Information and communications technology (ICT) and airspace management in Nigeria: An analysis

Authors

  • Utam Edward Unimke Institute of Public Policy and Administration, University of Calabar, Calabar, Nigeria Author
  • Adams John Anyabe Department of Political Science, University of Calabar, Calabar, Nigeria. Author
  • Ugbe Justin I. Department of Political Science, University of Calabar, Calabar, Nigeria Author

Keywords:

Information and Communication Technology (ICT), Airspace Management, Threats, National Security, Defence Management

Abstract

This study explores the pivotal role of Information and Communications Technology (ICT) in managing Nigeria's airspace, focusing on both civil aviation and defense sectors. Utilizing a descriptive survey method and qualitative data analysis, the research adopts the Routine Activity Theory by Cohen and Felson (1979) as its theoretical framework. The findings highlight that inadequate monitoring and policing of airspace infrastructure have exposed Nigeria to criminal and subversive activities, threatening national security. To address this, the study recommends establishing a multi-stakeholder governance system. This system should integrate various private, public, and international authorities within the ICT sector, under the oversight of the Nigerian Information Technology Development Agency (NITDA). Comprising technocrats skilled in airspace-related criminality, such as cybercrimes, cyber terrorism, and cyber espionage, this regime would be tasked with monitoring, protecting, and securing Nigeria's airspace infrastructure.

Downloads

Download data is not yet available.

References

1. Abraham S. (2014). Who Governs the Internet? Implications for Freedom and National Security. World Wide Web (YOJANA), April, 41-44

2. Adesina S.O. (2017). Cyber Crime and Poverty in Nigeria. Canadian Social Science, 13(4), 19-29

3. Aladenusi T.S. (2014). Solving National Security Challenges with Information Technology: Which Way Forward? PowerPoint Presentation at the TPAffO14 Conference, Computer Professionals

4. CBN. (2015). The Nigeria Electronic Fraud Forum (NEFF) 2015 Annual Report. Abuja: Central Bank of Nigeria

5. Clopton Z.D. (2016). Territoriality, Technology, and National Security. University of Chicago Law Review, 83(45), 45-63

6. Comer D.E. (2009). Internet. Microsoft Encarta 2009 [DVD]. Redmond, WA: Microsoft Corporation

7. Dasuki M.S. (2014). Forward. National Cyber Security Strategy. Abuja: Office of the National Security Adviser

8. Global Cyber-Security Index (GCI). (2017). International Telecommunications Union (ITU)

9. Goldsmith J.L. (1998). The Internet and the Abiding Significance of Territorial Sovereignty. Indiana Journal of Global Legal Studies, 5(2), 475-491

10. Ibrahim J. & Dabugat K. (2016). Rural Banditry and Hate Speech in Northern Nigeria: Fertile Ground for the Construction of Dangerous Narratives. In M.J. Kuna & J. Ibrahim (Eds.), Rural Banditry and Conflict in Northern Nigeria (pp. 257-319). Abuja: Centre for Democracy and Development (CDD)

11. Idom A.M. & Tormusa D.O. (2016). Causes, Types and Likely Victims of Cybercrimes in Selected Higher Institutions. 1(1), 202-218

12. Idom A.M. & Ugal D.B. (2016). Influence of ICT Competence on Cybercrimes in Selected Cities of the Six Geo-Political Zones in Nigeria. FULafia Journal of Humanities and Social Sciences, 1(1), 220-241

13. Idom A.M. (2012). Fiber Optics Technology and Cybercrimes in Cross River State: A Proactive Analysis. Unpublished Seminar Paper, Department of Sociology, University of Calabar

14. Jacobson M. (2009). Terrorist Financing on the Internet. CTC Sentinel, 2(6), 17-20

15. Makatiari W. (2016). Executive Summary. Nigeria Cyber Security Report 2016. Serianu Ltd

16. NITDA. (2015). Nigeria Cybersecurity Facts. Abuja: Nigeria Information Technology Development Agency

17. Nnamani I. (2016). Foreword. Nigeria Cyber Security Report 2016. Serianu Ltd

18. Nye J.S. Jr. (2014). The Regime Complex for Managing Global Cyber Activities. Paper Series No.1, Global Commission on Internet Governance

19. Okoli A.C. & Ochim F.I. (2016). Forestlands and National Security in Nigeria: A Threat-Import Analysis. HARD International Journal of Political and Administrative Studies, 2(2), 43-53

20. Okoli A.C. & Idom A.M. (2018). The Internet and National Security in Nigeria: A Threat-Import Discourse. Covenant University Journal of Politics & International Affairs (CUJPIA), 6(1), 20-29

21. Okoli A.C. (2013). Rebranding Nigeria’s Reputation Management Drive: Implications for National Image. Journal of Communication and Media Research, 5(2), 81-87

22. Okoli A.C. & Okpaleke F.N. (2014). Cattle Rustling and Dialectics of Security in Northern Nigeria. International Journal of Liberal Arts and Social Science, 2(3), 109-117

23. Omale D.J. & Idom A.M. (2016). Fiber Optics Technology and Cybercrimes in Calabar Metropolis, Nigeria. International Journal of Social Relevance & Concern, 4(4), 1-15

24. Osho O. & Onoja A.D. (2015). National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis. International Journal of Cyber Criminology (IJCC), 9(1), 120-143. doi:10.5281/zenodo.22390

Downloads

Published

2026-04-27

Issue

Section

Articles

How to Cite

Information and communications technology (ICT) and airspace management in Nigeria: An analysis. (2026). Multi-Disciplinary Journal of Research and Development Perspectives, 12(1), 206-212. https://www.mjrdp-unical.org.ng/index.php/home/article/view/57

Similar Articles

11-20 of 49

You may also start an advanced similarity search for this article.