ABSTRACT
This study was
conducted to investigate the different levels of Computer crime. Data was
collected using answers from research questions and well structured
questionnaires, as well as some written information that were relevant to this
study. Information Technology (IT) involves the application of modem techniques
in the creation, processing, storage and communication of information. This
technology very from the postal services of the 1840's down to the cellular
phones of the 1979, but what differs in all this technology is the speed at
which information can be collected, transformed, distributed and retrieved by
modem equipment. 4 Information Technology in industry has mcrease rapidly with
the introduction of digital electronics in telecommunication with advantage of
> large bandwidth compact equipments and faster communication network.
Making every area of administration and offices realizing that information can
be rated 4 resources after land, labour and capital which makes most offices
being automated with a network of computers, fax machines and . coper. Because
information can be available to anyone with access to a computer and all
necessary data transfer equipment the possibility of abuse anse which could be
in form of piracy, invasion of privacy and other criminal acts like electronic
fund transfer. Computer crime is the illegal electronic trespass of computer
and data banks, which makes computer crime the most feared variety of
white-collar cnme. There are different types of computer crime which include
Software piracy, Abuse of privacy, Unlimited Access of computer data files,
.Crime from unauthorized use of a password, and Crime from the use of computer
viruses. The data collected were analyzed and was discovered that due to piracy
in software, computer crime affects the economy of the country, but ,ยท no one
really known the extent of computer crime because the much of it is either
undetected or unreported. It was then recommended that government and policy
makers should increase information technology awareness in schools, colleges
and public offices. In reference to software piracy is a design that could help
control software pi.racy and can be implemented in any site and software
program against illegal use of software.
ADISA, A (2023). A Case Study Of Computer Crime In Information Technology In The Nigeria Industry . Mouau.afribary.org: Retrieved Dec 22, 2024, from https://repository.mouau.edu.ng/work/view/a-case-study-of-computer-crime-in-information-technology-in-the-nigeria-industry-7-2
A.K, ADISA. "A Case Study Of Computer Crime In Information Technology In The Nigeria Industry " Mouau.afribary.org. Mouau.afribary.org, 10 Oct. 2023, https://repository.mouau.edu.ng/work/view/a-case-study-of-computer-crime-in-information-technology-in-the-nigeria-industry-7-2. Accessed 22 Dec. 2024.
A.K, ADISA. "A Case Study Of Computer Crime In Information Technology In The Nigeria Industry ". Mouau.afribary.org, Mouau.afribary.org, 10 Oct. 2023. Web. 22 Dec. 2024. < https://repository.mouau.edu.ng/work/view/a-case-study-of-computer-crime-in-information-technology-in-the-nigeria-industry-7-2 >.
A.K, ADISA. "A Case Study Of Computer Crime In Information Technology In The Nigeria Industry " Mouau.afribary.org (2023). Accessed 22 Dec. 2024. https://repository.mouau.edu.ng/work/view/a-case-study-of-computer-crime-in-information-technology-in-the-nigeria-industry-7-2