{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T08:35:27Z","timestamp":1762677327718,"version":"build-2065373602"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00251-0","type":"journal-article","created":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T08:32:24Z","timestamp":1762677144000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Invisible intrusions, internal threats and ethical vulnerabilities in Nigeria\u2019s internet of things"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1799-7876","authenticated-orcid":false,"given":"Aminu Muhammad","family":"Auwal","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,9]]},"reference":[{"issue":"7","key":"251_CR1","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1080\/01639625.2022.2144779","volume":"44","author":"RA Aborisade","year":"2022","unstructured":"Aborisade RA. Yahoo Boys, Yahoo Parents? An explorative and qualitative study of parents\u2019 disposition towards children\u2019s involvement in cybercrimes. Deviant Behav. 2022;44(7):1102\u201320. https:\/\/doi.org\/10.1080\/01639625.2022.2144779.","journal-title":"Deviant Behav"},{"issue":"2","key":"251_CR2","doi-asserted-by":"publisher","first-page":"254","DOI":"10.51594\/csitrj.v5i2.756","volume":"5","author":"IA Ahmad","year":"2024","unstructured":"Ahmad IA, Anyanwu AC, Onwusinkwue S, Dawodu SO, Akagha OV, Ejairu E. cybersecurity challenges in smart cities: a case review of African metropolises. Comput Sci IT Res J. 2024;5(2):254\u201369.","journal-title":"Comput Sci IT Res J"},{"issue":"4","key":"251_CR3","doi-asserted-by":"publisher","first-page":"915","DOI":"10.2120\/jdtl.2024.44","volume":"2","author":"AM Auwal","year":"2024","unstructured":"Auwal AM, Lazarus S. Sociological and criminological research of victimization issues: Preliminary stage and new sphere of cybercrime categorization. J Digit Tech Law. 2024;2(4):915\u201342. https:\/\/doi.org\/10.2120\/jdtl.2024.44.","journal-title":"J Digit Tech Law"},{"key":"251_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.113526","author":"D AzharShokoufeh","year":"2025","unstructured":"AzharShokoufeh D, DerakhshanFard N, RashidJafari F, Ghaffari A. Optimizing IoT data collection through federated learning and periodic scheduling. Knowl-Based Syst. 2025. https:\/\/doi.org\/10.1016\/j.knosys.2025.113526.","journal-title":"Knowl-Based Syst"},{"key":"251_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2025.101134","author":"SP Fatemi","year":"2025","unstructured":"Fatemi SP, Derakhshanfard N, Rashidjafari F, Ghaffari A. Distributed data storage using decision tree models and support vector machines in the internet of things. Sustain Comput Inform Syst. 2025. https:\/\/doi.org\/10.1016\/j.suscom.2025.101134.","journal-title":"Sustain Comput Inform Syst"},{"key":"251_CR6","doi-asserted-by":"publisher","DOI":"10.3260\/cmc.2025.063304","author":"M Gholami","year":"2025","unstructured":"Gholami M, Ghaffari A, Derakhshanfard N, Brahimo\u011flu N, Kazem AP. Blockchain integration in IoT: applications, opportunities, and challenges. Comput, Mater Continua. 2025. https:\/\/doi.org\/10.3260\/cmc.2025.063304.","journal-title":"Comput, Mater Continua"},{"issue":"1","key":"251_CR7","doi-asserted-by":"publisher","first-page":"41","DOI":"10.51594\/csitrj.v5i1.701","volume":"5","author":"AO Hassan","year":"2024","unstructured":"Hassan AO, Ewuga SK, Abdul AA, Abrahams TO, Oladeinde M, Dawodu SO. Cybersecurity in banking: a global perspective with a focus on Nigerian practices. Comput Sci IT Res J. 2024;5(1):41\u201359.","journal-title":"Comput Sci IT Res J"},{"key":"251_CR8","doi-asserted-by":"publisher","first-page":"22","DOI":"10.5552\/ijitc.44.22.35","volume":"44","author":"IJ Ibanga","year":"2024","unstructured":"Ibanga IJ, Fwah KG, Idowu AJ. Assessing the vulnerabilities: cybersecurity challenges in power system infrastructure in Nigeria. Int J Inform Tech Comput Eng. 2024;44:22\u201335. https:\/\/doi.org\/10.5552\/ijitc.44.22.35.","journal-title":"Int J Inform Tech Comput Eng"},{"key":"251_CR9","doi-asserted-by":"publisher","DOI":"10.1108\/ecam-05-2024-0600","author":"K Ibrahim","year":"2024","unstructured":"Ibrahim K, Amoah C, Simpeh F, William J. Adoption challenges of sensing technologies in construction project management in sub-Saharan African countries. Eng Constr Archit Manag. 2024. https:\/\/doi.org\/10.1108\/ecam-05-2024-0600.","journal-title":"Eng Constr Archit Manag"},{"key":"251_CR10","unstructured":"IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems. (2019). Ethically aligned design: A vision for prioritizing human well-being with autonomous and intelligent systems (Version 1). IEEE. https:\/\/ethicsinaction.ieee.org\/"},{"issue":"2","key":"251_CR11","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1080\/25741292.2023.2199960","volume":"6","author":"N Ifeanyi-Ajufo","year":"2023","unstructured":"Ifeanyi-Ajufo N. Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation. Policy Design and Practice. 2023;6(2):146\u201359. https:\/\/doi.org\/10.1080\/25741292.2023.2199960.","journal-title":"Policy Design and Practice"},{"key":"251_CR12","doi-asserted-by":"publisher","DOI":"10.1108\/jsbed-10-2023-0480","author":"D Joseph","year":"2025","unstructured":"Joseph D, Miri D, Mswaka W. Digital technology affordance and constraints in informal economies: a micro-entrepreneurial study. J Small Bus Enterp Dev. 2025. https:\/\/doi.org\/10.1108\/jsbed-10-2023-0480.","journal-title":"J Small Bus Enterp Dev"},{"key":"251_CR13","doi-asserted-by":"publisher","unstructured":"Kunle, O. J., Olubunmi, O. A., & Sani, S. (2017). Internet of things prospect in Nigeria: Challenges and solutions. 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON), 58, 736\u2013745. https:\/\/doi.org\/10.1109\/nigercon.2017.8281942","DOI":"10.1109\/nigercon.2017.8281942"},{"issue":"11","key":"251_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2022.e11142","volume":"8","author":"S Lazarus","year":"2022","unstructured":"Lazarus S, Button M, Adogame A. Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (\u201cYahoo Boys\u201d) and politicians (\u201cYahoo men\u201d). Heliyon. 2022;8(11):e11142. https:\/\/doi.org\/10.1016\/j.heliyon.2022.e11142.","journal-title":"Heliyon"},{"key":"251_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/978-1-7998-8693-8.ch001","volume-title":"Advances in information security, privacy, and ethics book series","author":"V Lebogang","year":"2022","unstructured":"Lebogang V, Tabona O, Maupong T. Evaluating cybersecurity strategies in Africa. In: Zhu Q, Zhuo Lu, Yu PL, Wang C, editors. Advances in information security, privacy, and ethics book series. Hershey: IGI Global Scientific Publishing; 2022. p. 1\u201319. https:\/\/doi.org\/10.4018\/978-1-7998-8693-8.ch001."},{"key":"251_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/nigercon62786.2024.10927109","author":"TS Ogedengbe","year":"2024","unstructured":"Ogedengbe TS, Afolalu SA, Adeyi TA, Olawale OC, Balogun OA, Adeleke AA, et al. Leveraging Iot for sustainable development in Sub-Saharan Africa: opportunities and barriers. IEEE. 2024. https:\/\/doi.org\/10.1109\/nigercon62786.2024.10927109.","journal-title":"IEEE"},{"issue":"2","key":"251_CR17","doi-asserted-by":"publisher","first-page":"336","DOI":"10.5159\/csitrj.v5i2.761","volume":"5","author":"NO Reis","year":"2024","unstructured":"Reis NO, Oliha NJS, Osasona NF, Obi NOC. Cybersecurity dynamics in Nigerian banking: trends and strategies review. Comput Sci IT Res J. 2024;5(2):336\u201364. https:\/\/doi.org\/10.5159\/csitrj.v5i2.761.","journal-title":"Comput Sci IT Res J"},{"issue":"1","key":"251_CR18","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1108\/tg-08-2022-0115","volume":"17","author":"T Shenkoya","year":"2022","unstructured":"Shenkoya T. Can digital transformation improve transparency and accountability of public governance in Nigeria? Transform Gov People Process and Policy. 2022;17(1):54\u201371. https:\/\/doi.org\/10.1108\/tg-08-2022-0115.","journal-title":"Transform Gov People Process and Policy"},{"key":"251_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/zcict63770.2024.10958428","author":"D Tewera","year":"2024","unstructured":"Tewera D, Zhou M, Gavai PV. Enhancing IoT security for socio-economic development in the mirror of challenges, emerging technologies, and holistic solutions. IEEE. 2024. https:\/\/doi.org\/10.1109\/zcict63770.2024.10958428.","journal-title":"IEEE"},{"issue":"1","key":"251_CR20","doi-asserted-by":"publisher","first-page":"595","DOI":"10.3057\/wjarr.2022.16.1.1057","volume":"16","author":"NBD Urbanus","year":"2022","unstructured":"Urbanus NBD. Impact of cyberspace on the cybersecurity of critical national assets infrastructures in Nigeria: a review of education and financial sectors. World J Adv Res Rev. 2022;16(1):595\u2013604. https:\/\/doi.org\/10.3057\/wjarr.2022.16.1.1057.","journal-title":"World J Adv Res Rev"},{"issue":"2","key":"251_CR21","doi-asserted-by":"publisher","first-page":"935","DOI":"10.3057\/wjarr.2025.26.2.1687","volume":"26","author":"NC Yizhen","year":"2025","unstructured":"Yizhen NC. Cyber security in Nigeria: emerging issues, domestic governance and international cooperation. World J Adv Res Rev. 2025;26(2):935\u201342. https:\/\/doi.org\/10.3057\/wjarr.2025.26.2.1687.","journal-title":"World J Adv Res Rev"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00251-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00251-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00251-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T08:32:26Z","timestamp":1762677146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00251-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,9]]},"references-count":21,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["251"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00251-0","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,9]]},"assertion":[{"value":"16 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"This manuscript is original, has not been published previously, and is not currently under consideration for publication elsewhere.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Dual publication"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"128"}}