ABSTRACT
This research was carried out based on how to reduce fraud activities in mobile telecommunication companies. Focusing on subscribers use of internet and mobile telecommunications, which is the main concern of this research, telecommunication fraud occurs whenever a perpetrator uses deception to receive telephony services free of charge or at a reduced rate P. Barson, 2006. It is a worldwide problem with substantial annual revenue losses for many companies. Globally, telecommunications fraud is estimated at about 55 billion US dollars. Fraud causes substantial losses to telecommunication carriers. Some target the telecom companies such as MTN, GLO, AIRTEL, ETISALAT, MULTILINKS, STARCOMMS and VISAFONE to defraud them in terms of free browsing, free international calls and free text messaging. While others target credit card companies to hack into their customers database and steal vital information that could make them buy goods/services through the credit cards. This study adopts the ex-post facto survey design. The research adopts the simple random sampling technique in selecting the participants in the study. Using results from well structured questionnaire, one hundred respondents ( postgraduates) in Lagos State University, Ojo, Lagos State. Data collection was done by both primary and secondary sources and the data was analyzed using chi square. The result from the analysis reviewed that Data processing will enhance national security. Patterns of call by subscribers should be monitored to enhance mobile theft detection. Data processing can help track Theft of Telecom Services. Mobile Phone Spammers work in unsupervised networks i.e. online SMS websites. Applicable areas are telecommunication companies, it enables them to monitor the activities of each and every of their subscribers, and also it’s applicable and can also be used by credit card companies.
CHAPTER ONE
INTRODUCTION
1.1 Background to the Study
Data mining has become one of the key features of many security initiatives developed by the Nigerian government to monitor both mobile and internet activities in the country. Scholars have noted that data mining is used as a means for detecting fraud, assessing risk, and product retailing. Data mining involves the use of data analysis tools to discover previously unknown valid patterns and relationships in large data sets (Barreto, 2015, Collins, 2012 and Hoath, 2013). In the context of national security, data mining can be a potential means to identify terrorist activities, fraudulent activities such as money transfers and communications, and to identify and track group’s activities, such as traveling and immigration records. In Nigeria, many terrorist networks have sprouted in many parts of the country, Movement for the Emancipation of the Niger Delta (MEND), Boko Haram and Movement for the Actualization of the Sovereign State of Biafra (MASSOB) to mention just but a few, have been unleashing terror to the Nigerian public. The government is extremely concerned with curtailing the activities of these extremist as well as other crime perpetrators ranging from mobile phone theft, cult activities, drug trafficking, gang related offences, fraud, kidnapping for ransom, organized crime and others.
Focusing on subscribers’ use of internet and mobile telecommunications, which is the main concern of this research, telecommunication fraud occurs whenever a perpetrator uses deception to receive telephony services free of charge or at a reduced rate (Barson, et al., 20...Order to view complete work.
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2016, 06). Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection.. ProjectStoc.com. Retrieved 06, 2016, from https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957
"Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection." ProjectStoc.com. 06 2016. 2016. 06 2016 <https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957>.
"Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection.." ProjectStoc.com. ProjectStoc.com, 06 2016. Web. 06 2016. <https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957>.
"Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection.." ProjectStoc.com. 06, 2016. Accessed 06, 2016. https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957.
- Related Works
- Design And Implementation Of Principles And Operation Of Sensor Based Intrusion Detection System (case Study Of Dhl Enugu)
- Using Trigonometry And Pythagoras To Watermark An Image
- Design Of Student Identity Card System
- Design And Implementation Of A Web Based Voting Registration System. (a Case Study Of Inec Enugu)
- Design And Implementation Of A Computerized System For Immigration Service (a Case Study Of Federal Government Secretariat Enugu)
- Design And Implementation Of On Line Cash Receipt Generating System For A Supermarket. (case Study Of Roban Stores Ltd)
- Distributed Collaborative Key Agreement And Authentication Protocol For Dynamic Peer Group
- Design And Implementation Of Computerized Pension Scheme Management System (a Case Study Of Nigeria Pension Board Enugu)
- Wireless Traffic Viewer Using J2me
- Design And Implementation Of Tcp/ip Chat Client Server Option And Challenges