Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

نویسندگان

  • K. Alese Boniface
  • K. Adu Michael
چکیده

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed. Keywords—Cybercrime, Sign-up Portal, Internet Service Provider (ISP), Internet Protocol Address (IP address).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

Sociological Perspective of Examination Malpractices in Nigerian Universities

Examination malpractice is any act carried out by anybody that defies the rules that guides a student whose knowledge or ability is being tested in a particular knowledge or skill with the aim of distorting the student’s true knowledge or ability. This article employs three classical major sociological perspectives in analyzing examination malpractice in Nigerian Universities. The structural-fu...

متن کامل

Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the ...

متن کامل

Designing an Expert System for Internet Connection Problems Troubleshooting for wired network users

Man, is living in an era that the knowledge is estimated to be doubled in a relatively short time. The fast rate of technology's growth in the "Century of information", is caused by fast growth of communication technologies like the internet which has become one of the best tools for a quick, cheap, effective and vastly supported communication. For an efficient and effective usage of tools and ...

متن کامل

Constraints to Effective Use of Information Communication Technologies (ICTs) among Small-scale Farmers in Anambra State, Nigeria

The study was carried out in Anambra State, Nigeria. Questionnaire was used to collect data from a sample of one hundred and eight (108) small-scale farmers. Percentage, mean score, standard deviation and factor analysis were used for data analysis. The duration of the study was June 2009 and March, 2010. Results of the study indicated that the major constraints to effective use of ICTs by smal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014