ABSTRACT
This study investigated the use of information and Communication Technology (ICT) and its impact in tackling cybercrimes in Nigeria as a case study. In order to achieve the purpose of this study, questionnaire was used to elicit information from the respondents. The sample size for the study is one hundred and five (105), which was selected from amongst staff of the Economic and financial Crime Commission (EFCC), Kwara State headquarters. The data collected were critically analyzed and the major findings revealed the following: that yahoo attack (also called 419) and hacking are the most prevalent cybercrimes in Nigeria, that financial losses and dent of Nigeria’s international image are the major impacts of cybercrime in Nigeria, that unemployment and quest for wealth are the major cause of cybercrimes in Nigeria and that ICT has helped in enhancing intelligence gathering among security agencies in tackling cyber crimes in Nigeria.. Finally, recommendations were made that control measures should be adopted by the various agencies concerned in order to curb cybercrimes in Nigeria. .It is hoped that the findings in this research work would help in curbing the problems of crime in Nigeria. The study would also help to stimulate further research in this area.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
INTRODUCTION
- BACKGROUND TO THE STUDY
- STATEMENT OF THE PROBLEM
- AIM AND OBJECTIVES OF THE STUDY
- RESEARCH QUESTIONS
- HYPOTHESIS
- SIGNIFICANCE OF THE STUDY
CHAPTER TWO
LITERATURE REVIEW
- OVERVIEW OF THE STUDY
- CONCEPTUAL REVIEW
2.2. Information and Communication Technology (ICT)
- ICT COMPETENCE AND INFLUENCE ON CYBERCRIME
- THEORETICAL REVIEW
- EMERGING CYBER TRICKS IN NIGERIA
- CHALLENGES OF CYBERCRIME
- COMPLEXITIES OF CYBERCRIME
- EFFECTS OF CYBER CRIME
- SOLUTIONS TO CYBERCRIME
CHAPTER THREE
METHODOLOGY
- POPULATION OF STUDY
- SAMPLE SIZE AND SAMPLING TECHNIQUE
- INSTRUMENTATION
- VALIDITY AND RELIABILITY OF THE INSTRUMENT
- METHOD OF ADMINISTRATION OF INSTRUMENT
- METHOD OF DATA ANALYSIS
CHAPTER FOUR
- DATA PRESENTATION AND ANALYSIS
- DISCUSSION OF FINDINGS
CHAPTER FIVE
- SUMMARY CONCLUSION AND RECOMMENDATIONS
- SUMMARY
- CONCLUSION
- RECOMMENDATION
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND TO THE STUDY
The advent of digital technology gave birth to modern communication hardwares, internet service and powerful computer systems to process data (Hunda, Singh & Singh. 2014). Society’s reliance on computer system has a profound human dimension. In recent years, computers and sharing of information have penetrated nearly every aspect of human life and offers gargantuan benefits to the society (Olumoye, 2013). This has also presented plenty of opportunities for anti-social and criminal behaviour in non-traditional ways. The rapid expression of large-scale computer networks with the ability to access many systems through regular telecommunication lines increase the vulnerability of these systems and the opportunity for misuse or criminal activity.
Cybercrime is any criminal offenses committed using the internet or another computer network as a component of the crime. They are offences that are committed against individual or group of individuals with a criminal motive to internationally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly using modern telecommunication networks such as internet and mobile phones (Akogwu, 2012).
Cybercrime is ever becoming prevalent in developing countries. In Nigeria, for example, the cyber criminals are being nick named the “yahoo boys”. However, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to valuable information (McConnell, 2010). Herselman and Warren (2013) sermonized that cybercrime has no borders or physical boundaries, it is also not subject to importation, customs or forex constraints thus making it a target by anyone from anywhere in the world (Herselman& Warren, 2013). Estimating the incidence, prevalence cost or some other measures of computer related crimes is a very difficult task because cybercrime cannot be quantified unlike some other criminal acts such as theft. This is also due to the fact that most critical crimes perpetuated are not detected, not even by their victims because disclosure of such crime could prove embarrassing or inconveniencing to victims.
Hence, new technologies to fight these types of attacks are on their way, but there is need to be proper laws, policies and methods of actually catching the perpetrators and making them pay for the damage they cause (Albrecht, 2015). Consequently, it become imperative to keep pace in tracking down computer related illegalities through policies, updated laws and methods of actually holding the perpetrators and making them to face the wrath of the law in order to protect the computer systems, networks and the data stored on them. Therefore, this study is aimed at investigating information and communication technology (ICT) use in combating cybercrimes in Nigeria as a case study.
1.2 STATEMENT OF THE PROBLEM
Over the past decades, the growth of the internet and its use afforded everyone the opportunity to make use of the technology. However, information technology revolution associated with the internet has brought about two edge functions: that is on one hand, it has contributed positive values to the world. While on the other hand, it has produced so many maladies that threaten the order of the society and also producing a new wave of crime to the world. Advancement in technology has also benefitted criminals by providing sophisticated tools and making networked-crime possible in the society.
Given the failed security system in most developing countries (Nigeria inclusive), this new wave of crime has so far eluded the intelligence of responsible agencies given its unusual nature. Hence, the need for the adoption of new technologies in tackling this new wave of crime has become imperative. Hence, this study intends to examine the use of Information and Communication Technology (ICT) in tackling Cybercrime In Nigeria.
1.3 AIM AND OBJECTIVES OF THE STUDY
The main purpose of the study is to investigate information and communication technology (ICT) use in tackling cybercrimes in Nigeria. The specific objectives of the study are to;
- Identify the various types of cybercrimes most prevalent in Nigeria.
- Examine the effect of cybercrimes and technology misuse on the development of Nigeria.
- Investigate the causes of cybercrimes prevalence in Nigeria
- Assess the role of ICT in curbing cybercrimes in Nigeria
1.4 RESEARCH QUESTIONS
The following research questions were put forward to guide the study;
- What are the various types of cybercrimes most prevalent in Nigeria?
- What are the effects of cybercrimes and technology misuse on the development of Nigeria?
- What are the causes of cybercrimes prevalence in in Nigeria?
- What ways has ICT helped in curbing cybercrime in Nigeria?
1.5 RESEARCH HYPOTHESIS
HO: Information Communication Technology tools donot tackle cybercrime
Hi: Information and Communication Technology tools do tackle cybercrime
1.6 SIGNIFICANCE OF THE STUDY
The study has both theoretical and practical significance.
Theoretically, it will add to existing research works and literatures to be used for educational purposes. Hence, it will serve as a databank for any student (or researcher) carrying out a study related to the subject matter. Also, the research findings could lead to further research.
Practically, the study will be useful to relevant security agencies in Nigeria by identifying new technologies and ways of using ICT to detect crimes and enhance security in Nigeria. The study will be useful to security agencies in policing by exposing new technologies that can be used to detect cyber criminal activities in Nigeria. By employing the use of ICT for crime detection and security, more criminals will easily be detected and caught.
To the society in general which is the potential victims of uncontrolled crimes, the information obtained from the study will create a consciousness of concerted effort towards a safer society.
1.7 SCOPE OF THE STUDY
This study focused on “ Tackling Cybercrime In Nigeria Using Information & Communication Technology As A Key”. However, the researcher is very much constrained by time and resources to confine the study to staff of the Economic and Financial Crimes Commission (EFCC) Kwara State Headquarters because they are majorly concerned with the issue of crime in Nigeria and are more easily accessible to the researcher. Recommendations are made on how to use ICT tools to detect cybercrimes and improve the security environment in Nigeria.
CHAPTER FIVE
Summary and Conclusion
As the general population becomes increasingly refined in their understanding and use of computers and as the technologies associated with computing become more powerful, there is a strong possibility that cybercrimes will become more common. Nigeria is rated as one of the countries with the highest levels of e-crime activities. Cyber security must be addressed seriously as it is affecting the image of the country in the outside world. A combination of sound technical measures tailored to the origin of Spam (the sending ends) in conjunction with legal deterrents will be a good start in the war against cyber criminals. Information attacks can be launched by anyone, from anywhere. The attackers can operate without detection for years and can remain hidden from any counter measures”. This indeed emphasizes the need for the government security agencies to note that there is need to keep up with technological and security advancements. It will always be a losing battle if security professionals are miles behind the cyber criminals.
The findings of this study revealed that ICT tools tackle cyber criminality as those with massive ICT skills, instead of using it for genuine purposes, rather engage in fraudulent activities. This finding corroborates that of Okeshola and Adeta (2013), who found that cybercriminals are very competent and skilful in perpetrating their acts. Okeshola and Adeta further point to the fact that, because of their competence and skills, cybercriminals can design mathematical model using Tree diagram (a statistical tool) to link with their victims account, and the tree diagram keeps checking and checking until it gets the combination of the account pin number and also develop and use kernel level root kits software that gives them a backdoor and assist to cover their presence in individuals’ computer. With this, they can do any harm without individual’s notice.
The contribution of Information and Communication Technology (ICT) to the economic development of Nigeria has been marred by the evolution of new crime wave called cybercrime. Residents of these cities in the six geo-political zones of Nigeria have not fully embraced e-banking and commerce because of the flip side of ICT. One still wonder how the proposed cashless economy policy by the Central Bank of Nigeria (CBN) will work. Information and Communication Technology has become a medium where the most lucrative and safest crimes thrive. According to Okeshola and Adeta (2013), perpetrators of cybercrimes usually take advantage of e-commerce system to defraud unsuspecting victims.
Even though, cybercrime is a menace that is not affecting Nigeria alone, but the whole World, concerted effort have to be put in place to ensure a safe, secure and trustworthy ICT environment. It is therefore crucial for the suggestions of this study to be followed vehemently in order to curb cyber criminality in our society.
Recommendations
In accordance with the findings of this study, the following recommendations are put forward to curb the menace of cybercrime in our society;
- Fighting cybercrime requires a holistic approach to combat this menace in all ramifications. There is need to create a security-aware culture involving the public, the ISPs, cybercafés, government, security agencies and internet users. Also in terms of strategy, it is crucial to thoroughly address issues relating to enforcement.
- Government should harness and commit ICT competent youths into gainful ventures in order to reap from their massive skills and take them off cyber criminality.
- Nigeria should have a functional national database with bio-data of every citizen and immigrants in order to trace outlaws on cyberspace.
- Government should design programmes that will help to rehabilitate, reorient and streamline the training needs and facilities of our law enforcement agents on ICT skills and e-policing.
ICT As A Tool For Tackling Cybercrime In Nigeria. (n.d.). UniTopics. https://www.unitopics.com/project/material/ict-as-a-tool-for-tackling-cybercrime/
“ICT As A Tool For Tackling Cybercrime In Nigeria.” UniTopics, https://www.unitopics.com/project/material/ict-as-a-tool-for-tackling-cybercrime/. Accessed 25 November 2024.
“ICT As A Tool For Tackling Cybercrime In Nigeria.” UniTopics, Accessed November 25, 2024. https://www.unitopics.com/project/material/ict-as-a-tool-for-tackling-cybercrime/
Here’s a typical structure for ICT As A Tool For Tackling Cybercrime In Nigeria research projects:
- The title page of ICT As A Tool For Tackling Cybercrime In Nigeria should include the project title, your name, institution, and date.
- The abstract of ICT As A Tool For Tackling Cybercrime In Nigeria should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
- The introduction of ICT As A Tool For Tackling Cybercrime In Nigeria should provide the background information, outline the research problem, and state the objectives and significance of the study.
- Review existing research related to ICT As A Tool For Tackling Cybercrime In Nigeria, identifying gaps the study aims to fill.
- The methodology section of ICT As A Tool For Tackling Cybercrime In Nigeria should describe the research design, data collection methods, and analytical techniques used.
- Present the findings of the ICT As A Tool For Tackling Cybercrime In Nigeria research study using tables, charts, and graphs to illustrate key points.
- Interpret ICT As A Tool For Tackling Cybercrime In Nigeria results, discussing their implications, limitations, and potential areas for future research.
- Summarize the main findings of the ICT As A Tool For Tackling Cybercrime In Nigeria study and restate its significance.
- List all the sources you cited in ICT As A Tool For Tackling Cybercrime In Nigeria project, following a specific citation style (e.g., APA, MLA, Chicago).