2019 Sixth International Conference on eDemocracy &Amp; eGovernment (ICEDEG) 2019
DOI: 10.1109/icedeg.2019.8734329
|View full text |Cite
|
Sign up to set email alerts
|

E-Government and the Challenge of Cybercrime in Nigeria

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Authors in [7] define it as those crimes committed through a computer or an electronic device, mainly through the Internet. According to [8], the Internet has become a vulnerable place where individuals, organizations, and agencies are constantly put at risk due to attacks by cybercriminals. The exploration rate of this internet vulnerability by online fraudsters seems to have increased as a result of COVID-19.…”
Section: Introductionmentioning
confidence: 99%
“…Authors in [7] define it as those crimes committed through a computer or an electronic device, mainly through the Internet. According to [8], the Internet has become a vulnerable place where individuals, organizations, and agencies are constantly put at risk due to attacks by cybercriminals. The exploration rate of this internet vulnerability by online fraudsters seems to have increased as a result of COVID-19.…”
Section: Introductionmentioning
confidence: 99%
“…Adopting data from multiples sources, the researcher tried to establish the ICTs penetration pattern, cybercrime trend and prevention mechanics towards curtailing cybercrime invasions in the Nigeria educational investment terrain through technology surveillance. The findings of the research demonstrated that ICTs diffusion, internet usage and cybercrime in Nigeria are significantly on the increase [74]. This research aimed at exploring wider perspective of information communication security in e-learning education, mobile cloud computing technologies, information technology infrastructures and the possibility of providing more robust security in the e-learning platform through the application of policy-based computing framework.…”
Section: Introductionmentioning
confidence: 99%
“…Access to latest technologies (T1) Oni et al [67], Rana et al [32], Aghimien et al [31], Shiroishi et al [55], Holroyd [3], Nair et al [9] Application development (T2) Nasution et al [53], Jo et al [68] Big data (T3) Silva et al [38], Farid et al [69] Data availability and heterogeneousness (T4) Zengin et al [49], Aldabbas et al [10], Rana et al [32], Tan and Taeihagh [60], El-Kholei and Yassein [61] Hardware environment compatibility and heterogeneity (T5) Silva et al [38], Aldabbas et al [10], Meiyanti et al [54] Information technology standards (T6) Ambira et al [50], Shin et al [59] Information security management professionals (T7) Tonggiroh [41] Lack of technological skills (T8) Meiyanti et al [54] Lack of technical support equipment (T9) Zengin et al [49] Poor utilization of digital technologies (T10) Aghimien et al [34] Records mobility (T11) Meiyanti et al [54] Data and System integration (T12) Meiyanti et al [54], Jo et al [68] Table A2. Demographic Data of Respondents (Experts).…”
Section: Robotsmentioning
confidence: 99%