Statistical Analysis of a Four Selected Cyber Crime

Download complete project materials on Statistical Analysis of a Four Selected Cyber Crime from chapter one to five

ABSTRACT

This project work is focused on the four selected cyber crime from 2004 – 2010. A case study of RANCEES CYBER CAFÉ. The source of the data used in this project write up is secondary in nature because it was from the record of RANCEES CYBER CAFÉ the statistical tools used in the project are chi square (2) test of independence, Kruskal-Wallis Test and Kendall’s Coefficient of Concordance  using chi – square it was revealed that cyber crime committed depend on year,  by using Kruskal-Wallis Test it shows that there is significance different among the four selected cyber crime and also by using kendall coefficient of concordance is to know if there is strong agreement among the crimes and the year.

Therefore it is recommended that cyber crime being virtual in nature, the authority or government should acquired new technology and trained personnel in detecting and prosecuting offenders to give Nigeria a better name among Nation of the world.

 

LIST OF SYMBOL AND ABBREVIATION

SSt                  =          Sum of square treatment

SST                 =          Sum of square total

∑                     =          Summation

∑∑                  =          Double summation

Ms                   =          Mean square

SS                    =          Sum of square

np                    =          Number of observation

d.f                   =          Degree of freedom

Anova                        =          Analysis of variance

(p-1)               =          Degree of freedom for treatment

P(n-1)             =          Degree of freedom for total

α                      =          Alpha level

H0                   =          Null Hypothesis

H1                   =          Alternative Hypothesis

y..                    =          Grand Total

fcal                   =          f calculated

ftab                   =          t tabulated

λ2                     =          Chi – square

λ2cal                 =          Chi – square calculated

λ2tab                 =          Chi – square tabulated

0ij                   =          Observed frequency

eij                    =          Expected frequency.

 

TABLE OF CONTENTS

Title Page

Declaration

Approval Page

Acknowledgement

Abstract

List of Symbol and Abbreviation

Table of Contents

CHAPTER ONE

1.0       Introduction

1.2       Statement of Research Problem

1.3       Statistical Background of the Study

1.4       General  Objectives

1.5       Significance of the Study

1.6       Scope of the Study

1.7       Limitation of the Study

1.8       Definition of Terms

CHAPTER TWO

2.0       Literature Review

2.1       Introduction

2.1.1   Reviews of Cyber Crime

2.1.2   Types of Cyber Crimes

2.2       Mediums of Perpetration in Cyber Crime

2.2.1   Tools of the Trade

2.2.2   What Are General Reasons For Hacking By Cyber Criminal?

2.3       Fighting Cyber Crime in Cafes

2.4       Computer Crime Survey

CHAPTER THREE

3.0       Research Methodology

3.1       Introduction

3.2       Statistical Data Are Of Two (2) Kinds

3.3       Statistical Tools Used

3.4       Condition For Application Of Chi – Square

  1. 5 Use Of Chi- Square Is As Follows:

3.6       Method of Data Analysis

CHAPTER FOUR

4.1       Data Presentation

4.2       Data Presentation And Analysis

Computation Of Spss Output

4.4       Kruskal-Wallis Test

4.5       Kendall’s Coefficient of Concordance

CHAPTER FIVE

5.0       SUMMARY, CONCLUSION AND RECOMMENDATIONS CONCLUSION

5.1       Summary

5.2       Conclusions

5.3       Recommendation

References

 

CHAPTER ONE

1.0       INTRODUCTION

Statistics branch of mathematics that deals with the collection, organization, and analysis of numerical data and with such problem as experiment design and decision making. This project work wends to analyzed statistically, the four selected cyber crime using RANCEES CYBER CAFÉ, KADUNA STATE WITHIN the period of year (2004 – 2010).

Cybercrime can broadly be defined as criminal activity involving an information technology infrastructure including vesal access (unauthorized access) Wagal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), system interference (interfering with puncturing of a computer system by imparting, transmitting, damaging, deleting, deter rating, altering or suppressing computer data) misuse of devices forgery (ID these) and electronic fraud. The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the Abacus, which is thought to be the earliest form of a computer, has been ground since 5300 BC in India, Japan and china. The era of modern computers, however, began with analytical engine of Charles Babbage.

In 1820, Joseph-Marie Jacquard, a textile manufacture in France, produced the 100m this device allowed the repetition of a series resulted in a fear amongst Jacquards olivewood were being threatened. They commuted acts of sabotage to discover age Jacquard from further use of the new technology. This is the first recorded cyber crime! In Nigeria computer crime issue have become high profile particularly those surrounding copy right infringement, specimen known as “419” etc. There are also problem of privacy when confidential information is lost or intercepted, lawfully or otherwise.

There are many security threats that face computers in Nigeria today but the most perpetrated one is the online “419”- the use of computers and or the Internet to commit crime – therefore cyber crime remain an image night more for Nigeria, a source of concern and embarrassment within and outside her boundaries.

The internet is full of useful information unlimited opportunities for commercial, social and educational activities. But cyber crime introduced its own peculiar risks its menace poses danger to the society the country image, economics etc it is worthy of role that the aim of the convenience of the use of information technology as been abuse and exploited to serve criminal purposes.

1.2  STATEMENT OF RESEARCH PROBLEM

For the past few years cyber crime activities in Nigeria have been so high due to the economic downturn, unemployment and greed of the perpetrators and the insensitiveness of the concern authority. This research work is feared toward fishing out some of the problems and preferred solution to them. It also list the four major cyber crime perpetrated in four selected cyber cafes.

1.3 STATISTICAL BACKGROUND OF THE STUDY

RANCEES RANCEES CYBER CAFÉ was established 1 August, 2004 as RANCEES Communication and her name was chanced from RANCEES Communication to its present name in 08/09/2006.

The company had four sub-division namely the computer training section, the cyber café, the Engineering is located in Abuja with four branches located in Ibadan, Kaduna, Lagos, Akure.

The company experience in information technology product being it professionals and solution provident involved in the sales, installation and service of various products.

1.4  GENERAL  OBJECTIVES

Chi square test of independence (To test whether the cybercrimes committed depends on year)

Kruskal-Wallis Test (To show if there is significance different among the four selected cyber crimes)

Kendall’s Coefficient of Concordance (To know if there is strong agreement among the crimes and year  )

 

1.5 SIGNIFICANCE OF THE STUDY

This study is motivated by the realization that identification of information and communication Technology (ICT) as an essential tool for sustainable development has proved to be worth every investment unfortunately, the country’s image has also suffered as a result of the nefarious activities of some Nigeria, that has turn the internet into a cheap channel for perpetration of criminal activities such as Advance free found (AFF) In spit of the advantage derived from the internet as a commercial social and educational activities. Some Nigeria ironically engaged in the opposite of what it has to offers. It is this that informs the topic of this study.

Due to the large number of internet user. It is probable that many of them are unaware of these threats and what they can and should be doing to protect themselves.

Another goal of this study is to help these users understand the seriousness and operation of this perpetration.

To any organization for their references use

1.6  SCOPE OF THE STUDY

This project work has been restricted to cover only the tour selected cyber crime. This data collected were not analyzed since each cyber café send the data collect to the headquarter at Abuja, where all data collected are competed, organized, analyzed and published for used.

After compiled and analyzing by the head quarter, it is then send to other cyber cafes. Because it has undergone some statistical treatment and it becomes secondary in nature.

1.7 LIMITATION OF THE STUDY

The problem encountered in the course of writing this project includes financial constrains faced by the researcher aid the period of time within which the study that was carried out was too short. This made extensive study of this research very difficult.

In addition the organization and most respondent were very reluctant to release the necessary information demanded for security reasons.

 

1.8 DEFINITION OF TERMS

DATA

These are the raw materials of statistical investigation and are normally by numerical values. It many be primary or secondary. Primary data are data that are published by the same organization in which they are collected, while secondary data are data that are

 

SEE >> HOW TO DOWNLOAD THE COMPLETE PROJECT (CHAPTER 1-5) NOW


GUARANTTEE|:| Score 280 Above in 2022 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE:.: GURRANTTEE Score 280 Above in 2022 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE 📱👈
WISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.