Please use this identifier to cite or link to this item: http://studentrepo.iium.edu.my/handle/123456789/1491
Full metadata record
DC FieldValueLanguage
dc.contributor.authorArowosaiye, Yusuf Ibrahimen_US
dc.date.accessioned2020-08-20T08:42:57Z-
dc.date.available2020-08-20T08:42:57Z-
dc.date.issued2009-
dc.identifier.urihttp://studentrepo.iium.edu.my/jspui/handle/123456789/1491-
dc.description.abstractThis study focuses on the response of the Nigerian criminal legislations to the contemporary phenomenon of economic and financial crimes and ICT as enabler. The study critically examines the adequacies or otherwise of the existing Nigerian criminal legislations, Shariah Penal Code inclusive, to meet the facets of challenges posed by the prevalence of economic and financial crimes and ICT infrastructures as facilitating tools. The continuous legislative and non-legislative measures undertaken by the past and present Nigerian government in response to the growing trend of this menace are highlighted in the study. Since technology has made national borders more permeable, economic and financial crimes are no longer a local phenomenon but a global problem. Thus, the study employed a methodological evaluation of the common themes and varying national and international perspectives that come into play in response to the phenomenon. This study reveals that the existing Nigerian criminal legislations are grossly inadequate to address the prevailing problem of ICT related economic crimes. The study also reveals that criminalizing economic and financial crimes through legislative means alone would not produce the expected effective response to the menace. This study therefore recommends for vigorous pursuit of both legislative and non-legislative measures to bring the phenomenon to a barest minimum. The study further recommends for necessary amendments to the affected Nigerian legislations which provisions are inadequate to effectively address the subject of economic and financial crimes. It also advocates for immediate passage of the pending Nigerian Cyber Crime Bill 2005 titled “Computer Security and Critical Information Infrastructure Protection Bill 2005”. The Bill if eventually passed into law will serves as Nigerian specific cyber crime law to address electronically perpetrated economic and financial crimes.en_US
dc.language.isoenen_US
dc.publisherKuala Lumpur : Ahmad Ibrahim Kulliyyah of Laws, International Islamic University Malaysia, 2009en_US
dc.rightsCopyright International Islamic University Malaysia
dc.subject.lcshCriminal law -- Nigeriaen_US
dc.subject.lcshCriminal law (Islamic law) -- Nigeriaen_US
dc.subject.lcshCommercial crimes -- Nigeriaen_US
dc.subject.lcshComputers -- Law and legislation -- Nigeriaen_US
dc.titleEconomic and financial crimes and ICT : an appraisal of the response of the Nigerian criminal lawen_US
dc.typeDoctoral Thesisen_US
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/oWzuRr1TV0L2uC5JQBHdfo7FRGq4M0Ij20110818151424468-
dc.description.identityt00011118195YusufIbrahimKTA3800A771E2009en_US
dc.description.identifierThesis : Economic and financial crimes and ICT : an appraisal of the response of the Nigerian criminal law / by Yusuf Ibrahim Arowosaiyeen_US
dc.description.kulliyahAhmad Ibrahim Kulliyyah of Lawsen_US
dc.description.programmeDoctor of Philosophy in Lawen_US
dc.description.degreelevelDoctoral
dc.description.callnumbert KTA 3800 A771E 2009en_US
dc.description.notesThesis (Ph.D.)--International Islamic University Malaysia, 2009en_US
dc.description.physicaldescriptionxxiii, 449 leaves ; 30 cmen_US
item.openairetypeDoctoral Thesis-
item.grantfulltextopen-
item.fulltextWith Fulltext-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
Appears in Collections:AIKOL Thesis
Files in This Item:
File Description SizeFormat 
t00011118195YusufIbrahimKTA3800A771E2009_SEC_24.pdf24 pages file456.65 kBAdobe PDFView/Open
t00011118195YusufIbrahimKTA3800A771E2009_SEC.pdf
  Restricted Access
Full text secured file2.82 MBAdobe PDFView/Open    Request a copy
Show simple item record

Page view(s)

14
checked on May 17, 2021

Download(s)

18
checked on May 17, 2021

Google ScholarTM

Check


Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.