Page 12 - THENIGERIAPOLICEFORCE AND CYBERPOLICINGASYNOPSIS
P. 12

3.  Sensitization programmes should be initiated to improve internet users’ cyber security

                       awareness. This will be useful in mitigating the loopholes that are being created by
                       internet users, which consequently lead to their victimization.


               References

               Adeniran, A.I. (2008). The Internet and Emergence of Yahooboys Sub-Culture in Nigeria:
                       International Journal of Cyber Criminology, 2(2), 368-370.

               Adesina,  O.S.  (2017).  Cybercrime  and  Poverty  in  Nigeria:  Canadian  Journal  of  Social
                       Sciences, 13(4), 19-29.

               Adeta, K.A. (2014). Patterns and Consequences of Cyber-Crime in Tertiary  Institutions in
                       Zaria:  A  thesis  Submitted  to  the  School  of  Postgraduate  Studies,  Ahmadu  Bello
                       University, Zaria, in Partial Fulfillment of the Requirements for the Award of Master
                       Degree in Sociology.

               Adogame, A. (2007). The 419 Codes as Business Unusual: Youth and the Unfolding of the
                       Advance Fee Fraud Online Discourse. In Sinha, V. (Eds). International Sociological
                       Association, e-bulletin, Singapore: ISA

               Alpna, & Mahotra, S. (2016). Cyber Crime- Its Types, Analysis and Prevention Techniques:
                       International  journal  of  advanced  study  in  computer  security  and  software
                       engineering, 6(5), 145-147.

               Ayofe,  A.N.  &  Oluwaseyifunmitan,  O.  (2009).Towards  Ameliorating  Cybercrime  and
                       Cyber-security: International Journal of Computer Science and Information Security,
                       3(1): 1-11

               Back,  S.  (2016).  Empirical  Assessment  of  Cyber  Harassment  Victimization  via  Cyber-
                       Routine Activities Theory. Published Master’s Thesis.

               Balogun, V.F.& Obe, O.O. (2010). E-crime in Nigeria: Trends, Tricks, and Treatment: The
                       Public Journal of Science and Technology, 11(1), 343.

               Baumer,  E.P.  &  Arnio,  A.  N.  (2016).  Macro-Level  Theory:  A  Critical  Component  of
                       Criminological  Exploration  in  Piquero,  A.  (Eds),  The  Handbook  of  Criminological
                                 st
                       Theory, (1 ed) (pp, 445-463). Malden, USA: John Wiley & Sons, Inc.
               Brenner,    S.W.    (2007).    At    Light   Speed:    Attribution   and    Response     to
                       Cybercrime/Terrorism/Warfare:  Journal  of  Criminal  Law  and  Criminology,
                       97(2):379-476

               Casey, E. (2004). Digital Evidence and Computer Crime. St Louis Mo: Elsevier Press


               Chawki,  M.  (2009).  Nigeria  Tackles  Advance  Fee  Fraud:  Journal  of  Information,  Law  &
                       Technology,<http://go.warwick.ac.uk/jilt/2009_1/chawki

                                                                                                    nd
               Clarke,  R.V.  (1997).  Situational  Crime  Prevention:  Successful  Case  Studies  (2 ed).
                       Guilderland, New York: Harrow and Heston





                                                           12
   7   8   9   10   11   12   13   14   15