Page 5 - THENIGERIAPOLICEFORCE AND CYBERPOLICINGASYNOPSIS
P. 5

Oluwasenyifunmitan (2009) have recently afflicted many of Nigeria’s larger banks and their

               customers.





               Spamming

               Spamming  is  the  use  of  electronic  messaging  systems  to  send  unsolicited  bulk  messages

               indiscriminately (Maitanmi, et al., 2013). E-mail spam is seen by Maitanmi et al. (2013) as

               the most widely recognized spam. Today, e-mail spam is becoming a serious issue amongst
               businesses due to the cost overhead it causes not only in bandwidth consumption but also to

               the  amount  of  time  wasted  downloading  spam  mails.  According  to  Igwe  and  Ibegwam

               (2014), spammers, in recent times, devise other advanced techniques to avoid spam filters
               such as permutation of the e-mail contents and use of imagery that cannot be detected by the

               spam filters. Assisting Nigerian law enforcement agents, Microsoft provides leads on spam
               emanating from Nigeria allowing the authorities to pursue investigations more quickly and

               successfully (Chawki, 2009). According to Owolabi (2010), spamming is so alarming in the
               Nigerian  e-banking.  Similarly,  Okpan  and  Anigbogu  (2016)  noted  that  numerous  internet-

               assisted crimes are perpetrated daily in Nigeria, which include spamming, phishing, hacking,

               fraudulent electronic mails etc. This presents considerable amount of threats to businesses.
               Hence, the need for businesses and other internet users to adopt stringent measures to take

               care of spam in Nigeria.


               Cyber-stalking

               This is primarily referred to as using internet platforms to recurrently harass another person,

               group or organization. This harassment could be sexual, or it could be other motivation such
               as anger, outright hostility, or inflict unwanted advances. According to Kurian (2006), Cyber-

               stalking  is  another  common  cybercrime  in  which  an  offender  pursues  another  individual,
               usually  a  woman  or  child,  through  e-mail  by  hurling  a  threat  or  making  an  inappropriate

               request. In this type of activity, the originator of the message may hide his or her identity by

               using a false e-mail  ID.  Dashora (2011) and Alpna and Malhotra (2016) hold  that  Cyber-
               stalking  involves  following  a  person’s  “routine  activities”  in  the  internet  thereby  posting

               messages  (sometimes  threatening)  on  the  victim’s  timeline,  inbox  or  any  chat  room
               frequented by the victim. Olumoye (2013) in a study highlighted that Cyber-stalking is the

               second  most  serious  crime  after  malware.  Perhaps,  because  it  has  devastating  emotional


                                                            5
   1   2   3   4   5   6   7   8   9   10