Terrorism in Contemporary Nigeria Society: The Case of Boko-Haram

1Kingsley Obumunaeme Ilo

Department of Political Science, University of Nigeria, Nsukka, Enugu State

Email: kingsley.ilo@unn.edu.ng

2Ikegbunam, Uchenna Lilian

Department of Educational Foundations and Administration, 

Nwafor Orizu College of Education, Nsugbe, Anambra State

Email: ucikegbunam1@gmail.com

3Chijioke A. C. Okoye

Department of History and International Studies,

Odumegwu Ojukwu University, Igbariam Campus, Anambra State

Email: ca.okoye@coou.edu.ng  

4*Chukwuemeka Dominic Onyejegbu*

Social Sciences Unit, School of General Studies, University of Nigeria, Enugu Campus, Enugu State

Email: onyejegbudominic@gmail.com

*Corresponding author*

Abstract

This paper examined the issue of terrorism in contemporary Nigeria society paying particular attention to the case of Boko-Haram. Boko-Haram is a form of well-known terrorist group that has caused havoc and displaced many citizens; particularly in the North-Eastern part of Nigeria. The paper utilized secondary data and was anchored on frustration-aggression theory. Amongst other factors, the paper argues that it is evident that the Boko-Haram sect exploits widespread youth unemployment, and a high prevalence of illiteracy in Nigeria to perpetrate their terrorist acts. The reasons ranged from the frustrations of the unemployed youths and some people who dropped out of school. The paper posits that unless something is done to control it, a better, safer and more prosperous society emerging in Nigeria will remain elusive. Thus, the study recommends that there is need to review and restructure current governmental programmes to create sustainable jobs and encourage economic empowerment since current governmental  programmes have not met the employment need of the society. Also, present laws and practices guiding education system in Nigeria should be reviewed in a way that literacy level in Nigeria can be improved. In particular, there is need to explore the extant laws and ascertain the extent to which they are being enforced with a view to establishing their efficacy.

Keywords: Boko-Haram, Terrorism, Unemployment, Indiscriminate violence, Nigeria

1.1 Introduction 

Terrorism is one of the most challenging problems facing Nigeria today. The issue of terrorism and how to control it has remained a recurrent debate among scholars in the Nigerian socio-politics, yet there seems to be no end in sight. According to Ikeke (2015), when terrorism happens in any society, it affects almost every segment of that society. It brings about the destruction of human life and property; and the destruction of bio-cultural diversity. The lives of people and that of society are impeded. To Boff (2006:47), terrorism is today the major threat to the current global order, and its power can strike anywhere in the world.

 Eno, Eno, Ingiriis and Haji (2012) maintained, humans need not justify terrorism of any kind, regardless of whether one is Muslim, Christian or Jew, because it is the axis of evil and devastation of mankind. To Ogudiya and Amzat (2008), terrorism is a socio-political disorder that has grown to the detriment of the international security system and global economy. Acts of terrorism have increased over the years since September 11, 2001 terrorist attack directed at the United States of America. Since then, some nations, including Nigeria, have been suspected as pro-terrorist countries, possible haven for the terrorists and prone to terrorist attack (Ajah, Ajah, Ajah, Onwe, Ozumba, Iyoke & Nwankwo, 2022; Ogudiya & Amzat, 2008).

Terrorism is the use of intentional indiscriminate violence and intimidation such as mass destruction of lives and properties, kidnapping and assassination against members of the public as a means to create fear in order to achieve a political, religious and other aims. According to America’s State Department, terrorism is the premeditated, politically motivated violence perpetrated against non-combatant targets by sub-national groups or clandestine agents, usually intended to influence an audience. Oyeniyi (2010) defines terrorism as any act which is a violation of the criminal laws of a state party and which may endanger the life, physical integrity or freedom of, or cause serious injury or death to any person, any number or group of persons or causes or may cause damage to public or private property, natural resources, environmental or cultural heritage and is calculated or intended to: 

  • intimidate, put in fear, coerce or induce any government, body, institution, the general public or any segment thereof, to do or abstain from doing any act, or to adopt or abandon a particular standpoint or to act according to certain principles; or 
  • disrupt any public  service, the delivery of any essential service to the public or to create a public  emergency; or 
  • create general insurrection in a state.

Wilkinson (2006:328) noted that terrorism can be distinguished from other forms of violence in the following ways: 

  • It is premeditated and designed to create a climate of extreme fear. 
  • It is directed at a wider target than the immediate victims. 
  • It is considered by the society in which it occurs as ‘extra-normal’, that is, it violates the norms regulating disputes, protest and dissent.
  •  It is used primarily, though not exclusively to influence the political behavior of governments, communities or specific social groups.

 Mooney, Knox and Schacht (2002) are of the view that terrorism could be used to publicize a cause, promote an ideology, achieve religious freedom, attain the release of a political prisoner, or rebel against a government. What actually defines terrorism is not the motive but the means utilized in driving the motive (Eze, Okpa, Onyejegbu & Ajah, 2022; Ogundiya & Amzat, 2008).

In Nigeria, Boko-Haram (which loosely interprets to western education is sin) is a well-known terrorist group that has caused havoc and displaced many citizens; particularly in the North-Eastern part of the Country. These acts of terrorism have seriously caused untold hardships to the Nigerian citizens. Beri (2017) asserts that Boko Haram continues to target civilians and government infrastructure despite several rounds of operation conducted by the Nigerian Army. Boko Haram, which came up in 2009, had emerged as the ‘world’s deadliest terrorist organization’ by 2014. In the last eight years, it is said that Boko Haram has taken 20,000 lives, displaced 2.6 million people, created 75,000 orphans and caused about nine billion Naira worth of damage. Links with the ISIS, with leadership tussle between Abubakar Shekau and ISIS favouring Abu Musab al-Barnawi, have turned the situation more complex (Okpa, Ajah, Eze & Enweonwu, 2022; Beri, 2017). 

Despite the havoc and challenges Boko-Haram is causing in Nigeria, slow implementation of counter-terrorism framework by the members of the security agencies has created a security gap which they utilize to perpetrate their evil acts. Similarly, divisions in the country along ethnic, religious, and regional lines in addition to support they receive from some members of the public have boosted their operation.

1.2 Overview of Boko-Haram in Nigeria

Popoola (2012) reports that Boko Haram is a militant Islamic sect based in Northern Nigeria. Otherwise known as Jama’atu Ahlis Sunna Lidda’awati Wal-Jihad, these mean, “people committed to the propagation of the Prophet Mohammed’s teachings and jihad”.  The group was formed around 2002. Nwanze (2014) maintained that the militant group saw society, particularly the government of Mala Kachalla as irredeemably corrupt. So, in the middle of 2002, the group, under its founder, Mohammed Yusuf, embarked on a hijra to Kanama in Yobe state. The quote below vividly captures the Islamic interpretation of Mohammed Yusuf’s hijra:

In Islam, a hijra is a journey from the bad world to go and be closer to God. The Prophet undertook one, from Mecca to Medina. Usman dan Fodio also undertook his own hijra, to Gudu, when Yunfa wanted to kill him (Nwanze, 2014). 

Kanama is probably where they had their first foreign contact. While there, more members joined, some of these new members were the kids of influential Northern leaders, such as the son of Yobe’s governor at the time “Bukar Abba Ibrahim” (Nwanze, 2014). Guided by the meaning of the name “Boko Haram” (western education is sinful), some people view their mission as reformist in nature. In 2004 after the group moved to Kanamma, Yobe state, they set up a base called ‘Afghanistan’ from where it attacked nearby police stations, killing police officers (Eze, Ajah, Okpa & Ngwu, 2022; Poopola, 2012). 

For strategic operational reasons, Yusuf extended the operations of the group to Maiduguri, Borno state, in 2009 where he attacked and killed several political and religious leaders or their families, especially, those who had openly condemned or criticized Boko Haram’s activities. From that moment, the group stepped up their operations and by 2011 several government officials as well as security operatives were killed (Popoola, 2012).  

In the same year 2011, the group struck other targets in the north including the Federal Capital Territory (FCT), Abuja, where they bombed the police headquarters and the United Nation’s office. When the group struck at Damaturu and Potiskum, Yobe state, on November 4th, the police confirmed the death of 65 people (Popoola, 2012).  The devastating effect of the group’s attack has thus forced several government ministries, parastatals, and corporate establishments to step up security measures in an attempt to protect lives and property (Popoola, 2012). Ekwueme (2011:42) argues that Boko Haram is fast becoming Nigeria’s version of Muslim extremists operating with impunity elsewhere, maiming and killing those they consider as infidels. Ekwueme (2011:42) also asserts that the group’s teachings resemble that of the Afghanistan Taliban. They believe that any teaching or education that does not conform to the tenets of Islam is sinful and should not be taught at all. They also believed that it was the influence of western education that is watering down Islamic teaching and weakening Islam itself.  

Ekwueme (2011:43) went further to argue that the group exploited the country’s dysfunctional school system that is plagued with numerous strikes by teachers, widespread youth unemployment, and a high prevalence of illiteracy. The group also exploits the absence of an effective security system in the country.  Taking advantage of these economic frustrations and corrupt leadership of the country, they were able to win many converts. Even highly educated and well-connected members of the society joined the sect, and because their teaching addressed the frustrations of the unemployed youths, some of them dropped out of school, left their homes and joined the group fully (Ekwueme, 2011:43). Guardian newspaper (2011:43) expressed a similar view when she argued that Boko Haram is largely populated by young and often educated unemployed believers who are in circumstance restless and disenchanted with a life of idleness and hopelessness. They are therefore, a ready and willing audience for a preacher who, pooh-poohing western education as valueless in this life and in the life to come, calls on his followers to reject it” (p. 43).  

1.3 Causes of Boko-Haram Terrorism in Nigeria

 Olawale (2016) identified the following as the causes of violence in Nigeria and each of these causes has implication in this study:

Poor economy and unemployment: Olwawale (2016) identified that the escalating state of violence in Nigeria has been incessantly linked to poor economy and high level of youth unemployment.  Nigeria’s economy has been marred by corruption and thorough mismanagement of public funds. This has led to widespread unemployment, frustration and restiveness among the youths which makes them susceptible to violence. Nigeria’s unemployment rate is above the sub region’s average that increased to 23.9% in 2011 compared to 21.1% in 2010 and 19.7% in 2009 (National Bureau of Statistics, 2012).  The youth constitute 60% of the country’s population, and majority of them are unemployed and underemployed. Since they are idle and frustrated, they become susceptible to violence, societies with strong economies and low unemployment rates record low percentage of violence (Olawale, 2016). The appeal of using terror to get one’s way is becoming an acceptable option among Nigerians because of frustration of not being employed. One of the Nigerian newspaper reported that:

 The Boko Haram is largely populated by young and often educated unemployed believers who are in circumstance restless and disenchanted with a life of idleness and hopelessness. They are therefore, a ready and willing audience for a preacher who, pooh-poohing western education as valueless in this life and in the life to come, calls on his followers to reject it” Guardian newspaper (2011:43).

Lack of equality and justice: Nigeria is a rich country with alarming number of poor people. The country is vast in natural resources and oil wealth which is controlled by the political class. While a lawmaker earns bogus salaries and allowances, a classroom teacher is paid meager amount which is usually delayed, sometimes for a few months. Civil servants earn far less and delayed salaries. Also, government tax citizens yet the infrastructural deficit in the country is depressing; intra and interstate roads are extremely poor, power supply is a mirage, public healthcare is lagging behind, fuel/gas scarcity is incessant among others. Inequality and injustice in Nigeria has instigated provocations and led to violence many times. Violence has become an instrument to seek equality and justice (Olawale, 2016). In support of the above mentioned, Bomani (2016), argued that many of the people who take the route of radicalism are raised in marginalized and deprived regions. It must be pointed out that in most cases the terrorist groups face discrimination in the countries they live, leading to feelings of isolation. Growing sentiments of discrimination can lead groups to look to more conservative, and eventually, extremist ideologies.

Religious/ethic sentiments: Nigerians are overwhelmingly obsessed about religious and ethnic identities; sadly, religious and ethnic identities play more important roles in election, appointments, employment and admission into public institutions in Nigeria. The religious and ethnic sentiments have led to violence; this has brought global attention and scrutiny to Nigerians. Religious and ethnic sentiments have triggered major violence in Nigeria. Dempsey (2006) opined that the religious and ethnic differences between the Moslem and Christians cum government loopholes as part of the factors that causes terrorism in Nigeria. Similarly, a study has identified that different factors have rendered Nigeria ineffective to combat the rising wave of terrorism.  The factors include religious liberalization which resulted into the proliferation of different religious groups; emergence of sects with diverse beliefs and practices; and the inability of Nigeria government to censor these religious activities (Ali 2002).

Most religious teachings in Nigeria are all about hatred, in most places of worship today ‘Satan who used to be the traditional enemy of mankind is no longer the enemy, but the hatred inbuilt by the religious leaders and preachers, preaching against the basic tenets of religion to encourage violence among the major religious groups, against one another is the common feature in such places of worship whether you are a Christian or a Muslim’ (Ali, 2002). Also, radical Islamic ideologist believes that anything of western values is declared unhealthy and capable of destroying indigenous value systems and this is one of the main reasons of terrorist acts which threaten the country’s peace (Isyaku, 2013).

Political instability: Nigeria’s political terrain is characterized by clashes of interests, mismanagement, and corruption. Equally, Adeyemi (2012) argued that the contemporary terrorism in Nigeria is a latent function of prolonged failure of the government to deliver purposeful good governance. When the Federal, state and Local Governments steal all the money allocated for building schools, hospitals, industries, etc, the greater percentage of the citizenry especially the youths are denied good education, employment and good health. Consequently, these youths are affected socially, psychologically and economically. Also, frustrations, dejection and hopelessness remain a day to day occurrence in their lives. They can easily be brainwashed and indoctrinated with false doctrines and co-opted into illegal societies (Zumve, Ingyoroko & Akuya, 2013). Leadership failure is a big factor that put this country under the siege of terrorism.

Corruption: According to Ikejiaku (2009), corruption creates absolute poverty. Corruption also undermines democracy, rule of law, good governance and insecurity. It destroys the capacity of institutions to perform well. Corruption creates unemployment and other social vices, that is, corruption as perpetuated by public servants and political office holders. relatedly, Zumve, Ingyoroko and Akuva (2013) argued that terrorism and corruption are destructive, horrific and heinous. Both terrorism and corruption are qualified to be described as “monsters”. Most times, persons who are custodians of the government anti-corruption and anti-terrorist apparatus in Nigeria are variously accused of perpetuating corruption or assisting and sponsoring terrorism (Obuah, 2010).

1.4 Consequences of Terrorism in Nigeria

A lot of resources have been channeled towards countering the acts of terrorism by Boko-Haram. The resources that should be used in building the infrastructures, promoting the general welfare of Nigerians and providing a good platform for Nigerians to work is now being used for national security, rehabilitation and health care expenses. This has affected the socio-economic, political and security development of Nigeria. The worst undoing is that these acts of terror by Boko-Haram have made investors skeptical to invest in Nigeria and citizens are scared to go to work (Olawale, 2016). Obi (2015) argued that the activities of the Islamic sect (Boko Haram) had led to loss of lives and properties in the country especially in the Northern part of Nigeria. Some of these activities include bombing, suicide bomb attacks, sporadic shooting of unarmed and innocent citizens, burning of public places such as police stations, churches and kidnapping of school girls and women, etc.

Olawale (2016) and Udama (2013) identified the following as the consequences of Boko-Haram attacks in Nigeria:

  • Loss of Lives and Properties: Over 2 million Nigerians in the North East have been displaced by Boko Haram attacks. This includes over 800,000 children while thousands of lives have been lost, government, corporate and private properties lost in billions of Naira. This has come with the task of rebuilding the affected communities in a post Boko Haram era. Relatedly, Udama (2013) asserts that the human costs in terms of lives and properties can hardly be valued and quantified since the upsurge of the violence began.  
  • Socio-Economic Stagnation: For states affected by Boko Haram attacks in North Eastern Nigeria, social and economic activities were paralyzed for several months; schools were shut down and pupils withdrawn, businesses were shut down and economic movement in the region became extremely difficult. The violence has stagnated socio-economic activities, since peace is paramount to economic growth. Also, Boko-Haram attacks breed tension in Nigeria, state of emergency/curfew is often declared in the affected areas of the nation (Olawale, 2016). Relatedly, Udama (2013) asserts that Boko-Haram has disrupted and offset the normal social life and number of  lives have been lost. Terrorists’ activities have displaced people from their usual bases to different unintended locations. The mass movement of people creates refugee problems with substantial costs to the individual, host communities and the government. Also, extreme violence repels rather than attract business investors. Boko-Haram attacks have paralyzed the economic activities especially in the northern parts of the country where these incidents are prevalent, thereby worsening the already bad situation. 
  •  Political Effect: Since the rise of Boko Haram, the Islamic sect is spreading terror for years, spreading clouds of fear across the country, and especially in many parts of the north where law and order has collapsed.  Different murderous gangs roam the cities, streets and villages day and night exploding bombs, shooting and killing innocent people. They set homes and business premises on fire, destroying places of worship, and attacking security agents and institutions. The process has promoted anarchy by causing confusion and widespread panic among people in Nigeria. The civil rights of individuals and even their more basic civil liberties as guaranteed by the constitution has been jeopardized. While the Islamic sects unleash terror on the people, the activities of the security agents have become deplorable as well hence the abuses of people’s liberty have become rampant. They have deployed an unconventional and extra-judicial method of shoot at sight which is usually adopted by the government to tackle widespread public disturbances and terrible crimes. The security agents stop people at will, restrict people’s movement by the day and especially at night and kill anyone at the least suspicion. The sects’ activities have spread fear across the length and breadth of not only northern Nigeria but the entire country especially among the political elites. Given the ethnic sensitivity of the country, it has pushed further its political polarization and raised the existing suspicion and distrust especially between the north and south.    

1.5 Theoretical Framework

Frustration- aggression theory of Leonard Berkowitz (1969) was used to explain the phenomenon under discourse.  The theory is a socio-psychological. This theory states that aggression is the result of blocking or frustrating a person’s efforts to attain a goal. This theory has implications in this study because an observation of the Nigerian society, particularly the 20th century and the dawn of the 21st century shows that the Nigeria is pervaded with frustrating events and frustrating circumstances, one in which it could be said that frustration is endemic. Since 1980s, oppression and injustice have been rife, poverty has spread like wild fire, and frustration of the basic needs and aspirations of the vast majority of citizens, including the children and the youth, has been a cardinal feature of decadent society. One result of widespread and severe frustration of the legitimate needs and aspirations of the masses of Nigerians has been the development in the personalities of ordinary Nigerians of varying degrees of hostile and destructive traits, which manifest, in certain cases, in terrorist acts and crises orchestrated by frustrated youths in our societies. Thus, it may defensibly be asserted that a common denominator shared by the phenomena of terrorism, crime and crises in our societies is the existence of hostile and destructive urges in our youths due to frustration. As we have seen, this personality trait, characterized by hostility, and destructiveness, can be traced back to early experiences of frustration, and such experiences come from the environment. It is also interesting to note that, the specific events that trigger violent crises in societies are usually the particular environment of a given society, and can often be seen to involve the frustration or denial of some basic needs. Frustration and denial of basic needs  trigger off terrorism.  Egbue, Nwankwo and Alichie (2015) confirmed that Mohammed Yusuf and his Boko Haram ideology found an echo and appeal within the rank of frustrated members of the peasant class in Northern Nigeria. He capitalized on their dwindling economic situation and the ‘Almajiri’ system to attract large followership especially amongst the commoners (peasant class).

1.6 Conclusion

Boko-Haram has become an intrinsic challenge in Nigeria. This challenge has led to serious infrastructural damage in the areas of education, health and social welfare facilities, poor economy particularly in affected areas, while millions are left homeless.  Egbue, Nwankwo and Alichie (2015) claimed that Boko Haram group has done much harm in the past six years in Nigeria. The loss of lives, loss of government owned and private property, failure of sustainable development initiatives by  Nigerians and government, loss of prospective foreign investments are a few of the fallouts of  Boko Haram insurgency in Nigeria.

1.7 Recommendation 

  1. Boko-Haram in Nigeria did not develop from a vacuum; there are some social and political factors that gave birth to it that is why all hands must be on deck in the fight against Boko Haram irrespective of diverse social, political, ethnic, religious or cultural inclination of Nigerians.
  2. There is need to review the current techniques of fighting terrorism by the security agencies and improve its counter-terrorism approaches.
  3. Since current governmental programmes have not met the employment need of the society, there is need to review the current programmes in a way that they can create sustainable jobs and encourage economic empowerment. Since economic deprivation and frustration leads to radicalism.
  4. Our present political structure needs to be reviewed because instability in our political system and bad governance encourages radicalism and terrorism.
  5. There is need for the government to effectively censor the activities of religious activities. Since the inability of the government to censor religious activities in the country has rendered the authority ineffective to combat the rising wave of terrorism.
  6. There is need to engage all the stakeholders and the youth to negotiate ethnic and cultural differences, this will help restructure the country in a way rancour and acrimony can reduce among the people. It is important to note that growing sentiments of discrimination among the people can lead groups to look to more conservative, and eventually, extremist ideologies.
  7. Since there is still a slow pace of literacy level in the present laws and practices guiding the education system, the present laws and practices should be reviewed in a way that literacy level in Nigeria can be improved. In particular, there is the need to explore the extant laws and the extent to which they are being enforced with a view to establishing their efficacy.
  8. There is a need to start the fight against corruption from the institutional level, since corruption encourages terrorism. Fighting corruption from the institutional level allows the understanding of the root causes of corruption and the machineries that breed corruption. By doing so, we will be able to know the best ways to manage and block the loopholes that breed about corruption.

References

Adeniyi, S. (2006, November 3). Nigeria has Lost $300 Billion to Corruption. This Day   Newspaper. P8.

Ajah, L.O., Ajah, M. I., Ajah, B.O., Onwe, E. O., Ozumba, B.C.,  Iyoke, C.A., & Nwankwo, T.C. (2022). A 20 Year Retrospective Review of Rape Pattern in Ebonyi State, South-East Nigeria. Heliyon, 8, e08894. https://doi.org/10.1016/j.heliyon.2022.e08894

Ali, T. (2002). The Clash of Fundamentalisms: Crusades, Jihads and Modernity.  London, UK:   Verso.

Beri, R. (2017). Rise of Terrorism in Africa. Institute for Defence Studies and Analysis, New       Delhi.

Boff, L. (2006). Fundamentalism, terrorism and the future of humanity. London: Society for        Promoting Christian Knowledge.

Damaging effect of Boko Haram (2011, February 11). The Guardian. P43.

Dempsey, T. (2006).  Counterterrorism in African failed States: Challenges and Potential            Solutions. Retrieved from  http://www.strategicstudiesinstitute.army.mil/. 

Egbue, N. G.,  Nwankwo, I. U., & Alichie, B. O. (2015). Curbing Boko Haram Terrorist   Insurgence in Nigeria: Imperatives of Quadruple Action Package of Limited Military Response, Improved Social Services, Conflict Resolution Initiatives and Modified            Pacifism. British Journal of Arts and Social Sciences, Vol. 20 (1), 13-29.  ISSN: 2046-           9578.                                                                                                                                          

Ekwueme, C., & Akpan, C. (2011). Mass media and Boko Haram insurrection: A call for            reportorial paradigm shifts. Ota: ACCE Conference proceedings.

Eno, M. A., Eno, O. A., Ingiriis, M. H., & Haji, J. M. (2012). Slavery and Colonialism: The         Worst Terrorism on Africa. African Rennaissance, Vol. 9 (1), 9-26.

Eze, O.J., Ajah, B.O.*, Okpa, J.T., Ngwu, G. E. (2023). Ethnic-based violence: Nigeria   perspectives. In: Martin, C., V. R. Preedy and V. B. Patel (Eds), Handbook of anger,     aggression, and violence. Springer, Cham. https://doi.org/10.1007/978-3-030-98711-        4_182-2

Eze, J.O., Okpa, J.T., Onyejegbu, C.D., & Ajah, B. O. (2022). Cybercrime: victims’ shock           absorption mechanisms. UK: IntechOpen. doi: 10.5772/intechopen.106818.

Ikeke, M. O. (2015). Philosophy and the Problem of Terrorism in Nigeria.  Bassey Andah             Jounal, Vol. 7 (8), 231-241.

Isyaku, A. (2013). Terrorism: A New Challenge to Nigeria’s Stability in the 21st Century.            International Affairs and Global Strategy, Vol 12.  ISSN 2224-574X (Paper)  ISSN 2224-   8951 (Online).         

Mooney, L. A., Knox, D., & Schacht, C. (2002). Understanding  Social Problems (3rd ed.)  US:   Wadworth/Thompson Learning.

National Bureau of Statistics (2013). Nigeria Unemployment Rate.   

Obi, C. K. (2015). Challenges of Insecurity and Terrorism in Nigeria: Implication for National     Development. OIDA International Journal of Sustainable Development, Vol. 8 (2),11-18.

Obuah, E. (2010). Combating Corruption in a “Failed” state. The Nigerian Economic and                         Financial Crimes Commission (EFCC). Journal of Sustainable Development in Africa,         Vol.12 (1).

Okpa, J. T., Ajah, B. O., Eze, O. J., & Enweonwu, O. A. (2022). Communal conflict and violence: Causes and impact. In C. Martin, V. R. Preedy and V. B. Patel (eds) Handbook         of Anger, Aggression, and Violence. Springer, Cham. https://doi.org/10.1007/978-3-030- 98711-4_184-1

Olawale, R. (2016, April 26). Violence in Nigeria: Causes, Effects and Solutions. The Nigerian   Voice. Retrieved from https://www.thenigerianvoice.com/sports/214575/violence-in-        nigeria-causes-effects-and-solutions.html

Oyeniyi, A. B. (2010). Terrorism in Nigeria: Groups, Activities, and Politics. International          Journal of Politics and Good Governance,Vol. 1 (1). ISSN: 0976 – 119.

Popoola, I. S. (2012). Press and Terrorism in Nigeria: A Discourse on Boko Haram. Global          Media Journal ,  Vol 6 (1).

US Department of State (2004). Country Report on Human Rights Practices. Retrieved from       www.state.gov/g/drl/rls/hrrpt/2004/41620.htm.

Wilkinson, P. (2006). Terrorism. The handbook of Security, Basingstoke: Palgrave.

Zumve, S., Ingyoroko, M., & Akuva, I. (2013). Terrorism in Contemporary Nigeria: A Latent      Function of Official Corruption and State Neglect. European Scientific Journal. Vol.9 (8).  ISSN: 1857 – 7881 (Print). e – ISSN 1857- 743

Exploratory study of the internet and business operations in Nigeria

1Ikegbunam, Uchenna Lilian

Department of Educational Foundations and Administration, 

Nwafor Orizu College of Education, Nsugbe, Anambra State

Email: ucikegbunam1@gmail.com

2Chijioke A. C. Okoye

Department of History and International Studies,

Odumegwu Ojukwu University, Igbariam Campus, Anambra State

Email: ca.okoye@coou.edu.ng  

3*Chukwuemeka Dominic Onyejegbu*

Social Sciences Unit, School of General Studies, University of Nigeria, Enugu Campus, Enugu State

Email: onyejegbudominic@gmail.com

Corresponding author*

4Kingsley Obumunaeme Ilo

Department of Political Science, University of Nigeria, Nsukka, Enugu State

Email: kingsley.ilo@unn.edu.ng

Abstract 

Recent cybersecurity reports suggest that cyber-attacks are on the increase, especially as they are mostly deployed innovatively by cyber-criminals to steal personal data, conduct espionage, harm business operations, or deny user access to information and services. In Nigeria, cyber-attacks remain the most notable strategies employed by highly sophisticated cybercrime syndicates in attacking and stealing information from large corporations and Internet users. This study explores how cyber-attacks impinge business operations in Nigeria. Data for the study were gathered from newspapers, e-books, magazines, journals, textbooks and online articles. At the end, the study calls for businesses to strengthen their network of security, engage in aggressive cyber-security awareness training for staff, leverage advanced detection and response technologies, and use mobile protection solutions or corporate internet traffic protection to avoid the damaging effects of malware on their finances and reputation.  It is equally recommended by the study for corporate organisations to spread their data across smaller sub-networks to help contain attacks to only a few endpoints instead of the entire ICT infrastructure.

Keyword: Cybercrime, Cyber-attack, Internet, Business operations, Corporate organizations.

Introduction

In 2017, African economies lost US$3.5 billion to cyber-attacks with Nigeria holding the biggest loss of US$649 million (Eze, Okpa, Onyejegbu & Ajah, 2022; Africa’s Pulse, 2019; Abdi, 2018). This is seconded by Kenya with a loss of US$210 million. For Nigeria, the US$649 million was about 3.3% of its total national budget for that year 2017 which is bigger than 3.1% of the budget that was allocated to Defense and 1.9% of the budget that was allocated to Health (Punch, 2016).  Despite popular metrics, Nigeria is not particularly a wealthy country as it houses a good percentage of the poorest population in the world (Okpa, Ajah, Eze & Enweonwu, 2022; Kazeem, 2018; Saharareporters, 2018). With 3.2% of the national economic activities lost to cybercrime in 2017, a great number of people and businesses were affected and pushed below poverty line (Ukwayi & Okpa, 2018).   Prince (2019) and Jumoke (2019) affirmed that 60% of Nigerian firms experienced cyber-attacks in 2018 and 43% of these attacks went to small and medium scale enterprises. These financial losses meant that some businesses were shut down while others outrightly downsized their workforce to maintain viability, hence causing more unemployment, poverty and hunger across the country (Eze, Ajah, Okpa & Ngwu, 2022). Approximately one in every eleven Nigerians is unemployed and about 50% of the 180million population live in extreme poverty (Yomi, 2018; Timothy, 2018). These metrics raise more concern with the fact that cybercrime steals about 3.3% of national economic activities per year and is responsible for many businesses shutting down and downsizing, resulting to the tremendous unemployment and poverty that troubles the nation.

            These threats are perpetrated by employing the most intelligent methods by either stealing from people without their knowing or deliberately ensnaring people into parting with their resources . In using deliberate methods, cybercriminals tell cascades of stories to their prospective victims either to win their sympathies or interests. Once this step is achieved, they proceed to lure their victims into parting with their savings (Frank, 2019). This use of deliberate method is the popularly known ‘Yahoo-Yahoo’ in Nigeria. Their deliberate methods can come in the forms of love and romance like the case of Jan Marshall who was defrauded $350,000 by a fake Nigerian lover or in the forms of business opportunities like the case of Emmanuel Nwude who sold a nonexistent airport to Brazilian bankers for $242 million (Ajah, Ajah, Ajah, Onwe, Ozumba, Iyoke & Nwankwo, 2022; Frank, 2019; Farida, 2018). In using deliberate methods, they cajole, ensnare and deceive victims into willingly parting with their resources. This does not only happen from Nigerian fraudsters to foreign victims but also from Nigerian fraudsters to Nigerian victims – but Nigerian victims have continuously failed to tell their stories, likely because of shame, stigma or fear of being condemned as weak or stupid. 

Cybercrime in Nigeria

            In earlier Nigeria as well as earlier Africa, crimes existed but they were highly unsophisticated. Stealing was almost horizontal and people simply walked into crimes. There were no fixed definitions of what comprised crime and what did not; people were merely guided by indigenous laws and definitions of crime. Ani (2019) and Solanke (2011) described indigenous legal system as local elders and chiefs sitting under an Iroko tree to discuss a peculiar behavior and determine whether it is right or wrong. The legal system at the time was both not structurally formed and unsophisticated. Sophistication came with the foreigners when people saw different ways to live – and different ways to also commit diverse crimes. By the time of independence, a few Nigerians had acquired education and sharpened their skills in thinking and sophistication. Fraud and embezzlement among educated public officials kicked-in.  Officials were silently stealing from the people without public’s knowledge. People gradually gained consciousness on the crimes of officials; others also discovered criminal patterns of their own. Cybercrime came with the internet. As the world developed technologically for businesses and social interactions, criminal minded individuals also saw opportunities to expand their methods and reach more people. 

Cybercrime connotes crimes committed on the internet. This may exist in different forms like cyber-fraud, cyber espionage, cyber stalking, hacking, etc. The most common among Nigerian cybercriminals is cyber fraud. Cyber fraud, unlike hacking, requires less technological skills but much social skills. It is the act of relating with other people on the internet with the sole purpose of defrauding them. It usually involves other sub-criminal activities like impersonation and forgery and is more emotionally exhausting than hacking  (Bentina & Ajah, 2017). In cyber-fraud, the perpetrators usually approach their victims with business opportunities, romance gestures or unfortunate stories to win their victims’ pity. Once a prospective victim listens and accepts the gestures of the cybercriminal, the victim is made to part with his/her monies to the cybercriminal  (Bentina & Ajah, 2017). These monies are usually victims’ life-savings or borrowed funds. In some cases, the romance method is used and victims also get emotionally affected as well.

            Whether it is cyber-stalking, espionage, cybersquatting, cyber-bullying, identity theft, cyber child pornography or cyber fraud, Nigerian constitution abhors them and finds perpetrators guilty with jail terms and/or fines (Das & Nayak, 2013). An example of identity theft is the imposter of Bola Tinubu on Facebook who was later discovered and arrested (Lawpadi, 2019). Such Identity theft crime on the internet is punishable with no less than 3years imprisonment or ₦7 million fine or both (Cybercrime Act, 2015). 

Cybercrime and Businesses

The cyberspace is driving business innovations and growths globally, and at the same time, exposing corporate organisations to new and emerging internet-assisted crimes (Makeri, 2017; Longe, Ngwa, Wada, Mbarika, & Kvasny, 2009; Quarshie and Martin-Odoom, 2012). Today, the negative frontiers of the cyberspace that corporate organisations are contending with include: hacking, malware attacks, cyber-terrorism, spoofing, phishing, spam, virus attacks, child pornography, cyber vandalism, cyberstalking, data modification, email bombing and cybersquatting (Fanawopo, 2004). The alarming increase in “incidents of cyber-attacks and the resultant economic implications have made the management and security of the cyberspace a paramount concern to multi-stakeholders, driving the process, from the public to the private corporate institutions” (Agugoesi, 2014:8).

Hacking is a complicated technical activity aimed at exploiting systems’ vulnerabilities to subvert security checks, geared towards compromising digital devices such as computers, smartphones, tablets, and networks of organisations for financial gains, corporate espionage and for fun. Hackers are broadly classified into the Black Hat, White Hat and Gray Hat hackers. The Black-hatters are the malicious hackers who hack for economic reasons. The White hatters are the ‘good guys’ in the cyberspace who hack for ethical reasons, while, the Gray hatters hack for ideological reasons (Manne, 2020). The Black-hat hackers sometimes known as crackers are criminals, who use their skills to modify computer hardware or software for malicious intents. These group of individuals use their programming skills, to exploit target systems’ weaknesses and invade the networks of organisations, steal personal and corporate data for personal aggrandisement. Black-hat hacking is committed by a diverse spectrum of actors (lone actors and organized crime syndicate), with different motivations and affiliations (Peters & Jordan, 2019).

 Their motivation ranges from economic gains to stealing and damaging sensitive data, disabling networks, establishing a command and control server, or using the system as a base to wreak future havoc. “Attacks can be active such as a brute-force attack that determines a user’s password, or passive, such as a web-based attack that waits for a user to visit a malicious webpage in an attempt to infect the user’s computer with malicious codes through which they gain access into the target organisations’ networks” (Peters & Jordan, 2019:6). These group of digital opportunists usually cause mayhem in organisations by engaging in DDoS, identity theft, vandalizing networks and creating worms to damage institutional and personal files. Studies have shown that fraudulent emails remain the most widely used strategy by black hatters to attack corporate organisations. Most of such attacks begin with phishing emails, which exploit staff vulnerabilities in order to infect computers with malware. Once the malware is downloaded into the network, black-hat hackers through this medium gain access to the user’s database to forge personal data with which they exploit an organisation. The malware ignorantly downloaded into the network by staff could maliciously delete or transfer information, download destructive programs, providing hackers with unauthorized access to the computer, and more. Black-hat hackers also use psychology to trick staff into clicking on a malicious attachment or providing personal data. Despite differences in hackers’ profile and drive, majority of the attacks by these group of cybercriminals have been found to be trans-national in nature (Peters & Jordan, 2019). This suggests that a single hacking attack can hit countless victims in different countries independent of the location of the attack.

Estimating the global economic impact of black-hat hacking is difficult since most organisations do not report or publish their financial losses. However, The Council of Economic Advisers (2018:8) estimated that “malicious cyber activities cost the U.S. economy between $57 billion and $109 billion in 2016”. “In Kenya, several government websites came under hackers’ attacks, putting huge amounts of citizens’ data and even government revenue collection systems at risk. In 2012, over one hundred (100) Kenyan government websites were defaced by an Indonesian hacker with an estimated loss of $22.4 million. In South Africa, ATMs were massively compromised and huge sums of funds lost to the activities of the hackers in South Africa” (Tobiko, 2014:7).  

Similarly, every successful attack, no matter how insignificant, attracts disastrous consequences for corporate organisations. The abuses of the cyberspace by black hatters portend danger and have stalled the developmental contributions accruable from a well-harnessed ICT adoption, diffusion and utilisation by corporate organisations in Nigeria. This development has widened the digital divide, crumbled the information infrastructure and affected consumer’s confidence in online transactions in Nigeria.

Reporting on the dynamic nature of malware attacks, Jennings, Johnson and Sood (2019) state that malicious actors leverage on automated software and other ICT tools to target small businesses and large corporations. This shows that no organisation whether big or small, production companies or service providers are immune to malware attacks. More recently, scholars such as Lévesque, Chiasson, Somayaji and Fernandez (2018) have employed quantitative approach to explore the interactions between users, antivirus (AV) software, and malware as they occur on deployed systems. Another form of malware known as ransomware in a bid to avoid being traced, it demands that its ransom be paid through bitcoin, this makes their in-put low and their profit very high in addition to their operational anonymity (Jennings, Johnson & Sood, 2019).  

Literature from both developed and developing nations have highlighted operational methods deplored by malware writers to include “code obfuscation and modification as well as inclusion of new behaviour in the malware to improve strength and viability” (Gounder & Farik, 2017). For example, Gounder and Farik’s (2017) research on new ways to fight malware suggests “code obfuscation makes malware code obscure and unintelligible by malware detectors, reduces the size of codes making malware download time and deployment shorter and easier”. This technique can be grouped into “polymorphic or metamorphic”. “Polymorphic virus hides its decryption loops using code insertion and transposition to bypass detection while metamorphic virus evades detection by hiding itself from detectors” (Shah, 2014). 

The corporate organisations ICT components are often the major victims of malware attacks due to failure to secure their operating system designs and other related software vulnerabilities (OECD, 2008). Software vulnerabilities according to OECD (2008) is a function of faulty coding, software not properly configured, or used in a manner not compatible with the suggested uses or improperly configured with other software. These factors allow for loopholes that exposes corporate entities to malware attacks. In the event that internet fraudsters find these flaws, malicious software is created to take advantage of them (Oyelere & Oyelere, 2015). Non-technological factors, such as bad user behaviours and ineffective security policies and processes, may put a company at risk of malware infection. Malwares such as viruses or trojans must be triggered by some kind of user activity, such as clicking on a seemingly trustworthy file or link, opening a phishing e-mail or visiting a compromised website as well as through physical media such as external drives. According to Danchev (2006) “once the system security has been compromised by the initial infection, some forms of malware automatically install additional functionality such as spyware (e.g. keylogger), backdoor, rootkit or any other type of malware, known as the payload”.

Conclusion and recommendations

In Nigeria today, different forms of cybercrimes are committed on a daily basis ranging from phishing, Business Email Compromise, hacking, cyber vandalism, cyber espionage and malware attacks. These cybercrimes are increasing in frequency, dimension and sophistication, thus posing  serious threats to the socio-economic development of businesses, internet users, and national security. The destructive intention of these cybercrimes are to overwhelm, manipulate and damage computers whether personal or corporate without the knowledge of the users. For this reason, countries like “Kenya, Angola, Nigeria, Rwanda, Botswana, Uganda, Tanzania, and South Africa” lost billions of dollars annually to cyber related offences. However, to stem the tide of cyber-attacks, the study calls for businesses to strengthen their network of security, engage in aggressive cyber-security awareness training for staff, leverage advanced detection and response technologies, and use mobile protection solutions or corporate internet traffic protection to avoid the damaging effects of malware on their finances and reputation.  It is equally recommended by the study for corporate organisations tospread their data across smaller sub-networks to help contain attacks to only a few endpoints instead of the entire ICT infrastructure. 

Reference

Abdi L, D. (2018). Cybercrime is costing Africa’s businesses billions. Quartz News. Retrieved from: https://qz.com/africa/1303532/cybercrime-costs-businesses-in-kenya-south-africa-nigeria-billions/

Ajah, L.O., Ajah, M. I., Ajah, B.O., Onwe, E. O., Ozumba, B.C.,  Iyoke, C.A., & Nwankwo, T.C. (2022). A 20 Year Retrospective Review of Rape Pattern in Ebonyi State, South-East Nigeria. Heliyon, 8, e08894. https://doi.org/10.1016/j.heliyon.2022.e08894

Abdul-Rasheed Ishowo, S. L., Muhammed, L. A. & Abdullateef, Y. R. (2016). Cybercrime and Nigeria’s external image: A critical assessment. Africology: The Journal of Pan African Studies, 9(6), 119-132.

Ajah, B. O. & Chukwuemeka, O. D. (2019). Neo-economy and militating effects of Africa’s profile on cybercrime. International Journal of Cyber Criminology 13(2), 326-342.

Ani, C, C. (2015). Crime and punishment in African indigenous law. Retrieved from: https://www.academia.edu/31440754/CRIME_AND_PUNISHMENT_IN_AFRICAN_INDIGENOUS_LAW

Beck, U. (2006). Living in the world risk. Society Economy and Society, 35(3), 329-345

Brendler, B. (2007). Spyware/Malware Impact on Consumers; APEC-OECD Malware Workshop; April 2007 (Source: StopBadware Project); available online at: http://www.oecd.org/dataoecd/33/55/38652920.pdf.

Chen, Q. & Bridges, R. A. (2017).  Automated Behavioral Analysis of MalwareA Case Study of WannaCry Ransomware. in Intelligence and Security Informat-ics (ISI), 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).

Bentina, A. M. & Ajah, B. O. (2017). Understanding gender dimension of cyber bullying among undergraduates in Nigeria. Ahmadu Bello University Press Limited.

Chinweze, U. C., Chukwuemeka, O. D., Egbegi, F. R. (2019). An exploratory study of cybercrime in the contemporary Nigeria value system. European Journal of Social Sciences Studies. 4 (3), 131-141

Cybercrime Act. (2015). Cybercrimes (prohibition, prevention, etc) act, 2015. Retrieve from: https://www.cert.gov.ng/file/docs/CyberCrime__Prohibition_Prevention_etc__Act__2015.pdf

Das, S.,  & Nayak, T. (2013). Impact of cybercrime: Issues and challenges. International Journal            of         Engineering Sciences & Emerging Technologies, 6 (2), 142-153.

Eze, O.J., Ajah, B.O.*, Okpa, J.T., Ngwu, G. E. (2023). Ethnic-based violence: Nigeria   perspectives. In: Martin, C., V. R. Preedy and V. B. Patel (Eds), Handbook of anger,     aggression, and violence. Springer, Cham. https://doi.org/10.1007/978-3-030-98711-        4_182-2

Eze, J.O., Okpa, J.T., Onyejegbu, C.D., & Ajah, B. O. (2022). Cybercrime: victims’ shock           absorption mechanisms. UK: IntechOpen. doi: 10.5772/intechopen.106818.

Farida, D. (2018). How Nigerian Fraudsters sold a nonexistent airport for $242 million to a Brazilian bank in 1995. Face2Face Africa. Retrieved from: https://face2faceafrica.com/article/how-nigerian-fraudsters-sold-a-non-existent-airport-for-242-million-to-a-brazilian-bank-in-1995

Frank, C. (2019). Lonely heart, 61, gave her $350,000 life savings to a man she met on dating site Plenty Of Fish – only to find out her urbane Englishman ‘Eamon Donegal Dubhlainn’ was a Nigerian fraudster. Retrieved from: https://www.dailymail.co.uk/news/article-3085724/I-groomed-way-child-abuse-victims-Woman-loses-life-savings-350-000-falling-love-British-man-dating-site-sending-money-discover-Nigerian-fraudster.html

Jumoke, A. L. (2015, March 5). SMEs hardest hit by cybercrime, as 60% of Nigerian businesses suffer attacks. Business Day Report, P3.

Lawpadi. (2019). 10 things to know about Nigeria’s cybercrime act 2015. Retrieved from: https://lawpadi.com/10-things-to-know-about-nigerias-cybercrime-act-2015/

Okpa, J. T., Ajah, B. O., Eze, O. J., & Enweonwu, O. A. (2022). Communal conflict and violence: Causes and impact. In C. Martin, V. R. Preedy and V. B. Patel (eds) Handbook         of Anger, Aggression, and Violence. Springer, Cham. https://doi.org/10.1007/978-3-030- 98711-4_184-1

Security Measurement and Satisfactions Towards Internet Banking among Students in Jammu and Kashmir

Alyas Ahmed

Research Scholar, Department of Management and Commerce

Maulana Azad National Urdu University-32

 

Mohd Mushtaq

Researcher Sholar, Department of Education and Training

Maulana Azad National Urdu University-32

Abstract:

The banking industry is the backbone of the Indian economy. Banks provide financial assistance to individuals and Institutions. This study explores the elaborate framework of internet banking’s effects on Jammu and Kashmir’s student population. The study examines students’ perceptions of satisfaction and security in the context of online financial transactions. This study provides important insights into the changing financial habits and attitudes of the region’s students through a thorough study of the interactions between the ease of internet banking services and the perceived security measures preserving critical information. In this study the researcher applied quantitative approach under descriptive type of research. The study includes 500 students of Jammu region from different educational background under probability types of sampling.  For the analyses of data, the researchers applied different statistical techniques such as, Frequency, percentage, mean average, standard deviation, correlation and paired sample t-test in this study. Result of the study reveals that a significant positive relationship found between student’s security measurement towards internet banking and satisfaction towards internet banking in Jammu and Kashmir. It can be concluded that the level of security measurement increases, satisfaction towards internet banking also increases significantly. Moreover, it is also found that a significant impact of security measurement towards internet banking and satisfaction towards internet banking among students of Jammu and Kashmir. 

Keywords: – Internet, Satisfaction, Security measurement, Banks, Jammu and Kashmir, Students.

Introduction

Internet banking has become an essential part of the financial system in the modern digital era. In the present era, people are transferring from the traditional banking system and connecting with the modern internet banking system to carry out their financial activities through the use of internet banking. The accessibility and convenience provided by internet banking have drawn a lot of attention to technological advances, especially among the younger generation. Jammu and Kashmir, tucked away in India’s far north, as most of the area is hilly and the majority of people live in rural areas where banking branches are not available. Without a proper banking system, any nation cannot grow. In the current era, due to the rise in demand for banks and their products, the banking industry is adopting the latest technology to provide services easily and successfully. Banks are redefining traditional banking practises and fostering a paradigm shift towards digital financial interactions. This shift is particularly evident in regions like Jammu and Kashmir.  But due to the advancement in internet banking, now people in far-flung areas can also avail themselves of the services through internet banking. As the primary focus of this paper is to understand the behaviour of students towards internet banking, and also to determine the way in which the students in Jammu and Kashmir perceive both the satisfaction and security associated with online banking. Further, the aim of this research paper is to provide a comprehensive understanding of how the use of internet banking is influencing the financial behaviours and attitudes of the student community in this area by examining the intricate connection between the satisfaction derived from the convenience of online banking services and the perceived security measures that safeguard sensitive information.

It is interesting that Jammu and Kashmir has a unique anthropological backdrop that is distinguished by its rich heritage, geographic variety, and particular challenges. This study has the potential to provide useful insights for the banking sector as well as academia, directing the creation of plans to improve user experiences while addressing security issues. An in-depth examination of the students’ satisfaction with and security perceptions of online banking in Jammu and Kashmir holds potential for influencing the course of digital banking services in the area and beyond as technology continues to impact the future of financial interactions.

Safety precautions for internet banking are essential for protecting confidential monetary information and sustaining the security of the internet. Banks have a variety of approaches and deploy many tactics to reduce risks and improve user safety. Encryption, a vital element, uses protocols like SSL and TLS to encrypt data transmission between users and the banking server, preventing unauthorised access and data interception. By forcing users to supply extra credentials in addition to their passwords, two-factor authentication (2FA) and multi-factor authentication (MFA) strengthen account access. Robust password requirements are imposed by secure password rules, lowering vulnerability to brute-force assaults. Users are made aware of fake emails and websites by anti-phishing strategies, and continuing protection is provided by regular security audits that find deficits.

In nutshell, the rise of internet banking has changed how people interact with banking services in the modern financial sector. The revolutionary potential of online banking has been used to address the different geographical and socioeconomic obstacles faced by Jammu and Kashmir, spanning accessibility gaps and reaching even remote areas. This study highlights the growing impact of technology in influencing financial behaviours by revealing students’ perceptions of satisfaction and safety in this digital environment. The information acquired helps the banking industry, academics, and the continued improvement of digital banking practises. An in-depth understanding of internet banking’s effects is essential to guiding safer and more beneficial financial institutions in the area and beyond as technology continues to influence how people interact with finance.

Review of related studies

(A. Meharaj Banu, 2019). Conducted a study on “Online Banking and Customer Satisfaction: Evidence from India” Asia-pacific Journal of Management research and Innovation. The main aim of the research was to analyze the satisfaction of customers towards online banking in India. The research collected the data from 500 respondents and analyzed. The researcher used the technology acceptance model (TAM) of Davis (1986) & DTPB. Taylor and Todd (1995). It is found that when the customers are aware about the internet banking, they avail more services the second result shows contrary to expectations, the perceived utility of online banking is unrelated to the security and accessibility of Internet connection. hird, the perceived benefit of online banking services is significantly influenced by self-efficacy, simplicity of use, cost savings, and time savings. Hence it is clear that banks customers are partly associated witht the internet banking.

 

(R, 2019) “a study on customer satisfaction towards internet banking services in thoothukudi city” The researcher focused on Socio-economic factor of the respondents, Satisfaction level of customers towards internet banking, problems faced b, problems faced by the respondents and further the researcher provides the suggestions and recommendations. The researcher found that there is no significance difference between the gender and level of satisfaction of respondents towards the services provided by the internet banking.the researcher also found that the customers are facing lot of problem which availing banking services online the major problem is low internet connection, Connection lost while transaction and Lost of password. The researcher suggested that that RBI should make good policies related to the online banking and also the banks should conduct customers awareness programs towards banking.

(B. Raghavendra, 2016). Conducted a study on the Topic Customers Satisfaction towards Internet Banking Services. The researcher selected 248 customers for the study. The main aim of this research was to understanding about the satisfaction of customers to wards banking internet services. After using the ANOVA the researcher found that that there is moderate significant difference in mean scores of customer satisfaction between male and female customers. The study concludes Customer happiness is impacted by functionality, website design, and user-friendliness relating to the online banking services offered by the Public and Private sector banks. Customer satisfaction with internet banking services is significantly influenced by the clients’ gender, age, education, and income levels. Work and marital status have no impact on satisfaction. Regardless of the gender and age of the customers, banks must modify their products and services.

(Vimala, 2016). Conducted a study on the topic “An Evaluative Study on Internet Banking Security among Selected Indian Bank Customers” The objective of the research is customer awareness and expectation towards internet security, Problems faced by the respondents while using internet banking and to understand the effects of the selected customers in Coimbatore’s s’ use of online banking & security. The size of sample is 50. It is found that 18% of participants had been notified by their bankers, whereas 32% of the consumers found about security risks in Internet banking through advertisements. The researcher suggested that customers should learn about their privacy through different mediums.

(Amith Kumar Reddy, 2021)In this study “Impact of E-banking on Customer Satisfaction”, have summarized. This article aims to investigate consumer satisfaction in online banking and assess the effects of the various online banking services used by Indian banks. This study employs a quantitative methodology, and SEM and AMOs are utilized to assess the data that was gathered. When compared to their semi-urban and urban peers, the utility of e-banking services is considerably less for bank customers in rural areas. It has been discovered that “time saving and less cost” can impact bank customers’ intentions to use the internet banking site in the future. Respondents from rural, semi-urban, and urban areas saw e-banking as simple, easy to use, and a decent alternative to traditional banking, although they thought using new technologies like internet banking was complicated and tough. Internet banking is crucial for bank customers’ current and future growth, and how crucial it is to those customer’ development depends significantly on their age, level of education, occupation, and income. It is further recommended to broaden the research to learn different strategies for boosting the dependability of E-banking services in the Middle East.

(Ahmad, 2004)This study aims to examine how self-image congruence affects brand preference and satisfaction among customers who use and don’t use based on technology self-services in the retail banking industry. According to the study’s findings, self-image congruence is not related to satisfaction in the case those who utilise self-service technologies. Contrarily, non-users of self-service technology showed a positive correlation between their satisfaction with the service provider and their self-image congruence. This suggests that self-service technology users and non-users differ in how their self-images relate to their degrees of satisfaction. In conclusion the study has shown that even after encountering unsatisfactory events when using self-service technology, clients still favor the same service provider.

(Dr.Kiran.G, 2020). In the the study analysed customer satisfaction towards online banking services with public sector banks in’ Tiruchirappalli district, From this study, it is clear that bank websites and technological platforms must provide a variety of knowledge features on financial services. Banks must regularly survey customers to gauge their satisfaction if they want to keep their current clients. According to the study’s findings, the top three elements affecting customer satisfaction are rapid response, security, website design, and easy to use. Further the researcher suggested that banks should Design their website simple and easy to use. In order to attract the new customers and retain the existing customers.

(Worku G, 2016) (Impact of Electronic Banking on Customers Satisfaction in European Banking Industry) provided an overview of their findings. The situation involves customers of the banks Dashin and Wogagen in Gondar. In this paper, an effort is made to understand how customer happiness compares to traditional forms of banking and how personal characteristics of clients, such as age and occupation, affect branch visits and potential and problems with online banking. To calculate consumer satisfaction in online banking, this study used tables and percentages, the chi-square independence test, the independent t-test, and regression analysis. This study revealed that younger people, students, educated people, and businesspeople are satisfied with online banking. Hence it is proved that internet banking has significant impact on the customer’s satisfaction.

(Jyotsna Sharma, 2022). The title of present study is “The effect of customer satisfaction on the quality of the E-Banking service.” The present research seeks to determine how the quality of the services provided by e-banking services affects consumer satisfaction. The Customer satisfaction in online banking has been measured using sampling techniques. According to this study, important factors like responsiveness, security, and communication effect on satisfaction of customers with e-banking services. It is advised to conduct more research to determine how to measure and enhance the quality of e-banking services. In short, this study drew attention to the impact of service quality on client happiness. If a customer is happy with the usage of the current services, he or she is likely to utilize them repeatedly. Thus, it can be deduced from the study’s findings that consumer satisfaction with E-Banking services is influenced by tangibility, credibility, responsiveness, security, and communication.

(Sadaf Firdous, 2016) This study is conducted in Delhi. The title of the paper is “Impact of Internet Banking Service Quality on Customer Satisfaction” The main objectives of the research is to identify the various dimensions of internet banking service quality, to study the relationship between the customer satisfaction and the various internet banking service quality dimensions and to study the impact of the internet banking service quality dimensions on the satisfaction of customers. Total no of samples taken for this study is 194. To analyze this study the researcher used co-relation and it is found that the various relationships that exist between various service quality dimensions and customer satisfaction in internet banking. The researcher further used regression and found that internet banking service quality does have an impact on the customer satisfaction in internet banking in New Delhi. Hence from the both results it is clear that the services dimensions of services quality have various relationships exist and also have impact on satisfaction.

Significance of the study

Internet banking involves the transfer of sensitive financial information, making security a crucial aspect. By understanding their concerns and perceptions, banks can identify areas of improvement and enhance security protocols to protect student customers from potential cyber threats and fraudulent activities. User satisfaction is also key factor for the success of internet banking services. By investigating students’ satisfaction levels with internet banking, Banks can utilize these findings to improve their services, user interfaces, and overall customer satisfaction, leading to increased usage and loyalty among student customers. This study provides insights into students’ perceptions of security measures implemented by banks in Jammu and Kashmir.  In this essence trust and confidence are essential for the widespread adoption of internet banking services. By addressing security concerns and enhancing user satisfaction, this study can contribute to building trust and confidence among students in Jammu and Kashmir towards internet banking. Increased trust can encourage more students to adopt and utilize internet banking services, leading to greater financial inclusion and convenience. Policymakers can utilize this information to develop regulations and guidelines that ensure the safety and satisfaction of student customers. This can promote a secure and reliable internet banking ecosystem, benefitting both students and banks. Being a region with unique geographical and socio-economic challenges, may have specific barriers to internet banking adoption. This study can identify these barriers and provide insights into how they can be addressed, thus helping bridge the digital divide. By making internet banking more accessible and secure for students in Jammu and Kashmir, this study can contribute to financial inclusion and empowerment. The significance of this study lies in its potential to enhance security measures, improve user satisfaction, promote trust and confidence, inform policy and regulations, and bridge the digital divide in internet banking services among students in Jammu and Kashmir. By addressing these aspects, the study can contribute to the growth and development of a secure and user-friendly internet banking environment, benefiting both students and the banking sector.

Statement of the problems

The purpose of present study is to explore the knowledge and awareness of internet banking among students at all the level from secondary to higher education level. Hence the study felt need under investigation as entitled as, “Security measurement and satisfactions towards internet banking among students in Jammu and Kashmir”.

Objectives 

  1. To study the level of security measurement towards internet banking among students of Jammu and Kashmir.
  2. To study the level of satisfactions towards internet banking among students of Jammu and Kashmir.
  3. To know the relationship between security measurement and satisfactions towards internet banking among students in Jammu and Kashmir
  4. To study the impact of security measurement on satisfactions towards internet banking among students in Jammu and Kashmir.

Hypothesis

H01 there exist no significant relationship between security measurement and satisfactions towards internet banking among students in Jammu and Kashmir

H02 There exist no significant impact of security measurement on satisfactions towards internet banking among students in Jammu and Kashmir.

Methodology

In this study, the researcher used the survey method under the descriptive type of research to analyse the level, impact, and relationship of security measurement and satisfactions towards internet banking among students in Jammu and Kashmir This study includes the primary source of data for analyzing the security measurement of satisfaction with Internet banking among students in Jammu and Kashmir. The study includes all the students of higher education, such as UG, PG, and PhD-level students, as a population. The area of the study is only confined to Jammu and Kashmir. In this study, 500 students are selected as a sampling under simple random sampling techniques of probability sampling. For the collection of data, the researchers used self-developed scales such as security measurement towards internet banking and students’ satisfactions towards internet banking for the study. For the analysis of the data, the researcher used some statistical techniques such as, mean average, standard deviation, Pearson product moment correlation, and paired sample t test for the present study. The researcher collected data for the study using an online mode as well as a Google form.

Result and Discussion

  1. To study the level of security measurement towards internet banking among students of Jammu and Kashmir.

For the objective first the researcher applied range, frequency and percentage. Table 1.1 shows that the level of security measurement towards internet banking among students of Jammu and Kashmir.

VariableLevelsRangeFrequencyPercentage
Security measurementtowards internet bankingHighAbove 6119038%
Average40-6025551%
LowBelow 405511%
             Total500100%

The above table 1.1 reveals the range, frequency, and percentage of security measurement towards internet banking among students in Jammu and Kashmir. Out of 500 students, 190 students (38%) have a high level of security measurement towards internet banking, 255 students (51%) have an average level of security measurement towards internet banking, and 55 students (11%) have a low level of security measurement towards internet banking. Based on the above result, it can be concluded that the majority of the students are showing an average level of security measurement towards internet banking in Jammu and Kashmir.

Further, the result indicates that a significant portion of students in Jammu and Kashmir are aware of and prioritise security measures while using internet banking services. The high percentage of students with an average level of security measurement suggests that they have a basic understanding of security measures but may benefit from further education or awareness to enhance their security practises. The relatively low percentage of students reporting a low level of security measurement is encouraging, as it suggests that a small proportion of students are not effectively arranging security when using internet banking.

However, it is still important to address the needs of these students and provide them with the necessary resources and education to improve their security practises. Overall, the findings highlight the importance of promoting and maintaining strong security measures in internet banking services. Banks and financial institutions should continue to educate and raise awareness among students about the significance of security and provide clear guidelines and tools to ensure safe and secure online banking experiences.

  • To study the level of satisfactions towards internet banking among students of Jammu and Kashmir.

For obtaining the result from objective 2nd the researcher applied range, frequency and percentage as a statistical technique in the below table 1.2. 

VariableLevelsRangeFrequencyPercentage
Students Satisfactions towards internet bankingHighAbove 6125551%
Average40-6022044%
LowBelow 40255%
                 Total500100%

The above table 1.2 reveals the range, frequency, and percentage of satisfaction towards internet banking among students in Jammu and Kashmir. Out of 500 students, 255 students (51%) have a high level of satisfaction towards internet banking, 220 students (44%) have an average level of satisfaction towards internet banking, and 25 students (5%) have a low level of satisfaction towards internet banking. From the above result, it can be concluded that the majority of the students are showing a high level of security measurement towards internet banking in Jammu and Kashmir.

This indicates that a significant proportion of students in Jammu and Kashmir are satisfied with their internet banking experiences. The high percentage of students with a high level of satisfaction suggests that they find internet banking services to be reliable, convenient, and meet their needs. The relatively low percentage of students reporting a low level of satisfaction is positive, as it indicates that a small proportion of students are dissatisfied with their internet banking experiences. However, it is important to address the concerns of these students and identify the factors contributing to their low satisfaction. Banks and financial institutions should focus on improving the areas that are leading to dissatisfaction among this group of students.

Moreover, the findings highlight the overall positive satisfaction levels among students towards internet banking in Jammu and Kashmir. This suggests that internet banking services are meeting the expectations and needs of the majority of students. However, it is important for banks to continue monitoring and improving their services to ensure sustained high levels of satisfaction. Overall, the study indicates that students in Jammu and Kashmir have a high level of satisfaction with internet banking. This positive perception of internet banking services can contribute to increased adoption and usage among students, promoting financial inclusion and convenience in the region.

  • To know the relationship between security measurement and satisfactions towards internet banking among students in Jammu and Kashmir.

To test the null hypothesis “there exist no significant relationship between security measurement and satisfactions towards internet banking among students in Jammu and Kashmir”. The researcher applied Pearson product moment correlation for analyzing the below data in the table 1.3

VariablesNMSD‘r’ ValueRemarks
Security measurement towards internet banking 500 61.29 7.56  0.109 Positive Co-relation
Satisfactions towards internet banking 500 63.19 6.78

The above table 1.3 reveals the relationship between security measurement and satisfactions towards internet banking among students in Jammu and Kashmir. The above table reveals that the mean average of security measurement towards internet banking is 61.29 and the standard deviation is 7.56, and the mean average and standard deviation of satisfactions towards internet banking are 63.19 and 6.78, respectively. The ‘r’ value of both variables, such as security measurement towards internet banking and satisfactions towards internet banking, is 0.109. From the above table, it can be concluded that there is a positive association between the security measurement towards internet banking and satisfactions towards internet banking in Jammu and Kashmir. So therefore, the null hypothesis “there exists no significant relationship between the security measurement and satisfactions towards internet banking among students in Jammu and Kashmir” is rejected.

The findings of the study imply that students who prioritise security measures and have a higher level of security measurement towards internet banking are more likely to experience higher levels of satisfaction with their internet banking services in Jammu and Kashmir. Overall, the study suggests that a positive association exists between security measurement and satisfaction towards internet banking among students in Jammu and Kashmir. Banks and financial institutions should continue to emphasise the importance of security measures to enhance satisfaction levels among students and promote a secure and reliable internet banking environment.

  • To study the impact of security measurement on satisfactions towards internet banking among students in Jammu and Kashmir.

To test the null hypothesis “there exist no significant impact of security measurement on satisfactions towards internet banking among students in Jammu and Kashmir”. The researcher applied paired sample t test for analyzing impact of below data shown in the table 1.4

VariableNMeanS. DDf ‘r’Value‘t’valuep’valueRemarks
Security measurement towards internet banking 500 61.29 7.56 498 .170 8.454 0.00* Significant at .01 level
Satisfactions towards internet banking 500 63.19 6.78

*Significant at 0.01 level

The above table 1.4 reveals the impact of security measurement on satisfactions towards internet banking among students in Jammu and Kashmir. The mean average of security measurement towards internet banking and satisfactions towards internet banking are 61.29 and 63.19, respectively, and the standard deviation of both variables is 7.56 and 6.78. The ‘r’ value is 1.70, and the t-value is 8.454 with 498 degrees of freedom. Therefore, from the above table, it can be concluded that there is a significant impact of security measurement on satisfactions with internet banking among students in Jammu and Kashmir. So, the null hypothesis “there exists no significant impact of security measurement on satisfactions towards internet banking among students in Jammu and Kashmir” is rejected.

Moreover, the result shows that as the level of security measurement increases, satisfaction towards internet banking also increases significantly. The rejection of the null hypothesis “there exists no significant impact of security measurement on satisfactions towards internet banking among students in Jammu and Kashmir” suggests that security measurement does have a significant impact on satisfaction towards internet banking among students in Jammu and Kashmir.

Overall, the study highlights the importance of security measurement in influencing satisfaction levels among students towards internet banking in Jammu and Kashmir. Banks and financial institutions should prioritize and enhance security measures to improve satisfaction and provide a secure and reliable internet banking experience for students.

Conclusion

The present study aims to explore the level and relationship of security measurement and satisfaction towards internet banking among students in Jammu and Kashmir. In this study, the researcher also explores the impact of security measurement on satisfaction towards internet banking among students in Jammu and Kashmir. Based on the above result, it can be concluded that the majority of the students are showing an average level of security measurement towards internet banking in Jammu and Kashmir.

Additionally, the researcher finds out that the majority of the students are showing a high level of security measurement towards internet banking in Jammu and Kashmir. The researcher found a positive association between security measurement and satisfaction towards internet banking among students in Jammu and Kashmir. Furthermore, the researcher highlights the importance of security measurement in influencing satisfaction levels among students towards internet banking in Jammu and Kashmir.

However, the results of this study emphasise the importance of security measurement in influencing satisfaction levels among students towards internet banking. It underscores the need for banks and financial institutions to prioritize and enhance security measures to ensure a safe and reliable internet banking environment for students in Jammu and Kashmir. Overall, the conclusion of the study reveals a significant positive relationship between security measurement and satisfaction towards internet banking among students in Jammu and Kashmir. As traditional banking infrastructure faces limitations in such areas, internet banking emerges as a pivotal solution, providing accessibility and convenience even to populations in remote areas. In a nutshell, this study is focusing on Satisfaction with internet banking and security measures among the students. The study applies rigorous statistical methods to find out the impact of internet banking on students.

References

A. Meharaj Banu, N. S. (2019, Online Banking and Customer Satisfaction: Evidence from India Asia-Pacific Journal of Management Research and Innovation). Online Banking and Customer Satisfaction: Evidence from India. Asia-Pacific Journal of Management Research and Innovation, 15(1-2).

Ahmad, J. (2004). Retail Banking and Customer Behaviour: A Study of Self Concept, Satisfaction and Technology Usage. The International Review of Retail, Distribution and Consumer Research, 14(3), 357-379.

Amith Kumar Reddy, M. B. (2021). IMPACT OF E-BANKING ON CUSTOMER SATISFACTION. PALARCH’S JOURNAL OF ARCHAEOLOGY OF EGYPT/EGYPTOLOGY, 18(08).

B. Raghavendra, P. S. (2016, September ). Customers Satisfaction towards Internet. International Journal of Management and Commerce Innovations, 4(1), 491-498.

Dr. Kiran.G, D. A. (2020, April). Customers Satisfaction Towards Online Banking Services Of Public Sector Banks. International Journal of Scientific & Technology Research, 9(4).

Jyotsna Sharma, J. S. (2022, January). Impact of E-Banking Service Quality on Customer Satisfaction. International Journal of Recent Technology and Engineering (IJRTE), 8(5).

R, S. B. (2019, November ). Customer satisfaction towards internet banking services in Thoothukudi. Conference: Innovative Banking Services – A Transformative Tool For Business, Finance And Customer Service.

Sadaf Firdous, R. F. (2016). Impact of Internet Banking Service Quality on Customer Satisfaction. Journal of Internet Banking and Commerce.

Vimala, V. (2016, 5). An Evaluative Study on Internet Banking Security among. Amity Journal of Management Research, 1(1), 63-79.

Worku G, T. A. (2016). The Impact of Electronic Banking on Customers’ Satisfaction in. Journal of Business & Financial Affairs, 5(2), 1-18.

A Review on the Impact of Online Job Portals on Employee Performance

Ahjaz Ahmed*

Ph. D Research scholar, Department of Management,

Maulana Azad National Urdu University Hyderabad.

Abstract:

The development of technology in the digital age has had a huge impact on many aspects of our life, including how we find and keep jobs. The introduction of internet job portals has completely changed the way people hunt for jobs by giving them a platform to communicate with businesses. This article examines and assesses the effect of online job portals on worker performance, highlighting the benefits and potential pitfalls of this cutting-edge job search strategy. Now that technology is prevalent everywhere, everything is made simple. Every aspect of human life has been impacted by technology. Thanks to online job portals, where applications are only a click away and hundreds of positions are always open, finding a job has gotten easier nowadays. Job portals offer all varieties of jobs, and the majority of them are free, which increases their popularity in the labour market. Employees hired using online job portals perform as well as those hired through more conventional means. Online job portals are more practical, affordable, time-saving, and accessible. Job portal features like filter, sort by, and generate your resume now are improving the effectiveness of employment portals, something that was previously impossible because it took more time, was less effective, required more personnel, and was less transparent. This study is based on a review of comparable studies to determine the effect of online job portals on employee performance. According to a review of several research studies, online job portals have a favorable effect on employee performance, demonstrating the importance of technology in modern life and how it makes life more efficient and time-saving.

 Keywords: Online Job Portal, Technology, Recruitment, Employee, Performance

Introduction

The recruitment process now fully depends upon technology because as the job seekers are increasing and at the sametime getting a job is becoming more complex. The recruitment process is to place a candidate at the right position according to his skills and experience. In this time, all the recruitment process is being carried out using technology and internet. Technology has changed the way we live our life, we think, we spend our time, we use gadgets and devices etc.basically our life has changed drastically due to technology. In the same way, the recruitment process has changed, and it has become easier, effective, and cost efficient which has changed the scenario of recruitment totally. Today, a variety of networking websites, such as Nakuri.com, Monster.com, Shine.com, Fresher’s World, Times Jobs, LinkedIn, Free Jobs Alerts, etc., are used to find qualified candidates for employment. These websites have emerged as significant sources of good personnel for both employees and organizations. Online job portals have a significant impact on employee performance in several ways, making workers more productive because they provide the right guidance regarding market demand for skills, popular job categories, and compensation packages that have an effect on workers’ performance.  This study is based on the impact of online job portals on employee performance in which related studies have been reviewed to know the impact. From the review of various research papers, it is found that the positive impact of online job portals on employee performance which shows the technology is playing a vital in human life and more technology is making life easy and effective and saving the precious time. E-recruitment is a method that handles the full hiring process, from beginning to end, including posting job ads, receiving resumes, and choosing the best candidate for the job based on their qualifications. It functions effectively and efficiently. The ability to attract quality candidates (in terms of abilities, attitude, knowledge, and aptitudes) for the company is aided by the use of the internet.

Literature review 

Recruitment

Edwin B. Flippo (1984) It studied that Recruitment is the main duty of the human resource department. Finding, enticing, screening, reducing the field, interviewing, selecting, hiring, and onboarding employees are all steps in the process. “Recruitment is the process of seeking out potential employees and encouraging them to submit applications for positions within the firm.”

Parry & Wilson (2009) Determine that “recruitment encompasses those processes and actions conducted by the organization with the primary goal of identifying and recruiting potential personnel.” The size of the recruitment team of a company might vary depending on the size of the organization. In smaller businesses, a recruiting manager, however, is frequently in charge of recruiting. Many organizations outsource their hiring needs, but some merely use advertisements, job Portals to identify candidates for open positions. To improve and streamline the hiring process, many businesses employ hiring software nowadays.

The basis of a successful recruitment process is an organization-specific sourcing model that aims to find the best applicant for the ideal role at the ideal moment. It is a methodical process for enlisting outstanding individuals who can super business expansion. The five main stages of an all-encompassing hiring process might differ from company to firm depending on the business vertical, organizational structure, size, operational style, and selection procedure

E-Recruitment Process

E-Recruitment is the rage right now and represents the newest trends in hiring. The use of technology or web-based solutions to facilitate the hiring process is also referred to as “online recruitment.” The resource may be an employment website like naukri.com, the company’s official website, or its own intranet. The internet is being used by both large and small businesses as a source of hiring.

“E-recruiting is using the internet to recruit through Job portals, corporate websites, specialized websites or onlineadvertisement”, Galanaki (2002).

The organization’s e-recruitment initiatives and e-recruitment process have an impact on the structure, effectiveness, and efficiency of the organization’s recruiting process. The HR division oversees the diversity of the workforce with regard to culture, time zones, specializations, benefits, and salary. Secondary data was collected for this study. According to this study, employers seem to more concerned about hiring a qualified, quality-oriented candidate over one who is more concerned with price. Third parties, such as headhunters and recruiting agencies, actively participate in the online hiring process. E-recruitment improves efficiency and efficacy of the hiring process. Particular internet recruitment techniques contribute to organizational advancements and improve organizational recruiting performance. Fred and Kinange (2016).Most of the organizations in Pakistan were using both e-recruitment and traditional recruitment sources. It also revealed that the IT based organizations are not completely relying on e-recruitment. The study also indicated that majority of respondent organizations use e-recruitment for filling the top positions Nasreem et al. (2016)

Online Job Portals

Job portals are a straightforward but useful tool. They make room for both companies and employees and make it simpler to access a wide range of employment in various industries and skill levels. They also lower fees for middlemen and headhunters as well as the costs of job matching. Job websites have improved employment access for all people. Before they existed, informal networks and social contacts dominated the job-seeking landscape. Social network job searches typically favor well-connected individuals, further entrenching already-existing inequities. This implicit prejudice in access to both official and informal jobs can be lessened by ensuring equal access to online job platforms. The Covid-19 pandemic, which harmed every industry area, had an effect on every firm in the world. In April to May 2021, there were around 22.7 million job losses, according to research by the Centre for Monitoring Indian Economy. As the life is being normal, so the hiring process in India has surged apparently, especially last August has witnessed 89 percent increase and hiring for specific roles has grown as well specially in IT sector. According to estimates, the largest employment portals fill more than 80% of job advertisements. In that time job portals play a vital role in recruitment process.

Employee Performance

A worker’s performance is defined as how well they carry out their duties and finish vital tasks. It emphasizes the value, quality, and effectiveness of their output. How valuable each individual is to the business depends on their performance. For a business, each person represents a significant investment, therefore the return that Employee contributions must be substantial. Employee performance is influenced by a variety of variables that have an effect on their lives, such as pay, benefits, the workplace culture, bonuses, and admiration.

Impact on Employee Performance

Employee satisfaction is influenced by a variety of factors, including management expectations, coworkers, personal issues, and company culture. Companies must take the initiative to ensure that their staff members are pleased by learning what they need and giving them the resources, they need to improve their talents.

In comparison to individuals who do not use the Internet, the data shows that job searchers who have registered with job portals are about 6% more likely to be employed and that their reservation earnings are 1300 rupees higher (a 10% increase above the mean). Additionally, we discover that employed individuals who are registered with portals have actual incomes that are 13% greater than those who are not. On the other hand, employees who rely more on social networks for support have slightly lower employment possibilities and lower associated salaries. The impact and role of job portals is vital in the life employee which enables them to perform well and make future bright.

Advantages for Employee Performance

1. Increased Access to Opportunities: Online job boards have democratized the labour market by removing distance restrictions. Job searchers have more options for obtaining work that match their talents and career goals because they can look at opportunities outside of their immediate area. Improved job matching and more job satisfaction may result from this expanded access.2. Efficiency and Speed: Sending paper applications and waiting for responses was the usual way of looking for work. This procedure has been streamlined by online job portals, which let applicants submit applications in a matter of minutes for several vacancies. This effectiveness shortens the time between searching for a job and getting hired, resulting in smoother transitions and perhaps fewer spells of unemployment.

3. Customized Job Search: Job portals frequently provide search filters that let job seekers focus their search based on particular factors like industry, region, amount of experience, and job type. This personalization enables job seekers to identify positions that closely match their tastes and skill sets, improving the fit between the employee and the employment role.

4. Access to Information: Job portals frequently provide search filters that let job seekers focus their search based on particular factors like industry, region, amount of experience, and job type. This personalization enables job seekers to identify positions that closely match their tastes and skill sets, improving the fit between the employee and the employment role.

5. Skill Development: Candidates frequently need to improve their digital literacy abilities in order to succeed in the digital application process. The ability to use online platforms, build compelling profiles, and submit digital applications might help a job candidate develop skills beyond the current job search, potentially enhancing their overall digital competency.

Potential Drawbacks

1. Competition and Oversaturation: Because it’s so simple to apply for jobs online, more people are doing so, which has boosted competitiveness and the number of applications that businesses receive. This may lead to oversaturation, which will make it difficult for individual applications to stand out and may aggravate job seekers.

2. Lack of Personalization: Online apps might not have the same level of personalization that can be found in more conventional techniques, including networking events or in-person encounters. The candidate’s capacity to demonstrate their soft talents and leave a lasting impression on employers may be hampered by this impersonal character.

3. Limited Visibility for Non-Digital Roles: While online job portals are useful for office- and digital-based roles, they might not be as useful for jobs that call for specialized or hands-on abilities. There may not be as much representation for certain occupations on internet platforms, such as manual labour or the creative arts

4. Quality of Listings: It’s possible for some job portals to host listings that are unreliable, deceptive, or even fraudulent. To make sure that the positions they apply for are genuine and in line with their expectations, job searchers should use prudence and practice due diligence.

Conclusion

E-recruitment is another term for online recruiting. In our country, reputable employment portals like monster.com, nakuri.com, shine.com, and numerous networking sites are accessible to help employers and employees with the hiring and selection procedures. The procedure is quite easy to understand for both the person and the business. E-recruitment has several advantages, including the capacity to move more rapidly, convenience of use, reduced administrative costs and manpower, and increased competency on the part of the company and personnel. For those who are directly or indirectly involved in the e-recruitment process and who are employed as HR personnel within the company, this study is highly helpful. A flawless answer is required for everything in the fast-paced, accuracy-focused world of today. In a similar vein, the recruitment process has become more efficient and time-saving thanks to the employment of highly sophisticated technologies. According to the study, job portals have a beneficial effect on employee performance since they make it simple to grow in your career and find decent jobs with competitive pay. The job platform also offers expert coaching and knowledge of potential future career paths. Undoubtedly, the concept of job portals has gained popularity as a preferred means of recruitment for both job seekers and employers, but its efficiency and ability to meet job seekers’ expectations is what will make it the ideal platform for recruiting.

References

Ahlawat, R., & Sangeeta E-recruitment: Transforming trends of recruitment in Human resource management, Global journal of Engineering Science and Research Management, 3(1), 21–25. (2016).

Amusan, D.G., Oyediran, M.O., Development of efficient e-recruitment system for university staff in Nigeria,Circulation in computer science, 1(1), 10-14. (2016). International Journal of Management, Technology And Engineering Volume 8, Issue XI, NOVEMBER/2018 ISSN NO : 2249-7455 Page No:1564

Anand. J., Chitra Devi, S., Literature review on e-recruitment and its perceived benefits: A walk towards paperless HR, International journal of applied research,2(11), 528-531. (2016).

Chauhan. D., Chaturvedi. L., Efficacy of j1ob portals and social media on organizational business, international journal of advanced research in management and social sciences, 2(7), 170-181. (2013).

Edwin B Flippo (1984) personnel management, sixth edition-Hill International Edition, Management series.

Faliagka, E., Tsakalidis, A., & Tzimas, G. An investigated e-recruitment system for automated personality mining and applicant ranking, internet research, 22(5),551-568. (2012).

Fred and Kinange (2016). International Research Journal of Engineering and Technology (IRJET)

Galanaki. E (2002) “The decision to recruit online: a descriptive study”, Career Development International vol. 7 No 7. 4, pp 243-251. http://doi.org/10.1108/13620430210431325.

Mansourvar, M., Mohd Yasin, B. N., Development of a job web portal to improve education quality, Internetional journal of computer theory and engineering, 6(1), 43-46. (2014).

Nasreem, S., Hussan, M., & Khan, T.A. effectiveness of e-recruitment in small and medium enterprises of IT industry of lahore (Pakistan), Pakistan Economic and Social Review, 54(1), 143–164. (2016)

Nasreen, Sidra, et al. “effectiveness of e-recruitment in small and medium enterprises of it industry of Lahore (Pakistan).” Pakistan Economic and Social Review, vol. 54, no. 1, 2016, pp. 143–64. JSTOR, https://www.jstor.org/stable/26616703. Accessed 12 Oct. 2022.

Parry, E. and Wilson, H. (2009), Factors Influencing the adoption of online recruitment. Personnel Review.

Rakholiya, N.& Gupta, C. A study on the Applicant’ s Perception towards E-recruitment, International MultidisciplinaryJournal of Applied Research, 1(1), 50–53. (2013)

Ramaabaanu, R. & Saranya, M. Importance and problems of e-recruitment, international journal of research, 1(9), 445-450. (2014) International Journal of Management, Technology and Engineering Volume 8, Issue XI, NOVEMBER/2018 ISSN NO: 2249- 7455 Page No:1566

Rani. R., E-recruitment and its impact upon on job seekers: A contemporary approach, IJARIIE,2(4), 335-339. (2016).

Sherkar, A. A Study on Use of E- Resources in Recruitment and Selection Process in 5 Star Hotels, Atithya: A Journal ofHospitality,1(1),15-19. (2015).

Sylva, H., & Mol, S.T. E-recruitment: A study into applicant perceptions of an online application system, internationaljournal of selection and assessment,17(3),311-323. (2009).

IJR – Research Journal

International Journal of Research (IJR) is an Open Acess, peer reviewed, international online publishing journal, which aims to provide a platform for the exchange of information covering all aspects of science, technology, and public policy including technicism, appropriate technology, microbiology, environmental studies, materials science and so on. Articles presenting original research in the field are expected for publishing in this journal. 

Photo by Startup Stock Photos on Pexels.com

IJR provides a forum for sharing timely and up-to-date publication of scientific research and review articles. The journal publishes original full-length research papers in all areas related to corporate governance, human resource management, strategic management, entrepreneurship, marketing, e-business, services, information technology management, production & operations management, financial management, decision analysis, management research methods and managerial economics, etc. SJBM aims to enhance the dissemination of knowledge across the business and management community. 

Send papers for publication to ijr@ijrjournal.com

IJR – International Journal of Research

International Journal of Research (IJR) provides a forum for sharing timely and up-to-date publication of scientific research and review articles. The journal publishes original full-length research papers in all areas related to hypothetical and theoretical in its nature and that provides exploratory insights in the fields of accounting, corporate finance, investment, insurance, monetary banking, stock exchange, capital markets and relevant subjects. It is devoted to enhancing research outlets for the finance and accounting disciplines in the world. 

Photo by Ono Kosuki on Pexels.com

IJR provides a forum for sharing timely and up-to-date publication of scientific research and review articles. The journal publishes original full-length research papers in all areas related to the theory and practice of HRM, as well as the critical examination of existing concepts, models, and frameworks. Concerned with the expanding role of strategic human resource management in a fast-changing global environment, the journal focuses on providing a critical link between high quality academic research and the practical implications for business practice. 

Send papers for publication to editor@pen2print.org