TABLE OF CONTENTS
DECLARATION .................................................................................................... . . ......................... !
APPROVAL .......................................................................................................................................... 11
DEDICATION ...................................................................................................................................... 111
ACKNOWLEDGEMENT ...................................................................................................................... i\
ABSTRACT ........................................................................................................................................... v
CHAPTER ONE .................................................................................................................................... I
!.!.Introduction .................................................................................................. . I .. '
1.2.Scope of the study; ........................................................................................................................... 2
1.3.0bjectives ofthe study; ................................................................................ .. I .......................... -
1.3.1.General objective .............................................................................................. .
1.3.2.Specific objectives............................................................................................ . ......................... 3
1.4.I:Zesearch n1ethodology ............................................................................................ .......................... ~
1.4. 1 Research design................................................................................................. .. ....................... 3
1.4.2.Study population ............................................................................................ . ., .... "~
l. 5. Lin1itations of the study....................................................................................... . .......................... 3
1.6.Literature Review.............................................................................................. . .......................... '
CHAPTER TWO .................................................................................................................................. 5
2. 1. Background of Computer Crimes; .................................................................................................... :'i
2.2.Computer Crime Statistics;................................................................................. . ......................... :>
2.3.Motivations for computer crimes ......................................................................... . .......................... 7
CI-IA .. PTER THREE ............................................................................................................................ II
3.1.What are the main computer crime tools? ...................................................... . . ......................... II
3.2. Who are the perpetrators of online crime? ....................................................................................... I 1
vi
3.3. What are the threats to the public and busines:;':' ............................................ . ........................ I'
3.3.1.Public...................................... .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................. 12
3.3.2.Business ...................................................................................................................................... 13
CtiAPTER FOUR ............................................................................................................................... l-1-
4. !.Challenges to enforcement of computer crimes ............................................................................... 14
4.2.ldentity of cybercriminals .................................................................................. . ······················· ].]
4.3.J urisdictional challenges .................................................................................... . . ........................ I')
4.4.The extra traditional processes challenge ..................................................... . I
····•·············· .. !
4.5.The nature of evidence .................................................................................................................... 21
4.6.Lack ol'e1lective reponing and death of data....................................................... . ..................... 23
4. 7.Cost, time and effort incurred in investigation and prosecution ..................... . . .. ······················ 2-l
4.8.Lack of adequate legislation and ineffective ones where extant ..................................................... 26
4. 9.1nternational law without enforcement mechanisms............................................ . ........................ 27
4. 10. Trained, poorly paid and lack of protection for l
4.11. Dearth of experts in prosecution of cybercrimes .. ....................................... ...... .. . ...................... 2lJ
4.12.Absence of one universal law governing cybercrimes .................................................................... 30
CHAPTER FIVE ................................................................................................................................. .32
S.l.l~ecotllilleildatioilS .......................................................................................................................... 32
REFERENCES .................................................................................................. . ·························· 33
.Books ................... '' ).)
.Journals
.International instruments ..................................................................................................................... 35
.Table of Cases......................................................................................................... . ....................... 3)
.Internet............................................................................................................... . ...................... :\