highlight that the institutional capacity is weak, there is no forensic skill and disjointed laws undermine the
response to cyber-attacks (Yusuf, 2014; Okoru & Oluku, 2023). To illustrate, studies on cyber-risk
coordination in Nigeria have shown that, although the country has formally instituted a national Computer
Emergency Response Team (CERT) and Sectoral Computer Security Incident Response Teams (CSIRTs), the
coordination between agencies is still poor (Ikuero, 2022). Moreover, the wider scholarly body on the topic of
development and cybercrime demonstrates that cybercrime decreases investor confidence, harms national
image, and cripples sustainable development (Atalor and Fakunle, 2023). Collectively, these results indicate
that the digital transformation in Nigeria should be accompanied by equally important resilience efforts in case
the cyber threats are to be addressed as the issues of national-security.
The policy significance of cyber threats to the internal and regional stability of Nigeria cannot be
overestimated. At the internal level, an effective cyber-attack on financial infrastructure or government
services may undermine the level of trust, create governance crises and deteriorate state capacity. Nigeria being
a key player in the West African region and a pillar to regional security, its cyber vulnerability has spill over
effects to neighbouring states and the overall regional security complex. Those scholars who have used the
securitisation theory have pointed out that by presenting a phenomenon as a security concern, states are able to
mobilise resources, legitimise extraordinary actions and coordinate institutional responses (Buzan, Waever and
de Wilde, 1998). The change in perception of cyber-threats as an ICT problem to a national security problem is
necessary in the Nigerian context in mobilising the correct policy and institutional frameworks (Tella, 2022).
In the meantime, studies about the place played by Nigeria in fighting against transnational digital threats
emphasize the value of legal frameworks and regional collaboration in West Africa (Jude, 2024). With this kind
of framework, policymakers in Nigeria and the region would be in a better position to place cyber threat in
broader frameworks of stability, state sovereignty and collective governance.
Conceptual and Theoretical Framework
The fast-changing digital space has significantly broadened the boundaries of security cognition, which has led
to the necessity to frame how the problem of cybersecurity, national security, regional security complex, and
digital sovereignty converge within regional frames of governance and technological sovereignty. The core of
this exploration is made of three related ideas, namely, cybersecurity as the defense of information systems,
networks and data against malicious digital intrusions; national security as a broader construct to encompass
the political autonomy and territorial integrity of a state and the critical infrastructure; and regional security
complex as the idea that security relations occur in the most intense form at the regional level with inter-
dependencies clustering around the states. Digital sovereignty is thus the desire of states and regional blocs to
dominate their digital environments, data streams, and infrastructure and regimes. The combination of these
ideas allows a more in-depth discussion of how states and regional entities of the West African location pursue
attempts to cope with cyber-threats, secure national interests and regional coordination.
The theory of securitization as represented by Barry Buzan, Ole Waever and Jaap de Wilde (1998) provides a
rich platform on which cyber operations can be interpreted as being advanced to the level of technical or policy
problems to that of security imperative that require extraordinary solutions. Securitization theory underlines
that security is not the objective state of affairs but a socio-constructed activity where an issue is put in terms
of a speech act as an existential threat to a specified referent object usually the state, society or identity (Buzan
et al., 1998; Waefer, 1995). Within the cyberspace, researchers have demonstrated that states are growing to
describe cyber-attacks on critical infrastructure, data network or digital sovereignty as similar to conventional
threats of war or espionage, warranting increased efforts, extraordinary expenditure or constraining regulatory
frameworks. This can be applied to a West African or African regional context and it is in this context that
governments are connected to cybersecurity in terms of it being a survival of the nation, social cohesion and
security of the digital economy, thus justifying a stronger state action (Gaidaev, 2020). In this framing, in
reference to the regional security complex concept, the argument is presented that the perception of threat and
response to it is not limited within the borders of the individual state: the security of one state is closely
interwoven with its neighbours through shared cyberspace realities, data-flows, cross-border incidents and
infrastructural dependencies (Buzan et al., 1998).