The Data Protection Regime in Nigeria: Analysis and Comparison of the Nation’s Existing Laws of Information Security with International Standards


 


In the emergence of the internet and other online processes, a shift towards a new age has been introduced. Information has acquired ascendancy and considered as one of the most potent tool to date. This situations occasioned by social change have also triggered developments in commerce and trade. Activities, that were once believed to be done only through certain channels and by means of certain specific procedures, are now given the added elements of efficiency and effectiveness with the advent of online technologies. Collectively, these processes are deemed as “e-commerce.” As the term implies, business and other trading procedures are at play. This only implies that the legal coverage is similarly required. At some level, vast economies like that of UK and US have established their individual regimes in the protection of the private interests of the members of its civil society. However, similar developments have yet to be seen in developing and less-developed countries. In this regard, this dissertation will focus on the case of Nigeria. The said state has the reputation in the continent as one of the leading markets and users of e-commerce. However, it appears that there are vast rooms for development required in the information security laws in the state as it also infamous for certain online scams that cons people around the world. This dissertation will look into the aspects of information security laws and data protection procedures present in Nigeria.



 


Chapter 1 Problem and Its Background A.    Introduction B.     Background of the Topic C.    Aim and Objectives of the Dissertation D.    Plan of the Study E.     Rationale Supporting the Dissertation F.     Importance of the Study G.    Scope and Coverage Chapter 2 Literature Review A.   Introduction B.     E-Commerce C.    The Nigerian Experience: Favourable and Otherwise D.    Information Security and Data Protection E.     The Common Criteria for IT Security Evaluations (ISO 15408) F.     Standards for Information Security Management (ISO17799) G.    Synthesis Chapter 3 Method and Procedures A.   Introduction B.     Method Used C.    Tools For Research D.    Administration of the Research E.     Ethical Considerations Chapter 4 Presentation, Interpretation, and Analysis of the Data Chapter 5 Summary, Conclusion and Recommendations A.   Summary B.     Conclusion C.    Recommendation

 


 



Credit:ivythesis.typepad.com


0 comments:

Post a Comment

 
Top