Page 13 - THENIGERIAPOLICEFORCE AND CYBERPOLICINGASYNOPSIS
P. 13

Cybercrimes  (Prohibition,  Prevention,  etc)  Act,  2015.  (2017,  October  17).  Retrieved  from
                       http://www.lawnigeria.com>Cyber-Crime-Act

               Danquah, P. & Longe, O.B. (2011). An Empirical Test of the Space Transition Theory of
                       Cyber Criminality:  Investigating Cyber Crime Causation Factors in Ghana:  African
                       Journal of Computing and ICT, 4(2), 37-48.

               Danquah, P. & Longe, O.B. (2011). Cyber Deception and Theft: An Ethnographic Study on
                       Cyber Criminality from  a Ghanian Perspective:  Journal of  Information Technology
                       Impact, 11(3), 169-182.

               Dashora,  K.  (2011).  Cyber  Crime  in  the  Society:  Problems  and  Preventions:  Journal  of
                       Alternative Perspectives in the Social Sciences, 3(1), 240 – 252.

               Degarmo, M. (2011). Understanding the Comparisons of Routine Activities and Contagious
                       Distribution  of  Victimization:  Forming  a  Mixed  Method  of  Confluence  and
                       Transmission:  International Journal of  Criminology and Sociological Theory, 4(1),
                       585.

               Edward,  O.U.  &  Charles,  O.O.  (2017).  Social  Structure  and  the  Production  of  Young
                       Cyber Criminals in Nigeria: International Journal of Social Sciences, Humanities and
                       Education, 1(2), 2-3.

               Ehimen, O.R. & Bola, A. (2010). Cybercrime in Nigeria: Business Intelligence Journal,
                       3(1), 94-9.
               Igwe,  N.  &Ibegwam,  A.  (2014).  Imperative  of  Cyber  Ethics  Education  to  Cyber  Crimes
                       Prevention  and  Cyber  Security  in  Nigeria:  International  Journal  of  ICT  and
                       Management, II(2), 102-105.

               Jaishankar,  K.  (2011).  Cyber  Criminology:  Exploring  Internet  Crimes  and  Criminal
                       Behavior. Boca Raton, FL USA: CRC Press.

               Kelling, G.L. & Moore, M.H. (1988). The Evolving Strategy of Policing: A Publication of
                       the  National  Institute  of  Justice,  US  Department  of  Justice,  and  the  Program  in
                       Criminal Justice Policy and Management, John F. Kennedy School of Government,
                       Harvard University. No. 4

               Kigerl,  A.  (2011).  Routine  Activity  Theory  and  the  Determinants  of  High  Cybercrime
                       Countries:   Social   Science    Computer     Review,    30(4):   470-486     DOI:
                       10.1177/0894439311422689

                                                                                                   nd
               Kurian, G.T. (2006). World Encyclopedia of Police Forces and Correctional System (2  ed).
                       USA: Thomson Gale

               Leukfeldt,  E.R.  &Yar,  M.  (2016)  Applying  Routine  Activity  Theoryto  Cybercrime:  A
                       Theoretical  and  Empirical  Analysis,  Deviant  Behavior,  37(3),  263-280,
                       DOI:10.1080/01639625.2015.1012409

               Longe,  O.,  Ngwa,  O.,  Wada,  F.,  &  Mbarika,  V.  (2009).  Criminal  Uses  of  Information  &
                       Communication  Technologies  in  Sub-Saharan  Africa:  Trends,  Concerns  and
                       Perspectives: Journal of Information Technology Impact, 9(3):155-172




                                                           13
   8   9   10   11   12   13   14   15