An Assessment of the Impact of Municipal Laws on the Policing of Cybercrimes in Nigeria

2018 ◽  
Vol 11 (2-3) ◽  
pp. 234-253
Author(s):  
Rasul Oriyomi Olukolu

AbstractInternet crime can be defined as unlawful acts using the computer as either a tool or a target or both. Internet networks are used positively to conduct businesses, manage industrial and governmental activities, engage in personal communications, and conduct research. Also, certain confidential information is stored or passed through the medium of the internet. Credit cards containing information of users are used as the major means of buying and selling on the internet. Information infrastructure has become a critical part of the backbone of global economies; therefore, it is imperative that the general public be able to rely on the availability of such informational services with confidence that their communications and data are safe from unauthorized access or modification. It then becomes important for these and other information to be more secured. However, the speed of the internet, its affordability, and its elimination of distance make the internet the hotbed of crimes globally. Cybercrime growth has skyrocketed in recent times, especially in Nigeria; hence, the need for immediate action by law makers to stem the tide. This research, therefore, examines the adequacy or otherwise of the Nigerian legal framework in checking crimes being perpetrated using the internet as a platform with a view to making useful suggestions.

2020 ◽  
Vol 13 (2) ◽  
pp. 310
Author(s):  
Yuli Candrasari ◽  
Salshabilla Permata ◽  
Afifah Rachmania ◽  
Dyva Claretta

The growth in the number of netizens is now the impact of increasingly easy internet penetration and high penetration of social media that is easily accessed via smartphone gadgets. Research conducted by Candrasari (2016) states that female internet users cannot be separated from their social media. Within a day of 2-3 hours, his time is spent accessing digital media. Therefore digital competencies are needed for girls to avoid the negative effects of the internet. The purpose of this study is to get a picture of the competence of adolescent girls. Digital competence is a form of using technology safely and critically to facilitate work, get entertainment and to communicate (E. Encabo & Murcia, J: 2011: 166). This research was conducted on adolescent girls in Surabaya with qualitative research methods. Data obtained through in-depth interviews, participant observation, and literature studies. The results of the study indicate that the digital competence of adolescent girls is still not good, especially in the categories of skills using the internet, information management and responsibility for using internet which is still low. Only in the category of communication and sharing digital competence of young women is good


Author(s):  
Chiara Ravagni

The use of the Web by students has increased more and more and it has become the most recurring way to find quick information for educational purposes. Given the lack, in Italy, of thorough programs for the integration of Information Literacy and Internet searches in schools and universities, the adults who are now using it are almost always self-taught. Consequently, many different approaches to the medium have spread, and with them an objective difficulty in planning Internet-research courses, since everyone has his/her own way to search and a unique perception of his/her search skills. That’s why delivering a course where every participant is forced to follow the same learning path may originate feelings of frustration, unease, or boredom, thus reducing the learning potential offered by the course. This research focuses on the Internet Search side of Information Literacy and analyzes the impact of short lessons on first and second year university students in Education at the University of Bolzano, Italy. The students are either native German-speakers or native Italian-speakers, and the research focuses, in an European perspective, on the differences in their Internet-research approaches as well. The first phase consists in interviews and test (the logs of the internet sessions are recorded by a software) to find out the perception of reliability of the Internet information and the way to find it by the students. The second phase is the course in itself, which focuses on Boolean operators, information retrieval theories and exercises, and evaluation of web pages. After the course the students are interviewed and tested again, to check if their approach to internet research has changed and in which way. The results can be used to plan courses on Information Literacy and Internet Search with individualized programs, or to propose methods to assess the learning in this field.


Agriculture ◽  
2021 ◽  
Vol 11 (10) ◽  
pp. 905
Author(s):  
Haiyu Yang ◽  
Wencong Cai ◽  
Jundi Liu ◽  
Xuexi Huo

As an effective tool for farmers to obtain agricultural information, the Internet has a profound impact on apple growers’ perception of frost disasters and their adaptive behaviors. This paper constructed the theoretical analysis framework of “Apple growers’ internet information acquisition-psychological perception-adaptive behavior to frost disaster”, based on the data of 1020 apple growers in Shaanxi Province, empirically analyzing the impact of Internet information on apple growers’ adaptive behaviors to frost disasters and its mechanism by the IV probit model and the intermediary effect model. The research found that the Internet information can significantly promote the apple growers’ adaptive behaviors to frost disasters and has different effects on apple growers with different income levels and different management capabilities. Risk perception, effect perception, and risk attitudes have significant intermediary effects in the influence of the Internet information on apple growers’ adaptive behaviors to frost disasters. Therefore, when governments take advantage of the Internet platform to help apple growers cope with frost disasters, they should fully consider the socio-economic conditions and psychological perception factors of apple growers and formulate targeted adaptation strategies.


2021 ◽  
Vol 2068 (1) ◽  
pp. 012013
Author(s):  
Yuanyuan Chen ◽  
Jing Chen ◽  
Mingzhu Li

Abstract With the development of digital technology, Computer technology, communication technology and multimedia technology gradually infiltrate into each other and become the main core of information technology. In information technology, digital, text, graphics, images, sound, video, animation and other information carriers are spread through computers and the Internet. Due to the openness, sharing, dynamic and other characteristics of the Internet, information security is threatened and interfered. Information security has become a strategic issue that people must pay attention to, which is related to social stability, economic development and national security. This paper studies a new kind of virtual track cryptography, which breaks through the traditional character memory method and transforms it into memory graphics by using mathematical modeling, and changes the surface memory method from memorizing numbers and characters to memorizing trajectory graphics, so as to make the traditional process of people memorizing passwords easier.


2009 ◽  
Vol 2 (2) ◽  
pp. 9
Author(s):  
Alexandre Reis Graeml ◽  
Zandra Balbinot ◽  
João Mário Csillag

This paper presents the results of a study about the impact of the Internet and other information technologies on supply chain management, as perceived by managers in the field. Two almost identical surveys were applied to 105 Brazilian manufacturing companies, three years apart from one another, aiming to depict changes on managers' perceptions over time. Answers to the questions were organized and presented in bar graphs segmented based on the year and the companies' size. Several analyses were then possible, which helped to understand how the scenario evolved over time and to depict trends for the future.Answers to the questions were organized and presented in bar graphs segmented by year and company size. Several analyses were possible, which enlightened us as to how the scenario evolved from 2003/2004 to 2006/2007 and provided data with which to project trends for the future


Legal Ukraine ◽  
2019 ◽  
pp. 24-31
Author(s):  

The article explores: criminological characteristics of crimes related to the use of social networks. The basic motive that drives a person to spend a considerable amount of time on the Internet is based on the physical and psychological dependence that develops as a result of getting used to certain external factors. The specificity of types of crimes in social networks was analyzed, and a number of current issues related to the creation of a state mechanism for counteracting the destructive use of social networks by criminal elements were analyzed. In a practical aspect, the potential possibilities of using this type of information networks for the detection and detection of crimes are considered. The article is devoted to the research of problems of using social Internet - networks for prevention of crime by carrying out monitoring of criminologically relevant information and its analysis. It also concluded that the use of social internet networks to enhance the legal culture of society. The threatening tendency of spreading crime on the Internet networks is considered an urgent problem, which necessitates the speedy response to the growth of information technologies in the criminal world, with the development of social networks there is a need to create an appropriate legal framework that would regulate exactly such forms of information exchanges, which in our country does not yet exist. Due to the growing popularity of social networks in society, it is necessary to organize the presence of state bodies, scientific institutions, public organizations in this field of communication. This presence must balance virtually uncontrolled information criminal processes in social networks, as well as the available information arrays with high-quality, reliable, socially significant information. The development of the sphere of social networks necessitates the growing need for the creation of state information structures for the production of information, which would contribute to the formation of reliable perceptions of all users of social communications, including network ones, about the actual problems of social development and the true state of crime in our country. Key words: Internet, social Internet, crime, prevention, criminological information, social network, cybercrime, information space, network communications.


Jurnal PenSil ◽  
2014 ◽  
Vol 3 (1) ◽  
pp. 62-75
Author(s):  
Erni Kristiyani

The Objectives of this study to determine whether the online testing program for Class XII students of Stone Concrete Construction Engineering Department at SMK 4 Jakarta has been successful or not. This research was conducted in the Department of Stone Concrete Construction Engineering SMKN 4 Jakarta in July 2013 until November 2013.The method used is the evaluative research method with the type of CIPP evaluation model (Context, Input, Process, Product), with a sample of 26 students Class XII Stone Concrete Construction Engineering Department, one of teacher Stone Concrete Construction Engineering Department, and Head of IT SMKN 4 Jakarta. The research instrument used online testing, interviews, and questionnaires.Validity test results, 10 items questionnaire is valid. While the results of the reliability test, R11 value is 0.904. To access the online testing program, Head of IT requires program of Moodle, server, internet networks, and laptop; the teachers need laptop, Hot Potatoes, and the internet networks; while the students need laptop and internet networks. The curriculum used is the Kurikulum Tingkat Satuan Pendidikan (KTSP). The average score that student obtained from online testing is 72, and this score is lower than a Kriteria Ketuntasan Minimal (KKM) which has been determined 75. From the calculation of the questionnaire, percentage of successful online testing program is only 56.69% of the respondents expected. During the implementation of the online testing program, there are some issues such as school wifi network can not be used, the server often down, students must bring their own laptops and modems, and as well as a hot classroom. The impact of online testing program that is obtained by the school teachers and students can operate computers and the Internet as a means of learning evaluation. Thus, the overall implementation of the online testing program at SMK 4 Jakarta can be said to have not succeeded and need for improvement, especially in school’s internet networks and facilities to support the online testing program


First Monday ◽  
2007 ◽  
Author(s):  
Shanthi Kalathil ◽  
Taylor C. Boas

It is widely believed that the Internet poses an insurmountable threat to authoritarian rule. But political science scholarship has provided little support for this conventional wisdom, and a number of case studies from around the world show that authoritarian regimes are finding ways to control and counter the political impact of Internet use. While the long-term political impact of the Internet remains an open question, we argue that these strategies for control may continue to be viable in the short to medium term. Many authoritarian regimes translate a long and successful history of control over other information and communication technologies into strong control of Internet development within their borders. Potential challenges to the state may arise from Internet use in several areas: the mass public, civil society, the economy, and the international community. Authoritarian states will likely respond to these challenges with a variety of reactive measures: restricting Internet access, filtering content, monitoring online behavior, or even prohibiting Internet use entirely. In addition, such states seek to extend central control through proactive strategies, guiding the development of the medium to promote their own interests and priorities. Through a combination of reactive and proactive strategies, an authoritarian regime can counter the challenge posed by Internet use and even utilize the Internet to extend its reach and authority. In this paper we illustrate how two authoritarian regimes, China and Cuba, are maintainng control over the Internet's political impact through different combinations of reactive and proactive strategies. These cases illustrate that, contrary to assumptions, different types of authoritarian regimes may be able to control and profit from the Internet. Examining the experiences of these two countries may help to shed light on other authoritarian regimes' strategies for Internet development, as well as help to develop generalizable conclusions about the impact of the Internet on authoritarian rule.


2012 ◽  
Vol 3 (1) ◽  
pp. 42-58 ◽  
Author(s):  
Echo Huang ◽  
Fa-Chang Cheng

Previous studies consider confidence in the Internet as a means of payment and existence of a legal framework that protect consumers in their activities on the Internet are the critical issues of B2C success. To respond, this study extends the IS Continuance Model with Cue Utilization Theory to examine the impact of offering e-payments to online users, specifically, the relationship between their perceived benefits, legal protection, risk avoidance, and satisfaction with prior experiences. The analytical results presented in this study indicate that perceived cues (benefits, legal protection and risk allocation) differentially affect consumer behavior. Notably, perceived cues and confirmation associated with satisfaction have influences on e-payment continuance intention. That is, if consumers’ perception of online security cues increases, their intentions to continue use of e-payment increase even if the systems or services are perceived low reliability. Finally the practical and theoretical implications of this study are discussed.


2022 ◽  
Vol 9 (2) ◽  
pp. 262-277
Author(s):  
Maria Mercedes Ferreira Caceres ◽  
◽  
Juan Pablo Sosa ◽  
Jannel A Lawrence ◽  
Cristina Sestacovschi ◽  
...  

<abstract> <p>Since the inception of the current pandemic, COVID-19 related misinformation has played a role in defaulting control of the situation. It has become evident that the internet, social media, and other communication outlets with readily available data have contributed to the dissemination and availability of misleading information. It has perpetuated beliefs that led to vaccine avoidance, mask refusal, and utilization of medications with insignificant scientific data, ultimately contributing to increased morbidity. Undoubtedly, misinformation has become a challenge and a burden to individual health, public health, and governments globally. We performed a literature search of databases such as Pubmed, Google, GoogleScholar. The key descriptors used for the search purposes were “COVID-19”, “Coronavirus”, “SARS-CoV-2”, “communication”, “healthcare”, “misinformation”, and “social media”. This literature review aims at providing an overview and summary regarding the role of media, other information outlets, and their impact on the pandemic. The goal of this article is to increase awareness of the negative impact of misinformation on the pandemic. In addition, we discuss a few recommendations that could aid in decreasing this burden, as preventing the conception and dissemination of misinformation is essential.</p> </abstract>


Sign in / Sign up

Export Citation Format

Share Document