Review of Secure User Identity Management Systems (UIMS) for Preventing and Controlling Cybercrime
Ernest O. Nonum and
O. Daniel. Ojo
Additional contact information
Ernest O. Nonum: Department of Computing Sciences, Admiralty University of Nigeria, Delta State
O. Daniel. Ojo: Department of Computing Sciences, Admiralty University of Nigeria, Delta State
International Journal of Research and Innovation in Applied Science, 2025, vol. 10, issue 3, 752-761
Abstract:
The Internet has become the backbone of global communication, commerce, and daily life in today’s interconnected world. While it has brought countless benefits, the digital age has also ushered in an era of sophisticated cybercrime. As organisations grow and add services such as e-commerce and global remote access services, controlling who is accessing what kind of information is also becoming a difficult task. From phishing attacks and identity theft to ransomware and financial fraud, cybercriminals exploit vulnerabilities in online systems, often targeting weaknesses in identity management. Addressing this threat requires a robust solution, and implementing a User Identity Management System (UIMS) emerges as a key strategy to secure digital identities and prevent cybercrime. In Nigeria, the trends of employing identification systems using textual information or conventional fingerprint biometrics for identification have not proved effective. An identification system, which employs fingerprint biometrics and conducts a one-to-many pattern-matching to authenticate the claimed identity of an individual (student), is proposed in this paper. This article explores some pivotal roles of UIMS in cybersecurity, its critical components, real-world applications, and future directions, providing a comprehensive overview of how identity management can mitigate cybercrime risks. Some of these roles included a two-factor authentication technique used in developing a system, and the traditional username and password were included with biometric features for robustness. Displayed the development and verification of user identity with strong, reliable Python IDM methods (Authentication), showed the implementation of a fingerprint module for the authorisation of clients, and tracked and analysed user actions to identify anomalies. Ensuring that identity data is protected and used responsibly, adhering to legal standards, results from a survey on why computers or networks are tools targeted or placed for cybercrimes and factors contributing to cybercrimes.
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.rsisinternational.org/journals/ijrias/ ... -issue-3/752-761.pdf (application/pdf)
https://rsisinternational.org/journals/ijrias/arti ... trolling-cybercrime/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:bjf:journl:v:10:y:2025:i:3:p:752-761
Access Statistics for this article
International Journal of Research and Innovation in Applied Science is currently edited by Dr. Renu Malsaria
More articles in International Journal of Research and Innovation in Applied Science from International Journal of Research and Innovation in Applied Science (IJRIAS)
Bibliographic data for series maintained by Dr. Renu Malsaria ().