Page 13 - THENIGERIAPOLICEFORCE AND CYBERPOLICINGASYNOPSIS
P. 13
Cybercrimes (Prohibition, Prevention, etc) Act, 2015. (2017, October 17). Retrieved from
http://www.lawnigeria.com>Cyber-Crime-Act
Danquah, P. & Longe, O.B. (2011). An Empirical Test of the Space Transition Theory of
Cyber Criminality: Investigating Cyber Crime Causation Factors in Ghana: African
Journal of Computing and ICT, 4(2), 37-48.
Danquah, P. & Longe, O.B. (2011). Cyber Deception and Theft: An Ethnographic Study on
Cyber Criminality from a Ghanian Perspective: Journal of Information Technology
Impact, 11(3), 169-182.
Dashora, K. (2011). Cyber Crime in the Society: Problems and Preventions: Journal of
Alternative Perspectives in the Social Sciences, 3(1), 240 – 252.
Degarmo, M. (2011). Understanding the Comparisons of Routine Activities and Contagious
Distribution of Victimization: Forming a Mixed Method of Confluence and
Transmission: International Journal of Criminology and Sociological Theory, 4(1),
585.
Edward, O.U. & Charles, O.O. (2017). Social Structure and the Production of Young
Cyber Criminals in Nigeria: International Journal of Social Sciences, Humanities and
Education, 1(2), 2-3.
Ehimen, O.R. & Bola, A. (2010). Cybercrime in Nigeria: Business Intelligence Journal,
3(1), 94-9.
Igwe, N. &Ibegwam, A. (2014). Imperative of Cyber Ethics Education to Cyber Crimes
Prevention and Cyber Security in Nigeria: International Journal of ICT and
Management, II(2), 102-105.
Jaishankar, K. (2011). Cyber Criminology: Exploring Internet Crimes and Criminal
Behavior. Boca Raton, FL USA: CRC Press.
Kelling, G.L. & Moore, M.H. (1988). The Evolving Strategy of Policing: A Publication of
the National Institute of Justice, US Department of Justice, and the Program in
Criminal Justice Policy and Management, John F. Kennedy School of Government,
Harvard University. No. 4
Kigerl, A. (2011). Routine Activity Theory and the Determinants of High Cybercrime
Countries: Social Science Computer Review, 30(4): 470-486 DOI:
10.1177/0894439311422689
nd
Kurian, G.T. (2006). World Encyclopedia of Police Forces and Correctional System (2 ed).
USA: Thomson Gale
Leukfeldt, E.R. &Yar, M. (2016) Applying Routine Activity Theoryto Cybercrime: A
Theoretical and Empirical Analysis, Deviant Behavior, 37(3), 263-280,
DOI:10.1080/01639625.2015.1012409
Longe, O., Ngwa, O., Wada, F., & Mbarika, V. (2009). Criminal Uses of Information &
Communication Technologies in Sub-Saharan Africa: Trends, Concerns and
Perspectives: Journal of Information Technology Impact, 9(3):155-172
13