Network system design for combating cybercrime in Nigeria

A. O. Isah, J. K. Alhassan, Sanjay Misra, I. Idris, Broderick Crawford, Ricardo Soto

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations


This research work is to bring to light, the danger posed by Cyber Crime in the world generally and Nigeria in particular with the hope that policy makers will work with the recommendations and practical combating framework design of this research work. In order to achieve this, the following approaches were adopted; survey of some common Cybercrime in Nigeria with the frequency of occurrence and design of a frame work system to combat the crime. The system design controls and track cyber criminals on the Nigerian cyber space. The paper proposes the establishment of National Cybercrime Control Center (NCCC) to effect this system. The Security Agents could obtain tracked information from NCCC as evidence to arrest and prosecute cybercriminals.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - 16th International Conference, ICCSA 2016, Proceedings
EditorsSanjay Misra, Osvaldo Gervasi, Carmelo M. Torre, David Taniar, Elena Stankova, Ana Maria A.C. Rocha, Shangguang Wang, Beniamino Murgante, Bernady O. Apduhan
PublisherSpringer Verlag
Number of pages16
ISBN (Print)9783319420912
StatePublished - 2016
Event16th International Conference on Computational Science and Its Applications, ICCSA 2016 - Beijing, China
Duration: 4 Jul 20167 Jul 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference16th International Conference on Computational Science and Its Applications, ICCSA 2016


  • Combating
  • Cybercrime
  • Framework
  • Network


Dive into the research topics of 'Network system design for combating cybercrime in Nigeria'. Together they form a unique fingerprint.

Cite this