IMPACT OF MOBILE INVESTIGATION ON CYBER CRIMES IN NIGERIA (A CASE STUDY OF EFCC HUSHPUPPY INVESTIGATION)
USER'S INSTRUCTIONS: The project work you are about to view is on "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)". Please, sit back and study the below research material carefully. This project topic (impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)) have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.
TITLE PAGE
BY
---
--/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---
DECEMBER,2018
APPROVAL PAGE
This is to certify that the research work, "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" by ---, Reg. No. --/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.
By
--- . ---
Supervisor Head of Department.
Signature………………. Signature……………….
……………………………….
---
External Invigilator
DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.
ACKNOWLEDGEMENT
The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.
PROJECT DESCRIPTION: This work "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" visible for everyone, then the complete material on "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" is to be ordered for. Happy viewing!!!
The advent of mobile Information and Communication Technology (ICT) has recorded a steady growth rate over the past decade but has however given way to something greater and a more alarming increase in the rate of internet insecurity and cybercrime in Nigeria. It is therefore no wonder that crimes like mail scams, phishing, identity theft and privacy intrusion among others are on the increase in the country. Although, some efforts have been made currently to reduce the incidence of these cybercrimes using mobile forensics. This study covers the impact of mobile information and communication technologies on cybercrime in Nigeria which relates to hushpuppy investigation. In this study, questionnaires were distributed to the staff of the EFCC for quick response. The gotten were used to determine the impact of mobile investigation on cybercrime of Hushpuppy.
Keywords: Cybercrime, Security, Mobile Devices, Intelligent, Investigatory, Hushpuppy
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
1.2 PROBLEM STATEMENT
1.3 AIM AND OBJECTIVES OF THE STUDY
1.4 SIGNIFICANCE OF THE STUDY
1.5 RESEARCH QUESTION
1.6 RESEARCH HYPOTHESIS
1.7 SCOPE AND LIMITATION OF THE STUDY
1.8 DEFINITION OF TERMS
CHAPTER TWO
LITERATURE REVIEW
- CYBERCRIME GLOBAL OVERVIEW
- CYBERCRIME IN NIGERIA
- POLICING CYBERCRIME IN NIGERIA
- TYPES AND DIMENSION OF CYBERCRIMES
- CAUSES AND EFFECTS OF CYBERCRIME IN NIGERIA
- GROWTH OF MOBILE ICT IN NIGERIA
- THE CONTRIBUTION OF MOBILE DEVICES TO CYBER INSECURITY
- CHALLENGES OF CYBER SECURITY PROVISIONING IN NIGERIA
- SUGGESTED SOLUTION TO CYBERCRIME BY STAKEHOLDERS
- CYBERCRIME IN SOCIAL MEDIA
- ECONOMIC AND FINANCIAL CRIMES COMMISSION (EFCC)
- FUNCTIONS OF THE EFCC
2.12.1 EFCC Mode of Operation
- HUSHPUPPY AND HIS CRIME
CHAPTER THREE
METHODOLOGY
- RESEARCH DESIGN
- SOURCES OF DATA
- AREA OF THE STUDY
- POPULATION OF THE STUDY
- DATA COLLECTION METHODS FOR RESEARCH
- DETERMINATION OF SAMPLE SIZE AND TECHNIQUES
- RELIABILITY OF THE RESEARCH INSTRUMENT
- VALIDITY OF RESEARCH INSTRUMENT
- TECHNIQUES FOR PROCESSING COLLECTED DATA
CHAPTER FOUR
- RESULT
- DISCUSSION
CHAPTER FIVE
- CONCLUSION AND RECOMMENDATION
REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Mobile investigations which is also known as mobile forensics is the branch of digital forensics or forensic science dealing with data acquisition from mobile phones or similar electronic devices like tablets, personal digital Assistant (PDA) or handheld PC and GPS devices for investigation purposes. Information and Communications Technology (ICT) is a term that summarizes the role of mobile communications networks and the integration of telecommunications (telephone lines and wireless signals), computers and all its form of networks as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information to meet day to day needs of the society.
A mobile device or mobile ICT basically describes a small, handheld computing device, typically having a display screen with a miniature keyboard and potable enough for users to carry with hands or conveniently kept in a pocket. They are also location independent. In other words their functionality is not confined to a specific geographical location. Nokia, LG, Motorola Mobility, BlackBerry, Samsung, and Apple are just a few examples of the many manufacturers producing these types of devices. A handheld computing device has an operating system (OS), and can run various types of application software, mostly called apps. Most handheld devices are also equipped with wireless fidelity (Wi-Fi), Bluetooth, and Geographic Positioning System (GPS) that can allow connections to the Internet and other Bluetooth enabled devices along with a stable battery power source. Mobile phones, Smartphones and PDAs are popular examples of these mobile devices. (Wikipedia)
Cybercrimes on the other hand can be defined as offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, or deny someone of what belongs to him/her, using modern telecommunication networks such as Internet and mobile phones. Such crimes may threaten a nation’s security and financial stability. Cybercrime can simply be explained as crimes carried out with the aid of a computer system against an individual, organization or a nation (Hassan et al., 2011).
The whole African continent is increasingly relying on new information technology and the internet with new media to conduct business, manage industrial activities, and engage in personal communication among other numerous benefits connecting us to the developed world. While these mobile technologies and devices allow for enormous gain in efficiency, productivity and communication, they also create a vulnerability to those who wish to and thrive in taking advantage of new situations.
The exponential growth of the internet and its global acceptance is generating increasing security threats. The cyber space creates unlimited opportunities for commercial, social, and, educational activities as well as a haven for societal miscreants to perpetrate their sinister acts. Technology is developing by leaps and bounds thereby making the internet easily accessible through various mobile devices including smartphones, tablets among others. Even the smallest phone is now internet enabled and thereby susceptible to internet crime or cybercrime.
This article therefore looks into the growth of mobile devices as well as the different cybercrime methods that have threatened the basic benefits of our ICT age. The approach used was to review related literatures on cybercrime in Nigeria, analyze the impact of the tremendous increase in mobile ICT on cybercrime, propose an intelligent cybercrime investigatory system framework and suggest various ways cybercrime can be controlled.
1.2 PROBLEM STATEMENT
Undeniably, the policing of crime using the traditional Nigerian police have many limitations, and the integrity of the Nigerian police force has been eroded by its failure to perform its constitutional responsibilities to the society (Nwachukwu, 2012). Due to that, cybercrime has had a negative impact to the economy and reputation of the country as a haven of criminals. Ribadu (2007) argued that, cybercrime transaction worth £300 million, €200 million, and $500 million were stopped between 2003 and 2007, and recently it cost Nigerian consumers approximately $13.5 billion dollars in 2012 (Sesan et al., 2013). The problem of cybercrime in Nigeria is further compounded by the increased usage of the internet for fraudulent activities and the lack of cyber user awareness, which makes internet users vulnerable to be exploited by criminals online (Kortjan et al., 2014). Even though, the Nigerian government have developed appropriate legal and institutional frameworks in securing the Nigerian cyberspace (Adomi et al., 2008), policing the cyberspace would require governments and legal systems to continuously adapt to new technologies and strategies in tackling cybercrime (Grabosky, 2001). Currently, there is a need for the Nigerian government to work together in strengthening the legal frameworks for cyber security, and also enforcing existing laws in order to reduce the impact of cybercrime in the society (Olusola et al., 2013).
1.3 AIM AND OBJECTIVES OF THE STUDY
The main of this work is to study the impact of mobile investigation on cybercrimes in Nigeria using EFCC investigation on hushpuppy cybercrime. The objectives of the study are:
- To ascertain the usefulness of mobile devices (ICT) in investigating cyber crime
- To determine the extent at which Crime Tracking Information System has been used in detecting crime in Nigeria.
- To determine the extent by which mobile investigation has been used in carrying out hushpuppy cybercrime case.
1.4 SIGNIFICANCE OF THE STUDY
Mobile investigation helps in identifying potential suspects to increase investigators suspect base when no leads are evident. (Aquinas, 2012) The ability to access and process information quickly while displaying it in a spatial and visual medium allows agencies to allocate resources quickly and more effectively. In the ‘mission-critical’ nature of law enforcement, information about the location of a crime, incident, suspect, or victim is often crucial to determine the manner and size of the response.
1.5 RESEARCH QUESTION
A number of research questions were developed based on the aim and objectives above and the literature review. The research questions are as follow:
- What are the causes of cyber security in Nigeria?
- Are Law Enforcement Agencies in Nigeria capable guardians in tackling cybercrime?
- To what extent are the current laws adequate in investigating cybercrime in Nigeria using mobile investigation techniques?
- How are the different definitions of cybercrime appropriate in understanding cybercrime in Nigeria?
- What improvements are needed in the EFCC in tackling cybercrime in Nigeria?
1.6 RESEARCH HYPOTHESIS
Hi: There is a significant relationship between the introduction of information technology and the efficiency EFCC investigation in Nigeria.
H0: There is no significant relationship between the introduction of information technology and the efficiency EFCC investigation in Nigeria.
1.7 SCOPE AND LIMITATION OF THE STUDY
The research focuses on the activities of the activities EFCC in relation to other key stakeholders in the investigation of cybercrime. Embracing a classical criminological view of Routine Activity Theory (RAT), the research examined Advance Fee Fraud, a variant of cybercrime, in understanding the challenges and recommendations needed in the multi-national efforts to tackle cybercrime. Therefore, the scope of the research is limited to activities of EFCC investigating cyber-enabled crimes in Nigeria, a case study of Hushpuppy.
1.8 DEFINITION OF TERMS
These terms were used throughout the research study and a detailed definition is provided below:
Cybercrime
Cybercrime is defined as the use of electronic devices or computers via information systems to facilitate illegal activities (McQuade 2006, p. 2). The Association of Chief of Police Organisation (2009) defines cybercrime as “the use of networked computers or internet technology to commit or facilitate the commission of crime” (ACPO 2009).
Cyber-Enabled Crime
Cyber-enabled crimes are ‘traditional crimes, which can be increased in their scale or reach by the use of computers, computer networks or other form of ICT’. Two published forms of cyber-enabled crime relate to fraud and theft (McGuire et al., 2013b)
Advance Fee Fraud
Advance Fee Fraud or ‘419’ fraud; a name coined from a section of the Nigerian Criminal Code is a prevalent crime within the West African organised criminal networks. There are many variations of the scheme and scams which is designed to persuade recipients/victims to part with their money (Stevens 2006).
Law Enforcement Agency
Law enforcement agency (LEA) is a government agency that is responsible for the enforcement of the laws. The powers exercised by law enforcement agencies include; exemption from laws, arrest and prosecution, legal deception, use of force and constraint of liberty, and jurisdiction override amongst others (Oxford Dictionary, 2016).
CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" is also available. Order full work to download. Chapter two of "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" consists of the literature review. In this chapter all the related works on "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" were reviewed.
CHAPTER THREE: The complete chapter three of "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" of an automated light system using photo-sensitive switch" is available. Order full work to download. Chapter three of "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.
CHAPTER FOUR: The complete chapter four of "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" is available. Order full work to download. Chapter four of "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" consists of all the test conducted during the work and the result gotten after the whole work
CHAPTER FIVE: The complete chapter five of "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" is available. Order full work to download. Chapter five of "impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)" consist of conclusion, recommendation and references.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
For more information contact us through any of the following means:
Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]
Email address :engr4project@gmail.com
COUNTRIES THAT FOUND OUR SERVICES USEFUL
Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124
Watsapp No :+2348146561114
Email Address :engr4project@gmail.com
FOLLOW / VISIT US VIA: