- The Complete Research Material is averagely 75 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦6,000
Get the complete project »
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND TO THE STUDY
There are few innovations that have changed the dynamics of banking as much as the e-banking revolution. Throughout the world, banks are reorganizing their business strategies to take advantage of new business opportunities offered by e-banking. Electronic banking is believed to have started in the early 1980s. It has since then been growing in an unprecedented dimension in line with the growth in ICT development. E-banking has enabled banks to overcome borders, adopt strategic outlook, and bring in new possibilities. According to Nitsure (2003), information communication technology has reduced the cost of processing and facilitating the transmission of information leading to drastic changes in the banking business. It is worth noting that e-banking has not been limited to advanced countries, but is found even in countries with underdeveloped e-banking systems, as a result of the many new business opportunities offered by e-banking.
Although no official definition of e-banking has been established, it generally implies a service that allows customers to use some form of computer to access account-specific information and possibly conduct transactions from a remote location like home or workplace. Additionally, e-banking has obvious advantages to the customer in terms of convenience where customers conduct routine banking transactions from the comfort and security of any location from which they wish to transact. The emerging concept of e-banking has drawn the attention of the business fraternity as well as of scholars and researchers to the effects of such dynamics on the banking industry. For instance, Liao and Wong (2008) in their study of the determinants of customer interactions with Internet-enabled e-banking found that factors such as perceived usefulness, ease of use, security, convenience, and responsiveness to service requests to be a strong measure of the variation in customer interactions. Based on this finding, they suggested that stringent security control is critical to e-banking operations. Such arguments do not only have managerial implications for enhancing Internet banking operations and developing viable electronic banking services, but also form the basis upon which this study is based.
E-banking technology created a revolution by extending banking hours beyond office hours and beyond national boundaries (Balachandran & Balachandher, 2000). In Nigeria, several studies on e-banking have been done. Chiemeke, Evwiekpaefe, & Chete (2006), for instance, conducted a pragmatic study on adoption of e-banking where major hindering factors to Internet banking adoption such as insecurity and inadequate operational facilities, including telecommunications facilities and electricity supply, were identified.
Crime and corruption represent a major concern for business
executives not only in Nigeria but also in other parts of Africa
(Olasanmi, 2006). In Nigeria, for instance, the most serious impediments
to economic activities and business are crime and corruption which
averages 75% and 71% respectively. Theft and fraud are the second most
popular crimes after burglary. By definition, cyber crime may be
referred to as any form of misconduct in cyber space. It is simply
defined as the criminal use of the Internet. Cyber crime is believed to
have started in the 1960’s in the form of hacking. This was followed by
privacy violations, telephone tapping, trespassing and distribution of
illegal materials in the 1970s. The 1980s witnessed the introduction of
viruses. The fast pace of development of ICT from the 1990s till today
has added to the list of criminal exploits in cyber space. Today, the
Internet is used for espionage and as a medium to commit terrorism and
transnational crimes. With e-banking gaining ground in Nigeria and other
parts of sub-Saharan Africa, customers and online buyers are facing
great risk of unknowingly passing on their information to fraudsters.
"Hackers” get information of those who have made purchases through
websites and then make fake cards, which they use with less detection.
Absence of a law specifically dealing with card-related crimes in
Nigeria may be giving thieves a loophole to operate freely (Olasanmi,
2006). Police treat card-related crimes like any other case of fraud.
1.2 STATEMENT OF THE PROBLEM
This study is examining the types of cyber crimes that have economic impact either directly or indirectly on the financial system of a nation or having cross border ripple effects with focus on e-banking. Longe & Chiemeke (2008) simplified the list of unintended consequences of ICT to include acts such as Phishing, cyber terrorism, electronic spam mails, cyber-stalking, and fake copy -cat websites. While some types of cyber crimes are specific to Nigeria, other types, such as identity theft and false statements, cut across all countries.
1.3 OBJECTIVES OF THE STUDY
The following are the objectives of this study:
- To evaluate the relationship between e-banking and cyber crime.
- To identify factors militating against effective e-banking services.
- To determine the solution to the issues of cybercrimes that are related to e-banking.
1.4 RESEARCH QUESTIONS
- What is the relationship between e-banking and cyber crime?
- What are factors militating against effective e-banking services?
- What is the solution to the issues of cybercrimes that are related to e-banking?
1.5 HYPOTHESIS HO: There is no significant
relationship between e-banking and cybercrime. HA: There is significant
relationship between e-banking and cybercrime.
1.6 SIGNIFICANCE OF THE STUDY The following are the significance of this study:
- The outcome of this study will educate the general public especially the users of e-banking services on the relationship between e-banking and cybercrime.
- This research will be a contribution to the body of literature in the area of the effect of personality trait on student’s academic performance, thereby constituting the empirical literature for future research in the subject area.
1.7 SCOPE/LIMITATIONS OF THE STUDY
This study will cover the relationship between e-banking services and cybercrime in Nigeria.
1.8 LIMITATION OF STUDY
Financial constraint- Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet, questionnaire and interview).Time constraint- The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work.
REFERENCES Balachandran and Balachandher K. G. (2000), "E-Banking Development in Malaysia: Prospects and Problems", 10 JIBL, 250. Chiemeke, S. C., Evwiekpaefe, A. and Chete, F.(2006) The Adoption of Internet Banking in Nigeria: An Empirical Investigation, Journal of Internet Banking and Commerce, Vol. 11, No.3, Liao Z. & Wong W. K., (2008).The Determinants of Customer Interactions with Internet-Enabled e-Banking Services. The Journal of the Operational Research Society, Vol. 59, No. 9 (Sep., 2008), pp. 1201-1210. Longe, O.B.& Chiemeke, S.C. (2008): Cybercrime and Criminality in Nigeria- What roles are internet Access Points in Playing. European Journal of Social Sciences, Volume 6 No 4. Nitsure, R. R. (2003) E-Banking: Challenges and Opportunities. Economic and Political Weekly, Vol. 38, No. 51/52 pp. 5377-5381 Olasanmi, O. O (2010). Computer Crimes and Counter Measures in the Nigerian Banking Sector. Journal of Internet Banking & Commerce, 15(1), 1-10 (http://www.arraydev.com/commerce/jibc/ )
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
-
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
-
1. A WEB-BASED INTRUSION DETECTION AND PREVENTION SYSTEM USING NEURAL NETWORKS
» ABSTRACT In recent times, it has become a necessity to obtain a security measure for computer networks due to the high influx of perpetrators using th...Continue Reading »Item Type & Format: Project Material - Ms Word | 64 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
2. DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM (A CASE STUDY OF THE NIGERIAN POLICE)
» CHAPTER ONE 1.0 INTRODUCTION National security is the requirement to maintain the survival of the state through the use of economic, security operativ...Continue Reading »Item Type & Format: Project Material - Ms Word | 87 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
3. DESIGN AND IMPLEMENTATION OF A SOFTWARE FOR EXAMINATION SUPERVISION SCHEDULING FOR AN INSTITUTION OF HIGHER LEARNING
» ABSTRACT This project aims at automating the examination supervision scheduling of the institute of management and technology, Enugu. An in dept study...Continue Reading »Item Type & Format: Project Material - Ms Word | 50 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
4. COMPUTERIZED TREATMENT OF BYOPIA AND PRESBYOPIA SYSTEM
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY The discovery of the computer has to a greater extent revolutionized most profession and their wo...Continue Reading »Item Type & Format: Project Material - Ms Word | 43 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
5. DESIGN AND IMPLEMENTATION OF COMPUTERIZED DIRECTORY OF BUSINESS PREMISES
» ABSTRACTThe software package used in this protect is quick Basic which centered on soloing the problem of relational business activities arising from ...Continue Reading »Item Type & Format: Project Material - Ms Word | 47 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
6. DESIGN AND IMPLEMENTATION OF A FIXED ASSET MANAGEMENT INFORMATION SYSTEM (A CASE STUDY OF UNITED AFRICAN COMPANY OF NIGERIA (UACN) DEVELOPMENT COMPAN...
» CHAPTER ONE INTRODUCTION Fixed asset management information system is a sub operation in financial accounting that take care of the degeneration of as...Continue Reading »Item Type & Format: Project Material - Ms Word | 75 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
7. PENSION FUND MANAGEMENT INFORMATION SYSTEM
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY Pension is generally a way of catering for the need of the retiree. It is a form of income provided t...Continue Reading »Item Type & Format: Project Material - Ms Word | 127 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
8. AUTOMATED COOPERATIVE SOCIETY (A CASE STUDY OF AYEDIRE LOCAL GOVERNMENT COOPERATIVE INVESTMENT AND CREDIT UNION )
» ABSTRACT The proposed project topic above is centered on the critical needed for registration of both the individuals and the e...Continue Reading »Item Type & Format: Project Material - Ms Word | 52 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
9. DESIGN AND IMPLEMENTATION OF WEB BASED REGISTRATION PORTAL
» ABSTRACT The design and implementation of a web based registration portal for Cadets of NDA is a process of nation building and should not be undermin...Continue Reading »Item Type & Format: Project Material - Ms Word | 102 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT
-
10. Antimicrobial activities of garlic and ginger extracts
» ANTIMICROCOBIA ACTIVITIES OF GARLIC AND GINGER EXTRACTSTable of ContentCover Page iTitle Page iiAcknowledgement iiiTable of Contents ivCHAPTER ONE– ...Continue Reading »Item Type & Format: Project Material - Ms Word | 76 pages | Instant Download | Chapter 1-5 | COMPUTER SCIENCE DEPARTMENT