Libraries at University of Nebraska-Lincoln

 

Date of this Version

2018

Citation

Abdulai, A. (2016). Impact of internet crime on development. Journal of Financial Crime, 15(4), 432 – 444.

Abugri, S. (2011). Ghana: Internet criminals cashing in on e-waste. New African.

Amedahe, K., & Gyimah, E. (2003). Introduction to Educational Research. (CCUCC) 149 – 150.

Asokhia, M. (2010). Enhancing national development and growth through combating cybercrime internet fraud: A comparative approach. Journal of Social Science, 23: 13-19.

Bakhoum, H. B., Funmi, D. L., & Makinde, J. (2014). Cybercrime in Nigeria: Causes, effects and the way out. E-journal of science.

Burrel, B. M. (2008). Internet safety gone wild? Sacrificing the educational and psychosocial benefits of online social environments, Journal of Adolescent Research, 22(6), 34 – 42.

Chawki, M. (2005). A critical look at the regulation of cybercrime. ICFAI Journal Cyber law, 3: 1-55.

Clark, R., & Knake, R. (2010). Cyber war, the next threat to national security and what to do about it. New York: Harper Collins Publishers.

Colfer, E. (2007). Online privacy and people's awareness: A study of Irish students. MSc Thesis, Worldford Institute of Technology, Ireland.

Curtis, P. A., & Colwell, L. (2000). Cybercrime: The next challenge: An overview of the challenges faced by law enforcement while investigating computer crimes in the year 2000 and beyond. School of Law.

Doyon-Martin, J. (2015). Cybercrime in West Africa as a result of trans boundary e-waste, Journal of Applied Security Research, 10(2), 2017 – 220.

Eichorn, P. R. (2010). Attitude change, In A. Tesser (Ed.), Advance Social Psychology, New York: Mc Graw-Hill.

Galbreath, P. J. (2000). Top five computer crime and how to protect yourself from them. Publication of Justin Plot.

Guillaume, L. F., & Fortinet, F. (2009). Fighting cybercrime: Technical, Juridical and Ethical Challenges. Virus Bulletin Conference.

Kowalski, R. G. (2002). Content cybercrime: Criminality and censorship in Asia, Indian Journal of Criminology, 34(2), 11 – 30.

Krejcie, R. V., & Morgan, D. W. (1970). Determining sample size for research activities. Educational and Psychological Measurement, 30, 607–610.

Kwablah, E. (2009, February 17). Cybercrime: Giving a bad name to Ghana. Ghana Business News.

Levin, A. M., Foster, B., West, M. J., Nicholson, T., & Hermandez, T. (2008). The next digital divide: Online social network privacy. Privacy and Cybercrime Institute, Ryerson University, Canada.

Longe, O., Ngwa, O., Wada, F., Mbarika, V., & Kvasny, L. (2010). Criminal use of Information and Communication Technologies in Sub-Saharan Africa: Trends, Concerns and Perspectives. Journal of Information Technology Impact, 9(3), 155-165.

Magele, T. (2005). E-security in South Africa, White Paper prepared for the ForgeAhead e-Security event. Retrieved March 22, 2017.

McGuire, M. J., & Dowling, S. (2013). Safety in cyberspace: Adolescents safety and exposure online. Youth and Society, 38(2), 135 – 144.

Mensch, S., & Wilkie, L. (2011). Information security activities of college students: An exploratory study. Academy of Information Management Science Journal, 14: 91-116.

Mesko, J. J., & Bernik, T. (2011). Cyber security seizes more attention, budget dollars. American Forces Press Service, 2(3), 23.

Merton, R. (1968). Social theory and social structure. USA: Free Press.

Olugbodi, K. (2010). Fighting cybercrime in Nigeria. Retrieved September 10, 2017 from http//www.guide2nigeria,com/news_articles_About_Nigeria.

Pinguelo, D. L., & Muller, R. A. (2011). When to use focus groups and why in Morgan D. L. (Ed.), Successful Focus Groups, London: Sage.

Ribadu, E. (2007). Cybercrime and commercial fraud: Nigerian perspective: A paper presented at the Modern Law for Global Commerce, Vienna, Italy, 9th – 12th July.

Titi, K. M. (2003). Code of ethics, professionalism and responsibilities. Al-Ahliyyah Amman University, Ardhah, Jordan.

Warner, J. (2011). Understanding Cyber-Crime in Ghana: A View from Below. International Journal of Cybercrime, 5(1): 736–749.

Yeboah, N. O. (2015). An investigation of youth in cybercrime in Ayawaso East Constituency of Greater Accra. Unpublished thesis submitted to the University of Ghana, Legon, in partial fulfillment of the requirement for the award of Master of Arts Social Policy Studies Degree.

Abstract

Cybercrime, an offence that is committed against individuals through the internet has bedeviled the global online industry. Cybercrime is also criminal activity using internet facilities such as virus infections, identity theft and hacking. There is high risk of becoming a victim especially young internet user. All efforts to combat it have not worked much. The study examined the awareness of Senior High School students towards cybercrime in order to suggest policies to deal with this menace. The study underpinned by social strain theory. The study employed descriptive survey design. Simple sampling technique was used to select 200 students from Sunyani Senior High School. Questionnaire was used in eliciting responses. The study revealed that the major forms of cybercrime were hacking, credit card fraud, software piracy and cyber identity theft. Again, the study indicated that the major consequences involved in engaging in cybercrime are inimical to the progress and development of a country and tarnishing the country reputation. Gender had no significant influence on the knowledge of students towards cybercrime. We recommended that cybercrime court should be established in Ghana to speed up prosecution of cybercriminals and encourage more judges and lawyers to specialize in cyber law.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.