CHAPTER ONE
INTRODUCTION
BACKGROUND OF THE STUDY
Cyber crime all originated with bitter employees causing physical damage to the computers they worked with, with the objective to get back at their superiors. As the ability to have personal computers at home became more accessible and popular, cyber criminals began to focus their efforts on home users. Further research on this subject matter reveals that history of cybercrime was further established that the first published report of cybercrime in Nigeria occurred in the 1960s, when computers were large mainframe systems. Since mainframes were not connected with other ones and only the wealthy and influential people can have access to them, the cybercrimes were always "insider" cybercrimes, which means employment, allowed them to access into mainframe computers, and then refers to as computer crime rather than cybercrime. Actually, in the 1960s and 1970s, the cybercrime, which was "computer crime" in fact, was different from the cybercrime we faced with today, because availability of Internet was restricted within some sectors like the military in that dispensation. In the following decades, the increasing of computer network and personal computers metamorphosed "computer crime" into real cybercrime. In fact, the former descriptions were "computer crime", "computer-related crime" or "crime by computer". With the pervasion of digital technology, some new terms like "high-technology" or "information age" crime were added to the definition. Since the invention of the internet, other new terms, like "cybercrime" and "net" crime became a household name as people began to exchange information based on networks of computers, also keep data in computer rather than paper. At the same time, the cybercrime was not only restricted in target cybercrime, but expanded into tool cybercrime and computer incidental. We therefore come to terms with a conclusion on the meaning that cybercrime is an evil having its origin in the growing dependence on computers and related devices in modern life. A simple yet sturdy definition of cybercrime would be unlawful acts wherein the computer is either a tool or a target or both”. Defining cybercrimes as illegal behaviour directed by means of electronic operations that targets the security of computer systems and the data processed by them. Cybercrime in a broader sense computer-related crime: any illegal behaviour committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or network.
Meanwhile, in an attempt to uncover these crimes billions of Naira is lost through these crimes annually with little or no hope of curbing it due to its complex nature. Most perpetrators of this crime are never caught and if at all caught, are never prosecuted because of lack of concrete evidence, organizational and societal awareness. As a result the extent and impact of Cybercrime is uncertain because lack of reporting leads to uncertainty with regard to the extent and impact of the crime. This is especially relevant with regard to the involvement of these crimes as compared to other organized crimes. Available information from the crime statistics in Nigeria is lacking and if any, do not reflect the real extent or impact of this crime in our every-day living.
STATEMENT OF THE GENERAL PROBLEM
The current menace of cyber crime in Nigeria has witnessed an unprecedented rise among the youths this has regrettably been caused by a host of factors most notable unemployment; this has regrettably increased the insecurity challenge in Nigeria thus making it difficult to management these security challenges. Cyber crime has cost Nigeria more in terms of the economy as it has greeted a bad image for Nigeria in the diaspora coupled with the increase of insecurity which to some extent has hindered prospective investors and thus slowing down economic development and advancement.
PURPOSE OF THE STUDY
The major aim of the study is to examine information communication technology, cyber crime and the management of security challenges in Nigeria. Other objectives of the study include;
RESEARCH QUESTIONS
RESEARCH HYPOTHESIS
H0: There is no significant relationship between Information and Communication Technology and cyber crime in Nigeria.
H1: There is a significant relationship between Information and Communication Technology and cyber crime in Nigeria.
SIGNIFICANCE OF THE STUDY
The study would be of immense importance to government at all levels, security agencies and related stakeholders in improving national security. The study would also benefit students, researchers and scholars who are interested in developing further studies on the subject matter.
SCOPE AND LIMITATION OF THE STUDY
This study is restricted to ICT, cyber crime and the management of security challenges in Nigeria using EFCC Lagos state as a case study.
LIMITATION OF THE STUDY
Financial constraint- Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet, questionnaire and interview).
Time constraint- The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work.
Can't find what you are looking for?
Call (+234) 07030248044.
OTHER SIMILAR SECURITY MANAGEMENT PROJECTS AND MATERIALS