GLOBALIZATION AND CYBERTERRORISM IN NIGERIA: WHICH WAY FORWARD?

Alfred A. Udosen, Goodnews Osah

Abstract


The cyberspace is primarily concerned with the security, control, and protection of shared information that are vital for decision making processes in any type of communication network. Terrorists now threaten public security by using cyberspace and social media technology to create fear and spread violence as the ways of intimidating a government or the general public. The readiness to respond to these threats (both internally and externally) to security, requires a combination of civilian and military tools in addition to economic and diplomatic resources that are needed to inhibit threats and to moderate their effects. Revitalization and strengthening of the national orientation with a mandate on value re-orientation, equity, fairness and social justice in the international community is necessary especially in information sharing in order to put an end to the risk of cyberterrorism. Also cyber innovations open up new opportunities for public-private partnerships to foster security initiatives and promote better efficiencies in the affairs of the government.

Keywords


Boko Haram, Cyberspace, Cyberterrorism, Globalisation, Terrorism.

Full Text:

PDF

References


Adekanye, J. B. (2008). Structural Adjustment, Democratization and Rising Ethnic Tensions in Africa. Development and Change 26(2):355 - 374

Adesina, S.O. (2012). The Negative Impact Globalization on Nigeria. International Journal of Humanities and Social Science Vol. 2 No. 15, 193-201

Adomi, E. E. and Igun, S. E. (2008).Combating cybercrime in Nigeria. The Electronic Library 26, no. 5: 716-725.

Ahmed, N. (2016). The Effect of Globalization: Terrorism and International Crime. IOSR Journal of Business and Management (IOSR-JBM).e-ISSN: 2278-487X, p-ISSN: 2319-7668. Volume 18, Issue 11. Ver. III, PP 43-49.

Alao, D. O., Atere, C. O., &Alao, O. (2012). Boko-Haram Insurgence in Nigeria: The Challenges and Lessons. Oman Journal of Business and Management Review, 2(2). https://doi.org/10.12816/0002250

Alao, D. O., Osah, G. and Adam, E. M. (2019).Unabated Cyber Terrorism and Human Security in Nigeria. Asian Social Science; Vol. 15, No. 11; ISSN 1911-2017 E-ISSN 1911-2025

Ali, A., Anjariny, A. H., Habib, S. A., and Nyakwende, E. (2018). Cyber terrorism taxonomies: Definition, targets, patterns, risk factors, and mitigation strategies." In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, pp. 608-621. IGI Global.

Allison, M., Speckhard, A. and Yayla, A. S. (2017).Beating ISIS in the digital space: Focus testing ISIS defector counter-narrative videos with American college students. Journal for Deradicalization 10: 50-76.

Baken, D. (2013). Cyber warfare and Nigeria’s vulnerability’."E-International Relations 3.

Benson, D. C. (2014). Why the internet is not increasing terrorism. Security Studies. Volume 23, Issue 2.

Berger, J. M. (2015). The evolution of terrorist propaganda: The Paris attack and social media. The Brookings Institution.

Bretherton, C. and Ponton, G. (1996). Global Politics: An Introduction. Oxford: Black well.

Center for Strategic and International Studies (CSIS). (1998). Cybercrime, Cyberterrorism, Cyberwarfare: Averting an Electronic Waterloo (Washington DC: CSIS Press).

Chiroma, H., Abdulhamid, S.M., Ya’aGital, A., Usman, A.M and Maigari, T.U (2011) “Academic Community Cyber Cafes: A Perpetration Point for Cyber Crimes in Nigeria”. International Journal of Information Sciences and Computer Engineering, Vol. 2, No.2 pp. 7-13.

Christen, H. T., Denney, J, P., &Maniscalco, P. M. (2002). Weapons of Mass Effect: Cyber-Terrorism, in Paul M. Maniscalco& Hank T. Christen (Ed.s), Understanding Terrorism and Managing the Consequences, New Jersey: Prentice Hall, 194.

Cohen, Lawrence E., and Marcus Felson. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. In Classics in Environmental Criminology, pp. 203-232.CRC Press, 2016.http://www.personal.psu.edu/users/e/x/exs44/597b-Comm%26Crime/Cohen_FelsonRoutine-Activities.pdf

Collin, B. (1997). Future of Cyberterrorism: Physical and Virtual Worlds Converge. Crime and Justice International, 13(2): 15-18.

Conway, M. (2007). Cyberterrorism: Hype and Reality. Available at: http://doras.dcu.ie/501/1/cybert_hype_reality_2007.pdf

Cronin, A. K. (2003). Behind the curve.Globalization and international terrorism.International Security.Vol. 27, No. 3 2003.

Daniel, A. and Benjamin Maiangwa, B. (2014). Why Boko Haram kidnaps women and young girls in north-eastern Nigeria." conflict trends 2014, no. 3: 51-56.

David, B. C. (2014). Why the internet is not increasing terrorism. Security Studies 23, No. 2: 293-328.

Davis, E.L. (2003). Globalization Security Implications.RAND Issues Paper.

Deibert, R. (2003). Black Code: Censorship, Surveillance, and the Militarization of Cyberspace. New York: Social Science Research Council. Available at: http://www.ssrc.org/programs/itic/publications/ITST_materials/blackcode.pdf

Denning, D. (2000). Is Cyber Terror Next? Denning’s testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives. Available at: http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html. Denning first put forward this definition in her 1999 paper “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,” which is available online at: http://www.rand.org/publications/MR/MR1382/MR1382.ch8.pdf.

Denning, D. (2001). Cyberwarriors: Activists and Terrorists Turn to Cyberspace. Harvard International Review 23:2. Available at: http://www.hir.harvard.edu/articles/index.html?id=905

Denning, D. (2000). Denning’s testimony before the Special Oversight Panel on Terrorism.

Devost, Houghton, & Pollard. (1997). Information Terrorism: Political Violence in the Information Age, 75.

Economist. (2001). See Seeing the World Anew, Oct. 27, at 19.

Fafowora O.O. (1998). Management in Nigerian.Journal of Nigerian Institute of Management Vol.34 2-4, pp-5-9.

Fayomi, O., Ndubisi, O. N., Ayo, C., Chidozie, F., Ajayi, L., and Okorie, U.(2011).Cyber-Attack as a Menace to Effective Governance in Nigeria.

Foreign Broadcast Information Service (FBIS) (2002). Government Sets Up Anti-Cyberterrorism Homepage. Sankei Shimbun (FBIS-EAS-2002-0410).

Gantz, J. (2013). One in Three PCs Risks Cyber-Attack in 2013, Punch Newspapers, Lagos, March 7, p. 14.

Gordon, S. and Ford, R. (2002).Cyberterrorism?636-637 & 641.

Guardian (2004). Suspect Links e-mail Address to Al Qaeda. August 5, p.1

Global Digital Overview. (2019). Available at: https://datareportal.com/reports/digital-2019-global-digital-overview.

Harmon, A. (1998). Hacktivists’ of All Persuasions Take Their Struggle to the Web. Available at: https://www.nytimes.com/1998/10/31/world/hacktivists-of-all-persuasions-take-their-struggle-to-the-web.html.

Hathaway, O.A., Crootof, R., Perdue, W and Levitz, P (2012).The Law of Cyber-attack”.California Law Review.Vol.100, Issue 4. Pp. 817-886.

Hoffman, B. (2016). The Global Terror Threat and Counterterrorism Challenges Facing the Next Administration."CTC Sentinel 9, no. 11 (2016): 1-8.

Hubler, D. (2017). IN Homeland Security. IAFIE conference concludes with calls for more intelligence education programs. Available at: http://inhomelandsecurity.com/iafieconference-concludes-calls-intelligence-education-programs/

Hübschle, A. (2005). The T-word: Conceptualising Terrorism. African Security Review 15.3 Institute of Security Studies.

Jean, L.A. (2012) The Mind of the Religious External, global.

Kaplan, E. (2009). Terrorists and the Internet.Council on foreign Relations 8.

Karacasulu, N. (2006). Security and Globalization in the Context of International Terrorism.”UluslararasiHukukvePolitikaCilt 2, No:5. ss. 1-17. p. 3.

Karon, T. (2003). Why African has Become a Bush Priority. Time Magazine.

Kim, S.H., Hong W. Q. and Ullrich, J. B.(2012). A Comparative Study of Cyber-attacks”. Communications of the ACM, Vol.55, No.3. pp. 66-73.

Liang, C. S. (2015). Cyber Jihad: Understanding and Countering Islamic State

Martin, S. and Leonard B. (2016).Terrorism in an era of unconventional warfare." Terrorism and political violence 28, no. 2: 236-253.

Mates, (2001).Technology and Terrorism. NATO Parliamentary Assembly. Sub-committee on the proliferation of Military Technology.

Minei, E and Jonathan, M. (2012). Cyberspace as a new arena for terroristic propaganda: an updated examination." Poiesis& Praxis 9, no. 1-2: 163-176, https://link.springer.com/article/10.1007/s10202-012-0108-3.

Nagpal, R. (2002). Cyber Terrorism in the Context of Globalization.II World Congress on Informatics and Law Madrid, Spain. Available at: www.narrative/Cyber_Jihad_-_Understanding_and_Countering_Islamic_State_Propaganda.pdf.

National Communications System. (yyy). The Electronic Intrusion Threat to National Security and Emergency Preparedness (NS/EP) Internet Communications, 36-39.

National Research Council. (1991). Computers at Risk: Safe Computing in the Information Age. Washington DC: National Academy Press. Available at: http://www.nap.edu/books/0309043883/html/index.html

Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., and Gagnon, G. (1991).Cyberterror: Prospects and Implications. Defense Intelligence Agency Office for Counterterrorism Analysis (TWC-1).Center for the Study of Terrorism and Irregular Warfare Monterey, CA

Njoku, E. T. (2011). Globalization and Terrorism in Nigeria. Available at: http://www.foreignpolicyjournal.com/2011/08/13/globalization-and-terrorism-in-nigeria/view-all/

Nwaogu, P. (2005). Africa and The Global Neighborhood. African Journal of International Affairs and Development, Vol. 10 1x2 1-2

Ogbonnaya, U. (2013) Globalization, Religious Extremism And Security Challenges In The Twenty First Century. Journal Of Sustainable Society Vol. 2, No. 2 59-65

Ogbonnaya, U.M.andEhigiamusoe, U.K. (2013). Niger Delta Militancy and Boko Haram Insurgency: National Security in Nigeria. Global Security Studies, Vol. 4. 3, 1-14

Ogu, M. I., Iyanda, R. O., and Ogu, E. C. (2015).Interrogating the Nexus between Globalization and Terrorism in Nigeria.Studies in Social Sciences and Humanities. Vol. 3, No. 2, 71-86.

Ogunlana, S. O. (2019). Halting Boko Haram / Islamic State's West Africa Province Propaganda in Cyberspace with Cybersecurity Technologies.Journal of Strategic Security. Volume 12, Number 1 Article 4.

Olowojolu, O. and Ake, M. (2015).Globalisation, Transnational Crime and Terrorism in Nigeria. Journal of Arts and Contemporary Society ISSN: 2277-0046 Volume 7, Number 2.

Olusola, M., Samson, O., Semiu, A and Yinka, A (2013).Impact of Cyber Crimes on Nigerian Economy.The International Journal of Engineering and Science (IJES). Vol. 12, Issue 4. Pp. 45-51.

Oluwafemi, O and Onoja, A. D. (2015). National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis." International Journal of Cyber Criminology 9, no. 1.

Onimisi, T. (2014). Globalisation and The Nigerian National Security: An Overview. Journal of Good Governance and Sustainable Development in Africa (JGGSDA), Vol. 2, No 2: 80-85, Available at: www.rcmss.com. ISSN: 2354-158X (Online) ISSN: 2346-724X (Print).

Orngu, C. S. (2014). Globalization, Imperialism and the dialectics of Economic diplomacy in Africa.Makurdi: Gwatex Publishers.

Osah, G.(2017). ‘Globalization and Terrorism: Generalizing from the Nigerian Experience’. The International Journal of Humanities and Social Studies. Vol. 5 (7): 104-112

Pagliery, J., Crawford, J. and Ashley. (2015). CENTCOM Twitter account hacked, suspended," CNN, January 12, 2015, http://www.cnn.com/2015/01/12/politics/centcomtwitter-hacked-suspended/index.html

Podhorec, M. (2012). Cyber Security Within the Globalization Process. Available at: http://journal.dresmara.ro/issues/volume3_issue1/02_podhorec.pdf

Pollitt, M. M. (1998). Cyberterrorism: Fact or Fancy? Computer Fraud and Security: 8-10.

Propaganda." GSCP Policy Paper 2: 4. Available at: ttps://www.jugendundmedien.ch/fileadmin/user_upload/3_Medienkompetenz/Gegen

Roberts, M. J. (2019). The Cyber Threat and Globalization: The Impact on U.S. National and International Security. By Jack A. Jarmon and PanoYannakogeorgos. Lanham, MD: Rowman & Littlefield, 2018." Journal of Strategic Security 11, no. 4: 85-88. DOI: https://doi.org/10.5038/1944-0472.11.4.1716 Available at: https://scholarcommons.usf.edu/jss/vol11/iss4/5

Rourke, J. T. (2005). Taking sides.Clashing View on Controversial Issues in World Politics 11th edition.

Schultz, R. Wi. (2015). Countering Extremist Groups in Cyberspace." Joint Forces Quarterly 79, no. 4.http://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-79/jfq-79_54-56_Schultz.pdf

Schwartz, J. (2002). When Point and Shoot Becomes Point and Click. The New York Times.

Shackelford, S.J (2013). Toward Cyberpeace: Managing Cyber-attacks through Polycentric Governance. American University Law Review.62 (5),1273-1364.

Hoo, S. K., Goodman, S. & Greenberg, L. (1997).Information Technology and the Terrorist Threat. 143.Survival Global Politics and Strategy. Volume 39, Issue 3

Stuart, A. A., Jarvis, M. L., and Chen, T. M. (2017). Introduction to the special issue: Terrorist online propaganda and radicalization. Studies in Conflict & Terrorism, 40(1), 1–9. doi:10.1080/1057610X.2016.1157402: 1-9.

Taylor, P. A. (1999). Hackers: Crime in the Digital Sublime. London: Routledge, 44-50.

Tomlinson, J. (1999). Globalization and culture.Cambrige: Polity Press. 1999

Tony, S. and Jan W. (2003) Understanding Globalization www.amazon.comunderstanding. Available at: www.globalizationtony-schirato/dp/0761947949.

Urbas, G., & Choo, K. R. (2008).Resource materials on technology-enabled crime.Australian Institute of Criminology, No. 28.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Alfred A. Udosen, Goodnews Osah

 

 

 

 

 

 

 

 

 

ISSN (PRINT):    2682 - 6135

ISSN (ONLINE): 2682 - 6127

 

 

   

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.