Cybercrimes in Southern Nigeria and survey of IoT implications

Stephen Ugwuanyi, Agbo Okechukwu, Ohia Prince, Ndukwe Okechukwu, James Irvine

Research output: Contribution to conferenceProceedingpeer-review

139 Downloads (Pure)

Abstract

This study comprises of a survey on the cybercrime situational awareness in the southern part of Nigeria and the readiness for IoT implications resulting from the challenges of IoT technology adoption for consumer and industrial use cases. We considered cybercrimes in the forms of identity theft, data theft, false alert, dating and romance scam and online shopping scam. The analysis shows among others, 84% of involvement in identity theft and 20% of involvement in data theft with the mode operation being highest through web-based applications. Although cybercriminals are yet to fully utilize the vast potentials of emerging IoT technology and their vulnerability to commit cybercrimes in the region, the rate is on the increase. Also presented is a generic background study on IoT security concerning device capabilities, threat landscape, policy frameworks and applications from which cybercrime trend mitigations and recommendations to reduce the impending dangers of IoT cybercrimes were proposed.
Original languageEnglish
Number of pages8
Publication statusPublished - 25 Aug 2020
Event1st IEEE Multi-Conference Technical Series (MCTS) 2020: Trans-Disciplinary Sciences, Engineering & Information Systems and Computing Applications - American University of Nigeria (AUN), Yola, Nigeria
Duration: 25 Aug 202030 Aug 2020
Conference number: 1
https://r8.ieee.org/nigeria/2020/05/10/1st-ieee-multi-conference-technical-series-2020/

Conference

Conference1st IEEE Multi-Conference Technical Series (MCTS) 2020
Abbreviated titleTEICA-2020
Country/TerritoryNigeria
CityYola
Period25/08/2030/08/20
Internet address

Keywords

  • cybercrimes
  • internet of things (IoT)
  • network
  • cybersecurity

Fingerprint

Dive into the research topics of 'Cybercrimes in Southern Nigeria and survey of IoT implications'. Together they form a unique fingerprint.

Cite this