CHAPTER ONE
INTRODUCTION
Cybersecurity, in particular, poses a persistent challenge, endangering humanity and infrastructure across nation-states. Countries are working hard to secure their cyberspace from cyberattacks and cybercrime in the face of dangers and vulnerabilities that might result in billions of dollars in property losses, currency theft, and the failure of important national institutions (Fischer, 2009). Cybercrime is on the rise worldwide (Buchanan, 2016), causing billions of dollars in losses to individuals, businesses, organizations, and governments (Antonucci, 2017).
Nigeria is a growing country facing national security risks on multiple fronts, including classic military threats as well as non-traditional difficulties such as famine, diseases, erosion, maritime piracy, drought, flood, terrorism, and an increase in cybercrime both within and without its boundaries.Recognizing this latter concern prompted the Nigerian government to establish a cybersecurity policy paper in 2015, a detailed policy statement summarizing the provisions and efforts of the administration aimed at achieving an even more secure digital environment. Many researchers (Schjolberg&Ghernaouti-Helie 2011; Singer & Friedman 2014; Mazurczyk, Drobniak, & Moore 2016; Maurer 2018) have pointed out that internet and cyberspace are global and pose multiple vulnerabilities to all nation states, and in fact, studies on Nigeria (Frank &Odunayo 2013; Olayemi 2014; Omodunbi et al. 2016; Ajiji 2017; Chukwuma &Mogom, 2018; and Mohammed et al., 2019), though scanty on the subject matter, suggest that Nigeria is as vulnerable as other countries in the world to these threats.
The Nigerian example, on the other hand, is extremely interesting in terms of cybersecurity and cybercrime research due to its distinctive combination of circumstances. The country is the most populated state in Africa, and thus the largest Black nation on the planet.It is the world's tenth-largest oil producer and the seventh most populous country. The explosion of internet access in Nigeria should be a top priority for both policymakers and major stakeholders in the area of cybersecurity, as vulnerability in the Nigerian setting is always a possibility.However, comprehensive examination of Nigerian cybersecurity challenges is woefully limited, which is what this paper aims to fill. In addition to offering an overview of the issue, we make policy recommendations to the Nigerian government on how to improve the country's existing cybersecurity infrastructure.
Cellular networks are high-speed, high-capacity information transmission networks that support mobile cellular devices through increased multimedia and seamless roaming (Liu et al., 2014). The globe has witnessed the rapid expansion of cellular networks, which have changed and continue to change the mannerism of interaction and communication (Sobeihi, 2017; Swamy, 2020). This evolution is often prescribed by standards and communicated through generational advancements. This generational journey began with 1G, then 2G, 3G, 4G, and now 5G, with each new technology improving on the features and performance of its predecessors and permitting the realization of elements with which the previous one(s) struggled (Prasad, 2014). 5G expands applicability to include human-centric and machine-centric communications, and it is expected to move cellular networks from consumer-centric to enterprise-centric, ushering in the wireless connectivity as a utility" paradigm shift (Alexiou, 2017).
"Nigeria is Africa's most populous country, with a very high population momentum and an annual growth rate of 3.2 percent." This momentum, if properly exploited, has the potential to be a panacea for development and economic progress" (Akinyemi &Isiugo-Abanihe, 2014, p. 239) "The development of GSM into the Nigerian market has resulted in a positive disruption in the national paradigm, altering how people, government, and society communicate and conduct business"(Nkordeh, et al., 2017).Nigeria, a country of over 200 million people, has seen a revolution and boom in telecommunications as a result of privatization, diversification, and regulatory reformation, which allows for greater investment and innovation in wireless technology (Alemu, 2018). As a result, cellular networks have successfully evolved into the primary means for people in the country to access digital material and services, as well as communicate digitally with one another (Alemu, 2018). The country's diverse players have been rapidly adopting digital services, which has had a significant impact on the economy and people's daily life(NCC, 2021).
According to GSMA (2018), the Nigerian mobile ecosystem contributes more than 10% of GDP, is worth more than $20 billion, employs over 500,000 people, and earns over $2 billion in tax revenue, accounting for approximately 16% of government tax revenue. With over 100 million unique customers and over 150 million connections, Nigeria has a mobile penetration rate of slightly over 50%. Based on the backdrop, the present study seeks to examine the cybersecurity threats analysis of 5G mobile network with specific reference to Nigeria.
1.2 Statement of the Problem
In an environment characterized by the tangible division of the buyer from the seller, the virtual separation of the buyer from the item being purchased, and the risk of cybercrime, companies must find ways to initiate and develop cyber relationships with customers in sustainable ways, the best of which is establishing a trusted digital space(Shalhoub& Al Qasimi, 2010). The significance of this argument is highlighted by the fact that almost all countries in the world are currently turning digital in virtually all aspects of national importance, such as e-governance, e-commerce, e-voting, e-transaction, e-learning, and other essential facets of human activity in society. With the advent of the 5G mobile network, which is predicted to be faster and more dependable than existing mobile networks, cybercrime is expected to expand and perform more efficiently. Based on this assertion, the present study seeks to investigate the cybersecurity threats analysis of 5G mobile network with specific reference to Nigeria.
1.3 Objectives of the Study
The main objective of this study is to examine the cybersecurity threats analysis of 5G mobile network with specific reference to Nigeria. Other specific objectives of the study include;
1.4 Research Questions
The following questions were formed to give direction in this study;
1.5 Research Hypotheses
The following were hypothesized in this study;
Hypothesis 1
H0: The introduction of 5G mobile network does not significantly increases cybersecurity threats in Nigeria
H1: The introduction of 5G mobile network significantly increases cybersecurity threats in Nigeria
Hypothesis 2
H0: There is no significant relationship between the introduction of 5G mobile network and cybersecurity threats
H1: There is a significant relationship between the introduction of 5G mobile network and cybersecurity threats
1.6 Significance of the Study
The significance of this study is to examine cybersecurity threats analysis of 5G mobile network in Nigeria.
Findings of this study will help the general populace to know the how the introduction of 5G mobile network might enhance cybersecurity threats in Nigeria.
The findings of this study will enable policy makers to know the real vulnerabilities of this technology and its sub-disciplines are still undiscovered and aren’t documented fully.
The findings of this study will enable the entrepreneurs and financial institution to know the benefits of 5G mobile network introduction and how it can also promote cybercrimes within their organizations.
The findings of this study will fill the dearth in literature especially on the cybersecurity threats analysis of 5G mobile network in Nigeria as serve as a reference material for students and researchers who may be interested in similar topic.
1.7 Scope of the Study
This study is limited to cybersecurity threats analysis of 5G mobile network in Nigeria. Participants in this study will be comprised of residents in Ogun state and this were chosen because of their vast knowledge about mobile network.
1.8 Operational Definition of Terms
Cybersecurity: Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks.
Threat:A threat is a statement of an intention to inflict pain, injury, damage, or other hostile action on someone in retribution for something done or not done.
5G Mobile Network: 5G is the next generation of mobile data connectivity and its reach is expanding significantly. It is also the next generation wireless network technology that’s expected to change the way people live and work.
1.9 Organization of the Study
There are five chapters in this work. The background of the topic was covered in Chapter 1's introduction before moving on to the problems and goals. These are followed by the chapter organization, justification for the study, and hypotheses. The associated literature for conceptual, theoretical, and empirical literature is presented in Chapter 2. The research methodology, which included data sources, model specifications, and data analysis techniques, was covered in Chapter 3; results and discussion were covered in Chapter 4. The overview, findings, and suggestions from the study are included in chapter five. References are made after them.
Can't find what you are looking for?
Call (+234) 07030248044.
OTHER SIMILAR INFORMATION AND MEDIA STUDIES PROJECTS AND MATERIALS