Preloader

Office Address

74B Obafemi Awolowo Avenue Isale Igbehin Abeokuta Ogun State

Phone Number

+234 916 579 9994
+234 916 579 9994

Email Address

info@globalascents.com
globalascents@gmail.com

PATTERNS OF INTERNET SECURITY IN NIGERIA

₦3,000.00 ₦5,000.00

Data mining has become one of the key features of many security initiatives developed by the Nigerian government to monitor both mobile and internet activities in the country. Attempts are being made to track the data of the so called “yahoo boys” who are taking advantage of e-commerce system available on the internet to defraud unsuspected victims who are mostly foreigners. Some target the telecom companies such as MTN, GLO, AIRTEL, ETISALAT, MULTILINKS, STARCOMMS and VISAFONE to defraud them in terms of free browsing, free international calls and free text messaging. While others target credit card companies to hack into their customers database and steal vital information that could make them buy goods/services through the credit cards. Some even go further to defraud individuals through the use of social media such as facebook, tafoo, myspace, and yahoo chat. Unfortunately, few studies have been conducted on the implication of these criminal activities on national security especially in this era of global terrorism. This study therefore examines the correlation between data mining and internet security in Nigeria, analyse the importance of data mining to Call Pattern in Mobile Telecommunication Networks and evaluate the impact of data mining and fraud detection on unsupervised Neural Networks. The target population for the study consists of two hundred undergraduate students (100 males and 100 females) from Lagos State University, Ojo. Data was analyzed using step wise regression analysis. The research contends that there is a correlation between data mining and fraud detection in unsupervised neural networks in that the former helps in improving security in the country.

In stock Categories : Projects Materials

CHAPTER ONE

Introduction

1.1 Background 

1.2 Statement of the Problem

1.3 Objectives of the Study

1.4 Research Questions

1.5 Research Hypotheses 

1.5 Scope and Limitation of the Study

1.6 Definition of Terms

 

CHAPTER TWO

LITERATURE REVIEW

2.1 Internet Security in Nigeria

2.2 Data Mining in Nigeria

2.3 Call Pattern Analysis in Mobile Telecommunication Networks 

2.4  Neural Networks Overview 

2.3 Fraud Detection in Nigeria

2.4 Summary of Literature

 

CHAPTER THREE

RESEARCH METHODOLOGY

 

CHAPTER FOUR

Experiments and Data Analysis

Experiment 1: Self Organizing Map Model

Experiment 2: Unsupervised Training of Neural Networks 

 

CHAPTER FIVE

Summary , Conclusion and Recommendations

Bibliography

Add your review

Your email address will not be published. Required fields are marked *

Please login to write review!

Upload photos

Looks like there are no reviews yet.

Request A Call Back

Ever find yourself staring at your computer screen a good consulting slogan to come to mind? Oftentimes.

shape