Page 126 - The-5th-MCAIT2021-eProceeding
P. 126

be exposed to while working online.
                   It is always advisable to log in as a user rather than an   Q3   17(80.9)   3 (14.3)   1 (4.8)
                   administrator whenever going online.
                   There is no risk in using the same password for different   Q4   8 (38.1)   6 (28.6)   7 (33.3)
                   accounts.
                   I need to change my password regularly/frequently.   Q5   14 (66.7)   6 (28.6)   1 (4.7)
                   Any password I use should have at least eight characters,   Q6   19 (90.5)   2 (9.5)   0 (0)
                   a combination of alphabets, digits & symbols.

           Table 3 under the Sokoto section, describes the computer security scenarios viewed by cybercafé operators
        in the Sokoto metropolis. 96.4% of respondents were likely to have their computer system becoming corrupted
        by a virus, and 3.6% said it is unlikely. 57.2% said it is expected that a hacker took over their computers, 28.5%
        says it is doubtful, and 14.3% were neutral. Also, 85.8% of respondents were likely to become corrupted by a
        computer  virus,  28.6%,  7.1%  were  neutral  and  very  unlikely.  57.2%  of  respondents  were  very  likely  that
        personal identity being stolen, 25% were neutral, and 17.8% were unlikely. 42.9% of respondents were likely
        that personal/financial identities being stolen, 17.9%, 42.8% were doubtful, and 14.3% were neutral. 50% of
        respondents were likely not able to access the Internet because of a computer virus attack, 42.9% were unlikely,
        and 7.1% were neutral
           Table 3 under the Kebbi section describes the computer security scenarios viewed by cyber café operators
        in the Sokoto metropolis. 95.2% of respondents were likely to have their computer system becoming corrupted
        by a virus, and 4.8% were neutral. 52.4% of respondents were possible that a hacker took over their computers,
        19.0% were unlikely, and 28.6% were neutral. 95.2% of respondents were likely to have their files becoming
        corrupted by a computer virus, and 4.8% were doubtful. 76.2% of the respondents were alleged to have personal
        identity stolen, 4.8% were unlikely, and 19.0% were neutral. Under the statement that said personal/financial
        identities being stolen (loan fraud), 47.6% of respondents were likely, 28.6% were neutral, and 23.8% were
        unlikely. 61.9% of respondents agreed that they were likely unable to access the Internet because of a computer
        virus attack, and 38.1% were unlikely. 61.9% of respondents were probably having a computer infected with a
        virus due to visiting a website, 14.3% were dubious, and 23.8% were neutral. It, therefore, shows that both
        Sokoto and Kebbi respondents have a low-level adoption of computer security majors and mostly have systems
        corrupted by different kinds of viruses.

        Table 3. Computer Security Scenarios from Cyber Café operators
           State                   Statement                 No.    Number of Respondent/Percentage (%)
                                                             of     Likely    Neutral   Unlikely
                                                            Respo    (%)      (%)        (%)
                                                            ndent
                                                              s
           Sokoto   My computer system became corrupted by a virus.   Q1   27(96.4)    0 (0)   1 (3.6)
                    My computer being taken over by a hacker.   Q2   16(57.2)   4 (14.3)   8 (28.5)
                    My files became corrupted by a computer virus.   Q3   24(85.8)   2 (7.1)   2 (7.1)
                    My identity being stolen (credit cards, social security   Q4   16 (57.2)   7 (25)   5 (17.8)
                    numbers, etc.).
                    My financial identity being stolen (ATM PIN, Card   Q5   12(42.9)   4 (14.3)   12 (42.8)
                    number, secret code, etc.).
                    I am not able to access the Internet due to a computer   Q6   14 (50)   2 (7.1)   12 (42.9)
                    virus.
                    My computer became infected with a virus as a result of   Q7   16 (57.1)   3 (10.7)   9 (32.2)
                    visiting a website.
           Kebbi    My computer system became corrupted by a virus.   Q1   20 (95.2)   1(4.8)   0(0)
                    My computer being taken over by a hacker.   Q2   11 (52.4)   6(28.6)   4(19.0)
                    My files became corrupted by a computer virus.   Q3   20 (95.2)   0(0)   1(4.8)
                    My identity being stolen (credit cards, social security   Q4   16 (76.2)   4(19.0)   1(4.8)
                    numbers, etc.).
                    My financial identity being stolen (ATM PIN, Card   Q5   10 (47.6)   6(28.6)   5(23.8)
                    number, secret code, etc.).
                    I am not able to access the Internet due to a computer   Q6   13 (61.9)   0 (0)   8(38.)
                    virus.







        E- Proceedings of The 5th International Multi-Conference on Artificial Intelligence Technology (MCAIT 2021)   [113]
        Artificial Intelligence in the 4th Industrial Revolution
   121   122   123   124   125   126   127   128   129   130   131