Adams, O.A., 2010. Risk management practices in IS outsourcing: An investigation into commercial banks in Nigeria. International Journal of Information Management, 24(2): 176-180.
Alex, M., 2010. Deterrence: The legal threat in crime control. Chicago, IL: University of Chicago Press.
Aremu, M.A. and Y.A. Ahmed, 2011. An investigation of security and crime management in developing society: The implications for nigeria democratic set-up. International Journal of Academic Research in Business and Social Sciences, 3(1): 390-399.
Cohen, L.E. and M. Felson, 1979. Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4): 588-608.Available at: https://doi.org/10.2307/2094589.
Daniel, O., 2006. Social inequality, collision & armed robbery in Nigerian Cities. British Journal of Criminology, 29: 21-34.
Ebele, J., 2012. Bank robbery and criminality dimension in banking: The offence and the offenders. Security Journal, 10(1): 63-65.
Federal Bureau of Investigation, 2016. A Summary of the Legislation on Cybercrime in Nigeria, Legislative & Government Relations Unit, Public Affairs Department. ATM skimming. Available from https://www.fbi.gov/news/stories/2011/july/atm_071411 [Accessed September 24, 2019].
Hassan, A.B., F.D. Lass and J. Makinde, 2012. Cybercrime in Nigeria: Causes, effects and the way out. ARPN Journal of Science and Technology, 2(7): 626-631.
Maitanmi, O., S. Ogunlere and S. Ayinde, 2013. Impact of cyber crimes on Nigerian economy. The International Journal of Engineering and Science, 2(4): 45–51.
Michael, A., A. Boniface and A. Olumide, 2014. Mitigating cybercrime and online social networks threats in Nigeria. Proceedings of the World Congress on Engineering and Computer Science WCECS 2014, 1: 22–24.
Moses-Òkè, R.O., 2012. Cyber capacity without cyber security: A case study of Nigeria’s national policy for information technology (NPFIT). The Journal of Philosophy, Science & Law, 12(1): 1-14.Available at: https://doi.org/10.5840/jpsl20121211.
Ndible, N., 2016. Practical application of cyber crime issues. Available from http://ijma3.org/Admin/Additionals/Cybercrime/Nibal%20Idlebi%20Presentation.pdf [Accessed September 24, 2019].
Okeshola, F.B. and A.K. Adeta, 2013. The nature, causes and consequences of cyber crime in tertiary institutions in Zaria-Kaduna state, Nigeria. American International Journal of Contemporary Research, 3(9): 98-114.
Olumide, O.O. and V.F. Balogun, 2010. E-crime in Nigeria: Trends, tricks, and treatment. The Pacific Journal of Science and Technology, 11(1): 343-355.
Otu, S.E., 2010. Armed robbery and armed Robbers in contemporary Nigeria: The social learning and model visited. International Journal of Criminology and Sociological Theory, 3(2): 438-456.
Parthiban, L. and R. Raghavan, 2014. The effect of cybercrime on a bank’s finances. International Journal of Current Research and Academic Review, 2(2): 173-178.
Roberts, E.R., 2013. The social organisation of Armed Robbery. In William A., R. (Ed.).(Deviant Behaviour and social process. Chicago: Rand McNally College. pp: 449 – 513.
Salawu, U.B., 2010. Critical issues in the management of information systems in Nigeria banks: Empirical study. International Journal of Business Information Systems, 3(1): 63 -72.
Shah, S.A., 2012. Assessing the impact of CCTV. (Home, Office Research Study No. 292). London, UK: Home Office Research, Development and Statistics Directorate.
Smith, J., 2012. Crime in developing countries: A comparative perspective. New York: John Wiley and Sons.
Stone, S., 2011. The relation of felonies to environmental factors in indianapolis. Journal of Social Forces, 10: 498-509.Available at: 10.2307/2569897.
Wada, F. and G.O. Odulaja, 2012. Electronic banking and cyber crime in Nigeria - a theoretical policy perspective on causation. African Journal of Computer and ICT, 4(1): 69-82.
This study received no specific financial support.
The authors declare that this study has neither been submitted to other journal(s) for publication nor previously published somewhere else.
The author acknowledged the self-sacrificing efforts of all research assistants that were engaged in field (data collection) aspect of this study.