Cybersecurity and Business Survival in Nigeria: Building Customer's Trust
DOI:
https://doi.org/10.26437/ajar.v11i1.882Keywords:
Business survival. customer trust. cybersecurity. data protection. NigeriaAbstract
Purpose: This paper investigates the role of cybersecurity in ensuring business survival and fostering customer trust in Nigeria.
Design/Methodology/Approach: A qualitative documentary review approach was employed, analysing legislations, policies, standards, and regulations related to cybersecurity from 2000 to 2024, especially those instruments that impact business survival in Nigeria and beyond. The study utilised thematic and comparative analysis to extract insights and identify gaps in the existing frameworks.
Findings: The research reveals that while existing legal instruments on cybersecurity provide a foundational framework for protecting businesses, legislative, enforcement, compliance, and awareness gaps persist across the socioeconomic sphere, hence the continued losses from cyber threats and attacks. Businesses with robust cybersecurity practices were reported to enjoy higher customer trust and operational sustainability levels. However, weak compliance and inadequate awareness hinder the full potential of these measures.
Research Limitation: The study is limited to a thematic review of existing documents, which may not fully capture real-time business practices and challenges.
Practical Implication: Strengthened cybersecurity measures promote trust in digital transactions, reduce the risk of cybercrime, and ensure the continuity of businesses, contributing to economic stability and improved consumer confidence in Nigeria's digital economy.
Social Implication: The findings provide actionable recommendations for policymakers to enhance the effectiveness of cybersecurity legislation and for business leaders to adopt best practices in securing their operations and building trust.
Originality/Value: It contributes to existing knowledge by linking robust cybersecurity practices with enhanced customer trust and operational sustainability.
References
Acheme, S. O., Nwankwo, W., Acheme, D., & Nwankwo, C. P. (2023). A crypto-stego distributed
data hiding model for data protection in a single cloud environment. In Z. Hu, Y. Wang, & M. He (Eds.), Advances in intelligent systems, computer science and digital economics IV. CSDEIS 2022. Lecture notes on data engineering and communications technologies (Vol. 158). Springer, Cham.
ACI Worldwide & GlobalData(2024). The Global Real-Time Payments Report.
Adaramola,Z.(2023). How Cyber-Attacks Exposed Nigeria’s IT Security Vulnerability In 2023.
https://dailytrust.com/how-cyber-attacks-exposed-nigerias-it-security-vulnerability-in-2023 /
Adebayo, F., & Salau, A. (2022). Emerging Cybersecurity Threats in Nigeria: A Legal Perspective.
Journal of Law and Technology in Africa, 7(1), 12-26.
Adekoya, A. A. (2020). Cybercrime legislation in Nigeria: Analysis of the Cybercrimes Act 2015.
Journal of Law and Criminal Justice, 8(1), 67-85.
Adeleke, A., Agwu, P., & Johnson, T. (2021). Cybersecurity Practices in Nigerian SMEs. Journal
of Cybersecurity Research, 18(3), 45-58.
Agbeboaye,C.(2024). Investigative Analysis of Cybercrime in Nigeria: Using Theft Triangle. J.
Electrical Systems, 20(4s0, 1275-1282
Agboola, A., & Olayemi, A. (2022). Cybersecurity Challenges in Nigerian Financial Institutions.
Journal of Digital Security, 15(4), 45-60.
Akintaro,S.(2024a). Cost of cybercrime to reach over $12 trillion globally by 2025 – Report.
Akintaro,S.(2023). ICT contributed 15.97% to Nigeria’s real GDP in Q3 2023.
https://nairametrics.com/2023/11/24/ict-contributed-15-97-to-nigerias-real-gdp-in-q3-2023/
Akintaro,S.(2024b). ICT contributed 16.66% to Nigeria’s real GDP in Q4 2023.
https://nairametrics.com/2024/02/23/ict-contributed-16-66-to-nigerias-real-gdp-in-q4-2023/
Akintaro,S.(2024c). ICT’s contribution to Nigeria’s real GDP hits 19.78% in Q2 2024 - NBS.
Ashford, W. (2017). Employee Awareness in Cybersecurity. Computer Weekly, 15(2), 10-12.
AU. (2020). Digital Transformation Strategy for Africa 2020–2030. African Union.
Bachmann, R., & Zaheer, A. (2006). Handbook of Trust Research. Edward Elgar Publishing.
Barney, J. B., & Hansen, M. H. (1994). "Trustworthiness as a source of competitive advantage."
Strategic Management Journal, 15(S1), 175-190.
Basu, S. (2019). Cyber Law in India. New Delhi: LexisNexis.
Bawumia, M. (2022). Mobile Money Interoperability in Ghana. Nigerian Tribune.
Blau, P. M. (1964). Exchange and Power in Social Life. Wiley.
Brenner, S. W. (2019). Cybercrime: Criminal threats from cyberspace. Routledge.
Bruce, M., Lusthaus, J., Kashyap, R., Phair, N. & Varese, F. (2024) Mapping the global geography
of cybercrime with the World Cybercrime Index. PLoS ONE 19(4): e0297312. https://doi.org/10.1371/journal.pone.0297312
CBN(2018). Guidelines on Cybersecurity for Banks and Other Financial Institutions in Nigeria.
Central Bank of Nigeria.
Center for Internet Security (2022). CIS Controls Version 8. https://www.cisecurity.org/controls
Chinedu, P.U., Nwankwo, W., Aliu,D., Shaba,S.M., Momoh,M.O. (2020). Cloud Security
Concerns: Assessing the Fears of Service Adoption. Archive of Science and Technology, 1(2), 164-174
Chinedu, P. U., Nwankwo,W., Olanrewaju,B. S.,& Olayinka T. C.(2018). Cloud-Based Virtual
Organization Framework for Optimizing Corporate Value Chain. International Journal of Discrete Mathematics, 3(1), 11-20
Chinedu, P. U., Nwankwo, W., & Eze, U. F. (2013). Enterprise Cloud Adoption: Leveraging on the
Business and Security Benefits, West African Journal of Industrial and Academic Research, 7(1).
Chinedu, P. U., Nwankwo, W., Masajuwa, F. U. & Imoisi, S. (2021). Cybercrime Detection and
Prevention Efforts in the Last Decade: An Overview of the Possibilities of Machine Learning Models. Review of International Geographical Education (RIGEO), 11(7), 956-974. Doi: 10.48047/rigeo.11.07.92
Clough, J. (2015). Principles of Cybercrime. Cambridge University Press.
Cybercrimes (Prohibition, Prevention, Etc.) Act. (2015). Federal Government of Nigeria.
Cybercrime Magazine (2024). Cybercrime To Cost The World $9.5 Trillion USD Annually In
https://cybersecurityventures.com/cybercrime-to-cost-the-world-9-trillion-annually-in-2024/
Daniel,A., Shaba, S.M., Momoh, M.O., Chinedu, P. U., & Nwankwo, W.(2021). A Computer
Security System for Cloud Computing Based on Encryption Technique. Computer Engineering and Applications, 10(1),41-53.
Data Protection Act (2012). Republic of Ghana.
Data Protection Act (2019). Republic of Kenya.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of
information technology. MIS Quarterly, 13(3), 319-340.
Deloitte. (2024). Nigeria Cybersecurity Outlook 2024.
Drapkin, A. (2023). Data Breaches That Have Happened in 2022 and 2023 So Far.
https://tech.co/news/data-breaches-updated-list
EFCC. (2024). EFCC Unveils Cybercrime Rapid Response Service.
https://www.efcc.gov.ng/efcc/news-and-information/news-release/10471-efcc-unveils cybercrime-rapid-response-service
Egypt Vision 2030. (2020). Egyptian Government.
https://mped.gov.eg/Files/Egypt_Vision_2030_EnglishDigitalUse.pdf
Ekong, U., & Ekong, E. (2020). Evaluating the Effectiveness of Cybersecurity Policies in Nigeria.
African Security Review, 29(1), 34-49.
Ewelukwa, C. O. (2017). Cybersecurity and the Nigerian financial sector: Challenges and
regulatory perspectives. International Journal of Banking and Finance, 10(2), 89-105.
Ezejiofor, R. A., Enebeli, O. F., & Nwokoye, E. O. (2020). Nigeria Data Protection Regulation:
Implications and challenges. International Journal of Data Protection and Cybersecurity, 6(1), 45-56.
Federal Ministry of Communications. (2020). National Digital Economy Policy and Strategy.
Government of Nigeria.
Financial Times (2023). Digital Economy in Africa: A Focus on Nigeria. Financial Times.
Fox, J. (2023). Top Cybersecurity Statistics for 2024. Cobalt.
https://www.cobalt.io/blog/cybersecurity-statistics-2024
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51-90.
Gercke, M. (2018). Understanding cybercrime: Phenomena, challenges, and legal response.
Council of Europe.
Goddard, M. (2017). The EU General Data Protection Regulation (GDPR): European regulation
that has a global impact. International Journal of Market Research, 59(6), 703-705.
Goodman, M., & Brenner, S. W. (2019). Cybercrime and cyberterrorism: A study of legal policies
and judicial decisions. Criminal Law Bulletin.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-
enabled offenses. Routledge.
Humphreys, E. (2016). Information Security Management Standards: Compliance, Governance,
and Risk Management. Computers & Security, 56, 55-67.
Idris,A(2023). Data: Digital payment is having its best year in Nigeria.
https://techcabal.com/2023/08/04/data-digital-payment-is-having-its-best-year-in-nigeria/
Iroanusi, Q.(2022). Over 2,800 persons convicted of cybercrime in 2022 – EFCC.
Irughe, D. U., Nwankwo, W., Nwankwo, C. P., & Uwadia, F. (2022). Resilience and security on
enterprise networks: A multi-sector study. 2022 5th Information Technology for Education and Development (ITED), 1–7. https://doi.org/10.1109/ITED56637.2022.10051458.
ISO. (2013). ISO/IEC 27001: Information technology – Security techniques – Information security
management systems – Requirements. International Organization for Standardization.
ISO. (2018). ISO 31000: Risk management – Principles and guidelines. International Organization
for Standardization.
Jarvenpaa, S. L., Tractinsky, N., & Saarinen, L. (2000). Consumer trust in an Internet store: A
cross-cultural validation. Journal of Computer-Mediated Communication, 5(2). https://doi.org/10.1111/j.1083-6101.2000.tb00337.x
Kifordu, A., Nwankwo,W., & Ukpere, W.(2019). The Role of Public Private Partnership on the
Implementation of National Cybersecurity Policies: A Case of Nigeria. Journal of Advanced Research in Dynamical and Control Systems, 11(8), 1386-1392. Special issue.
Kingu, A., & Gomera, W. C. (2022). An Assessment of The Impact of Digitalization of Microcredit
Services on Micro and Small Enterprises. African Journal of Applied Research, 8(1), 121-137.
Knight, F. H. (1921). Risk, Uncertainty, and Profit. Houghton Mifflin.
Krysovatyy, A., Desyatnyuk, O., & Ptashchenko, O. (2024). Digital innovations and their
ramifications for financial and state security. African Journal of Applied Research, 10(1), 431-441.
Lacey, D. (2010). Managing the human factor in information security: How to win over staff and
influence business managers. Wiley.
Lusekelo, A. (2022). Digital Growth in Tanzania: Opportunities and Challenges. Tanzanian
Economic Review.
Mahmoud, A. (2022). Egypt’s ICT Sector: Growth and Challenges. Middle East Journal of
Economics.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational
trust. Academy of Management Review, 20(3), 709-734.
Mgboji,K. (2024). Cost Of Cybercrime Projected To Exceed $10.5trn In 2024. Retrieved from
https://newtelegraphng.com/cost-of-cybercrime-projected-to-exceed-10-5trn-in-2024/
Michael,C.(2023). Nigeria’s ICT sector grows by 8.6%, highest in 3 years.
https://businessday.ng/technology/article/nigerias-ict-sector-grows-by-8-6-highest-in-3yrs/
Mishra, A., Dash, S. B., & Cyr, D. (2017). Customer compensation and trust recovery effectiveness
post-data breach. Journal of Business Research, 86, 219-232.
Momoh, M. O., Chinedu, P., Nwankwo, W., Aliu, D., & Shaba, M. (2021). Blockchain Adoption:
Applications and Challenges. International Journal of Software Engineering and Computer Systems, 7(2), 19–25. https://doi.org/10.15282/ijsecs.7.2.2021.3.0086
NBS(2024). Nigeria's GDP by sector: First Quarter Report 2024, National Bureau of Statistics.
https://nigerianstat.gov.ng/elibrary/read/1241506
NDPR. (2019). Nigeria Data Protection Regulation. National Information Technology
Development Agency.
Nigerian Communications Commission (2023). Annual Report on Cybersecurity Threats in
Nigeria. Abuja, Nigeria.
Nigeria Data Protection Bureau (2023). Guidelines for Compliance with the Nigeria Data
Protection Act. Federal Ministry of Communications and Digital Economy.
NIST (2023). NIST Cybersecurity Framework: Version 2.0. U.S. Department of Commerce.
Nkuna, M. (2022). South Africa’s Digital Divide: A Persistent Challenge. South African Journal
of ICT.
Nwankwo, C., Adigwe, W., Nwankwo, W., Kizito, A. E., Konyeha, S., & Uwadia, F. (2022c). An
improved password-authentication model for access control in connected systems. 2022 5th Information Technology for Education and Development (ITED), 1–8. https://doi.org/10.1109/ITED56637.2022.10051179
Nwankwo, C., Uwadia, F., Nwankwo, W., Adigwe, W., Chinedu, P., & Ojei, E. (2022d). Privacy
and security of content: A study of user-resilience and pre-checks on social media. 2022 5th Information Technology for Education and Development (ITED), 1–8. https://doi.org/10.1109/ITED56637.2022.10051589
Nwankwo, W. (2020). A review of critical security challenges in SQL-based and NoSQL systems
from 2010 to 2019. International Journal of Advanced Trends in Computer Science and Engineering, 9(2), 2029–2035.
Nwankwo, W., & Kifordu, A. (2019). Strengthening private sector participation in public
infrastructure projects through concession policies and legislations in Nigeria: A review. Journal of Advanced Research in Dynamical and Control Systems, 11(08), 1360–1370.
Nwankwo, W., & Ukhurebor, K. E. (2019). Investigating the performance of point-to-multipoint
microwave connectivity across undulating landscapes during rainfall. Journal of the Nigerian Society of Physical Sciences, 1(3), 103–115. https://doi.org/10.46481/jnsps.2019.16
Nwankwo, W., Adetunji, C. O., Olayinka, A. S., Ukhurebor, K. E., Ukaoha, K. C., Umezurike, C.,
Chinedu, P. U., & Benson, B. U. (2021). The adoption of AI and IoT technologies: Socio-psychological implications in the production environment. The IUP Journal of Knowledge Management, 19(1), 50–75.
Nwankwo, W., Olayinka, A. S., & Ukhurebor, K. E. (2019). The urban traffic congestion problem
in Benin City and the search for an ICT-improved solution. International Journal of Science and Technology, 8(12), 65–72.
Nwankwo, W., Adetunji, C. O., & Olayinka, A. S. (2022a). IoT-driven Bayesian learning: A case
study of reducing road accidents of commercial vehicles on highways. In S. Pal, D. De, & R. Buyya (Eds.), Artificial intelligence-based Internet of Things systems. Internet of Things (Technology, Communications and Computing). Springer, Cham. https://doi.org/10.1007/978-3-030-87059-1_15
Nwankwo, W., & Ukaoha, K. C. (2019). Socio-technical perspectives on cybersecurity: Nigeria’s
cybercrime legislation in review. International Journal of Scientific and Technology Research, 8(9), 47–58.
Nwankwo, W., Chinedu, P. U., Masajuwa, F. U., Njoku, C. C., & Imoisi, S. E. (2023). Adoption of
i-voting infrastructure: Addressing network-level cybersecurity breaches. E-Government: An International Journal, 19(3), 273–303. https://doi.org/10.1504/EG.2023.130582
Nwankwo, W., & Olayinka, A. S. (2019). Implementing a risk management and X-ray cargo
scanning document management prototype. International Journal of Scientific and Technology Research, 8(9), 93–105.
Nwankwo, W., & Chinedu, P. U. (2018). Security of cloud virtualized resources on a SaaS
encryption solution. Science Journal of Energy Engineering, 6(1), 8–17. https://doi.org/10.11648/j.sjee.20180601.12
Nwankwo, W., Chinedu, P. U., Daniel, A., Shaba, S. M., Momoh, O. M., Nwankwo, C. P., Adigwe, W., Oghorodo, D., & Uwadia, F. (2023). Educational FinTech: Promoting stakeholder confidence
through automatic incidence resolution. In Z. Hu, Y. Wang, & M. He (Eds.), Advances in intelligent systems, computer science and digital economics IV. CSDEIS 2022. Lecture Notes on Data Engineering and Communications Technologies (Vol. 158). Springer, Cham. https://doi.org/10.1007/978-3-031-24475-9_78
Nwankwo, W., Kizito, A. E., Adigwe, W., Nwankwo, C. P., Uwadia, F., & Mande, S. (2022b). A
community cloud-based store for forensic operations in cybercrime control. 2022 5th Information Technology for Education and Development (ITED), 1–8. https://doi.org/10.1109/ITED56637.2022.10051615
Odeniyi,S.(2022). Nigeria loses over $500m to cybercrime annually – EFCC chair. Retrieved from
https://punchng.com/nigeria-loses-over-500m-to-cybercrime-annually-efcc-chair/
Odumesi, J. (2014). Combating cybercrime in Nigeria: Challenges and opportunities. African
Journal of Criminology and Justice Studies, 8(1), 91-110.
Odunlade, B., & Bamidele, T. (2021). Customer Trust and Business Continuity: Insights from
Nigerian SMEs. African Journal of Business Management, 19(2), 98-115.
Okeshola, F. B., & Adeta, A. Y. (2013). The nature, causes, and consequences of cyber crime in
tertiary institutions in Zaria-Kaduna state, Nigeria. American International Journal of Contemporary Research, 3(9), 98-114.
Palenchar, M. J., & Heath, R. L. (2007). Strategic risk communication: Adding value to society.
Public Relations Review, 33(2), 120-129.
Ponemon Institute (2022). Cost of a Data Breach Report. IBM Security.
POPIA. (2013). Protection of Personal Information Act. Republic of South Africa.
Porter, M. E., & Heppelmann, J. E. (2014). How Smart, Connected Products Are Transforming
Competition. Harvard Business Review.
Rogers, E. M. (1962). Diffusion of Innovations. Free Press.
Purplesec (2022). Cyber Security Statistics: The Ultimate List of Stats Data, & Trends for 2022.
https://purplesec.us/resources/cyber-security-statistics/
SANS Institute (2020). Incident Response: Best Practices for Effective Preparation and Execution.
Sackey, E. A., Yandoh, J. B., & Sangban, K. (2023). Interactive Digital Notice Boards for
Universities in Ghana. African Journal of Applied Research, 9(1), 153-173.
Sibe, R.T., Kaunert, C. (2024). Cyber Crime in Nigeria—Reviewing the Problems. In: Cybercrime,
Digital Forensic Readiness, and Financial Crime Investigation in Nigeria. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-54089-9_2
South Africa National Planning Commission. (2012). National Development Plan 2030.
Government of South Africa.
Talaat, A. (2021). ICT Development in Egypt. Egyptian Ministry of Communications.
Tredger,C.(2023). Africa’s cyber threats triple the global average – Check Point.
https://www.itweb.co.za/article/africas-cyber-threats-triple-the-global-average-check- point/KPNG878Nr6Pq4mwD
Ukhurebor, K. E., Nwankwo, W., Adetunji, C. O., & Makinde, A. S. (2021). Artificial intelligence
and Internet of Things in instrumentation and control in waste biodegradation plants: Recent developments. In C. O. Adetunji, D. G. Panpatte, & Y. K. Jhala (Eds.), Microbial rejuvenation of polluted environment. Microorganisms for sustainability (Vol. 27). Springer, Singapore. https://doi.org/10.1007/978-981-15-7459-7_12
Venkatraman,N.V.(2024). Trust: Business Currency of the Digital Age.
https://www.industries.veeva.com/blog/trust_business_currency
Von Solms, R., & Van Niekerk, J. (2013). From information security to cybersecurity. Computers
& Security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004
von Spreti,M., Biberacher,F. & Heinlein,T.(2021). The trust enabler: Building cyber-security
strategies for a trusted, digital future. https://www2.deloitte.com/xe/en/insights/topics/digital-transformation/digital-trust-for-future.html
Wall, D. S. (2017). Cybercrime: The transformation of crime in the information age. Polity Press.
World Bank(2023). Digital Transformation in Africa. World Bank Report.
World Economic Forum (2023). Global Cybersecurity Outlook 2023. Geneva, Switzerland.
https://www3.weforum.org/docs/WEF_Global_Security_Outlook_Report_2023.pdf
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2025 AFRICAN JOURNAL OF APPLIED RESEARCH
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
By submitting and publishing your articles in the African Journal of Applied Research, you agree to transfer the copyright of the Article from the authors to the Journal ( African Journal of Applied Research).