Professional Documents
Culture Documents
FRAUD AND
IT’S EFFECT ON
THE ECONOMY
(A CASE STUDY OF BANKING INSTITUTION IN NIGERIA)
1
BY
............................
COLLEGE OF ACCOUNTANCY AND COMPUTER TECHNOLOGY
(AKP/WRR/ASC/CSC/ND2007/0008)
COMPUTER SCIENCE.
NOVEMBER 2009
2
APPROVAL
Date
Project Supervisor
3
DEDICATION
education.
4
ACKNOWLEDGMENT
ones for their prayers, moral and financial support through this
program.
of the write up, may God reward every effort of kindness and
6
ABSTRACT
scams that have been conducted by mail and phone can now be
found on the World Wide Web and in email, and new cyberscams are
reputable online sellers and criminals who use the Internet to rob
people.
7 CHAPTER ONE
INTRODUCTION
The Internet has become a useful instrument that has fostered the process of
It’s actually a fact rather than a farce as its relevance cannot be over
and the world at large. It has impacts on various aspects of human endeavour
The role of Internet in the global market place is a sure-free medium, which has
given businesses, unbridled accesses. There is no longer the need to get visa
8
(1) Instant access to information
If there is one industry that has the stigma of being old and boring, it would
The Internet offers a global marketplace for consumers and businesses, but
crooks also recognize the potentials of cyberspace. The same scams that have
been conducted by mail and phone can now be found on the World Wide Web
and in email, and new cyberscams are emerging. It's sometimes hard to tell the
difference between reputable online sellers and criminals who use the Internet
to rob people. You can protect yourself by learning how to recognize the danger
signs of fraud.
To fight this growing threat, the National Consumers League founded the
Canada can easily call NFIC before sending their money. From our research
findings, the centre handles on average of 350 calls a day at the NFIC phone
center. Of these, approximately 35% are consumers who have already lost
money to scam artists, but there is always a way out to help them. The
taking a full report of what happened, including all the information a law
enforcement agency would need. This report is entered into the computer
system and shared with the Federal Trade Commission. It is also faxed out on a
real time basis to any of more than 160 law enforcement agencies whose
interests match the report. NFIC works closely with authorities in both the US
and Canada to ensure that all cases of fraud reported to it are referred to the
appropriate agents.
10
5. To determine ways of reducing risks from online investment
internet fraud.
7. To find out what are the possible and specific online fraud.
or more online services - such as chat rooms, e-mail, message boards, or Web
internet investment scam, credit card scheme and money transfer fraud.
The significance of the study are many, but the following points are worthy of
mentioning.
fraud available.
c. the findings of the research will serve as decision variables or input for
11
d. the policy makers and professionals in the relevant fields will find the
e. the study will create more awareness in the minds of its readers, about the
A research work of this nature cannot come to an end without limitation. The
of the work. These problems include, difficulty in procuring materials for the
There was a lot of constraints as to getting information and materials for the
job. The researcher made series of consultations and visit to most renowned
institutions to acquire the needed information. Most materials used were very
12
1.5.2 TIME CONSTRIANTS
issue, as it has to do with time. Actually, a lot of time was wasted as the
The researcher would have obtained more information than what is obtainable
here but due to lack of money to visit some of the firms and government
1.6.0 HYPOTHESIS
In this research project, two hypotheses are to be tested as follows; that the
The salient objectives of the research were the following among others:
13
a. to carry out an investigation on internet fraud and find out the possible
c. to really find out the various online fraud facing innocent traders and
1. Introduction
14
CHAPTER TWO
LITERATURE REVIEW
The term "Internet fraud" generally refers to any type of fraud scheme that
uses one or more online services - such as chat rooms, e-mail, message boards,
Internet fraud is combated in several ways. The police agency worldwide have
people assigned to combat this type of fraud; according to figures from the
FBI, U.S. companies' losses due to Internet fraud in 2003 surpassed US$500
million. In some cases, fictitious merchants advertise goods for very low prices
criminals using stolen credit card information to buy goods and services.
Europe, the U.S, and some Asia Pacific countries like Singapore and Australia
15
2.1.2 Geographic sources
services report higher than normal levels of fraudulent activity from countries
with low reported levels of internet fraud include Austria, New Zealand,
Taiwan, Norway, Spain, Japan, Switzerland, South Africa, Hong Kong, the
Fraudsters seem to prefer small and valuable products, such as: watches,
jewelry, laptops, ink cartridges, digital cameras, and camcorders. These items
are usually commodities that are easily sellable and have a broad range of
range of products from cellular phones to desktop computers. The craft has
product is sent in place of the actual product. Other times, products are outright
never sent after the bill is charged to credit card accounts. Victims are left to
16
Some Fraudsters market intangibles such as software downloads or
perceived by the consumer as low risk (in accordance with low cost.) Software
designed to defraud consumers and investors. In the past, many of these fraud
economy available through the Internet has provided a new forum for these and
other scams. While there are new schemes appearing on the Internet, there are a
number of common ones you may come in contact with. These include:
One of the most common Internet fraud schemes involves online auction sites,
or Web sites that sell items as retail vendors. In this scam, items are offered for
other expensive goods. The victim purchases the item, but doesn't receive what
17
2.2.2 Credit Card Fraud
The most common method of credit card fraud on the Internet is obtaining
another person's credit card number, and then making online transactions with
it. With this scheme, the credit card is used to purchase items from other Web
sites, over the telephone, or other methods that don't require the physical card to
make a purchase. The victim may provide the information initially purchasing
something from the criminal, entering information into a form on a Web site, or
any number of other methods. The criminal may max out the credit card, but
this isn't always the case. Small purchases may be made, so that there is a good
chance it may be overlooked by the victim when he or she reads the monthly
credit statement.
legitimate e-commerce site or auction seller. The criminal sells an item online
at a price that's lower than normal, and offers that no payment is necessary until
after the item is delivered. When a victim purchases an item, the scam goes into
action. The criminal use's the victim's real name with another person's
unlawfully obtained credit card number to buy that product from another e-
commerce site, and has it shipped to the victim. Once the victim receives the
item, he or she then authorizes the credit purchase to be completed, and the
delivered the item has been bilked out of the product and the money for it. All
they have is the name of the person it was delivered to, and another person's
unlawfully obtained credit card number. The person who purchased the item
from the criminal believes the items paid for, but their name is now attached to
a fraudulent transaction made with the legitimate e-commerce site. While this
is being sorted out, the criminal has the money and may be victimizing other
Offers of quick, uncontested divorces have been offered over the Internet,
which allow married couples to get divorces for a relatively inexpensive fee.
People are offered a divorce through a foreign country (such as the Dominican
Unfortunately, these divorces may be invalid. The victims find that they are not
divorced, and may not have even dealt with an actual legal service.
University degrees and college diplomas have been offered for a few hundred
dollars on the Internet. These offers claim that people will receive a valid
However, these diplomas and degrees aren't authentic, and don't qualify as
19
actual proof of education. People who actually receive the fake diploma or
In this scheme, the goal isn't to initially trick the victim, but to obtain
information about the person for future scams. Personal information (such as
obtained about the victim through a variety of methods. The victim may enter
the information into a form on a Web site, purchase something online and
methods. In some cases, information about victims was stolen from the
for fraudulent purposes. Using the victim's personal or credit information, the
criminal can then apply for credit cards, loans, or purchase items under the
victim's name. The victim may not become aware of this scam until months
later when the cards are "maxed out" and payments have been stopped.
This fraud involves issuing faxes or e-mails to random businesses. These faxes
20
or emails claim to be from an official representing a foreign government or
agency. This scheme promises the transfer of millions of dollars into the
The business community is usually targeted by this fraud. The faxes or e-mails
do not target a single company, but rather are sent out en masse. The business
Although the offer appears transparent, the criminal will eventually reach
someone who, while skeptical, desperately wants the deal to be genuine. It sets
the stage for the rest of the scam. After responding to it, the criminal begins
convincing the victim to invest money for expenses, so that the millions of
dollars can be obtained. The excuses for needing the money include legal fees,
customs fees, bribes, and/or other costs that will "free up" the money. This
working at home. In this scam, the victim is offered the chance to make
making opportunity. The victim pays to acquire a start-up package, but never
receives the materials or information for the business to run properly. In other
21
cases, the person does receive the start-up package, but there is no possible way
Most Internet fraud is done through the use of stolen credit card information
which is obtained in many ways, the simplest being copying information from
retailers, either online or offline. There have been many cases of crackers
There have been cases of employees of companies that deal with millions of
customers in which they were selling the credit card information to criminals.
Despite the claims of the credit card industry and various merchants, using
credit cards for online purchases can be insecure and carry a certain risk. Even
so called "secure transactions" are not fully secure, since the information needs
to be decrypted to plain text in order to process it. This is one of the points
Some fraudsters approach merchants asking them for large quotes. After they
quickly accept the merchant's quote, they ask for wire transfer information to
22
send payment. Immediately, they use online check issuing systems as Qchex
that require nothing but a working email, to produce checks that they use to
Direct solicitations
According to the postal inspectors, there has been a significant surge in the use
of Counterfeit Postal Money Orders since October 2004. More than 3,700
from October to December of 2004, and according to the USPS, the "quality"
23
1. A fraudster posts a vehicle for sale on an online site, generally for luxury or
sports cars advertised for thousands less than market value. The details of the
vehicle, including photos and description, are typically lifted from sites such as
bargain, emails the seller, who responds saying the car is still available but is
located overseas. He then instructs the buyer to send a deposit via wire transfer
to initiate the "shipping" process. The unwitting buyer wires the funds, and
doesn't discover until days or weeks later that they were scammed.
2. A fraudster feigns interest in an actual vehicle for sale have taken place on
the Internet. The "buyer" explains that a client of his is interested in the car, but
due to an earlier sale that fell through has a certified check for thousands more
than the asking price and requests the seller to send the balance via wire
transfer. If the seller agrees to the transaction, the buyer sends the certified
check via express courier (typically from Nigeria), the seller takes the check to
their bank, which makes the funds available immediately. Thinking the bank
has cleared the check, the seller follows through on the transaction by wiring
the balance to the buyer. Days later, the check bounces and the seller realizes
they have been scammed. But the money has long since been picked up and is
not recoverable.
24
record of the vehicle. However, the supposed buyer actually uses the VIN to
In some cases, fraudsters approach merchants and ask for large orders:
N50,000 to N200,000, and agree to pay via wire transfer in advance. After brief
bank wire transfer. The buyer then offers to send a cheque, stating that the
merchant can wait for the cheque to clear before shipping any goods. The
company. If asked, the buyer will claim that the cheque is money owed from the
large company. The merchant deposits the cheque and it clears, so the goods are
sent. Only later, when the larger company notices the cheque, will the
Re-shippers
countries with weak legal systems. The goods are generally paid for with stolen
25
Nigerian version
In the Nigerian version, the fraudsters have armies of people actively recruiting
single women from western countries through chat & matchmaking sites. At
some point, the criminal promises to marry the lady and come to their home
country in the near future. Using some excuse the criminal asks permission of
his "future wife" to ship some goods he is going to buy before he comes. As
soon as the woman accepts the fraudster uses several credit cards to buy at
different Internet sites simultaneously. In many cases the correct billing address
of the cardholder is used, but the shipping address is the home of the
unsuspecting "future wife". Around the time when the packages arrive, the
criminal invents an excuse for not coming and tells his "bride" that he urgently
needs to pick up most or all the packages. Since the woman has not spent any
money, she sees nothing wrong and agrees. Soon after, she receives a package
delivery company package with pre-printed labels that she has agreed to apply
to the boxes that she already has at home. The next day, all boxes are picked up
by the package delivery company and shipped to the criminal's real address (in
Nigeria or elsewhere). After that day, the unsuspecting victim stops receiving
make matters worse, in most cases, the criminals are able to create accounts
with the package deliverer, based on the woman's name and address. So, a week
or two later, the woman receives a huge freight bill from the shipping company
26
which she is supposed to pay because the goods were shipped from her home.
Unwittingly, the woman became the criminal re-shipper and helped him with
pay anywhere from $35 to several hundred of dollars or more, but fail to deliver
Often, after paying a registration fee, the applicant will be sent advice on how to
place ads similar to the one that recruited him in order to recruit others, which is
Other types of work at home scams include home assembly kits. The applicant
pays a fee for the kit, but after assembling and returning the item, it’s rejected as
substandard, meaning the applicant is out of pocket for the materials. Similar
scams include home-working directories, medical billing, data entry (data entry
27
Money Transfer Fraud
Dating scams
Online dating scams and fraud are almost as old as Internet dating itself. Often
called a Sweetheart Swindle this is often a long, drawn out process in which the
con artist develops a relationship, and eventually convinces the victim to send
money. The scammer often meets the victim in chat rooms or via online dating
sites. Their object is not to get into their hearts, but get into their wallets. They
will try to earn someone’s affections and trust so that they can persuade him/her
to send money. The requests for money can either be a one time event or
repeated over an extended period of time. The details of the scammers’ stories
will vary with each case. The scenario commonly revolves around a tragedy
having befallen the scammer, and he/she desperately needs money. After
spending time communicating and building a relationship with the victim, the
scammer will ask for help in the form of money. Most online dating services
have a hard time dealing with scammers, outside of issuing warnings to their
users to be alert for anyone you've never met asking for money.
28
Click fraud
The latest scam to hit the headlines is the multi-million dollar Clickfraud which
occurs when advertising network affiliates force paid views or clicks to ads on
their own websites via spyware, the affiliate is then paid a commission on the
Google's Adsense capability pay high commissions that drive the generation of
bogus clicks. With paid clicks costing as much as US$100 and an online
advertising industry worth more than US$10 billion, this form of Internet fraud
is on the increase.
dial a local connection number. Some web sites, normally containing adult
content, use international dialing to trick consumers into paying to view content
on their web site. Often these sites purport to be free and advertise that no credit
card is needed. They then prompt the user to download a "viewer" or "dialer" to
allow them to view the content. Once the program is downloaded it disconnects
the computer from the Internet and proceeds to dial an international long
29
Internet Mass Marketing Fraud
merchants are the criminals. Many of these types of scams involve marketing
marketing campaign into giving their credit card information in exchange for
what they believe to be the product. The "product" is usually a scam. The
prospective client with detailed graphs and charts that indicate that his web site
receives (x) thousands of hits per month, emphasizing that if you pay for his
clients.
When you receive no request for more information and no clients, the fraudster
responds that it must be something your web site is not doing right.
Phishing
person or business with a real need for such information in a seemingly official
30
electronic notification or message (most often an email, or an instant message).
The term was coined in the mid 1990s by crackers attempting to steal AOL
accounts. An attacker would pose as an AOL staff member and send an instant
message to a potential victim. The message would ask the victim to reveal his or
information". Once the victim gave over the password, the attacker could access
the victim's account and use it for criminal purposes, such as spamming.
Email Spoofing
The sender information shown in e-mails (the "From" field) can be spoofed
easily, though nowadays many domains have the Sender Policy Framework
commonly used by Spammers to hide the origin of their e-mails and leads to
Pharming
allows a hacker to acquire the domain name for a site, and to redirect that
website's traffic to another web site. DNS servers are the machines responsible
31
for resolving internet names into their real addresses - the "signposts" of the
internet.
Fraudsters launch auctions on eBay or TradeMe with very low prices and no
reservations especially for high priced items like watches, computers or high
value collectibles. They received payment but never deliver, or deliver an item
that is less valuable than the one offered, such as counterfeit, refurbished or
legitimate, but they never deliver the goods. An example of such a fraudulent
order. In some cases, some stores or auctioneers are legitimate but eventually
These are also called investment schemes online. Criminals use these to try to
manipulate securities prices on the market, for their personal profit. According
32
Pump-and-dump schemes
internet boards and via email (spamming), with the purpose of causing a
dramatic price increase in thinly traded stocks or stocks of shell companies (the
"pump"). As soon as the price reaches a certain level, criminals immediately sell
off their holdings of those stocks (the "dump"), realizing substantial profits
before the stock price falls back to its usual low level. Any buyers of the stock
who are unaware of the fraud become victims once the price falls. When they
realize the fraud, it is too late to sell. They lost a high percentage of their
money. Even if the stock value does increase, the stocks may be hard to sell
because of lack of interested buyers, leaving the shareholder with the shares for
internet boards and via email (spamming), but this time with the purpose of
causing dramatic price decreases in a specific company's stock. Once the stock
reaches a certain low level, criminals buy the stock or options on the stock, and
then reverse the false information or just wait for it to wear off with time or to
33
be disproved by the company or the media. Once the stock goes back to its
Beware of "Too Good To Be True" Deals - Remember the old saying If it's
too good to be true, it probably is! Think about why they're making the offer if
it's that good a deal. After all, if there were millions of dollars to be gained,
why wouldn't the person making the offer invest in getting the millions his or
business, why is this person sending email to you about it. Shouldn't they be
working on the business they're pitching and making all that money? By
questioning the offer and the motives behind the offer, you will be better able to
legitimate company or individual. This may not be the case however. Software
packages are available to setup e-commerce sites, and Web page designers can
34
Be wary of individuals who hide their identities - One of the attractions of the
Internet is that it allows anonymity to people, but you should beware of people
who refuse to disclose who they really are. Email addresses that don't provide
hide their true identity. For example, a person may have an email address like
give contact names and addresses, but only provides the name of the Web site.
Avoid "Advance Fee" demands - Don't pay for an item or service before you
receive it. Many companies will bill you for an item or service after its been
chance that you will pay for something you didn't want, and avoid not receiving
anything at all.
on the Internet before transacting business with them, and look into offers that
frauds are publicized on Web sites, and allow you to see whether an offer may
seller, and may also provide fraud protection (so that if you don't receive what
you want, all or a portion of your money will be returned). You can also use
35
services like the Better Business Bureau at www.bbb.org to look up information
on various businesses.
In the past two decades, the Internet has become the ultimate component of a
worldwide strong. In the United States particularly, the Internet has been
incorporated into various arenas such as education, health care, and business. As
a result, more jobs have been created, international trade has increased,
gross national product has grown, larger corporations have developed, goods are
All of these things affect the economy in that people receive education in order
to attain employment (that provides goods and services for people), and allows
economic expansion. Furthermore, the market can become stronger through the
World Wide Web. The Internet plays an important role in creating businesses
that propel the economy. As a result, it is important to create laws for Internet
36
I. The Internet and its Effect on the Economy and Government
b. Incorrect Addresses
d. Title I Loophole
The Internet has become more accessible to all people, regardless of their age,
including malls, libraries, and banks. Computer companies have made the
information and market their business. "In product design, companies can share
38
The Internet allows businesses to import and export with foreign countries.
There are new types of software that automatically arrange data to be published
on the Web. Companies can advertise their goods or services much quicker
than they could when using tangible documents. Other files from the Internet
serve a variety of purposes, such as, "hosting online meetings, accessing design
information from the worldwide design community, and dragging content from
The Internet takes the place of unnecessary labor. Previously, companies would
now save more money and spend more time planning marketing strategies.
The Internet helped 650,000 people attain jobs in 1999. In order to increase
Businesses that have knowledge about the Internet attract more clients. If the
company has more people consuming its product (with the use of the Internet)
Trivnet, which promotes Internet access, also uses the Internet to increase their
company's production.
The Internet has been incorporated throughout the world. As a result of having
access to the World Wide Web, many companies -- specifically those with high
rates of poverty -- now have the opportunity to use the Net and possibly create
Zenith Bank Plc is one of the biggest and most profitable banks in Nigeria. The
bank was established in May 1990 and started operations in July same year as a
40
commercial bank. It became a public limited company on June 17, 2004 and
was listed on the Nigerian Stock Exchange on October 21, 2004 following a
highly successful Initial Public Offering (IPO). The bank presently has a
shareholder base of over one million, an indication of the strength of the Zenith
brand.
Its head office is located at 87, Ajose Adeogun Street, Victoria Island, Lagos,
Nigeria. With over four hundred (400) branches and business offices nationwide
Zenith Bank has presence in all the state capitals, the Federal Capital Territory
41
CHAPTER THREE
3.1 INTRODUCTION
study thus paving way for a meaningful and systematic approach to the
study. It is on this ground that this chapter had being devoted to the
42
In this chapter, the methodology employed in this study, were
chapter. The main objective of this study has been to examine internet
The study is empirical in nature and falls within the realms of macro
The use of historical data for the study, was informed by the need to
The source of the data collected and used in the course of this study were
The secondary data were gathered from a variety of sources such as text
In searching for the relevant and necessary data needed for the research
The population, in this study is the totality of the senior and junior staff of Zenith
Bank PLC. Warri. The sample size is 200 and this number of respondents were
chosen from the population. The rationale for studying a sample rather than the
2. Statistical Laws reveal that statistics composed from the sample data are
We should note that above is only possible if the probability sample size is large
enough.
Spiegel (1992) observes that sampling theory is a study of the relationship existing
between a population or universe and the samples drawn from it. The population in
this study is from the senior/ junior staff of the firm. In order to make conclusions of
sample may be got, is by the process of stratified random sampling. In this research
44
work, the technique of simple random sampling is used to select the sample of 100
respondents from each group of the personnel, making a total sample size of 200.
The list of all senior and junior staff of the firm is from the personnel department of
the company. The numbers were written on a piece of paper, put in a basket and the
papers were folded to cover the numbers and one of the pieces of paper was selected
at a time without replacing it and any name corresponding to the number becomes a
number of the sample. This method of sampling without replacement was done until
the sample of 100 respondents per group of personnel was arrived at.
Due to the macro nature of the problem under investigation. the use of the
where the data considered necessary for the purpose of this study, were
The researcher and three other field data collectors did the fieldwork. The field data
collectors were other classmates also offering the Part-time ND program, who have
also offered research methodology. They had no problem gaining entrance into the
office under consideration since one of them has a friend working in the same Zenith
Bank. They were to be trained by the researcher on how to greet the respondents and
The data presentation tools are simple bar charts, histograms, and pictorial tables. The
(c) Caption
(f) The head note or prefatory note or explanatory just before the title.
(g) Source note, which refers to the literally or scientific source of the table (Mills
CHAPTER FOUR
46
DATA PRESENTATION AND ANALYSIS
4.1 INTRODUCTION
In the previous chapter, the research methodology and design have been
handled. In this chapter the data presentation and analysis are to be done. The
histogram and one pie chart to make it amenable for further analysis. By
analysis is meant the act of noting relationship and aggregating the set of
variables with similar attributes and also breaking the unit of their components
In this research work, the research accepts the contention of Podsakoff and
Dalton (1995) that the factual information from the data can be used as a basis
for reasoning, calculation and discussion. Apart from the heading above, the
Data Presentation,
Percentage analysis
Cross-tabulated analysis
Hypothesis testing
TABLE 4.1
THE SUMMARY OF THE PERSONAL DATA
OF THE RESPONDENTS
47
1 SEX FREQUENCY
Male 150
Female 50
Total 200
Angles
2 Marital Status subtended
Married 130 in degree
Single 70
Total 200
3 AGE
21-30 years 90
31-40 years 90
41-50 years 10
51-60 years 10
Total 200
4 HIGHER
EDUCATIONAL
QUALIFICATION
DIPLOMA 10 18
OND 30 54
HND 80 144
FIRST DEGREE 20 36
SECOND DEGREE 40 72
NIM 20 36
TOTAL 200 360
The marital statuses of the 200 respondents: It is found that 130 of them
are married while 70 are single. For the ages of the 200 respondents, there
are 21-30 years, 31-40 years, 40-50 years, 51-60 years with frequency of
there are diploma, OND, HND, First Degree, Second Degree, NIM. and
Figure 4.1 below shows the simple bar chart of the data on the sex of the respondents.
FIGURE 4.1: THE SIMPLE BAR CHART OF THE DATA ON THE SEX
OF THE RESPONDENTS
48
GENDER OF THE RESPONDENTS
160-
140-
120-
Frequency
100-
80
60 --
40 -
20
-
0 -
MALEGender FEMALE
Source: from data in table 1 (generated from SPSS) statistical package for social
science.
From figure 4.1 above, it is shown that male respondents have the modal
frequency of 150 out of the 200 respondents while the female respondents
49
Figure 4.2 below shows the simple bar chart of the data on the marital
FIGURE 4.2: THE SIMPLE BAR CHART OF THE DATA ON THE MARITAL
STATUSES OF THE RESPONDENTS
140 -
120 -
100 -
Frequency
80 -
60 -
40 -
20 -
0 -
MARRIED SINGLE
Marital status
From figure 4.2 above, it is shown that the married respondents have the
modal frequency of 130 out of the 200 respondents while the single
50
FIGURE 4.3: THE HISTOGRAM OF THE DATA ON THE AGES OF THE
RESPONDENTS.
51
SOURCE: From the data in Table 1.
From figure 4.3 above, it is shown that the age classes limit are 20.5-30.5
frequencies of 90, 90, 10, and 10 out of 200 respectively. This shows that
this is bi-modal distribution as the age classes of 20.5-30.5 years and 30.
Figure 4.4 below shows the pie chart of the data on the highest
OND DIPLOMA
FIRST DEGREE
180
540 OND
SECOND DEGREE 360
720
HND
0
144
FIRST DEGREE 36 0
52
TABLE 4. 5 EDUCATIONAL QUALIFICATION OF THE RESPONDENTS
Educational level Frequency Percentage Valid Percentage Cumulative
Percentage
DIPLOMA 10 5.0 5.0 5.0
From figure 4.4 above, the Educational Qualifications are Diploma, O.N.D, First
Degree, Second Degree and NIM and the subtended angles in degrees are equal to
180, 540, 1440, 360, 720 and 360 and respectively at the center of the circle.
Table bellow show the analysis of the statuses of the 200 respondents
53
TABLE 6. CROSS- TABULATION 1
TABLE 7. Cross-tabulation 2
OND 19 19
HND 14 30 47 91
FIRST
DEGREE 10 9 19
SECOND
DEGREE 40 40
Is it possible to combat
NIM internet fraud?
21 . 21
Total 104 40 47 9 200
investment scams. 104 respondents out of 200 said yes. While 40 did not
54
In attempting to arrive at decisions about the population, on the basis of
significance.
the statistics and the population parameters and what ever is observed as
analysis.
CHI-SQUARE TEST
The C is one of the simplest and most widely used non-parametric test in
theory and observation i.e, with the help of c test we can know whether a
chance or whether it results from the inadequacy of the theory to fit the
55
observed facts. If c is zero, it means that the observed and expected
frequencies completely coincide. The greater the value of c the greater the
c = ( O- E)2/E
Where,O=Observed frequency
For the data analysis and the interpretation, the researcher has adopted
frequency table, various types of charts and to find out the valid
percentage responses from the sample. This automated data analysis has
56
Chi-Square Test (2)
Residuals
The observed value of the dependent variable minus the value predicated
by the regression equation, for each case. Large absolute values for the
residuals indicate that the observed values are very different from the
predicted values.
57
the test statistics serve as criterion value, it affords the basis for rejecting
Reject the null hypothesis if the calculated value of the test statistic is
Accept the null hypothesis if the calculated value of the test statistic is
TEST STATISTICS
Is it possible for
Is it possible to individual to
combat internet avoid internet
Fraud? investment
scams?
Level of significance……….0.05
Critical value………………………43.0
Calculated value……………………73.880
58
From the above analysis, it could be seen that in the first test (is it
possible to combat internet fraud), the calculated value is greater than the
In the second test which state that is it possible for individual to avoid
value is 44 while the calculated value from the test statistics table is
94.120. Analysis the data above, it is very clear that the calculated value
CHAPTER FIVE
5.1 FINDINGS
Through this research, the researcher has been able to discover and
established the fact that: There are a number of fraud schemes that have
been developed over the years, and a number of these are appearing on
the Internet. These scams may appear on Web sites, or potential victims
the scam.
59
5.2 SUMMARY
Internet fraud includes the wide range of misdeeds from phony sales on
crimes in the United States. Each year about ten million people become
the victims of some form of identity fraud. Phone and utilities fraud, bank
fraud because of its long-term effect – for years it can prevent person
Talking about the protection from the Internet fraud, Justin Yurek,
services focus solely on ID monitoring but that is just half the story. As
Internet fraud and identity theft crime becomes more and more prevalent,
the need for a consumer advocate in this space has never been more
pressing.”
5.3 CONCLUSION
60
Over the years, there have been a number of scams that have evolved,
mail, or in person. The global economy available through the Internet has
61