Criminology Project Topics

The Role of University Management in the Fight Against Cybercrimes Among Students (a Case Study of University of Ilorin)

The Role of University Management in the Fight Against Cybercrimes Among Students (a Case Study of University of Ilorin)

The Role of University Management in the Fight Against Cybercrimes Among Students (a Case Study of University of Ilorin)

CHAPTER ONE

AIM OF THE STUDY OBJECTIVE

The overall goal of the research is to:

  1. Determine the level of awareness of university administration about cybercrime among University of Ilorin students.
  2. Determine the level of involvement of the university administration in the fight against cybercrime among University of Ilorin students.
  3. Determine how cybercrime among University of Ilorin students can be curbed by the university administration.

CHAPTER TWO

REVIEWDED OF RELATED MATERIAL

CONCEPT OF CYBERCRIME

Cybercrime refers to criminal activities that are committed using digital devices or the internet. It encompasses a wide range of illegal activities, including hacking, phishing, identity theft, cyberbullying, online fraud, and the distribution of illegal content such as pirated software, movies, and music.

The growth of the internet and digital technologies has revolutionized the way people communicate, work, and conduct business. However, this growth has also created new opportunities for cybercriminals to exploit vulnerabilities in digital systems and steal sensitive information.

One of the biggest challenges of cybercrime is the difficulty of detecting and prosecuting offenders. Cybercriminals can operate from anywhere in the world, using anonymizing tools and encryption to conceal their identities and activities. Moreover, the sheer volume of data generated by digital systems makes it difficult to identify and investigate cybercrime cases.

Cybercrime poses a significant threat to individuals, businesses, and governments. For individuals, cybercrime can result in financial losses, identity theft, and reputational damage. Businesses can suffer from data breaches, financial fraud, and loss of intellectual property. Governments can be targets of cyber attacks that compromise national security or disrupt critical infrastructure.

To prevent cybercrime, individuals and organizations should take measures to protect their digital systems and data. This includes using strong passwords, regularly updating software and security systems, and avoiding suspicious emails and links. Governments and law enforcement agencies can also play a role in preventing cybercrime by developing and enforcing laws and regulations that deter cybercriminals and hold them accountable for their actions.

cybercrime is a complex and rapidly evolving phenomenon that requires a coordinated response from individuals, organizations, and governments. By understanding the risks and taking steps to protect themselves, individuals and organizations can help to reduce the threat of cybercrime and safeguard their digital systems and data.

level of awareness of university administration about cybercrime among University

The level of awareness of university administration about cybercrime varies among different universities. Some universities have a high level of awareness and have taken proactive measures to prevent cybercrime, while others may have a lower level of awareness and may not have implemented sufficient measures to protect against cyber threats.

Universities that have a high level of awareness of cybercrime have recognized the potential threats and risks that cybercrime poses to their operations, students, faculty, and staff. They have developed and implemented policies and procedures to mitigate these risks. Such policies may include requirements for regular cybersecurity training for staff and students, the use of strong passwords and multifactor authentication, regular software updates, and backups of critical data.

In addition to policies, universities with a high level of awareness of cybercrime may also have dedicated staff responsible for cybersecurity, such as a Chief Information Security Officer (CISO). The CISO is responsible for developing and implementing security policies and procedures, as well as overseeing the university’s cybersecurity program.

On the other hand, universities with a lower level of awareness of cybercrime may not have implemented sufficient measures to protect against cyber threats. These universities may lack the resources, budget, or expertise to effectively address cybersecurity risks. As a result, they may be more vulnerable to cyber attacks and data breaches.

The level of awareness of cybercrime among university administration varies among different universities. Universities that have a high level of awareness have recognized the potential threats and risks of cybercrime and have taken proactive measures to mitigate these risks. Universities with a lower level of awareness may be more vulnerable to cyber threats and may need to invest in cybersecurity measures to protect their operations, students, faculty, and staff.

 

CHAPTER THREE

RESEARCH METHODOLOGY

INTRODUCTION

In this chapter, we described the research procedure for this study. A research methodology is a research process adopted or employed to systematically and scientifically present the results of a study to the research audience viz. a vis, the study beneficiaries.

RESEARCH DESIGN

Research designs are perceived to be an overall strategy adopted by the researcher whereby different components of the study are integrated in a logical manner to effectively address a research problem. In this study, the researcher employed the survey research design. This is due to the nature of the study whereby the opinion and views of people are sampled. According to Singleton & Straits, (2009), Survey research can use quantitative research strategies (e.g., using questionnaires with numerically rated items), qualitative research strategies (e.g., using open-ended questions), or both strategies (i.e., mixed methods). As it is often used to describe and explore human behaviour, surveys are therefore frequently used in social and psychological research.

CHAPTER FOUR

DATA PRESENTATION AND ANALYSIS

INTRODUCTION

This chapter presents the analysis of data derived through the questionnaire and key informant interview administered on the respondents in the study area. The analysis and interpretation were derived from the findings of the study. The data analysis depicts the simple frequency and percentage of the respondents as well as interpretation of the information gathered. A total of eighty (80) questionnaires were administered to respondents of which only seventy-seven (77) were returned and validated. This was due to irregular, incomplete and inappropriate responses to some questionnaire. For this study a total of 77 was validated for the analysis.

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

Introduction

It is important to ascertain that the objective of this study was to ascertain the role of University management in the fight against cybercrime among students.. In the preceding chapter, the relevant data collected for this study were presented, critically analyzed and appropriate interpretation given. In this chapter, certain recommendations made which in the opinion of the researcher will be of benefits in addressing the challenges of the role of University management in the fight against cybercrime among students.

Summary

This study was on the role of University management in the fight against cybercrime among students. Three objectives were raised which included;   Determine the level of awareness of university administration about cybercrime among University of Ilorin students, determine the level of involvement of the university administration in the fight against cybercrime among University of Ilorin students and determine how cybercrime among University of Ilorin students can be curbed by the university administration. A total of 77 responses were received and validated from where the enrolled participants all respondents were drawn from selected residents in University of Ilori. Hypothesis was tested using Chi-Square statistical tool (SPSS).

 Conclusion

In conclusion, one of the developing problems of the Nigerian economy is cybercrime, and undergraduates constitute a large percentage of the population of people perpetrating this crime. Undergraduates across universities have turned cybercrime into a way of living. Resulting from this study, it is clear that undergraduates in Nigeria’s universities are becoming deeply involved in acts of cybercrime and some of them don’t even know the gravity of the offenses they are committing even though some do. The bitter truth is that if urgent actions are not taken towards curbing cybercrime in Nigeria’s universities, many undergraduates will turn cybercrime into a basic mode of living

Recommendation

  • Students in tertiary institutions should also abstain from any illegal or criminal acts while using the internet not to become criminals without even knowing.
  • University authorities should ensure that students are allowed to use the I.C.T facilities, with guidance from the I.C.T officials.
  • Management of universities should orientate students on safe and careful use of their phones, computers and the internet in general.
  • Authorities of Nigerian universities should encourage and impact entrepreneurial skills on their undergraduate students, whereby they can make money without getting involved in criminal activities.
  • The government should improve on measures of monitoring activities on the internet to reduce the way people engage in internet frauds and scam.

References

  • Adeniran, A. I. (2011). Café culture and heresy of yahooboyism in Nigeria.  Cyber criminology: Exploring Internet crimes and criminal behavior, 3-12. Retrieved on March 19, 2019 from https://bit.ly/2KWwdJh
  • Boniface, K. A., & Michael, K. A. (2014). Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria.  World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 8(9), 1582-1585. Retrieved on March 8, 2019 from https://bit.ly/2vfWfwp
  • Ewepu, G. (2016). Nigeria loses N127bn annually to cyber-crime. Retrieved Jun. 9, 2016 from https://bit.ly/2VaZns8
  • Sesan, G., Soremi, B., & Bankole, O. (2013). Economic cost of cybercrime in Nigeria. Cyber Stewards Network Project, Munk School of global affairs, University of Toronto. Retrieved on March 28, 2019 from https://bit.ly/2KVHYjl
  •  Frank, I., & Odunayo, E. (2013). Approach to cyber security issues in Nigeria: challenges and solution. International Journal of cognitive research in science, engineering and education, 1(1). Retrieved on April 22, 2019 from https://bit.ly/2IKnB5T
  •  Jackson, T.C. & Robert, W. E. (2016). Cybercrime and the challenges of socio-economic development In Nigeria. Journal of Research in National Development, 14(2).
  •  Jide, A. (2007). Fighting cybercrime in Nigeria. Retrieved on March 9, 2019 from https://bit.ly/2IKjgzz
  • Kamini, D. (2011). Cybercrime in the society: problems and preventions. Journal of Alternative Perspectives in the Social Sciences (2011) 3 (1) 240-259
  • Okanlawon, A. E., Abanikannda, M. O., & Yusuf, F. A. (2015). University students’ knowledge and attitude towards internet safety: a preliminary study.  Journal of Emerging Trends in Educational Research and Policy Studies,  6(3), 279-286. Retrieved on April 15, 2019 from https://bit.ly/2ve5QDY
  •  Sesan, G. (2010).The New Security War (online). Retrieved on April 9, 2019 from https://bit.ly/2VZX4Fh
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!