Home / Computer Science / Evaluation of the relationship between e-banking and cyber crime in nigeria

Evaluation of the relationship between e-banking and cyber crime in nigeria

 

Table Of Contents


Chapter 1

1.1 Introduction
1.2 Background of Study
1.3 Problem Statement
1.4 Objective of Study
1.5 Limitation of Study
1.6 Scope of Study
1.7 Significance of Study
1.8 Structure of the Research
1.9 Definition of Terms

Chapter 2

2.1 Evolution of E-Banking
2.2 Overview of Cyber Crime
2.3 The Relationship Between E-Banking and Cyber Crime
2.4 Types of Cyber Crimes in E-Banking
2.5 Security Measures in E-Banking
2.6 Impact of Cyber Crime on E-Banking Operations
2.7 Regulatory Framework for E-Banking and Cyber Crime
2.8 Global Perspectives on E-Banking and Cyber Crime
2.9 Case Studies on E-Banking and Cyber Crime
2.10 Future Trends in E-Banking and Cyber Crime

Chapter 3

3.1 Research Design
3.2 Data Collection Methods
3.3 Sampling Techniques
3.4 Data Analysis Procedures
3.5 Ethical Considerations
3.6 Validity and Reliability
3.7 Limitations of Research Methodology
3.8 Research Challenges and Solutions

Chapter 4

4.1 Overview of Research Findings
4.2 Analysis of E-Banking Practices
4.3 Examination of Cyber Crime Incidents
4.4 Comparison of E-Banking Security Measures
4.5 Impact Assessment of Cyber Crime on E-Banking
4.6 Compliance with Regulatory Framework
4.7 Case Study Analysis
4.8 Recommendations for Enhancing E-Banking Security

Chapter 5

5.1 Conclusion and Summary of Findings
5.2 Recap of Research Objectives
5.3 Implications for Practice
5.4 Contributions to Knowledge
5.5 Recommendations for Future Research

Project Abstract

Abstract
The advancement of technology, particularly in the financial sector, has led to the widespread adoption of electronic banking (e-banking) in Nigeria. While e-banking offers numerous benefits such as convenience and efficiency, it also poses significant risks, particularly in relation to cybercrime. This study aims to evaluate the relationship between e-banking and cybercrime in Nigeria. The research will employ a mixed-methods approach, combining quantitative analysis of e-banking usage data with qualitative assessments of cybercrime incidents reported in the country. Data will be collected from various sources including financial institutions, regulatory bodies, and law enforcement agencies. The quantitative analysis will focus on trends in e-banking adoption, usage patterns, and security measures implemented by banks. The qualitative assessment will involve interviews with key stakeholders in the banking and cybersecurity sectors to gather insights into the nature and extent of cybercrime related to e-banking. Additionally, case studies of cybercrime incidents will be analyzed to identify common tactics used by cybercriminals and the vulnerabilities in e-banking systems that they exploit. The study will also explore the regulatory framework governing e-banking and cybersecurity in Nigeria to determine its effectiveness in mitigating cyber risks. By examining the existing legal and regulatory measures, the research aims to identify gaps in the current framework and propose recommendations for strengthening cybersecurity in the e-banking sector. The findings of this study are expected to provide valuable insights for policymakers, financial institutions, and cybersecurity professionals in Nigeria. By understanding the relationship between e-banking and cybercrime, stakeholders can develop more robust strategies to protect the integrity of electronic banking systems and safeguard customer data. Overall, this research contributes to the growing body of knowledge on the intersection of technology, finance, and cybersecurity in developing countries like Nigeria. By evaluating the risks and benefits of e-banking and exploring ways to enhance cybersecurity measures, this study aims to support the sustainable growth of the financial sector while minimizing the threats posed by cybercrime.

Project Overview

INTRODUCTION
1.1   BACKGROUND TO THE STUDY
There are few innovations that have changed the dynamics of banking as much as the e-banking revolution. Throughout the world, banks are reorganizing their business strategies to take advantage of new business opportunities offered by e-banking. Electronic banking is believed to have started in the early 1980s. It has since then been growing in an unprecedented dimension in line with the growth in ICT development. E-banking has enabled banks to overcome borders, adopt strategic outlook, and bring in new possibilities. According to Nitsure (2003), information communication technology has reduced the cost of processing and facilitating the transmission of information leading to drastic changes in the banking business. It is worth noting that e-banking has not been limited to advanced countries, but is found even in countries with underdeveloped e-banking systems, as a result of the many new business opportunities offered by e-banking.

Although no official definition of e-banking has been established, it generally implies a service that allows customers to use some form of computer to access account-specific information and possibly conduct transactions from a remote location like home or workplace. Additionally, e-banking has obvious advantages to the customer in terms of convenience where customers conduct routine banking transactions from the comfort and security of any location from which they wish to transact. The emerging concept of e-banking has drawn the attention of the business fraternity as well as of scholars and researchers to the effects of such dynamics on the banking industry. For instance, Liao and Wong (2008) in their study of the determinants of customer interactions with Internet-enabled e-banking found that factors such as perceived usefulness, ease of use, security, convenience, and responsiveness to service requests to be a strong measure of the variation in customer interactions. Based on this finding, they suggested that stringent security control is critical to e-banking operations. Such arguments do not only have managerial implications for enhancing Internet banking operations and developing viable electronic banking services, but also form the basis upon which this study is based.

E-banking technology created a revolution by extending banking hours beyond office hours and beyond national boundaries (Balachandran & Balachandher, 2000). In Nigeria, several studies on e-banking have been done. Chiemeke, Evwiekpaefe, & Chete (2006), for instance, conducted a pragmatic study on adoption of e-banking where major hindering factors to Internet banking adoption such as insecurity and inadequate operational facilities, including telecommunications facilities and electricity supply, were identified.

Crime and corruption represent a major concern for business executives not only in Nigeria but also in other parts of Africa (Olasanmi, 2006). In Nigeria, for instance, the most serious impediments to economic activities and business are crime and corruption which averages 75% and 71% respectively. Theft and fraud are the second most popular crimes after burglary. By definition, cyber crime may be referred to as any form of misconduct in cyber space. It is simply defined as the criminal use of the Internet. Cyber crime is believed to have started in the 1960’s in the form of hacking. This was followed by privacy violations, telephone tapping, trespassing and distribution of illegal materials in the 1970s. The 1980s witnessed the introduction of viruses. The fast pace of development of ICT from the 1990s till today has added to the list of criminal exploits in cyber space. Today, the Internet is used for espionage and as a medium to commit terrorism and transnational crimes. With e-banking gaining ground in Nigeria and other parts of sub-Saharan Africa, customers and online buyers are facing great risk of unknowingly passing on their information to fraudsters. “Hackers” get information of those who have made purchases through websites and then make fake cards, which they use with less detection. Absence of a law specifically dealing with card-related crimes in Nigeria may be giving thieves a loophole to operate freely (Olasanmi, 2006). Police treat card-related crimes like any other case of fraud

1.2   STATEMENT OF THE PROBLEM
This study is examining the types of cyber crimes that have economic impact either directly or indirectly on the financial system of a nation or having cross border ripple effects with focus on e-banking. Longe & Chiemeke (2008) simplified the list of unintended consequences of ICT to include acts such as Phishing, cyber terrorism, electronic spam mails, cyber-stalking, and fake copy -cat websites. While some types of cyber crimes are specific to Nigeria, other types, such as identity theft and false statements, cut across all countries.
1.3   OBJECTIVES OF THE STUDY
The following are the objectives of this study:

  1. To evaluate the relationship between e-banking and cyber crime.
  2. To identify factors militating against effective e-banking services.
  3. To determine the solution to the issues of cybercrimes that are related to e-banking.

1.4   RESEARCH QUESTIONS

  1. What is the relationship between e-banking and cyber crime?
  2. What are factors militating against effective e-banking services?
  3. What is the solution to the issues of cybercrimes that are related to e-banking?

1.5   HYPOTHESIS
HO: There is no significant relationship between e-banking and cybercrime.
HA: There is significant relationship between e-banking and cybercrime.
1.6   SIGNIFICANCE OF THE STUDY
The following are the significance of this study:

  1. The outcome of this study will educate the general public especially the users of e-banking services on the relationship between e-banking and cybercrime.
  2. This research will be a contribution to the body of literature in the area of the effect of personality trait on student’s academic performance, thereby constituting the empirical literature for future research in the subject area.

1.7   SCOPE/LIMITATIONS OF THE STUDY
This study will cover the relationship between e-banking services and cybercrime in Nigeria.
LIMITATION OF STUDY
Financial constraint– Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet, questionnaire and interview).
Time constraint– The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work


Blazingprojects Mobile App

📚 Over 50,000 Project Materials
📱 100% Offline: No internet needed
📝 Over 98 Departments
🔍 Software coding and Machine construction
🎓 Postgraduate/Undergraduate Research works
📥 Instant Whatsapp/Email Delivery

Blazingprojects App

Related Research

Computer Science. 2 min read

Predicting Disease Outbreaks Using Machine Learning and Data Analysis...

The project topic, "Predicting Disease Outbreaks Using Machine Learning and Data Analysis," focuses on utilizing advanced computational techniques to ...

BP
Blazingprojects
Read more →
Computer Science. 3 min read

Implementation of a Real-Time Facial Recognition System using Deep Learning Techniqu...

The project on "Implementation of a Real-Time Facial Recognition System using Deep Learning Techniques" aims to develop a sophisticated system that ca...

BP
Blazingprojects
Read more →
Computer Science. 2 min read

Applying Machine Learning for Network Intrusion Detection...

The project topic "Applying Machine Learning for Network Intrusion Detection" focuses on utilizing machine learning algorithms to enhance the detectio...

BP
Blazingprojects
Read more →
Computer Science. 2 min read

Analyzing and Improving Machine Learning Model Performance Using Explainable AI Tech...

The project topic "Analyzing and Improving Machine Learning Model Performance Using Explainable AI Techniques" focuses on enhancing the effectiveness ...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Applying Machine Learning Algorithms for Predicting Stock Market Trends...

The project topic "Applying Machine Learning Algorithms for Predicting Stock Market Trends" revolves around the application of cutting-edge machine le...

BP
Blazingprojects
Read more →
Computer Science. 3 min read

Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems...

The project topic, "Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems," focuses on the integration of machine learn...

BP
Blazingprojects
Read more →
Computer Science. 3 min read

Anomaly Detection in Internet of Things (IoT) Networks using Machine Learning Algori...

Anomaly detection in Internet of Things (IoT) networks using machine learning algorithms is a critical research area that aims to enhance the security and effic...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Anomaly Detection in Network Traffic Using Machine Learning Algorithms...

Anomaly detection in network traffic using machine learning algorithms is a crucial aspect of cybersecurity that aims to identify unusual patterns or behaviors ...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Predictive maintenance using machine learning algorithms...

Predictive maintenance is a proactive maintenance strategy that aims to predict equipment failures before they occur, thereby reducing downtime and maintenance ...

BP
Blazingprojects
Read more →
WhatsApp Click here to chat with us