ABSTRACT
This research was carried out based on how to reduce fraud activities in mobile telecommunication companies. Focusing on subscribers use of internet and mobile telecommunications, which is the main concern of this research, telecommunication fraud occurs whenever a perpetrator uses deception to receive telephony services free of charge or at a reduced rate P. Barson, 2006. It is a worldwide problem with substantial annual revenue losses for many companies. Globally, telecommunications fraud is estimated at about 55 billion US dollars. Fraud causes substantial losses to telecommunication carriers. Some target the telecom companies such as MTN, GLO, AIRTEL, ETISALAT, MULTILINKS, STARCOMMS and VISAFONE to defraud them in terms of free browsing, free international calls and free text messaging. While others target credit card companies to hack into their customers database and steal vital information that could make them buy goods/services through the credit cards. This study adopts the ex-post facto survey design. The research adopts the simple random sampling technique in selecting the participants in the study. Using results from well structured questionnaire, one hundred respondents ( postgraduates) in Lagos State University, Ojo, Lagos State. Data collection was done by both primary and secondary sources and the data was analyzed using chi square. The result from the analysis reviewed that Data processing will enhance national security. Patterns of call by subscribers should be monitored to enhance mobile theft detection. Data processing can help track Theft of Telecom Services. Mobile Phone Spammers work in unsupervised networks i.e. online SMS websites. Applicable areas are telecommunication companies, it enables them to monitor the activities of each and every of their subscribers, and also it’s applicable and can also be used by credit card companies.
CHAPTER ONE
INTRODUCTION
1.1 Background to the Study
Data mining has become one of the key features of many security initiatives developed by the Nigerian government to monitor both mobile and internet activities in the country. Scholars have noted that data mining is used as a means for detecting fraud, assessing risk, and product retailing. Data mining involves the use of data analysis tools to discover previously unknown valid patterns and relationships in large data sets (Barreto, 2015, Collins, 2012 and Hoath, 2013). In the context of national security, data mining can be a potential means to identify terrorist activities, fraudulent activities such as money transfers and communications, and to identify and track group’s activities, such as traveling and immigration records. In Nigeria, many terrorist networks have sprouted in many parts of the country, Movement for the Emancipation of the Niger Delta (MEND), Boko Haram and Movement for the Actualization of the Sovereign State of Biafra (MASSOB) to mention just but a few, have been unleashing terror to the Nigerian public. The government is extremely concerned with curtailing the activities of these extremist as well as other crime perpetrators ranging from mobile phone theft, cult activities, drug trafficking, gang related offences, fraud, kidnapping for ransom, organized crime and others.
Focusing on subscribers’ use of internet and mobile telecommunications, which is the main concern of this research, telecommunication fraud occurs whenever a perpetrator uses deception to receive telephony services free of charge or at a reduced rate (Barson, et al., 20...Order to view complete work.
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2016, 06). Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection.. ProjectStoc.com. Retrieved 06, 2016, from https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957
"Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection." ProjectStoc.com. 06 2016. 2016. 06 2016 <https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957>.
"Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection.." ProjectStoc.com. ProjectStoc.com, 06 2016. Web. 06 2016. <https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957>.
"Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection.." ProjectStoc.com. 06, 2016. Accessed 06, 2016. https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957.
- Related Works
- Design And Implementation Of A Computersized National Identity Card Processing System (a Case Study Of National Identity Card, Anaoch Local Governemnt Area Anambra State.)
- Role Of Computer In The Banking Sector
- Understanding The File Allocation Table [fat] In Windows
- Design And Implementation Of A Computerized Bill Of Quantity System For Quantity Surveyors (a Case Study Of Okolo, Okolo & Co. Enugu)
- Design And Implementation Of Online Job Consultancy Services (case Study Of Careers Nigeria)
- Electronic Payment System Security
- Design And Implementation Of Computerized Puyo Game
- Efficient Fault-tolerant Distributed Allocation Algorithm For Cellular Network
- Design And Implementation Of A Computerised Stadium Management Information System (case Study Of Nnamdi Azikiwe Stadium Enugu)
- Design And Implementation Of Computerized Medical Duties Scheduling System. (a Case Study Of University Of Nigeria Teaching Hospital)