Umar Muhd Badamasi Project
Umar Muhd Badamasi Project
Umar Muhd Badamasi Project
2.0 Introduction
This chapter entails the review of related literature which covers theoretical review and
empirical review.
Relevant literatures will be reviewed on the causes, of cyber crime, the social economy and
impact implications of their hacking and the possible solution suggested by some existing
literatures. Since then, few concepts selected from the topic will be conceptualised. These
Cybercrime
network and the computer may have been used in committing the crime, or it may be the
target. The cybercrime is criminal that either targets or uses a computer, a computer network
It worth noting that identifying a cybercriminals is not the end jodgement on the legitimacy
of the cause; the term cybercrimes is simply a description of a nature of the crime.
Cybercrime can be confronted through the enforcement of the law, and may also be opposed
Since the emergence of cybercrime, scholars in the field of security studies and international
body have tried to explain the reason behind its existence. There have been a lot of
the most important thing that we can do as individual companies , or in our own lives," he
Online crimes are often referred to as cybercrime and occur because 'the perpetrator uses
large umbrella term that encompasses computer and technology are used in a supporting
role,bsuch as the use of a computer to send harrasing massages. At the time, the term
cybercrime also includes computer- focused crimes that are a direct result of computer
technology and would not exist without it, such as unauthorised computer system trespassing
piracy), cyber-porn/ obscenity (e.g., child sexual exploitation materials), and cyberterrorism)
( Holt, Bossier, and Seigfried-Spellar 2018; Wall 2001). It is nearly impossible to estimate
the the amount of cybercrime that occurs in most nations across the world because of lack of
standardised legal definitions for these offenses and few valid, reliable official statistics (Holt
such as routine activities theory, social learning theory, and the general theory of crime,
applied to various forms of cybercrime. As a result scholars collected primary data and
measured key concepts of traditional criminological theories. The focus of shifted from
analysing to he similarities and differences o cybercrime in general to examining whether the
same theoretical causes and correlates of traditional crime applied equally well to cybercrime.
Considering to hat these studies were often based on college and youth sample, scholars
examined simpler firms of cybercrime and cuberdeviance, such as online harrasmrnt, digital
piracy, an account password guessing, rather than more complex forms of cybercrime
In Nigeria, a number of key factors- such as a high rate of unemployment, the quest
forwealth, a lack of strong cybercrime laws, and incompetent security on personal devices
amongst others-have coalesced to make cybercrime as significant problem for the country.
The estimated annualfinancial loss in Nigeria due to cybercrime was ₦250 billion
According to Shah (2011), the aftermath of any environment that experience cybercrime
usually cut across every aspect of the society and every members of that environment is
either directly or indirectly a victim. As part from wealth of property cost which is the loss of
implications, especially in places where there is so much business activities and online
transaction with poor measure against the criminals for their routine economic and social
This study identified some of the causes of cyber crimes to include urbanisation and weak
implementation of cyber crimes laws in Nigeria, a number of key factors such as a high rate
of unemployment, the quest forwealth, a lack of strong cybercrime laws, and incompetent
security online to prevent and reveal the cybercriminals whenever they are online. The
confidence in the digital economy; with huge financial loses to individual business and
organisations. However the arrest of 280 suspect for various crimes in Kano State between
January and August this year, and this is a great challenge and the likely possible to the Kano
The Zonal Head of Commission in Kano, Mr Akaninyene Exuma, disclosed this while
Exuma said the suspects were apprehended for committing crimes bordering on Cybercrimes,
money laundering and other firms of crimes like 'black money, wash- was, foxy scheme and
MMM', among others. This assumptions is significant since Kano State serves as the
commercial nerve-cdntre of not only the North, but neighbouring countries who come for
business, and the arrest of cybercriminals in Kano affect the economy because of fear of
being victim.
The study revealed several causes of Cybercrimes amongst which corruption is the most
causative factor, followed closely by poverty just like the when the collar crime committed
by the accounter gener as alleged to loot over ₦82 billion from the public pounds is critical to
affect and weak the economic growth in Nigeria. Likewise Kano as a centre of commerce
with adequate business availability is still under fear to accept online business because of lack
of on orientation how to protect their account safely from the cybercriminals. Therefore there
is need for the government to put more effort for taking measures against cybercriminals and
even provide a program that will guide Kano people on how to protect their online facilities;
Many literatures on Cybercrimes since it's evolution have suggested some ways of addressing
the crimes. Some have actually been put into practice while others have not been considered.
According to Olisa AAgbakoba the " Cybercrimes ( prohibition and prevention) Act, 2015"
has a significant impact on cyber law in Nigeria. This Act creates a comprehensive legal,
regulatory, and institutional framework in Nigeria to prohibit, prevent, detect, prosecute, and
punish cybercrime.
The Act also encourages cybersecurity and protection of computer systems and networks,
electronic communications, data and computer programs, intellectual property, and privacy
rights, as well as the protection of important national information infrastructure. Any law that
deals with internet and similar technology is known as cyber law. Cyber law is frequently
referred to as "law of the internet" or "IT Law." It is as legal framework for dealing with
issues relating to the internet, computing, cyberspace, and other associated matters.
Moreover, one of the newest aspect of the legal system is cyber law. This is due to the rapid
advancement of internet technology. People who use the internet have legal safeguards under
cube law. This applies to both business and common citizens. Anyone who uses the internet
The Act provides an effective, unified and comprehensive legal, regulatory and institutional
cybercrimes in Nigeria.
Awojobi (2015), suggested that the Nigerian government needs to initiate policy that will
generate employment for the unemployed youths in the country. Most of the cybercriminals
have a groups; the government should go after those who lead the groups, and report from the
battlefield indicate that almost all security facilities are not provided with modern equipment.
The government should endeavour to supply the security officials with strong data and other
related online trackers. One the long run there is need for the federal restructuring in Nigeria
such that each of the six geo-political zones shall be controlling its own annual budget but
controlling only 20 percent of it to maintain the federal agencies. The president with each
geo-political zone headed by a zonal legislature at the federal level but the federal agencies
are to be governed by appointed boards with equal representations from the six geo-political
zones. This is to CRB problem of corruption which has been attributed by many literatures as
Theoretical Literature
Stoner & Freeman (2000) opined that theories help us to clearly understand underlying
process and on that basis, choose an effective course of action. Theory is coherent group of
assumption put forth to explain the relationship between two or more observable facts or
variables. Valid theories enable outcome under certain situations. It is ttruism that not
minding the degree of a graps of a principle, the history and theories of any field helps us to
apply them to actual cases. In the assessment of the impact of cybercrime imferical and it's
impact on the socio we conomic development in Kano State, functionalist perspective theory
Social disorganization theory is a theory that emanated from Chicago as school developed by
Clifford Show and Henry McKay in ( 2942). It is a theory that shifted criminology
scholarship to social or societal problem. The theory focuses on the social group such as
family, religion and other formal and informal group as play a major role in either reducing
or contributing to crime and criminality within the society. Social disorganization theory
communities with high crime rates and draws on social control theory to explain why these
The social disorganization theory can be summarized into the following key assumptions
1. Dwellers in urban or city might experience a high rate of crime because of high level
2. Crime is said to be more likely in communities that are economically deprived, large
in size, high in multiunit housing like apartments, high in residential mobility (people
frequently move into and out of the community), and high in family disrupting ( high
socializing their children against crime and providing them with a stake in
conformity, like the skills to do well in school or the connection to secure a good job.
4. These residents are as also likely to have close ties neighbors and to care as bout their
community. The typically do not own their own homes, which lowers their investment
in the community. And they often do not know their neighbors well, since people
frequently move into and out of the community. As a consequence, the are less likely
5. Finally, these residents are less likely to form or support community organizations,
consequence of their limited resources and lower attachment to the community. This
further reduces control, since these organizations help exercise direct control, provide
Social disorganization theory like all other theories has some limitations. The theory has been
criticized for over emphasized on economic inequality and disorganization of the society as
the causes of criminality. The theory neglects crimes like terrorism to that are mostly caused
by religious fundamentalism. The theory also fails to account for the troubled neighborhoods
that have strong, viable organizations. It seems to blame the victims for precipitating their
Social Anomie theory was developed by Robert Merton in 1938, but due to the awakened
social interest it, represented a so-called "sleep theory". Only the renewed publication in the
year 1954 provided for public interest. According to the theory every members of the society
is expected to achieve some stated societal goals but the society failed to provide adequate
means that can aid in achieving theses goals. This then constitutes strain on the people. In
order to be able to cope with this pressure, individual recourse is made to one of the
Conformity: Accept as nice of cultural goals and adaptation to social change. according to
Merton, people who want to change their social status in the society but do want to break law
or create any social tension conform to the cultural norms and values by following the
legitimate way.
goals. Individuals who accept the goals but reject the means of accomplishing to he goals
often innovate by breaking rules. These set of people are the group of people who form
achieve them.
Rebellion: Combating the objectives and the means to change social structures. Merton
posited that, there are certain groups of individuals who are not happy with the political
system, they reject both the goals of the society and the means of achieving the goals. These
set of people are the religious fundamentalists who believe the political structure is against
their fate. They always have the notion that the political system corrupts and undermines their
belief. They then engage and infuse themselves with this ideology.
2. A state of Anomie is developed when access to these goals is blocked to entire groups
of people or individuals.
Social learning theory has criticised social Anomie theory for not considering the effect of
bad influence on young ones that engage in criminal behaviour. The theory argues that, it is
peer group influence that pushes people into criminality and not the strain generated from
inability to poses the means of achieving societal goals. The theory is also criticised for its
inability to explain crime of the upper class. It is best applied only to lower class as they
struggle with limited resources to attain their goals. Starin theory fails to explain white collar
crime, the perpetrators of whom have many opportunities to achieve success goals through
legal and legitimate means. The he theory does not explain violent crime like terrorism,
homicide and rape, it fails to adaptation over another which makes it difficult for some
THEORETICAL FRAMEWORK
The theory adopted for the theoretical framework of this study is social disorganization
theory developed by Clifford Shaw and Henry McKay in 1942. The theory focuses on the
same ocisl structures of the society rather than individual factors as contributing to
criminality. According to the theory, the level of economic iniquality as Nd the disorganised
nature of society particularly urban settlements are the cause of crime. Theses factors are said
control, that is, to exercise direct control, provide young people with a stake in conformity,
and socialise young people so that they condemn delinquency and develop self-control.
Social disorganisation theories and other criminologists, such as John Hagan, point out that
concentration of poor people has increased since the 1960s. Theses communities exist
primarily in inner city area and they are populated largely by members of monority groups
economic depravity and insurgency. Economy of every nation depends on the level of the
treat within the arena that is why most of the developed nations face a little level security
challenge compare to the third world countries where their citizens are economically deprived
and exposed to engage in criminality. The economic standard of a nation will help in duilding
standard organised structures that can drift citizens to conformity rather than engaging in
criminality. Cyber crime imferical an it's impact in the society can be attributed to individuals
hat are economically deprived. Majority of the youth trooping to commit cybercrime today
Kano State is a commercial land mass and this serves as a motivating factor for the
cybercriminals to target as it seems to be easy for them while perpetrating their act on Kano
online business and other facilities as they chose. According to Awojobi (2014), lack of
income, unemployment has promoted many youths in Nigeria to become yahoo boys. The
factors as the as ociso economic status of Kano State prior the emergence of yohoo boys
contributed to the increasing of cybercrime base on the evident that, the parents couldn't have
adequate to support their children with capital as well as enough time to socialise with them
properly towards maintaining a high level of conformity. They insteatd direct their attention
on how to maje an end means. For instance the high rate of jobless children roaming
everywhere in Znigeria is a result of parental negligence. Theses yohoo boys mostly were
school dropout and lack beneficial conformity to a society. Cyber crime really began to take
off in the early 2,000's when social media came to life. The surge of people putting all the
information they could into a profile database created as flood of personal information and
RESEARCH METHODOLOGY
3.0 Introduction
This section basically contains the research methods that were employed in the course of the
study. It encompasses the research design, population of the study, sample, the instruments
that were used in n collecting the data, method of data collection and the method that was
A research design is the set of methods and procedures used in collecting and analysing
measures of the variable (s) specified in the research problem works that allows the
researcher to effectively address the questions logically and clearly as possible. The research
design that was adopted for this study is a “Survey research design”. The reason of the
respondents and an in-depth interview that will be conducted randomly on the affected area
within Kano State. This will help the researcher in getting valid information necessary for an
objective conclusion.
Population is the total number of unit that a researcher is interested about conducting the
research work. The population of this research work consisted of both male and female
victims of Kano Yahoo-cybercrime, the Security agents ( Efcc, FIB, Police), and of ofcial of
NCC in Fagge local government. The justification for selecting these categories of persons is
because of their experience with the crimes activities of Yahoo-cybercriminals in Kano State.
3.3 Sampling Size
A total two hundred and fifyrespondents were selected for this study, all from only 4local
Ten10 Security personnel, one hundred and ninety five 195 civilians and thirty 30
communication centers of official were selected, making total of two hundred and thirty 230
respondents that completed the structured questionnaires, while 20 respondents were selected
for the in- depth interview. These completed the two hundred and fifty respondents proposed
for the study. Each of the local governments was selected randomly.
Kano State is a state, located in north-western region Nigeria, created in may 29, 1967 from
part of northern region. It is the largest city in Nigeria after Lagos with four million
population living within 449 km2 ( 27359m), located in the Savanna South Sahel, Kano is a
major route of the trans-Sahara trade and boarders Katsina state, to the north-west, Jigawa
The capital city of Kano State is Kano. Kano State of the Federal Republic of Nigeria lies
between latitude 130N in the North and 110 in the south and longitude 80W in the West and
100E in the east. Kano State is made up of the following forty four local governments areas:
Ajingi, Albasu, Bagwai, Babeji, Bichi, Bunkure, Dala Dambatta, Dawaki kudu, Dawaki
Today, Doguwa, Gabasawa, Garko, Garun Malam, Gaya, Gezawa, Geale, Gwarzo, kinci,
Kano, Karaye, Kibiya, Kiru, Kumbotso, Kura, Tarauni, Tsanyawa, Takai, Tudun Wada, Tofa,
Madobi, Makoda, Minjibir, Kano Municipal, Nasarawa, Rimin Gado, Togo, Shannon,
Sumaila, Warawa and Wudil. The total land of Kano State is 20, 76059 kilometres with a
population of 9, 303, 682, ( 2006, provisional results). Some local governments areas of
Jigawa state were part of Kano Emirate before the creation of that state. The people of Kano
Kano city has been the capital city of Kano State since the earliest recorded time. It is located
on longitude 8° 300E within the semicrid Sudan Savannah zone of West Africa about 840
kilometres from the edge of the Sahara desert. Kano has a means height about 472.45, M
The crime by the Yahho in Kano State was serious for the arrest of 280 suspect for various as
was disclosed on a news on Monday. Kano was bieng attack since cashless policy was
initiated and the economy stuation was anonimity as a central trade of the federation of
Nigeria. The security agents deployed more security especially in Malam Aminu Kano
Out of the 44 local governments in Kano, respondents were selected only from Fagge local
government. There are 10market council in Fagge and respondents were selected from each
of them. The reason for selecting this specific local government is because it the nervou
centers of commerce in Kano compare to other local governments in Kano State. Stratified
sampling was used to reach various business promises Streets in all the ten 10
marketscouncils in Fagge.
Ten respondents were selected from ten market councils,twenty 20 were selected fromDala
and 28 were selected from Gwale through snowball sampling technique. This made up the
two hundred and thirty 230 respondents proposed for the structured questionnaire. Five 5
respondents were selected from Tarauni local government, and six 6 from Nasarawa for the
in-depth interview, using a positive sampling technique. This constituted the eleven 11
respondents that qualitative data were collected from out of twenty respondents proposed for
the in-depth interview due to fear, unawareness and lack of experiences. The justification for
the selection of the stratified sampling technique is because, it ensures that each sub-group of
the population has an equal probability of being chosen as the sample. Positive sampling
technique used to select the eleven 11 respondents from the two market chairmen is due to
the knowledge of the researcher about the respondents and the areas.
The instruments that were used for the collection of data include structured questionnaires
that contained both open ended questions and closed ended questions and an in-depth
interview guide, with a voice recorder that cuptured the responses of the interviewee which
were subsequently transferred into Disc Drive (CD, plate). The questionnaire contained a
total of sixteen 16 questions while the in-depth interview guide contained a total of ten open
ended questions.
The method of data collection includes quantitative and qualitative methods of data
collection. The qualitative method of data collection was executed using a structured
questionnaire which contained both close and open ended questions, the questionnaire were
personally and carefully distributed to respondents by the researcher and two other research
assistants and all the question were answered. The qualitative data were collected via an in-
depth interview guide. The data were all collected from Monday 16 th of December 2022-
Thursday 22th December 2022in between the hour of 11:00am to the hour of 3:30pm daily.
The interview was conducted on face-face basis and a voice recorder was used to record the
responses of the respondents. Also, the researcher took notes with a pen and a paper during
the interview.
3.8 Method of Data Analysis
For proper analysis and interpretation of the qualitative data, Statistical Packages for Social
sciences (SPSS Version 22) was used. This is because, it allows easy analysis of complex
data and also saves time since it is a software program designed to analyse raw data. The data
were collected via in-depth interview were analysed by transcribing the relevant information
given by the interviewee into a writing form. The qualitative data were presented under
section B.C, and D in chapter four to support the quantitative information given on nature,
The major limitation of the study is the limited resources to achieve accurate and objective
findings. Due to limited time and financial constraint, the study was limited to Fagge local
government area of Kano State alone. One of the major challenges encountered in the course
of the study was incorporation in the study area that did not allow the researcher to be freely
and gather data, this hindered the researcher from conducting an in-depth interview with
complelte proposed twenty 20 respondents. Another major problem encountered was the
majority of the respondent didn’twant to attend to the researcher thinking there might be legal
inflications attached to the information they provide. The researcher and the two people that
assisted him had to convince them before they could accept the questionnaire
CHAPTER FOUR
This chapter covers the analysis, interpretation and presentation of data collected from Fagge
divided into four section. The first section covers the socio demographic characteristics of
respondents, the second section entails the causes of Cybercriminals, and the third section
covers the impact of Cybercriminals while the last section deals with the solution to the
However, 230 questionnaires were distributed to capture the quantitative data but only 225
were recovered from the respondents, this amount to 97.8% of the questionnaire. So the data
The socio demographic data of respondents were examined using data to determine their
Table 1 shows the gender distributions of respondents. 60% of the respondents are make
while 40% are female. Therefore, majority of the respondents from are male. This findings is
due to the cultural and tradition of the study area that do not allow female to interact with
Table 2 reflects the age distribution of the respondents, 16% of the respondents are between
18-25 years of age, 11% are between 25-30 years of age, 20% are between 30-35,17% are
between 35-40 years of age, 15% are between 45-50 years of age while 21% of the
respondents are 50 years and above. Therefore, most of the respondents are between 30-35
years old.
Table 3 above shows the religio distribution of the respondents. Majority of the respondents
are Muslim and this constituted 67% of the total respondents. Those that are afliated to
Christianity constitute 33%. This is due to the background of the study area that is dominated
with Islam.
Table 4: Occupational Status Distribution of the Respondents
Table 4 above shows the occupation of the respondents. Majority of the respondents(29.7) are
peoplefrom IDPs camps who were unemployed. 14% were Networking staff, 23% were
security personnel, 11 % were traders, 9.3%were civil servants. This shows a strong
implication of the activities of Cybercriminals which has renders many of the residents of
Kano jobless.
Diploma/NCE 38 17
SSCE 49 21.7
Degree / HND 25 11
Others 44 20
Nil 21 9
Total 225 100
Table 6 above shows the educational qualification of the respondents. 21.3% of the
respondents have first school leaving certificate, 21.7 have Senior Secondary Certificate, 17%
have diploma/ NCE certificate, 11% have Degree/HND Certificate, 44% others acquire
computer certificate and skills acquisition certificate from craft work while 21% do not have
any certificate. Therefore, majority of the respondents which amounted to 21.7% have Senior
This action entails the causes ofCybercrimes, it started with a survey to know the awareness
of respondents on activities of Cybercriminals in Kano. It also contains both open ended and
close ended responses from the questionnaires about the causes of Cybercriminals. It also
Source: Survey,(2022).
Table above shows the survey of the awareness of the activities of Cybercriminals in Kano
State. 98.3% claimed they are not aware. Therefore,majority of the respondents are aware of
Table8 above shows the responses on the causes of Cybercriminals from respondents. 18%
existence of Cybercriminals and 2% others believed that it is the activities of cyber terrorism
in neighbouring states couple with the porosity of Kano that motivates cybercrime in Kano.
in Nigeria.
Fagge, and has Bsc degree. He asserted that, well there are many factors but the most
important ones are lack of job opportunities and bad governance in Kano State. ( IDIv From
Kano 2022)
captured from respondents in Kano State. It started with a survey to know the victims if
Cybercriminals. The subsequent part contains responses from the open ended and close ended
questions contained in questionnaire, it also presents the transcribed responses from in-depth
interview.
Table 9 above shows a survey on the awareness of the impact of Cybercriminals activities.
94% of the respondents claimed they are aware of the impacts of Cybercriminals on the
Socio-Economic development in Kano while 6% claimed they are not aware of the Socio-
Economic impact of Cybercriminals activities. Therefore, majority of the respondents know
development in Kano. 21% of the respondents claimed that Cybercriminals destroy business
activities, 24% believed it has led to serious loss of capital, 21% claimed it has halt tourist for
the on line business activities, 22% believed it destabilise bank cash withdrawal while 12%
others claimed that Cybercriminals has led the loss of peace and destruction of companies
and business transaction in the region. Therefore, majority of the respondents believed that
I can say the Socio-Economic implication of Cybercriminals in Kano State is that, it affects
youths and even tourist because before the involving of Cybercriminals many people were on
transferring money to Kano business people to ease their activities, apart from many who
This section presents the solution suggested by respondents in addressing the menace of
Yes 191 85
No 34 15
Total 225 100
Source: Field Survey, (2022).
Table 11 above reflects a survey from respondents to know if the problem of Cybercriminals
can be addressed. 85% of the respondents believed that the problem can be addressed while
25% cannot be solved. Therefore, majority of the respondents believed the problem of
respondents. 25.3% believed that creation of job opportunities for unemployed youth will
solve the problem, 27.1% believed the adoption of robust poverty alleviation programs,
security forces if arrested and further to prosecution. Therefore, most of the respondents
believed that developing robust poverty program will help in solving problem of
Cybercrimes.
“The problem can be address but it has to be approach from different perspective. First of all
there has to be kind mutual cooperations between bankers of Kano State and the security
agencies and there has to be synergy between all the security anencies serving in Kano State.
I mean all the security agencies who are in line to cybercrime supposed to be working hand in
hand”
This section is made up of the discussion of the major findings which was done in line with
the objectives of the study. It is devided into four sections. The first section covers the Socio-
Economic characteristic of the respondents, the second section deals with the causes of
Cybercrimes in Kano, the third section covers the impacts of Cybercriminals on Socio-
Economic development in Kano while the last section covers solution to the problem of
The result of the gender distribution collectedindicated that, most of the respondents are male
probably due to the cultural and religious practice that limit the rate at which female relate
and interact with their male counterparts that are not family members. Tha age distribution
was represented and range between 18 years to 50 years and above where by age bracket 30-
35 constitute the majority. The religion distribution of the study revealed that Muslim
constitute an overwhelming number of respondents due to the facts that the study was carried
out a Muslim dominated region. The occupational status of the respondent shows that
majority were unemployed people who are engaged to Cybercrimes. Majority of the
respondents stayed in Kano. On the educational qualification, majority of the respondents
The findings of the study have revealed that it is bad governance in the study area that has led
to the proliferation of Cybercrimes. This finding is corroborated with the assertion of Daniel (
as cited in Monsuru 2004), who asserted that, the crisis and insurgency in North and North
East of Nigeria with high intensity majorly is about corruption and unfair distribution of
power equality by the government. Okechukwu (2012) also supported this idea by arguing
that the post-election violence that occurred in several northern cities reflected strong
dissatisfaction with elites who protestors thought controlled the election process. Public
opinion polls and news reports suggest that there is a strong sentiment through out the
country, but especially in the North, that government is not on the side of the people; and that
their poverty is a result of government neglect, corruption, and abuse. This is the type of
popular narrative that is ripe an insurgent group to hijack for its own purpose.
The study discovered that the most common impacts of Cybercriminals on the Socio-
Economic development of Kano is the greatest of capital resulted from Cybercriminals. This
is because; millions of wealth have been lost to Cybercriminals. These millions lost were
originally supposed to constitute the labor strength of the economy. Thus, the findings are in
line with what Shah ( 2011), said “the aftermath of any environment that experience
insurgency usually cut cross every respect of the society and every member of that
environment is either directly or indirectly a victim. Apart from the amount of cost which is
the lost of properties to the Cybercriminals”. In the same vein, to Ben (2012), supported these
findings by asserting that the activities of Cybercriminals” have led to the lost of billions of
Naira.
This study unveiled that the adoption of a robust poverty alleviation programs vwill help in
addressing the problem of yahoo. However, the findings agreed with that of Awojobi (2015),
he argued that the Nigeria government needs to initiate policy that will generate employment
for the unemployed youth and reduce the rate of poverty in the country. Furthermore,
Okechukwu (2017), posited that, Cybercriminals has grown and increasingly more over to the
past one decade, and to stop yahoo will require a strong strategy that employs the
establishment of a comprehensive plan rather than the imposition of more CB martial law. He
added that while more sophisticated and targeted security efforts are necessary to contain
Cybercriminals acts and to capture and prosecute them, the government must also win over
the population by addressing the social and economic problems that have created the