Sale!

impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)

The main of this work is to study the impact of mobile investigation on cybercrimes in Nigeria using EFCC investigation on hushpuppy cybercrime.

Original price was: ₦ 3,000.00.Current price is: ₦ 2,999.00.

Description

ABSTRACT

The advent of mobile Information and Communication Technology (ICT) has recorded a steady growth rate over the past decade but has however given way to something greater and a more alarming increase in the rate of internet insecurity and cybercrime in Nigeria. It is therefore no wonder that crimes like mail scams, phishing, identity theft and privacy intrusion among others are on the increase in the country. Although, some efforts have been made currently to reduce the incidence of these cybercrimes using mobile forensics. This study covers the impact of mobile information and communication technologies on cybercrime in Nigeria which relates to hushpuppy investigation. In this study, questionnaires were distributed to the staff of the EFCC for quick response. The gotten were used to determine the impact of mobile investigation on cybercrime of Hushpuppy.

Keywords: Cybercrime, Security, Mobile Devices, Intelligent, Investigatory, Hushpuppy.

 

TABLE OF CONTENT

TITLE PAGE

CERTIFICATION

DEDICATION

ACKNOWLEDGEMENT

ABSTRACT

TABLE OF CONTENT

CHAPTER ONE

1.0   INTRODUCTION                                                  

1.1   BACKGROUND OF THE STUDY

1.2   PROBLEM STATEMENT

1.3   AIM AND OBJECTIVES OF THE STUDY

1.4   SIGNIFICANCE OF THE STUDY

1.5   RESEARCH QUESTION

1.6    RESEARCH HYPOTHESIS

1.7    SCOPE AND LIMITATION OF THE STUDY

1.8    DEFINITION OF TERMS

CHAPTER TWO

LITERATURE REVIEW

  • CYBERCRIME GLOBAL OVERVIEW
  • CYBERCRIME IN NIGERIA
  • POLICING CYBERCRIME IN NIGERIA
  • TYPES AND DIMENSION OF CYBERCRIMES
  • CAUSES AND EFFECTS OF CYBERCRIME IN NIGERIA
  • GROWTH OF MOBILE ICT IN NIGERIA
  • THE CONTRIBUTION OF MOBILE DEVICES TO CYBER INSECURITY
  • CHALLENGES OF CYBER SECURITY PROVISIONING IN NIGERIA
  • SUGGESTED SOLUTION TO CYBERCRIME BY STAKEHOLDERS
  • CYBERCRIME IN SOCIAL MEDIA
  • ECONOMIC AND FINANCIAL CRIMES COMMISSION (EFCC)
  • FUNCTIONS OF THE EFCC

2.12.1  EFCC Mode of Operation

  • HUSHPUPPY AND HIS CRIME

CHAPTER THREE

METHODOLOGY

  • RESEARCH DESIGN
  • SOURCES OF DATA
  • AREA OF THE STUDY
  • POPULATION OF THE STUDY
  • DATA COLLECTION METHODS FOR RESEARCH
  • DETERMINATION OF SAMPLE SIZE AND TECHNIQUES
  • RELIABILITY OF THE RESEARCH INSTRUMENT
  • VALIDITY OF RESEARCH INSTRUMENT
  • TECHNIQUES FOR PROCESSING COLLECTED DATA

CHAPTER FOUR

  • RESULT
  • DISCUSSION

CHAPTER FIVE

  • CONCLUSION AND RECOMMENDATION

REFERENCES

 

CHAPTER ONE

1.0                                                            INTRODUCTION

1.1                                               BACKGROUND OF THE STUDY

Mobile investigations which is also known as mobile forensics is the branch of digital forensics or forensic science dealing with data acquisition from mobile phones or similar electronic devices like tablets, personal digital Assistant (PDA) or handheld PC and GPS devices for investigation purposes. Information and Communications Technology (ICT) is a term that summarizes the role of mobile communications networks and the integration of telecommunications (telephone lines and wireless signals), computers and all its form of networks as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information to meet day to day needs of the society.

A mobile device or mobile ICT basically describes a small, handheld computing device, typically having a display screen with a miniature keyboard and potable enough for users to carry with hands or conveniently kept in a pocket. They are also location independent. In other words their functionality is not confined to a specific geographical location. Nokia, LG, Motorola Mobility, BlackBerry, Samsung, and Apple are just a few examples of the many manufacturers producing these types of devices. A handheld computing device has an operating system (OS), and can run various types of application software, mostly called apps. Most handheld devices are also equipped with wireless fidelity (Wi-Fi), Bluetooth, and Geographic Positioning System (GPS) that can allow connections to the Internet and other Bluetooth enabled devices along with a stable battery power source. Mobile phones, Smartphones and PDAs are popular examples of these mobile devices. (Wikipedia)

Cybercrimes on the other hand can be defined as offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, or deny someone of what belongs to him/her, using modern telecommunication networks such as Internet and mobile phones. Such crimes may threaten a nation’s security and financial stability. Cybercrime can simply be explained as crimes carried out with the aid of a computer system against an individual, organization or a nation (Hassan et al., 2011).

The whole African continent is increasingly relying on new information technology and the internet with new media to conduct business, manage industrial activities, and engage in personal communication among other numerous benefits connecting us to the developed world. While these mobile technologies and devices allow for enormous gain in efficiency, productivity and communication, they also create a vulnerability to those who wish to and thrive in taking advantage of new situations.

The exponential growth of the internet and its global acceptance is generating increasing security threats. The cyber space creates unlimited opportunities for commercial, social, and, educational activities as well as a haven for societal miscreants to perpetrate their sinister acts. Technology is developing by leaps and bounds thereby making the internet easily accessible through various mobile devices including smartphones, tablets among others. Even the smallest phone is now internet enabled and thereby susceptible to internet crime or cybercrime.

This article therefore looks into the growth of mobile devices as well as the different cybercrime methods that have threatened the basic benefits of our ICT age. The approach used was to review related literatures on cybercrime in Nigeria, analyze the impact of the tremendous increase in mobile ICT on cybercrime, propose an intelligent cybercrime investigatory system framework and suggest various ways cybercrime can be controlled.

1.2                                                     PROBLEM STATEMENT

Undeniably, the policing of crime using the traditional Nigerian police have many limitations, and the integrity of the Nigerian police force has been eroded by its failure to perform its constitutional responsibilities to the society (Nwachukwu, 2012). Due to that, cybercrime has had a negative impact to the economy and reputation of the country as a haven of criminals. Ribadu (2007) argued that, cybercrime transaction worth £300 million, €200 million, and $500 million were stopped between 2003 and 2007, and recently it cost Nigerian consumers approximately $13.5 billion dollars in 2012 (Sesan et al., 2013). The problem of cybercrime in Nigeria is further compounded by the increased usage of the internet for fraudulent activities  and the lack of cyber user awareness, which makes internet users vulnerable to be exploited by criminals online (Kortjan et al., 2014). Even though, the Nigerian government have developed appropriate legal and institutional frameworks in securing the Nigerian cyberspace (Adomi et al., 2008), policing the cyberspace would require governments and legal systems to continuously adapt to new technologies and strategies in tackling cybercrime (Grabosky, 2001). Currently, there is a need for the Nigerian government to work together in strengthening the legal frameworks for cyber security, and also enforcing existing laws in order to reduce the impact of cybercrime in the society (Olusola et al., 2013).

1.3                                        AIM AND OBJECTIVES OF THE STUDY

The main of this work is to study the impact of mobile investigation on cybercrimes in Nigeria using EFCC investigation on hushpuppy cybercrime. The objectives of the study are:

  1. To ascertain the usefulness of mobile devices (ICT) in investigating cyber crime
  2. To determine the extent at which Crime Tracking Information System has been used in detecting crime in Nigeria.
  • To determine the extent by which mobile investigation has been used in carrying out hushpuppy cybercrime case.

1.4                                               SIGNIFICANCE OF THE STUDY

Mobile investigation helps in identifying potential suspects to increase investigators suspect base when no leads are evident. (Aquinas, 2012) The ability to access and process information quickly while displaying it in a spatial and visual medium allows agencies to allocate resources quickly and more effectively. In the ‘mission-critical’ nature of law enforcement, information about the location of a crime, incident, suspect, or victim is often crucial to determine the manner and size of the response.

1.5                                                      RESEARCH QUESTION

A number of research questions were developed based on the aim and objectives above and the literature review. The research questions are as follow:

  1. What are the causes of cyber security in Nigeria?
  2. Are Law Enforcement Agencies in Nigeria capable guardians in tackling cybercrime?
  3. To what extent are the current laws adequate in investigating cybercrime in Nigeria using mobile investigation techniques?
  4. How are the different definitions of cybercrime appropriate in understanding cybercrime in Nigeria?
  5. What improvements are needed in the EFCC in tackling cybercrime in Nigeria?

1.6                                                     RESEARCH HYPOTHESIS

Hi: There is a significant relationship between the introduction of information technology and the efficiency EFCC investigation in Nigeria.

H0: There is no significant relationship between the introduction of information technology and the efficiency EFCC investigation in Nigeria.

1.7                                     SCOPE AND LIMITATION OF THE STUDY

The research focuses on the activities of the activities EFCC in relation to other key stakeholders in the investigation of cybercrime. Embracing a classical criminological view of Routine Activity Theory (RAT), the research examined Advance Fee Fraud, a variant of cybercrime, in understanding the challenges and recommendations needed in the multi-national efforts to tackle cybercrime. Therefore, the scope of the research is limited to activities of EFCC investigating cyber-enabled crimes in Nigeria, a case study of Hushpuppy.

1.8                                DEFINITION OF TERMS

These terms were used throughout the research study and a detailed definition is provided below:

 Cybercrime

Cybercrime is defined as the use of electronic devices or computers via information systems to facilitate illegal activities (McQuade 2006, p. 2). The Association of Chief of Police Organisation (2009) defines cybercrime as “the use of networked computers or internet technology to commit or facilitate the commission of crime” (ACPO 2009).

 Cyber-Enabled Crime

Cyber-enabled crimes are ‘traditional crimes, which can be increased in their scale or reach by the use of computers, computer networks or other form of ICT’. Two published forms of cyber-enabled crime relate to fraud and theft (McGuire et al., 2013b)

Advance Fee Fraud

Advance Fee Fraud or ‘419’ fraud; a name coined from a section of the Nigerian Criminal Code is a prevalent crime within the West African organised criminal networks. There are many variations of the scheme and scams which is designed to persuade recipients/victims to part with their money (Stevens 2006).

Law Enforcement Agency

Law enforcement agency (LEA) is a government agency that is responsible for the enforcement of the laws. The powers exercised by law enforcement agencies include; exemption from laws, arrest and prosecution, legal deception, use of force and constraint of liberty, and jurisdiction override amongst others (Oxford Dictionary, 2016).

Reviews

There are no reviews yet.

Be the first to review “impact of mobile investigation on cyber crimes in nigeria (a case study of efcc hushpuppy investigation)”

Your email address will not be published. Required fields are marked *