IMPACT OF ICTS IN FIGHTING CRIME AND INSECURITY IN ABAKALIKI METROPOLIS, EBONYI STATE



CHAPTER ONE
INTRODUCTION
1.1             Background to the Study
The advent of Information and Communication Technologies (ICTs) has brought tremendous innovation in all spheres of human endeavours. Moreover, the security agents in Nigeria have taken a good advantage of ICTs to Fight Crime and Insecurity through the use of the ICTs gadgets such as: GSM, internet, telephones, digital television, cable or satellite, telex, facsimile and others.

The use of ICTs has made the job of intelligent security defence very effective, interesting, easy, faster and more reliable. Information and Communication Technologies (ICTs) invention or discovery has its link and purpose with the discovery of Advance Research Project Agency Network (ARPANET) which gave birth to internet, GSM, social network and others. The ARPANET came into existence as a result of insecurity, crime and poor communication.
In 1970s, when the cold war was still raging, the U.S Department of Defense was concerned about the vulnerability of its computer network to nuclear attack. The pentagon did not want to lose all its computing and communication ability to one well- placed atomic bomb. Consequently, defense computer experts decentralized the whole system by creating an inter-connected web of computer networks.
The network was designed so that every computer could be connected to another. The information was bundled in a packet, called an Internet Protocol Packet, (IPP), which contained the destination address of the target computer. The system that the pentagon eventually developed was called (ARPANET) Advance Research Project Agency Network Extracted, from the Dynamics of mass communication by Joseph R. Dominick.
 In the olden days before the invention of ICTs, information most especially security information was disseminated interpersonally, sometimes in a group and such communication technology had instant feedback, neigbours alerted neighbours, town criers, signs and symbols were used for security purpose.
Historically, there are recorded channels of communication from the early stage which include: the family, market place, town criers, churches, village square, signs and symbols (Oreh, 1984). The early communication instrument despite their importance and unique roles could not reach a wide range of audience hence the need to create other means of information dissemination.
So with the invention of Information and Communication Technologies, information dissemination became an easy task as one can  sit comfortably at home and touch with the outside world. With the invention of these technologies otherwise known as “New media” the world   became a global village where information are relayed and feedback are given within minutes.
Mbam (2002) defined ICT as the application of computer hardware and software components, telecommunication equipment and electronics in finding solutions to the multiple problems of mankind. It is one of the most valuable resources or factors of communication profession. . It is also one of the nervous systems of modern communication and indeed of the economy which  serves as an eye opener to security agents  because they will  learn to monitor activities of people and in the same vein imbibe on security consciousness and cultural value.
The emergence and spread of Information and Communication Technologies as well as its use in Fighting Crimes and Insecurity has a lot to do with computer development which is dominated by GSM phones, digital television, cable or satellite, telex and facsimile e.t.c. Okunna (2000) opined that whenever we think of Information and Communication Technology our mind fly to the world of computers, satellites, fax machines, fiber optics, digital networks, and ultimately the internet.
They are variously called New Information Technologies (NITs) which makes possible Computer Mediate Communication (CMC) and have given rise to information highway or information super highway. All these have to do with the online world which William Gibson named “Cyber Space” . All of them are simply classified into computer information mediated communication according to Agber (2000).
Adamu (2007:223) writes that ICTs deal primarily with the use of electronic computer and computer software to convert, store, project, process, transmit and retrieve information from anywhere at anytime. Similarly, Nwodu (2003:5) describes ICTs as a generic name used to refer to a number of communication hardware adopted in ensuring instantaneous dissemination of information and social values across the globe.

1.2             Statement of the Problem
The rate of insecurity in Nigeria today is alarming. On daily basis, lives and properties are wasted due to high level of bribery and corruption, killings, kidnapping and bombing. The security challenge in Nigeria today makes government to spend huge amount of money in fighting the scourge. Of course these are money that otherwise could have been channelled to other areas of human development.
Meanwhile, there seem to exist a gap in knowledge on the use of ICTs in Fighting Crimes and Insecurity challenges in Nigeria. Thus, it became necessary to scientifically investigate the use of ICTs in fighting crime and insecurity in  Nigeria with Abakaliki, Ebonyi State in focus.
The study is important because if  ignored the increasing spread of crime and insecurity in the country and in the state, would continue to exist or even escalate, resulting in anarchy, heightened lawlessness, increased poverty, loss of lives and  human resources.

1.3              Objectives of the Study
              The general objective of this study is to study the Impact of Information and Communication Technologies (ICTs) in Fighting Crimes and Insecurity in Abakaliki Metropolis of Ebonyi State. However, the specific objectives include:
1.      To determine the Impact of Information and Communication Technologies in Fighting Crimes and Insecurity in Abakaliki Ebonyi State.
2.      To measure the levels in which ICTs have been used by security agents  in Fighting Crimes and Insecurity in the area.
3.      To determine the factors that hamper effective use of ICTs in Fighting Crimes and Insecurity in Abakaliki, Ebonyi State.
4.      To determine the practical measures which could be taken to enhance the use of ICTs in Fighting  Crime and Insecurity in Abakaliki , Ebonyi state.

1.4             Significance of the Study
              The following are the contributions of the study in terms of knowledge and benefit to the readers:
1.      The study reveals the actual level ICTs could be used in Fighting Crimes and Insecurity in Abakaliki, Ebonyi State.
2.      It highlights the problems and prospects of ICTs use in Abakaliki, Ebonyi State by security agents.
3.      It is instrumental to prospective researchers who may wish to go into this or similar area of study.
4.      It  has far-reaching significance to media organisations, media practitioners, media educators, media students, general public, security agencies and governments.
1.5             Research Questions
              For the sake of validity, questions are designed to obtain public opinions and generate ideas which will serve as a statistical significance for this work. The following research questions were asked:
1.      Do ICTs play any role in Fighting Crimes and Insecurity in Abakaliki, Ebonyi State?
2.      What is the level of application of ICTs by the Ebonyi State security Agents in Fighting Crime and Insecurity?
3.      What challenges hamper effective use of ICTs in Fighting Crime and Insecurity in Abakaliki Ebonyi State?
4.      What practical measures could Abakaliki Ebonyi State security agents use to Fight Crime and Insecurity?
1.6             Research Hypothesis
The following hypothesis were tested
                        Hypothesis One
H0:  ICTs do not play significant role in Fighting Crime and Insecurity in Abakaliki          Ebonyi State.
H1:  ICTs play significant role in Fighting Crime and Insecurity in Abakaliki Ebonyi         State.
                        Hypothesis Two
H0: Security agencies in Abakaliki Ebonyi State  do not use ICTs to Fight Crime and        Insecurity
H1:  Security agencies in Abakaliki Ebonyi State use ICTs to Fight Crime and Insecurity

                        Hypothesis Three
  H0: There are no challenges facing the effective use of ICTs in Fighting Crime and         Insecurity in Abakaliki Ebonyi State.
H1: There are challenges facing the effective use of ICTs in Fighting Crime and                 Insecurity in Abakaliki, Ebonyi State.

                        Hypothesis Four
H0: No practical measures could enhance the use of ICTs in Fighting Crime and     Insecurity in Ebonyi State.
H1: Some practical measures could be taken to enhance the use of ICTs in Fighting           Crimes and Insecurity in Abakaliki, Ebonyi State.
1.7             Scope of the Study
            Really, a study of this nature should have encompassed the entire security agencies in Nigeria. However, as a result of insufficient time, money, materials and in order to remain realistic and avoid ambiguity, the researcher decided to limit the scope of the study to some selected security agencies in Abakaliki, Ebonyi  State. They include:
1.       The Police
2.      The Military
3.      The State Security Service (SSS)
4.      Federal Road Safety and Publics
5.      The General Publics

1.8             Definition of Terms
              In a study of this nature, the researcher may run the risk of having the operational terms in the work interpreted variously and in different perspectives by the readers. Such non-uniformity in conceptualization affects the readers validity and reliability of the study. It is in view of this probability that this section is devoted to conceptual clarifications. Hence, in the conceptual and operational view, the meaning of some words were examined.
1.      Impact: This means the strong influence of someone or something involved in activity. In this study, it is concerned with part played by ICTs in fighting crime and insecurity in Abakaliki, Ebonyi State.
2.      Information and Communication Technologies (ICTs):
ICTs according to Tiamiyu (2003:32) cited in Salawu (2007:18), are those electronic gadgets, equipment or technologies for creating, acquiring, storing, processing, communicating and using information. This study is concerned with those used in the security agencies.
3.      Crime:  It simply means those disgusting character and activities exhibited by some citizens of Nigeria. Oxford advanced learners dictionary described crime as a serious law breaking to commit or an offence for which there is severe punishment by law.
4.      Insecurity: It is lack of confidence or feeling unsafe. That is a state of lack of protection or security.
5.      Abakaliki, Ebonyi State
CHAPTER TWO
                        REVIEW OF RELATED LITERATURE
2.1       Sources of Literature
            The following are where the researcher got her information: Ebonyi State Library, Abakaliki, Ebonyi State University Library Ishieke, internet, text books, newspapers, magazines, security agencies and handouts.

2.2       The Review
            Information and Communication Technologies in the recent age has attracted lots of attentions from social scientist, researchers, academics and other scholars who contributed so much to the development and wide spreading of Information and Communication Technologies primarily invented with the purpose of Fighting Crime and Insecurity since early 1970s when the cold war was still raging and till now.
            Our contemporary scholars have carried out beautiful work to promote the Information and Communication Technologies roles in Fighting Crime and Insecurity in our country. Also, several reports on newspapers, magazines, radio and television have been recorded.          
            The literature review is the road map to understand the history and the Impact of ICTs in Fighting Crime and Insecurity. It serves as a guide to study the importance for security in Nigeria narrowed down to Abakaliki Ebonyi State and impediment of Information and Communication Technologies in Fighting Crime and Insecurity in Abakaliki Ebonyi State. The review showed the positive impact of ICTs and many other discoveries that help for security purpose.
            Literature review to every researcher is paramount. Roger D. Wiminer and Joseph R. Dominick (2011:24) stated that any researcher who conducts studies under the guidelines of scientific research project without first consulting available literature to learn what has been done, how it was done and what results founds has done nothing.

2.2.1   Meaning of ICTs   
            Information and Communication Technologies are modern information and communication technologies with number of features that enable us perform wide range of information and communication functions. The Information and Communication Technologies have been variously referred to as the New Information Communication Technology (NICT).
           The Term “Information and communication technology” (ICT), describes the integration of two previously existing disciplines: computing and telecommunications. ICT  therefore refers to the convergence of audio-visual and telephone networks with computer networks, and the technology encompasses a wide range of activities, ranging from office data processing to remote control and monitoring of manufacturing robots. It also covers the cabling infrastructure e.g. fibre optic cables, which carry voice, data and video communications. A major offshoot of the convergence of information and communication technology is the emergence of the internet, which is a content distribution network comprising of a global system of interconnected computer networks through which data is interchanged. The technology consists of millions of private and public academic, business and government networks of both local and global scope which facilitates the dissemination and exchange of information, and makes divers other forms of non-physical interaction the new reality.
           From modest beginning in the 1990s, internet penetration and use have continued to grow in Nigeria, and apart from its impact in the banking and commercial sectors, has become very popular as  a means of communication, through the electronic mail system, as well as a means of accessing news and information generally. Also in the health sector, it has impacted diverse aspects of medical care, including the provision of medical information, diagnosis and treatment as well as the training of medical personnel.
According to Akpan (2004:70) all communication technologies used prior to the advent of computer some of which include: telephone, electronic news gathering camera analogue, radio and television video, text wireless intercom system etc belong to the old communication technologies category while the new technologically modified version of the old technologies are all forms of modern technologies which facilitate the gathering, processing, storage and retrieval of communication content or message in new ways. They include the computer, direct broadcast satellite (DBS), digital radio, Television system, internet, compact Disc (CD) and Video compact Disc (VCD) among others.
           

2.2.2. Historical Development of ICTs
              Rijsenbrij (2005:3) cited Adamu (2007:222) explain that the internet is currently the most important driving force behind the revolution in ICTs. Baran (2007:69), however records that there are conflicting reports on the historical development of ICTs.
              According to him, one school of thought believe  that as early as 1956, a Psychologist, Joseph C.R. Licklider, a devotee of Marshal McLuhan’s thinking on the power of communication technology foresaw linked computers, consuls and television sets connecting people in a nationwide network. Baran (2002:69) further writes that scores of computer experts enthused by Licklider’s vision joined the rush towards the development of what we know today as the internet. The second school of thought which is perhaps the common one has it that the internet is a product of the cold war.
              According to this school, the U.S Air Force in 1962, in her quest to maintain the military ability to transfer information around the country even if a given area was destroyed in an enemy’s attack, commissioned computer scientists to develop the means to do so. Bara (2002:69)  recorded  that it was shortly after the launch of the sputnik in 1957 by the Soviet Union that the United States felt that her undisputed supremacy was being challenged. This led to the immediate establishment of the Advanced Research Project Agency (ARPA), to sponsor and coordinate sophisticated defense related research.
              ARPA commissioned Paul Baran in 1962 to produce a plan that would enable the United States military to maintain command over its missiles sites and plans if a nuclear attack knocks out their conventional means of communication. The U.S military thought that a decentralized communication network was necessary. In that way, no matter where the bombings occurred, other location would be available to lunch a counter attack. As part of this plan, Paul Baran introduced what he called packet switched network. Using Honey well computers at Stanford university of Santa Barbara and the University of Utah, Paul Baran’s packet switch network went online in 1969 and was operational and reliable by 1970. In 1972 an engineer called Ray Tomlinson created the first e-mail programme, he introduced the character. The word “internet” was however coined by Vinton Cerf of Stanford University and Robert karn a. U. S. military man in 1974. In 1979, a graduate student at University of North Carolina, Steve Bellovin created the Usenet.
               In 1992, the internet society was chartered and the same year, the World Wide Web was released. Ticker (1990) cited in Adamu (2008:223) indicates that, today, there are more than 37 million users of the internet world wide, serving a seemingly limitless number of persons. Again, there is yet another line of story which links the history of advancement in ICTs back to as early as 11 May 1868 when a Chinese, Wang Chinch printed a book with the movable type in memory of his parents. Quoting Wain Wright (1978:105), Ufuhu (2008:235) credits the Chinese to have invented the first movable type by using small blocks each carved independently with one character to make them interchangeable.
               However, John Gutenberg expanded ICTs when he introduced the  moveable type to Europe in 1454, by setting up his press in Germany to print the papal indulgence, a document, authorized by the pope to grant forgiveness to sinners. Wain  Wright wrote that, Gutenberg his assistants printed 300 copies of the Bible in 1456 and were sent to pairs for sale, and few years later, the skill spread to other part of Europe, America and the world. Other technologies such as the telegraph, telephone, photography, film, radio, television, computer and internet were later introduced; and today, the world is still witnessing unending sophisticated advancement in ICTs.
              Meanwhile, Uche (1989:191) in Orhewe (2007:290) argues that “the new ICTs revolution did not start in the 1970s with the emergence of the information superhighway as some writers claim”. He contends that since telegraph is an aspect of telecommunications, then, the revolution in ICTs started as far back as 1832 with the inventions of telegraph by Samuel Morse. In his words “the term “new” is therefore confusing because it misleads people to think that early technological inventions relating to telecommunications like radio, television, film, etc are not new.
           It is probably as a result of this that Dunu and Oraka (2004:96) observed that: the new communication technology could be explained as meaning the nature of the media of communication is changing to encompass more specialized media. In the past we could as well think of newspapers, magazine and books, we could as well think of radio television broadcasting, but today we have electronics edition of newspapers, journals and other written materials. This gives the new technology its distinct advantages.

2.2.3 Appraising  ICTs Role in Fighting Crime and Insecurity.
            The new technologies offer a lot of benefits and opportunities for development to the developing countries computer technology writes Nwabueze (2007:172) in Moyaje et al is one of the ICTs which are in the heart of development communication technologies.
           The ICTs will not only facilitate the process of using communication strategies in achieving meaning but accelerated development with less difficulty across distant area, sometime with bad terrain or topography for the instance. Direct broadcast satellite makes it possible for people in wide geography extent and mountainous terrain to receive television signals. This is the case with some parts of Nigeria where in addition to poor infrastructure and poor television broadcast system, the terrains are mountainous and prevent remote area from receiving television signal.
           Consequently, Adeyemi Adepetum and Ralph Omololu Agbena (2012) who described crime and insecurity as human behaviour condemned by the society which prescribes reward and punishment as the case may be to show the total abhorrence of crime in any society highlighted need and role of ICTs when stated that: the growing rate of insecurity in Nigeria remains a source of worry to stakeholders at different levels of government in the country. In fact, to experts, it is as if government is losing the battle against various securities. It has become one case too many, which if not checked would negate the country’s quest of becoming a major economic power by 2020.
However, experts in Information and Communication Technologies (ICTs) sector said “Government should heed the call of exploring the power of ICTs facilities to check the menace. He however spotted   the importance of ICTs in Fighting Insecurity and Crime in our society. Adeyemi and Ralph ( 2012 ) said “that security lapses” that led to the bombing of the police headquarters in Abuja, it would not have been possible if the federal government has been told to leverage ICTs in Fighting against Crime and Insecurity in the country. Former Inspector General (IGP), Mike Okiro in the Guardian Newspaper of 28 August (2011) urges the federal government to take advantage of ICTs after inspecting the pilot scheme and watching the demonstration of the cameras from the control room, which he described the Ilorin project as a magic. In a recent chat with the Chief Executive Officer, Telecom Group, Dr. Emmanuel Ekuwem, boasted that ICTs industry can help establish criminal database with executing agency, specific graphical user interfaces for use by law enforcement agencies can locate criminal callers within the cellular networks. We have to enact appropriate laws for our national cyber-security in order to protect our critical national information infrastructure because a safe and secured society is a good business environment.
            The role of information and communication technologies cannot be over emphasized; considering the power of the technology in Fighting Crime and Insecurity. It is very important to see a growing State like Ebonyi State embrace the new technology.

2.2.4. Limitations of ICTs as an Instrument for Fighting Crime and Insecurity.
            The adoption of ICTs in Nigeria has been confronted with many challenges.  Nwosu, (2007) highlighted some impediment which are: lack of infrastructure, absence of ICTs policy or implementation, few trained or skilled ICTs personnel, poor knowledge of ICTs at all levels from suppliers to users, financial constraints, corruption and political instability, wars and fear of insecurity that may caused  by cyber or ICT fraudsters or hackers, poor ICT regularisations is one of the major limitations or threat to ICTs development.
            Information and Communication Technology has the faster means of sharing, storing, processing and disseminating information. Telecommunication on technology makes contact between criminals easier and has added fillip to individual and collective security. The recent death of Cynthia Osokagu via the activities or suspected criminals on social media has brought for the good, the bad and the ugly sides of social networking sites is said to be the most accessible and faster means of information and communication technologies ICTs. All these pose big challenge to the ICTs Fighting Crime and Insecurity in Nigeria.
2.2.5 Review of Related Empirical Works
            Many studies have been carried out on the performance of ICTs in reducing crime and insecurity as well as corruption. Andersen (2009) estimated the impact of eGovernment on crime and corruption using the challenges in the CCI index from 1996 to 2006 and found that different countries’ eGovernment maturity development as measured by the index of West et al. (2006) was reflected in positive change of CCI, and quite strongly so. When a country implements more eGovernment there follows a considerable reduction in corruption. Andersen also tested the effect of the variables of GDP per capita and the degree of “free press”. The study found that the growth rate of GDP per capita is always significant, whereas a free press did not seem to influence changes in crime and corruption.   
Shim and Eom (2009) examined how the two factors social capital (the strength of positive social relations) and ICT affected corruption and found that both factors individually had positive effects on crime and corruption control. Shim and Eon measured corruption by the TI Corruption Perception Index (CPI).
            A research conducted by Bailard (2009) who draws CPI and mobile data from 46 nations over the period 1999-2006 and concludes that a fixed effects regression of panel data reveals a significant negative correlation between a country’s degree of mobile phone penetration and its level of corruption. He concludes that ICTs can be used as a veritable tool in the fight against crime and insecurity in developing nations of the world.
            In a similar study done by Onah in 2008, on “The level of Awareness of Globalization and ICTs Issues Among Selected Nigerians” the study had the objective of determining the computer literacy level of Nigerian people. The research findings revealed that many Nigerians (64%) hear about ICTs and globalization but do not know much about them. The study further revealed the major problems confronting ICTs development in Nigeria and Africa to include:
1.      Lack of infrastructure
2.      Absence of ICTs policy/Implementation
3.      Few trained or skilled personnel
4.      Financial constraints
5.      Corruption and political instability
6.      Wars and fear of insecurity, e.t.c.
The study through its findings therefore authenticates the claims of those scholars who earnestly contend that the level of use of ICTs in Fighting Crime and Insecurity in Nigeria is still grossly inadequate.
2.2.6     Theoretical Framework
Technological determinism and diffusion of innovation theories were used in the theoretical framework of this study.
Technological determinism theory is a reduction theory that was propounded by Marshal McLuhan in 1962. Technological determinism which viewed on the uses made of technology are largely determined by the structure of the technology itself that its functions follow from its form (Neil post man 2012).
            The word diffusion literally means spread. Rogers and Shoemaker 1971 defined diffusion as the “process by which innovation spread to the members of a social system.”  Maunder (1972) also defined diffusion as the process whereby information and  improved practices spread from their originating sources to thousands of ultimate users and adopters.
            However, this is not to be confused with the Inevitability Thesis (Daniel Chandler), which states that once a technology is introduced into a culture that what follows is the inevitable development of that technology in view of this, we recommend technological determinism theory as the suitable for this research work considering the undisputable roles of ICTs in Fighting Crime and Insecurity in our modern world most especially in a developing country like Nigeria. A society where there is high rate of Crime and Insecurity cannot see the light of development. This however, shows that technological determinism theory describes the place of information and communication technologies in bringing effective social change.
2.3       Summary of the Review
            Information and Communication Technologies are the various softwares and hardwares that use micro-electronic devices to store, retrieve and disseminate information in large volume to heterogonous mass of people, worldwide at very fast rate. They include the Satellite, Telephones, Telex, Internet, GSM, Digital computer system, microchips, Fax, multimedia system, e-mail, extranet, CDS, laptop computers and other electronic devices that have equally revolutionised communication and interaction in the world community. The Information Technology revolution or the new technologies provide us with the opportunity of obtaining timely, relevant, appropriate and adequate information for decision-making in personal and corporate spheres.
            The speed, efficiency and reliability of these devices make them pillar which economic, security, crimes free zone and political system in the international, national, state and local community rest. With satellite television, cable circuit television, every part of the world is linked to all the happenings in other parts are watched simultaneously and instantaneously, with the GSM one can make and receive calls anywhere anytime. With the internet, we can obtain information about important events that enjoy network coverage issues, subjects, organizations speedily, cheaply, and in minute details.

CHAPTER THREE
METHODOLOGY
3.1       Research Methodology
            Research methodology is the systematic process or procedure designed for generating, collecting and analyzing the data required for solving a specific research.
            The method adopted in this study is Survey Research Method.
            Survey research is defined as a process of gathering data from targeted population through the questionnaire or interviews and subjecting such data to statistical analysis for the purpose of reaching conclusion on subject matter of the study and providing solutions to identified research problems.
            The  reason for using the survey method is because it is the most suitable method  for this study in which  people’s opinion and perception over a given issue such as impact of ICTs in Fighting Crime and Insecurity will be ascertained.
3.2        Description of Research Population
The study was conducted among the security agents in Abakaliki metropolis and some randomly selected public servants to reflect public opinion in this research work. The population of Abakaliki metropolis according to the 2006 national housing and population census was put at 141,438 while security agents’ population is 9,500 according to the report of police public relation office Abakaliki Area command.   Thus, the total population of the study is 150,938.
3.3         Sample and Sampling Techniques
            The sampling of this study is both purposive sampling and random sampling techniques: here the respondents are meant to be selected on the condition that they meet certain criteria. This means that the researcher is at liberty to judge, select or reject a respondent who fails to meet specific objectives prescribed by the researcher.
3.4       Sample Size
            To determine our simple size, the researcher used the Taro yemone formular which states that:
S       =              N
             1+n(e)2
Where:
S=   Sample
N= Total population
E=   Amount of error at 0.05
S=        150.938
              1+150938(0.05)2
      150938
      378.3                    =398.9
Sample size       =399
 3.5     Instrument of Data Collection
            The instrument designed for this work is the questionnaire and oral interview. Kotler,(2000:110) a questionnaire consist of a set questions presented to respondents for their answers.
3.6     Techniques of Data Analysis and Presentation
            The data collected was analyzed and coded manually using frequency tables, percentages and chi-square. Responses obtained from respondents were assembled in order to test the potency, validity and reliability of the result from the study. The reason for using chi-square is to ascertain whether the tested hypothesis is accepted or rejected. The chi-square formula is
X2  = ∑ (Oi-Ei)2
X2  = chi-square value
Oi = Observed frequency
Ei = Expected frequency
∑ = summation (i.e. sum of)

3.7         Validation and Reliability of Research Instrument
            The researcher collected data from both primary and secondary sources. The primary data were gotten from the interviews and responses on the questionnaire administered to the respondents; while the secondary data were gotten from published materials and internet.

3.8        Procedures for Data Collection
            The procedure employed in data collection was self administration. The method is most suitable because it is affordable, easy to carryout and the researcher can monitor the questionnaire to make sure they properly filled and returned them.

3.9       Data Presentation
            The table below contains the various categories of the security Agencies working in Abakaliki Metropolis and the selected public servants as well as the number of questionnaires distributed and collected from them.

QUESTIONNAIRE TABLE     
Respondents
Total distributed
Total lost
Total Return
Percentage
Police
100
0
100
25%
The military
100
0
100
25%
State Security Service
59
0
59
15%
Federal Road Safety
100
0
100
25%
(Selected Publics)
Civil Servants
40
0
40
10%
Total
399
0
399
100%
Source: Field Survey, May, 2013.
The above table shows the outcome of the questionnaire distribution containing the number distributed, returned and lost as well as the data percentage value from each set of respondents. The grand total of returned questionnaires is three hundred and ninety-nine copies. It is used for the analysis.

CHAPTER FOUR
DATA PRESENTATION AND ANALYSIS
           
            Data gathered through the questionnaires was analyzed in this chapter. Contingency table was used to analyzed the observed frequency and determine the expected frequency. After ascertaining the value of both frequencies, the chi-square was used to test the cause of difference between the two frequencies. This chapter was sub-divided under two sub-sections to include:
1.      Use of contingency tables in analysis and test of chi-square.
2.      Interpretation and discussion of findings.

4.1       Data Analysis Using Contingency Table and Chi-Square
            The contingency table is a commonest modern method of data analysis in Mass Communication and other Social Science research. It involves the researcher to obtain the expected frequency table is Eji=Ri Ci/N
Where= expected frequency in roll I cell, column J cell.
Ri= Sum of frequencies in roll i
Ci= Sum of frequencies in column J
N= Grand total of frequencies in all the cells.
            On the other hand, the chi-square test is used and data were classified in frequencies in percentages and proportions to determine whether the observed and expected frequencies or situation are the same or different from each other and whether the difference is due to change.
(Okeke, 2001:233). The formular is X2  = X2  =
Where: X2= chi-square value
              Oi= Observed frequency
             Ei= Expected frequency
            Summation X2
            Below therefore are contingency data analyzes tables showing the response of the questionnaire.
Table I: Sex of Respondents
S/No
Variables
Frequency
Percentage
1
Female
109
27%
2
Male
290
73%
Total
399
100%
Source: Field Survey, May, 2013.
            The result in Table 1shows that the male respondents in Abakaliki Metropolis were 290 (73%), while 109 (27%) were female respondents.
Table 2:  Age Distribution of the Respondents.
Variables
Frequency
Percentage
18-27
20
5%
28-37
60
15%
38-47
122
3%
48 and above
197
49%
Total
399
100%
            Source: Field Survey, May, 2013.
            The table shows that 20 (5%) of the respondents in Abakaliki Metropolis are between age 18-27,60 (15%) of the respondents are between 28-37, 122 (31%) of the respondents are between 38-47, while 197 (49%) of the respondents are between age 48 and above.
Table 3:  Educational Qualification of the Respondents
Variables
Frequency
Percentage
WASCE/SSCE
120
30%
FLSC
100
25%
OND/NCE
80
20%
HND/BA/BSC and Above
99
25%
Total
399
100%
 Source: Field Survey, May, 2013.

Through this table, it was observed that 120 (30%) of the respondents in Abakaliki Metropolis are WAEC/SSCE/GCE holders, 100 (25%) were FLSC holders, 80 (20%) were OND/NCE holders while 99 (25%) were  HND/BA/B.SC and above holders.
Table 4: Occupation of the Respondents
Variables
Frequency
Percentage
Police
100
25%
The military
100
15%
State Security Service
59
25%
Federal Road Safety 
100
25%
Public (civil servants)


Total
399
100%
Source: Field Survey, May, 2013.

            The result in Table 4 shows that police respondents in Abakaliki metropolis were (25%), the Military were 100 (25%), State Security Servants were 59 (15%), Federal Road Safety Corps member were 100 (25%) while the publics were 40 (10%).

Table 5: Respondents who have ever heard about ICTs.
Variable
Frequency
Percentage
Yes
296
74%
No
103
26%
Total
399
100%
Source: Field Survey, May, 2013.
            This table shows that the respondent in Abakaliki metropolis, that have ever heard about Information and Communication Technology are 296 (74%) ; while 103 (26%)  have not heard about it..
Table 6: To ascertain whether criminals use ICTs to perpetrate their crimes.
Variable
Frequency
Percentage
Yes
296
75%
No
100
25%
Total
399
100%
Source: Field Survey, May, 2013.
From the table above, the number of respondent in Abakaliki metropolis that said yes were 299 (75%) while 100 (25%) said No.



Table 7: List of  ICTs known to the respondents
S/No
Variables
Frequency
Percentage
1
GSM
168
42%
2
Computer
101
25%
3
Internet
88
22%
4
CCTV
42
11%
            Total
399
100%
Source: Field Survey, May, 2013.
On the respondents who name some of the ICTs they know, were able to mention GSM 168 (42%), Computer 101 (25%), Internet 88 (22%), and CCTV 42 (11%).
            This shows that only few people are aware of the most important ICTs tool use in Fighting Crimes which is Circuit Cable Television (CCTV).
Table 8: To ascertain the relevance of ICTs in combating Crime and Insecurity.
S/No
Variables
Frequency
Percentage
2
Yes
296
74%
3
No
103
26%

Total
399
100%
Source: Field Survey, May, 2013.

            On the respondents reaction to the ICTs relevance in combating Crime and Insecurity 296 (74%) said yes, while 103 (26%) said No. This is an indication that ICTs is relevant in Fighting Crime and Insecurity in Abakaliki.

Table 9: If you agree with question (7) above what are the relevance of ICTs in fighting Crimes and Insecurity?
S/No
Variables

Frequency

Percentage
1
It enhances effective, efficient, easy and interesting security activities

58

15%
2
Greater reliability, easy and profitability

39

10%
3
All of the above

302

75%

Total

399

100%
Source: Field Survey, May, 2013.
            On the respondents reaction in support of question 8, 58 (15%) said it enhances effective, efficient, easy and interesting security activities, 39 (10%) said greater reliability, easy and profitability while 302 (75%) said all of the above. The responses gave greater support of ICTs need.



Table 10: To ascertain whether ICTs could help in Fighting Crime and Insecurity?
S/No
Variables
Frequency
Percentage
1
Yes
298
75%
2
N0
101
25%
Source: Field Survey, May, 2013.
            The respondent reaction to the ICTs helps in Fighting Crime and Insecurity 298 (75%) said yes while 101 (25%) said No. There is an indication that the ICTs can help and cannot help. The implication is that it could be positive or negative.
Table 11: The ways ICTs could be used to Fight Crime and Insecurity in Abakaliki?
S/No.
Variables
Frequency
Percentage
1
Commercial phone line or GSM
88
23%
2
CCTV in public areas
68
17%
3
Public Social network
70
17%
4
Gave out free SIM  card registered
44
11%
5
Public E-mail box
70
17%
6
Satellite station
59
15%

Total
399
100%
Source: Field Survey, May, 2013.
The beauty of life does not depend on how happy you are, but how happy others are. The 100% Respondent have different ideas of how the ICTs can be used in Abakaliki.


Table 12: Measures to solve ICTs challenges in Fighting  Crime and Insecurity.
S/No
Variables
Frequency
Percentage
1
Regulation
90
23%
2
Orientation
87
22%
3
Government intervention
109
27%
4
Education
133
28%

Total
399
100%
Source: Field Survey, May, 2013.
The result shows that 113 (28%) of the respondents recommended education as one of the way to solve the challenges, 90 (23%) and 87 (22%) answered regulation and orientation while 109 (27%) said government intervention. This shows that government need to intervene in the war to solve the ICTs challenges.
Table 13: To know whether Security agencies in Ebonyi State have ICTs?
S/No
Variables
Frequency
Percentage
1
Yes
290
73%
2
No
109
27%

Total
399
100%
Source: Field Survey, May, 2013.

            Some security agents who responded No were 109 (27%) while those that responded Yes were 290 (73%).This shows that most security agency in Ebonyi State have ICTs.

Table 14: Security Agents in SSS, Federal Road Safety, Police, Military and Public named:
S/No
Variables
Frequency
Percentage
1
CCTV
88
22%
2
GSM
114
29%
3
Internet
108
27%
4
Satellite
88
22%

Total
399
100%
Source: Field Survey, May, 2013.

The respondents response on the ICTs use in their institution, 89 (22%) said CCTV, 114 (29%) said GSM, 108 (22%) said Internet, while 88 (29) said Satellites. This shows that some institutions have started using ICTs.
Table 15: ICTs lacking in some security agents institution.
S/No
Variables
Frequency
Percentage
1
CCTV
207
52%
2
Fax mail
61
15%
3
Telegraph
101
25%
4
Satellite
30
8%

Total
399
100%
Source: Field Survey, May, 2013.

            On the respondent on the ICTs some suppose to have but do not have, 207 (52%) mentioned CCTV, 61 (15%) mentioned Fax mail, 101 (25%) mentioned Telegraph, while 30 (8%) mentioned Satellite.
Table 16: To ascertain if respondents have knowledge of ICTs
S/No
Variables
Frequency
Percentage
1
Yes
290
73%
2
No
109
27%

Total
399
100%
Source: Field Survey, May, 2013.

            This shows the response of the respondent, some who said yes were 290 (73%) while 109 (27%) said No.
            This is to say that most security agents were computer literate.

Table 17: To know whether there are some challenges hampering the effective use of ICTs in checking Crimes and insecurity in Ebonyi State.
S/No
Variables
Frequency
Percentage
1
Yes
333
83%
2
No
66
17%

Total
399
100%
Source: Field Survey, May, 2013.
            This shows the respondents who said Yes were 333 (83%) while 66 (17%) said No. this is to say that 83% response that there are challenges.

Table 18: The Challenges hampering the effective use of ICTs in checking Crimes and insecurity in Ebonyi State.
S/No
Variables
Frequency
Percentage
A
Lack of finance
150
38
B
Poor regulation
90
22%
C
Lack of orientation
59
15%
D
Lack of Education
100
25%

Total
399
100%
Source: Field Survey, May, 2013.

            From this total, it was discovered that there are many challenges hampering the effective use if ICTs in Ebonyi State some respondents mentioned lack of finance were 150 (38%), poor regulation 90 (22%), lack of orientation 59 (15%) while 100 (25%) mentioned lack of education.
Table 19: Respondents impression about ICTs
S/No
Variables
Frequency
Percentage
1
Good
240
60%
2
Bad
159
40%

Total
399
100%
Source: Field Survey, May, 2013.
            From this table, it was showed that some respondent have good impression on ICTs Industry the number of the respondent were 240 (60%) while 159 (40%) have bad impression about ICTs industry.
Table 20: Practical Measures to be taken to enhance the use of ICTs in Ebonyi State.
S/No
Variables
Frequency
Percentage
1
Education
112
28%
2
Government intervention
109
27%
3
Orientation
88
22%
4
Regulation
90
23%

Total
399
100%
Source: Field Survey, May, 2013.

            In this table it was discovered that there are measured to solve ICTs challenges. 112 (28%) respondent recommended education, Government intervention 109 (27%), orientation 88 (22%) and Regulation 90 (23%).

4.2       Research Hypotheses
Hypothesis One
            H:0 ICTs are not relevant in Fighting Crimes and Insecurity.
            H:1 ICTs are relevant in Fighting  Crimes and Insecurity.


Respondent
Yes
No
Total
Police
80 (18.45)
20 (18.54)
100
The military
100 (81.45)
0 (18.54)
100
State Security Service
30 (48.05)
29 (10.94)
59
Federal Road Safety Corps
90 (81.45)
10 (18.54)
100
Publics
25 (32.58)
15 (7.14)
40
Total
325
74
399











Source: Field Survey, May, 2013.
Chi-square for research question 1 to get expected frequency, the research made use of
€ij= RT X CT
OT
 
RT = ROLL Total
CT = Column Total
OT = Overall Total
∑ji1= 100 X 325 = 32,500 = 81.45
          399                   399

ji2= 100 X 325 = 32,500 = 81.45
          399                   399


∑ji3 = 59 X 325 = 19,175                 = 48. 5
               399              399
∑ji4= 100 X 325 = 32,500              = 81.45
          399                   399

∑ji5 = 40 X325 = 13000                  = 32.58
   399              399

∑ji21  = 74X100 =7400                    = 18.54
    399         399

∑ji22  = 74X100 = 7400                   =18.54
    399          399

∑ji23  = 74 X9 = 4366                      = 10.9
  399         399

∑ji24 = 74X100 = 7400                    =18.54
    399           399

∑ji52 =   74X 40    =  2960                = 7.41
             399                     399

Summing up all the values you have
81.45+81.45+48.5+81.45+32.58+18.54+18.54+10.9+18.45+7.41 = 399

X2  = ∑(Fij- eij)
                 ∑ji

=(80-81.45)2   + (20-81.54) 2   +(100-81.45) 2       +(0-81.54) 2  +(30-48.5) 2  + (29-10.9) 2 
      81.45                    81.45                  81.45                      18.54              48.5                10.9
               
+ (90-81.45) 2  +(10-18.54) 2  +(25-32.58) 2           + (15-7.41) 2                   
        81.45                       18.5             32.58                   71.41

= -0.017+0.75+0.22+1+0.38+1.66+0.10+0.46+0.23+1.024 = 5.81

X2  Cal = 5.81

X2 tab, Using 5% level of significance, Degree of freedom =(R-1)     (C-1)
                                                                                                                 =(5-1)        (2-1)
                                                                                                                 =4X1         =4
                                                                                                X2 0.05 = 12.4
Since the critical value (tabulated) is greater than the calculated value, we reject the rule hypothesis which says that ICTS plays relevant roles in fighting crimes and insecurity in Ebonyi state.


Hypothesis Two
The table below shows if there is practical measures taken to enhance the use of ICTs in combating crimes and insecurity in Ebonyi State.

Variables
Yes
No
Total
Police
70(87.45)
30(12.53)
100
The military
80(87.46)
20(12.53)
100
State Security Service
59(51.60)
0(7.39)
59
Federal Road Safety Corps
100(87.46)
2(12.53)
100
Publics
40(34.98)
0(5.0)
40
Total
349

399
  Source: Field Survey, May, 2013.

RT X CT
   OT

Eji = 100 x 349         = 34.900        = 87.46
              399                     399

Eji2 = 100 x349         = 34.900        =87.46
                 399

Eji3 = 59 x349           =20.591         =51.60
                399                   399

Eji4 = 100 x349         =34.900         =87.46
               399                   399

Eji5 = 40 x 349          =13.960         =34.98
                399                   399          
           
Eji12 = 100 x 50        =5.000            = 12.53
                    399            399

Eji22 =100 x 50         = 5.00             = 12.53
                399

Eji32 = 59 x 50          = 2.950           =7.39
               399                   399

Eji42 =   100 x 50 = 5.000                = 12.53
                399

Eji52 =  40 x 50 =    2.000                = 5.0
              399               399

Summing up all values you have
87.46+ 87.46 + 51.60 + 87.46 +51.60+87.46+ 34.98 + 12.53 + 12.53 + 7.39 + 12.53 + 5.0
= 399
X2 =  ∑ (Fij __ ∑ij)2
                             Eij

= (70 – 87.46)2 + (30 – 12.53)2 +       (80 – 87.46)2 +
        87.46                    12.53                                 87.39                

(20 – 12.53)2 + (59 – 51.60)2 + (0-7.39)2 +
   12.53                   51.60                7.39

(100-87.46)2 + (2-12.53) + (40-34.98)2 +
     87.46                12.53          34.98

(0-5.0)2
  5.0
= - 0.199+ 1.394 + 0.085 + 0.59 + 0.14 + 1 + 0.14 + 0.84 + 0.1435 + 1
X2  cal = 5.53
Using 5 % level of significance
D.F = (R - I) (C - I)
 (5-1)   (2-1)
4 X 1 = 4

X2 tabulated = 12.4

Decision Rule
Therefore since the critical value  (tabulated) is greater than the calculate value, the researcher accepts the Alternative hypothesis and rejects the Null hypothesis given by the security agents and selected publics in Abakaliki Metropolises are the same  and that there are practical measures to enhance the  use of ICTS in combating crimes and insecurity in Ebonyi state.

Discussion and Interpretation.
            The discussion and interpretation of the findings from the primary research carried out on the Impact of ICTs in Fighting Crime and Insecurity in Abakaliki Metropolis was based on the collected and analyzed data.
            It was also discovered that the security agents and some selected publics in Abakaliki Metropolis were the primary respondents whose opinions and views were gathered through the questionnaire, by the researcher.
            After due analysis with use of contingency table analysis and chi-square (x2) test, the outcome of the analysis and chi-square revealed that people strongly believed that ICTs is the best option that can help in  Fighting Crimes and Insecurity  Abakaliki  Ebonyi State.
            The actual respondents were selected security agents and selected publics in Abakaliki metropolis: they are police, military, State Security Servants, Federal Road Safely and Civil Servants.
            The questionnaire table of this analysis showed that 100 respondents were from the police headquarter, 100 respondents were from the Army command Barrack Nkwoagu, 59 respondents were from the SSS office at Hilltop, 100 respondents were from federal road safety of Nig (FRSN) office at pressco, while 40 respondents were from the selected civil servant at CAS (EBSU) which made up of 399 respondents used in this study.
            The contingency analysis table treated the leading question and response of the security agents.
            The first table seeks to know the view of security agents over the ICTs.
The findings shows that they are strongly believed that with the help of ICTs. The crime and insecurity in Ebonyi State was calculated totally.
            Though some security agents disbelieved when it was calculated and tested with chi-square their views shows that they did not believe that ICTs can be used to Fight Crime and Insecurity in Ebonyi State.
            Other analysed and tested data were on the relevance of ICTs and the challenges hampering the effective use of ICTs in Fighting Crime and Insecurity in Ebonyi State their responses were yes and few said No.
            To this effect, majority of them (security agents) were not satisfied that they did not have some of the sophisticated ICTs gadgets in their offices due to lack of finance and some did not have the knowledge the of ICTs.
            Therefore, this analysis provided facts and solutions that will be used to overcome the challenges and to enhance the use of ICTs in every security Agencies to fight crimes and insecurity in Nigeria as a whole and also it will create a well positive impact.
           

CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1       Summary of Findings
            This research was based on the “Impact of ICTs in Fighting Crime and Insecurity in Abakaliki metropolis, Ebonyi State. In order to achieve a clear knowledge of the nature of this study, a review of related works was carried out.
            The actual field research was done with interview and use of questionnaire as an instrument of data collection after which a critical analysis of gathered data was carried out. The contingency table and chi-square were used as they have the capacity of analyzing multi-variable information to provide specific realistic results.
            The analysis was brought down to two (2) hypothesis questions in relation to the topic and objectives of the study.
            The result of the data analysis shows  that the selected security agencies and publics in Abakaliki metropolis are much aware of the use of ICTs in Fighting Crime and Insecurity in Abakaliki, Ebonyi State.
            Data were collected from security agencies from police headquarters office Abakaliki, military quaters Nkwagu Abakaliki, State Security Service office at hilltop Abakaliki, Federal Road Safety Office Abakaliki and from Civil servants in Ebonyi State University (CAS) all in Ebonyi State.
            A good number of them are aware of ICTs and they have some of them in their offices. And also there are some challenges that hamper the effective use of ICTs such as poor application, lack of provision of sophisticated ICTs gadgets and lack of orientation etc.
5.2 Conclusion
            Conclusion of this study is quite encouraging because most of the security agencies are aware of ICTs and they also strongly believed that with the use of Information Communication Technologies crime and insecurity will be minimized in Abakaliki metropolis.
            However, this work took a conceptual, contextual and philosophical look at the subject “Information and Communication Technology in Fighting Crime and Insecurity.
If ICTs  revolution can be utilized effectively, it will serve as an effective communication tools needed in Fighting Crime and Insecurity in a growing Nation like Nigeria which has been over taken by incessant bomb blasts at our Churches, police military cantonment, private and public institutions.
            The presence of circuit cable television, digital Computer, Telegraph, internet and GSM phones if utilized effectively by security agencies in Abakaliki metropolis can help to reduce crime and insecurity to the barest minimum. This is because  ICTs can breach the communication gap between the security agents and the publics, since it can store, process, retrieve and disseminate information.
5.3 Recommendations
            The outcome of this research has prompted the researcher to make some recommendations that would aid further study and research on the area or related area to this work. Among these recommendations were those stated as follows:
            Further research on the impact of ICTs in Fighting Crime and Insecurity in Abakaliki metropolis should be carried out in a comparative form between all the federation security agencies in Nigeria. This will bring a critical and concrete comparism and analysis if they are aware of ICTs relevance in Fighting Crime and Insecurity.          By so doing it will also reveal concrete reasons, why ICTs should be used in security offices.
            Secondly, since it was discovered that the impact of ICTs are very relevant in Fighting Crime and Insecurity in Abakaliki metropolis, further research should focus on how to draw the attention of both state government and federal government to make provision for sophisticated ICTs gadgets such as circuit cable which can be mounted at every strategy corner of the state, it will go a long way to monitor and spot the activities of hoodlums, criminals and other hiding activities that may pose threats to human insecurity in the state.
            And also the GSM phone Sims card registration has become one of the vital tools of ICTs. The security agents should open assessable public phone number for immediate contact where there is problem of security threat.
            Finally, it was also suggested that government should enroll all the security officials whether military, Police, State Security Servants, Federal Road Safety Corps members  into ICTs training, orientation and regulation.
             The recruitment and appointment of any security agent should be based on ICTs literacy.
            It was believed that these recommendations if enforced will bring a lasting solution to the role of ICTs in Fighting Crime and Insecurity in Nigeria not only in Abakalki metropolis.       
            
REFERENCES
Agba, P.C (2001): Electronic Reporting: Heart of New Communication Age, Enugu, Snaap Press Ltd.

Andersen, T. B (2009) ‘ E-Government as an anti-corruption strategy’. Information Economics and Policy. 1:3, pp 201-210.

Bailard, C.S., 2009. Mobile Phone Diffusion and Corruption in Africa. Political Communication 26(3):333-353.

 Baran, S. J. (2002). Introduction to mass communication media literacy and culture
Boston: McGraw Hill publisher.

Maunder, A.H (1972). Agricultural Extension- A reference Manual, FAO, Rome, P 69-104.

Nwosu  I.E and Soola, O.E (2007) communication global, ICTs and ecosystem perspectives Enugu: precision publishers limited York: the McGraw Hill companies.

Ogbuel, D. (2012). Global trends: seeing and knowing the future: Lagos refiner’s touch publication
Okunna, C. (2002): Teaching Mass Communication : A multi-Dimensional Approach, Enugu, New Generation Books.

Onah, I. (2007). Level of awareness of globalization and ICTs issues among selected Nigerians in Eserinune, M.M.  (2006). Patterns of utilization of the Internet and the world Wide Web by Nigerian Newspapers. In the Nigerian Journal of Communication Vol. 1 No. 1 Nigeria, ACCE.

Onyeka, U (2006) Manual for writers and Researchers, Enugu: Published by cecta Nigeria Ltd. Upper chime Avenue New Haven, Enugu.

Onyeka, U. (2004) Media Technology: issues and trends: Enugu publication Africa link books
Rijsenbrij, D.B.B. (2005). The role of ICTs in the 21st Century. www.daanrijsenbrij.com. Retrieved 12/12/2009.

Rogers, F.N and Floyd, F. Shoemaker (1971). Communication of Innovations, Free Press, New York.

Shim, D.C., and Eom, T.H. (2009)’ Anticorruption effects of information communication and technology (ICT) and social capital; International Review of Administrative Sciences,75 (1): 99-116.

Tiamiyu, M. (2003). Information and Communication Technologies for Social Development Purposes. Ibadan: Kraift Books Ltd. 

Uche, L.U. (1989). North- South Information Culture. Lagos: Longman Nig Ltd.

Ufuohu- Biri, E . (2007). Influence of globalization and the ICTs on the Nigerian Mass Media, in : Nwosu, Oludayo and Soola (Ed.). Communication in global, ICTs and Ecosystem Perspectives- Insights From Nigeria. Enugu: Precision Publishers Limited.
West, D., (2006) ‘ Global E-Government , 2006: Available online at: http://www.insidepolitics.org/egovt06int.pdf, retrieved 15 September, 2010.

Wimmer, R.D. and Dominick, J. R. (2006). Mass media research: An introduction Boston: wadsworth.

Wogu, J. O.(2008). Introduction theories Nsukka: the University of Nigeria press Ltd
               www.daanrisenbriji. Com




Dictionary
Joseph, D.R (20011), the dynamic of mass communication media in transition. New                                     York the McGraw Hill companies

Oxford Advance learner’s (2005) international student’s edition: 7th edition new York:Oxford university press. 


Journals
Tope, J. (2011), New Media and Political Advertising.

The Punch (2012), the most widely read newspaper. Abuja (Nig) Limited.

Online Materials.

Rijisenbriji, D.B.B. (2012). The role of ICTs in the 1st century.

British Journal of Art  and Social Sciences

ISSN: 2046-9578, Vol.5 No 2 (2012)

British Journal Publishing, Inc 2012

http://www.bjounral.co.uk/BJASS.aspx   

Unpublished Material

Nwafor, K.A. (2010), An Appraisal of ICTs Application in the Nigerian Mass Media A Study of NTA and the Guardian Newspapers, unpublished Masters’ Degree Project, UNN, Department of mass communication.

Oko, M.O. (2006) The Social Impact of New Communication Technologies” A Study of Abakaliki Residents” Project on BSC. Project.

Share on Google Plus

Declaimer - MARTINS LIBRARY

The publications and/or documents on this website are provided for general information purposes only. Your use of any of these sample documents is subjected to your own decision NB: Join our Social Media Network on Google Plus | Facebook | Twitter | Linkedin

READ RECENT UPDATES HERE