activity and Internet fraud targeting: extending the generality of routine activity theory. J Res Crime Delinq 47(3):267–296
Ramdani B, Chevers D, Williams DA (2013) SMEs’ adoption of enterprise applications: a technology-organisation-environment model. J Small Bus Enterprise Dev
Reyns BW (2015) A routine activity perspective on online victimisation. J Finan Crime
Samonas S (2013) Insider fraud and routine activity theory. LSE Research Online. http://eprints.lse.ac.uk/50344/1/Samonas_Insider_fraud_routine_2013.pdf
Straub ET (2009) Understanding technology adoption: theory and future directions for informal learning. Rev Educ Res 79(2):625–649
Tan J (2001) Forensic readiness. Cambridge, MA:@ Stake, 1–23
The World Bank (2022a) Population, total—Nigeria. https://data.worldbank.org/indicator/SP.POP.TOTL?locations=NG
The World Bank (2022b) United States. https://data.worldbank.org/country/united-states?view=chart
Tonye WS (2018) Cyber forensic and data collection challenges in Nigeria. Glob J Comput Sci Technol 18(3)
Tornatzky LG, Fleischer M, Chakrabarti AK (1990) Processes of technological innovation. Lexington Books
Tseloni A, Wittebrood K, Farrell G, Pease K (2004) Burglary victimization in England and Wales, the United States and the Netherlands: a cross-national comparative test of routine activities and lifestyle theories. Br J Criminol 44(1):66–91
Umar I, Samsudin RS, Mohamed M (2016) Understanding the successes and challenges of Anti-Corruption Agency (ACA) in Nigeria: a case of Economic and Financial Crimes Commission (EFCC). Asian J Multidisc Stud 4(5):27–33
United States Department of Justice (2016) Publicly funded forensic crime laboratories: resources and services, 2014. https://bjs.ojp.gov/content/pub/pdf/pffclrs14.pdf
Vanguard Newspaper (2020) Nigeria police, interpol arrest three suspects over cybercrime. Vanguard Newspaper. https://www.vanguardngr.com/2020/07/nigeria-police-interpol-arrest-3-suspects-over-cybercrime/
Yar M (2005) The novelty of ‘cybercrime’: an assessment in light of routine activity theory. Eur J Criminol 2(4):407–427
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sibe, R.T., Kaunert, C. (2024). Conclusion and Recommendations for Digital Forensic Readiness of Nigerian Financial Crimes Agencies. In: Cybercrime, Digital Forensic Readiness, and Financial Crime Investigation in Nigeria. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-54089-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-54089-9_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-54088-2
Online ISBN: 978-3-031-54089-9
eBook Packages: Law and CriminologyLaw and Criminology (R0)