Background of the study
A cell phone or a mobile device ICT refers to a tiny, portable computer equipment with a display screen and a little keyboard that may be carried in one’s hand or stored in a pocket (Gyongyi, 2005). To put it another way, their functioning isn’t limited to a single spot. Nokia, LG, Motorola Mobility, BlackBerry, Samsung, and Apple are just a handful of the companies that make these gadgets. A portable computing device features an operating system (OS) that allows it to execute a variety of application software, most often referred to as apps. Wireless fidelity (Wi-Fi), Bluetooth, and the Geographic Positioning System (GPS) are all standard features on most portable devices, allowing users to connect to the Internet and other Bluetooth-enabled devices while maintaining a consistent battery charge. Mobile phones, Smartphones, and Personal Digital Assistants (PDAs) are common examples of mobile devices (Hemraj ,2012). (Wikipedia). Information and Communications Technology (ICT) is a term that is commonly used interchangeably with Information Technology (IT). ICT is a term that encompasses the role of unified communications networks and the integration of telecommunications (telephone lines and wireless signals), computers and all forms of networks, as well as enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information to meet society’s day-to-day needs. Cybercrimes, on the other hand, are offenses committed against individuals or groups of individuals with the intent to intentionally harm the victim’s reputation, cause physical or mental harm to the victim directly or indirectly, or deprive someone of what is rightfully theirs, using modern telecommunication networks such as the Internet and mobile phones. Such acts have the potential to jeopardize a country’s security and economic stability. Cybercrime is defined as crimes committed against a person, an organization, or a country using a computer system [Hassan, 2012]. The whole African continent is increasingly reliant on modern information technology and the internet, as well as new media, to conduct business, manage industrial operations, and participate in personal contact, among other advantages that link us to the developed world. While mobile technology and gadgets increase efficiency, productivity, and communication, they also expose individuals who want to and thrive in new settings to risk. The internet’s rapid expansion and widespread adoption have resulted in an increase in security risks. Cyberspace provides limitless chances for economic, social, and educational activity, as well as a safe sanctuary for society miscreants to carry out their nefarious operations. Technology is progressing at a breakneck pace, allowing users to access the internet through a variety of mobile devices such as smartphones and tablets. Even the tiniest phone can now connect to the internet, making it vulnerable to online crime, often known as cybercrime (Maitanmi ,2013).
Statement of the problem
Mobile phones are now widely recognized as a genuinely widespread computing platform that allows individuals to stay in contact with one another while also managing daily chores [Barry, 1997]. With the introduction of less priced smart phones, a lot of effort has gone into developing basic applications to increase the usefulness of these devices for the general public. Cybercriminals’ techniques include cooperation with security officers and bank officials, local and worldwide networking, and the use of voodoo, or traditional supernatural power, according to investigations into the operations of online criminals in Nigeria (Ayo,2010). It was also discovered that the majority of internet crime engaged in activities such as online dating and buying and selling under a false name, among other things (Gbadamosi ,2017). Internet crime may take many forms, including death, disgrace, and loss of work. Internet crime has an influence that is not confined to the victim; it also has an impact on society. Loss of money, lost time, tarnished reputation, and lower productivity are just a few of the economic implications of internet crime [Ringwelski,2008].
Objective of the study
The primary objective of the study is as follows
1) To examine the accessibility of Mobile Information and Information Technology as a factor for the prevalence of internet crime.
2) To evaluate the effect of Information Technology and its influence on the prevalence of internet crime in Nigeria.
3) To find out if there is a government law that guides the use of information technology in other to curb internet fraud.
4) To find out strategies that can be used to reduce or stop internet fraud among Nigerian youth.
The following questions have been prepared for this study
1. Is Mobile Information and Information Technology as a factor for the prevalence of internet crime accessible in Nigeria?
2. What is the effect of Information Technology and its influence on the prevalence of internet crime in Nigeria?
3. Is there a government law that guides the use of information technology in other to curb internet fraud?
4. What are the strategies that can be used to reduce or stop internet fraud among Nigerian youth?
Significance of the study
This study focuses on mobile information and information technology and its influence on the prevalence of internet crime in Nigeria. Hence the study will be significant to the government as it will help them devise strategies with which it can curb internet fraud among Nigerian youth.
The study will be beneficial to the academic community as will contribute to the existing literature.
Scope of the study
The study will examine the accessibility of Mobile Information and Information Technology as a factor for the prevalence of internet crime. The study will also evaluate the effect of Information Technology and its influence on the prevalence of internet crime in Nigeria. The study will further find out if there is a government law that guides the use of information technology in other to curb internet fraud. Lastly, the study will find out strategies that can be used to reduce or stop internet fraud among Nigerian youth. Hence this study will be delimited to Delta state university.
Limitation of the study
This study was constrained by a number of factors which are as follows:
just like any other research, ranging from unavailability of needed accurate materials on the topic under study, inability to get data
Financial constraint , was faced by the researcher ,in getting relevant materials and in printing and collation of questionnaires
Time factor: time factor pose another constraint since having to shuttle between writing of the research and also engaging in other academic work making it uneasy for the researcher
Definition of terms
Mobile information: systems that rely on wireless communications and support mobile applications that typically run on wireless devices such as smartphones and mobile phones.
Information technology: use of systems (especially computers and telecommunications) for storing, retrieving, and sending information.
Internet crime: the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them