Project On Perception...
Project On Perception...
Project On Perception...
Introduction
Crime remains pervasive and forever strives to hide itself in the face of
development. As measures and techniques for detecting crimes and criminals
advance, criminals also look for means of hiding from these measures .
Nowadays, a huge part of the information present on the Web is delivered through
Social Media such as Twitter, Facebook, Instagram, etc., and User-Generated
Content (UGC) platforms, such as Quora, Wikipedia, YouTube, Yelp,
Slashdot.org, etc.
Social media today is one of the crux of today’s life. Virtually everyone Is
connected to one social media platform or the other. These identities created
Makes the world a global village and has been threatened by the emergence of
rampant cyber crimes today.
Obano (2017) asserts that the internet currently serve as a hiding place for
fraudsters who have simply migrated from the streets to an electronic
platform.
He further notes that when the cheques or money order are cashed, the
victim is told to send the money through Western Union Money transfer
in Nigeria, while in other cases, the victim is told to send the money to
another country where the yahooist has built networks over time.
The mode of money collection is usually dependent on the modus operandi the
yahooist uses. In similar vein, Alemika (2017) notes that in Nigeria today, cyber
crime has found its root in the society. Like a cankerworm it has eaten
deeply in the society and finally been accepted by the same society.
It is difficult to deny youth support of the menace with yahooze shirts,
yahooze dance steps, yahooze songs from the likes of Olu Maintain. Even some
young people identify themselves as yahoo boys and girls.
Nigeria is also rated amongst one of the most corrupt countries of the
world.
Internet and social media usage in Nigeria has grown rapidly resulting in the
explosion of Internet Service Providers (ISPS) and Internet Access Point creating
an increase in the positive impacts on the socio-economic and educational
developments in the country.
In Nigeria today, young people mostly youths are the ones who engage in this
form of anti-social behaviour for the purpose of living a life of splendour.
2. To assess the ways federal government can curb the continued spread of
cybercrime among Nigerian youths and the general public.
4. To find out if the social media is used as a channel for the perpetration of
criminal spamming activities.
2. What are the ways Federal Government can curb the continued spread of
cybercrime among Nigerian youth and the general public?
3. Is the internet used as a channel for the perpetration of criminal
spamming activities?
H3: the Federal Government can curb the continued spread of cybercrime among
Nigerian youths and the general public.
This report would be of great benefit for youths, to expose them to the
factors that tend to cause young people’s involvement in cybercrime in Nigeria.
It would be useful to the government and related stakeholders to enable
them adequately understand factors responsible for and how to curb
the continue spread of cybercrime among Nigerian youths [and the general
public].
The findings will be useful for researchers to further generate knowledge in the
field.
This research study perception of cyber-crime among the youths falls within the
self-perception theory.
Limitations to the study were: duration of the work is relatively short; stress from
other academic activities acted as a constraint and financial constraint.
Youth: It is when a young person is young especially the time before a child
becomes an adult.
Chapter Two
Literature Review
The central concept of the study was perception. Peoples’ reaction to a message
depends mainly on their perception of it. This has made perception a core
psychological field that draws more attention than other subject matters in
psychology. Although much work and studies have been done in the field,
psychologists are still unable to arrive at a commonly acceptable definition for
perception.
We can listen to two people talking about different things, but sooner or later, you
have to abandon one person to be able to listen to other, for you to understand
him/her thoroughly.
In giving clarity to perception, Dennis and Defleur (2011) observed that, when a
receiver perceives a word, he or she must identify the incoming pattern of physical
events known as language symbol rather than other types of event
Alfred and Anslem, identified the processes affecting perception in the following
variants.
Selectivity of perception: you see what you want to see while you neglect others.
Frequency of previous experiences with particular stimulus and responses, which
affects present stimuli.
Experience with stimuli and responses that have been positively or negatively
reinforced.
Folarin (2013) also noted that selective interpretation of a given message causes
an undue internal dissonance. That is, the receiver of the message may decide to
forget the message.
However, the image of an object varies from person to person. This is largely due
to the person’s beliefs, needs and past experiences with the object. Also, images
vary in their clarity and complexity. People at times, or have fuzzy or other related
impressions.
Various scholars have examined the term “perception. People perceive things in a
way that accord to their beliefs, interests, motives, needs and learning.
He further notes that cybercrimes are illegal activities perpetrated by one or more
people using the cyberspace through the medium of networked
computers, telephones and other information and communication technology
equipment. There is hardly any crime committed in the world today that does not
have cybercrimes undertone, because of high of dependence on modern
technology.
According to Oketola (2014) some young people use the web for
information on current issues in health, education, politics, researches,
sports, and for personal development as well as building skills. While others,
misuse it for unconstructive activities.
The following are some of the studies carried out on this Subject matter;
The whole business of this review has been to discuss some empirical studies and
postulations by scholars in various fields, to see if they would give a theoretical
backing to the study. The effort is meaningful, since most literature reviewed has
more or less, direct relationship with the study.
The review centered on the self- perception theory of mass communication, since
it has a direct bearing on the study which is,” perception of cybercrime among
Nigerian youths: a study of students of IMT Enugu” .The review pointed out that
individuals develop their attitudes by observing their behavior and concluding
what attitudes must have caused those responses.
Furthermore, it further stressed that individuals tend reasons their own overt
behaviors rationally in the way they attempt to explain other’s behaviors. It is very
evident in this review that there is a strong likelihood that individuals have
different perceptions of objects.
Chapter Three
Research Methodology
This chapter describes the methodology used in this research study. It describes
the method of research design, population sample and sampling technique,
instrumentation as well as the method of data collection and data analysis. This is
to ensure that the researcher’s work is authentic verifiable and error free.
The population of the study comprises of male and female students who reside in
the hostels of residence of IMT Enugu and off campus occupants. The population
is nineteen thousand eight hundred and fifty (19,850).
In order to get the sample size for the study, the Taro Yamane formular was used.
Taro Yamane is presented as follows:
N
n = 1+ N ¿ ¿
Where,
N= Population (19,850)
N
n= 1+ N (e) ²
n = 19850
1 + 19850(0.05)2
n = 19850
1 + 19850(0.0025)
n = 19850
1 + 49.625
n = 19850
50.625
n = 392.1 ≈ 392
The research instruments were developed by the researcher. The instruments were
handed over to test experts for corrections. The validity of the instruments was
ascertained through this process.
The major techniques that will be used in data analysis shall be the chi- square
(x2) statistical analysis, which is aimed at establishing any significant difference
that might exist among respondent’s frequencies. Chi-square is a non- parametric
statistical tool which can conveniently be used in testing hypotheses when dealing
with contented data. Chi-square formular is presented as follows:
X2=∑
∑ = Summation
O= Observed frequency
e= expected frequency