Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection

ProjectStoc - 59 pages 11159 words 879 views Project Diploma/Degree/Masters Level Computer Science ₦3500 Naira ($9.21 USD)

This is a Premium work, paid access only

Register/Login to Access Full Work

ABSTRACT

 

This research was carried out based on how to reduce fraud activities in mobile telecommunication companies. Focusing on subscribers use of internet and mobile telecommunications, which is the main concern of this research, telecommunication fraud occurs whenever a perpetrator uses deception to receive telephony services free of charge or at a reduced rate P. Barson, 2006. It is a worldwide problem with substantial annual revenue losses for many companies. Globally, telecommunications fraud is estimated at about 55 billion US dollars. Fraud causes substantial losses to telecommunication carriers. Some target the telecom companies such as MTN, GLO, AIRTEL, ETISALAT, MULTILINKS, STARCOMMS and VISAFONE to defraud them in terms of free browsing, free international calls and free text messaging. While others target credit card companies to hack into their customers database and steal vital information that could make them buy goods/services through the credit cards. This study adopts the ex-post facto survey design. The research adopts the simple random sampling technique in selecting the participants in the study. Using results from well structured questionnaire, one hundred respondents ( postgraduates) in Lagos State University, Ojo, Lagos State.  Data collection was done by both primary and secondary sources and the data was analyzed using chi square. The result from the analysis reviewed that Data processing will enhance national security. Patterns of call by subscribers should be monitored to enhance mobile theft detection. Data processing can help track Theft of Telecom Services. Mobile Phone Spammers work in unsupervised networks i.e. online SMS websites. Applicable areas are telecommunication companies, it enables them to monitor the activities of each and every of their subscribers, and also it’s applicable and can also be used by credit card companies.

                       

CHAPTER ONE
INTRODUCTION
1.1             Background to the Study
Data mining has become one of the key features of many security initiatives developed by the Nigerian government to monitor both mobile and internet activities in the country. Scholars have noted that data mining is used as a means for detecting fraud, assessing risk, and product retailing.  Data mining involves the use of data analysis tools to discover previously unknown valid patterns and relationships in large data sets (Barreto, 2015, Collins, 2012 and  Hoath, 2013). In the context of national security, data mining can be a potential means to identify terrorist activities, fraudulent activities such as money transfers and communications, and to identify and track group’s activities, such as traveling and immigration records. In Nigeria, many terrorist networks have sprouted in many parts of the country, Movement for the Emancipation of the Niger Delta (MEND), Boko Haram and Movement for the Actualization of the Sovereign State of Biafra (MASSOB) to mention just but a few, have been unleashing terror to the Nigerian public. The government is extremely concerned with curtailing the activities of these extremist as well as other crime perpetrators ranging from mobile phone theft, cult activities, drug trafficking, gang related offences, fraud,  kidnapping for ransom, organized crime and others.
Focusing on subscribers’ use of internet and mobile telecommunications, which is the main concern of this research, telecommunication fraud occurs whenever a perpetrator uses deception to receive telephony services free of charge or at a reduced rate (Barson, et al., 20...Order to view complete work.
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes

CITE THIS WORK

(2016, 06). Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection.. ProjectStoc.com. Retrieved 06, 2016, from https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957
"Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection." ProjectStoc.com. 06 2016. 2016. 06 2016 <https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957>.
"Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection.." ProjectStoc.com. ProjectStoc.com, 06 2016. Web. 06 2016. <https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957>.
"Internet Security In Nigeria: An Analysis Of Data Mining Technique In Fraud Detection.." ProjectStoc.com. 06, 2016. Accessed 06, 2016. https://projectstoc.com/read/7749/internet-security-in-nigeria-an-analysis-of-data-mining-technique-in-fraud-detection-9957.

Connect with Us