CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
The internet has become a vital part of society's everyday life, and its importance is growing by the day. However, the internet has brought with it a slew of potential dangers for internet users. The internet, according to Holt and Bossler (2016), has altered every area of human existence, including how individuals interact, buy, finance, enjoy themselves, and get news. The majority of the population in Nigeria has access to the internet (96 percent of homes in 2019) and utilizes it on a daily basis. In 2019, 87% of the Nigeria population was on social media, almost 100 million people bought online, and 84% utilized internet banking (CBS, 2020). in internet connection in 2019. Although the internet has numerous advantages, it has also offered possibilities for criminals to conduct a variety of crimes. Cybercrime is a term used to describe certain types of crimes. Cybercrime, according to Furnell (2002, 21), can only happen if "the offender utilizes a unique understanding of cyberspace." Although there are numerous definitions of cybercrime, there is still no scholarly or precise definition. Computer crime, electronic crime, hi-tech crime, computer-related crime, technology-enabled crime, cyberspace crime, or ecrime are various terms used to describe cybercrime. As a result, Grabosky (2007) identified three types of cybercrime. The first is when a computer is used as a tool of crime in order to commit crimes, in which traditional crimes may be committed with the help of digital technology. The second type occurs when the computer is unintentionally involved in the crime, such as when digital technology plays an unintentional part in routine criminal behavior. The third type is when a computer is the target of a crime, resulting in information systems being damaged or interfered with. Despite the fact that this categorization of cybercrime is flawed, it is nevertheless useful in comprehending cybercrime. Cybercrime was also classified by Gordon and Ford (2006). On a continuous scale, they categorized cybercrime into Type I and Type II offenses. Type I offenses are more technological in nature, whereas Type II offenses rely on human touch rather than technology. ‘There are likely to be relatively few instances that are entirely Type I or Type II; these kinds reflect either end of a continuum,' the scientists add (Gordon & Ford, 2006, p.16). However, one may argue that, as a result of advancements in robotics and artificial intelligence (AI), a Type III offense could emerge, which would be perpetrated by machines capable of self-learning rather than humans. Multiple variables, such as self-control and personality, are linked to an increased or decreased risk of being a victim (Sarre, Yiu-Chung Lau, & Chang, 2018). People with weaker self-control are more risk-taking, myopic, impulsive, insensitive to other individuals, and want more simple and quick pleasure, according to Gottfredson and Hirshi's (1990) general theory of crime. As a result, these people are more prone to engaging in criminal activity. According to Schreck (1999), the general theory of crime may be used to anticipate criminal victimization since the lack of preventative behavior as a result of risk-taking and shortsightedness can make a person more prone to being victimized. Low selfcontrol is specifically a risk factor for cybercrime, according to Holtfreter, Reisig, and Pratt (2008), since the criminal needs the victim's assistance to succeed. It has been proven that having low levels of self-control increases the chance of being a victim of some forms of cybercrime (van Wilsem, Ngo & Paternoster, 2011). According to Bidgoli, Knijnenburg, and Grossklags (2016), there is a subset of people who are particularly vulnerable to cybercrime. These include undergraduate students. They are more vulnerable due to their increased use of technology, social freedom, and newly acquired financial independence (Bidgoli et al, 2016). It was also shown that these individuals place a high value on information regarding cybersecurity and criminality from the media and people they know (Bidgoli et al, 2016). Because undergraduate students are particularly vulnerable to cybercrime, it is beneficial to research this population in order to prevent crime. As a result, the emphasis of this research will be on youths from various residential areas in Illorin. Furthermore, risk perception, self-control, and personality have been proven to be key variables in cybercrime victimization.
1.2 STATEMENT OF THE PROBLEM
Nigeria is the world's seventh largest oil producer, according to Wikipedia, although the majority of Nigerians remain impoverished. Nigeria is also regarded as one of the world's most corrupt countries. The fast growth of Internet usage in Nigeria has resulted in an explosion of Internet Service Providers (ISPS) and Internet Access Points, which has had a beneficial influence on the country's socio-economic and educational advancements. Unfortunately, the country's reputation has deteriorated as a result of certain Nigerians' unplanned behaviors, such as utilizing the internet to carry out illegal spamming operations. The primary consequence of Nigerian society's implicit acceptance of this threat in the foreseeable future is a high degree of apathy in education and touting among young people. Young people, especially youths, are the ones that indulge in this type of anti-social behavior in Nigeria nowadays in order to live a life of opulence. Nigeria has recently been labeled as a corrupt country. The Nigerian government must act quickly and decisively to combat the cybercrime threat.
1.3 OBJECTIVE OF THE STUDY
The objectives of this study are to:
I. To find out how residents of Illorin perceive cybercrime.
II. To determine the factors that lead to youths in Nigeria becoming involved in cybercrime.
III. To find out ways the government can curb cyber crime.
1.4 RESEARCH QUESTIONS
I. How doresidents of Illorin perceivecybercrime?
II. What are the factors that lead to youths in Nigeria becoming involved in cybercrime?
III. In what way can the government curb cybercrime in Nigeria?
1.5 SIGNIFICANCE OF THE STUDY
This study will give insight into the difficulties connected with cybercrime, with the primary goal of describing how cybercrime has influenced the perspective of Illorin inhabitants. This study would be extremely beneficial to young people, as it would inform them about the reasons that lead to young people becoming involved in cybercrime in Nigeria. It would be beneficial for the government and other stakeholders to have a better understanding of the reasons that contribute to the development of cybercrime among Nigerian youths [and the general public] and how to combat it. Researchers will be able to utilize the findings to further their understanding of the subject.
1.6 SCOPE OF THE STUDY
The objective of this study was to Illorin residents' perceptions of cybercrime, with residents of Asa local government Illorin, Kwara state, Nigeria serving as the study group.
1.7 LIMITATION OF STUDY
One significant limitation is that the samples were limited to Asa LGA, which was chosen as the study's focus. This conclusion is based on data collected from Asa LGA about people of Illorin's perceptions of cybercrime.
1.8 DEFINITION OF TERMS
Attitude: a feeling or opinion about something or someone, or a way of behaving.
Perception: the way in which something is regarded, understood, or interpreted.
Residents: a person who lives somewhere permanently or on a long-term basis.
Cybercrime is any criminal activity that involves a computer, networked device or a network.
NOT THE TOPIC YOU ARE LOOKING FOR?
Once payment is made, kindly send us your project topic, email address and payment name to +234 810 144 4147
Once payment is confirmed, Project materials will be sent to your email