Page 126 - The-5th-MCAIT2021-eProceeding
P. 126
be exposed to while working online.
It is always advisable to log in as a user rather than an Q3 17(80.9) 3 (14.3) 1 (4.8)
administrator whenever going online.
There is no risk in using the same password for different Q4 8 (38.1) 6 (28.6) 7 (33.3)
accounts.
I need to change my password regularly/frequently. Q5 14 (66.7) 6 (28.6) 1 (4.7)
Any password I use should have at least eight characters, Q6 19 (90.5) 2 (9.5) 0 (0)
a combination of alphabets, digits & symbols.
Table 3 under the Sokoto section, describes the computer security scenarios viewed by cybercafé operators
in the Sokoto metropolis. 96.4% of respondents were likely to have their computer system becoming corrupted
by a virus, and 3.6% said it is unlikely. 57.2% said it is expected that a hacker took over their computers, 28.5%
says it is doubtful, and 14.3% were neutral. Also, 85.8% of respondents were likely to become corrupted by a
computer virus, 28.6%, 7.1% were neutral and very unlikely. 57.2% of respondents were very likely that
personal identity being stolen, 25% were neutral, and 17.8% were unlikely. 42.9% of respondents were likely
that personal/financial identities being stolen, 17.9%, 42.8% were doubtful, and 14.3% were neutral. 50% of
respondents were likely not able to access the Internet because of a computer virus attack, 42.9% were unlikely,
and 7.1% were neutral
Table 3 under the Kebbi section describes the computer security scenarios viewed by cyber café operators
in the Sokoto metropolis. 95.2% of respondents were likely to have their computer system becoming corrupted
by a virus, and 4.8% were neutral. 52.4% of respondents were possible that a hacker took over their computers,
19.0% were unlikely, and 28.6% were neutral. 95.2% of respondents were likely to have their files becoming
corrupted by a computer virus, and 4.8% were doubtful. 76.2% of the respondents were alleged to have personal
identity stolen, 4.8% were unlikely, and 19.0% were neutral. Under the statement that said personal/financial
identities being stolen (loan fraud), 47.6% of respondents were likely, 28.6% were neutral, and 23.8% were
unlikely. 61.9% of respondents agreed that they were likely unable to access the Internet because of a computer
virus attack, and 38.1% were unlikely. 61.9% of respondents were probably having a computer infected with a
virus due to visiting a website, 14.3% were dubious, and 23.8% were neutral. It, therefore, shows that both
Sokoto and Kebbi respondents have a low-level adoption of computer security majors and mostly have systems
corrupted by different kinds of viruses.
Table 3. Computer Security Scenarios from Cyber Café operators
State Statement No. Number of Respondent/Percentage (%)
of Likely Neutral Unlikely
Respo (%) (%) (%)
ndent
s
Sokoto My computer system became corrupted by a virus. Q1 27(96.4) 0 (0) 1 (3.6)
My computer being taken over by a hacker. Q2 16(57.2) 4 (14.3) 8 (28.5)
My files became corrupted by a computer virus. Q3 24(85.8) 2 (7.1) 2 (7.1)
My identity being stolen (credit cards, social security Q4 16 (57.2) 7 (25) 5 (17.8)
numbers, etc.).
My financial identity being stolen (ATM PIN, Card Q5 12(42.9) 4 (14.3) 12 (42.8)
number, secret code, etc.).
I am not able to access the Internet due to a computer Q6 14 (50) 2 (7.1) 12 (42.9)
virus.
My computer became infected with a virus as a result of Q7 16 (57.1) 3 (10.7) 9 (32.2)
visiting a website.
Kebbi My computer system became corrupted by a virus. Q1 20 (95.2) 1(4.8) 0(0)
My computer being taken over by a hacker. Q2 11 (52.4) 6(28.6) 4(19.0)
My files became corrupted by a computer virus. Q3 20 (95.2) 0(0) 1(4.8)
My identity being stolen (credit cards, social security Q4 16 (76.2) 4(19.0) 1(4.8)
numbers, etc.).
My financial identity being stolen (ATM PIN, Card Q5 10 (47.6) 6(28.6) 5(23.8)
number, secret code, etc.).
I am not able to access the Internet due to a computer Q6 13 (61.9) 0 (0) 8(38.)
virus.
E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021) [113]
Artificial Intelligence in the 4th Industrial Revolution