By Ukaegbu,
MI; Amanawa, WG; Ikiri, TK
(2022).
Greener Journal of Library, Information
and Archival Sciences Vol. 3(1), pp. 16-24, 2022 ISSN: 2672-4472 Copyright ©2022, the copyright of this
article is retained by the author(s) |
|
Development Communication and Eradication of Cyber
Crimes among Youths in Yenegoa Metropolis, Bayelsa State
Ukaegbu, Michael Ibe (PhD.); Amanawa, Weriwoyingipre Gold; Ikiri, Treasure Kehapolom
Department
of English and Communication Art, Ignatius Ajuru
University of Education, Rumuolumni, Port Harcourt.
Emails/Phone:
1michaelibe22@ gmail. com, 08135804251; 2goldamanawa@ gmail. com, 08166766955; 3treasureikiri15@ gmail. com, 08135312034
ARTICLE INFO |
ABSTRACT |
Article No.: 090122078 Type: Research |
The purpose of this
study was to examine development communication strategies and eradication of
cyber crimes in Yenegoa
metropolis, Bayelsa state. It adopted the
following theories; the development communication theory and social learning
theory. It also adopted the survey method with the questionnaire as its
instrument for data collection. The convenient sampling technique was used.
The study population was 35,228 residents of Yenegoa
metropolis Bayelsa state. Using the Taro Yamane’s
formula, a sample size of 400 respondents was drawn from the population. The
study had four objectives which are, the perceptions of youths in Yenegoa metropolis on cyber crime,
the extent youths in Yenegoa engage in cyber crime, the gratifications youths derive from
exposure to cyber crime and how development
communication can eradicate cyber crime among
youths in Yenegoa. Findings show that youths in Yenegoa understand that cyber crime
is a menace to society, and that cyber crime is at
a moderate level in Yenegoa. Youths engage in cyber crime in Yenegoa because
of certain gratifications, and that development communication messages in
traditional media helped to fight against cyber crime
in Yenegoa. The study recommended that the
government should use the media to aggressively raise public awareness on cyber crime, while individuals must follow simple
personal safety regulations such as avoiding exposing personal data or
banking information to strangers. |
Accepted: 19/09/2022 Published: 28/09/2022 |
|
*Corresponding
Author Ukaegbu Michael Ibe E-mail: michaelibe22@ gmail.com Phone: 08135804251 |
|
Keywords: |
|
|
|
INTRODUCTION
There
has been remarkable development achieved in the cyberspace over the years which
is very commendable. Just as the benefits of technology and the internet have
greatly enhanced society and life itself by addressing issues, providing
solutions, and making things easy for people, cyber crime
has skyrocketed all over the world. Criminality and crime have been linked to
man since his fall. Crime is illusive, and it will stop at nothing to stifle
development. Several communities have used various techniques to combat crime,
depending on the nature of the crime. One thing is certain: a society with a
high crime rate can not prosper or expand. This is
the case since crime is the polar opposite of growth. It has a detrimental
effect on society and the economy as a whole.
Communication is an important component of
human life. Communication, society, technology, and humans are all intertwined
since man is a communicative creature by nature; consequently, communication
must be used as a strategic instrument to progress man and society. A
communication strategy is a collection of active communication tools designed
to elicit specific responses from the target audience. A successful
communication strategy takes into account the message to be delivered, the
medium to be used, the target audience and feedback. The message must be clear,
accurate, and reliable, and it must be presented via a media that can
effectively reach the intended audience. Communication methods are critical
because they help to prevent and reduce social vices. In instances when people
have the opportunity to change their ways of life, communication can be used to
persuade and influence individuals through social mobilization, as well as to
aid in changing behaviours through education and
change management (Servaes, 2008). Bayelsa is a Nigerian state located in the south of the
country, at the heart of the Niger Delta. Its population is estimated to be
around 1,704,515 people (NPC 2006).
The Yenagoa Metropolis is Bayelsa
State's capital and one of the state's eight local government areas. The state,
like the rest of the world, is dealing with the social vice of cyber crime, which is spreading like wildfire among young
people.
Statement of Problem
The
notion of communication, as well as its tactics, has been sidelined and
significantly disregarded in Yenagoa metropolis, Bayelsa state, throughout the years, despite the fact that
it is a crucial instrument for development. Despite its capacity to bringing
about positive society change, communication is generally undervalued. Despite
the fact that communication has been proved to be beneficial and important in
change and development, many people still do not recognize or understand its
importance in progress. Communication is usually overlooked as a critical component
of social change. This paper looks at development communication strategies and
the eradication of cyber crime in Yenagoa,
Bayelsa state.
Objectives of the
Study
The
following formed the objectives of the study which are to:
·
Access
the perception of youths in Yenegoa metropolis on cyber crime.
·
Analyze
the extent to which youths in Yenegoa metropolis
engage in cyber crime.
·
Examine
the gratification youths in Yenagoa metropolis derive
from exposure to cyber crime.
·
Investigate
how development communication can eradicate cyber crime
among youths in Yenagoa metropolis.
Research Questions
What are the
perceptions of youths in Yenagoa metropolis on cyber crime?
To what extent do
youths in Yenagoa metropolis engage in cyber crime?
What are the
gratifications youths in Yenagoa metropolis derive
from exposure to cyber crime?
How can development
communication eradicate cyber crime among youths in Yenagoa metropolis?
Theoretical
Framework.
Abend (2008) as cited by
Swanson (2013) retouched that: “theories are formulated to explain, predict,
and understand phenomena and, in many cases, to challenge and extend existing
knowledge within the limits of critical bounding assumptions”. The theoretical
framework describes and provides theories that seek to explain the research.
The theories used to form the foundation of this research are:
Development Communication Theory
Social Learning Theory
Development
Communication Theory
The
theory was propounded in 1972 by Maxwell McCombs and Donald Shaw. They posit
that, the media should be used to promote society's general growth and should
be focused on the society's collective interest rather than the selfish
interests of a few individuals. It was proposed that the government intervene
and promote economic growth. According to Baran and
Davis (2012, p.149), “developmental media theory advocates media support for an
existing political regime and its effort to bring about national economic
development.” The theory emphasized that the media must play supportive role to
government policy and programmmes rather than being
critical of governments, its programmes and
personnel. Several developing countries in South America use this theory (Baran &Davis,2012).
According to Hasan
(2010), development media, also known as development communication, is a set of
communication methods, techniques, and ideas used in international development
to enhance the living conditions and quality of life of those who are poor or
marginalized. The use of communication tools to address development challenges
is characterized by conceptual flexibility and diversity, which reflects the
field's historical history. Information dissemination and education, behaviour modification, social marketing, social
mobilization, media advocacy, communication for social change, and
participatory communication are some of the strategies used in the business.
Development communication is for the good of
society, and it benefits the entire community even though it comes from a
specific group. Ndimele & Innocent (2016),
development communication theory in developing countries, the media is used
entirely for societal development, notably in the fields of agriculture,
health, and social mobilization. They believe media messages can be delivered
in a way that aids poor countries in achieving long-term socioeconomic
improvement. The idea encourages people to participate in the industrialization
process from the ground up; as a result, media material should be
development-driven and focused on people's socioeconomic lives.
Social Learning
Theory
This
theory as propounded by Albert Bandura in 1986 emphasizes the importance of
observing, modeling, and imitating the behaviours,
attitudes and emotional reactions of others. Social learning theory considers
how both environmental and cognitive factors interact to influence human
learning and behaviour. Bandura popularized the term "social
learning theory," which describes how observations in the social world
influence actions and cognitions, also proposed modeling in which an observer
sees a person's behaviour and their consequences, in
addition to classical and operant conditioning. If that individual is rewarded
for their actions, the observer is more inclined to repeat them. If, on the
other hand, the conduct is punished, the observer learns to expect bad results.
The social learning theory is a learning and social behaviours
theory that claims that new behaviours can be learned
by watching and imitating others.
In general, the social learning theory argues
that those who perceive and experience more rewards and fewer costs are more
likely to engage in criminal behaviour. The social
learning theory (SLT) is a popular explanation for criminal behaviour
that claims that crime is learned and more likely to occur when people
associate with criminals, or exposed to delinquent models, expect or receive
more rewards and fewer punishments for crime, and have a larger number of
definitions favourable to crime.
Many delinquency prevention and offender
treatment programmes are based on social learning
theory, which has lately been combined with social structural notions to form a
social structure. The social learning theory has been used to a variety of
phenomena and studies on a variety of topics, including illicit drug use and
prevention, prostitution, theft and so on. These domains reveal a similar
factor: involvement, interest, and benefit, as well as consequences. Now, in
order to be involved in criminal behaviour, the
social learning theory states that such a person has witnessed to some level
the advantage of the practice as well as the gain associated with it, and hence
has a natural desire to participate in it. Also, in a community where cyber crime or cyber criminals are permitted to roam freely
on the streets without facing any penalties or punishment even when caught, the
rest of the community is left with the impression that they may be engaged as
well.
Thus,
socialization, culture, and the media all contribute to the creation of behavioural expectations, and one does not need to
personally experience reinforcement or punishment to be affected. Bandura
(1977) proposed that after completing a task successfully, one feels a sense of
self-efficacy. A cyber criminal's capacity to execute behaviours
necessary to produce specific performance attainments, or self
efficacy, is required to complete a task successfully without being
caught.
Conceptual Review
Development
Communication
Communication
is a very vital aspect of human existence and the strategic use of
communication brings about positive social change and development. According to
Udoakah (1998), communication is the process by which
humans convey their needs, feelings, aspirations, ambitions, and sentiments
using codes, symbols, and language that is recognized by all parties concerned.
Communication is therefore important in the process of development, because it
involves the study of people relating to themselves and to one another in
groups and societies, influencing and being influenced, informing and being
informed, teaching and being taught, loving and being loved, entertaining and
being entertained (Adepoju 2000). Communication,
based on this may be described as an instructive process that leads to a
successful development process. In many aspects, communication is essential to
this quest. It enables planners to consult with people while formulating
development plans, for example, taking into account their needs, attitudes, and
traditional knowledge. Only through communication can project beneficiaries
become the primary actors in the success of development programs (UNDP, 1993).
To achieve any positive social change
communication is required as observed by Pratt & Boyden (1985):
communication between members of the society; communication among development
experts and the target audience with whom they work. Communication is an
essential component of every human activity, involving the interchange of
knowledge, information, feelings, hopes, and fears.
To Braimoh (1988), Effective communication is a necessary
skill for the formation and maintenance of positive social change and
interactions. It entails a regular exchange of ideas and interactions among
individuals in order to solve issues, and efficient communication is regarded
as a necessity for all aspects of group functioning. With all of these
realities, good communication cannot be overlooked if development is to be
achieved. As a consequence, communication is essential for the success of
community development. People are generally resistant to change, but in order
to effect change, you must communicate, address the root causes of the problems,
and present alternative solution. The intentional use of communication to
achieve socially beneficial aims is known as development communication.
In relations to development, communication
refers to an interactive process in which community members and information
providers communicate information, knowledge, and skills vital to development,
either in person or through media such as radio, print, telephones, and
cybernetics. The purpose of proper and strategic communication is to give people the information and skills they need
to make informed decisions and improve their livelihood, because people are at the core of every development
effort, since development does not occur in a vacuum, in this context communication is used for
community mobilization, decision-making, and action, as well as confidence
development for spreading awareness, sharing information, and changing
attitudes, behaviours, and lifestyles (FAO 2006).
Communication for development is the
systematic and planned use of channels of communication such as interpersonal
channels, ICTs, audio-visuals, and mainstream press for development reasons.
Communication will be used to collect and exchange information among all those
involved in the development planning process, with the goal of reaching an
agreement on the problems facing developmental problems and exploring
solutions, mobilize people for development ventures, and trying to assist in
the resolution of problems and misconceptions that may arise during the
development plan. (Thussu 2000).
Communication development's main purpose is
to equip local citizens with the knowledge, ideas, skills, and experience they
need to grow. Every social development project requires communication, as
observed by Pratt & Boyden (1985): Communication between members of a
community and a group; communication between development professionals and the
people they deal with; contact between funders and field workers, and so on.
Cybercrime
Cybercrime
is a large umbrella term that encompasses computer-assisted crime in which
computers and technology are used in a supporting role. At the same time, the
term cyber crime also includes computer focused
crimes that are a direct result of computer technology and would not exist
without it, such as unauthorized computer system trespassing (Furnell 2002; McGuire and Dowling 2013)
Cyber crimes can be classified
into different categories, it includes; cyber-trespass (e.g,
unauthorized system access), cyber-deception/theft (e.g., identity theft,
online fraud, digital piracy), cyber-porn/obscenity (e.g., child sexual
exploitation materials), and cyber-violence (e.g., cyberstalking;
cyber terrorism). (Holt, Bossler,
and Seigfried-Spellar 2018).
It is
nearly impossible to estimate the amount of cyber crime
that occurs in most nations across the world because of a lack of standardized
legal definitions for these offenses and few valid, reliable official
statistics (Holt and Bossler 2016). Evidence
demonstrates, however, that cyber crime rates are
increasing as the rates for many forms of traditional street crimes continue to
decrease (Tcherni 2016).
The amount of research on cyber
crime has grown exponentially over the last few decades, some focused on
exploring how the nature of cyber crime and
cyberspace differed from traditional crime and terrestrial space (Grabosky 2001).
A significant challenge for cyber crime scholars, both historically and currently, is
the lack of official statistics on most forms of cyber crime.
In the United States, the Federal Bureau of Investigation’s Uniform Crime
Report’s Summary Reporting System, the most commonly used source for crime
data, provides no information on cyber crime or
whether any form of technology was involved in the commission of a crime. The
National Incident-Based Reporting System (NIBRS), which the U.S. is fully
moving to in 2021, also does not provide a specific cyber
crime category, but does allow agencies to indicate whether a computer
was involved in the commission of a crime. Since necessity is the mother of
invention, scholars studying cyber crime were
required to collect primary data in innovative ways, such as by analyzing forum
discussions, bulletin boards, and blogs, deploying honeypots, and developing
field experiments (Holt and Bossler 2016 ).
How Cyber criminals Operate.
Kate
Brush (2021) describes extensively how criminals operate as well as explaining
in details the types of cyber crime that can be found
in the modern era. Kate explains that cyber criminals range from a single user
who engages in cyber bullying to state sponsored actors such as China's
intelligence agencies. Cybercrime can start everywhere there is digital data,
opportunity, or motivation. Cybercrime does not happen in a vacuum; it is, in
many ways, a distributed phenomenon. That is, hackers frequently enlist the
help of third parties to accomplish their schemes. Today, fraudsters utilize
crypto currency brokers to trade illegal drugs and keep virtual money in escrow
for state threat actors, who rely on technology to steal intellectual property.
The world of cyber crime is currently in flux, as
cyber criminals seek novel ways to carry out their activities and achieve their
objectives while evading detection and imprisonment on a daily basis.
Types of Cybercrime
Kate
brush (2021) enumerated the numerous varieties of cyber
crime, and posited that majority of cyber crimes
are carried out with the intention of gaining financial advantage for the
perpetrators, though the methods through which cyber criminals seek payment can
vary. The following are examples of certain types of cyber
crime:
Cyber extortion: An attack or threat of an
attack that is followed by a demand for money to cease the attack. The ransomware assault is one type of cyber extortion. The
attacker gains access to an organization's networks and encrypts its documents
and files (or anything else of value) until a ransom is paid. This is usually
in the form of crypto money, such as bitcoin.
Crypto jacking: An exploit that employs
scripts to mine crypto currency without the user's permission within browsers. crypto currency mining software may be loaded into the
victim's machine as part of a crypto jacking attack. However, if the user's
browser has a tab or window open on the rogue site, many assaults rely on
JavaScript code that performs in-browser mining. There is no need to install
malware because the in-browser mining code is executed when the affected page
is loaded.
·
Identity
theft: An attack in which a person gains access to a computer in order to
obtain personal information about a user, which they then use to steal that
person's identity or gain access to their valuable accounts, such as banking
and credit cards. On dark net markets, cyber criminals buy and sell identity
information, including financial accounts and other types of accounts such as
video streaming services, web mail, video and audio streaming, online auctions,
and more. Identity thieves frequently target personal health information as
well.
·
Credit
card fraud: An attack in which hackers gain access to a retailer's networks in
order to steal their customers' credit card and/or banking information. On dark
net markets, stolen payment cards can be bought and sold in bulk, with hacking
groups profiting from selling to lower-level cyber criminals who earn from
credit card fraud against individual accounts.
·
Cyber espionage: A cyber
crime in which a cyber criminal hacks into a
government's or other organization's systems or networks in order to gain
access to confidential information. Profit or ideology may be the driving force
behind an attack. Cyber espionage activities can include any type of cyber attack to gather, modify, or destroy data, as well as
the use of network connected devices, such as webcams or closed-circuit
television (CCTV) cameras, to spy on a targeted individual or group and
monitoring communications, such as emails, text messages, and instant messages.
·
Software
piracy: An attack involving the unauthorized copying, dissemination, and usage
of software programmes for commercial or personal
gain. This sort of cyber crime is frequently related
with trademark infringements, copyright infringements, and patent
infringements.
·
Exit
scam: Not surprisingly, the dark web has spawned a digital counterpart of an
old swindle known as the exit scam. Dark web administrators shift virtual
currency kept in marketplace escrow accounts to their own accounts in today's
form, thus stealing from other criminals.
·
Ransomware: ransomware
is the fastest growing cyber crime, ransomware victims include big
companies, small and medium enterprises and individual consumers. Ransomware began years ago with floppy disks sent through
the mail, inviting victims to take a survey assessing their risk of contracting
AIDS. Ransomware has gone from artisanal exploit to
mass-market. Lewis James (2018).
Development
Communication as a Tool for the Eradication of Cybercrime
Communication
for development is the systematic and planned use of communication channels for
development purposes, such as interpersonal channels, ICTs, audio-visuals, and
the mainstream media. According to Ochonogor (2006),
a successful multimedia strategy would require project managers to take
advantage of the vast capacity available through numerous communication
channels such as radio, television, newspapers, and magazines. Posters and
traditional media channels, as well as social media platforms like Facebook,
Twitter, Instagram, and Whatsapp
when used simultaneously, have the potential to be extraordinarily effective in
achieving the stated goal of informing and enlightening members of the Yenagoa metropolis of the consequences of this social vice.
Cybercrime is a vice that should be
eradicated because it poses a significant threat to the socio-economic
well-being of the people of Yenagoa, and development
communication can be used strategically to eradicate cyber
crime. To effectively tackle this menace, development communication
would need to utilize a variety of media that is multimedia, which combines old and current communication channels, such as radio,
television, newspaper, town hall meetings, magazine, cinema, as well as the
internet. This means there is a need to create a functional development
communication strategy, and all kinds of media channels should be leveraged on
effectively in order to reach out to the population of Yenagoa,
Bayelsa state, particularly young adults. Cyber crime is a social ill that is slowly but steadily
ravaging Nigerian youngsters across the country. The rapid transition to an
electronic society in which everything is done electronically, such as
electronic payment, electronic voting, electronic banking, electronic
registration, and so on, has left electronic transactions vulnerable to cyber attacks, resulting in negative security consequences.
The internet is accessible and used by people from many works of life; it could
be for work, education, pleasure, and so on.
Ochonogor (2006) throws light
on the use of the entertainment-education approach to efficiently pass across
development messages, since people's attention is easily captivated when
significant concerns are portrayed as entertainment rather than news reports.
This means that in the Yenagoa metropolitan, should
inculcate appealing multi-media techniques such as anti-cybercrime campaigns
using drama, songs, and jingles, as well as captivating mobile enlightenment
campaigns, to educate youths on the need to desist from cyber
crime and other societal vices. This is pertinent no note, because when
the media is utilized correctly in this millennial era, cyber
crime activities will be minimized causing a safer society and
development to thrive.
METHODOLOGY
The
survey research design was adopted for this study, the
questionnaire was used as the instrument of data collection. This study was
conducted in Yenagoa metropolis, Bayelsa
state. According to the National Population Commission (NPC, 2006) the Yenagoa metropolis has a population of 352,285. Using the
Taro Yamane formula this study has a sample size of 400,
therefore 400 copies of the questionnaire were administered to residents of Yenagoa, Bayelsa State. The
convenient sampling technique was used for this study.
Measuring
Instrument
The
four points likert scale was
used to analyse data drawn from items in the
questionnaire. Mean criterion was used to determine acceptability or rejection
of and item, the mean criterion for this study is 2.5 calculated thus: SA(Strongly agreed) = 4points, A(Agreed) = 3points,
D(Disagreed) = 2points, SD(Strongly disagree) = 1point.
4+3+2+1
= 2.5
4
Therefore
2.5 will serve as the mean criterion for this study.
Presentation,
Discussion and Analysis of Findings
This
study used a survey method, collecting its data through the questionnaire. A
total of 400 copies of questionnaire were administered to the respondents, and
400 copies of the questionnaire were retrieved and used for the study.
Table
1: Mean (x) Analysis of how youths perceive cyber crime
in Yenagoa metropolis.
S/N |
ITEMS |
SA |
A |
D |
SD |
X |
REMARK |
1 |
I
believe cybercrime is legal |
5 20 |
15 45 |
258 516 |
122 122 |
1.7 |
REJECTED |
2 |
I
believe cybercrime is illegal |
220 880 |
172 516 |
8 16 |
0 |
3.5 |
ACCEPTED |
3 |
I
believe cybercrime is acceptable |
144 576 |
4 12 |
16 32 |
236 236 |
2.1 |
REJECTED |
4 |
I
believe cybercrime is unacceptable |
180 720 |
90 270 |
47 94 |
83 83 |
2.9 |
ACCEPTED |
From
the above table, item one did not meet up the mean criterion which shows that
it was not accepted by the respondents, unlike item two which is almost clearly
an opposite of the statement on item one. Both items and responses from
respondents clearly show that most youths of Yenegoa
metropolis see cyber crime as an illegal venture.
Furthermore, items three and four looked into the level of acceptability of cyber crimes among the respondents, and majority of the
respondents as shown in item four on the questionnaire attested to the
unacceptability of cyber crime in the society.
Cyber crime almost in every
clime remains a menace to the society, Nigeria,
especially Yenegoa axis has seen a sharp rise in this
type of activities among its youth residents in the society. Many of the
respondents for this research which are basically youths, agreed to the fact
that cyber crime is not a good thing in any society,
however a lot of people still engage in these activities.
The illegality of cyber
crime cannot be over emphasized as punishments vary from environment to
environment, with people getting some number of years in imprisonment in some
cases. However some youths still believe in the clout they tend to enjoy from
engaging in cyber crime activities.
Table
2: Mean (x) Analysis of the extent to which youths in the Yenagoa
metropolis engage in cyber crime.
S/N |
ITEMS |
SA |
A |
D |
SD |
X |
REMARK |
3 |
There
is a high rate of cyber crime in Yenegoa |
8 32 |
196 588 |
32 64 |
164 164 |
2.1 |
REJECTED |
4 |
There
is a moderate rate of cyber crime in Yenegoa |
129 516 |
75 225 |
96 192 |
100 100 |
2.5 |
ACCEPTED |
5 |
There
is low rate of cyber crime in Yenegoa |
79 316 |
126 378 |
111 222 |
84 84 |
2.5 |
ACCEPTED |
6 |
Youths
in Yenegoa engage in cyber extortion |
100 400 |
125 375 |
64 128 |
111 111 |
2.5 |
ACCEPTED |
7 |
Youths
in Yenegoa engage in Identity theft |
124 496 |
216 648 |
48 96 |
12 12 |
3.1 |
ACCEPTED |
8 |
Youths
in Yenegoa engage in Credit card fraud |
55 220 |
121 363 |
99 198 |
125 125 |
2.2 |
REJECTED |
9 |
Youths
in Yenegoa engage in Crypto Jacking. |
67 268 |
136 408 |
100 200 |
97 97 |
2.4 |
REJECTED |
Items
three, four, and five was concerned with learning about the rate of cyber crime activities in Yenegoa,
it was rejected that Yenegoa was experiencing a high
rate of cyber crime activities, however the
respondents accepted cyber crime activities are at a
moderate level in Yenegoa.
From the above table, it was also discovered
that cyber extortion and identity theft were prevalent among youths in Yenegoa who engage themselves in cyber
crime activities.
The extent of cyber crime
in Yenegoa is seen to be at a moderate level based on
findings gotten from the respondents, however some
different levels of cyber crime can be experienced at
different levels in Yenegoa. Respondents claim that
youths engage in cyber extortion and identity theft, but do not accept that
youths engage in crypto jacking and credit card fraud, although we know that it
is only a matter of time before these new formats of cyber
crime become rampant among youths of Yenegoa.
Table
3: Mean (x) Analysis of the gratification youths derive from their involvement
in cyber crime activities.
S/N |
ITEMS |
SA |
A |
D |
SD |
X |
REMARK |
10 |
Youths
engage in cyber crime because they gain quick
wealth |
106 416 |
240 720 |
44 88 |
12 12 |
3.0 |
ACCEPTED |
11 |
Youths
in Yenegoa engage in cyber crime
because the gain financial freedom |
132 528 |
208 624 |
40 80 |
20 20 |
3.1 |
ACCEPTED |
12 |
Youths
in Yenegoa engage in cyber crime
to experience rich lifestyle. |
80 320 |
137 411 |
136 272 |
47 47 |
2.6 |
ACCEPTED |
In
the above table three, items ten, eleven, and twelve showed that certain types
of gratifications were also responsible for making youths engage themselves in cyber crime activities. Gratifications such as quick wealth,
the need to experience rich lifestyle, and financial freedom were all accepted
by the respondents as motivating factors responsible for youth engagement in cyber crime activities.
Gratifications and quick gains gotten from
engagement it cyber crime activities are sometimes
factors responsible for youth engagement in related activities. Various
gratifications could come from quick wealth, the need to be among the big boys,
the need to spend big and hang around the opposite gender, etc. However, there
can be other legitimate means of getting all these gratifications satisfied
from engaging in profitable activities.
Table
4: Mean (x) Analysis of how development communication can be used to eradicate cyber crime in Yenagoa
metropolis.
S/N |
ITEMS |
SA |
A |
D |
SD |
X |
REMARK |
13 |
Town
hall meetings have been effective in eradicating cyber crimes |
25 100 |
80 240 |
122 244 |
173 173 |
1.8 |
REJECTED |
14 |
Town
criers talk about cyber crime while sending
messages out in the society |
10 40 |
84 252 |
156 312 |
150 150 |
1.8 |
REJECTED |
15 |
Traditional
media help publish messages against cyber crime. |
160 640 |
160 480 |
48 96 |
32 32 |
3.1 |
ACCEPTED |
Table
four shows that generally apart from traditional forms of media such as radio,
television and news papers, not enough is being done
in terms of employing development communication channels such as town hall
meetings and town criers in eradicating cyber crimes
among youths in Yenegoa. Town criers and town hall
meetings did not get enough acceptability by the respondents, in the sense that
they have being properly employed in eradicating cyber crime
as they believe that information about cyber crimes
are not captured in discussions held in town hall meetings.
For
communication to be effective, it has to pass through
the right channel, traditional means of communication have not helped a lot in
fighting against cyber crime in society as messages
about cyber crime hardly pass through those medium
such as town hall meetings and town criers. Television, radio, and newspaper
media have done a lot in helping in the war against cyber crime, however more is
needed to be done if more youths should be brought out of the shackles of cyber crime engagement.
CONCLUSION
Cybercrime
is a threat that should be stopped and reduced to the barest minimum in the
city of Yenagoa, through the variety of development
communication strategies discussed in this study. The findings show that young
adults commit bulk of the cyber crimes, and that the
development communication strategies can be used to combat cyber
crime in Yenegoa if properly employed.
The study concluded that youths of Yenegoa agree that cyber crime is
bad, however there is a certain level of cyber crime
activities prevalent in the city, based on certain motivating factors like the
need to feel among, financial freedom among others. Communicating through town
criers and town hall meetings have not been effective in fighting against cyber crimes in Yenegoa, however
there has been some level of progress made with traditional media.
Although various solutions have been proposed
to prevent future incidences of this crime, the government and individuals can
still do a lot to lessen it. It is proposed that our government place a higher
priority on the welfare and well-being of its citizens in order to reduce the
burden on individuals by providing good-paying jobs and other basic
necessities. This will have a big positive impact on the quality of life. Cyber crime is expected to reduce and eventually be
eradicated if development communication is effectively utilized.
Recommendations
The
following recommendations are made based on the findings:
1.
The government should use the media to aggressively raise public awareness on cyber crime, and personal cyber space security should be incorporated
into the primary, secondary, and university education curricula.
2. Individuals must
follow simple personal safety regulations such as avoiding exposing personal
data or banking information to strangers, such as credit card pins, bank account numbers, e-mail codes, and using antivirus
software to protect their systems from infection,
among other things.
3. Both the government and the private sector
should provide jobs for young graduates, and where jobs are scarce, vocational
skills and entrepreneurial programmes should be established
to keep the youth fully engaged.
4. Development communication strategies should
be employed to reach the youths and influence their perception on cyber crime.
REFERENCES
Abend, G. (2013). The meaning of theory. Berrett-Koehler Publishers.
Baran,S. J., & Davis,
D.K.(2012).Mass communication theory, foundations, ferment, future, (6th ed.). Wadsworth Cengage.
Neufeld,
D.J (2010). “understanding cyber
crime” in proceeding of the Annual Hawaii international conference
system sciences.
Furnell,
S. (2002).
Cyber Crime: Vandalizing the Information Society. Addison Wesley.
Grabosky, P. (2001). “Virtual Criminality: Old
Wine in New Bottles?” Social & Legal Studies.
Hasan,
S. (2010).
Mass communication principles and concepts. (2nd ed.).
CBS Publishers & Distributors Pvt Ltd.
Holt, T. J., & Bossler, A.
M. (2016).
Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses. Crime Sciences Series. Routledge.
Kamini, D. (2011). Cyber Crime in the
Society: Problems and Preventions. Journal of Alternative Perspectives in the
Social Sciences (2011) Vol 3, No 1, 240-259.
Ndimele,
O. M. & Innocent, H.K. (2016). Fundamentals of mass
communication. (2nd ed.). M & J GRAND
ORBIT.
Nweke, S.A.N. (2006). Principles
of crime prevention and detection in Nigeria. Ebenezar
Productions Ltd.
Ochornogor, C.I. (2016). Multimedia communication approach to managing flooding in the River
Niger plains of Nigeria. In S.O. Ebenezer, U.J. Aniefok& C.I. Ochornogor
(Eds.), Issues and trends in environmental communication (pp. 62-82).
Kraft book limited.
Pratt, B. & Boyden, J. (1985). The field directors’
handbook: An Oxfam manual for development workers. Oxford
University Press.
Smith,
R. (2007).“Cybercrime and society”, Aust. N.Z.J criminol.,
2007.
Servaes, J. (2008). Communication
for development and social Change. UNESCO. Sage Publications.
Tcherni, M., Davies A, Lopes, G, & Lizotte, A. (2016). “The Dark Figure of Online Property
Crime: Is Cyberspace Hiding a Crime Wave?” Justice Quarterly.
United
Nations Development Projects Reports 1993.
Cite this Article: Ukaegbu,
MI; Amanawa, WG; Ikiri,
TK (2022). Development Communication and Eradication of Cyber Crimes among
Youths in Yenegoa Metropolis, Bayelsa
State. Greener Journal of Library,
Information and Archival Sciences, 3(1): 16-24. |