SlideShare a Scribd company logo
1 of 15
A presentation on:
Nigerian Students, Technology
Education and Cyber Crime
By
Remmy Nweke
Pioneer Branch Secretary,
Cyber Security Expert Association of Nigeria (CSEAN)
Lead Strategist/Group Executive Editor,
DigitalSENSE Africa Media Group
[DigitalSENSE Business News,, ITRealms,, NaijaAgroNet]
@ 2018 Safer Internet Day
organized by ICLDNG
----------------
Itolo Girl’s Senior Secondary School,
Itolo Street, Off Eric More Road, Surulere, Lagos
----------------
on Tuesday 6th February 2018
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
CONTENTS
 Objective
 What is cyber crime?
 Students in the era of technology
 Demerits of Technology to Education (EduTech)
 Merits of Technology to Education (EduTech)
 Risk & Consequences of Cybercrime to Nigerian Students
 Nigeria pathway to technology boom
 NDS Forum Series on IG4D Instance
 Social media techniques for students
 Recommendations
 Q & A
 References
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
WHAT IS CYBER CRIME?
This is a crime, or computer-oriented crime, which involves a
computer and a network.
The computer may have been used in the commission of a
crime, or it may be the target.
In Nigeria, we have a Cybercrime Act since May 2015, signed
into law by President Goodluck Jonathan.
Just a few days ago, the Federal Government indicated intension
to monitor social media.
Under-aged are remanded in Borstal Institutions (3), otherwise in
Prison.
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
STUDENTS IN ERA OF TECHNOLOGY
Students or pupils are learners or some set of youngsters who attend an
educational institution, be it primary, secondary or tertiary. In Nigeria, like our
colonial master, Britain; those attending university are termed "students" while
"pupil” refers to as an attendee of a lower educational institution.
On the other hand, educational institutions nowadays involve technology in
delivery of education to the pupils at almost all levels. Educational technology
also known as EduTech or EdTech.
Educational technology is "the study and ethical practice of
facilitating learning and improving performance by creating, using, and
managing appropriate technological processes and resources".[1]
Also, Educational technology is the use of both physical hardware and
educational theories, encompassing several fields, including learning theory,
computer-based training, online learning, and, where mobile technologies are
used, m-learning.
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
DEMERITS OF TECHNOLOGY IN EDUCATION
9) Makes learners disconnected from the
real world
10) Major challenges for teachers
11) A major drawback of losing assignment
for students
12) Difficult to deal with online courses
13) Extinct of good handwriting
14) Partial to the low-income group
15) Replacing books with e-books
There are some demerits of technology in education, including:
1) Immense expenditures
2) Insufficient methods of teaching
3) Transforming learners into inefficient learners
4) Waste of valuable time
5) Misguided by the wrong information
6) Major sources of distractions
7) Creating enough room for cheating (Johnsons)
8) Increase rate of cyber bullying
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
MERITS OF TECHNOLOGY IN EDUCATION
Some of which include:
1. Technology makes teaching easy!
2. Technology helps you track students’ progress!
(MyStudentsProgress and theTeacherCloud Progress Tracker)
3. Educational technology is good to the environment!
4. Students enjoy learning!
5. Technology makes distance learning more accessible than ever!
(Coursera, Udemy, Edex, SDCourses, etc).
6. Students and teachers can access information at any time!
7. Technology makes collaboration more effective!
8. Don’t underestimate the power of technology
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
RISK & CONSEQUENCES OF CYBERCRIME TO
NIGERIAN STUDENTS
Equally, there are risk associated to cybercrime and their consequences are
worthy of note for Nigerian students, x-raying the Economic and Financial
Crimes Commission (EFCC) cybercrime file involving students. In the month
of January alone, there were 3 cases, at the least.
1) EFCC Arrests Ekiti Varsity Student for Internet Fraud - 25 January 2018
2) EFCC Docks Three Varsity Students for Internet Fraud - January 18,
2018
3) Court Jails Varsity Student One Month for Fraud – January 15, 2018
Other concerns include:
1) EFCC Arrests Seven MAPOLY Students, Others For Internet Fraud ...
2) Five Ladoke Akintola University of Technology (LAUTECH) Students
Handed Over To EFCC On Yahoo Yahoo ...
3) EFCC to Arraign Four Suspected Internet Fraudsters including NOUN
studeent – Sept 2017
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
NIGERIA PATHWAY TO TECHNOLOGY BOOM:
In Nigeria, the mobile devices entered with the notorious era of Not-9-Not from
mainly Motorola, Siemens and Ericsson kinds of mobiles-like boxes.
This era somewhat paved the way for further liberalization of the
Telecommunications Sector in 2000 and following the deregulation of the
mobile phone market in Nigeria which led to the introduction of Global System
for Mobile Communication (GSM) network providers such as MTN, Airtel
(transition = Econet+Vmobile+Celtel+Zain+Airtel), Globacom and
Etisalat+9Mobile and subsequently obtained licenses from the Nigerian
Communications Commission (NCC).
Today, Nigeria prides telecom subscriber-base of 237,010,282m as at November
2017
Internet Access stood at about 93m
In March 2011 the NCC started registering Subscribers Identification Module
(SIM) cards, in efforts to checkmate crimes associated with mobile phones
like kidnapping and even internet fraud.
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
NDS FORUM SERIES ON IG4D MODEL:
In 2009, the management of DigitalSENSE Africa Media Limited introduced a
campaign, the Nigeria DigitalSENSE Forum on Internet Governance for
Development (NDSF-IG4D), to change the mindset of Nigerians especially the
youth most of who think that Yahoo, Yahoo and online ‘419’ scam is the in-
thing and that Maga De Pay; to embrace the positive way of life, with the
believe that when we catch them young, similar to what is happening today,
there is hope for this country – Nigeria, then the song will definitely change.
Since then, NDSF has grown and was recognized and invited to join the Local
Multistakeholder Advisory Group (LMAG) of the Nigeria Internet Governance
Forum (NIGF) whilst ICANN – the global body coordinating the Internet
Protocol through its At-Large Advisory Committee named DigitalSENSE Africa
Media as an At Large Structure (ALS).
NDSF on IG4D has also introduced Essay Competition for undergraduates, Just
as this year’s NDSF on IG4D will hold on June 6-7, 2018 at Digital Bridge
Institute (DBI) Cappa, Lagos.
YOU all are invited!
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
SOCIAL MEDIA TECHNIQUES FOR STUDENTS
1. Loss of privacy
2. Use a strong password. The longer it is, the more secure it will be.
3. Use a different password for each of your social media accounts.
4. Set up your security answers. The two factor authentication is
available for most social media sites.
5. If you have social media apps on your phone, be sure to password
and protect your device.
6. Be selective with friend requests. If you don’t know the person, don’t
accept their request. It could be a fake account.
7. Click links with caution. Social media accounts are regularly
hacked. Look out for language or content that does not sound like
something your friend would post.
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
SOCIAL MEDIA TECHNIQUES FOR STUDENTS-2
1. Be careful about what you share. Don’t reveal sensitive personal
information ie: home address, financial information, phone
number. The more you post the easier it is to have your identity
stolen.
2. Become familiar with the privacy policies of the social media channels
you use and customize your privacy settings to control who sees
what.
3. Protect your computer by installing antivirus software to
safeguard. Also ensure that your browser, operating system, and
software are kept up to date.
Remember to log off when you’re done.
1. Making calls while driving
2. Age-Inappropriate Content
3. GSM – General Street Madness
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
RECOMMENDATIONS:
1. School proprietors should be grounded in the content of Nigerian
Education Policy (NEP) and prepare for global competitiveness.
2. Students, must always exhibit positive confidence which goes with
sharing only content they are sure of.
3. The Ministry of Youth should ASAP conduct a survey on Child
Online and Abuse in Nigeria with regards to technologies.
4. Nigeria should establish a Child Exploitation and Online Protection
Centre (CEOPC) with a portal for reporting Child Online Abuses
5. CEOPC must have a toll free number, which must be available 24/7
days a week with trained counselors at hand to assist or at best
linked with emergency numbers 112/ 199/119/190/7411+36 states
separate GSM lines for emergencies.
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
RECOMMENDATIONS - 2:
1. Parental care or guide is very key to safety of children online, while
they must stick to Closed User Group (CUG), so as to stay safe and
share beneficial information.
2. Use of Apps with user content control or user setting options like
Twitter, Instagram, Facebook etc is encouraged among others.
3. Apply discipline in the use of social media and focus on their
education first.
4. Finally, join hands in making SENSE of this digital revolution!
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
Remmy Nweke, Esq .
Pioneer Branch Secretary,
Cyber Security Expert Association of Nigeria (CSEAN)
Lead Strategist/Group Executive Editor,
DigitalSENSE Business News, ITRealms & NaijaAgroNet
Editor_ls@digitalsenseafrica.com.ng/ remmyn@yahoo.co.uk
08023122558, 08041000475,
08172004283, 08033592762
Q & A
Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke
@Safer Internet Day, February 6, 2018
References:
1) Nigerian Cybercrime Act 2015:
2) Educational_technology
3) [Nancie L Beckett], Tutor, at University Homework Help
4) [Ayesha Habeeb Omer, Ph.D]
https://elearningindustry.com/benefits-technology-integration-
education-sphere, 27/1/2018
5) SaharaReporters
6) ITRealms
7) Wikipedia.org

More Related Content

What's hot

Childrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyChildrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyAntonino Galo
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your schoolJune Wall
 
DERNSW Study Tour
DERNSW Study TourDERNSW Study Tour
DERNSW Study TourDERNSW
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
Indonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeIndonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeID-IGF
 
National Security Review
National Security ReviewNational Security Review
National Security ReviewSimoun Ung
 
Tren IT menuju 2020 dan eLearning
Tren IT menuju 2020 dan eLearningTren IT menuju 2020 dan eLearning
Tren IT menuju 2020 dan eLearningStanley Karouw
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyJulie Evans
 
Indonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionIndonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionICT Watch
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance InformationTũi Wichets
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Diana Benner
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safelyAlexander Decker
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road aheadCTIC Technology Centre
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarickjamesjarick
 

What's hot (20)

Childrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyChildrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
Childrens and Mobile Technology -Regulator´s Commitment to Children´s Safety
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
DERNSW Study Tour
DERNSW Study TourDERNSW Study Tour
DERNSW Study Tour
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Indonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue ResumeIndonesia 2014 National ID-IGF Dialogue Resume
Indonesia 2014 National ID-IGF Dialogue Resume
 
National Security Review
National Security ReviewNational Security Review
National Security Review
 
Tren IT menuju 2020 dan eLearning
Tren IT menuju 2020 dan eLearningTren IT menuju 2020 dan eLearning
Tren IT menuju 2020 dan eLearning
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 Journey
 
Indonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionIndonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online Protection
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
 
625 -ESECURITY
625 -ESECURITY625 -ESECURITY
625 -ESECURITY
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
ICT and young people... the road ahead
ICT and young people... the road aheadICT and young people... the road ahead
ICT and young people... the road ahead
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarick
 
Ict security essay
Ict security essay Ict security essay
Ict security essay
 

Similar to Nigerian students, technology education and cyber crime

module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdf
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdfmodule-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdf
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdfJanetLipataPajuelas
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
A call for a collective online safety and cyber wellness program
A call for a collective online safety and cyber wellness programA call for a collective online safety and cyber wellness program
A call for a collective online safety and cyber wellness programSonnie Santos
 
internet safety
internet safetyinternet safety
internet safetyawadly
 
internetsafety
internetsafetyinternetsafety
internetsafetyawadly
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityEthical Sector
 
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Nat Rice
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastMOTC Qatar
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Future Education Magazine
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 

Similar to Nigerian students, technology education and cyber crime (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdf
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdfmodule-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdf
module-2-ict-policies-and-safety-issues-in-teaching-and-learning.pdf
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
 
A call for a collective online safety and cyber wellness program
A call for a collective online safety and cyber wellness programA call for a collective online safety and cyber wellness program
A call for a collective online safety and cyber wellness program
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
1st presentation
1st presentation 1st presentation
1st presentation
 
internet safety
internet safetyinternet safety
internet safety
 
internetsafety
internetsafetyinternetsafety
internetsafety
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and securityData Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
 
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle East
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 

More from Remmy Nweke, mNGE, mNUJ, mGOCOP

[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...Remmy Nweke, mNGE, mNUJ, mGOCOP
 
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...Remmy Nweke, mNGE, mNUJ, mGOCOP
 
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Evidence based stem reporting techniques for technology adoption and commerci...
Evidence based stem reporting techniques for technology adoption and commerci...Evidence based stem reporting techniques for technology adoption and commerci...
Evidence based stem reporting techniques for technology adoption and commerci...Remmy Nweke, mNGE, mNUJ, mGOCOP
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderRemmy Nweke, mNGE, mNUJ, mGOCOP
 
"Building a Sustainable Future for NiRA – The Communication & Publicity Path
"Building a Sustainable Future for NiRA – The Communication & Publicity Path"Building a Sustainable Future for NiRA – The Communication & Publicity Path
"Building a Sustainable Future for NiRA – The Communication & Publicity PathRemmy Nweke, mNGE, mNUJ, mGOCOP
 
How media practitioners can take advantage of nigeria dns industry 2-02-15
How media practitioners can take advantage of nigeria dns industry 2-02-15How media practitioners can take advantage of nigeria dns industry 2-02-15
How media practitioners can take advantage of nigeria dns industry 2-02-15Remmy Nweke, mNGE, mNUJ, mGOCOP
 

More from Remmy Nweke, mNGE, mNUJ, mGOCOP (13)

[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
 
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS  by Remmy NWEK...
[GOCOP CONFAB2023] HOW TO GROW YOUR WEBSITE - THE FUNDAMENTALS by Remmy NWEK...
 
Know Your IT for Digital Publishers by Remmy Nweke 
Know Your IT for Digital Publishers by Remmy Nweke Know Your IT for Digital Publishers by Remmy Nweke 
Know Your IT for Digital Publishers by Remmy Nweke 
 
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
Overview of Communicating Nutrition & Social Media Best Practices in Nigeria ...
 
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
The UN Decade of Action on Nutrition: Connecting the Dots for Nigeria by Remm...
 
Evidence based stem reporting techniques for technology adoption and commerci...
Evidence based stem reporting techniques for technology adoption and commerci...Evidence based stem reporting techniques for technology adoption and commerci...
Evidence based stem reporting techniques for technology adoption and commerci...
 
Media as catalyst for change in dns industry 26 7-19
Media as catalyst for change in dns industry 26 7-19Media as catalyst for change in dns industry 26 7-19
Media as catalyst for change in dns industry 26 7-19
 
Building A Sustainable Future for MeCAM
Building A Sustainable Future for MeCAMBuilding A Sustainable Future for MeCAM
Building A Sustainable Future for MeCAM
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
"Building a Sustainable Future for NiRA – The Communication & Publicity Path
"Building a Sustainable Future for NiRA – The Communication & Publicity Path"Building a Sustainable Future for NiRA – The Communication & Publicity Path
"Building a Sustainable Future for NiRA – The Communication & Publicity Path
 
How media practitioners can take advantage of nigeria dns industry 2-02-15
How media practitioners can take advantage of nigeria dns industry 2-02-15How media practitioners can take advantage of nigeria dns industry 2-02-15
How media practitioners can take advantage of nigeria dns industry 2-02-15
 
Positive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile DevicesPositive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile Devices
 
Drug Effects on Cyber Crimes
Drug Effects on Cyber CrimesDrug Effects on Cyber Crimes
Drug Effects on Cyber Crimes
 

Recently uploaded

Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Nigerian students, technology education and cyber crime

  • 1. A presentation on: Nigerian Students, Technology Education and Cyber Crime By Remmy Nweke Pioneer Branch Secretary, Cyber Security Expert Association of Nigeria (CSEAN) Lead Strategist/Group Executive Editor, DigitalSENSE Africa Media Group [DigitalSENSE Business News,, ITRealms,, NaijaAgroNet] @ 2018 Safer Internet Day organized by ICLDNG ---------------- Itolo Girl’s Senior Secondary School, Itolo Street, Off Eric More Road, Surulere, Lagos ---------------- on Tuesday 6th February 2018
  • 2. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 CONTENTS  Objective  What is cyber crime?  Students in the era of technology  Demerits of Technology to Education (EduTech)  Merits of Technology to Education (EduTech)  Risk & Consequences of Cybercrime to Nigerian Students  Nigeria pathway to technology boom  NDS Forum Series on IG4D Instance  Social media techniques for students  Recommendations  Q & A  References
  • 3. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 WHAT IS CYBER CRIME? This is a crime, or computer-oriented crime, which involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. In Nigeria, we have a Cybercrime Act since May 2015, signed into law by President Goodluck Jonathan. Just a few days ago, the Federal Government indicated intension to monitor social media. Under-aged are remanded in Borstal Institutions (3), otherwise in Prison.
  • 4. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 STUDENTS IN ERA OF TECHNOLOGY Students or pupils are learners or some set of youngsters who attend an educational institution, be it primary, secondary or tertiary. In Nigeria, like our colonial master, Britain; those attending university are termed "students" while "pupil” refers to as an attendee of a lower educational institution. On the other hand, educational institutions nowadays involve technology in delivery of education to the pupils at almost all levels. Educational technology also known as EduTech or EdTech. Educational technology is "the study and ethical practice of facilitating learning and improving performance by creating, using, and managing appropriate technological processes and resources".[1] Also, Educational technology is the use of both physical hardware and educational theories, encompassing several fields, including learning theory, computer-based training, online learning, and, where mobile technologies are used, m-learning.
  • 5. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 DEMERITS OF TECHNOLOGY IN EDUCATION 9) Makes learners disconnected from the real world 10) Major challenges for teachers 11) A major drawback of losing assignment for students 12) Difficult to deal with online courses 13) Extinct of good handwriting 14) Partial to the low-income group 15) Replacing books with e-books There are some demerits of technology in education, including: 1) Immense expenditures 2) Insufficient methods of teaching 3) Transforming learners into inefficient learners 4) Waste of valuable time 5) Misguided by the wrong information 6) Major sources of distractions 7) Creating enough room for cheating (Johnsons) 8) Increase rate of cyber bullying
  • 6. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 MERITS OF TECHNOLOGY IN EDUCATION Some of which include: 1. Technology makes teaching easy! 2. Technology helps you track students’ progress! (MyStudentsProgress and theTeacherCloud Progress Tracker) 3. Educational technology is good to the environment! 4. Students enjoy learning! 5. Technology makes distance learning more accessible than ever! (Coursera, Udemy, Edex, SDCourses, etc). 6. Students and teachers can access information at any time! 7. Technology makes collaboration more effective! 8. Don’t underestimate the power of technology
  • 7. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 RISK & CONSEQUENCES OF CYBERCRIME TO NIGERIAN STUDENTS Equally, there are risk associated to cybercrime and their consequences are worthy of note for Nigerian students, x-raying the Economic and Financial Crimes Commission (EFCC) cybercrime file involving students. In the month of January alone, there were 3 cases, at the least. 1) EFCC Arrests Ekiti Varsity Student for Internet Fraud - 25 January 2018 2) EFCC Docks Three Varsity Students for Internet Fraud - January 18, 2018 3) Court Jails Varsity Student One Month for Fraud – January 15, 2018 Other concerns include: 1) EFCC Arrests Seven MAPOLY Students, Others For Internet Fraud ... 2) Five Ladoke Akintola University of Technology (LAUTECH) Students Handed Over To EFCC On Yahoo Yahoo ... 3) EFCC to Arraign Four Suspected Internet Fraudsters including NOUN studeent – Sept 2017
  • 8. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 NIGERIA PATHWAY TO TECHNOLOGY BOOM: In Nigeria, the mobile devices entered with the notorious era of Not-9-Not from mainly Motorola, Siemens and Ericsson kinds of mobiles-like boxes. This era somewhat paved the way for further liberalization of the Telecommunications Sector in 2000 and following the deregulation of the mobile phone market in Nigeria which led to the introduction of Global System for Mobile Communication (GSM) network providers such as MTN, Airtel (transition = Econet+Vmobile+Celtel+Zain+Airtel), Globacom and Etisalat+9Mobile and subsequently obtained licenses from the Nigerian Communications Commission (NCC). Today, Nigeria prides telecom subscriber-base of 237,010,282m as at November 2017 Internet Access stood at about 93m In March 2011 the NCC started registering Subscribers Identification Module (SIM) cards, in efforts to checkmate crimes associated with mobile phones like kidnapping and even internet fraud.
  • 9. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 NDS FORUM SERIES ON IG4D MODEL: In 2009, the management of DigitalSENSE Africa Media Limited introduced a campaign, the Nigeria DigitalSENSE Forum on Internet Governance for Development (NDSF-IG4D), to change the mindset of Nigerians especially the youth most of who think that Yahoo, Yahoo and online ‘419’ scam is the in- thing and that Maga De Pay; to embrace the positive way of life, with the believe that when we catch them young, similar to what is happening today, there is hope for this country – Nigeria, then the song will definitely change. Since then, NDSF has grown and was recognized and invited to join the Local Multistakeholder Advisory Group (LMAG) of the Nigeria Internet Governance Forum (NIGF) whilst ICANN – the global body coordinating the Internet Protocol through its At-Large Advisory Committee named DigitalSENSE Africa Media as an At Large Structure (ALS). NDSF on IG4D has also introduced Essay Competition for undergraduates, Just as this year’s NDSF on IG4D will hold on June 6-7, 2018 at Digital Bridge Institute (DBI) Cappa, Lagos. YOU all are invited!
  • 10. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 SOCIAL MEDIA TECHNIQUES FOR STUDENTS 1. Loss of privacy 2. Use a strong password. The longer it is, the more secure it will be. 3. Use a different password for each of your social media accounts. 4. Set up your security answers. The two factor authentication is available for most social media sites. 5. If you have social media apps on your phone, be sure to password and protect your device. 6. Be selective with friend requests. If you don’t know the person, don’t accept their request. It could be a fake account. 7. Click links with caution. Social media accounts are regularly hacked. Look out for language or content that does not sound like something your friend would post.
  • 11. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 SOCIAL MEDIA TECHNIQUES FOR STUDENTS-2 1. Be careful about what you share. Don’t reveal sensitive personal information ie: home address, financial information, phone number. The more you post the easier it is to have your identity stolen. 2. Become familiar with the privacy policies of the social media channels you use and customize your privacy settings to control who sees what. 3. Protect your computer by installing antivirus software to safeguard. Also ensure that your browser, operating system, and software are kept up to date. Remember to log off when you’re done. 1. Making calls while driving 2. Age-Inappropriate Content 3. GSM – General Street Madness
  • 12. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 RECOMMENDATIONS: 1. School proprietors should be grounded in the content of Nigerian Education Policy (NEP) and prepare for global competitiveness. 2. Students, must always exhibit positive confidence which goes with sharing only content they are sure of. 3. The Ministry of Youth should ASAP conduct a survey on Child Online and Abuse in Nigeria with regards to technologies. 4. Nigeria should establish a Child Exploitation and Online Protection Centre (CEOPC) with a portal for reporting Child Online Abuses 5. CEOPC must have a toll free number, which must be available 24/7 days a week with trained counselors at hand to assist or at best linked with emergency numbers 112/ 199/119/190/7411+36 states separate GSM lines for emergencies.
  • 13. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 RECOMMENDATIONS - 2: 1. Parental care or guide is very key to safety of children online, while they must stick to Closed User Group (CUG), so as to stay safe and share beneficial information. 2. Use of Apps with user content control or user setting options like Twitter, Instagram, Facebook etc is encouraged among others. 3. Apply discipline in the use of social media and focus on their education first. 4. Finally, join hands in making SENSE of this digital revolution!
  • 14. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 Remmy Nweke, Esq . Pioneer Branch Secretary, Cyber Security Expert Association of Nigeria (CSEAN) Lead Strategist/Group Executive Editor, DigitalSENSE Business News, ITRealms & NaijaAgroNet Editor_ls@digitalsenseafrica.com.ng/ remmyn@yahoo.co.uk 08023122558, 08041000475, 08172004283, 08033592762 Q & A
  • 15. Nigerian Students, Technology Education and Cyber Crime by Remmy Nweke @Safer Internet Day, February 6, 2018 References: 1) Nigerian Cybercrime Act 2015: 2) Educational_technology 3) [Nancie L Beckett], Tutor, at University Homework Help 4) [Ayesha Habeeb Omer, Ph.D] https://elearningindustry.com/benefits-technology-integration- education-sphere, 27/1/2018 5) SaharaReporters 6) ITRealms 7) Wikipedia.org

Editor's Notes

  1. Appreciation: First of all, let me thank the organisers for putting this event together and finding me worthy to be the guest speaker to the 2018 Safer Internet Day (SID) put up by ICLDNG led by Felix Iziomoh and especially DigitalSENSE Africa Media for facilitating this opportunity. Objectives: • The essence is to expose students and teachers toward understanding the risk and consequences associated with getting involved in cyber-crime activities; • Tips on how to protect themselves online, and • Some Social Media techniques
  2. Technology integration in the education sphere cannot be over-emphasised and has been described as “ethical practices that facilitate the students' learning and boost their capacity, productivity, and performance.” Thus stimulates positive changes in teaching methods on an international level or global competitiveness. And if one is still speculating whether or not you should start relying on different apps and tools, here is the good news based on the benefits.
  3. Recommendations: Government+Parents+Children
  4. Recommendations: Government+Parents+Children
  5. Thanks for your time and listening
  6. Thanks for your time and listening