Effect of Cybercrime in Nigeria
Chapter One
Objectives of the Study
The main objective of this study is to investigate the several cases of cyber crime in the country and also to investigate the causes, effects and to proffer possible solutions to the different cases of cybercrimes. The specific objectives of the study are however: to;
- to inquire the level of cybercrimes in Nigeria
- to establish the reasons for cybercrime in Nigeria
- to evaluate how the government curb cybercrime in Nigeria
CHAPTER TWO
LITERATURE REVIEW
Cybercrime
The internet is the fastest growing technical infrastructure. Information and communication technologies are omnipresent and the trend of digitalization is expanding globally. The influence of the internet on society goes far beyond establishing basic information. The availability of the internet is a foundation for the development in the creation, availability and use of electronic based network services. The E-mail system have displaced traditional post mail service, on line web representation is nowadays more important for business than printed materials. Also internet-based communication and digital phones services are dislodging landline communication (I.T.U., 2009). Advancement in modern technology has help countries develop their communication networks, enabling faster telecommunication services and massive data information exchange. According to KPMG (2011) there are nearly 2 billion internet users and over 5 billion mobile phone connections worldwide.
The Symantec Online Living Report (2009) provides insight into rapidly changing technology, internet usage and its social impact on individuals and families. This study was carried out in 12 countries based on 9000 interviews, by Harris Interactive, it covers e-mail usage, social networking, webcam, photo sharing and twitter related services. It was discovered that 92percent uses e-mail to communicate with friends and family, 42percent, use webcam, half of the adults use social networking, and access photo online. Also 24percent use twitter like service, 88percent sent text messages, 92percent of the kids socialize with family and friends, 55percent made friends online and 45percent have an average of 37 on-line friends. Following this trend, statistics collected by APACS from 2007 to 2008, shows that the total value of online shopping transaction alone increased by 524 percent from 6.6 billion pound in 2007 to 41.2 billion pound in 2008.
The growing popularity and convenience of digital networks communication system, however, came at a cost. As business and societies in general increasingly rely on computers and internet based networking, cybercrime and digital “attack” incidents have increased around the world. These “attacks” include but are not limited to crime that involves the use of computer to perpetrate financial scams, computer hacking, virus attacks, e-mail stalking and creating websites that promote racial hatred etcetera. According to Message Lab Intelligence (2010) the first instance of cybercrime was reported in 2000, when a mass-mailed virus affected nearly 45 million computer users worldwide. Ponemon Institute (2001) revealed that cybercrime do serious damage and harm organizations.
The Canadian Centre for Justice Statistics (2002) sees cybercrime as criminal offence in which perpetuators use a computer as the object of crime, or the tool used to commit a material component of the offence with computers and networks. Similarly, Australian Institute for Criminology (2006) state that cyber-crime is any activity that uses computer or a network system as a tool, a target or a place of criminal activity. Some other definitions try to take the objective or intentions into account and expose cybercrime more precisely, as “computer-mediated” activities which are either illegal or considered illicit by certain parties which can be conducted through global electronic networks (Wale, 2002).
CHAPTER THREE
METHODOLOGY
Research Design
Research design is a detailed outline of how an investigation took place. It entails how data is collected, the data collection tools used and the mode of analyzing data collected (Cooper & Schindler (2006). This study used a descriptive research design. Gill and Johnson (2002) state that a descriptive design looks at particular characteristics of a specific population of subjects, at a particular point in time or at different times for comparative purposes. The choice of a survey design for this study was deemed appropriate as Mugenda and Mugenda (2003) attest that it enables the researcher to determine the nature of prevailing conditions without manipulating the subjects.
Further, the survey method was useful in describing the characteristics of a large population and no other method of observation can provide this general capability. On the other hand, since the time duration to complete the research project was limited, the survey method was a cost effective way to gather information from a large group of people within a short time. The survey design made feasible very large samples and thus making the results statistically significant even when analyzing multiple variables. It allowed for many questions to be asked about a given topic giving considerable flexibility to the analysis. Usually, high reliability is easy to obtain by presenting all subjects with a standardized stimulus; observer subjectivity is greatly eliminated. Cooper and Schindler (2006) assert that the results of a survey can be easily generalized to the entire population.
Population Of Study
A study population is a group of elements or individuals as the case may be, who share similar characteristics. These similar features can include location, gender, age, sex or specific interest. The emphasis on study population is that it constitute of individuals or elements that are homogeneous in description (Udoyen, 2019).The population of study is the entire study of Last State
CHAPTER FOUR
DATA ANALYSIS AND INTERPRETATION
Socio-Demographic Attributes
Table 1: Socio-Demographic Data of Respondents. (N=407)
CHAPTER FIVE
CONCLUSION AND RECOMMENDATIONS
CONCLUSION
Cybercrime is a product of socio-cultural causes, and with it preponderance, there can be no political and unadulterated social development in a developing country like Nigeria. The desire for material wealth and upward mobility provokes in individual innovative behaviour that perverse the accepted standard of attaining culturally approved ends. Hence, corruption lingers in the society while socio-cultural development suffers. This way, there can be no sustainable development, political stability or economic growth. The development of the internet in Nigeria has come with a price, and maintaining the proper usage of the internet remains a task for those who are inclined to committing cyber-offences.:
RECOMMENDATIONS
This study, therefore, recommend
(1) the introduction of local, state and national cyber system orientation agency to educate people on the benefit and important of engaging in constructive activities on the world wide web, crucial to this would be a licensing and monitoring authority to ensure compliance with standard regulation governing internet usage in every locality, with stiff penalty to non-conformists and a reward system to conformists.
(2) There is a need to inculcate civic studies that fosters national ideology, entrepreneurial and capacity building in academic curriculum, especially at the elementary level.
(3) The socio-economic polarities between the “haves” and the “have not” should be de-emphasized by deliberate government policy by the provision of certain basic socio-economic facilities like, job creation, good housing system, and popular democratic government.
(4) Lastly, the government should emphasize merit above material wealth as the basis for social recognition, political appointment and honorary awards and premise promotion in national service on excellent standard performance. This action step will produce in society genuine social development with lasting social effect.
References
- Abebusiyi I.A. (2008) The Internet and Emergence of Yahoo boys sub-culture in Nigeria. International Journal of Cyber Criminology (IJCC). Vol.2 (2): 368-381.
- Adeniran, A. (2006) A Non-Dependent Framework for Development. This day, www.thisdayonline.com
- Akanbi, M.M. (2007). “Corruption and the Challenge of Good Governance in Nigeria”. In Olurode, L. and Anifowose, R. (eds) Rich but Poor: Corruption and Governance in Nigeria. Faculty of Social Sciences: University of Lagos, p. 122.
- Axelrod, R. (1997). The Dissemination of Culture: A Model with Local Convergence and Global Polarization. The Journal of Conflict Resolution 41(2) 302-226.
- Babawale T. and Onuah B. (2007). “The State, Corruption and the Challenge of Good Governance in Nigeria”. In Olurode, L. and Anifowose, R. (eds) Rich but Poor: Corruption and God Governance in Nigeria, Faculty of Social Sciences: University of Lagos, pp. 70-79.
- Canadian Centre for Justice Statistics (2002) Cyber-Crime: Issues, Data Sources, and Feasibility of Collecting Police-Reported Statistics. Minister of Industry, Ontario, Canada.