Development of internet technology had made the general populaces more at the mercy of on Internet which is a breeding field of nasty activities like cybercrime (CBCE). The origination of the World Wide Web (WWW) in the year 1989 has accelerated digital communication and interaction in the globe (Hunton, 2011). Thi-s occurrence of the Internet has significantly impacting upon and reinforcing several essential facets of contemporary civilization and critical public and social infrastructures. Directly, CBCE is a demanding concern for state and intercontinental police institutions to react to CBCE, together with the multifaceted diminuendos of CBCE networks' (Harkin et al, 2018). Importantly, cyber policing envisions mammoth challenges to condense victimization. Privatization of policing CBCE is critical (Yar, 2013b; Boes and Leukfeldt, 2017; Finn, 2019).
Weighing strategically the actuality of CBCE Brenner (2001,2004) asserted that CBCE is a divergent category of criminality from a law perception. All form of CBCE has a counterpart crime in the physical world. For example, vandalism can be seen as the tangible world correspondence of hacking (Petee, Corzine, Huff-Corzine, Clifford, and Weaver, 2010). However, disjointedness exists between real-life Yar (2005) criminalities and cybernetic crimes. Yar (2005) further debated that computergenerated space builds exceptional openings for the commission of the novel category of criminalities; such crime cannot be executed in the physical world. Furthermore, Wall (2017a, agreement with NBPC submission noted that CBBULL is when an individual constantly and calculatedlyteases, mistreats, or makes amusement of a targeted person online, employing cell phones or automated garget.
Cyberstalking (CBSTAL): CBSTAL is typology ofCBCE in which somebody harasses or stalks a target by means of electronic or digital device, such as email, social media, instant messaging (IM), or communications forwarded to a chat group. Intentionally, CBSTAL take advantage of the facelessness and anonymity provided by the internet to trunk or harasses their victims, occasionally without being discovered, punished or even identified(Rahul,nd).
YahooYahoo (YAYO): YAYOentails perpetrating online frauds scheme that range from identity credit card tricks, prevarication and larceny, counter feitcheque and money order transactions, and online shopping (https:// www.nairaland. com/71121/y). Yahoo boy in the Nigerian context is juvenile (young male or female) who defraud others nationally or internationally using various means largely the Facebook handle.
Yahoo Plus (YAPLU): Premium Times (2022) distinguishing between YAYO and YAPLU revealed that YAYO is the consistent and frequent internet scam, but YAPLU involves rituals and the use of human parts and renewable sacrifices rituals in other to charm and easily influence the targets.
Cyber SEX (CBSXXX): Nicola (2000) debated CBSXXX is same as Internet sex, computer sex, netsex and, cyber or cybering, colloquially, is a computer-generated sex happenstance in which more than one individuall inkeddistantly via computer system exchange sexually unambiguous messages unfolding a sexual involvement. Furthermore, CBSXXX is a sub-type of technology-mediated sexual interactions. Eventually, Harley (1996)added clearly that CBSXXX also involves real life masturbation. Harley (1996) added that the quality of a CBSXXX encounter classicallyis contingent upon the participants' emotional capacities to arouse a glowing, intuitive mental picture in the thoughts and Imagination of their buddies. CBSXXX can arisebetween lovers who are physicallydistant or among persons with no erstwhile knowledge of each other and meet in virtual spaces and may even be unknown to each other. In some environments,CBSXXX is heightened by the use of a webcam to diffuse real-time video of the partners.
Cyber Trafficking (CBSXXT): IJM, (2020) and CNN (2013) asserted that CBSXXT is the live streaming of forced sexual performances and or an outright rape. Targets are kidnapped, threatened, or mislead and conveyed to CBSXXX dens. The Philippine Star, (2020), ASEAN Post (2019) and Manila Bulletin (2020) noted that the CBSXXX dens can be in severalsetting where the CBSXXX traffickers have access to thetablet, computer, or phone with internet network. IJM(2020) added firmly that players use pornographic video sharing websites, social media connections, videoconferences, online chat rooms, dating pages, dark web sites (NBC, 2018), and other platforms.Also, Philippine, (2019) remarked thatthey use online payment systems (NBC News, 2018& Reuters 2019) and cryptocurrencies to hide their personalities. Furthermore, South China Morning Post (2019] added that Loads of reports of CBSXXT happenings are referred to authorities yearly. Meanwhile, VOA,(2017) and the South China Morning Post (2019), highlighted vividly fresh regulations and constabularies procedures are needed to fight this type of CBCE.
VSH is the fraudulent activities of calling or leaving voice notes claiming to be from trustworthy establishments in order to persuade the targeted individuals to disclose private financial information, such as bank particulars and credit card statistics. Simply, Vishing (voice or VoIP phishing) is an automated fraud scheme in which persons are deceived over the phone. (https://www.techtarget.com/searchunifiedcomm unications/d).
MSH is a the fraud scheme of sending text messages alleging to be from dependable and reliable corporations in order to convince the focused individuals to divulge private information, such as PINs, or credit card information (www.google.com/search?cli).
PSHinvolves the practice of sending emails purporting to be from reputable London Journal of Research in Management and Business establishments with the intent to induce targeted persons to expose and secret particular information, such as passwords, PIN, and credit card information.Furthermore, PSH is the trick of hoodwinking Internet users through deceptive email messages into revealing private or personal statistics which can then be used dishonestly(https://www.merriam-webster.com/ dictionar).
Hacking (HAKI): HAKI is the useof computer device to access personal and confidential information kept on a different computer system without authorization, or to spread a computer virus.(https://dictionary.cambridge.org/dictionar y/english/hacking).
Spamming (SPNG): SPNG simply means sending or dispatching "junk" mails to other internet users or participants of a delivery list (https:// www.lawinsider.com/dictionary/spamming).
Cyber Theft (CTT): CTTis carried out by way of computers or the internet. (www.google.com/ search?cli)
Money laundering entails concealing the source and quantity of income. Money laundering is an endeavor to camouflage illegitimate earnings from prearranged criminality as genuine income or to delete evidence of earnings altogether (www.google.com/search?cli).
Cyber Vandalism (CVDM): CVDM is the destructive cyber-attacks devoid of any understandable profit or ideological motivation. Cyber vandals can mar websites, interrupt an enterprise's services, or obliterate databases and important files (https://nordvpn.com/cyber security/glossary/c).
Online Gambling (ONGA): ONGA involves betting on casinos, gaming club or sports over the internet. Well, ONGA is also termed Internet Gambling or e-gambling. Generally, credit cards are used to place the gamble and landslide or sufferers are determined thereby (https://indian legalsolution.com/online-ga).
Network Sabotage (NESAGE): NESAGE is the modification, expurgation or destruction of computer documents or programs, or meddling with computer systems, with the motiveof hindering the working of a computer or a telecommunication system (www.google.com/ search?cli).
Salami Attack (SATA): SATA is same as Salami slicing tactics, salami tactics, salami slicing, and the salami-slice strategy is the scheme of breeding a chain of numerous small actions to yield a much greater action or consequence that is impossible or illegitimate to carry out at on one occasion(www.google.com/search?cli). Salami Slicing Attack" or "Salami Fraud" is a practice by which Cyber-criminals steal fund a little or a bit at a time so that there's no conspicuous dissimilarity in the total amount (https://howtoin fosec. com/2021/06, 2021)
Telecommunications Piracy (TEPI): TEPI is the manipulation of telecommunications products (principally handsets and cell phones) or services with the objective of criminal obtaining cash from a communication service provider or its patrons(www.google.com/search?cli).
VIDIS is a deliberate practice of sending malicious software that fastensand join itself to target software. Trojan horse, Virus, Time bomb, Logic Bomb, worms, Rabbit and Bacterium are samples of malicious software that damages the computer software of the victim.(http://alphasquad blogging.blogspot.com/2016/12/vi) Pharming (PAMI): PAMI is the fraudulent exercise of pointing internet users to a counterfeit website that has the form of a genuine website, in order to acquire delicate figures such as passwords, PINs, account numbers, etc. furthermore, abroadly used PAMI description is cyber fraud that comprises the engagement of malicious program to connect victims to hoaxed websites in an effort to collect their relevant and personal information, credentials, and data. (https://www.fortinet.com/resources/cyberglossa ry/pharming)
Pournelle (2004) noted that there are two straightforward classifications of Internet deceptions: frauds, where the purpose is to defraud others, and HES, where the prime objective is simply to pull the chain, but with abroad consequences. HES give the criminals ego gratification as they see their scheme grow through the Internet. Frauds give the culprit's savings of the target, and years of hassle. Meanwhile, HES are shared by mails and come in an infinite assortment of guises. (Pournelle, 2004) Data Diddling (DID): DID is a form of CBCE in which data is changed as it is typed into a computer system, usually by a data entry official or a computer virus. Computerized processing of the altered data results in a fraudulent benefit (https://www.google.com/search?client) Illegal Interception of Telecommunications (IITE): IITE involves gaining access to the signal, collecting the signal, and exfiltration of the signal (Purpura, 2013).
CUT is the practice of registering, trafficking in, or using an Internet domain name, with bad faith intent to profit from the goodwill of a trademark belonging to someone else. (https://www.google.com/search?client).
Email Crime (EMAC): EMAC is same as email scam. It is the premeditated trick for either individual advantage or to hurt a targeted target through mails. Immediately email became generally adopted, EMAC instantly began to be employed as a channeland tool by fraudsters to swindle people of their assets and resources. Similarly, EMACoften take the shape of a "con game", or scam (https://www.google.com/ search?client).
Cyber-Terrorism (CYTI): CYTI is the engagement of network system and related information technology with the goal of initiatingimpairment or damage, with the purpose of compelling the resident population and influence policy of target government or otherwise affect its conduct (https://www.google.com /search?client). ? Spyware (SPY): SPY is computer software that is engineered to collect illegitimately someone's data without their permission. SPY is often contracted through defective network browsers or by being downloaded without the target being aware of doing so (Kurt, 2022).
? Tracking Cookies (TRAT): TRAT is usually involves trailing someone's internet service so that advertisers target that victim with ads tailored to their benefits.
? Key logging (KEY): This is when a program records a person's keystrokes, which can be used to steal secret pin and social numbers (Kurt, 2022).
Cyber Attack (CATA): CATA entails gaining unauthorized entrance to an individual or organization computer with the primary objective of causing damage to the computer system, files, and network (Pratt, 2022).
Man-in-the-Middle (MITM): MITM result when cyber hackers secretly insert themselves between more than one parties, for instance spying individual computer users and their financial institutions. MITM is same as monster-in-themiddle attack (MDA), man-in-the-browser attack (MBA), eavesdropping attack (EVA), machine-in-the-middle attack (MMA), (Pratt, 2022).
Distributed Denial of Service (DDoS): DDoSoccurs when crackers bombard an establishment's servers with enormous volumes of concurrent information demands, thus making the company's servers incapablein managing any legitimate needs (Pratt, 2022).
Structured Query Language (SQL) Injection (SQLI): SQL Iinjection arises when hackers input malicious code into servers employing the SQL programming language to get the server to divulge and collect sensitive personal or organizational information (Pratt, 2022).
Zero-Day (ZED): ZED exploit occurs when cyber hackers first exploit a newly noticed and identified weakness and vulnerability in IT structure (Pratt, 2022).
DNSTis a refined attack wherein hackers launch and then use untiringly, existing access or a tunnel into their targets' systems (Pratt, 2022).
Drive-By or Drive-By Download (DDD): DDD arises when an internet user browses a website that, in turn, infects the innocent person's system with malware (Pratt, 2022).
Credential-Based Attacks (CBA): CBA occur when cyber attackers steal the credentials that ITpersonnel uses to open, operate and administers a computer system and then use the stolen data to illegally access the victim computers to collect secret data, disrupt an entity, and its processes (Pratt, 2022).
CRSresults when cyber intruders employs compromised login permits, for instance email and password to access a targeted systems (Pratt, 2022).
Brute-ForceAttack (BOFA): BOFA is a situation in which cyber fraudsters uses trial-and-error attempts to crack login details such as usernames, passwords and encryption keys, trusting that the several tries pay off with an accurate guess (Pratt, 2022).
MAW refers to viruses, Trojans, worms and other software that gets onto your computer without your knowledge.
LogicBombs (LOBO): LOBOcommands the computer system to implement a particular command at a definite date and time or under certain speculated situations. The specified commands or orders might require the computer to reveal a verification technique on the screen;LOBO can instruct the computer to start deleting its files. LOBO often works similar to viruses. While a virus contaminates a given computer program after which reproduces when the computer program begins to run, the LOBO does not replicate. LOBO simply waits for some predetermined occasion or time to do its Azah, (2020) shared the view with (Alhaji, 1985) that search, connotes simply the procedure adopted by officers to recover and regain from an individual or group of persons, belongings, buildings, resources belonging to another person, or organization compulsory for the purpose of Law enforcements. Hence the police can make use of the process to recover criminal evidence, in course of their investigation, where necessary, in order to forestall the commission of crime (Alhaji, 1985). Persons and properties search by police officers (POF) is directed on a suspected person to retrieve relevant information and evidence to be consulted during trial (Afolanya, nd). Legally, the authority and right of the POF to embark or individual or property search is engrained in a number ofvalid legislations. Specifically, the current Police Act (PAT), precisely in section 28 sub-sections(1) and section 29 respectively (PAT Cap P19 LFN 2004).
Section 28 subsections (1) PAT Cap P19 LFN 2004 states that "a higherPOF possibly by power under his control empowered a POF to enter suspected apartment, stores,,buildings, other areas in quest for missing assets, and search with the intention of seizing, and securing identified property the POF deems to have been collected and possessed unlawfully. Furthermore,the POF would be authorized to embark on persons or property search upon obtaining a search warrant (SEW), and the property recovered, if any, matched the belongings labeled in such SEW. It is probable that a good number of Nigerian laws have loopholes. While section 28 mandated and provided that the POF must obtain a SEW, section 29 of the same constitution did not make compulsory a POF securing a SEW before embarking on any search. Directly, section 29 provides that a POFcan detain and search any one whom the POF reasonably suspected (RES) of possessing in his custody or carrying in any way anything which he has cause, or reason to believe to have been stolen or legitimately acquired (PAT Cap P19 LFN, 2004; Azah, 2020).However, on the contrary, professional effort had been made in explaining the component of the term reasonable suspicion. In the case between Sarkin Kinkiba Tsoho Ladan v. Zaria Native Authority, it was established that the term reasonable suspicion is a suspicion based on proofs, facts and evidences and not just an ambiguous notion based on traditions. Henceforth any search done on an individual lacking reasonable explanation in agreement with the act will result in an unlawful search. Justifiably, whenever anyone feels personal, premises, or phone (PPP) search carried out on him was not reasonable, the victim can seek for justice in the Court of Law.
Source: (author's conceptualization, 2022).
Phones Search
Exceptionally, Body Search is done on anyone detained and apprehended by the security agencies in association of acrime, in this context, the law permits such examination to be stretched to the suspect being medically inspected. In the same vein, Stomach Searches carried out on a suspect arrested in relation with being in illegal custody of hard drugs.The suspect could be exposed to stomach medical scrutiny to discover if the suspect has swallowed to his stomach some hard substances.
However, the constitutional and legislative provision appears to have fashioned a lacuna. The Sections did not explain or give an understanding to the term "Reasonable", and consequently, it is unfortunate to note that, what was preordained to be a security has unexpectedly become an opening for abusing human rights. Evidentially, the Nigerian police resulted in molesting and harassing the populace particularly the youth suspected to be a Yahoo boy. Unfortunately, the POF sometimes do probably request the suspect to transfer funds to their personal account without any reasonable suspicion.
Phone Search has become a major problem being that YAYO is now a household name majorly in the southern region of the country. This is singled out in this research because it has constituted critical debate and regular and routine practice by POF in Nigeria, particularly southern part of the country. Azah, (2020) in is summary, having scrutinized Section 45 of the CBCE Act, instituted that evidence gotten from electronic system for instance phones and laptops etc. are electronically generated evidence allowed and stated in the Act. 2021) is an economy where crime is uncontrolled and checked. Also, it is a free economy where the law is fading out in implementation and everyone does with it is good to him or her even at the expense of the nation and public good.Several numbers of children, youth particularly the female youth and adult had lost their lives due to Yahoo Plus. So many human parts and private parts have been harvested by these cyber criminals in quest for wealth. Some even uses their relatives for rituals. Others use ladies pants and brazes stolen from the girls or collected during sexual act for rituals. It is no longer news saying that some unemployed Nigerian youth are living in luxury from fortune acquired from CBCE.
The cyber fraudsters often fail to recollect that dark practices breed's destruction. Paul (58-60 AD) in his lettering to the Romans highlighted the cardinal benefit and profit of dark practices. These comprises Considering the solution to dark economic practices, Isaiah and Ezra (546-461 BC) emphasized that if upright people who are termed so will humble themselves and plead and turned from their dark practices and seek My help then I will hear from above I will forgive their CBCE and its relatives and cured their land. Meanwhile, Osagioduwa (2022)noted that the way out of a dark economy resides in a lightened economy.
The study embraces the interpretivism philosophy with the deductive theoritical approach. Methodological choice was mono quantitative
Where: Section B: Response from the police 6.30 percent of the police respondents agreed, 12.50 percent strongly agreed, 6.30 percent could not decide, 62.5 percent disagreed, while 12.50 percent strongly disagreed that Large numbers of Nigerian youth are not involved in cybercrime Section A: youth responses 17.50 percent of the youth respondents agreed, 35.0 percent strongly agreed, 7.50 percent could not decide, 20.0 percent disagreed, while 20.0 percent strongly disagreed that Large numbers of Nigerian youth are not involved in cybercrime.
?Ï?"? CBCERD Ï?"Ï?"Ï?" = cybercrimeSection B Response from the police 6.30 percent of the police respondents agreed, 68.80 percent strongly agreed, 6.30 percent could not decide, while 18.80 percent strongly disagreed that Cybercrime had become the only means of livelihood of several Nigerian youth Section A: youth responses 15.00 percent of the youth respondents agreed, 32.50 percent strongly agreed, 2.50 percent could not decide, 30.0 percent disagreed, and 20.0 percent strongly disagreed that Cybercrime had become the onl means of livelihood of several Ni erian outh .
Section B Response from the police 68.80 percent of the police respondents agreed, 31.30 percent strongly agreed that lack of government plan for the youth as increase the height of cybercrime in Nigeria society,
You have been search not less than twice in the last two months by the Nigerian police.
Section A: youth responses 20.0 percent of the youth respondents agreed, 12.50 percent strongly agreed, 5.0 percent could not decide, 25.0 percent disagreed, and 37.50 percent strongly disagreed that they have been search not less than twice in the last two months by the Nigerian police.
Section B Response from the police 6.30 percent of the police respondents agreed, 12.50 percent strongly agreed, 18.8 percent could not decide, 62.5 percent disagreed, and 6.30 percent strongly disagreed that they have search an individual not less than twice in the last two months.
Question 5
Section B Response from the police 6.30 percent of the police respondents agreed, 6.30 percent strongly agreed, 12.50 percent could not decide, 56.30 percent disagreed, and 18.80 percent strongly disagreed that those involved in cybercrime are easily recognized by their appearance Section A: youth responses 37.50 percent of the youth respondents agreed, 22.50 percent strongly agreed, 2.50 percent could not decide, 27.50 percent disagreed, and 10.0 percent strongly disagreed that those involved in cybercrime are easily recognized by their appearance Question 6
Section A: youth responses 35.0 percent of the youth respondents agreed, 35.0 percent strongly agreed, 17.50 percent could not decide, 5.0 percent disagreed, and 7.5 percent strongly disagreed that Nigerian police upon search of a cybercrime suspect phone, request for immediate transfer into his or her personal account before discharging a suspect.
Section B Response from the police 6.30 percent strongly agreed, 25.0 percent could not decide, while 68.8 percent strongly disagreed that Nigerian police upon search of a cybercrime suspect phone, request for immediate transfer into his or her personal account before discharging a suspect. Section A: youth responses 57.50 percent of the youth respondents agreed, 27.50 percent strongly agreed, 7.50 percent could not decide, 5.0 percent disagreed, and 2.50 percent strongly disagreed that lack of government plan for the outh as increase the hei ht of c bercrime in Ni eria societ .
Question 7
Section B Response from the police 56.30 percent of the police respondents agreed, 12.50 percent strongly agreed, 18.80 percent could not decide, 6.30 percent disagreed, and 6.30 percent strongly disagreed that Nigerian police often stop youths on the way and demand for the phones for search.
Section A: youth responses 57.5 percent of the youth respondents agreed, 37.50 percent strongly agreed, 2.50 percent could not decide, and 2.50 percent strongly disagreed that Nigerian police often stop youths on the way and demand for the phones for search.
Question 8
Section A: youth responses 37.50 percent of the youth respondents agreed, 15.0 percent strongly agreed, 30.0 percent could not decide, 15.0 percent disagreed, and 2.50 percent strongly disagreed that Nigerian police contribute to the growth of cybercrime in Nigeria.
Section B Response from the police 56.30 percent of the police respondents agreed, 6.30 percent strongly agreed, 6.30 percent could not decide, 18.8 percent disagreed, and 12.50 percent strongly disagreed that Nigerian police contribute to the growth of cybercrime in Nigeria.
Cybercrime suspect are usually prosecuted in line with Nigerian law.
Section B Response from the police 12.50 percent of the police respondents agreed, 12.50 percent strongly agreed, 37.50 percent disagreed, and 37.50 percent strongly disagreed that cybercrime suspect are usually prosecuted in line with Nigerian law.
Section B Response from the police 25.0 percent of the police respondents agreed, 56.3 percent strongly agreed, 6.30 percent disagreed, and 12.50 percent strongly disagreed that searching one's personal phone by the police is necessary to curb the rate of cybercrime in Nigeria society Section A: youth responses 20.0 percent of the youth respondents agreed, 12.50 percent strongly agreed, 17.50 percent could not decide, 22.50 percent disagreed, and 27.50 percent strongly disagreed that searching one's personal phone by the police is necessary to curb the rate of cybercrime in Nigeria society.
Section A:youth responses 35.50 percent of the youth respondents agreed, 37.50 percent strongly agreed, 17.50 percent could not decide, 7.50 percent disagreed, and 2.50 percent strongly disagreed that Nigeria police are not knowledgeable of the various techniques employed in perpetuating cybercrime in Nigeria.
Section B Response from the police 50.0 percent of the police respondents agreed, 12.50 percent strongly agreed, 25.0 percent could not decide, and 12.50 percent disagreed that Nigeria police are not knowledgeable of the various techniques employed in perpetuating cybercrime in Nigeria.
Section B Response from the police 37.50 percent of the police respondents agreed, 12.50 percent strongly agreed, 12.5 percent could not decide, and 37.50 percent disagreed that Cybercrime cannot be curtailed or reduce by the current Nigeria police despite all their training.
Section A: youth responses 37.50 percent of the youth respondents agreed, 32.50 percent strongly agreed, 17.50 percent could not decide, 2.50 percent disagreed, and 10.0 percent strongly disagreed that Cybercrime cannot be curtailed or reduce by the current Nigeria police despite all their training. Section A: youth responses 35.50 percent of the youth respondents agreed, 37.50 percent strongly agreed, 10.0 percent could not decide, 10.0 percent disagreed, and 7.0 percent strongly disagreed that the Nigerian police need a cybercrime unit, department or division to effectively fight cybercrime in Nigeria.
Section B Response from the police 75.0 percent of the police respondents agreed, 37.50 percent strongly agreed, 6.3 percent could not decide, and 6.3 percent disagreed that the Nigerian police need a cybercrime unit, department or division to effectively fight cybercrime in Nigeria.
All teenager driving expensive cars are usually first suspect of cybercrime activities.
Section A: youth responses 17.50 percent of the youth respondents agreed, 47.50 percent strongly agreed, 5.0 percent could not decide, 17.50 percent disagreed, and 12.50 percent strongly disagreed that all teenager driving expensive cars are usually first suspect of cybercrime activities.
Section B Response from the police 43.80 percent of the police respondents agreed, 31.30 percent strongly agreed, and 6.3 percent disagreed that all teenager driving expensive cars are usually first suspect of cybercrime activities
| unexpected, | unrestrained and progressive | ||
| corruption and fraudulent activities. Several | |||
| studies (Benford, 1938; Altman, 1968; Beneish, | |||
| Etuk 2011; 1999; Digabriele, 2009; Enofe et al., | |||
| 2017; Osagioduwa, 2019, 2020, 2022a, 2022b; | |||
| Bhasin, 2016; Hegazy, 2017; Kolar, 2013; Quirin, | |||
| 2014) had shown the reality of corruption. The | |||
| DATa according toOsagioduwa ( | |||
| SEW Authorization | Superior POF | A Judge | London Journal of Research in Management and Business |
| A Magistrate | |||
| Justice of peace in | |||
| the North | |||
Also, Premises Search (PPPSS) is a type of search conducted in a charge person's properties, goods, ware houses, or other premises. The goal of premises search is to seize any assets supposed to have been stolen or illegitimately gotten.A POP can only conduct PPPSS with a permission or SEW from a judge, justice of peace of the North, Magistrate, and a superior POF which must be in writing. A superior POFaccording to the Police Act (PACT)is any POF beyond the level of a Cadet assistant Superintendent of Police. In addition, Search of Things (SET) is search performed on items other than PPPSS o person's search.Search AuthorizationSource: (author's conceptualization, 2022).
| both sections were analyzed comparatively in the | ||||
| study. Fifty-six (56) documents were retrieved | ||||
| from both sectional respondents. The analysis was | ||||
| was | done using response Comparative- | |||
| The opinions of respondents were | Percentage-Techniques | (COPTA). | The | |
| sought. Cross sectional time horizon was | investigator hired the Cronbach's Alpha (CRAP) | |||
| employed. The study sought the views of two | statistical instrument in determining the | |||
| distinct sections with peculiar interpretation of | reliability of the study. copies of organized | |||
| cyber crime operationality namely, the youth | close-ended inquiry form (Five Likert Scales | |||
| (section A) and the police force (section B). the | format. Strongly Agree, Agree, Undecided, | |||
| non-probabilistic sampling methodology was | Disagree and Strongly Disagree). | |||
| further embraced in the study.The responses from | ||||
London Journal of Research in Management and Business 88 Volume 23 | Issue 3 | Compilation 1.0 method.
SPAMALOT: A Toolkit for Consuming Spammers Resources. Proceedings of the 3rd Conference on E-mail and Antispam. Available online at www. ceas.org. Police Act Cap P19 LFN, (the 3rd Conference on E-mail and Antispam. Available online at www. ceas.org. Police Act Cap P19 LFN) 2006. 2004.
A Historical Assessment of Cybercrime in Nigeria: Implication for Schools and National Development. www.questjournals.org Journal of Research in Humanities and Social Science 2021. 9 (9) p. .
Students Perception of Cyber Crime in Edo State: Implications for Teaching and Learning. Journal of Contemporary Research 2009. 6 (1) p. .
The effectiveness of the whistle blowing policy in combating corruption in the Nigerian public sector. Global Journal of Arts Humanities and Social Science 2019. 7 (10) p. .
Public auditors and detection of corruption in Nigeria. International journal of social and management science 2020. 3 (2) p. .
Assessment of challenges of public auditor's independence and report in the public sector of Nigeria. Amity Journal of management research 2022. 5 (1) p. .
Post employment benefit: a comparative assessment of the central bank and the police force retirees. London journal of research in management and business 2022. 22 (5) p. .
Government anti-corrupt instruments unity and prosecution of corrupt public officers. The accounting practitioners' perspective. Nigerian journal of management science 2022. 23 (2) p. .
central bank of Nigeria and the Nigerian economy in the 21 st century. Journal of accounting and management 2022. 12 (2) p. .
Fraud scheme and fraudulent accountant prosecution. International Journal of Academic Research in Business and Social Science 2022. 12 (1) p. .
Effective auditors, systematic corruption and the EGAD report: the way forward. Gusau journal of accounting and finance 2022. 3 (2) p. .
Assessment of challenges of public auditor's independence and report in the public sector of Nigeria. Amity Journal of management research 2022b. 5 (1) p. .
Treasury single account effectiveness on corruption control and public organizations efficient administration in Nigeria. International Journal of Management Studies and Social Science Research 2019b. 1 (5) p. .
Determinants of Preventing Cyber Crime: a Survey Research. International Journal of Management Science and Business Administration 2016. 2 (7) p. .
Norwegian national. Manila Bulletin May 1, 2020.
Cyber Crimes and Cyber Laws in Nigeria. The International Journal Of Engineering And Science (IJES) 2013. 2 (4) p. .
Global taskforce tackles cybersex child trafficking in the Philippines. London Journal of Research in Management and Business April 15, 2019.
Volume 23 | Issue 1 | Compilation 1.0 © 2023 London Journals Press Cybercrime Schemes and Search by the Police