Perception of Cybercrime Among Nigerian Youths

Download as pdf or txt
Download as pdf or txt
You are on page 1of 47

PERCEPTION OF CYBERCRIME AMONG NIGERIAN YOUTHS

(A STUDY OF CARITAS UNIVERSITY)

BY

UMEOZULU FRANCES
MC/2008/ 325

DEPARTMENT OF MASS COMMUNICATION


FACULTY OF MANAGEMENT AND MANAGEMENT AND SOCIAL
SCIENCES
CARITAS UNIVERSITY, AMORJI- NIKE
ENUGU STATE

AUGUST, 2012
PERCEPTION OF CYBERCRIME AMONG NIGERIAN YOUTHS

(A STUDY OF CARITAS UNIVERSITY)

BY

UMEOZULU FRANCES
MC/2008/325

DEPARTMENT OF MASS COMMUNICATION


FACULTY OF MANAGEMENT AND SOCIAL SCIENCES
CARITAS UNIVERSITY, AMORJI- NIKE
ENUGU STATE

AUGUST, 2012
TITLE PAGE

PERCEPTION OF CYBERCRIME AMONG NIGERIAN YOUTHS


(A STUDY OF CARITAS UNIVERSITY)

BY

UMEOZULU FRANCES
MC/2008/ 325

A RESEARCH PROJECT SUMMITTED TO


THE DEPARTMENT OF MASS COMMUNICATION
FACULTY OF MANAGEMENT AND SOCIAL SCIENCES
CARITAS UNIVERSITY, AMORJI- NIKE
ENUGU

IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR


THE AWARD OF BACHELOR OF SCIENCE [B.Sc] DEGREE IN MASS
COMMUNICATION

AUGUST, 2012
CERTIFICATION
This is to certify that this project has been read and graded in partial
fulfillment of the requirements for the award of Bachelor of Science (B.Sc) Degree
in mass communication Caritas University, Amorji- Nike, Enugu, Enugu State

____________________ _____________________

Mrs. Justina Obi. Dr. Acholonu Reginald.

Project supervisor Head of department

_________________ ___________________
Date Date

_______________________
External Examiner

________________
Date
DEDICATION

This research work is dedicated to God, the Father of all men for bringing
me to a successful completion of this work, God the Son who made me his friend
and exchanged my worries and difficulties with his glory, God the Holy Spirit for
the comfort and innermost peace with which he sustained me all through the
duration of the programme.
ACKNOLEDGEMENTS
My profound gratitude goes to God, the giver of all life and wisdom, and to

our blessed mother Mary, mother of perpetual help.


My immense regards go to my supervisor a mother and a friend indeed,
Tina Obi, who despite her tight schedules made out time to go through this work,
and the necessary corrections. May the Lord bless you. My regards also go to my
worthy lecturers Dr. Acholonu Reginald, Abgoeze Damian U, Obasi Ferdinand,
Ugwuanyi Felix and Benson- Eluwa V, Edeh Jude, Nwonu Clifford and Ukaegbu
Francis whose intellectual prowess has helped in sharpening and widening my
intellectual horizon. I thank you.

My sincere thanks go to my ever loving and caring parents Mr. and Mrs.
A.A. Umeozulu, whose love for education above all things brought me this far. I
couldn’t have wished for better parents and also to the Iworah’s - Mrs Vivian
Iworah and her children: Micheal, Josemariah and Judemary for their support and
words of encouragement. You guys are the best I ever had.

My sincere regards goes to my siblings: Sandra, Anthony, Cynthia, Kelvin


and Kenneth. I thank God for you guys and for your presence in my life. May God
keep blessing you with everything good. Also to my wonderful uncles Mr Emejulu
and Mr George, through whose help I was able to embark on this work.

My thanks go to my beloved friend- Iworah Bryan and my friends and


roommates –Chiamaka, Regina, Acceptance, Ijeoma, Chika, Magdalene, Nnoso,
Success your presence in my life made my stay worthwhile. May God bless
you all and shower you with his blessings as long as you live Amen.
Abstract

The aim of this study was to examine the perception of cybercrime among
Nigerian youths using Caritas University as a study. In this research study, we
found out people’s reaction to messages depends mainly on how it is perceived.
To achieve the aim o the study, literature was reviewed. Survey research method
was used in which questionnaire, the major instrument, was distributed to
various respondents in the execution of the study. Samples were selected using
the systematic random sampling techniques. Chi-square and simple percentages
was used in analyzing data. Internet is used as a channel for the perpetration of
criminal spamming activities was the finding drawn. Finally, Cyber laws should be
made to govern the country’s cyber space and give the nation’s adequate cyber
security was the recommendation gotten based on the finding drawn.
TABLE OF CONTENTS

Title page

Certification

Dedication

Acknowledgements

Table of contents

Abstract

CHAPTER ONE: INTRODUCTION

1.1 Background of the study


1.2 Statement of research problems
1.3 Purpose of study
1.4 Objectives of the study
1.5 Research questions
1.6 Research hypotheses
1.7 Significance of the study
1.8 Scope and limitation of the study
1.9 Assumptions of the study
1.10 Definition of terms

CHAPTER TWO: REVIEW OF LITERATURE


2.1 Sources of literature
2.2 Review of relevant literature
2.3 Theoretical framework
2.4 Summary of literature

CHAPTER THREE: METHODOLOGY


3.1 Research Design
3.2 Area of study
3.3 Population of study
3.4 Research sampling techniques and sample size
3.5 Instrument for data collection
3.6 Validity of the instrument
3.7 Method of data collection
3.8 Method of data analysis

CHAPTER FOUR: DATA PRESENTATION AND ANALYSIS OF DATA


4.1 Data presentation and analysis
4.2 Hypotheses testing
4.3 Discussion on findings

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATIONS


FOR FURTHER STUDY
5.1 Summary
5.2 Conclusion
5.3 Recommendations for further study
References
Appendix I
Appendix II
CHAPTER ONE
INTRODUCTION

1.1 BACKGROUND OF STUDY

Crime remains pervasive and forever strives to hide itself in the face of
development. As measures and techniques for detecting crimes and criminals
advance, criminals also look for means of hiding from these measures.

Obano (2007:17) asserts that the internet currently serve as a hiding place
for fraudsters who have simply migrated from the streets to an electronic
platform.

Okonigini (2002:25) defines computer crime as criminal activities, involving


information technology infrastructure, including illegal access of computer data
from or within a computer.

Similarly, Asokhia (2003:49) asserts that cyber crime, popularly called


“YAHOO” is an off-shoot of advance fee fraud which became popular in the early
90s. Today, it has produced “YAHOO” as its first offspring with mostly young
people (most especially the unemployed) as its practitioners.

Different nations have adopted different strategies to contend with crimes


depending on their nature and extent. Certainly, a nation with high incidence of
crime cannot grow or develop. For Nigeria, a nation in the process of saving her
face regarding cyber crimes, efforts are now being directed at the sources and
channels through which cyber crimes are being perpetuated the most. [Chiemeke
(2008:32)].
Martins (2008:47) assert that “YAHOOISM” is an act of cyber crime that
defrauds unsuspecting victims in foreign countries of their hard-earned money. In
some instance, the unsuspecting victim is used to defraud banks, postal agencies,
shops, etc. the yahoos (perpetrator) sends fake cheque or postal money orders to
victims in any of the following countries: Canada, United States of America and
other European countries or Asia as the case may be.

He further notes that when the cheques or money order are cashed, the
victim is told to send the money through Western Union Money transfer in
Nigeria, while in other cases, the victim is told to send the money to another
country where the yahooist has built networks over time.

The mode of money collection is usually dependent on the modus operandi


the yahooist uses. In similar vein, Alemika (2007:15) notes that in Nigeria today,
cyber crime has found its root in the society. Like a cankerworm it has eaten
deeply in the society and finally been accepted by the same society.

It is difficult to deny youth support of the menace with yahooze shirts,


yahooze dance steps, yahooze songs from the likes of Olu Maintain. Even some
young people identify themselves as yahoo boys and girls.

Similarly, Martins (2008:43) notes that the paramount classification of


yahooism as a branch of cyber crime and transitional crime is not only expedient
in understanding its mystery, but propounding a lasting solution when
considering curbing the menace. Yahooism is the fastest growing transnational
crime in recent times, especially in Nigeria.
1.2 STATEMENT OF RESEARCH PROBLEM

Nigeria according to Wikipedia is said to be 7th largest oil producing country


in the world, but nevertheless, the majority of Nigerians are still living in poverty.

Nigeria is also rated amongst one of the most corrupt countries of the
world.

Internet usage in Nigeria has grown rapidly resulting in the explosion of


Internet Service Providers (ISPS) and Internet Access Point creating an increase in
the positive impacts on the socio-economic and educational developments in the
country.

Unfortunately, the country’s image has also suffered as a result of the


unscripted activities of some Nigerians using the internet as a channel for the
perpetration of criminal spamming activities.

The major implication of the unconscious acceptance of this menace in the


Nigerian society in the nearest future has created a high level of disinterest in
education and touting among young people.

In Nigeria today, young people mostly youths are the ones who engage in
this form of anti-social behaviour for the purpose of living a life of splendour.

In recent times Nigeria has been labelled as a corrupt nation. There is a


need for the Nigerian government to do something fast and urgent to curb this
menace of cyber crime.
1.3 PURPOSE OF STUDY

1. To determine the perception of Nigerian youths towards cybercrime.


2. To determine the reason why cybercrime is mostly rampant among
Nigerian youths.
3. To suggest measures that can be taken by the federal government to curb
cybercrime in Nigeria.

1.4 OBJECTIVES OF THE STUDY

1. To find out how Nigerian youths perceive cybercrime.


2. To assess the ways federal government can curb the continued spread
of cybercrime among Nigerian youths and the general public.
3. To ascertain the factors that tends to cause young people’s involvement
in cybercrime in Nigeria.
4. To find out if the internet is used as a channel for the perpetration of
criminal spamming activities.

1.5 RESEARCH QUESTIONS

1. In what way do Nigerian youths perceive cybercrime?

2. What are the ways Federal Government can curb the continued spread
of cybercrime among Nigerian youth and the general public?

3. Is the internet used as a channel for the perpetration of criminal


spamming activities?

4. What are the factors that tend to cause people’s involvement in


cybercrime in Nigeria?
1.6 RESEARCH HYPOTHESES

H0: internet is not used as a channel for the perpetration of criminal


spamming activities.

H1: internet is used as a channel for the perpetration of criminal spamming


activities.

H0: the Federal Government cannot curb the continued spread of


cybercrime among Nigerian youths and the general public.

H2: the Federal Government can curb the continued spread of cybercrime
among Nigerian youths and the general public.

1.7 SIGNIFICANCE OF THE STUDY

This study, which is primarily aimed at explaining how cybercrime has


impacted on the perception of youths in the society, will provide an insight
into the problems associated with cybercrime.

This report would be of great benefit for youths, to expose them to the
factors that tend to cause young people’s involvement in cybercrime in Nigeria.

It would be useful to the government and related stakeholders to enable


them adequately understand factors responsible for and how to curb the
continue spread of cybercrime among Nigerian youths [and the general public].

The findings will be useful for researchers to further generate knowledge in


the field.
1.8 SCOPE AND LIMITATION OF THE STUDY

This study focused on the perception of cybercrime among Nigerian youths,


using students in Caritas University as the study group.

A major limitation of the group is the samples were only from Caritas
University where it was chosen as the area in carrying out this research.

This finding is based on the results gathered from Caritas University


students on the perception of cybercrime among Nigerian youths.

1.9 ASSUMPTIONS OF THE STUDY

For the purpose of this study, the following assumptions were made:

1. It is assumed that Nigeria youths are aware of cybercrime.


2. That poverty is the major reason why youths engage in cybercrime in Nigeria.
3. That peer pressure contributes to the increase of cybercrime in Nigeria.
4. That Nigerian youth are educated on the use of the cyber all the time.

1.10 DEFINITION OF TERMS

OPERATIONAL DEFINITION OF TERMS

Perception: Caritas student’s attitude towards cybercrime among Nigerian


youths.
Cyber: The use of computers, information systems or the internet by the
Nigerian youths.

Crime: The display of illegal act characterized by decent, contentment or


violation of trust of the youths.

Youth: It is when a young person is young especially the time before a child
becomes an adult.
CHAPTER TWO

LITERATURE REVIEW

2.1 SOURCES OF LITREATURE

In the course of gathering materials for this review, the researcher made
extensive use of libraries, archives, media institutions and other relevant sources
of secondary data. This chapter focused on the concept of perception, its
measurement, and relationship with image, empirical studies and lastly the
theoretical framework.

2.2 REVIEW OF RELEVANT LITERATURE


2.2.1 THE CONCEPT OF PERCEPTION
The central concept of the study was perception. Peoples’ reaction to a
message depends mainly on their perception of it. This has made perception a
core psychological field that draws more attention than other subject matters in
psychology. Although much work and studies have been done in the field,
psychologists are still unable to arrive at a commonly acceptable definition for
perception.

Fantino Reynolds (1995:11-19) define perception as the organizing principle by


which we interpret our sensory input. This goes a long way in that perception is
the way an individual reads and acknowledges his environment. In the same vein,
perception is the process of discriminating among stimuli and of interpreting their
meaning. Humans have a tendency perceptually as well as cognitively to seek
completeness. We read the unsaid and visualize the unseen.
We can listen to two people talking about different things, but sooner or later,
you have to abandon one person to be able to listen to other, for you to
understand him/her thoroughly.

Perception is objective in the sense that it is related to objects, events, issues,


situations, e.t.c.

2 .2.2 SOCIAL PERCEPTION

The term perception is subject to so many definitions.

Oxford Advanced Learners dictionary, 7th edition, defines perception as the


way you notice things, especially with senses.

American Encyclopedia (1994:689) defines perception as a concept in


psychology and dealing with a family of meaning.

Alfred Lindersmith and Anselm Strauss referred to it as ways an organism


responds to stimuli picked up by the sense organs.

In giving clarity to perception, Dennis and Defleur (1981: 17) observed that,
when a receiver perceives a word, he or she must identify the incoming pattern of
physical events known as language symbol rather than other types of event

Folarin.B (1998:63) explains that perception depends on complex variables


such as psychological disposition, past experiences, needs, cultural expectations
and social relationship. In other words, each of us tends to perceive and then
decide communication message in the light of our previous experiences and
current disposition, needs, belief and memories.
Alfred and Anslem, identified the processes affecting perception in the
following variants.

Selectivity of perception: you see what you want to see while you neglect
others.
Frequency of previous experiences with particular stimulus and responses,
which affects present stimuli.
Experience with stimuli and responses that have been positively or
negatively reinforced
The contemporary factor prevailing at the moment of perception, such
conditions include, hunger, fatigue or anxiety, which may affect what, is
perceived.

Folarin.B (1998:67) also noted that selective interpretation of a given


message causes an undue internal dissonance. That is, the receiver of the
message may decide to forget the message.

2.2.3 PERCEPTION AND IMAGE

An image is a set of beliefs about an object, krecht et al (1976:17).

According to Oxford Advanced Learners dictionary, 7th edition, (743), image


is the impression that a person, an organization or a product, e.t.c. gives the
public. A person’s image of an object does not necessarily reveal his attitude
towards an object.

However, the image of an object varies from person to person. This is


largely due to the person’s beliefs, needs and past experiences with the object.
Also, images vary in their clarity and complexity. People at times, or have fuzzy or
other related impressions.

2.2.4 PERCEPTION OF CYBERCRIMES COMMITED BY NIGERIAN YOUTHS


Various scholars have examined the term “perception. People perceive
things in a way that accord to their beliefs, interests, motives, needs and learning.

According to Obono (2008: 40), cybercrime describes “those criminal acts


either committed in cyberspace, such as various forms of identity theft and bank
fraud, or acts that have a physical component and are simply facilitated by the
use of internet-based tools”. Such acts commonly include distribution of
fraudulent e-mails, and pornography on the internet.

He further notes that cybercrimes are illegal activities perpetrated by one


or more people using the cyberspace through the medium of networked
computers, telephones and other information and communication technology
equipment. There is hardly any crime committed in the world today that does not
have cybercrimes undertone, because of high of dependence on modern
technology.

According to Oketola (2009:49) some young people use the web for
information on current issues in health, education, politics, researches, sports,
and for personal development as well as building skills. While others, misuse it for
unconstructive activities.

It is perceived by many, that what constitutes young people’s involvement


in cybercrimes largely depends on their low level of moral standards, peer
pressure corruption, greed, poverty, and get-rich-quick-syndrome, lack of
parental guidance and lack of jobs.

2.2.5 EMPIRICAL STUDIES

Many Scholars have conducted researches on the perception of


Cybercrime among Nigerian Youths.

The following are some of the studies carried out on this Subject matter;

Asokhia (2010:13-19) in his work, titled “Enhancing National Development and


Growth through Combating Cybercrime/ Internet Fraud”, carried out a
comparative study of young adults perception of cybercrime in two Local
Government Area of Edo State. His findings were that cybercrime were very
prevalent in two Local Government Areas. More revealing is the fact the impact of
television that the young people are aware of and the uncensored video and radio
programmes also evolve in one kind of cybercrime or the other.

Adam (2008:432-443) in his work, “The impact of internet crime on


development”, concludes that the internet is overwhelmingly a powerful tool for
development. Paradoxically, the internet is a “double- edged sword”, providing
many opportunities for individuals and organizations to develop but at the same
time, has brought with it new opportunities to commit crime. He argues that the
internet presents new challenges to law enforcement in both development and
developing countries. However, developing countries suffer greatly from the
activities of internet crime more than their developed counterparts as developing
countries have inadequate technology, infrastructure and insufficient law
enforcement expertise.
THE MISSPIN AMBASSADORS- the Misspin Ambassadors are a team of twenty
four young people who were selected to contribute to sensitizing and creating
awareness around cybercrime issues. They are located all over Nigeria and, for
the last 12 months, have held various- activities from workshops to media
campaigns.

OLUMIDE one of the MISSPIN Ambassadors, in partnership with AIESEC and a


400 Level Student of Computer Science at the University of Abuja, has within the
last one year of the MISSPIN campaign engaged young people within and around
the University campus in anti-cybercrime campaigns. He has coordinated a
campus –wide rally against cybercrimes while also sensitizing internet café
operators in the area against the danger of permitting scammers and the sending
of scam mails within the precincts of their cyber cafes.

Robert who is also a MISSPIN Ambassador, in partnership with Dtalkshop,


publishers of Takaii Law magazine, with the support of the Association of Nigeria
Authors, Robert has taken the MISSPIN campaign to several Secondary Schools in
Lagos and Calabar. Among other campaign efforts, Robert coordinates an anti-
cybercrime media advocacy through the publication of Blingz Magazine, a youth-
led magazine dedicated to celebrating positive virtues among Nigeria’s
legitimately enterprising youths.

Ajayi (2006:56), he examined cybercrime as a phenomenon that is dysfunctional


to the country. Evidence abound that is not only the persons that are duped that
suffer for this, the immediate family dependants as well as the society where
these victims are from, directly feel the effect of this act. The perpetrators
country, also suffers the image problem, even to the extent of losing billions of
naira, legitimate investment that is supposed to come to the country. Hence, the
companies that ought have established and employed the unemployed Nigerian
cannot come to the country. Thus, unemployment continues to rampage the
country.

2.3 THEORETICAL FRAMEWORK OF THE STUDY

This research study perception of cyber crime among the youths falls within
the self perception theory.

The Self perception theory is an account of attitude change developed by


psychologist Daryl Bem. It asserts that people develop their attitudes by observing
their behaviour and concluding what attitudes must have caused them. The
theory is counterintuitive in nature, as the conventional wisdom is that attitude
comes prior to behaviours. Furthermore, the theory suggests that a person
induces attitudes without accessing internal cognition and mood states. The
person reasons their own overt behaviours rationally in the same way they
attempt to explain others’ behaviours.

The issue of perception or image is so complex that it has to be analysed


within a fitting theoretical framework. This is so because there is a strong
likelihood that individuals have different perceptions of objects.

2.4 SUMMARY OF LITERATURE REVIEW

The whole business of this review has been to discuss some empirical
studies and postulations by scholars in various fields, to see if they would give a
theoretical backing to the study. The effort is meaningful, since most literature
reviewed has more or less, direct relationship with the study.

The review centered on the self- perception theory of mass


communication, since it has a direct bearing on the study which is,” perception of
cybercrime among Nigerian youths: a study of Caritas University” .The review
pointed out that individuals develop their attitudes by observing their behaviour
and concluding what attitudes must have caused those responses.

Furthermore, it further stressed that individuals tend reasons their own


overt behaviours rationally in the way they attempt to explain other’s behaviours.
It is very evident in this review that there is a strong likelihood that individuals
have different perceptions of objects.
CHAPTER THREE

RESEARCH METHODOLOGY

INTRODUCTION

This chapter describes the methodology used in this research study.


It describes the method of research design, population sample and sampling
technique, instrumentation as well as the method of data collection and data
analysis. This is to ensure that the researcher’s work is authentic verifiable and
error free.

3.1 RESEARCH METHOD

Research method is a systematic way of producing knowledge through


which findings of a subject are either accepted or rejected.

The research method used for this study was the survey method. This
method was considered most appropriate because it is a method involving the
search for opinions.

3.2 AREA OF STUDY

The area of study is Caritas University Amoji-Nike Emene of Enugu State.

3.3 POPULATION OF THE STUDY

The population of the study comprises of male and female students who
reside in the hostels of residence of Caritas University in Enugu State. According
to the Registrar, Mr. Ochang, of the noble institution, three thousand two
hundred and eighty two (3282) is said to be population of the university. For this
study, three thousand and fifty- two (3052) students were penciled down.

3.4 RESEARCH SAMPLING TECHNIQUE AND SAMPLE SIZE

In order to get the sample size for the study, the Taro Yamane formular was
used. Taro Yamane is presented as follows:

n=

where n= sample size

N=entire population

e=entire population

1=unit [a constant figure]

Using the appropriate formular above to get a benefitting


sample size to ensure that the population of the study is adequately presented.
Based on this established data[n] was computed thus;

n=

=
=

=353.65

=354 [approximated to the nearest whole number]

Therefore, the sample size to be used in the questionnaire is 354.

3.5 INSTRUMENT FOR DATA COLLECTION

The questionnaire was self-administered to the respondents. This enabled


the respondents to feel free in expressing themselves on the subject matter. And
it was administered in the students’ hostel of residence.

3.6 VALIDITY OF THE INSTRUMENT

The research instruments were developed by the researcher. The


instruments were handed over to test experts for corrections. The validity of the
instruments was ascertained through this process.

3.7 METHOD OF DATA COLLECTION

A total of three hundred and fifty four (354) copies of questionnaire will be
administered to the selected respondents of Caritas University. The researcher
shall use the direct contact approach i.e. meeting the respondents in their hostels.
This will help to minimize the percentage of distraction, unnecessary delays, and
it will finally help to ensure an error free study.
3.8 METHOD OF DATA ANALYSIS

The major techniques that will be used in data analysis shall be the chi-
square (x2) statistical analysis, which is aimed at establishing any significant
difference that might exist among respondent’s frequencies. Chi-square is a non-
parametric statistical tool which can conveniently be used in testing hypotheses
when dealing with contented data. Chi-square formular is presented as follows:


X2=

Where X2= chi-square

∑ = Summation

O= Observed frequency

e= expected frequency
CHAPTER FOUR
PRESENTATION AND ANALYSIS OF DATA

This chapter deals with the data presentation and analysis gathered using
percentage and simple table for clarity and easy understanding.

4.1 DATA PRESENTATION AND ANALYSIS

For this study, three hundred and fifty four (354) copies of questionnaire were
administered. Also in the process of data collection, all the 354 copies of the
questionnaire were returned representing 100% response rate. This was possible
because the copies of questionnaire were administered personally to the
respondents in their various hostels. This method helped in avoiding unnecessary
delays and mortality rate of questionnaire.

Data collected with questionnaire were presented and analyzed using


simple percentage table, from which conclusions were drawn especially in the
discussion in the distribution of data as provided by the respondents.

ANALYSIS OF RESPONDENTS BASED ON DEMOGRAPHY

TABLE 4.1.1 AGE DISTRIBUTION OF RESPONDENTS

AGE NUMBER OF RESPONDENTS PERCENTAGE

15- 20 130 36.7%


21- 25 164 46.3%
26 and above 60 17%
TOTAL 354 100%
Source: Field work 2012
The table above shows the age bracket of the respondents used. Age 15- 20 were
130 representing 36.7%, 21- 50 were164 representing 46.3% and 26 and above
were 60 representing 17%.

TABLE 4.1.2 SEX DISTRIBUTION OF RESPONDENTS

SEX NUMBER OF RESPONDENTS PERCENTAGE


Male I62 45.8%
Female 192 54.2%
TOTAL 354 100%
Source: Field work 2012

From the table above, 162 respondents were male representing 45.8% and 192
respondents were female representing 54.2%. Generally, the number of females
that filled the questionnaire outnumbered that of males.

TABLE 4.1.3 RELIGION OF THE RESPONDENTS

RELIGION NUMBER OF RESPONDENTS PERCENTAGE


Christianity 248 70.1%
Islam 106 29.9%
Traditional 0 0%
Others 0 0%
TOTAL 354 100%
Source: field work 2012
From the table above, the highest respondents came from those with Christianity
with 248 respondents representing 70.1%, followed by those with Islam with 106
respondents representing 29.9%, those with traditional had no respondent
representing 0% and there was no respondent with other religion representing
0%.

TABLE 4.1.4 ETHNIC GROUP OF RESPONDENTS

ETHNIC GROUP NUMBER OF RESPONDENTS PERCENTAGE

Yoruba 80 22.6%
Hausa 90 25.4%
Igbo 150 42.4%
Others 34 9.6%
TOTAL 354 100%

Source: field work 2012

The table shows the ethnic group of the respondents used. The Yoruba ethnic
groups were 80 representing 22.6%, Hausa ethnic group were 90 representing
25.4%, Igbo ethnic group were 150 representing 42.4% and other ethnic group
were 34 representing 9.6%.

TABLE 4.1.5 MARITAL STATUS OF RESPONDENTS

MARITAL STATUS NUMBER OF RESPONDENTS PERCENTAGE


Single 300 84.7%
Married 54 15.3%
Others 0 0%
TOTAL 354 100%
Source: field work 2012

The analysis of the table below shows that 300 respondents were single
representing 84.7%, 54 were married representing 15.3% and there were no
others representing 0%.

TABLE 4.1.6 RESPONDENTS YEAR OF STUDY

YEAR OF STUDY NUMBER OF RESPONDENTS PERCENTAGE


Diploma/ year one 40 11.3%
Year two 69 19.5%
Year three 100 28.2%
Year four and above 145 41%
TOTAL 354 100%
Source: field work 2012

The analysis of the year of study of respondents shows that 40 respondents were
diploma/ year one representing 11.3%, 69 respondents were year two
representing 19.5%, 100 respondents were year three representing 28.2% and
145 respondents were year four and above representing 41%.
ANALYSIS OF QUESTIONS FROM THE QUESTIONNAIRE

TABLE 4.1.7 ARE YOU AWARE ABOUT CYBERCRIME POPULARLY KNOWN AS


YAHOO YAHOO?

RESPONSES NUMBER OF RESPONDENTS PERCENTAGE


Yes 354 100%
No 0 0%
TOTAL 354 100%
Source: field work 2012

From the above table, it shows that 354 respondents were aware about
cybercrime popularly known as yahoo yahoo representing 100% and there was no
respondent representing 0% that does not know the existence of cybercrime.

TABLE 4.1.8 IF YES, WHAT WAS THE SOURCE OF YOUR INFORMATION ABOUT
CYBERCRIMES?

RESPONSES NUMBER OF RESPONDENTS PERCENTAGE

Radio 20 5.6%
Television 47 13.3%
Internet 87 24.6%
Others 200 54.5%

TOTAL 354 100%


Source: field work 2012
From the above table, 20 respondents choose radio as their source of information
representing 5.6%, 47 respondents choose television representing 13.3%, 87
respondents choose the internet representing 24.6% and 200 respondents choose
other source representing 56.5%.

TABLE 4.1.9 WHAT IS YOUR PERCEPTION ABOUT CYBERCRIME?

REPONSES NUMBER OF RESPONDENTS PERCENTAGE

Very good 28 7.9%


Good 29 8.2%
Very poor 121 34.1%
Poor 80 22.6%
Don’t know 63 17.8%
Others 33 9.3%
TOTAL 354 100%
Source: field work 2012

From the above table, 28 respondents perceived cybercrime at a very good


response representing 7.9%, 29 respondents perceived it at a good response
representing 8.2%, 121 respondents perceived it at a very poor response
representing 34.1%, 80 respondents perceived it at a poor response representing
22.6%, 63 respondents don’t know about their perception representing 17.8%
and 33 other respondents perceived it representing 9.3%.
TABLE 4.1.10 CAN THE FEDERAL GOVERNMENT CURB THE CONTINUED SPREAD
OF CYBERCRIME AMONG NIGERIAN YOUTHS AND THE GENERAL PUBLIC?

RESPONSES NUMBER OF RESPONDENTS PERCENTAGE

Yes 200 56.5%


No 64 18.1%
Can’t say 90 25.4
TOTAL 354 100%
Source: Field work 2012

From the above table, 200 respondents believed that the federal can
curb the continued spread of cybercrime representing 56.5%, 64
respondents believed that the federal government cannot representing
18.1% and 90 respondents cannot say if the federal government can
represent 25.4%.
TABLE 4.1.11 WHAT ARE THE FACTORS THAT TEND TO CAUSE PEOPLE’S
INVOLVEMENT IN CYBERCRIME IN NIGERIA?
RESPONSES NUMBER OF RESPONDENTS PERCENTAGE

Poverty 203 57.3%


Peer pressure 40 11.3%
Unemployment 75 21.2%
Corruption 20 5.6%
Others 16 4.5%

TOTAL 354 100%


Source: field work 2012
From the above, 203 respondents claimed that poverty tend to cause
people’s involvement in cybercrime representing 57.3%, 40 respondents
choose peer pressure representing 11.3%, 75 respondents choose
unemployment representing 21.2%, 20 respondents choose corruption
representing 5.6% and 16 respondents choose other factors
representing 4.5%.
TABLE 4.1.12 IS THE INTERNET USED AS A CHANNEL FOR
PERPETRATION OF CRIMINAL SPAMMING ACTIVITIES?
RESPONSES NUMBER OF RESPONDENTS PERCENTAGE
Yes 143 40.4%
No 99 28%
Others 112 31.6%
TOTAL 354 100%
Source: field work 2012
From the above table, 143 respondents said that the internet is used as
a channel for the perpetration of criminal spamming activities
representing 40.4%, 99 respondents believed that the internet is not
used for criminal spamming activities representing 28% and 112
respondents believed otherwise representing 31.6%.

TABLE 4.1.13 DO YOU BELIEVE CYBERCRIME CAN BE CURBED IN


NIGERIA?
RESPONSES NUMBER OF RESPONDENTS PERCENTAGE
Strongly agree 56 15.8%
Agree 77 21.7%
Strongly disagree 121 34.1%
Disagree 44 12.4%
Neutral 56 15.8%
TOTAL 354 100%
SOURCE: Field work 2012
From the table above, 56 respondents strongly agreed that cybercrime
can be curbed in Nigeria representing 15.8%, 77 respondents agreed
representing 21.7%, 121 respondents strongly disagreed representing
34.1%, 44 respondents disagreed representing 12.4% and 56
respondents were neutral representing 15.8%.

4.2 HYPOTHESIS TESTING

In this section, hypotheses one (1) and two (2) formulated by the researcher were
tested using the data already presented and analyzed and also with the aid of the
chi-square (x2). Chi-square formular:

X2=∑

Chi- square is therefore a measure of discrepancy existing between the observed


and expected frequencies.

HYPOTHESIS ONE

H0: the internet is not used as a channel for the perpetration of criminal
spamming activities
H1: the internet is used as a channel for the perpetration of criminal spamming
activities.

USING TABLE 4.1.12

RESPONSES 0 E o-e (o-e)2

Yes 143 118 25 625 5.3

No 99 118 -19 361 3.1


Others 112 118 -6 36 0.3
TOTAL 354 1022 8.7

X2=8.7

Therefore the calculated chi-square(X2) = 8.7

Degree of freedom = (RC) =3-1 =2

Level of significance = 0.05

While tabulated value =5.99

DECISION RULE: Since the calculated chi- square is greater than the table value,
8.7 ≥ 5.99, we therefore reject the null hypothesis and accept the alternative
which states that the internet is used as a channel for the perpetration of criminal
spamming activities.
HYPOTHESES TWO

H0: The government cannot curb the continued spread of cybercrime among
Nigerian youths and the general public.

H2: the government can curb the continued spread of cybercrime among Nigerian
youths and the general public.

USING TABLE 4.1.10

RESPONSES o E o-e (o-e)2

Yes 200 118 82 6724 56.9


No 64 118 -54 2916 24.7

Can’t say 90 118 -28 784 6.6


TOTAL 354 10424 88.2

X2=88.2

Therefore the calculated chi- square( X2)= 88.2

Degree of freedom = (RC) = 3-1 =2

Level of significance = 0.05

While tabulated value = 5.99

DECISION RULE: Since the calculated chi- square is greater than the table value,
88.2≥ 5, we therefore reject the null hypothesis and accept the alternative which
states that the government can curb the continued spread of cybercrime among
Nigerian youths and the general public.

4.3 DISCUSSION ON FINDINGS

The results gotten from the first hypothesis proved that the internet is used
as a channel for the perpetration of criminal spamming activities. The second
hypothesis proved that the federal government can curb the continued spread of
cybercrime among Nigerian youths and the general public.
CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATIONS FOR FURTHER STUDY

INTRODUCTION

This chapter is designed to present the summary and conclusion of the entire
research project.

5.1 SUMMARY

Cybercrime popularly known as yahoo is an act of crime that defrauds


unsuspecting victims in foreign countries of their hard-earned money. Findings
have shown that cybercrime is rampant among Nigerian youths.

The study was conducted using survey method. Three hundred and fifty
four (354) copies of questionnaire were administered to three hundred and fifty
four (354) randomly selected respondents, with eighty nine (89) from each of the
hostels in the university. The researcher used chi- square (x2) and simple
percentage (%) in analyzing the data gathered from the field.

In view of the in-depth background of the study of the study of the sample,
the literature review of related studies, and theories in this field using the
appropriate measuring instrument, testing and analyzing the two hypotheses, it
has become obvious that cybercrime is being perceived by Nigerian youths.
The first hypothesis which states that the internet is used as a
channel for perpetration of criminal spamming activities was statistically
supported.

The second hypothesis states that the federal government can curb
the continued spread of cybercrime among the Nigerian youths and the general
public was equally supported.

5.2 CONCLUSION

Based on the findings of the study, the following conclusions were reached.

The understanding of the universality of cybercrimes and fraud and


its rapid excessive growth among Nigerian youth is important to
boost the country’s economy.
Having a sound Socio- Economic and Technological Environment to
avoid the existence of cybercrime in our society.
There is a need for a massive campaign awareness and action from
all Religions Leaders, Youth association, Parents, Teachers,
Guardians, and Multinational Companies e.t.c.
It shows a relationship between male and female perception about
cybercrimes. Awareness of cybercrime among the respondents was
high as shown in the findings.
Majority of the respondents perceive cybercrime among Nigerian
youth as very poor which represents 34.1% of the total respondents.
5.3 RECOMMENDATIONS FOR FURTHER STUDY

Other nations are racing to define their “information utility” based on


educational and commercial content; Nigerian has been labelled the global
capital for 419 scams. Based on the findings of this of this study, the following
recommendations are hereby put forward:

As a matter of urgency, government and other related stakeholder and


other key player of the Nigerian Economy should try and create more job
opportunities for our young graduates in order to alleviate their
involvement in negative societal behavior.
The massive campaign and sensitization exercise against the menace should
be encouraged and supported by stakeholders.
A better economic system, creation of opportunities for the young Nigerian,
would also make a lot differences. Since it was observed that majority of the
respondents perceived the involvement of young people in cybercrime as a
result of economic condition.
Government should try and sensitize the Police force, Economic and
Financial Crimes Commission (EFFCC), Independent Corruption Practices
Commission (ITPC) and other security operatives on how to detect and
prevent cybercrimes with technology.
Government and administrations should ensure that youth centres are built
at least in every local government in Nigeria; this is necessary in order for
young people to be engaged in creative works and development through
these centres.
Nigeria needs cyber laws that would govern the country’s cyber space and
give the nation adequately cyber security measures.
Telecommunication regulatory agencies in Nigeria should beef security on
internet service provider’s server in order to detect and trace cybercrimes.
This can be done by the use of CISCO system router and sensors.
Finally to curb and eventually eradicate cybercrime, Adult, Children and
Youth need to be enriched with the “power of the teaching of distinguishing
right from wrong”. All schools should return to the teaching of moral
education in order to empower all students with spirit of stewardship. While
adults should live exemplary life, reflecting truth, kindness, dignity of labour
and integrity. With all hands on deck, the evil of corruptible act like
cybercrime in the minds of our youth will change for positive behaviour.

You might also like