TABLE OF CONTENTS
DEDICATION
ACKNOWLEDGEMENT
CERTIFICATION
ABSTRACT
CHAPTER ONE/INTRODUCTION
1.1 BACKGROUND OF THE STUDY
……………………………..
1.2 STATEMENT OF RESEARCH PROBLEM…………………….
1.3 RESEARCH QUESTIONS
…………………………….
1.4 OBJECTIVES OF THE STUDY………………………………………
1.5 SIGNIFICANCE OF THE STUDY………………………………….
1.6 SCOPE AND LIMITATIONS
……………………………………….
1.7 DEFINITION OF KEY TERMS……………………………………….
CHAPTER TWO/LITERATURE REVIEW AND THEORETICAL FRAME
WORK
2.1 LITERATURE REVIEW ..........................................................
2.2 THEORETICAL PERSPECTIVE………………………………………
CHAPTER THREE/ RESEARCH METHODOLOGY
3.1 INTRODUCTION…………………………………………….
3.2 STUDY LOCATION: A HISTORICAL
BACKGROUND ……………………
3.3 POPULATION…………………………………………….
3.4 SAMPLING TECHNIQUE
……………………………………….
3.5 DATA COLLECTION METHOD
…………………………..
3.6 METHOD OF DATA ANALYSIS……………………………..
CHAPTER FOUR/DATA
PRESENTATION AND ANAYSIS
4.1
INTRODUCTION……………………………………………
4.1
INTRODUCTION ………………………………………..
4.2 DATA PRESENTATION…………………………………….
CHAPTER
FIVE/SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 SUMMARY………………………………………………………..
5.2 CONCLUSION……………………………………………………
5.3 RECOMMENDATIONS.………………………………………….
REFERENCES
APPENDIX
ABSTRACT
In Nigeria
today, numerous internet assisted crimes are committed daily in various forms
such as identity theft, desktop counterfeiting, internet chat room, cyber harassment,
fraudulent electronic mails,Automated Teller Machine spoofing, pornography,
piracy, hacking, phishing and spamming. Usually these crimes are committed in
forms like sending of fraudulent and bogus financial proposals from cyber
criminals to innocent internet users. The increasing rates of cybercrime in the
society have become a strong threat to Nigeria’s e-commerce growth and has led
to ill- reputation intentionally and consequently denied some innocent
Nigerians certain opportunities abroad. Therefore, innocent internet users
should inculcate the habit of continuously updating their knowledge about the
ever changing nature of ICTs, through this, they can not only be well informed
about the current trends in cybercrimes, but they will also have the knowledge
about different forms of the said crimes and how the cyber criminals carry out
their heinous activities. Thus, they can devise means of protecting their
information from cyber criminals. Internet users should be security conscious.
On the whole, this paper examines the causes and consequences of cybercrime in
Kaduna north local government area, Kaduna State.
CHAPTER
ONE
INTRODUCTION
1.1
BACKGROUND TO THE STUDY
Technology has integrated nations and the world has become a global
village. The economy of most nations in the world is accessible through the aid
of electronics via the internet. Since the electronic market is opened to
everybody (which also includes eavesdroppers and criminals), false pretence
finds a fertile ground in this situation. However, information technology
revolution associated with the internet has brought about two edge functions:
that is on one hand, it has contributed positive values to the world. While on
the other hand, it has produced so many maladies that threaten the order of the
society and also producing a new wave of crime to the world known as
cybercrime.
The internet online business services, which
ordinarily suppose to be a blessing as it exposes one to a lot of opportunities
in various field of life is fast becoming a source of discomfort and worry due
to the atrocities being perpetrated through it. Shinder (2002), define cyber
crime as any criminal offenses committed using the internet or another computer
network as a component of the crime. Cyber crimes are offences that are
committed against individual or group of individuals with a criminal motive to
internationally harm the reputation of the victim or cause physical or mental
harm to the victim directly or indirectly using modern telecommunication
networks such as internet and mobile phones. Such crimes may threaten nation’s
security and financial health (Akogwu, 2012).
There
is no gainsaying that Nigeria, the self-acclaimed giant of Africa is enmeshed
in an emulating syndrome called cyber crime. Its manifestation is pandemic and
difficult to eradicate. The task of re-stigmatizing cyber crime and
re-dignifying honesty are not as easy as that of institutionalizing a
deterrence mechanism like code of conduct bureau, Independent Corrupt Practice
Commission (ICPC), Economic and financial crime commission (EFCC) and many
more. This is after many years at the bottom of the ladder of the corrupt
nations of the world, which is based on some index set by the Transparency
International (TI), an anti corruption crusader group.
Corruption
the father of cyber crime take many forms in Nigeria from the policeman that
receives favor from government, students that buy gift for lectures or pay
school staff to pass examination or receive certificate, teachers/lecturers
that organize special centers during public examinations, to parents that give
token to their children before they can help out with an assignment, with the
inclusion of advanced fee fraud popularly called “419” as the most pervasive.
Although all these can be perceived as negative factors that gave birth to
cyber crime, this anomaly popularly called ‘Yahoo Yahoo’ is an off shoot of
advanced fee fraud which became popular in the early 90’s, and has now produced
its first offspring with mostly young fellows and the unemployed as its major
practitioners. But the question on the lips of social scientists and historians
is, how did a society that value hard work, cooperation and contentment become
deeply rotten by corruption?
The
answer to the above can be linked to the materialistic value of the country.
Nigerians now worship those that have plenty material resources without making
inquiry about the source of such material property. But, some people will be
eager to point out that why has the materialistic value of other societies not
made them enmesh in corruption? I want to point out here that, the answer to
such argument can be found in the circumstances that led to this new social
reality, circumstances like; high rate of poverty, lack of parental guidance,
lack of substantial value system adopted by Nigerian’s, idleness, weak laws
against crime, lack of security awareness etc.
1.2
STATEMENT OF THE PROBLEM
The contribution of internet to the
development of the nation has been marred by the evolution of new waves of
crime. The internet has also become an environment where the most lucrative and
safest crime thrives. Cybercrime has become a global threat from Europe to
America, Africa to Asia. Cybercrime has come as a surprise and a strange
phenomenon that for now lives with us in Nigeria. With each passing day, we
witness more and more alarming cases of cybercrimes in Nigeria, with each new
case more shocking than the one before. It has become a stubborn mouth sore
which causes us a lot of pain and shame because criminally minded individuals
in the country are stealing and committing atrocities through the aid of the
internet online business transactions.
The youths in every society are of great
importance and concern to that society because they are looked upon as the
leaders of tomorrow. Olaide and Adewole (2004), observed that a sizeable number
of criminals in Nigeria fall within the youthful age (17- 40). The youths at
present have discovered different ways of using the internet in doing different
types of criminal activities and these age brackets are usually found among the
unemployed in Nigeria. Although Nigeria is not the only nation where
cybercrimes are being perpetrated but the incidence can rightly be said to be
on the increase in the country due to lack of security awareness and under
reportage respectively.
Although some people’s level of knowledge of
the net is observably just for chatting with their friends and may be get
information there from, most of them may not be in the position to protect
their data or information and computer from malicious programmers (Akogwu,
2012).
In Kaduna state, various form of crimes are
being witnessed ranging from corruption, examination malpractices, drug abuse,
falsification of certificates, rape, robbery and stealing, sexual abuse,
assault, cultism, terrorism amongst others (Okeshola and Adeta 2013). But in
recent times cybercrime a new form of crime now exists in our contemporary
society which is denting and drilling holes in the economy of the nation. it is
also leading to the erosion of confidence in genuine Nigerian commercial
credibility and today many western countries with France taking the lead have
moved to deny Nigerian businessmen and women who are legitimate the rewards of
e-commerce. France today requires web camera verification for most online
business transactions from Nigeria (Okeshola and Adeta 2013).
Studies that focuses on cybercrime largely
concentrates on situations in the western world forgetting that the nature of
cybercrime is such that geographical and political boundaries are being
rendered irrelevant. A person who has access to computer and connected to the
internet might be participating, attempting or planning a criminal act anywhere
in the world (Kumar, 2003). Awe (2009), confirmed that computer attacks can be
generated by criminals from anywhere in the world, and executed in other areas,
irrespective of geographical location. And often these criminal activities can
be faster, easier and more damaging with the use of the internet.
The above statement shows that it is a global
issue and as such, has become an image nightmare for the Nigerian government to
identify the remote causes and devastating consequences in order to proffer
solutions. In Nigeria, perpetrators of this crime who are usually referred to
as “yahoo yahoo boys” are taking advantage of e-commerce systems available on
the internet to defraud victims in thousands and sometimes millions of naira
and even dollars. They fraudulently represent themselves as having particular
goods to sell or that they are involved in a loan scheme project. They may pose
to have financial institution where money can be loaned out to prospective investors.
In this regard, so many persons have been duped or fallen victims, as a result
of these techniques used by cyber criminals.
Attempts to address cybercrime by various
governments and international organizations have not been successful owing to
the fact that the identities remain inadequate. A study by Zero Tolerance
(2006) indicates that cyber criminals are usually within the age of 18 and 30
years and they indulge in the crime in order to survive and have a taste of
good life. Noting these observations, there is need to identify more attributes
these cyber criminals possess and identify other motivating factors alongside
the acknowledgement of a good taste of life as a motivating factor.
1.3
RESEARCH QUESTIONS
The following are the formulated research
questions for this research study:
I.
To what
extent does cybercrime occur in Kaduna north local government area?
II.
What
are the socio-economic factors that lead people into engaging in cyber crime?
III.
What
are the consequences of cyber crime to the society at large?
1.4 OBJECTIVES
OF THE STUDY
I.
To
assess the frequency of cyber crime occurrence in Kaduna north local government
area.
II.
To
discover the socio-economic factors responsible for people’s involvement in
cyber crime.
III.
To
identify and examine the negative impacts the menace poses to the society.
1.5
SIGNIFICANCE OF THE STUDY
The importance of this study cannot be
overemphasized. This is because, the study will be of benefit to every user of
the internet. The study is aimed at analyzing the inherent causes, implications
and occurrences associated with cyber crimes in Kaduna north local government
area. The government and policy makers will find this work very handy in their
attempt to find a solution to this problem. Similarly, this work will assist law
enforcement agencies in their bid to curb e-crimes in Nigeria. This study will
also help sociology researchers and even those in related discipline in their
further research.
1.6
SCOPE AND LIMITATIONS
There
is no doubt that cyber crime is a universal problem and any discourse or study
in this area has to go round the globe. That notwithstanding, this research
work will try as much as possible to focus on the causes and consequences of
cybercrime as it relates to Nigeria, Kaduna state to be precise. The scope of
this work includes but is not limited to; an overview of cyber crimes in
Nigeria, and an attempt will be made to analyze the frequency of its
occurrence, but due to financial inadequacy to embark on some data collection
methods, inability to access confidential and vital records of information and
time constraints the project shall be restricted to Kaduna North Local
Government Area.
1.7
DEFINITION OF KEY TERMS
Cyber: The term Cyber according to Encarta dictionaries it is a prefix used to
describe an idea as part of the computer and information age or a prefix used
to form words relating to the internet or cyberspace or computers more
generally.
Crime: This can be defined as any activity that
contravenes legal procedure mostly preferred by individuals with a criminal
motive and such an activity is usually deemed injurious to the public welfare.
Crime can also be viewed as an act committed in violation of law where the
consequences of conviction by a court is punishment, especially where the
punishment is a serious one such as imprisonment.
Cybercrime:
Computer crime or cybercrime as referred to
by Wikipedia is any crime that involves a computer and a network.
DrDebaratiHalder and Dr K Jaishankar (2011) defines cybercrime as offences that
are committed against individuals with a criminal motive to intentionally harm
the reputation of the victim, cause physical or mental harm or loss to the
victim directly or indirectly, using modern telecommunication networks such as
internet (chatrooms, emails, notice boards and groups) and mobile phones
(SMS/MMS).
Cause: There are various definitions of the word
cause but in this context we consider it as what makes something happen, a
person or thing that makes something occur or exist and is either responsible
or is the reason for something happening. Oxford Advanced learners dictionary
defines cause as the reason why something, especially something bad happens.
Consequence: This is a logical conclusion reached
through deductive reasoning and plausible investigation. It could also be
defined as a relationship between cause and effect. A Cambridge dictionary
refers to consequence as a result of a particular action or situation, often
one that is bad or not convenient.
CHAPTER TWO
LITERATURE REVIEW AND THEORETICAL FRAMEWORK
2.1INTRODUCTION
This chapter deals with literature review and
theoretical framework.
2.2 LITERATURE
REVIEW
Crime
we are told is today a salient tact, an integral part of the risks we face in
everyday life. In both scholarly and public opinion, crime is associated with
harm and violence. However, we lack agreement on the most basic question
"what is crime". The term crime does not in modern criminal law have
any simple and universally accepted definition, though statutory definitions
have been provided for certain purposes. The most popular view is that crime is
a gateway created by law that is, something is a crime if applicable Law says it
is. One proposed definition is that a crime, also called an offence or a
criminal offence is an act harmful not only to some individuals, but also to
the community or the state (public wrong). For most people the acceptable
definition of a Crime is that "Crime is an act that the law makes
punishable”. This is because any act which has not been condemned by any law or
recognized by any act as wrong cannot be seen or called a crime.
Borrowing
a leaf from the foregoing therefore, Cybercrime has been defined by various
writers. This would be discussed having understood the split meaning of
"Cyber" and "Crime". Cyber crime has been defined as “a
criminal offence on the web, a criminal offence regarding the internet, a
violation of law on the internet, an illegality committed with regard to the
internet etc”.
According
to Summer (1997), there is no generally acceptable or generally agreed
definition of Cybercrime and this lack directly impacts assessments of extent.
The Council of Europe Cybercrime Convention also known as the Treaty of
Budapest covers in Articles 2-6 as “substantive offences”, “illegal access”,
and “misuse of devices”, “system interference”, “data interference”, and
“illegal interception”. It adds as Computer-related offences, “computer-related
forgery”, and “computer-related fraud”. Cyber crime has also been defined as
including “unauthorized acts with the intent to impair, or with recklessness as
to impairing, operation of computer, etc”. This definition is acceptable only
within the jurisdiction in which the law was made.
Cyber
crime encompasses any criminal activity or act dealing with computers and
networks (called hacking). Additionally, it also includes traditional crimes
conducted through the internet for example; hate crimes, internet fraud,
identity theft, credit card account thefts etc.
Okwunma
(2011) opines that Cyber crime should not be attributed to just the use of
computers to commit crime,cyber crime is a cloud crime. Most of the cyber
crimes are being committed with the aid of the internet and therefore,
cybercrime should be defined as illegal activities committed through the use of
computer and internet.
Dictionary.com
defines Cyber crime as criminal activity or a crime that involves the internet,
a computer system or computer technology; identity theft, phishing and other
kinds of Cyber crime. Cyber crime is a term for any illegal activity that uses
a computer as its primary means of commission. These broad definitions offer
little insight into the nature of the conduct that falls within the umbrella
term. The issue is further complicated by the fact that cyber crime is a social
label and not an established term within criminal law.
There
has been confusion on the criteria used to determine the term Cyber crimes or
computer crimes. Some argued that, it is any crime that involves the use of
computer, while some others argued that it is a crime in the presence of a
computer. However, some have criticized the categorization of cyber crime.
Gotternbarn
(1999) argued that, there is nothing special on the crimes that happen to
involve computers. Is it possible for a crime being categorized in accordance
to a tool, equipment, mechanism or means through which it was committed? If
that’s so, how many categories of crime would there be? How about the crime
committed through using a television, automobiles, scalpels, scissors and other
tools, can we categorize each of them as individual crimes? Gotternbarn (1999)
concludes that crimes involving computers are not necessarily issues in
computer ethics.
In
arguing against Gotternbarn, it is true that we may not categorize other crimes
in accordance to tools, equipment, mechanism or means through which they were
committed. However, due to the nature and features of cyber crimes which
differentiates the traditional universe and the cyber universe, it made the
traditional universe tremble like an earthquake and makes crimes difficult to
control than they were before. This initiates the concept of these crimes being
necessary to be categorized as cyber crimes.
Forester
and Morrison (1994) argued that cyber crime is a criminal act in which a
computer is used as a principal tool. In that matter, the theft of computer
hardware device, would not qualify as a computer crime. Is it true that by
using a computer as the principal to commit a crime, it will amount to cyber
crime? For instance in taxable transactions, in the case of data entry, can’t a
person commit fraud just by filling the wrong data into hardcopy version of tax
forms which are the same available in electronic forms? Therefore, their
Argument holds no water as it is fallacious.
Girasa
(2002) argued that Cyber crime is a generic term covering the multiplicity of
crimes found in penal codes or in legislations having use of computers as a
centre component. To him, Cyber crime is a crime as long as the penal codes and
any other legislation clearly stipulate it as involving not only the use of
computers but the use of computers as the centre component.
At the
Tenth United Nations Congress on the Prevention of Crime and Treatment of
Offenders, in a workshop devoted to the issues of crimes related to computer
networks, cyber crime was broken into two categories and defined thus:
1.
Cyber
crime in a narrow sense: Any illegal behaviour directed by means of electronic
operations that targets the security of computer systems and the data processed
by them.
2.
Cyber
crime in a broader sense (computer-related crime): Any illegal behaviour
committed by means of, or in relation to a computer system or network,
including such crimes as illegal possession and offering or distributing
information by means of a computer system or network.
Even
though this definition is not completely definitive, however, it gives us a
good starting point, for determining just what cyber crime means, by
incorporating computer crime and computer-related crime. Computer crime has two
elements, “Computer” and “Crime”. Therefore, it involves a crime in a
relationship with a computer. However, the relationship can also be indirect,
the criminal cannot only use a computer to commit his crime but can also use
someone to make changes in a computer system by manipulating a key computer
user. Thus, one being the exploitation of weakness in the technical IT
infrastructure, and the other being exploitation of trust in social fabric of
IT users within the organization.
According to Vladimir (2005) internet is a
global network which unites millions of computers located in different
countries and open broad opportunities to obtain and exchange information but
it is now been used for criminal purposes due to the economic factors. Nigeria
a third world country is faced with so many economic challenges such as
poverty, corruption, unemployment amongst others, thereby, making this crime thrive.
However, it will be inconclusive to base it only on economic challenge as the
cause of cyber crime in Nigeria; as there might be other causes too.
Agba (2002), is of the view that internet is
the most technologically advanced medium of interaction. It is the information
revolution that has turned the world into a global village. As a result of this
value, it is assumed that internet usage in Nigeria is growing due to
increasing availability of broadband connections and by observation, a decrease
in subscription fee. This observed increase of internet users in Nigeria has
made the internet a popular medium of communication and interaction as well as
forum for online enterprises, such as, internet service provision (ISP), cyber
cafes and cyber crime which was described by Ayantokun (2006) as all unlawful
activities involving computer and internet.
The internet services has reduced the world
into a global village which makes it look as if everybody is in the same place
at a particular point in time, aside from the fact that the internet has made
communication to be easier and faster. A lot of other transactions are
consummated at the speed of lightening. Oyewole and Obeta (2002), stated that
the internet is the inter connection of computer across the world thereby
creating unlimited opportunities for mankind. According to Ehimen and Bola
(2009), the internet has created a geometric growth and accelerated windows of
opportunities for businesses and the removal of economic barriers hitherto
faced by nations of the world. Considering these limitless advantages of the
internet, one can easily subscribe to the fact that it is an important tool for
national development in a developing country like Nigeria.
McConnel (2000), argued that cyber crimes
differ from most terrestrial crimes in four ways which are: They are easy to
learn; they require few resources relative to the potential damage caused; they
can be committed in a jurisdiction without being physically present and they
are often not clearly illegal. As such, cyber crime has become one of the major
security issues for law enforcement agencies and the world in general.
According to a publication by Economic and
Other Financial Crime Commission in Nigeria named Zero Tolerance (2006), stated
that a retired civil servant with two (2) other accomplices defrauded a German
citizen name Klaus Wagner a sum of USD 1, 714,080 through the internet. A 2007
internet crime report listed Nigeria third in terms of online crime activity
and the prevalence of cyber crime among a sizeable number of young Nigerians
(Sesan 2010).
Ribadu (2007), stated that the prominent
forms of cyber crime in Nigeria are cloning of websites, false representations,
internet purchase and other e – commerce kinds of fraud. Olugbodi (2010),
states that the most prevalent forms of cyber crime are website cloning,
financial fraud, identity theft, credit card theft, cyber theft, cyber
harassment, fraudulent electronic mails, cyber laundering and virus/ worms/
Trojans. The internet creates unlimited opportunities for commercial, social
and educational activities. However, it has introduced its own peculiar risk
that poses danger to the economy. The danger could affect many sectors of the
society and put the development of the country into peril. Some of these
possible adverse effects could include the destruction of the country’s image
both at home and abroad, insecurity of both life and properties, fear of doing
business with Nigerian citizens, economic loss of spending substantial amount
of money on the prevention and control of cyber crime amongst others.
2.1
THEORETICAL PERSPECTIVE
In any sociological analysis, theories are
indispensable. They form an integral part of sociological research as it is a
general principle that explains or predict facts, observation or events. The
theory of differential association was adopted for this study. This theory was
propounded by Edwin Sutherland an American Sociologist. Differential
association theory proposed that through interaction with others, individuals
learn the values, attitudes, techniques and motives for criminal behaviour.
According to this theory, the environment plays a major role in deciding which
norms people learn to violate (Sutherland, 1939).
The principle of differential association
asserts that a person becomes a delinquent because of an “excess” of
definitions favourable to violation of law over definitions unfavourable to
violation of law. What this means is that an individual will become a criminal
because they are exposed to more favourable criminal behaviour. That is when
one is exposed to more criminal influences rather than more favourable legal
influences. In other words, criminal behaviour emerges when one is exposed to
more social messages favouring misconduct than pro – social messages. This can
be seen in environments with poor socio-economic conditions which may encourage
negative views towards the law and authority.
According to Sutherland (1939), criminal
behaviour is learned in interaction with other persons in a process of
communication. This would mean an individual is influenced to participate in
criminal behaviour through watching and interacting with other individuals who
are engaging in the criminal behaviour. The principal part of the learning of
criminal behaviour occurs within intimate personal groups. When criminal
behaviour is learned, the learning includes techniques of committing the crime,
which are sometimes very complicated, sometimes simple and they learn the
specific direction of motives, drives, rationalizations and attitudes for
committing a crime. This means that an individual will be influenced into
believing that the behaviour which they may have previously believed was wrong,
into believing that it is right through rationalization of their action.
Furthermore, an individual will be pushed
into deviant behaviour depending on their view of the legal code as being
favourable or unfavourable. A person becomes delinquent because of an excess of
definitions favourable to violation of law over definitions unfavourable to
violation of the law. Therefore, individuals will break a law if they see more
reasons to break it than to stay in compliance with it. Differential
Associations may also vary in frequency, duration, priority and intensity. The
process of learning criminal behaviour by association with criminal and
anti-criminal patterns involves all of the mechanisms that are involved in any
other learning. This means that individuals learn criminal actions and legal
activities through the same way. This theory states that while criminal
behaviour is an expression of general needs and values, it is not necessarily
the fulfilment of these needs and values which causes deviant behaviour since
non-criminal behaviour is an expression of these same needs and values.
The theory of Differential Association can be
applied to cyber crimes. The main premise behind this theory is that criminal
behaviour is learned through social interactions with others. The profile of
cyber criminal is one who is very smart, highly knowledgeable and who is a
computer savvy. Their social interactions may come through electronic
communications with other individuals who share similar technological
interests. If they do not currently have any desire to commit malicious acts
through electronic means, such as an act in violation of the computer fraud and
abuse act, then they may become influenced through another individual with whom
they share electronic communications. This theory which was developed to help
explain white collar crime, fits in well with those who violate or commit cyber
crime. Many of these individuals spend time with people who share similar
interests. Differential association is a theory with a number of postulations
which help to explain the causes behind why cyber crimes are increasing so quickly
in the society and how an individual learn to become a cyber criminal.
Differential
association has often been criticized by various scholars, and the basis of
their disapproval of the theory stems from the idea that people can be
independent, rational actors and individually motivated. This notion of one
being a criminal based on his or her environment is problematic. Differential
association has also been critiqued on account that not every individual who
has interacted with a criminal developed criminal behaviors in the end.
According
to Church, Wharton, and Taylor (2009) they managed to point out two significant
weakness of the theory of differential association. They stated that, the first
limitation of Sutherland’s differential theory stems from the concept of
“definitions” in the sense that Sutherland fails to provide a precise
definition of the concept. In addition, Sutherland fails to highlight how
“excess of definitions” that are favorable to deviant behavior over unfavorable
behavior can be operationalized. For instance, how many unlawful behaviors
should one define as acceptable to result in “excess of definition”. Sutherland
failed to provide a succinct definition of the same; therefore, how would one
embark on measuring the concept of “excess definitions that are favourable to
violation of law”? The second limitation
of Sutherland’s theory pointed out by Church, Wharton, and Taylor (2009) is
that it fails to specify the learning process. In regard, Church, Wharton, and
Taylor (2009) assert that the theory of differential association lacks a clue
as regards to the specifics to be incorporated in “all the mechanisms involved
in any other form of learning”.
Another
criticism leveled against the theory of differential association stems from the
development of cultural deviance theory, which attempted to prove that
Sutherland made erroneous assumptions regarding human behavior and the role
that culture plays in influencing deviance (Hirschi 2002). Hirschi postulates
that the cultural deviance theory reduces the theory of differential
association to a misrepresentation of human nature. In another research by
Hirschi to explore the mechanism of social transmission of delinquency, he
compared the impact of the peer’s attitude and the impact of the peer’s
behavior and reported that delinquency emerged from the peer’s behavior rather
than the outcome of the attitude obtained from other peers. This implies that
Sutherland’s view that peer’s attitude is a significant factor for deviant
behavior is incomplete. Hirschi summarized the limitations of sutherland’s
theory as follows:
-The
theory is defective on the grounds that it fails to take into account the
consideration of free will.
-The
theory draws upon psychology that assumes rational deliberation and does not
consider the role of the victim in the development of deviant behavior.
-The
theory fails to explain the origin of deviance and fails to define core
concepts outlined in its principles such as “excess”.
-It
fails to take into consideration the role of biological factors in crime making
the theory not adequately comprehensive since it is not multidisciplinary.
-The
theory draws on the assumption that all people can access anti-criminal
patterns equally.
CHAPTER THREE
RESEARCH METHODOLOGY
3.1
INTRODUCTION
This chapter discusses the procedures that
would be employed in carrying out the field research. Hence: location of the
study, population, sampling technique, data collection method, administration
of data collection instruments, and method of data analysis.
3.2
STUDY LOCATION: A HISTORICAL BACKGROUND
The history of Kaduna state dates back to the
19th century. Kaduna is used to refer to crocodiles in the Hausa
language. Before the advent of the Europeans, it was under the influence of
Zaria province. The earliest inhabitants of Kaduna were the Hausas, Fulanis and
Gwaris. The then political system was based in Kaduna but was transferred to
Zungeru by Lord Lugard in 1916.
Kaduna state is located at the center of
northern Nigeria, and shares borders with Abuja, Katsina, Bauchi, Kano, Sokoto
and plateau state. It occupies a land area of 45,567 square kilometers. The
symbol of Kaduna is a crocodile called ‘‘KADA’’ in the native Hausa language.
Its headquarters are in the town of Doka. It has an area of 72 km2 and a
population of 357,694 according to the 2006 census.
Major towns in the state include Kachia,
BirninGwari, Ikara, Kauru, Zaria, Makarfi and Jama’a. Kaduna state is inhibited
by multifarious ethnic and linguistic groups. There are about 35 indigenous
ethnic groups in different parts of the state. However, the main ethnic group
in the state includes Fulani, Hausa, Kaje, Kadara, Jaba, Kagoro, Gbagyi, and
Kataf. The capital is predominantly inhibited by Muslims in the northen part
and Christians in the southern part. The state is the successor to the old
Northern region of Nigeria, which had its capital at Kaduna. In 1967 this was
split up into six states, one of which was the North-central state, whose name
was changed to Kaduna state in 1976. This was further divided in 1987, losing
the Area now part of Katsina state. Under the government of Kaduna is the
ancient city of Zaria known as the Zazzau emirate, the emirate was under the
council of powerful native authority up to 1930.
Kaduna North is a local government area in
Kaduna state, Nigeria. The city is located on the Kaduna River. It is a trade
center and a major transportation hub for the surrounding agricultural areas
with its rail and road junctions. Kaduna north local government area has it’s headquarter
located at MagajinGari in the heart of Kaduna town. The postal code of the area
is 800.
3.2.1
ADMINISTRATIVEDEPARTMENTS
There are six departments under Kaduna north
local government area which are personnel, agriculture, health, finance, works and
education development. These departments are headed by astute civil servants.
3.2.2
COMMERCE
As the capital of Kaduna state, there are
many small and large scale companies and industries. There are immense
commercial activities in various forms as a result of its metropolitan and
urbanized nature, making it possible for its inhabitants to mostly engage in
trade and commerce. Furthermore, because of the favorable topography, climate
and economic condition, the town attracted people from far and neighboring
areas to come and reside and carry out their business endeavors paripassu.
3.2.3
FINANCIAL INSTITUTIONS AND RESOURCES
There are close to sixty financial
institutions which includes; banks, finance houses, cooperative societies, and
insurance firms.
The Local Government sources of fund
includes;
1. Tax payments
2. Revenue generation in markets
3. Allocation of kiosks and brick shops
4. Land field dues
5. Issuing of receipts for general purposes,
etc.
3.2.4
GEOGRAPHICAL FEATURES
The river Kaduna is a major geographical
feature in the local government. Kaduna north falls within the Sudan Savannah
region, the land there is characterized by rainy and dry season with a little
period of harmattan. Therefore since it falls or lies in the savannah
grassland, only a few swamp areas are found in the local government area except
during the rainy seasons there are areas high above sea level swamping. This
local government is not a plateau area, though there are some scattered rocky
mountains found in some parts of the local government in places like Malali,
Ungwangwari, Badarawa and Ungwandosa all in Kawo district, although the local
government area is easily accessible by roads, railway lines and even by air
for business opportunities available in the area. Most of the area in Kaduna
north lay plainly due to high land area and as a result, the plain areas have
been of vital importance to the inhabitants of such areas for one reason or
another.
3.2.5
JUDICIARY
There are many courts given the metropolitan
nature of Kaduna. There are two customary law courts, one high court and a
sharia court of appeal all located in the township.
3.2.6
RELIGIOUS INSTITUTIONS AND FESTIVALS
There are many religious institutions for
worship notably mosques and churches and traditionally in Kaduna north local
government, a number of religious, cultural and private festivals are
celebrated, for example, the Sallah; eid-el kabir and eid-el maulud, Christmas,
New Year and Easter.
3.2.7
EDUCATION
In the area of learning, Kaduna north local
government area has a well developed competitive level of education due to the
presence of educational institutions such as Kaduna Polytechnic, Kaduna State
University, Nigeria Defense Academy (NDA), National Technical School, among
others. There are also in the local government area over a hundred secondary,
primary and nursery schools publicly and privately owned.
3.2.8
RECREATIONAL FACILITIES AND TOURIST ATTRACTION
There are many of such facilities given the
cosmopolitan nature of Kaduna. There are two stadiums, Ahmadu Bello Stadium and
Ranchers Bees Stadium. There are also many hotels with recreational facilities.
Arewa House, National museum, river Kaduna, Kaduna beach garden and the
numerous hotels are the source of tourism for the Local Government Area.
3.2.9
JUSTIFICATION FOR SELECTION OF THE LOCATION
The study will be conducted in areas that
constitute the three (3) main districts which are Doka districts, Kawo
district, and Gabasawa district. These areas are Kabala, Malali, and UngwanRimi,
these three locations were selected because of the proximity and familiarity of
the area to the researcher, also because of the diverse background of
individuals that inhabit the local government area, their heterogeneous nature
prove that they represent all types of individuals that must have knowledge or
experience about the internet and cybercrime.
So it is believed that the information received based on the project
topic; the causes and consequences of cybercrime in Kaduna state (A case study
of Kaduna north local government area) will be the same with that of other
areas in the state.
3.3
POPULATION
Population is used to refer to all
inhabitants of a particular place. Considering the nature of the study, the
population for the study has to include all categories of the entire
population, ranging from students, workers, businesspersons, lecturers,
security personnel, cyber café operators etc, this is to enable me harness
collective views for efficient and effective analysis of the subject matter.
3.4
SAMPLING TECHNIQUE
For the purpose of this study both
probability and non-probability sampling techniques will be used to select the
respondents. The probability sampling method that will be used is the simple
random sampling while the non-probability sampling method will be the purposive
sampling.
3.5
METHODS OF DATA COLLECTION
As a tradition in any social research, a
particular method or methods of data collection will be employed in the course
of this research. The methods to be adopted in the process of data collection
are essentially the use of primary sources that is the use of questionnaires
and in-depth interview.
The questionnaires are to be used for
collection of quantitative data from respondents to address the central aim of
the study, that is, the causes and consequences of cybercrime in Kaduna North
Local Government Area. The questionnaires are structured in close ended, open
ended, multiple choice and Likert scale format. It is also divided into four
major parts; Section A, B, C and D. Section A is on personal data (socio
demographic data), Section B is on the frequency of cybercrime occurrence in
Kaduna north local government area, section C deals with the causes of
cybercrime, while Section D will be based on the consequences of cybercrime.
In depth interview on the other hand would be
adopted for collection of qualitative data from three (3) respondents who have
knowledge or considerable experience in relation to the research topic. The
sampling technique employed to select respondents for the in depth interview is
the purposive sampling technique, and it would be used in order to identify key
informants and those relevant to the research project based on their intellect,
knowledge, experience and expertise. While Secondary data would also obtained
through text books, journals, newspapers and publications on the web.
3.6
METHODS OF DATA ANALYSIS
The data that would be collected from the
field will be analyzed with the use of Statistical Package for Social Science
(SPSS). Simple descriptive tools such as percentage and frequency table for
analysis are also to be used in the presentation of data.
CHAPTER FOUR
ANALYSIS AND PRESENTATION OF
DATA
4.1 INTRODUCTION
The main purpose of this chapter is to
analyze and interpret the data elicited from the field. It also intends to
bring out important aspects of the research that are in accordance with the
objectives of the study. To achieve this aim the study adopted the use of
triangulation method in the analysis and interpretation of data. The
triangulation method involves the combination of both quantitative and
qualitative method in the interpretation of the findings collected from the
field. This method increases the validity of the study as findings from the
various methods of data collection complement each other. In all, a total of
120 questionnaires were administered and 3 key informants (a cyber café
operator, a lecturer and a cyber criminal) were interviewed.
4.2 SOCIO - DEMOGRAPHIC CHARACTERISTICS OF RESPONDENTS
GENDER
|
FREQUENCY
|
PERCENTAGE
|
Male
|
86
|
72%
|
Female
|
34
|
28%
|
Total
|
120
|
100%
|
MARITAL STATUS
|
FREQUENCY
|
PERCENTAGE
|
Single
|
88
|
73%
|
Married
|
32
|
27%
|
Widow
|
||
Widower
|
||
Total
|
120
|
100%
|
AGE
|
FREQUENCY
|
PERCENTAGE
|
18
– 25
|
60
|
50%
|
26
– 35
|
50
|
42%
|
36
– 45
|
8
|
7%
|
46
and above
|
2
|
1%
|
Total
|
120
|
100%
|
OCCUPATION
|
FREQUENCY
|
PERCENTAGE
|
Student
|
50
|
41%
|
Business
man/woman
|
32
|
27%
|
Civil
servant
|
26
|
22%
|
Others
|
12
|
10%
|
Total
|
120
|
100%
|
ETHNIC GROUP
|
FREQUENCY
|
PERCENTAGE
|
Yoruba
|
18
|
15%
|
Hausa/Fulani
|
46
|
38%
|
Igbo
|
6
|
5%
|
Others
|
50
|
42%
|
Total
|
120
|
100%
|
RELIGION
|
FREQUENCY
|
PERCENTAGE
|
Christianity
|
74
|
62%
|
Islam
|
46
|
38%
|
Traditional
|
||
Others
|
||
Total
|
120
|
100%
|
EDUCATIONAL STATUS
|
FREQUENCY
|
PERCENTAGE
|
Primary
|
||
Secondary
|
18
|
15%
|
Tertiary
|
102
|
85%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
From the above table, it can be deduced that majority (72%) of the
respondents were males, while the minority (28%) were females.
Marital status of respondents shows that single individuals were the
majority (73%) and married couples were the minority (27%).
Age of respondents show that majority (50%) fell within the age bracket
of 18-25 years, followed by those within the ages of 26-35 years (42%), 36-45
years (7%) and the minority (1%) were within the age bracket of 46 and above.
Occupational status of the respondents shows that majority (41%) were
students, 27% were engaged in one form of business or the other, while 22% were
civil servants and the minority (10%) were into other occupations.
Ethnic group of respondents shows that majority (42%) of the
respondents belonged to other ethnic groups, while Hausa/Fulani respondents
were 38%, followed by 15% of Yoruba respondents and the minority were of the
Igbo ethnic group with 5%.
Religious affiliation of respondents shows that majority were Christians
with 62% while respondents that practiced Islam were the minority with 38%.
Educational status shows the level of educational attainment of the
respondents. From the table above one can ascertain that majority (85%) of the
respondents had attained tertiary education, while the minority (15%) of
respondents had attained secondary education.
4.3 FREQUENCY OF CYBER CRIME
OCCURRENCE IN KADUNA NORTH LOCAL GOVERNMNET AREA
4.3.1 Rate of
cyber crime in Kaduna North L.G.A
RATE
|
FREQUENCY
|
PERCENTAGE
|
Frequently
|
62
|
52%
|
Not
frequently
|
40
|
33%
|
Undecided
|
18
|
15%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
From the table above, it is indicative that majority of the respondents
with 52% believed that cyber crime occurs frequently, while 33% believed cyber crime
doesn’t occur frequently and 15% as the minority were undecided about the rate
of cyber crime occurrence in Kaduna North L.G.A.
The in-depth interview with key informants,
respondents agreed that cyber crime is frequent in Kaduna North L.G.A. For instance
the cyber cafe operator stated that:
When my cafe was newly opened in 2010,
customers that came to browse try to beat our timing system until measures were
put in place to curtail them from stealing our time. But people still come to
send fraudulent mails and as you can see, we don’t allow flash drive into our
systems.
The cyber criminal aired his view on the
frequency of cyber crime in Kaduna North L.G.A as follows:
Cyber crime is frequent around here but an
ordinary person won’t know except when he/she has fallen victim and this is due
to the high level of poverty and the fact that many graduates are unemployed.
Some have computer skills, so they use what they have to survive.
In addition the lecturer stated that:
Cyber crime is any crime committed via the
internet, so people watching pornography are committing crime, those people
sending fraudulent e-mails are committing crime. And those trying to download
academic materials, text books or soft ware from the internet without paying
for it are also committing crime. So you can see that everybody is involved in
this crime.
4.3.2 Places where
cyber crime is mostly perpetrated
PLACES
|
FREQUENCY
|
PERCENTAGE
|
Cyber cafes
|
53
|
44%
|
At home
|
35
|
29%
|
Private
organizations
|
14
|
12%
|
Tertiary institutions
|
14
|
12%
|
Government offices
|
4
|
3%
|
Total
|
120
|
100
|
Source: Field survey 2016.
From the above table it can be inferred that majority (44%) of
respondents believe that cyber crime is mostly perpetrated in cybercafés, 29%
believe cybercrime is mostly perpetrated at home, 12% accept that cyber crime
is perpetrated in private organizations, another batch with the same percentage
say tertiary institutions, while 3% minority of respondents say government
offices.
In line with the above statement, the qualitative data
obtained from the cyber criminal has this to say when interviewed on what he
used to browse or how he accessed the internet:
I have my private modem and laptop that I use
to browse at home. Let me tell you, nowadays cyber criminals don’t use the cafe
any more, they now use wireless and blackberry to access the internet and
operate comfortably from their homes.
The lecturer during the in-depth interview stated that:
My view on the perpetrated point of crime is
the home. This is due to the fact that even ordinary Nokia C3 can browse and
with the reduction in the price of MB, anybody who is interested in criminality
can afford it.
The cyber café operator stated that:
Yes
quite alright these cyber criminals usually come to my café to carry out their
criminal acts, but there are other places where they can also perpetrate this
crime. It could be done even by the road side or in the comfort of their homes,
this is due to easy accessibility to the internet via numerous digital devices.
The
above indicates that cyber crime can be committed by criminals even without
them leaving their homes.
4.3.3 The most common type of
cyber crime perpetrated in Kaduna North L.G.A
CYBER CRIMES
|
FREQUENCY
|
PERCENTAGE
|
Illegal downloads
|
8
|
7%
|
ATM fraud
|
16
|
13%
|
Obtaining money by false pretences (social networks)
|
40
|
33%
|
Cyber identity theft
|
10
|
8%
|
Online dissemination of rumors
|
8
|
7%
|
Hacking
|
32
|
27%
|
Pornography
|
6
|
5%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
From the table above it can be deduced that majority of the respondents
with 33% believed that obtaining money by false pretence via social networks is
the most common type of cyber crime perpetrated in Kaduna North L.G.A, while
27% believed it is hacking, 13% of the respondents were of the view that it is
ATM fraud, 8% believed it is cyber identity theft, 7% of respondents believe
illegal downloads and online dissemination of rumors are the most common, while
5% as the minority believe pornography is the most common type of cyber crime
perpetrated in the L.G.A.
Findings from the in-depth interview with key
informants also identified other types of cyber crime common in the study area.
The lecturer stated that the common cyber
crimes in the area are pin fraud, cheque fraud, theft of identity and economic
fraud.
Similarly, the cyber criminal in the
interview identified the type of cyber crime he usually indulges in. He stated
that:
I am into the use of social network to get my
mate. What I do mainly is to pretend as an imposter via online dating. I looked
for the profile of people that is male and female that lives outside the
country. I always posed to them as a single female looking for a male partner
or as big man who needed a wife or tell them stories on how my wife
disappointed me and took away my property and children or as a widower. All
this is polished in a pitiable way with some pictures to even convince them
whenever I’m chatting with them. From there I begin to play my pranks.
The cyber café operator when asked on the
type of cyber crime he believes is most common stated “software piracy and
hacking”.
4.4.1 Respondents
view on whether they access or use the internet
RESPONDENTS VIEW
|
FREQUENCY
|
PERCENTAGE
|
Yes
|
120
|
100%
|
No
|
||
Total
|
120
|
100%
|
Source: Field survey 2016
From the table above, a conclusion can be drawn that all (100%)
respondents access or make use of the internet
4.4.2 Respondents
awareness of cyber crime
AWARENESS
|
FREQUENCY
|
PERCENTAGE
|
Yes
|
117
|
97.5%
|
No
|
3
|
2.5%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
From
the table above, it can be observed that majority (97.5%) of the respondents
are aware of cyber crime, while minority (2.5%) are not aware of cyber crime.
The lecturer interviewed showed his awareness
of cyber crime and said:
Cyber crime is derived from two words “cyber”
and “crime”. Cyber refers to any activities either sales or transaction of
services in the cyber space while crime are unacceptable activities. When join
together, it means all fraudulent, illicit and unacceptable activities related
to cyber space.
The operator of the cyber cafe agreed with
the above definition and shared his knowledge of cyber crime as thus:
Cyber crime is committing crime through the
internet, it does not necessarily mean it has to happen inside the cyber cafe,
you can have your laptop, you have your modern in your house and you commit
crime; hack people’s mail. That is cyber crime.
In addition, the cyber criminal when asked
during the in-depth interview how long he has been involved in cyber crime,
stated that “I have been doing it for a while let say 4 to 5 years now”.
4.4.3 Respondents view on the
cause and motivating factor responsible for the involvement of individuals in
cyber crime
CAUSES
|
FREQUENCY
|
PERCENTAGE
|
Poverty
|
22
|
18%
|
Joblessness/unemployment
|
40
|
33%
|
Easy
accessibility to the internet
|
12
|
10%
|
Greed
|
8
|
7%
|
Laziness
|
8
|
7%
|
Negligence
by authorities /loose security system
|
4
|
3%
|
Get
rich syndrome
|
14
|
12%
|
Peer
pressure/influence
|
12
|
10%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
From the above table one can discern that respondents believe the
causes and motivating factors responsible for peoples involvement in cyber
crime are; majority (33%)consider joblessness/unemployment
as the cause of cyber crime, 18% of respondents consider poverty as the cause, 12% of respondents believe it’s get rich syndrome, 10% of respondents decide on easy accessibility to the internet and peer pressure/influence causes cybercrime, while 7% of respondents consider greed and laziness as the causes of cybercrime and minority (3%) of respondents consider negligence by authorities/loose security systems as issues responsible for individuals involvement in cybercrime.
as the cause of cyber crime, 18% of respondents consider poverty as the cause, 12% of respondents believe it’s get rich syndrome, 10% of respondents decide on easy accessibility to the internet and peer pressure/influence causes cybercrime, while 7% of respondents consider greed and laziness as the causes of cybercrime and minority (3%) of respondents consider negligence by authorities/loose security systems as issues responsible for individuals involvement in cybercrime.
The qualitative data gave an explicit
explanation of the motivating factors.
The lecturer stated that:
Someone may have grudges with an
organization. A new organization can come and take away his market and you
don’t feel happy about it and you try to create something that will render that
service that organization is producing ineffective. Take for example there are
people that design program and anti-virus to make money e.g. AVG and Avast. One
of these companies could develop virus that the other company anti-virus
software won’t be capable of handling and tend to make that antivirus
ineffective.
Then another motivating factor is the
tremendous success rate of the Yahoo Boys from their illegal act and not been
caught by the law enforcement agencies, this will only serves to encourage
others. Other motivating factors include excitement to succeed, get-rich syndrome,
vengeance and sometimes sabotage.
Furthermore, the cyber cafe operator said
that:
The motivating factors varies, but I think
that inadequate legislation, financial benefits, low costs of executing the
crime, low probability of being caught and prosecuted (due to weak laws and
enforcement mechanisms) and the level of stigmatization of cyber criminals has
not been so great.
The cybercriminal when asked what motivated
him into such criminal act stated that:
You have seen our Nigerian politicians, you
see the way they celebrate wealth, and this serves as a motivator for my
involvement and other youths in cyber crime. The Nigerian society celebrates
wealth without questioning the source of the money. Politicians caught
defrauding the state become members of committees of the state and are given
national awards. In churches and mosques, corrupt individuals are invited to
launch building projects and hold esteemed positions so why won’t I find a way
to survive from the economic hardship so that they can also call my name.
Then in our peer group, we use it asa form of
getting reputation for example, if one successfully cracks software you gain
some respect fromour friends.
4.4.4 Activities
respondents access or engage in while on the internet
ACTIVITIES
|
FREQUENCY
|
PERCENTAGE
|
Google
search
|
31
|
26%
|
Social
media
|
25
|
21%
|
Academic
research
|
16
|
13%
|
E-mail
|
20
|
17%
|
Internet
phoning
|
3
|
3%
|
Entertainment/sports/games
|
10
|
8%
|
News
|
5
|
4%
|
Others
|
10
|
8%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
The above table shows that majority (26%) of respondents access google
search while on the internet, 21% access social media, 17% of respondents
access their e-mails, 13% engage in academic research, 8% engage in
entertainment/sports/games, the same percentage engage in others, 4% access
news online, while the minority (3%) of respondents engage in internet phoning.
The in-depth interview conducted with the
cyber criminal he supported both social media and piracy. According to him,
basically there are many things I do on the internet but what I spend most of
my time doing is on facebook, yahoo mail, chat room and piracy, I get cool
money from downloading software and selling it.
In a bid to know what he uses the social
network for, he stated that “I use it to send fraudulent mails to my target”.
The cyber café operator stated that: I use a lot of web sites, they are
so many I can’t begin to mention or give a specific amount but don’t get me
wrong I only access them for legal transactions. Besides I own this café you
can’t blame me, I have all the time and resources I need.
As for the lecturer he stated that: most times I am browsing the
internet it is usually for academic or research purposes, only on rear
occasions I might send a few e-mails or read the online dailies.
4.4.5 Respondents
opinions on those usually involved in perpetrating cyber crime
PERPETRATORS
|
FREQUENCY
|
PERCENTAGE
|
Youths
|
72
|
60%
|
Unemployed
|
20
|
17%
|
Security
personnel
|
4
|
3%
|
Students
|
10
|
8%
|
Cyber
cafe operators
|
6
|
5%
|
Adults
|
8
|
7%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
From the table above it shows that majority (60%) of respondents are of
the opinion that youths are those usually involved in perpetrating cyber crime,
followed by the unemployed with 17%, and 8% of respondents opined that students
are usually the perpetrators, 7% of the respondents were of the opinion that
cyber crime is usually perpetrated by adults, while 5% decided on cybercafé
operators and 3% minority settled for security personnel as the perpetrators of
cyber crime.
Findings from the qualitative data
corroborated with the above result on the age of cyber criminals as all key
informants interviewed agreed that cyber criminals are mostly youths. For
example, the lecturer said that:
Cyber criminals are mostly youths between the
ages of 20-35 years. This may be due to the early exposure of the young ones to
the activities on the internet without proper guidance. I think that is the
reason why cyber crime is more among that age bracket.
The cyber criminal also said that: The male unemployed youths are normally more
involved in cyber crime. You don’t
need to have a university degree before you can commit cyber crime. In fact
cyber crime is not committed by dull people. You must be intelligent and smart
and most youths that are involved in this are found in any kind of tertiary
institution, social and ethno-religious background we have in Nigeria.
While the cyber cafe operator had this to
say: I will say 99% of cybercriminal are guys who are in their youthful age.
Though I once came across a very powerful computer programmer and she was a
lady. If she decides to use her knowledge negatively, she will be a good
cybercriminal.
4.5.1 Respondents perception
of the consequences of cyber crimes
CONSEQUENCES
|
FREQUENCY
|
PERCENTAGE
|
Economic
instability
|
28
|
23.5%
|
Distrust/disunity
among individual in the society
|
30
|
25%
|
Tarnishes
the country’s image
|
14
|
12%
|
Hinders
development and progress in the country
|
10
|
8%
|
Loss
of revenue
|
10
|
8%
|
Loss
of freedom/jail terms
|
28
|
23.5%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
The table above shows that there are two batches of majority (23.5%)
among the respondents who perceive that economic instability and loss of
freedom/jail terms are the consequences of cyber crime, 25% perceive
distrust/disunity among individuals in the society as the consequence, while
12% perceive that cyber crime tarnishes the image of the country and two
minority batches with 8% are of the perception that hindrance of the
development and progress in the country and loss of revenue are the
consequences of cyber crime.
The in-depth interview conducted reveals other negative
consequences of cyber crime. The lecturer stated that:
Cyber crime creates a bad image for Nigeria and this has
earned Nigeria her present ranking/rating in Transparency International where
Nigeria is been listed as one of the most corrupt nation in the world.
Another consequence of cybercrime is that it will drive
away investors because due to the fact that most things are done electronically
and if someone can attack your data base, then he has everything about you at
his disposal.
The operator of cyber cafe interviewed also states that:
Cybercrime has negative consequence. Take for instance,
if a white man comes to Nigeria to survey in order to invest and discovered or
he is receiving fraudulent mails from different people, he won’t invest in the
country again.
However, the cybercriminal was of the view that
cybercrime plays a dual role in the society when asked about the consequences
of the crime. He state as follows:
Yes it has negative consequences and among it is that it
drives away investors. But not minding the negative consequences it has on the
country, it is a way of getting connected and being rated well in the family,
school and society, that is if you succeed. It is also a way for survival due
to the high rate of youth unemployment and high poverty rate in the country.
Take for example now, the money I get from the sales of software I downloaded
free from the net. I use it to take care of my needs. These days, when you graduate,
you will not find a job even after you had spent so much to obtain a good
certificate
4.5.2 Views of respondents on
whether the activities of security personnel has been helpful in terms of
cybercrime punishment and prevention
VIEWS
|
FREQUENCY
|
PERCENTAGE
|
Strongly
agree
|
56
|
47%
|
Agree
|
32
|
27%
|
Neutral
|
20
|
17%
|
Disagree
|
10
|
8%
|
Strongly
disagree
|
2
|
1%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
The
table above indicates that majority (47%) of the respondents strongly agree
that the activities of security personnel has not been helpful in terms of
cyber crime punishment and prevention, 27% of respondents agree, 17% are
neutral on the matter, 8% of the respondents disagree, while minority (1%) of
the respondents strongly disagree with the statement.
4.5.3 Views of respondents on the ways and nature of the lifestyle of cyber criminals
4.5.3 Views of respondents on the ways and nature of the lifestyle of cyber criminals
VIEWS
|
FREQUENCY
|
PERCENTAGE
|
Deceitful/fraudulent
|
30
|
25%
|
Extravagant/flamboyant
|
36
|
30%
|
Secretive/mysterious
|
30
|
25%
|
Pathetic
|
12
|
10%
|
Wayward/indiscipline
|
12
|
10%
|
Source: Field survey 2016.
From the table above it is deducible that majority (30%) of the
respondents view the ways and nature of the lifestyle of cyber criminals as
extravagant/flamboyant, two batches of 25% of respondents view their lifestyle
as deceitful/fraudulent and secretive/mysterious, while another two batches of
minority (10%) respondents view the lifestyle of cyber criminals as pathetic
and wayward/indiscipline.
In support of the above life style of cyber
criminals, the lecturer stated that:
Some of them when they hit big, they do good
things for themselves and their parents. They ride good cars, dress flashy,
always attending clubs. Those I knew then in the university were using good
cars. Then Toyota Camry and this baby boy were expensive not now that it is
pure water.
In addition, the cyber criminal when asked
what he does with the proceeds of the money he receives from the criminal act
stated that:
What I do mainly with the money I get from
the sales of the software I get from the internet is to assist myself in school,
have more money to subscribe for airtime and I also spend for my siblings and
girlfriends.
The operator of the cyber café when
interviewed stated that:
Some of them do such things like; consulting
spiritualists and herbalists in order to continue to be successful and also to
assist them charm their victims in order to dance to their tune.
4.5.4 Attitude of
respondents towards cyber crime and cyber criminals
ATTITUDE
|
FREQUENCY
|
PERCENTAGE
|
Non
cordial
|
104
|
87%
|
Cordial
|
16
|
13%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
From
the table above majority (87%) of respondents say their attitude towards cyber
crime and cyber criminals is non cordial, while minority (13%) of respondents
say their attitude towards cyber crime and cyber criminals is cordial.
4.5.5 Suggestions by
respondents on ways in which cyber crime can be totally eradicated
WAYS
|
FREQUENCY
|
PERCENTAGE
|
Individuals
should ensure they always protect and do not disclose their personal
information either online or offline
|
6
|
5%
|
Stringent
laws against cyber crime should be formulated and fully enforced
|
14
|
12%
|
Security
agencies with ICT knowledge should be put in place to monitor the activities
of internet users (cyber policing)
|
42
|
35%
|
Perpetrators
should be rightfully punished in order to deter future offenders
|
18
|
15%
|
Job
opportunities/ employment should be created by the government
|
22
|
18%
|
Youths
should be educated on the pros and cons of using social networks and the internet in general
|
18
|
15%
|
Total
|
120
|
100%
|
Source: Field survey 2016.
From the table above majority (35%) of respondents suggests that
security agencies with ICT knowledge should be put in place to monitor the
activities of internet users in order to totally eradicate cyber crime, 18%
suggests that job opportunities/ employment should be created by the
government, two batches of 15% of respondents suggests perpetrators should be
rightfully punished in order to deter future offenders and youths should be
educated on the pros and cons of using
social networks and the internet in general, 12% of respondents suggest
thatstringent laws against cyber crime should be formulated and fully enforced,
while minority (5%) of respondents suggest individuals should ensure they
always protect and do not disclose their personal information either online or
offline.
However
the three key informants interviewed made suggestions on how cybercrime can be
eradicated and they said:
The Cybercriminal: In combating these crimes there is need for education, human capacity development and provision of employment which is one of the most viable strategies which can be used to curb cybercrime.
The Cybercriminal: In combating these crimes there is need for education, human capacity development and provision of employment which is one of the most viable strategies which can be used to curb cybercrime.
The Café operator: A good and effective legal framework should be
put in place in order to pursue these crimes and criminals. This could be
achieved by first equipping law enforcement personnel with requisite
technological knowledge.
The lecturer: Universities/schools of higher learning and academic
institutions should devise specific ICT courses designed to allow the next
generation of policemen, business persons, accountants, lawyers etc skilled in
what is a challenging but vital and lucrative sphere.
CHAPTER FIVE
SUMMARY,
CONCLUSION AND RECOMMENDATIONS
5.1
SUMMARY
This
work has examined the views and opinions of writers and scholars on the subject
matter (cybercrime). A further milestone was reached at the definition of the
term “Cybercrime” and criticisms on the work of some writers achieving a better
understanding of the concept of “Cybercrime”. This research work examined
Cybercrime as evident in Kaduna North LGA, to wit: Internet pornography,
identity theft and impersonation, ATM/Credit card fraud, cyber hacking etc.
More
so, the research findings reveal that majority of the respondents are aware of
cybercrime and its frequent occurrence rate. According to the findings of the
research, majority of the respondents were of the view that youths are the main
perpetrators of cybercrime and unemployment is the principal factor responsible
for their involvement in this dastardly act.
Furthermore
it was discovered that majority of the respondents perceived distrust/disunity
among individuals in the society to be the most severe consequence of
cybercrime, and majority of the respondents strongly agreed that the way and
manner security personnel go about their activities has not been helpful in
penalizing cyber criminals and preventing cybercrime.
Finally,
based on the suggestions made on the ways in which cybercrime can be totally
eradicated majority of the respondents were of the opinion that security
agencies with ICT knowledge should be put in place in order to monitor the
activities of internet users, a strategy which could be termed cyber policing.
5.2 CONCLUSION
Taking cognizance of the causes and
consequences of cybercrime, there will always be new and unexpected challenges
to stay ahead of cyber criminals, but we can only do this successfully through
partnership and collaboration of both individuals and government. There is much
we can do to ensure a safe, secure and trust worthy computing environment. It
is crucial not only to our national sense of wellbeing, but also, to our
national security and economy. The remarkable development in human history
through computer technology has no doubt brought transformation in all aspects
of life, especially in communication and information technology.
Nevertheless, the embracement of the internet
has come with a lot of mixed feelings despite its numerous advantages to the people
of Kaduna North Local Government. In Nigeria, people are valued in terms of
what they possess and command economically. Conversely, those without economic
success are undervalued and the pressure to achieve success is intensified
despite the harsh economic conditions such as unemployment, illiteracy,
poverty, greed amongst others. This necessitated the ability of individuals to
devise survival strategies and attain economic success by indulging in
cybercrime. The perpetrators of cybercrime are not far- fetched, they are our
brothers, friends, colleague, distant relatives and neighbors who can be tamed
under appropriate circumstances with the right and positive communication,
orientation, education and empowerment.
5.3
RECOMMENDATIONS
Education is the most vital weapon for
literacy; as such seminars and workshops should be organized from time to time
with emphasis on cyber safety so that individuals will learn to keep their
personal information safe and youth will flee cybercrime.
The findings from the study shows that youths
involved in cybercrime are either in tertiary institutions or have graduated
from tertiary institution. The study therefore, recommends that curriculum
which will include courses on cybercrime, cyber management and its prevention should
be introduced to both tertiary and secondary schools to take care of the
present social changes.
The study discovered that there is no
legislation on cybercrime. It is recommended that the government should
immediately enact a comprehensive law on cybercrime, in order for legislation
on cybercrime to be effective and efficient when enacted, there is need for
government to empower graduates by providing employment.
Likewise government should make provision for
intensive training of law enforcement agencies on ICT so that they can track
down the cyber criminals no matter how intelligent and cunning they may be.
For government agencies, law enforcement
agencies, intelligence agencies and security agencies to fight and curb
cybercrime, it is recommended that there is need for them to understand both
the technology and the individuals who engage in this criminal act.
The findings showed that cyber criminals
lives in the society, as such, prevention of cybercrime requires the
cooperation of all the citizens and not the law enforcement agencies alone. It
is therefore, recommended that everyone should watch and report to law
enforcement agencies, anyone who indulge in cybercrime. Cyber criminals caught
should not only be prosecuted by government, it is recommended that cyber
criminals’ assets should also be confisticated by the government and the
imposition of longer prison terms for those found guilty. This will serve as
deterrence to those youths who want to indulge in such crime.
The innocent internet users should inculcate
the habit of continuously updating their knowledge about the ever changing
nature of ICTs, through this, they can not only be well informed about the
current trends in cybercrimes, but they will also have the knowledge about
different forms of the said crimes and how the cyber criminals carry out their
heinous activities, thus they can devise means of protecting their information
from cyber criminals, put succinctly internet users should be security
conscious.
Similarly, internet users should not provide
personal or financial information to others unless there is a legitimate and
assumed reason for that. They should not for instance, throw out papers works
like cheques, bank and brokerage statements, old credit cards, driver’s
license, passports, receipts from ATM among other numerous documents which
usually have personal data.
Lastly, the internet service providers should
not just provide broadband connection to their subscribers especially the home
users, but they should also monitor effectively what the subscribers are doing
on the net, at what time and where. They should provide their customers,
especially financial institutions and cyber cafes with well-guided security
codes and packages in order to protect their information and software from
hackers and illegal publishers.
REFERENCES
Agba,P.C. (2002), International Communication
Principles, Concepts and Issues.
Okunna,C.S. (ed) Techniques of Mass
Communication: A Multi-dimentional
Approach. Enugu: New Generation Books.
Akogwu, S. (2012),An Assessment of the Level
of Awareness on Cyber Crime among
Internet Users in Kaduna State (Unpublished
B.Sc project). Department of
Sociology, AhmaduBelloUniversity,Zaria.
Awe, J. (2009), Fighting Cyber Crime in
Nigeria.
Ayantokun, O. (2006), Fighting Cyber crime in
Nigeria: Information-
system.www.tribune.com
Church, Wharton and Taylor (2009) An
Examination of Differential Association and Social Control Theory: family
systems and delinquency, youth violence
and juvenile justice.
Ehimen, O.R. and Bola, A,(2010), Cybercrime
in Nigeria. Business Intelligence Journal, January 2010,Vol.3.No.1
Forester and Morrison (1994) Three Categories
of Cybercrime
Girasa
R.J. (2002), Cyber Law: National and International Perspectives, New Jersey, Prentice
Hall Publishers.
Gotternbarn (1999) The Introduction to
cybercrime: security, prevention and detection.
History of Kaduna State.http://en.wikipedia.org/wiki/kaduna_state
Imhof (2010), Cybercrime and
Telecommunication Law. Rochester Institute Of
Technology USA.
Hirschi (2002) Causes of Delinquency. New
Brunswick, NJ: Transaction
Publishing.
Kumar, K. ( 2003), Cyber Laws, International
Property and E-commerce
Security. Dominant Publishers and
Distributors, New Delhi.Global
Information.
Mc Connell (2000), Cyber crime and
Punishment. Archaic Law Threaten.
Microsoft Encarta Premium (2009)
Olaide and Adewole (2004), Cyber Crime
Embarrassing for Victims.
Retrieved September 2016 from http//www.heraldsun.com.au
Olugbodi, K. (2010), Fighting Cyber Crime in
Nigeria.
Okwunma
E.N. (2011) “Criticism: Cybercrime Bill”, Telecommunications
Engineering Masters Project, University of Witwatersrand Johannesburg
South Africa.
Oyewole and Obeta (2002), An Introduction to
Cyber Crime. Retrieved
September 2016 from http//www.crimeresearch.
Ribadu, E. (2007), Cyber Crime and Commercial
Fraud; A Nigerian
Perspective. A paper presented at the Modern
Law for Global
Commerce, Vienna 9th – 12th July.
Sesan, G. (2010), The New Security War. London,
Harcout Inc.
Shinder, D.L.(2002), Scene of the Cyber
crime: Computer Forensics
Handbook.Syngress Publishing Inc. 88 Hingham
Street, USA.
Summer (1997) Harvard Journal of Law and
Technology, Volume 10,
Number 3.
Sutherland, E.(1939), Principles of
Criminology. Fourth edition.
Vladimir, G.(2005), International Cooperation
in Fighting Cyber
Crime.www.crimeresearch.org
Zero Tolerance (2006), Retiree in Trouble over
Internet Fraud.
Economic and Financial Crime Commission,
Vol.1, No. 2
http//www.guide2nigeria,com/news_articles_About_Nigeria
http://dictionary.reference.com/browse/cybercrime
http://en.m.wikipedia.org
Www.Oxford advanced learners
dictionary.com
Www.Dictionary.cambridge.org
APPENDIX I
QUESTIONNAIRE ON THE CRITICAL
EVALUATION OF CAUSES AND CONSEQUENCES OF CYBER CRIME IN KADUNA STATE (A CASE
STUDY OF KADUNA NORTH LOCAL GOVERNMENT AREA)
Dear
respondent,
I
am a postgraduate student of department of sociology, Kaduna State University,
conducting a research on the topic ‘‘Critical Evaluation of Causes and
Consequences of Cybercrime in Kaduna state – A Case Study of Kaduna North Local
Government Area’’ as a basic requirements for the award of Masters in Criminal
Justice.
I
hereby seek your indulgence in answering this questionnaire. Be assured that
your response will be treated with utmost confidentiality. Thank for your
cooperation.
INSTRUCTION:
You are to tick [ ] in the appropriate
option provided and fill the blank where necessarily needed.
SECTION
A: SOCIO-DEMOGRAPHIC DATA
1. What
is your Gender?
a. Male
[ ]
b. Female [ ]
2. What
is your marital status?
a. Single
[ ] b. Married [ ] c. Widow [ ] d. Widower [ ]
3. What
is your age?
a. 18-25
[ ] b. 26-35 [ ] c.36-45 [
] d.46 and above [ ]
4. What
is your occupation?
a. Student
[ ] b. Business man/woman [ ] c. Civil servant [ ] d. Others [ ]
5. What
ethnic group are you?
a. Yoruba
[ ] b. Hausa/Fulani [ ] c. Igbo [
] d. Others specify………….
6. What
is your religion?
a. Christianity
[ ] b. Islam [ ] c. Traditional [ ] d. Others [ ]
7. What
is your educational status?
a. Primary
[ ] b. Secondary [ ] c. Tertiary [ ]
SECTION B: FREQUENCY OF CYBERCRIME OCCURRENCE
IN KADUNA NORTH LOCAL GOVERNMENT AREA
8. What
is the rate of cybercrime occurrence in Kaduna North Local Government?
a. Frequently
[ ] b. Not frequently [ ] c. Undecided [ ]
9
. Where are the places cyber crimes are mostly perpetrated?
a. Cybercafés
[ ]b. At home [ ] c. Private organizations[ ]
d.
Tertiary institutions [ ] d. Government
offices [ ]
10.
What is the most common type of cybercrime perpetrated in
Kaduna
North Local Government?……………………………………………
SECTION C: CAUSES OF CYBERCRIME
11.Do
you access or use the internet?
a. Yes
[ ] b. No [ ]
12.Are
you aware of cybercrime?
a. Yes
[ ] b. No [ ]
13.What
do you consider to be the cause and motivating factor responsible for the involvement
of individuals in cybercrime?
……………………………………………………………………………….
14.
As an individual what kind of activity do you access or engage in while on the
internet?
a. Google
search [ ]
b. Social
media [ ]
c. Academic
research [ ]
d. E-mail
[ ]
e. Internet
phoning [ ]
f. Entertainment/Sports/Games
[ ]
g. News
[ ]
h. Others [ ]
15. In your own opinion who are those
persons usually involved in Perpetrating cybercrime?
………………………………………………………………………..
SECTION
D: CONSEQUENCES OF CYBERCRIME
16.What
do you perceive to be the consequence of cybercrime?
…………………………………………………………………………….
17. The activities of security personnel has
not been helpful in terms of cybercrime
punishment and prevention?
Strongly
agree Agree Neutral
Disagree Strongly disagree
[
] [ ]
[ ] [
] [ ]
18. How do you view the ways and nature of the
lifestyle of cybercriminals?
……………………………………………………………………………………
19.
How is your attitude towards cybercrime and cybercriminals?
a. Non
cordial [ ] b. Cordial [ ]
20. Make suggestions on the ways in which
cybercrime can be totally
eradicated…............................................................……………………………………………………………………………………………………………………………………
Yours faithfully,
@Nurt9ja
Matric No: .....................................
No comments:
Post a Comment