This paper presents a legal, ethical and social analysis of Nigeria's proposal to impose a death sentence on those who break into national critical information infrastructures or computer networks and cause loss of life (Cybercrime Act, 2013). The bill presented to the National Assembly by Nigeria's President Goodluck Jonathan is currently being reviewed to be passed into law by the Senate. The legislation aims to protect the country's national infrastructure from cybercrime by criminalizing various cyber activities. (Goitom, 2014) The death penalty is already used in Nigeria for other crimes such as murder and armed robbery, in some northern states sexual crimes are punishable by death. (Ikenna, 2007) These types of crimes could be considered violent crimes as they kill or directly threaten the lives of other individuals. (Felson, 2009) Cybercrime however is an interaction with computers and technology and not directly with other individuals in society, although it is still a serious crime, it is the author's opinion that in most cases it is not a premeditated violent act with the intention of killing or injuring. Can hacking government infrastructure or computer networks to gain access to the information they contain be considered a motive to kill someone? Is there therefore a moral obligation on Nigerian society to oppose this bill and challenge the government not to proceed and pass it into law? Constitution and Legal System of Nigeria The laws that make up the constitution of Nigeria are Islamic law, common law and customary law, these laws are also heavily influenced by English law due to the colonization of Nigeria by the British State. (Chinwe, 2011) Nigeria's complex legal system consists of... half of paper... ta-sheet/world-map.aspx#map/western_africa/population/2013Rome Statute of the International Criminal Court. (1998, July 17). Rome Statute of the International Criminal Court. Retrieved from ICC-CPI: http://www.icc-cpi.int/nr/rdonlyres/ea9aeff7-5752-4f84-be94-0a655eb30e16/0/rome_statute_english.pdfSiciliano, R. (2011, March 16). 7 Types of Hacker Motivation. Retrieved from McAffee Blog Central: http://blogs.mcafee.com/consumer/family-safety/7-types-of-hacker-motivationsSterling, B. (1993). The repression of hackers. Virginia: IndyPublish.com.United Nations. (2014). The Universal Declaration of Human Rights. Retrieved from United Nations: http://www.un.org/en/documents/udhr/index.shtml#a5Zheng, C. (2012, September 11). Ethical acking: ethical or unethical. Retrieved from Blog.nus: http://blog.nus.edu.sg/is1103grp202/2012/09/11/ethical-hacking-ethical-or-unethical/
tags