CHAPTER ONE
INTRODUCTION
1.1
Background to
the Study
The
advent of Information and Communication Technologies (ICTs) has brought
tremendous innovation in all spheres of human endeavours. Moreover, the
security agents in Nigeria have taken a good advantage of ICTs to Fight Crime and
Insecurity through the use of the ICTs gadgets such as: GSM, internet,
telephones, digital television, cable or satellite, telex, facsimile and
others.
The use
of ICTs has made the job of intelligent security defence very effective,
interesting, easy, faster and more reliable. Information and Communication
Technologies (ICTs) invention or discovery has its link and purpose with the
discovery of Advance Research Project Agency Network (ARPANET) which gave birth
to internet, GSM, social network and others. The ARPANET came into existence as
a result of insecurity, crime and poor communication.
In
1970s, when the cold war was still raging, the U.S Department of Defense was
concerned about the vulnerability of its computer network to nuclear attack. The
pentagon did not want to lose all its computing and communication ability to
one well- placed atomic bomb. Consequently, defense computer experts
decentralized the whole system by creating an inter-connected web of computer
networks.
The
network was designed so that every computer could be connected to another. The information
was bundled in a packet, called an Internet Protocol Packet, (IPP), which
contained the destination address of the target computer. The system that the
pentagon eventually developed was called (ARPANET) Advance Research Project
Agency Network Extracted, from the Dynamics of mass communication by Joseph R.
Dominick.
In the olden days before the invention of ICTs,
information most especially security information was disseminated
interpersonally, sometimes in a group and such communication technology had
instant feedback, neigbours alerted neighbours, town criers, signs and symbols
were used for security purpose.
Historically,
there are recorded channels of communication from the early stage which include:
the family, market place, town criers, churches, village square, signs and
symbols (Oreh, 1984). The early communication instrument despite their
importance and unique roles could not reach a wide range of audience hence the
need to create other means of information dissemination.
So
with the invention of Information and Communication Technologies, information
dissemination became an easy task as one can sit comfortably at home and touch with the
outside world. With the invention of these technologies otherwise known as “New
media” the world became a global village where information are
relayed and feedback are given within minutes.
Mbam
(2002) defined ICT as the application of computer hardware and software
components, telecommunication equipment and electronics in finding solutions to
the multiple problems of mankind. It is one of the most valuable resources or
factors of communication profession. . It is also one of the nervous systems of
modern communication and indeed of the economy which serves as an eye opener to security agents because they will learn to monitor activities of people and in
the same vein imbibe on security consciousness and cultural value.
The
emergence and spread of Information and Communication Technologies as well as
its use in Fighting Crimes and Insecurity has a lot to do with computer
development which is dominated by GSM phones, digital television, cable or
satellite, telex and facsimile e.t.c. Okunna (2000) opined that whenever we
think of Information and Communication Technology our mind fly to the world of
computers, satellites, fax machines, fiber optics, digital networks, and ultimately
the internet.
They
are variously called New Information Technologies (NITs) which makes possible Computer
Mediate Communication (CMC) and have given rise to information highway or
information super highway. All these have to do with the online world which
William Gibson named “Cyber Space” . All of them are simply classified into
computer information mediated communication according to Agber (2000).
Adamu
(2007:223) writes that ICTs deal primarily with the use of electronic computer
and computer software to convert, store, project, process, transmit and
retrieve information from anywhere at anytime. Similarly, Nwodu (2003:5)
describes ICTs as a generic name used to refer to a number of communication
hardware adopted in ensuring instantaneous dissemination of information and
social values across the globe.
1.2
Statement of the
Problem
The
rate of insecurity in Nigeria today is alarming. On daily basis, lives and
properties are wasted due to high level of bribery and corruption, killings,
kidnapping and bombing. The security challenge in Nigeria today makes
government to spend huge amount of money in fighting the scourge. Of course
these are money that otherwise could have been channelled to other areas of
human development.
Meanwhile,
there seem to exist a gap in knowledge on the use of ICTs in Fighting Crimes and
Insecurity challenges in Nigeria. Thus, it became necessary to scientifically
investigate the use of ICTs in fighting crime and insecurity in Nigeria with Abakaliki, Ebonyi State in focus.
The study
is important because if ignored the
increasing spread of crime and insecurity in the country and in the state,
would continue to exist or even escalate, resulting in anarchy, heightened
lawlessness, increased poverty, loss of lives and human resources.
1.3
Objectives of the Study
The general objective of this
study is to study the Impact of Information and Communication Technologies (ICTs)
in Fighting Crimes and Insecurity in Abakaliki Metropolis of Ebonyi State. However,
the specific objectives include:
1.
To
determine the Impact of Information and Communication Technologies in Fighting
Crimes and Insecurity in Abakaliki Ebonyi State.
2.
To
measure the levels in which ICTs have been used by security agents in Fighting Crimes and Insecurity in the area.
3.
To
determine the factors that hamper effective use of ICTs in Fighting Crimes and Insecurity
in Abakaliki, Ebonyi State.
4.
To
determine the practical measures which could be taken to enhance the use of
ICTs in Fighting Crime and Insecurity in
Abakaliki , Ebonyi state.
1.4
Significance of
the Study
The following are the contributions
of the study in terms of knowledge and benefit to the readers:
1.
The
study reveals the actual level ICTs could be used in Fighting Crimes and Insecurity
in Abakaliki, Ebonyi State.
2.
It
highlights the problems and prospects of ICTs use in Abakaliki, Ebonyi State by
security agents.
3.
It
is instrumental to prospective researchers who may wish to go into this or
similar area of study.
4.
It has far-reaching significance to media organisations,
media practitioners, media educators, media students, general public, security
agencies and governments.
1.5
Research
Questions
For the sake of validity,
questions are designed to obtain public opinions and generate ideas which will
serve as a statistical significance for this work. The following research
questions were asked:
1.
Do
ICTs play any role in Fighting Crimes and Insecurity in Abakaliki, Ebonyi State?
2.
What
is the level of application of ICTs by the Ebonyi State security Agents in Fighting
Crime and Insecurity?
3.
What
challenges hamper effective use of ICTs in Fighting Crime and Insecurity in Abakaliki
Ebonyi State?
4.
What practical measures could Abakaliki Ebonyi State
security agents use to Fight Crime and Insecurity?
1.6
Research
Hypothesis
The
following hypothesis were tested
Hypothesis
One
H0: ICTs do not play significant role in Fighting Crime
and Insecurity in Abakaliki Ebonyi
State.
H1: ICTs play significant role in Fighting Crime and
Insecurity in Abakaliki Ebonyi State.
Hypothesis
Two
H0: Security agencies
in Abakaliki Ebonyi State do not use
ICTs to Fight Crime and Insecurity
H1: Security agencies in Abakaliki Ebonyi State
use ICTs to Fight Crime and Insecurity
Hypothesis
Three
H0: There
are no challenges facing the effective use of ICTs in Fighting Crime and Insecurity in Abakaliki Ebonyi State.
H1:
There are challenges facing the effective use of ICTs in Fighting Crime and Insecurity in Abakaliki, Ebonyi
State.
Hypothesis
Four
H0:
No practical measures could enhance the use of ICTs in Fighting Crime and Insecurity in Ebonyi State.
H1:
Some practical measures could be taken to enhance the use of ICTs in Fighting Crimes and Insecurity in Abakaliki, Ebonyi
State.
1.7
Scope of the Study
Really, a study of this nature
should have encompassed the entire security agencies in Nigeria. However, as a
result of insufficient time, money, materials and in order to remain realistic
and avoid ambiguity, the researcher decided to limit the scope of the study to
some selected security agencies in Abakaliki, Ebonyi State. They include:
1.
The Police
2.
The
Military
3.
The
State Security Service (SSS)
4.
Federal
Road Safety and Publics
5.
The
General Publics
1.8
Definition of
Terms
In a study of this nature, the
researcher may run the risk of having the operational terms in the work
interpreted variously and in different perspectives by the readers. Such non-uniformity
in conceptualization affects the readers validity and reliability of the study.
It is in view of this probability that this section is devoted to conceptual clarifications.
Hence, in the conceptual and operational view, the meaning of some words were
examined.
1.
Impact: This means the
strong influence of someone or something involved in activity. In this study,
it is concerned with part played by ICTs in fighting crime and insecurity in
Abakaliki, Ebonyi State.
2.
Information and
Communication Technologies (ICTs):
ICTs according
to Tiamiyu (2003:32) cited in Salawu (2007:18), are those electronic gadgets,
equipment or technologies for creating, acquiring, storing, processing,
communicating and using information. This study is concerned with those used in
the security agencies.
3.
Crime: It simply means those disgusting character and
activities exhibited by some citizens of Nigeria. Oxford advanced learners
dictionary described crime as a serious law breaking to commit or an offence
for which there is severe punishment by law.
4.
Insecurity: It is lack of
confidence or feeling unsafe. That is a state of lack of protection or
security.
5.
Abakaliki, Ebonyi State
CHAPTER TWO
REVIEW
OF RELATED LITERATURE
2.1 Sources of Literature
The
following are where the researcher got her information: Ebonyi State Library,
Abakaliki, Ebonyi State University Library Ishieke, internet, text books, newspapers,
magazines, security agencies and handouts.
2.2 The Review
Information
and Communication Technologies in the recent age has attracted lots of
attentions from social scientist, researchers, academics and other scholars who
contributed so much to the development and wide spreading of Information and Communication
Technologies primarily invented with the purpose of Fighting Crime and Insecurity
since early 1970s when the cold war was still raging and till now.
Our
contemporary scholars have carried out beautiful work to promote the Information
and Communication Technologies roles in Fighting Crime and Insecurity in our country.
Also, several reports on newspapers, magazines, radio and television have been
recorded.
The
literature review is the road map to understand the history and the Impact of
ICTs in Fighting Crime and Insecurity. It serves as a guide to study the importance
for security in Nigeria narrowed down to Abakaliki Ebonyi State and impediment of
Information and Communication Technologies in Fighting Crime and Insecurity in
Abakaliki Ebonyi State. The review showed the positive impact of ICTs and many
other discoveries that help for security purpose.
Literature
review to every researcher is paramount. Roger D. Wiminer and Joseph R.
Dominick (2011:24) stated that any researcher who conducts studies under the
guidelines of scientific research project without first consulting available
literature to learn what has been done, how it was done and what results founds
has done nothing.
2.2.1 Meaning of ICTs
Information and Communication Technologies
are modern information and communication technologies with number of features
that enable us perform wide range of information and communication functions.
The Information and Communication Technologies have been variously referred to
as the New Information Communication Technology (NICT).
The Term “Information and
communication technology” (ICT), describes the integration of two previously
existing disciplines: computing and telecommunications. ICT therefore refers to the convergence of
audio-visual and telephone networks with computer networks, and the technology
encompasses a wide range of activities, ranging from office data processing to
remote control and monitoring of manufacturing robots. It also covers the
cabling infrastructure e.g. fibre optic cables, which carry voice, data and
video communications. A major offshoot of the convergence of information and
communication technology is the emergence of the internet, which is a content
distribution network comprising of a global system of interconnected computer
networks through which data is interchanged. The technology consists of
millions of private and public academic, business and government networks of
both local and global scope which facilitates the dissemination and exchange of
information, and makes divers other forms of non-physical interaction the new
reality.
From modest beginning in the 1990s,
internet penetration and use have continued to grow in Nigeria, and apart from
its impact in the banking and commercial sectors, has become very popular
as a means of communication, through the
electronic mail system, as well as a means of accessing news and information
generally. Also in the health sector, it has impacted diverse aspects of
medical care, including the provision of medical information, diagnosis and
treatment as well as the training of medical personnel.
According
to Akpan (2004:70) all communication technologies used prior to the advent of
computer some of which include: telephone, electronic news gathering camera
analogue, radio and television video, text wireless intercom system etc belong
to the old communication technologies category while the new technologically
modified version of the old technologies are all forms of modern technologies
which facilitate the gathering, processing, storage and retrieval of
communication content or message in new ways. They include the computer, direct
broadcast satellite (DBS), digital radio, Television system, internet, compact
Disc (CD) and Video compact Disc (VCD) among others.
2.2.2. Historical Development of ICTs
Rijsenbrij (2005:3)
cited Adamu (2007:222) explain that the internet is currently the most
important driving force behind the revolution in ICTs. Baran (2007:69), however
records that there are conflicting reports on the historical development of
ICTs.
According to him, one school of
thought believe that as early as 1956, a
Psychologist, Joseph C.R. Licklider, a devotee of Marshal McLuhan’s thinking on
the power of communication technology foresaw linked computers, consuls and
television sets connecting people in a nationwide network. Baran (2002:69)
further writes that scores of computer experts enthused by Licklider’s vision
joined the rush towards the development of what we know today as the internet.
The second school of thought which is perhaps the common one has it that the
internet is a product of the cold war.
According to this school, the U.S Air
Force in 1962, in her quest to maintain the military ability to transfer
information around the country even if a given area was destroyed in an enemy’s
attack, commissioned computer scientists to develop the means to do so. Bara
(2002:69) recorded that it was shortly after the launch of the
sputnik in 1957 by the Soviet Union that the United States felt that her
undisputed supremacy was being challenged. This led to the immediate
establishment of the Advanced Research Project Agency (ARPA), to sponsor and
coordinate sophisticated defense related research.
ARPA commissioned Paul Baran in 1962
to produce a plan that would enable the United States military to maintain
command over its missiles sites and plans if a nuclear attack knocks out their
conventional means of communication. The U.S military thought that a
decentralized communication network was necessary. In that way, no matter where
the bombings occurred, other location would be available to lunch a counter
attack. As part of this plan, Paul Baran introduced what he called packet
switched network. Using Honey well computers at Stanford university of Santa
Barbara and the University of Utah, Paul Baran’s packet switch network went
online in 1969 and was operational and reliable by 1970. In 1972 an engineer
called Ray Tomlinson created the first e-mail programme, he introduced the character.
The word “internet” was however coined by Vinton Cerf of Stanford University
and Robert karn a. U. S. military man in 1974. In 1979, a graduate student at University
of North Carolina, Steve Bellovin created the Usenet.
In 1992, the internet society was chartered
and the same year, the World Wide Web was released. Ticker (1990) cited in Adamu
(2008:223) indicates that, today, there are more than 37 million users of the
internet world wide, serving a seemingly limitless number of persons. Again,
there is yet another line of story which links the history of advancement in
ICTs back to as early as 11 May 1868 when a Chinese, Wang Chinch printed a book
with the movable type in memory of his parents. Quoting Wain Wright (1978:105),
Ufuhu (2008:235) credits the Chinese to have invented the first movable type by
using small blocks each carved independently with one character to make them
interchangeable.
However, John Gutenberg expanded ICTs when he
introduced the moveable type to Europe
in 1454, by setting up his press in Germany to print the papal indulgence, a
document, authorized by the pope to grant forgiveness to sinners. Wain Wright wrote that, Gutenberg his assistants
printed 300 copies of the Bible in 1456 and were sent to pairs for sale, and
few years later, the skill spread to other part of Europe, America and the
world. Other technologies such as the telegraph, telephone, photography, film,
radio, television, computer and internet were later introduced; and today, the
world is still witnessing unending sophisticated advancement in ICTs.
Meanwhile, Uche (1989:191) in Orhewe
(2007:290) argues that “the new ICTs revolution did not start in the 1970s with
the emergence of the information superhighway as some writers claim”. He
contends that since telegraph is an aspect of telecommunications, then, the
revolution in ICTs started as far back as 1832 with the inventions of telegraph
by Samuel Morse. In his words “the term “new” is therefore confusing because it
misleads people to think that early technological inventions relating to
telecommunications like radio, television, film, etc are not new.
It is probably as a result of this
that Dunu and Oraka (2004:96) observed that: the new communication technology
could be explained as meaning the nature of the media of communication is
changing to encompass more specialized media. In the past we could as well
think of newspapers, magazine and books, we could as well think of radio
television broadcasting, but today we have electronics edition of newspapers,
journals and other written materials. This gives the new technology its
distinct advantages.
2.2.3 Appraising ICTs Role in Fighting Crime and Insecurity.
The new technologies offer a lot of benefits
and opportunities for development to the developing countries computer technology
writes Nwabueze (2007:172) in Moyaje et
al is one of the ICTs which are in the heart of development communication
technologies.
The ICTs will not only facilitate the
process of using communication strategies in achieving meaning but accelerated
development with less difficulty across distant area, sometime with bad terrain
or topography for the instance. Direct broadcast satellite makes it possible
for people in wide geography extent and mountainous terrain to receive
television signals. This is the case with some parts of Nigeria where in
addition to poor infrastructure and poor television broadcast system, the terrains
are mountainous and prevent remote area from receiving television signal.
Consequently, Adeyemi Adepetum and
Ralph Omololu Agbena (2012) who described crime and insecurity as human behaviour
condemned by the society which prescribes reward and punishment as the case may
be to show the total abhorrence of crime in any society highlighted need and
role of ICTs when stated that: the growing rate of insecurity in Nigeria
remains a source of worry to stakeholders at different levels of government in
the country. In fact, to experts, it is as if government is losing the battle
against various securities. It has become one case too many, which if not
checked would negate the country’s quest of becoming a major economic power by
2020.
However, experts in Information and Communication
Technologies (ICTs) sector said “Government should heed the call of exploring
the power of ICTs facilities to check the menace. He however spotted the importance of ICTs in Fighting
Insecurity and Crime in our society. Adeyemi and Ralph ( 2012 ) said “that
security lapses” that led to the bombing of the police headquarters in Abuja,
it would not have been possible if the federal government has been told to
leverage ICTs in Fighting against Crime and Insecurity in the country. Former Inspector
General (IGP), Mike Okiro in the Guardian Newspaper of 28 August (2011) urges the
federal government to take advantage of ICTs after inspecting the pilot scheme
and watching the demonstration of the cameras from the control room, which he
described the Ilorin project as a magic. In a recent chat with the Chief
Executive Officer, Telecom Group, Dr. Emmanuel Ekuwem, boasted that ICTs
industry can help establish criminal database with executing agency, specific
graphical user interfaces for use by law enforcement agencies can locate
criminal callers within the cellular networks. We have to enact appropriate
laws for our national cyber-security in order to protect our critical national
information infrastructure because a safe and secured society is a good
business environment.
The role of information and
communication technologies cannot be over emphasized; considering the power of
the technology in Fighting Crime and Insecurity. It is very important to see a
growing State like Ebonyi State embrace the new technology.
2.2.4. Limitations
of ICTs as an Instrument for Fighting Crime and Insecurity.
The adoption of ICTs in Nigeria has
been confronted with many challenges. Nwosu, (2007) highlighted some impediment
which are: lack of infrastructure, absence of ICTs policy or implementation, few
trained or skilled ICTs personnel, poor knowledge of ICTs at all levels from
suppliers to users, financial constraints, corruption and political instability,
wars and fear of insecurity that may caused
by cyber or ICT fraudsters or hackers, poor ICT regularisations is one
of the major limitations or threat to ICTs development.
Information and Communication
Technology has the faster means of sharing, storing, processing and
disseminating information. Telecommunication on technology makes contact
between criminals easier and has added fillip to individual and collective
security. The recent death of Cynthia Osokagu via the activities or suspected
criminals on social media has brought for the good, the bad and the ugly sides
of social networking sites is said to be the most accessible and faster means
of information and communication technologies ICTs. All these pose big
challenge to the ICTs Fighting Crime and Insecurity in Nigeria.
2.2.5 Review of
Related Empirical Works
Many studies have been carried out
on the performance of ICTs in reducing crime and insecurity as well as
corruption. Andersen (2009) estimated the impact of eGovernment on crime and
corruption using the challenges in the CCI index from 1996 to 2006 and found
that different countries’ eGovernment maturity development as measured by the
index of West et al. (2006) was reflected in positive change of CCI, and quite
strongly so. When a country implements more eGovernment there follows a
considerable reduction in corruption. Andersen also tested the effect of the
variables of GDP per capita and the degree of “free press”. The study found that
the growth rate of GDP per capita is always significant, whereas a free press
did not seem to influence changes in crime and corruption.
Shim
and Eom (2009) examined how the two factors social capital (the strength of
positive social relations) and ICT affected corruption and found that both
factors individually had positive effects on crime and corruption control. Shim
and Eon measured corruption by the TI Corruption Perception Index (CPI).
A research conducted by Bailard
(2009) who draws CPI and mobile data from 46 nations over the period 1999-2006
and concludes that a fixed effects regression of panel data reveals a significant
negative correlation between a country’s degree of mobile phone penetration and
its level of corruption. He concludes that ICTs can be used as a veritable tool
in the fight against crime and insecurity in developing nations of the world.
In a similar study done by Onah in 2008,
on “The level of Awareness of Globalization and ICTs Issues Among Selected
Nigerians” the study had the objective of determining the computer literacy
level of Nigerian people. The research findings revealed that many Nigerians (64%)
hear about ICTs and globalization but do not know much about them. The study
further revealed the major problems confronting ICTs development in Nigeria and
Africa to include:
1.
Lack
of infrastructure
2.
Absence
of ICTs policy/Implementation
3.
Few
trained or skilled personnel
4.
Financial
constraints
5.
Corruption
and political instability
6.
Wars
and fear of insecurity, e.t.c.
The study through its findings therefore
authenticates the claims of those scholars who earnestly contend that the level
of use of ICTs in Fighting Crime and Insecurity in Nigeria is still grossly
inadequate.
2.2.6 Theoretical Framework
Technological determinism and diffusion
of innovation theories were used in the theoretical framework of this study.
Technological determinism theory is a
reduction theory that was propounded by Marshal McLuhan in 1962. Technological
determinism which viewed on the uses made of technology are largely determined
by the structure of the technology itself that its functions follow from its
form (Neil post man 2012).
The word diffusion literally means
spread. Rogers and Shoemaker 1971 defined diffusion as the “process by which
innovation spread to the members of a social system.” Maunder (1972) also defined diffusion as the process
whereby information and improved
practices spread from their originating sources to thousands of ultimate users
and adopters.
However, this is not to be confused
with the Inevitability Thesis (Daniel Chandler), which states that once a
technology is introduced into a culture that what follows is the inevitable
development of that technology in view of this, we recommend technological
determinism theory as the suitable for this research work considering the
undisputable roles of ICTs in Fighting Crime and Insecurity in our modern world
most especially in a developing country like Nigeria. A society where there is
high rate of Crime and Insecurity cannot see the light of development. This
however, shows that technological determinism theory describes the place of
information and communication technologies in bringing effective social change.
2.3 Summary of the Review
Information and Communication
Technologies are the various softwares and hardwares that use micro-electronic devices
to store, retrieve and disseminate information in large volume to heterogonous
mass of people, worldwide at very fast rate. They include the Satellite, Telephones,
Telex, Internet, GSM, Digital computer system, microchips, Fax, multimedia
system, e-mail, extranet, CDS, laptop computers and other electronic devices
that have equally revolutionised communication and interaction in the world
community. The Information Technology revolution or the new technologies
provide us with the opportunity of obtaining timely, relevant, appropriate and
adequate information for decision-making in personal and corporate spheres.
The speed, efficiency and
reliability of these devices make them pillar which economic, security, crimes
free zone and political system in the international, national, state and local
community rest. With satellite television, cable circuit television, every part
of the world is linked to all the happenings in other parts are watched
simultaneously and instantaneously, with the GSM one can make and receive calls
anywhere anytime. With the internet, we can obtain information about important
events that enjoy network coverage issues, subjects, organizations speedily,
cheaply, and in minute details.
CHAPTER THREE
METHODOLOGY
3.1 Research Methodology
Research methodology is the
systematic process or procedure designed for generating, collecting and
analyzing the data required for solving a specific research.
The method adopted in this study is Survey
Research Method.
Survey research is defined as a
process of gathering data from targeted population through the questionnaire or
interviews and subjecting such data to statistical analysis for the purpose of
reaching conclusion on subject matter of the study and providing solutions to
identified research problems.
The reason for using the survey method is because
it is the most suitable method for this
study in which people’s opinion and
perception over a given issue such as impact of ICTs in Fighting Crime and Insecurity
will be ascertained.
3.2 Description of Research Population
The study was conducted among the
security agents in Abakaliki metropolis and some randomly selected public
servants to reflect public opinion in this research work. The population of Abakaliki
metropolis according to the 2006 national housing and population census was put
at 141,438 while security agents’ population is 9,500 according to the report
of police public relation office Abakaliki Area command. Thus, the total population of the study is
150,938.
3.3 Sample and Sampling Techniques
The sampling of this study is both
purposive sampling and random sampling techniques: here the respondents are
meant to be selected on the condition that they meet certain criteria. This
means that the researcher is at liberty to judge, select or reject a respondent
who fails to meet specific objectives prescribed by the researcher.
3.4 Sample Size
To determine our simple size, the
researcher used the Taro yemone formular which states that:
S = N
1+n(e)2
Where:
S= Sample
N= Total
population
E= Amount of error at 0.05
S=
150.938
1+150938(0.05)2
150938
378.3
=398.9
Sample
size =399
3.5 Instrument of Data Collection
The instrument designed for this
work is the questionnaire and oral interview. Kotler,(2000:110) a questionnaire
consist of a set questions presented to respondents for their answers.
3.6 Techniques of Data Analysis and
Presentation
The data collected was analyzed and
coded manually using frequency tables, percentages and chi-square. Responses obtained
from respondents were assembled in order to test the potency, validity and
reliability of the result from the study. The reason for using chi-square is to
ascertain whether the tested hypothesis is accepted or rejected. The chi-square
formula is
X2
= ∑ (Oi-Ei)2
X2 = chi-square value
Oi
= Observed frequency
Ei
= Expected frequency
∑
= summation (i.e. sum of)
3.7 Validation
and Reliability of Research Instrument
The
researcher collected data from both primary and secondary sources. The primary
data were gotten from the interviews and responses on the questionnaire administered
to the respondents; while the secondary data were gotten from published
materials and internet.
3.8 Procedures for Data Collection
The
procedure employed in data collection was self administration. The method is
most suitable because it is affordable, easy to carryout and the researcher can
monitor the questionnaire to make sure they properly filled and returned them.
3.9 Data Presentation
The
table below contains the various categories of the security Agencies working in
Abakaliki Metropolis and the selected public servants as well as the number of
questionnaires distributed and collected from them.
QUESTIONNAIRE
TABLE
Respondents
|
Total
distributed
|
Total
lost
|
Total
Return
|
Percentage
|
Police
|
100
|
0
|
100
|
25%
|
The military
|
100
|
0
|
100
|
25%
|
State Security Service
|
59
|
0
|
59
|
15%
|
Federal Road Safety
|
100
|
0
|
100
|
25%
|
(Selected Publics)
Civil Servants
|
40
|
0
|
40
|
10%
|
Total
|
399
|
0
|
399
|
100%
|
Source:
Field Survey, May, 2013.
The above table
shows the outcome of the questionnaire distribution containing the number
distributed, returned and lost as well as the data percentage value from each
set of respondents. The grand total of returned questionnaires is three hundred
and ninety-nine copies. It is used for the analysis.
CHAPTER FOUR
DATA PRESENTATION AND ANALYSIS
Data
gathered through the questionnaires was analyzed in this chapter. Contingency table
was used to analyzed the observed frequency and determine the expected
frequency. After ascertaining the value of both frequencies, the chi-square was
used to test the cause of difference between the two frequencies. This chapter was
sub-divided under two sub-sections to include:
1.
Use
of contingency tables in analysis and test of chi-square.
2.
Interpretation
and discussion of findings.
4.1 Data Analysis Using Contingency Table and
Chi-Square
The
contingency table is a commonest modern method of data analysis in Mass
Communication and other Social Science research. It involves the researcher to
obtain the expected frequency table is Eji=Ri Ci/N
Where= expected frequency in roll I
cell, column J cell.
Ri= Sum of frequencies in roll i
Ci= Sum of frequencies in column J
N= Grand total of frequencies in all the
cells.
On
the other hand, the chi-square test is used and data were classified in frequencies
in percentages and proportions to determine whether the observed and expected
frequencies or situation are the same or different from each other and whether
the difference is due to change.
(Okeke, 2001:233). The formular is X2 = X2 =
Where: X2= chi-square value
Oi= Observed frequency
Ei= Expected frequency
Summation
X2
Below
therefore are contingency data analyzes tables showing the response of the
questionnaire.
Table
I: Sex of Respondents
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
Female
|
109
|
27%
|
2
|
Male
|
290
|
73%
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
The
result in Table 1shows that the male respondents in Abakaliki Metropolis were
290 (73%), while 109 (27%) were female respondents.
Table
2:
Age
Distribution of the Respondents.
Variables
|
Frequency
|
Percentage
|
18-27
|
20
|
5%
|
28-37
|
60
|
15%
|
38-47
|
122
|
3%
|
48 and above
|
197
|
49%
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
The
table shows that 20 (5%) of the respondents in Abakaliki Metropolis are between
age 18-27,60 (15%) of the respondents are between 28-37, 122 (31%) of the
respondents are between 38-47, while 197 (49%) of the respondents are between
age 48 and above.
Table
3: Educational Qualification of the Respondents
Variables
|
Frequency
|
Percentage
|
WASCE/SSCE
|
120
|
30%
|
FLSC
|
100
|
25%
|
OND/NCE
|
80
|
20%
|
HND/BA/BSC and Above
|
99
|
25%
|
Total
|
399
|
100%
|
Source: Field Survey, May, 2013.
Through this
table, it was observed that 120 (30%) of the respondents in Abakaliki
Metropolis are WAEC/SSCE/GCE holders, 100 (25%) were FLSC holders, 80 (20%) were
OND/NCE holders while 99 (25%) were HND/BA/B.SC and above holders.
Table
4:
Occupation of the Respondents
Variables
|
Frequency
|
Percentage
|
Police
|
100
|
25%
|
The military
|
100
|
15%
|
State Security Service
|
59
|
25%
|
Federal Road Safety
|
100
|
25%
|
Public (civil servants)
|
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
The
result in Table 4 shows that police respondents in Abakaliki metropolis were
(25%), the Military were 100 (25%), State Security Servants were 59 (15%), Federal
Road Safety Corps member were 100 (25%) while the publics were 40 (10%).
Table
5:
Respondents who have ever heard about
ICTs.
Variable
|
Frequency
|
Percentage
|
Yes
|
296
|
74%
|
No
|
103
|
26%
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
This
table shows that the respondent in Abakaliki metropolis, that have ever heard
about Information and Communication Technology are 296 (74%) ; while 103 (26%) have not heard about it..
Table
6:
To ascertain whether criminals use ICTs
to perpetrate their crimes.
Variable
|
Frequency
|
Percentage
|
Yes
|
296
|
75%
|
No
|
100
|
25%
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
From the table
above, the number of respondent in Abakaliki metropolis that said yes were 299
(75%) while 100 (25%) said No.
Table
7: List of ICTs known to the respondents
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
GSM
|
168
|
42%
|
2
|
Computer
|
101
|
25%
|
3
|
Internet
|
88
|
22%
|
4
|
CCTV
|
42
|
11%
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
On the
respondents who name some of the ICTs they know, were able to mention GSM 168
(42%), Computer 101 (25%), Internet 88 (22%), and CCTV 42 (11%).
This
shows that only few people are aware of the most important ICTs tool use in Fighting
Crimes which is Circuit Cable Television (CCTV).
Table
8:
To ascertain the relevance of ICTs in
combating Crime and Insecurity.
S/No
|
Variables
|
Frequency
|
Percentage
|
2
|
Yes
|
296
|
74%
|
3
|
No
|
103
|
26%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
On
the respondents reaction to the ICTs relevance in combating Crime and Insecurity
296 (74%) said yes, while 103 (26%) said No. This is an indication that ICTs is
relevant in Fighting Crime and Insecurity in Abakaliki.
Table
9:
If you agree with question (7) above
what are the relevance of ICTs in fighting Crimes and Insecurity?
S/No
|
Variables
|
|
Frequency
|
|
Percentage
|
1
|
It enhances effective, efficient, easy
and interesting security activities
|
|
58
|
|
15%
|
2
|
Greater reliability, easy and profitability
|
|
39
|
|
10%
|
3
|
All of the above
|
|
302
|
|
75%
|
|
Total
|
|
399
|
|
100%
|
Source:
Field Survey, May, 2013.
On
the respondents reaction in support of question 8, 58 (15%) said it enhances
effective, efficient, easy and interesting security activities, 39 (10%) said
greater reliability, easy and profitability while 302 (75%) said all of the
above. The responses gave greater support of ICTs need.
Table
10: To ascertain whether ICTs could help in Fighting Crime and Insecurity?
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
Yes
|
298
|
75%
|
2
|
N0
|
101
|
25%
|
Source:
Field Survey, May, 2013.
The
respondent reaction to the ICTs helps in Fighting Crime and Insecurity 298
(75%) said yes while 101 (25%) said No. There is an indication that the ICTs
can help and cannot help. The implication is that it could be positive or
negative.
Table
11:
The ways ICTs could be used to Fight Crime
and Insecurity in Abakaliki?
S/No.
|
Variables
|
Frequency
|
Percentage
|
1
|
Commercial phone line or GSM
|
88
|
23%
|
2
|
CCTV in public areas
|
68
|
17%
|
3
|
Public Social network
|
70
|
17%
|
4
|
Gave out free SIM card registered
|
44
|
11%
|
5
|
Public E-mail box
|
70
|
17%
|
6
|
Satellite station
|
59
|
15%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
The beauty of
life does not depend on how happy you are, but how happy others are. The 100%
Respondent have different ideas of how the ICTs can be used in Abakaliki.
Table
12:
Measures to solve ICTs challenges in
Fighting Crime and Insecurity.
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
Regulation
|
90
|
23%
|
2
|
Orientation
|
87
|
22%
|
3
|
Government intervention
|
109
|
27%
|
4
|
Education
|
133
|
28%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
The result shows
that 113 (28%) of the respondents recommended education as one of the way to
solve the challenges, 90 (23%) and 87 (22%) answered regulation and orientation
while 109 (27%) said government intervention. This shows that government need
to intervene in the war to solve the ICTs challenges.
Table
13:
To know whether Security agencies in
Ebonyi State have ICTs?
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
Yes
|
290
|
73%
|
2
|
No
|
109
|
27%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
Some security agents who responded No
were 109 (27%) while those that responded Yes were 290 (73%).This shows that
most security agency in Ebonyi State have ICTs.
Table
14:
Security Agents in SSS, Federal Road
Safety, Police, Military and Public named:
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
CCTV
|
88
|
22%
|
2
|
GSM
|
114
|
29%
|
3
|
Internet
|
108
|
27%
|
4
|
Satellite
|
88
|
22%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
The respondents
response on the ICTs use in their institution, 89 (22%) said CCTV, 114 (29%)
said GSM, 108 (22%) said Internet, while 88 (29) said Satellites. This shows
that some institutions have started using ICTs.
Table
15: ICTs lacking in some security agents institution.
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
CCTV
|
207
|
52%
|
2
|
Fax mail
|
61
|
15%
|
3
|
Telegraph
|
101
|
25%
|
4
|
Satellite
|
30
|
8%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
On
the respondent on the ICTs some suppose to have but do not have, 207 (52%)
mentioned CCTV, 61 (15%) mentioned Fax mail, 101 (25%) mentioned Telegraph,
while 30 (8%) mentioned Satellite.
Table
16: To ascertain if respondents have knowledge of ICTs
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
Yes
|
290
|
73%
|
2
|
No
|
109
|
27%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
This
shows the response of the respondent, some who said yes were 290 (73%) while
109 (27%) said No.
This
is to say that most security agents were computer literate.
Table
17: To know whether there are some challenges hampering the effective use of
ICTs in checking Crimes and insecurity in Ebonyi State.
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
Yes
|
333
|
83%
|
2
|
No
|
66
|
17%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
This shows the respondents who
said Yes were 333 (83%) while 66 (17%) said No. this is to say that 83%
response that there are challenges.
Table
18:
The Challenges hampering the effective
use of ICTs in checking Crimes and insecurity in Ebonyi State.
S/No
|
Variables
|
Frequency
|
Percentage
|
A
|
Lack of finance
|
150
|
38
|
B
|
Poor regulation
|
90
|
22%
|
C
|
Lack of orientation
|
59
|
15%
|
D
|
Lack of Education
|
100
|
25%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
From this total, it was discovered
that there are many challenges hampering the effective use if ICTs in Ebonyi
State some respondents mentioned lack of finance were 150 (38%), poor
regulation 90 (22%), lack of orientation 59 (15%) while 100 (25%) mentioned
lack of education.
Table
19: Respondents impression about ICTs
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
Good
|
240
|
60%
|
2
|
Bad
|
159
|
40%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
From
this table, it was showed that some respondent have good impression on ICTs
Industry the number of the respondent were 240 (60%) while 159 (40%) have bad impression
about ICTs industry.
Table
20:
Practical Measures to be taken to
enhance the use of ICTs in Ebonyi State.
S/No
|
Variables
|
Frequency
|
Percentage
|
1
|
Education
|
112
|
28%
|
2
|
Government intervention
|
109
|
27%
|
3
|
Orientation
|
88
|
22%
|
4
|
Regulation
|
90
|
23%
|
|
Total
|
399
|
100%
|
Source:
Field Survey, May, 2013.
In
this table it was discovered that there are measured to solve ICTs challenges.
112 (28%) respondent recommended education, Government intervention 109 (27%),
orientation 88 (22%) and Regulation 90 (23%).
4.2 Research Hypotheses
Hypothesis One
H:0
ICTs are not relevant in Fighting Crimes and Insecurity.
H:1
ICTs are relevant in Fighting Crimes and
Insecurity.
Respondent
|
Yes
|
No
|
Total
|
Police
|
80
(18.45)
|
20
(18.54)
|
100
|
The
military
|
100
(81.45)
|
0
(18.54)
|
100
|
State
Security Service
|
30
(48.05)
|
29
(10.94)
|
59
|
Federal
Road Safety Corps
|
90
(81.45)
|
10
(18.54)
|
100
|
Publics
|
25
(32.58)
|
15
(7.14)
|
40
|
Total
|
325
|
74
|
399
|
Source:
Field Survey, May, 2013.
Chi-square for research question 1 to
get expected frequency, the research made use of
€ij= RT X CT
OT
|
RT = ROLL Total
CT = Column Total
OT = Overall Total
∑ji1=
100 X 325 = 32,500 = 81.45
399 399
∑ji2=
100 X 325 = 32,500 = 81.45
399 399
∑ji3 = 59 X 325 = 19,175 = 48. 5
399 399
∑ji4=
100 X 325 = 32,500 = 81.45
399 399
∑ji5 =
40 X325 = 13000 = 32.58
399 399
∑ji21 = 74X100 =7400 = 18.54
399
399
∑ji22 = 74X100 = 7400 =18.54
399
399
∑ji23 = 74 X9 = 4366 = 10.9
399 399
∑ji24
= 74X100 = 7400 =18.54
399
399
∑ji52
= 74X 40
= 2960 = 7.41
399 399
Summing up all the values you have
81.45+81.45+48.5+81.45+32.58+18.54+18.54+10.9+18.45+7.41
= 399
X2
= ∑(Fij- eij)
∑ji
=(80-81.45)2 + (20-81.54) 2 +(100-81.45) 2 +(0-81.54) 2
+(30-48.5) 2 + (29-10.9) 2
81.45 81.45
81.45 18.54 48.5 10.9
+ (90-81.45)
2 +(10-18.54) 2 +(25-32.58) 2 + (15-7.41) 2
81.45 18.5 32.58 71.41
=
-0.017+0.75+0.22+1+0.38+1.66+0.10+0.46+0.23+1.024 = 5.81
X2 Cal = 5.81
X2 tab, Using 5% level of
significance, Degree of freedom =(R-1) (C-1)
=(5-1) (2-1)
=4X1 =4
X2
0.05 = 12.4
Since the critical value (tabulated) is
greater than the calculated value, we reject the rule hypothesis which says
that ICTS plays relevant roles in fighting crimes and insecurity in Ebonyi
state.
Hypothesis Two
The table below
shows if there is practical measures taken to enhance the use of ICTs in
combating crimes and insecurity in Ebonyi State.
Variables
|
Yes
|
No
|
Total
|
Police
|
70(87.45)
|
30(12.53)
|
100
|
The military
|
80(87.46)
|
20(12.53)
|
100
|
State Security Service
|
59(51.60)
|
0(7.39)
|
59
|
Federal Road Safety Corps
|
100(87.46)
|
2(12.53)
|
100
|
Publics
|
40(34.98)
|
0(5.0)
|
40
|
Total
|
349
|
|
399
|
Source: Field Survey, May, 2013.
RT
X CT
OT
Eji = 100 x 349 = 34.900 = 87.46
399 399
Eji2
= 100 x349 = 34.900 =87.46
399
Eji3
= 59 x349 =20.591 =51.60
399 399
Eji4 =
100 x349 =34.900 =87.46
399 399
Eji5
= 40 x 349 =13.960 =34.98
399 399
Eji12
= 100 x 50 =5.000 = 12.53
399 399
Eji22
=100 x 50 = 5.00 = 12.53
399
Eji32
= 59 x 50 = 2.950 =7.39
399 399
Eji42
= 100 x 50 = 5.000 = 12.53
399
Eji52
= 40 x 50 = 2.000 =
5.0
399 399
Summing up all values you have
87.46+ 87.46 + 51.60 + 87.46 +51.60+87.46+
34.98 + 12.53 + 12.53 + 7.39 + 12.53 + 5.0
=
399
X2 = ∑ (Fij __ ∑ij)2
Eij
= (70 – 87.46)2 + (30 –
12.53)2 + (80 – 87.46)2
+
87.46 12.53 87.39
(20
– 12.53)2 + (59 – 51.60)2 + (0-7.39)2 +
12.53 51.60 7.39
(100-87.46)2 + (2-12.53) +
(40-34.98)2 +
87.46 12.53 34.98
(0-5.0)2
5.0
= - 0.199+ 1.394 + 0.085 + 0.59 + 0.14 +
1 + 0.14 + 0.84 + 0.1435 + 1
X2 cal = 5.53
Using 5 % level of significance
D.F = (R - I) (C - I)
(5-1)
(2-1)
4 X 1 = 4
X2 tabulated = 12.4
Decision
Rule
Therefore since
the critical value (tabulated) is
greater than the calculate value, the researcher accepts the Alternative
hypothesis and rejects the Null hypothesis given by the security agents and
selected publics in Abakaliki Metropolises are the same and that there are practical measures to
enhance the use of ICTS in combating
crimes and insecurity in Ebonyi state.
Discussion
and Interpretation.
The
discussion and interpretation of the findings from the primary research carried
out on the Impact of ICTs in Fighting Crime and Insecurity in Abakaliki
Metropolis was based on the collected and analyzed data.
It
was also discovered that the security agents and some selected publics in
Abakaliki Metropolis were the primary respondents whose opinions and views were
gathered through the questionnaire, by the researcher.
After
due analysis with use of contingency table analysis and chi-square (x2)
test, the outcome of the analysis and chi-square revealed that people strongly
believed that ICTs is the best option that can help in Fighting Crimes and Insecurity Abakaliki Ebonyi State.
The
actual respondents were selected security agents and selected publics in
Abakaliki metropolis: they are police, military, State Security Servants, Federal
Road Safely and Civil Servants.
The
questionnaire table of this analysis showed that 100 respondents were from the police
headquarter, 100 respondents were from the Army command Barrack Nkwoagu, 59 respondents
were from the SSS office at Hilltop, 100 respondents were from federal road
safety of Nig (FRSN) office at pressco, while 40 respondents were from the
selected civil servant at CAS (EBSU) which made up of 399 respondents used in
this study.
The
contingency analysis table treated the leading question and response of the
security agents.
The
first table seeks to know the view of security agents over the ICTs.
The findings shows that they are
strongly believed that with the help of ICTs. The crime and insecurity in
Ebonyi State was calculated totally.
Though
some security agents disbelieved when it was calculated and tested with
chi-square their views shows that they did not believe that ICTs can be used to
Fight Crime and Insecurity in Ebonyi State.
Other
analysed and tested data were on the relevance of ICTs and the challenges
hampering the effective use of ICTs in Fighting Crime and Insecurity in Ebonyi State
their responses were yes and few said No.
To
this effect, majority of them (security agents) were not satisfied that they
did not have some of the sophisticated ICTs gadgets in their offices due to
lack of finance and some did not have the knowledge the of ICTs.
Therefore,
this analysis provided facts and solutions that will be used to overcome the
challenges and to enhance the use of ICTs in every security Agencies to fight
crimes and insecurity in Nigeria as a whole and also it will create a well
positive impact.
CHAPTER FIVE
SUMMARY,
CONCLUSION AND RECOMMENDATIONS
5.1
Summary of Findings
This research was based on the
“Impact of ICTs in Fighting Crime and Insecurity in Abakaliki metropolis,
Ebonyi State. In order to achieve a clear knowledge of the nature of this
study, a review of related works was carried out.
The actual field research was done
with interview and use of questionnaire as an instrument of data collection after
which a critical analysis of gathered data was carried out. The contingency
table and chi-square were used as they have the capacity of analyzing
multi-variable information to provide specific realistic results.
The analysis was brought down to two
(2) hypothesis questions in relation to the topic and objectives of the study.
The result of the data analysis
shows that the selected security
agencies and publics in Abakaliki metropolis are much aware of the use of ICTs
in Fighting Crime and Insecurity in Abakaliki, Ebonyi State.
Data were collected from security
agencies from police headquarters office Abakaliki, military quaters Nkwagu Abakaliki,
State Security Service office at hilltop Abakaliki, Federal Road Safety Office
Abakaliki and from Civil servants in Ebonyi State University (CAS) all in
Ebonyi State.
A good number of them are aware of
ICTs and they have some of them in their offices. And also there are some
challenges that hamper the effective use of ICTs such as poor application, lack
of provision of sophisticated ICTs gadgets and lack of orientation etc.
5.2 Conclusion
Conclusion of this study is quite
encouraging because most of the security agencies are aware of ICTs and they
also strongly believed that with the use of Information Communication
Technologies crime and insecurity will be minimized in Abakaliki metropolis.
However, this work took a
conceptual, contextual and philosophical look at the subject “Information and Communication
Technology in Fighting Crime and Insecurity.
If ICTs revolution can be utilized effectively, it
will serve as an effective communication tools needed in Fighting Crime and
Insecurity in a growing Nation like Nigeria which has been over taken by
incessant bomb blasts at our Churches, police military cantonment, private and
public institutions.
The presence of circuit cable
television, digital Computer, Telegraph, internet and GSM phones if utilized
effectively by security agencies in Abakaliki metropolis can help to reduce crime
and insecurity to the barest minimum. This is because ICTs can breach the communication gap between
the security agents and the publics, since it can store, process, retrieve and
disseminate information.
5.3 Recommendations
The outcome of this research has
prompted the researcher to make some recommendations that would aid further study
and research on the area or related area to this work. Among these
recommendations were those stated as follows:
Further research on the impact of
ICTs in Fighting Crime and Insecurity in Abakaliki metropolis should be carried
out in a comparative form between all the federation security agencies in
Nigeria. This will bring a critical and concrete comparism and analysis if they
are aware of ICTs relevance in Fighting Crime and Insecurity. By so doing it will also reveal
concrete reasons, why ICTs should be used in security offices.
Secondly, since it was discovered
that the impact of ICTs are very relevant in Fighting Crime and Insecurity in
Abakaliki metropolis, further research should focus on how to draw the
attention of both state government and federal government to make provision for
sophisticated ICTs gadgets such as circuit cable which can be mounted at every
strategy corner of the state, it will go a long way to monitor and spot the
activities of hoodlums, criminals and other hiding activities that may pose
threats to human insecurity in the state.
And also the GSM phone Sims card
registration has become one of the vital tools of ICTs. The security agents
should open assessable public phone number for immediate contact where there is
problem of security threat.
Finally, it was also suggested that
government should enroll all the security officials whether military, Police, State
Security Servants, Federal Road Safety Corps members into ICTs training, orientation and
regulation.
The recruitment and appointment of any
security agent should be based on ICTs literacy.
It was believed that these
recommendations if enforced will bring a lasting solution to the role of ICTs
in Fighting Crime and Insecurity in Nigeria not only in Abakalki metropolis.
REFERENCES
Agba,
P.C (2001): Electronic Reporting: Heart of New Communication Age, Enugu, Snaap
Press Ltd.
Andersen,
T. B (2009) ‘ E-Government as an anti-corruption strategy’. Information
Economics and Policy. 1:3, pp 201-210.
Bailard,
C.S., 2009. Mobile Phone Diffusion and Corruption in Africa. Political
Communication 26(3):333-353.
Baran, S. J. (2002). Introduction to mass
communication media literacy and culture
Boston:
McGraw Hill publisher.
Maunder,
A.H (1972). Agricultural Extension- A reference Manual, FAO, Rome, P 69-104.
Nwosu I.E and Soola, O.E (2007) communication
global, ICTs and ecosystem perspectives Enugu: precision publishers limited
York: the McGraw Hill companies.
Ogbuel,
D. (2012). Global trends: seeing and knowing the future: Lagos refiner’s touch
publication
Okunna,
C. (2002): Teaching Mass Communication : A multi-Dimensional Approach, Enugu,
New Generation Books.
Onah,
I. (2007). Level of awareness of globalization and ICTs issues among selected
Nigerians in Eserinune, M.M. (2006).
Patterns of utilization of the Internet and the world Wide Web by Nigerian
Newspapers. In the Nigerian Journal of Communication Vol. 1 No. 1 Nigeria, ACCE.
Onyeka,
U (2006) Manual for writers and Researchers, Enugu: Published by cecta Nigeria
Ltd. Upper chime Avenue New Haven, Enugu.
Onyeka,
U. (2004) Media Technology: issues and trends: Enugu publication Africa link
books
Rijsenbrij,
D.B.B. (2005). The role of ICTs in the 21st Century. www.daanrijsenbrij.com.
Retrieved 12/12/2009.
Rogers,
F.N and Floyd, F. Shoemaker (1971). Communication of Innovations, Free Press,
New York.
Shim,
D.C., and Eom, T.H. (2009)’ Anticorruption effects of information communication
and technology (ICT) and social capital; International
Review of Administrative Sciences,75 (1): 99-116.
Tiamiyu,
M. (2003). Information and Communication Technologies for Social Development
Purposes. Ibadan: Kraift Books Ltd.
Uche,
L.U. (1989). North- South Information Culture. Lagos: Longman Nig Ltd.
Ufuohu-
Biri, E . (2007). Influence of globalization and the ICTs on the Nigerian Mass
Media, in : Nwosu, Oludayo and Soola (Ed.). Communication in global, ICTs and
Ecosystem Perspectives- Insights From Nigeria. Enugu: Precision Publishers
Limited.
West,
D., (2006) ‘ Global E-Government , 2006: Available online at: http://www.insidepolitics.org/egovt06int.pdf,
retrieved 15 September, 2010.
Wimmer,
R.D. and Dominick, J. R. (2006). Mass media research: An introduction Boston:
wadsworth.
Wogu,
J. O.(2008). Introduction theories Nsukka: the University of Nigeria press Ltd
www.daanrisenbriji. Com
Dictionary
Joseph,
D.R (20011), the dynamic of mass communication media in transition. New York the
McGraw Hill companies
Oxford
Advance learner’s (2005) international student’s edition: 7th
edition new York:Oxford university press.
Journals
Tope, J. (2011), New Media and Political
Advertising.
The Punch (2012), the most widely read
newspaper. Abuja (Nig) Limited.
Online Materials.
Rijisenbriji,
D.B.B. (2012). The role of ICTs in the 1st century.
British
Journal of Art and Social Sciences
ISSN:
2046-9578, Vol.5 No 2 (2012)
British
Journal Publishing, Inc 2012
http://www.bjounral.co.uk/BJASS.aspx
Unpublished Material
Nwafor,
K.A. (2010), An Appraisal of ICTs Application in the Nigerian Mass Media A
Study of NTA and the Guardian Newspapers, unpublished Masters’ Degree Project,
UNN, Department of mass communication.
Oko,
M.O. (2006) The Social Impact of New Communication Technologies” A Study of
Abakaliki Residents” Project on BSC. Project.