Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection


  • Department: Computer Science
  • Project ID: CPU2232
  • Access Fee: ₦5,000
  • Pages: 59 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 466
Get this Project Materials
ABSTRACT

 

This research was carried out based on how to reduce fraud activities in mobile telecommunication companies. Focusing on subscribers use of internet and mobile telecommunications, which is the main concern of this research, telecommunication fraud occurs whenever a perpetrator uses deception to receive telephony services free of charge or at a reduced rate P. Barson, 2006. It is a worldwide problem with substantial annual revenue losses for many companies. Globally, telecommunications fraud is estimated at about 55 billion US dollars. Fraud causes substantial losses to telecommunication carriers. Some target the telecom companies such as MTN, GLO, AIRTEL, ETISALAT, MULTILINKS, STARCOMMS and VISAFONE to defraud them in terms of free browsing, free international calls and free text messaging. While others target credit card companies to hack into their customers database and steal vital information that could make them buy goods/services through the credit cards. This study adopts the ex-post facto survey design. The research adopts the simple random sampling technique in selecting the participants in the study. Using results from well structured questionnaire, one hundred respondents ( postgraduates) in Lagos State University, Ojo, Lagos State.  Data collection was done by both primary and secondary sources and the data was analyzed using chi square. The result from the analysis reviewed that Data processing will enhance national security. Patterns of call by subscribers should be monitored to enhance mobile theft detection. Data processing can help track Theft of Telecom Services. Mobile Phone Spammers work in unsupervised networks i.e. online SMS websites. Applicable areas are telecommunication companies, it enables them to monitor the activities of each and every of their subscribers, and also it’s applicable and can also be used by credit card companies.

                       

CHAPTER ONE
INTRODUCTION
1.1             Background to the Study
Data mining has become one of the key features of many security initiatives developed by the Nigerian government to monitor both mobile and internet activities in the country. Scholars have noted that data mining is used as a means for detecting fraud, assessing risk, and product retailing.  Data mining involves the use of data analysis tools to discover previously unknown valid patterns and relationships in large data sets (Barreto, 2015, Collins, 2012 and  Hoath, 2013). In the context of national security, data mining can be a potential means to identify terrorist activities, fraudulent activities such as money transfers and communications, and to identify and track group’s activities, such as traveling and immigration records. In Nigeria, many terrorist networks have sprouted in many parts of the country, Movement for the Emancipation of the Niger Delta (MEND), Boko Haram and Movement for the Actualization of the Sovereign State of Biafra (MASSOB) to mention just but a few, have been unleashing terror to the Nigerian public. The government is extremely concerned with curtailing the activities of these extremist as well as other crime perpetrators ranging from mobile phone theft, cult activities, drug trafficking, gang related offences, fraud,  kidnapping for ransom, organized crime and others.
Focusing on subscribers’ use of internet and mobile telecommunications, which is the main concern of this research, telecommunication fraud occurs whenever a perpetrator uses deception to receive telephony services free of charge or at a reduced rate (Barson, et al., 20...Order to view complete work.
  • Department: Computer Science
  • Project ID: CPU2232
  • Access Fee: ₦5,000
  • Pages: 59 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 466
Get this Project Materials
whatsappWhatsApp Us