Download complete project materials on Statistical Analysis of a Four Selected Cyber Crime from chapter one to five
ABSTRACT
PASS 2024 UTME WITHOUT STRESS:- 👉 DOWNLOAD and PRACTICE with 2023 UTME CBT APP 📱👈
CLICK to DOWNLOAD NOW.:- 👉 PASS Your POST UTME by Downloading Your School's Post UTME Past Questions and Answers 📱👈
This project work is focused on the four selected cyber crime from 2004 – 2010. A case study of RANCEES CYBER CAFÉ. The source of the data used in this project write up is secondary in nature because it was from the record of RANCEES CYBER CAFÉ the statistical tools used in the project are chi square (2) test of independence, Kruskal-Wallis Test and Kendall’s Coefficient of Concordance using chi – square it was revealed that cyber crime committed depend on year, by using Kruskal-Wallis Test it shows that there is significance different among the four selected cyber crime and also by using kendall coefficient of concordance is to know if there is strong agreement among the crimes and the year.
Therefore it is recommended that cyber crime being virtual in nature, the authority or government should acquired new technology and trained personnel in detecting and prosecuting offenders to give Nigeria a better name among Nation of the world.
LIST OF SYMBOL AND ABBREVIATION
SSt = Sum of square treatment
SST = Sum of square total
∑ = Summation
∑∑ = Double summation
Ms = Mean square
SS = Sum of square
np = Number of observation
d.f = Degree of freedom
Anova = Analysis of variance
(p-1) = Degree of freedom for treatment
P(n-1) = Degree of freedom for total
α = Alpha level
H0 = Null Hypothesis
H1 = Alternative Hypothesis
y.. = Grand Total
fcal = f calculated
ftab = t tabulated
λ2 = Chi – square
λ2cal = Chi – square calculated
λ2tab = Chi – square tabulated
0ij = Observed frequency
eij = Expected frequency.
TABLE OF CONTENTS
Title Page
Declaration
Approval Page
Acknowledgement
Abstract
List of Symbol and Abbreviation
Table of Contents
CHAPTER ONE
1.0 Introduction
1.2 Statement of Research Problem
1.3 Statistical Background of the Study
1.4 General Objectives
1.5 Significance of the Study
1.6 Scope of the Study
1.7 Limitation of the Study
1.8 Definition of Terms
CHAPTER TWO
2.0 Literature Review
2.1 Introduction
2.1.1 Reviews of Cyber Crime
2.1.2 Types of Cyber Crimes
2.2 Mediums of Perpetration in Cyber Crime
2.2.1 Tools of the Trade
2.2.2 What Are General Reasons For Hacking By Cyber Criminal?
2.3 Fighting Cyber Crime in Cafes
2.4 Computer Crime Survey
CHAPTER THREE
3.0 Research Methodology
3.1 Introduction
3.2 Statistical Data Are Of Two (2) Kinds
3.3 Statistical Tools Used
3.4 Condition For Application Of Chi – Square
- 5 Use Of Chi- Square Is As Follows:
3.6 Method of Data Analysis
CHAPTER FOUR
4.1 Data Presentation
4.2 Data Presentation And Analysis
Computation Of Spss Output
4.4 Kruskal-Wallis Test
4.5 Kendall’s Coefficient of Concordance
CHAPTER FIVE
5.0 SUMMARY, CONCLUSION AND RECOMMENDATIONS CONCLUSION
5.1 Summary
5.2 Conclusions
5.3 Recommendation
References
CHAPTER ONE
1.0 INTRODUCTION
Statistics branch of mathematics that deals with the collection, organization, and analysis of numerical data and with such problem as experiment design and decision making. This project work wends to analyzed statistically, the four selected cyber crime using RANCEES CYBER CAFÉ, KADUNA STATE WITHIN the period of year (2004 – 2010).
Cybercrime can broadly be defined as criminal activity involving an information technology infrastructure including vesal access (unauthorized access) Wagal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), system interference (interfering with puncturing of a computer system by imparting, transmitting, damaging, deleting, deter rating, altering or suppressing computer data) misuse of devices forgery (ID these) and electronic fraud. The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the Abacus, which is thought to be the earliest form of a computer, has been ground since 5300 BC in India, Japan and china. The era of modern computers, however, began with analytical engine of Charles Babbage.
In 1820, Joseph-Marie Jacquard, a textile manufacture in France, produced the 100m this device allowed the repetition of a series resulted in a fear amongst Jacquards olivewood were being threatened. They commuted acts of sabotage to discover age Jacquard from further use of the new technology. This is the first recorded cyber crime! In Nigeria computer crime issue have become high profile particularly those surrounding copy right infringement, specimen known as “419” etc. There are also problem of privacy when confidential information is lost or intercepted, lawfully or otherwise.
There are many security threats that face computers in Nigeria today but the most perpetrated one is the online “419”- the use of computers and or the Internet to commit crime – therefore cyber crime remain an image night more for Nigeria, a source of concern and embarrassment within and outside her boundaries.
The internet is full of useful information unlimited opportunities for commercial, social and educational activities. But cyber crime introduced its own peculiar risks its menace poses danger to the society the country image, economics etc it is worthy of role that the aim of the convenience of the use of information technology as been abuse and exploited to serve criminal purposes.
1.2 STATEMENT OF RESEARCH PROBLEM
For the past few years cyber crime activities in Nigeria have been so high due to the economic downturn, unemployment and greed of the perpetrators and the insensitiveness of the concern authority. This research work is feared toward fishing out some of the problems and preferred solution to them. It also list the four major cyber crime perpetrated in four selected cyber cafes.
1.3 STATISTICAL BACKGROUND OF THE STUDY
RANCEES RANCEES CYBER CAFÉ was established 1 August, 2004 as RANCEES Communication and her name was chanced from RANCEES Communication to its present name in 08/09/2006.
The company had four sub-division namely the computer training section, the cyber café, the Engineering is located in Abuja with four branches located in Ibadan, Kaduna, Lagos, Akure.
The company experience in information technology product being it professionals and solution provident involved in the sales, installation and service of various products.
1.4 GENERAL OBJECTIVES
Chi square test of independence (To test whether the cybercrimes committed depends on year)
Kruskal-Wallis Test (To show if there is significance different among the four selected cyber crimes)
Kendall’s Coefficient of Concordance (To know if there is strong agreement among the crimes and year )
1.5 SIGNIFICANCE OF THE STUDY
This study is motivated by the realization that identification of information and communication Technology (ICT) as an essential tool for sustainable development has proved to be worth every investment unfortunately, the country’s image has also suffered as a result of the nefarious activities of some Nigeria, that has turn the internet into a cheap channel for perpetration of criminal activities such as Advance free found (AFF) In spit of the advantage derived from the internet as a commercial social and educational activities. Some Nigeria ironically engaged in the opposite of what it has to offers. It is this that informs the topic of this study.
Due to the large number of internet user. It is probable that many of them are unaware of these threats and what they can and should be doing to protect themselves.
Another goal of this study is to help these users understand the seriousness and operation of this perpetration.
To any organization for their references use
1.6 SCOPE OF THE STUDY
This project work has been restricted to cover only the tour selected cyber crime. This data collected were not analyzed since each cyber café send the data collect to the headquarter at Abuja, where all data collected are competed, organized, analyzed and published for used.
After compiled and analyzing by the head quarter, it is then send to other cyber cafes. Because it has undergone some statistical treatment and it becomes secondary in nature.
1.7 LIMITATION OF THE STUDY
The problem encountered in the course of writing this project includes financial constrains faced by the researcher aid the period of time within which the study that was carried out was too short. This made extensive study of this research very difficult.
In addition the organization and most respondent were very reluctant to release the necessary information demanded for security reasons.
1.8 DEFINITION OF TERMS
DATA
These are the raw materials of statistical investigation and are normally by numerical values. It many be primary or secondary. Primary data are data that are published by the same organization in which they are collected, while secondary data are data that are
SEE >> HOW TO DOWNLOAD THE COMPLETE PROJECT (CHAPTER 1-5) NOW
>GUARANTTEE|:| Score 280 Above in 2024 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE:.: GURRANTTEE Score 280 Above in 2022 UTME👉 DOWNLOAD FREE JAMB CBT APP HERE 📱👈WISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894