# INTRODUCTION Development of internet technology had made the general populaces more at the mercy of on Internet which is a breeding field of nasty activities like cybercrime (CBCE). The origination of the World Wide Web (WWW) in the year 1989 has accelerated digital communication and interaction in the globe (Hunton, 2011). Thi-s occurrence of the Internet has significantly impacting upon and reinforcing several essential facets of contemporary civilization and critical public and social infrastructures. Directly, CBCE is a demanding concern for state and intercontinental police institutions to react to CBCE, together with the multifaceted diminuendos of CBCE networks' (Harkin et al, 2018). Importantly, cyber policing envisions mammoth challenges to condense victimization. Privatization of policing CBCE is critical (Yar, 2013b; Boes and Leukfeldt, 2017; Finn, 2019). Weighing strategically the actuality of CBCE Brenner (2001,2004) asserted that CBCE is a divergent category of criminality from a law perception. All form of CBCE has a counterpart crime in the physical world. For example, vandalism can be seen as the tangible world correspondence of hacking (Petee, Corzine, Huff-Corzine, Clifford, and Weaver, 2010). However, disjointedness exists between real-life Yar (2005) criminalities and cybernetic crimes. Yar (2005) further debated that computergenerated space builds exceptional openings for the commission of the novel category of criminalities; such crime cannot be executed in the physical world. Furthermore, Wall (2017a, agreement with NBPC submission noted that CBBULL is when an individual constantly and calculatedlyteases, mistreats, or makes amusement of a targeted person online, employing cell phones or automated garget. Cyberstalking (CBSTAL): CBSTAL is typology ofCBCE in which somebody harasses or stalks a target by means of electronic or digital device, such as email, social media, instant messaging (IM), or communications forwarded to a chat group. Intentionally, CBSTAL take advantage of the facelessness and anonymity provided by the internet to trunk or harasses their victims, occasionally without being discovered, punished or even identified(Rahul,nd). YahooYahoo (YAYO): YAYOentails perpetrating online frauds scheme that range from identity credit card tricks, prevarication and larceny, counter feitcheque and money order transactions, and online shopping (https:// www.nairaland. com/71121/y). Yahoo boy in the Nigerian context is juvenile (young male or female) who defraud others nationally or internationally using various means largely the Facebook handle. Yahoo Plus (YAPLU): Premium Times (2022) distinguishing between YAYO and YAPLU revealed that YAYO is the consistent and frequent internet scam, but YAPLU involves rituals and the use of human parts and renewable sacrifices rituals in other to charm and easily influence the targets. Cyber SEX (CBSXXX): Nicola (2000) debated CBSXXX is same as Internet sex, computer sex, netsex and, cyber or cybering, colloquially, is a computer-generated sex happenstance in which more than one individuall inkeddistantly via computer system exchange sexually unambiguous messages unfolding a sexual involvement. Furthermore, CBSXXX is a sub-type of technology-mediated sexual interactions. Eventually, Harley (1996)added clearly that CBSXXX also involves real life masturbation. Harley (1996) added that the quality of a CBSXXX encounter classicallyis contingent upon the participants' emotional capacities to arouse a glowing, intuitive mental picture in the thoughts and Imagination of their buddies. CBSXXX can arisebetween lovers who are physicallydistant or among persons with no erstwhile knowledge of each other and meet in virtual spaces and may even be unknown to each other. In some environments,CBSXXX is heightened by the use of a webcam to diffuse real-time video of the partners. Cyber Trafficking (CBSXXT): IJM, (2020) and CNN (2013) asserted that CBSXXT is the live streaming of forced sexual performances and or an outright rape. Targets are kidnapped, threatened, or mislead and conveyed to CBSXXX dens. The Philippine Star, (2020), ASEAN Post (2019) and Manila Bulletin (2020) noted that the CBSXXX dens can be in severalsetting where the CBSXXX traffickers have access to thetablet, computer, or phone with internet network. IJM(2020) added firmly that players use pornographic video sharing websites, social media connections, videoconferences, online chat rooms, dating pages, dark web sites (NBC, 2018), and other platforms.Also, Philippine, (2019) remarked thatthey use online payment systems (NBC News, 2018& Reuters 2019) and cryptocurrencies to hide their personalities. Furthermore, South China Morning Post (2019] added that Loads of reports of CBSXXT happenings are referred to authorities yearly. Meanwhile, VOA,(2017) and the South China Morning Post (2019), highlighted vividly fresh regulations and constabularies procedures are needed to fight this type of CBCE. # Vishing (VSH): VSH is the fraudulent activities of calling or leaving voice notes claiming to be from trustworthy establishments in order to persuade the targeted individuals to disclose private financial information, such as bank particulars and credit card statistics. Simply, Vishing (voice or VoIP phishing) is an automated fraud scheme in which persons are deceived over the phone. (https://www.techtarget.com/searchunifiedcomm unications/d). # Smishing (MSH): MSH is a the fraud scheme of sending text messages alleging to be from dependable and reliable corporations in order to convince the focused individuals to divulge private information, such as PINs, or credit card information (www.google.com/search?cli). # Phishing (PSH): PSHinvolves the practice of sending emails purporting to be from reputable London Journal of Research in Management and Business establishments with the intent to induce targeted persons to expose and secret particular information, such as passwords, PIN, and credit card information.Furthermore, PSH is the trick of hoodwinking Internet users through deceptive email messages into revealing private or personal statistics which can then be used dishonestly(https://www.merriam-webster.com/ dictionar). Hacking (HAKI): HAKI is the useof computer device to access personal and confidential information kept on a different computer system without authorization, or to spread a computer virus.(https://dictionary.cambridge.org/dictionar y/english/hacking). Spamming (SPNG): SPNG simply means sending or dispatching "junk" mails to other internet users or participants of a delivery list (https:// www.lawinsider.com/dictionary/spamming). # Access Crime (ACCE): ACCE means gaining access into another person computer without awareness (Osagioduwa 2022). Cyber Theft (CTT): CTTis carried out by way of computers or the internet. (www.google.com/ search?cli) # Money Laundering and Tax Evasion (MLTA): Money laundering entails concealing the source and quantity of income. Money laundering is an endeavor to camouflage illegitimate earnings from prearranged criminality as genuine income or to delete evidence of earnings altogether (www.google.com/search?cli). Cyber Vandalism (CVDM): CVDM is the destructive cyber-attacks devoid of any understandable profit or ideological motivation. Cyber vandals can mar websites, interrupt an enterprise's services, or obliterate databases and important files (https://nordvpn.com/cyber security/glossary/c). Online Gambling (ONGA): ONGA involves betting on casinos, gaming club or sports over the internet. Well, ONGA is also termed Internet Gambling or e-gambling. Generally, credit cards are used to place the gamble and landslide or sufferers are determined thereby (https://indian legalsolution.com/online-ga). Network Sabotage (NESAGE): NESAGE is the modification, expurgation or destruction of computer documents or programs, or meddling with computer systems, with the motiveof hindering the working of a computer or a telecommunication system (www.google.com/ search?cli). Salami Attack (SATA): SATA is same as Salami slicing tactics, salami tactics, salami slicing, and the salami-slice strategy is the scheme of breeding a chain of numerous small actions to yield a much greater action or consequence that is impossible or illegitimate to carry out at on one occasion(www.google.com/search?cli). Salami Slicing Attack" or "Salami Fraud" is a practice by which Cyber-criminals steal fund a little or a bit at a time so that there's no conspicuous dissimilarity in the total amount (https://howtoin fosec. com/2021/06, 2021) Telecommunications Piracy (TEPI): TEPI is the manipulation of telecommunications products (principally handsets and cell phones) or services with the objective of criminal obtaining cash from a communication service provider or its patrons(www.google.com/search?cli). # Virus Dissemination (VIDIS): VIDIS is a deliberate practice of sending malicious software that fastensand join itself to target software. Trojan horse, Virus, Time bomb, Logic Bomb, worms, Rabbit and Bacterium are samples of malicious software that damages the computer software of the victim.(http://alphasquad blogging.blogspot.com/2016/12/vi) Pharming (PAMI): PAMI is the fraudulent exercise of pointing internet users to a counterfeit website that has the form of a genuine website, in order to acquire delicate figures such as passwords, PINs, account numbers, etc. furthermore, abroadly used PAMI description is cyber fraud that comprises the engagement of malicious program to connect victims to hoaxed websites in an effort to collect their relevant and personal information, credentials, and data. (https://www.fortinet.com/resources/cyberglossa ry/pharming) # Hoaxes (HES): Pournelle (2004) noted that there are two straightforward classifications of Internet deceptions: frauds, where the purpose is to defraud others, and HES, where the prime objective is simply to pull the chain, but with abroad consequences. HES give the criminals ego gratification as they see their scheme grow through the Internet. Frauds give the culprit's savings of the target, and years of hassle. Meanwhile, HES are shared by mails and come in an infinite assortment of guises. (Pournelle, 2004) Data Diddling (DID): DID is a form of CBCE in which data is changed as it is typed into a computer system, usually by a data entry official or a computer virus. Computerized processing of the altered data results in a fraudulent benefit (https://www.google.com/search?client) Illegal Interception of Telecommunications (IITE): IITE involves gaining access to the signal, collecting the signal, and exfiltration of the signal (Purpura, 2013). # Cybersquatting (CUT): CUT is the practice of registering, trafficking in, or using an Internet domain name, with bad faith intent to profit from the goodwill of a trademark belonging to someone else. (https://www.google.com/search?client). Email Crime (EMAC): EMAC is same as email scam. It is the premeditated trick for either individual advantage or to hurt a targeted target through mails. Immediately email became generally adopted, EMAC instantly began to be employed as a channeland tool by fraudsters to swindle people of their assets and resources. Similarly, EMACoften take the shape of a "con game", or scam (https://www.google.com/ search?client). Cyber-Terrorism (CYTI): CYTI is the engagement of network system and related information technology with the goal of initiatingimpairment or damage, with the purpose of compelling the resident population and influence policy of target government or otherwise affect its conduct (https://www.google.com /search?client). ? Spyware (SPY): SPY is computer software that is engineered to collect illegitimately someone's data without their permission. SPY is often contracted through defective network browsers or by being downloaded without the target being aware of doing so (Kurt, 2022). # Aiding and Abating ? Tracking Cookies (TRAT): TRAT is usually involves trailing someone's internet service so that advertisers target that victim with ads tailored to their benefits. ? Key logging (KEY): This is when a program records a person's keystrokes, which can be used to steal secret pin and social numbers (Kurt, 2022). Cyber Attack (CATA): CATA entails gaining unauthorized entrance to an individual or organization computer with the primary objective of causing damage to the computer system, files, and network (Pratt, 2022). Man-in-the-Middle (MITM): MITM result when cyber hackers secretly insert themselves between more than one parties, for instance spying individual computer users and their financial institutions. MITM is same as monster-in-themiddle attack (MDA), man-in-the-browser attack (MBA), eavesdropping attack (EVA), machine-in-the-middle attack (MMA), (Pratt, 2022). Distributed Denial of Service (DDoS): DDoSoccurs when crackers bombard an establishment's servers with enormous volumes of concurrent information demands, thus making the company's servers incapablein managing any legitimate needs (Pratt, 2022). Structured Query Language (SQL) Injection (SQLI): SQL Iinjection arises when hackers input malicious code into servers employing the SQL programming language to get the server to divulge and collect sensitive personal or organizational information (Pratt, 2022). Zero-Day (ZED): ZED exploit occurs when cyber hackers first exploit a newly noticed and identified weakness and vulnerability in IT structure (Pratt, 2022). # Domain Name System (DNS) Tunneling (DNST): DNSTis a refined attack wherein hackers launch and then use untiringly, existing access or a tunnel into their targets' systems (Pratt, 2022). Drive-By or Drive-By Download (DDD): DDD arises when an internet user browses a website that, in turn, infects the innocent person's system with malware (Pratt, 2022). Credential-Based Attacks (CBA): CBA occur when cyber attackers steal the credentials that ITpersonnel uses to open, operate and administers a computer system and then use the stolen data to illegally access the victim computers to collect secret data, disrupt an entity, and its processes (Pratt, 2022). # Credential Stuffing (CRS): CRSresults when cyber intruders employs compromised login permits, for instance email and password to access a targeted systems (Pratt, 2022). Brute-ForceAttack (BOFA): BOFA is a situation in which cyber fraudsters uses trial-and-error attempts to crack login details such as usernames, passwords and encryption keys, trusting that the several tries pay off with an accurate guess (Pratt, 2022). # Malware (MAW): MAW refers to viruses, Trojans, worms and other software that gets onto your computer without your knowledge. LogicBombs (LOBO): LOBOcommands the computer system to implement a particular command at a definite date and time or under certain speculated situations. The specified commands or orders might require the computer to reveal a verification technique on the screen;LOBO can instruct the computer to start deleting its files. LOBO often works similar to viruses. While a virus contaminates a given computer program after which reproduces when the computer program begins to run, the LOBO does not replicate. LOBO simply waits for some predetermined occasion or time to do its Azah, (2020) shared the view with (Alhaji, 1985) that search, connotes simply the procedure adopted by officers to recover and regain from an individual or group of persons, belongings, buildings, resources belonging to another person, or organization compulsory for the purpose of Law enforcements. Hence the police can make use of the process to recover criminal evidence, in course of their investigation, where necessary, in order to forestall the commission of crime (Alhaji, 1985). Persons and properties search by police officers (POF) is directed on a suspected person to retrieve relevant information and evidence to be consulted during trial (Afolanya, nd). Legally, the authority and right of the POF to embark or individual or property search is engrained in a number ofvalid legislations. Specifically, the current Police Act (PAT), precisely in section 28 sub-sections(1) and section 29 respectively (PAT Cap P19 LFN 2004). Section 28 subsections (1) PAT Cap P19 LFN 2004 states that "a higherPOF possibly by power under his control empowered a POF to enter suspected apartment, stores,,buildings, other areas in quest for missing assets, and search with the intention of seizing, and securing identified property the POF deems to have been collected and possessed unlawfully. Furthermore,the POF would be authorized to embark on persons or property search upon obtaining a search warrant (SEW), and the property recovered, if any, matched the belongings labeled in such SEW. It is probable that a good number of Nigerian laws have loopholes. While section 28 mandated and provided that the POF must obtain a SEW, section 29 of the same constitution did not make compulsory a POF securing a SEW before embarking on any search. Directly, section 29 provides that a POFcan detain and search any one whom the POF reasonably suspected (RES) of possessing in his custody or carrying in any way anything which he has cause, or reason to believe to have been stolen or legitimately acquired (PAT Cap P19 LFN, 2004; Azah, 2020).However, on the contrary, professional effort had been made in explaining the component of the term reasonable suspicion. In the case between Sarkin Kinkiba Tsoho Ladan v. Zaria Native Authority, it was established that the term reasonable suspicion is a suspicion based on proofs, facts and evidences and not just an ambiguous notion based on traditions. Henceforth any search done on an individual lacking reasonable explanation in agreement with the act will result in an unlawful search. Justifiably, whenever anyone feels personal, premises, or phone (PPP) search carried out on him was not reasonable, the victim can seek for justice in the Court of Law. # Security Search Typology Source: (author's conceptualization, 2022). # III. SEARCH AND THE POLICE # Person Search # Search of things Phones Search # Premises search Exceptionally, Body Search is done on anyone detained and apprehended by the security agencies in association of acrime, in this context, the law permits such examination to be stretched to the suspect being medically inspected. In the same vein, Stomach Searches carried out on a suspect arrested in relation with being in illegal custody of hard drugs.The suspect could be exposed to stomach medical scrutiny to discover if the suspect has swallowed to his stomach some hard substances. However, the constitutional and legislative provision appears to have fashioned a lacuna. The Sections did not explain or give an understanding to the term "Reasonable", and consequently, it is unfortunate to note that, what was preordained to be a security has unexpectedly become an opening for abusing human rights. Evidentially, the Nigerian police resulted in molesting and harassing the populace particularly the youth suspected to be a Yahoo boy. Unfortunately, the POF sometimes do probably request the suspect to transfer funds to their personal account without any reasonable suspicion. Phone Search has become a major problem being that YAYO is now a household name majorly in the southern region of the country. This is singled out in this research because it has constituted critical debate and regular and routine practice by POF in Nigeria, particularly southern part of the country. Azah, (2020) in is summary, having scrutinized Section 45 of the CBCE Act, instituted that evidence gotten from electronic system for instance phones and laptops etc. are electronically generated evidence allowed and stated in the Act. 2021) is an economy where crime is uncontrolled and checked. Also, it is a free economy where the law is fading out in implementation and everyone does with it is good to him or her even at the expense of the nation and public good.Several numbers of children, youth particularly the female youth and adult had lost their lives due to Yahoo Plus. So many human parts and private parts have been harvested by these cyber criminals in quest for wealth. Some even uses their relatives for rituals. Others use ladies pants and brazes stolen from the girls or collected during sexual act for rituals. It is no longer news saying that some unemployed Nigerian youth are living in luxury from fortune acquired from CBCE. # ¥ ? ?? Dark Economy ?????" : ? f(CBCE1 ? ? ?+ corruption2 ? :? ? + unemployment3 ? ? ? famine4 ? ? ? + wickedness4 ? ? ?+ uncontrolled killings5 ? :? ? + oppression ?6 ? ?+ poor health care7 ? ? ? + political violence ?8 ? ?+ injustice ?9 ? ?+ political foolishness ? 10, ? ?? ???????¥ ? ???????" µ) ==> ?Ï?"??"¸ ?? ??? noitcurtsed ? ?? The cyber fraudsters often fail to recollect that dark practices breed's destruction. Paul (58-60 AD) in his lettering to the Romans highlighted the cardinal benefit and profit of dark practices. These comprises Considering the solution to dark economic practices, Isaiah and Ezra (546-461 BC) emphasized that if upright people who are termed so will humble themselves and plead and turned from their dark practices and seek My help then I will hear from above I will forgive their CBCE and its relatives and cured their land. Meanwhile, Osagioduwa (2022)noted that the way out of a dark economy resides in a lightened economy. The study embraces the interpretivism philosophy with the deductive theoritical approach. Methodological choice was mono quantitative # IV. METHODOLOGY Model ?Ï?"? CBCERD Ï?"Ï?"Ï?" =f (?0?????1?"¸? ??"???? stmsech , ? ?2Ï?"?????? bodsech , ? ?3? ? ? ? ? ?Ð?"Ð?" thgsech , ? ?4 ??? ppesech , ? ?5 ??????? premisech , ? ?..a? ? ? ? ? ?)???????????????????????????.(1 x ) Where: Section B: Response from the police 6.30 percent of the police respondents agreed, 12.50 percent strongly agreed, 6.30 percent could not decide, 62.5 percent disagreed, while 12.50 percent strongly disagreed that Large numbers of Nigerian youth are not involved in cybercrime Section A: youth responses 17.50 percent of the youth respondents agreed, 35.0 percent strongly agreed, 7.50 percent could not decide, 20.0 percent disagreed, while 20.0 percent strongly disagreed that Large numbers of Nigerian youth are not involved in cybercrime. ?Ï?"? CBCERD Ï?"Ï?"Ï?" = cybercrime Section B Response from the police 6.30 percent of the police respondents agreed, 68.80 percent strongly agreed, 6.30 percent could not decide, while 18.80 percent strongly disagreed that Cybercrime had become the only means of livelihood of several Nigerian youth Section A: youth responses 15.00 percent of the youth respondents agreed, 32.50 percent strongly agreed, 2.50 percent could not decide, 30.0 percent disagreed, and 20.0 percent strongly disagreed that Cybercrime had become the onl means of livelihood of several Ni erian outh . Section B Response from the police 68.80 percent of the police respondents agreed, 31.30 percent strongly agreed that lack of government plan for the youth as increase the height of cybercrime in Nigeria society, # Question 4 You have been search not less than twice in the last two months by the Nigerian police. Section A: youth responses 20.0 percent of the youth respondents agreed, 12.50 percent strongly agreed, 5.0 percent could not decide, 25.0 percent disagreed, and 37.50 percent strongly disagreed that they have been search not less than twice in the last two months by the Nigerian police. Section B Response from the police 6.30 percent of the police respondents agreed, 12.50 percent strongly agreed, 18.8 percent could not decide, 62.5 percent disagreed, and 6.30 percent strongly disagreed that they have search an individual not less than twice in the last two months. Question 5 # Those involved in cybercrime are easily recognized by their appearance Section B Response from the police 6.30 percent of the police respondents agreed, 6.30 percent strongly agreed, 12.50 percent could not decide, 56.30 percent disagreed, and 18.80 percent strongly disagreed that those involved in cybercrime are easily recognized by their appearance Section A: youth responses 37.50 percent of the youth respondents agreed, 22.50 percent strongly agreed, 2.50 percent could not decide, 27.50 percent disagreed, and 10.0 percent strongly disagreed that those involved in cybercrime are easily recognized by their appearance Question 6 # Nigerian police upon search of a cybercrime suspect phone, request for immediate transfer into his or her personal account before discharging a suspect Section A: youth responses 35.0 percent of the youth respondents agreed, 35.0 percent strongly agreed, 17.50 percent could not decide, 5.0 percent disagreed, and 7.5 percent strongly disagreed that Nigerian police upon search of a cybercrime suspect phone, request for immediate transfer into his or her personal account before discharging a suspect. Section B Response from the police 6.30 percent strongly agreed, 25.0 percent could not decide, while 68.8 percent strongly disagreed that Nigerian police upon search of a cybercrime suspect phone, request for immediate transfer into his or her personal account before discharging a suspect. Section A: youth responses 57.50 percent of the youth respondents agreed, 27.50 percent strongly agreed, 7.50 percent could not decide, 5.0 percent disagreed, and 2.50 percent strongly disagreed that lack of government plan for the outh as increase the hei ht of c bercrime in Ni eria societ . Question 7 # Nigerian police often stop youths on the way and demand for the phones for search Section B Response from the police 56.30 percent of the police respondents agreed, 12.50 percent strongly agreed, 18.80 percent could not decide, 6.30 percent disagreed, and 6.30 percent strongly disagreed that Nigerian police often stop youths on the way and demand for the phones for search. Section A: youth responses 57.5 percent of the youth respondents agreed, 37.50 percent strongly agreed, 2.50 percent could not decide, and 2.50 percent strongly disagreed that Nigerian police often stop youths on the way and demand for the phones for search. Question 8 # Nigerian police contribute to the growth of cybercrime in Nigeria Section A: youth responses 37.50 percent of the youth respondents agreed, 15.0 percent strongly agreed, 30.0 percent could not decide, 15.0 percent disagreed, and 2.50 percent strongly disagreed that Nigerian police contribute to the growth of cybercrime in Nigeria. Section B Response from the police 56.30 percent of the police respondents agreed, 6.30 percent strongly agreed, 6.30 percent could not decide, 18.8 percent disagreed, and 12.50 percent strongly disagreed that Nigerian police contribute to the growth of cybercrime in Nigeria. # Question 9 Cybercrime suspect are usually prosecuted in line with Nigerian law. Section B Response from the police 12.50 percent of the police respondents agreed, 12.50 percent strongly agreed, 37.50 percent disagreed, and 37.50 percent strongly disagreed that cybercrime suspect are usually prosecuted in line with Nigerian law. # Searching one's personal phone by the police is necessary to curb the rate of cybercrime in Nigeria society Section B Response from the police 25.0 percent of the police respondents agreed, 56.3 percent strongly agreed, 6.30 percent disagreed, and 12.50 percent strongly disagreed that searching one's personal phone by the police is necessary to curb the rate of cybercrime in Nigeria society Section A: youth responses 20.0 percent of the youth respondents agreed, 12.50 percent strongly agreed, 17.50 percent could not decide, 22.50 percent disagreed, and 27.50 percent strongly disagreed that searching one's personal phone by the police is necessary to curb the rate of cybercrime in Nigeria society. # Question 11 # Nigeria police are not knowledgeable of the various techniques employed in perpetuating cybercrime in Nigeria Section A:youth responses 35.50 percent of the youth respondents agreed, 37.50 percent strongly agreed, 17.50 percent could not decide, 7.50 percent disagreed, and 2.50 percent strongly disagreed that Nigeria police are not knowledgeable of the various techniques employed in perpetuating cybercrime in Nigeria. Section B Response from the police 50.0 percent of the police respondents agreed, 12.50 percent strongly agreed, 25.0 percent could not decide, and 12.50 percent disagreed that Nigeria police are not knowledgeable of the various techniques employed in perpetuating cybercrime in Nigeria. # Question 12 # Cybercrime cannot be curtailed or reduce by the current Nigeria police despite all their training. Section B Response from the police 37.50 percent of the police respondents agreed, 12.50 percent strongly agreed, 12.5 percent could not decide, and 37.50 percent disagreed that Cybercrime cannot be curtailed or reduce by the current Nigeria police despite all their training. Section A: youth responses 37.50 percent of the youth respondents agreed, 32.50 percent strongly agreed, 17.50 percent could not decide, 2.50 percent disagreed, and 10.0 percent strongly disagreed that Cybercrime cannot be curtailed or reduce by the current Nigeria police despite all their training. Section A: youth responses 35.50 percent of the youth respondents agreed, 37.50 percent strongly agreed, 10.0 percent could not decide, 10.0 percent disagreed, and 7.0 percent strongly disagreed that the Nigerian police need a cybercrime unit, department or division to effectively fight cybercrime in Nigeria. Section B Response from the police 75.0 percent of the police respondents agreed, 37.50 percent strongly agreed, 6.3 percent could not decide, and 6.3 percent disagreed that the Nigerian police need a cybercrime unit, department or division to effectively fight cybercrime in Nigeria. # Question 14 All teenager driving expensive cars are usually first suspect of cybercrime activities. Section A: youth responses 17.50 percent of the youth respondents agreed, 47.50 percent strongly agreed, 5.0 percent could not decide, 17.50 percent disagreed, and 12.50 percent strongly disagreed that all teenager driving expensive cars are usually first suspect of cybercrime activities. Section B Response from the police 43.80 percent of the police respondents agreed, 31.30 percent strongly agreed, and 6.3 percent disagreed that all teenager driving expensive cars are usually first suspect of cybercrime activities # IV. SUMMARY, CONCLUSION AND RECOMMENDATION # F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s F o r A u t h o r s A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r Me mb e r s h i p p r o v i d e a c c e s s t o s c i e n t i f i c i n n o v a t i o n , n e x t g e n e r a t i o n t o o l s , a c c e s s t o c o n f e r e n c e s / s e mi n a r s / s y mp o s i u ms / we b i n a r s , n e t wo r ki n g o p p o r t u n i t i e s , a n d p r i v i l e g e d b e n e f i t s . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . A u t h o r s ma y s u b mi t r e s e a r c h ma n u s c r i p t o r p a p e r wi t h o u t b e i n g a n e x i s t i n g me mb e r o f L J P . On c e a n o n -me mb e r a u t h o r s u bmi t s a r e s e a r c h p a p e r h e / s h e b ec o me s a p a r t o f " P r o v i s i o n a l A u t h o r Me mb e r s h i p " . S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi t h S o c i e t y f l o u r i s h wh e n t wo i n s t i t ut i o n s c o me t o g e t h e r . " Or g a n i z a t i o n s , r e s e a r c h i n s t i t u t e s , a n d u n i v e r s i t i e s c a n j o i n L J P S u b s c r i p t i o n me mb e rs h i p o r p r i v i l e g e d " F e l l o w Me mb e rs h i p " me mb e r s h i p f a c i l i t a t i n g r es e a r c h e r s t o p u b l i s h t h e i r wo r k wi ![reduction???????????(1 a ) ?1?"¸? ??"???? stmsech = stomach search by the police????????.(1 b ) ?2Ï?"?????? bodsech = body search by the police??????????(1 c ) ?3? ? ? ? ? ?Ð?"Ð?" thgsec = things search by the police?????????..(1d) ?4 ??? ppesech = phone search by the police??????????.1e ?5 ??????? premisech = premises search???????????????.1f a00? ? ? ? ? ? = error term???????????????????1g Analytical model ?Ï?"? CBCERD Ï?"Ï?"Ï?" = ?0?????1?"¸? ??"???? stmsech , +?2Ï?"?????? bodsech , + ?3? ? ? ? ? ?Ð?"Ð?" thgsech , + ?4 ??? ppesech , + ?5 ??????? premisech , + ?..a? ? ? ? ? ?)?????????????????????????????(1y) Conceptual model London Journal of Research in Management and Business 4.1 Descriptive Statistics Section A 55.0 percent of the youth respondents were female while 45.0 percent of the youth respondents where male. Furthermore, 20.0 percent are in ages 16 to 20 years, while 57.50 percent were between 21 and 30 years old. Those in age range of 31 to 40 years constitute 22.50 percent of the total respondents. Similarly, 52.50 percent where student of tertiary education, 40.0 percent where self-employed students, 2.50 percent made up dependent students, and 5.0 percent represent other group of students. Comparative Percentage Analysis (CPA) Question 1 Large numbers of Nigerian youth are not involved in cybercrime. Question 2 Cybercrime had become the only means of livelihood of several Nigerian youth Question 3 Lack of government plan for the youth as increase the height of cybercrime in Nigeria society London Journal of Research in Management and Business 90 Volume 23 | Issue 1 | Compilation 1.0 © 2023 London Journals Press Cybercrime Schemes and Search by the Police](image-2.png "") 17![50 percent of the youth respondents agreed, 30.0 percent strongly agreed, 22.50 percent could not decide, 20.0 percent disagreed, and 10.0 percent strongly disagreed that cybercrime suspect are usually prosecuted in line with Nigerian law. London Journal of Research in Management and Business 92 Volume 23 | Issue 1 | Compilation 1.0 © 2023 London Journals Press Cybercrime Schemes and Search by the Police Question 10 Appearance of an individual usually gives the police the impression of who is a cybercrime suspect Section A: youth responses 27.50 percent of the youth respondents agreed, 57.50 percent strongly agreed, 5.0 percent could not decide, 5.0 percent disagreed, and 5.0 percent strongly disagreed that the appearance of an individual usually gives the police the impression of who is a cybercrime suspect. Section B Response from the police 75.0 percent of the police respondents agreed, 18.80 percent strongly agreed, 6.3 percent disagreed appearance of an individual usually gives the police the impression of who is a cybercrime suspect. London Journal of Research in Management and Business 93 Question 11](image-3.png "Section A: youth responses 17 .") 13![Nigerian police need a cybercrime unit, department or division to effectively fight cybercrime in Nigeria London Journal of Research in Management and Business 94 Volume 23 | Issue1 | Compilation 1.0 © 2023 London Journals Press Cybercrime Schemes and Search by the Police](image-4.png "Question 13 The") ![t h u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . u s , b e c o me p e e r r e v i e we r s a n d j o i n u s o n A d v i s o r y B o a r d . S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e to d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r S u b s c r i b e t o d i s t i n g u i s h e d S T M ( s c i e n t i f i c , t e c h n i c a l , a n d me d ic a l ) p u b l i s h e r . S u b s c r i p t i o n me mb e r s h i p i s a v a i l a b l e f o r i n d iv i d u a l s u n i v e r s i t i e s a n d i n s t i t ut i o n s ( p r i n t & o n l i n e ) . S u b s c r i be r s c a n a c c e s s j o u r n a l s f r o m o u r l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e dHa r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . l i b r a r i e s , p u b l i s h e d i n d i f f e r e n t f o r ma t s l i k e P r i n t e d Ha r d c o p y , I n t e r a c t i v e P DF s , E P UB s , e B o o k s , i n d e x a b l e d o c u me n t s a n d t h e a u t h o r ma n a g e d d y n a mi c l i v e we b p a g e a r t i c l e s , L a T e X, P DF s e t c . L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p L o n d o n J o u r n a l P r e s s Me mb e r s h i p F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s F o r A u t h o r s , s u b s c r i b e r s , B o a r d s a n d o r g a n i z a t i o n s L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k . L o n d o n J o u r n a l s P r e s s me mb e r s h i p i s a n e l i t e c o mmu n i t y o f s c h o l a r s , r e s e a r c h e r s , s c i e n t i s t s , p r o f e s s i o n a l s a n d i ns t i t u t i o n s a s s o c i a t e d wi t h a l l t h e ma j o r d i s c i p l i n e s . L o n d o n J o u r n a l s P r e s s me mb e r s h i p s a r e f o r i n d i v i d u a l s , r e s e a r c h i n s t i t u t i o n s , a n d u n i v e r s i t i e s . A u t h o r s , s u b s c r i be r s , E d i t o r i a l B o a r d me mb e r s , A d v i s o r y B o a r d me mb e r s , a n d o r g a n i z a t i o n s a r e a l l p a r t o f me mb e r n e t wo r k .](image-5.png "") ![o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r S u b s c r i b e r s F o r I n st i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n s F o r I n s t i t u t i o n sV Volume 23 | Issue 1 | Compilation 1.0 © 2023 London Journals Press](image-6.png "F") ![](image-7.png "") ![](image-8.png "") unexpected,unrestrained and progressivecorruption and fraudulent activities. Severalstudies (Benford, 1938; Altman, 1968; Beneish,Etuk 2011; 1999; Digabriele, 2009; Enofe et al.,2017; Osagioduwa, 2019, 2020, 2022a, 2022b;Bhasin, 2016; Hegazy, 2017; Kolar, 2013; Quirin,2014) had shown the reality of corruption. TheDATa according toOsagioduwa (SEW AuthorizationSuperior POFA JudgeLondon Journal of Research in Management and BusinessA MagistrateJustice of peace inthe North Also, Premises Search (PPPSS) is a type of search conducted in a charge person's properties, goods, ware houses, or other premises. The goal of premises search is to seize any assets supposed to have been stolen or illegitimately gotten.A POP can only conduct PPPSS with a permission or SEW from a judge, justice of peace of the North, Magistrate, and a superior POF which must be in writing. A superior POFaccording to the Police Act (PACT)is any POF beyond the level of a Cadet assistant Superintendent of Police. In addition, Search of Things (SET) is search performed on items other than PPPSS o person's search. Search Authorization Source: (author's conceptualization, 2022). both sections were analyzed comparatively in thestudy. Fifty-six (56) documents were retrievedfrom both sectional respondents. The analysis waswasdone using response Comparative-The opinions of respondents werePercentage-Techniques(COPTA).Thesought. Cross sectional time horizon wasinvestigator hired the Cronbach's Alpha (CRAP)employed. The study sought the views of twostatistical instrument in determining thedistinct sections with peculiar interpretation ofreliability of the study. copies of organizedcyber crime operationality namely, the youthclose-ended inquiry form (Five Likert Scales(section A) and the police force (section B). theformat. Strongly Agree, Agree, Undecided,non-probabilistic sampling methodology wasDisagree and Strongly Disagree).further embraced in the study.The responses from London Journal of Research in Management and Business 88 Volume 23 | Issue 3 | Compilation 1.0 method. Volume 23 | Issue 1 | Compilation 1.0 © 2023 London Journals Press Cybercrime Schemes and Search by the Police ## G O G R E E N A ND H E L P S A V E T H E E NV ## R E E N A ND H E L P S A V E T H E E NV I R ONME NT G O G R E E N A ND H E L P S A V E T H E E NV I R ONME NT S C A N T O K NOW MOR E S C A N T O K NOW MOR E S C A N T O K NOW MOR E S C A N T O K NOW MOR E S C A N T O K NOW MOR E * Cyber Crimes and Cyber Laws in Nigeria OMaitanmi Ogunlere SAyinde YAdekunle The International Journal Of Engineering And Science (IJES) 2 4 2013 * Norwegian national Manila Bulletin May 1, 2020 * Determinants of Preventing Cyber Crime: a Survey Research MAMaziah International Journal of Management Science and Business Administration 2 7 2016 * URL:dx.doi.org/10.18775/ijmsba.1849-5664-5419.2014.27.1002 10.18775/ijmsb a.1849-5664 -5419. 2014.27.1002 * A Historical Assessment of Cybercrime in Nigeria: Implication for Schools and National Development EMoga AGSalihu R Journal of Research in Humanities and Social Science 9 9 2021 * News Cheap tech and widespread internet access fuel rise in cybersex trafficking June 30, 2018 * Students Perception of Cyber Crime in Edo State: Implications for Teaching and Learning FIOlusi LIAguele POIhumuaibvi RIEdobor Journal of Contemporary Research 6 1 2009 * The effectiveness of the whistle blowing policy in combating corruption in the Nigerian public sector LOOsagioduwa Global Journal of Arts Humanities and Social Science 7 10 2019 * Assessment of challenges of public auditor's independence and report in the public sector of Nigeria LOOsagioduwa Amity Journal of management research 5 1 2022 * Assessment of challenges of public auditor's independence and report in the public sector of Nigeria LOOsagioduwa Amity Journal of management research 5 1 2022b * Post employment benefit: a comparative assessment of the central bank and the police force retirees LOOsagioduwa TEEse OSOgudo London journal of research in management and business 22 5 2022 * Government anti-corrupt instruments unity and prosecution of corrupt public officers. The accounting practitioners' perspective LOOsagioduwa EPMozie OSOgudo NUyi Nigerian journal of management science 23 2 2022 * central bank of Nigeria and the Nigerian economy in the 21 st century LOOsagioduwa OSOgudo F Journal of accounting and management 12 2 2022 * Fraud scheme and fraudulent accountant prosecution LOOsagioduwa IOjiakor E TEsenobor LOdiachi International Journal of Academic Research in Business and Social Science 12 1 2022 * Effective auditors, systematic corruption and the EGAD report: the way forward LOOsagioduwa NUyi OSOgudo EP Gusau journal of accounting and finance 3 2 2022 * Treasury single account effectiveness on corruption control and public organizations efficient administration in Nigeria LOsagioduwa International Journal of Management Studies and Social Science Research 1 5 2019b * Public auditors and detection of corruption in Nigeria LOOsagioduwa SEOkeke T International journal of social and management science 3 2 2020 * The Perceived Importance of Cybercrime Control Among Police Officers: Implications For Combatting Industrial Espionage S.-YPaek MKNalla Y.-TChun JLee 2021 * SPAMALOT: A Toolkit for Consuming Spammers Resources CPPeter MKenneth PTLucasz &Michael W Proceedings of the 3rd Conference on E-mail and Antispam. Available online at www. ceas.org. Police Act Cap P19 LFN the 3rd Conference on E-mail and Antispam. Available online at www. ceas.org. Police Act Cap P19 LFN 2006. 2004 * What is a Cyber Attack? Definition, Examples and Prevention MKPratt 2022 * Global taskforce tackles cybersex child trafficking in the Philippines Reuters London Journal of Research in Management and Business April 15, 2019