Page 5 - THENIGERIAPOLICEFORCE AND CYBERPOLICINGASYNOPSIS
P. 5
Oluwasenyifunmitan (2009) have recently afflicted many of Nigeria’s larger banks and their
customers.
Spamming
Spamming is the use of electronic messaging systems to send unsolicited bulk messages
indiscriminately (Maitanmi, et al., 2013). E-mail spam is seen by Maitanmi et al. (2013) as
the most widely recognized spam. Today, e-mail spam is becoming a serious issue amongst
businesses due to the cost overhead it causes not only in bandwidth consumption but also to
the amount of time wasted downloading spam mails. According to Igwe and Ibegwam
(2014), spammers, in recent times, devise other advanced techniques to avoid spam filters
such as permutation of the e-mail contents and use of imagery that cannot be detected by the
spam filters. Assisting Nigerian law enforcement agents, Microsoft provides leads on spam
emanating from Nigeria allowing the authorities to pursue investigations more quickly and
successfully (Chawki, 2009). According to Owolabi (2010), spamming is so alarming in the
Nigerian e-banking. Similarly, Okpan and Anigbogu (2016) noted that numerous internet-
assisted crimes are perpetrated daily in Nigeria, which include spamming, phishing, hacking,
fraudulent electronic mails etc. This presents considerable amount of threats to businesses.
Hence, the need for businesses and other internet users to adopt stringent measures to take
care of spam in Nigeria.
Cyber-stalking
This is primarily referred to as using internet platforms to recurrently harass another person,
group or organization. This harassment could be sexual, or it could be other motivation such
as anger, outright hostility, or inflict unwanted advances. According to Kurian (2006), Cyber-
stalking is another common cybercrime in which an offender pursues another individual,
usually a woman or child, through e-mail by hurling a threat or making an inappropriate
request. In this type of activity, the originator of the message may hide his or her identity by
using a false e-mail ID. Dashora (2011) and Alpna and Malhotra (2016) hold that Cyber-
stalking involves following a person’s “routine activities” in the internet thereby posting
messages (sometimes threatening) on the victim’s timeline, inbox or any chat room
frequented by the victim. Olumoye (2013) in a study highlighted that Cyber-stalking is the
second most serious crime after malware. Perhaps, because it has devastating emotional
5