{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:08:00Z","timestamp":1763507280671,"version":"3.45.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030902377"},{"type":"electronic","value":"9783030902384"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90238-4_18","type":"book-chapter","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T07:11:14Z","timestamp":1637305874000},"page":"249-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Bibliometric Analysis on Cybercrime in Nigeria"],"prefix":"10.1007","author":[{"given":"Monica Okwuchkwu","family":"Enebechi","sequence":"first","affiliation":[]},{"given":"Chidubem Nuela","family":"Enebechi","sequence":"additional","affiliation":[]},{"given":"Vincent G.","family":"Duffy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,20]]},"reference":[{"key":"18_CR1","unstructured":"Aina, L.O.: Research in Information Sciences: An African Perspective, pp. 1\u201331. Stirling-Horden, Ibadan (2002)"},{"key":"18_CR2","unstructured":"Atili, A.: Want! Law for tackling cybercrime. The Nations Newspaper, p. 41 (2011)"},{"key":"18_CR3","unstructured":"bibExcel. https:\/\/homepage.univie.ac.at\/juan.gorraiz\/bibexcel\/"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1093\/acprof:oso\/9780195333480.001.0001","volume-title":"Law in an Era of Smart Technology","author":"S Brenner","year":"2007","unstructured":"Brenner, S.: Law in an Era of Smart Technology, p. 374. Oxford University Press, Oxford (2007)"},{"key":"18_CR5","unstructured":"CiteSpace. http:\/\/cluster.cis.drexel.edu\/~cchen\/citespace\/"},{"key":"18_CR6","unstructured":"Dasuki, E.A.: Why EFCC is losing war on web scam. Vanguard Newspaper, p. 34 (2011)"},{"issue":"2","key":"18_CR7","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1080\/19361610.2015.1004511","volume":"10","author":"J Doyon-Martin","year":"2015","unstructured":"Doyon-Martin, J.: Cybercrime in West Africa as a result of transboundary e-waste. J. Appl. Secur. Res. 10(2), 207\u2013220 (2015). https:\/\/doi.org\/10.1080\/19361610.2015.1004511","journal-title":"J. Appl. Secur. Res."},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-030-49907-5_17","volume-title":"Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. Human Communication, Organization and Work","author":"B Duffy","year":"2020","unstructured":"Duffy, B., Duffy, V.: Data mining methodology in support of a systematic review of human aspects of cybersecurity. In: Duffy, V.G. (ed.) HCII 2020. LNCS, vol. 12199, pp. 242\u2013253. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49907-5_17"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Fahimnia, B., Sarkis, J., Davarzani, H.: Green supply chain management: a review and bibliometric analysis. Int. J. Prod. Econ. 162(C), 101\u2013114 (2015). https:\/\/doi.org\/10.1016\/j.ijpe.2015.01.003","DOI":"10.1016\/j.ijpe.2015.01.003"},{"key":"18_CR10","unstructured":"Fanawopo, S.: FG moves to enforce cyber crime laws (2004)"},{"key":"18_CR11","unstructured":"Forbes. https:\/\/www.forbes.com\/?sh=179fbb342254"},{"issue":"2","key":"18_CR12","first-page":"141","volume":"2","author":"M Gercke","year":"2006","unstructured":"Gercke, M.: The slow wake of a global approach against cybercrime. Comput. Law Rev. Int. 2(2), 141 (2006)","journal-title":"Comput. Law Rev. Int."},{"key":"18_CR13","unstructured":"Geeks for Geeks. https:\/\/www.geeksforgeeks.org\/"},{"issue":"5","key":"18_CR14","first-page":"716","volume":"26","author":"SE Greenwald","year":"2014","unstructured":"Greenwald, S.E.: Combating cybercrime in Nigeria. Electron. Libr. 26(5), 716\u2013725 (2014)","journal-title":"Electron. Libr."},{"key":"18_CR15","unstructured":"Harzing. https:\/\/harzing.com\/resources\/publish-or-perish"},{"key":"18_CR16","unstructured":"Howell, H., Lind, U.: Customs arrest suspected hacker. The Vanguard Newspaper, p. 53 (2009)"},{"issue":"2","key":"18_CR17","first-page":"38","volume":"8","author":"MO Ifukor","year":"2006","unstructured":"Ifukor, M.O.: Cybercrime: a challenge to information and communication technology (ICT). Commun. J. Libr. Inf. Sci. 8(2), 38\u201349 (2006)","journal-title":"Commun. J. Libr. Inf. Sci."},{"key":"18_CR18","unstructured":"Investopedia. https:\/\/www.investopedia.com\/"},{"key":"18_CR19","unstructured":"Kifordu, A., Nwankwo, W., Ukpere, W.: The role of public-private partnership on the implementation of national cybersecurity policies: a case of Nigeria. J. Adv. Res. Dyn. Control Syst. 11(8 Special), 1386\u20131392 (2019)"},{"key":"18_CR20","unstructured":"Kshetri, R.: Africa: a new safe harbor for cybercriminals trend micro incorporated research paper (2010). www.trendmicro.co.uk\/media\/misc\/africa-new-safe-harbor-for-cybercriminals-en.pdf"},{"issue":"2\u20133","key":"18_CR21","first-page":"159","volume":"8","author":"N Laver","year":"2005","unstructured":"Laver, N.: Somalia: media law in the absence of a state. Int. J. Media Cult. Polit. 8(2\u20133), 159\u2013174 (2005)","journal-title":"Int. J. Media Cult. Polit."},{"key":"18_CR22","unstructured":"Lawrence, D.: Strategy. Oxford University Press (2013). ISBN 978-0-19-932515-3"},{"issue":"1","key":"18_CR23","first-page":"300","volume":"30","author":"B Loader","year":"2000","unstructured":"Loader, B.: Cybercrime: law enforcement, security and surveillance in the information age. J. Soc. Policy 30(1), 300 (2000)","journal-title":"J. Soc. Policy"},{"issue":"4","key":"18_CR24","first-page":"4551","volume":"2","author":"OS Maitanmi","year":"2013","unstructured":"Maitanmi, O.S.: Impact of cyber crimes on Nigerian economy. Int. J. Eng. Sci. (IJES) 2(4), 4551 (2013)","journal-title":"Int. J. Eng. Sci. (IJES)"},{"key":"18_CR25","unstructured":"MaxQDA2020. https:\/\/www.maxqda.com\/qualitative-analysissoftware?gclid=EAIaIQobChMIr5LLsPiw5gIVGKrsCh2IBglDEAAYASAAEgLy9fD_BwE"},{"key":"18_CR26","unstructured":"Mendeley. https:\/\/www.mendeley.com\/?interaction_required=true"},{"key":"18_CR27","unstructured":"Moore, H.: Examining factors that influence a Youth\u2019s potential to become a victim of online harassment. Int. J. Cyber Criminol. 4(1 and 2), 685\u2013698 (2005). http:\/\/www.cybercrimejournal.com\/mooreetal2010ijcc"},{"key":"18_CR28","unstructured":"NSF. https:\/\/nsf.gov\/"},{"issue":"10","key":"18_CR29","first-page":"47","volume":"8","author":"W Nwankwo","year":"2019","unstructured":"Nwankwo, W., Ukaoha, K.C.: Socio-technical perspectives on cybersecurity: Nigeria\u2019s cybercrime legislation in review. Int. J. Sci. Technol. Res. 8(10), 47\u201358 (2019)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"18_CR30","unstructured":"Odunfa, A.: Nigeria: report on cyber threat calls for quick passage of bill (2014). http:\/\/www.allafrica.com\/stories\/201405080279.Html"},{"issue":"9","key":"18_CR31","first-page":"98","volume":"3","author":"FB Okeshola","year":"2013","unstructured":"Okeshola, F.B.: The nature, causes and consequences of cyber crime in tertiary institutions in Zaria-Kaduna State, Nigeria. Am. Int. J. Contemp. Res. 3(9), 98\u2013114 (2013)","journal-title":"Am. Int. J. Contemp. Res."},{"key":"18_CR32","unstructured":"Okon, P., Kayode-Adedeji, T., Afolayan, T.-A., Iruonagbe, C.: Cybersecurity awareness among rural communities in Sango Ota, Ogun State, Nigeria. In: 14th International Conference on Cyber Warfare and Security, ICCWS 2019, pp. 294\u2013303 (2019)"},{"key":"18_CR33","unstructured":"Onwuka, E.N., Afolayan, D.O., Abubakar, W., Ibrahim, J.I.: Survey of on-line risks faced by internet users in the Nigerian telecommunication space. In: CEUR Workshop Proceedings, vol. 1830, pp. 28\u201333 (2016)"},{"key":"18_CR34","unstructured":"Roger, L.B.: Second Edition Safety and Health (2006)"},{"key":"18_CR35","unstructured":"Scopus. https:\/\/www.scopus.com\/search\/form.uri?display=basic&zone=header&origin=#basic"},{"issue":"4","key":"18_CR36","first-page":"112","volume":"1","author":"M Steffani","year":"2006","unstructured":"Steffani, M.: Cyber security analysis of Turkey. Int. J. Inf. Secur. Sci. 1(4), 112\u2013125 (2006)","journal-title":"Int. J. Inf. Secur. Sci."},{"key":"18_CR37","first-page":"123","volume":"7","author":"G Stremlau","year":"2015","unstructured":"Stremlau, G., Osman, W.: The privacy privilege: law enforcement, technology and the constitution. J. Technol. Law Policy 7, 123 (2015)","journal-title":"J. Technol. Law Policy"},{"key":"18_CR38","doi-asserted-by":"publisher","unstructured":"Veresha, R.V.: Preventive measures against computer related crimes: approaching an individual. Informatologia 51(3\u20134), 189\u2013199 (2018). https:\/\/doi.org\/10.32914\/i.51.3-4.7","DOI":"10.32914\/i.51.3-4.7"},{"key":"18_CR39","unstructured":"Vincintas. https:\/\/www.vicinitas.io\/"},{"key":"18_CR40","unstructured":"VOSviewer. https:\/\/www.vosviewer.com\/"},{"key":"18_CR41","unstructured":"Wada, T., Longe D.A., Paul, S., Danquah, O.R.: Action speaks louder than words \u2013 understanding cyber criminal behavior using criminological theories. J. Internet Bank. Commer. 17(1), 1 (2012)"},{"key":"18_CR42","unstructured":"Waziri, F.: Antigraft campaign: the war, the worries. The Punch, 1st March 2009, p. 1 (2009)"},{"key":"18_CR43","volume-title":"Principles of Cybercrime","author":"C Weaver","year":"1998","unstructured":"Weaver, C.: Principles of Cybercrime, 2nd edn. Cambridge University Press, Cambridge (1998)","edition":"2"},{"key":"18_CR44","unstructured":"Web of Science. http:\/\/login.webofknowledge.com"}],"container-title":["Lecture Notes in Computer Science","HCI International 2021 - Late Breaking Papers: Design and User Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90238-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:04:00Z","timestamp":1763507040000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90238-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030902377","9783030902384"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90238-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}