Libraries at University of Nebraska-Lincoln


Date of this Version


Document Type



Alter, S (2013). Work system theory: an overview of core concepts, extensions, and challenges for the future". Journal of the Association for Information Systems. 14 (2): 72–121. Retrieved from, January, 2019.

Bulgacs, S. (2013). The first phase of creating a standardized international technological implementation framework/software application. International Journal of Business and Systems Research. 7 (3): 250. Retrieved from, January, 2019

D’Atri A., De Marco M. and Casalino N. (2008). The Interdisciplinary aspects of information systems studies. Physica-Verlag, Springer: Germany.

Dashora, K. (2011). Crime in the Society: Problems and Preventions. Journal of Alternative Perspectives in the Social Sciences, 3 (1), 240-259

Ebijuwa, A. A. (2005). Information and communication technology in university libraries: The Nigeria experience. Journal of library and Information Science, 7(1&2), 23-30.

Ebunuwele, E. G., Ola, O. S. & Uduebor, E. A. (2014). Application of information communication technology in academic libraries in Nigeria. International Journal of Education and Research, 2(12), 423-436.

Halder, D. & Jaishankar, K. (2011). Cybercrime and the victimization of women: laws, rights, and regulations. Hershey, PA, USA: IGI Global.

Jessup, L. M. and Valacich J. S. (2008). Information systems today (3rd ed.).New York: Pearson Publishing.

Kroenke, D. M. (2008). Experiencing MIS. Prentice-Hall, Upper Saddle River, NJ

Latha, D. (2008). Jurisdiction Issues in Cybercrimes. Law Weekly Journal, 4, p. 86. Available at (retrieved on August 29, 2019).

Lord, N. (2019). What is cyber security? Definition, best practices & more. Retrieved from on 29 August, 2019.

Moore, R. (2005). Cybercrime: investigating high-technology computer crime. Cleveland, Mississippi: Anderson Publishing.

Morgan, S. (2016). Cybercrime costs projected to reach $2 trillion by 2019. Forbes. Retrieved 28 August, 2019.

Murray, J. (2011). Cloud network architecture and ICT - modern network architecture. ITKnowledge Exchange. TechTarget. Retrieved 2016-09-08 from

Otto, G. & Ukpere, W. I. (2012). National security and development in Nigeria. African Journal of Business Management, 6 (23), 6765-6770.

Paleri, P. (2008). National security: imperatives and challenges. New Delhi: Tata McGraw-Hill. (2019).

The Knowledge Review (2019). Cyber Ethics. Retrieved from on 29 August, 2019.

ToAnyakoha, M. W. (2005). Information and communication technology (ICT) in library services. Coal City Libraries, 2(1&2), 2-12.

Schatz, D. Bashroush, R. & Wall, J. (2017). Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215.

Zuppo, C. M. (2016). Defining ICT in a boundaryless world: the development of a working hierarchy. International Journal of Managing Information Technology (IJMIT). 2(1): 19. Retrieved January, 2019 from communicationtechnology.

Zwass, V. (2019). Information system. Retrieved from /information-system on 29 August, 2019.


All correspondents regarding this paper should be addressed to the corresponding author, Chidi Onuoha Kalu,


Information and knowledge has become vital economic resources in this new era. Yet, along with new opportunities, the dependence on information systems brought new threats. Crime remains elusive and ever strives to hide in the face of development, while cyber security is important because government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. Therefore, this paper examines issues on the Information system, ICT, cybercrime, cyber security, cyber ethics and national security in Nigeria. It is a research work carried out by librarians using selected youths in Wuse area of Abuja Municipal Area Council as a case study. The survey research method was used on the population of 150 respondents randomly selected using a convenient sampling method. All the questionnaires were validly filled and returned. The result shows that the main aim of our national security policy is to ensure that our national survival is free from threat and to ensure that our territorial integrity is free from infringement. Majority of the respondents indicated that the methods cyber criminals often used in defrauding its victims are through identity theft and fraud, and also through making direct contact with their victims using emails and phones calls, etc. The rate of cyber-security and adherence to cyber ethics by internet users is low. The paper recommends among others that for the government to combat the menace of cyber crimes, the government should do more in sensitizing the public about cyber-security through its appropriate agencies.