1.2 STATEMENT OF THE PROBLEM
This study is examining the types of cybercrimes that have economic impact either directly or indirectly on the financial system of a nation or having cross border ripple effects with focus on e-banking. Longe&Chiemeke (2008) simplified the list of unintended consequences of ICT to include acts such as Phishing, cyber terrorism, electronic spam mails, cyber-stalking, and fake copy -cat websites. While some types of cyber crimes are specific to Nigeria, other types, such as identity theft and false statements, cut across all countries.
1.3 OBJECTIVES OF THE STUDY
The following are the objectives of this study:
1. To evaluate the relationship between e-banking and cyber crime.
2. To identify factors militating against effective e-banking services.
3. To determine the solution to the issues of cybercrimes that are related to e-banking.
1.4 RESEARCH QUESTIONS
1. What is the relationship between e-banking and cyber crime?
2. What are factors militating against effective e-banking services?
3. What is the solution to the issues of cybercrimes that are related to e-banking?
1.5 HYPOTHESIS
HO: There is no significant relationship between e-banking and cybercrime.
HA: There is significant relationship between e-banking and cybercrime.
1.6 SIGNIFICANCE OF THE STUDY
The following are the significance of this study:
1. The outcome of this study will educate the general public especially the users of e-banking services on the relationship between e-banking and cybercrime.
2. This research will be a contribution to the body of literature in the area of the effect of personality trait on studentβs academic performance, thereby constituting the empirical literature for future research in the subject area.
1.7 SCOPE/LIMITATIONS OF THE STUDY
This study will cover the relationship between e-banking services and cybercrime in Nigeria using Fidelity Bank Plc as the case.
LIMITATION OF STUDY
Financial constraint- Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet, questionnaire and interview).
Time constraint- The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work.
REFERENCES
Balachandran and Balachandher K. G. (2000), βE-Banking Development in Malaysia: Prospects and Problemsβ, 10 JIBL, 250.
Chiemeke, S. C., Evwiekpaefe, A. and Chete, F.(2006) The Adoption of Internet Banking in Nigeria: An Empirical Investigation, Journal of Internet Banking and Commerce, Vol. 11, No.3,
Liao Z. & Wong W. K., (2008).The Determinants of Customer Interactions with Internet-Enabled e-Banking Services. The Journal of the Operational Research Society, Vol. 59, No. 9 (Sep., 2008), pp. 1201-1210.
Longe, O.B.&Chiemeke, S.C. (2008): Cybercrime and Criminality in Nigeria- What roles are internet Access Points in Playing. European Journal of Social Sciences, Volume 6 No 4.
Nitsure, R. R. (2003) E-Banking: Challenges and Opportunities. Economic and Political Weekly, Vol. 38, No. 51/52 pp. 5377-5381.
π Over 50,000 Project Materials
π± 100% Offline: No internet needed
π Over 98 Departments
π Software coding and Machine construction
π Postgraduate/Undergraduate Research works
π₯ Instant Whatsapp/Email Delivery
The project topic, "Predicting Disease Outbreaks Using Machine Learning and Data Analysis," focuses on utilizing advanced computational techniques to ...
The project on "Implementation of a Real-Time Facial Recognition System using Deep Learning Techniques" aims to develop a sophisticated system that ca...
The project topic "Applying Machine Learning for Network Intrusion Detection" focuses on utilizing machine learning algorithms to enhance the detectio...
The project topic "Analyzing and Improving Machine Learning Model Performance Using Explainable AI Techniques" focuses on enhancing the effectiveness ...
The project topic "Applying Machine Learning Algorithms for Predicting Stock Market Trends" revolves around the application of cutting-edge machine le...
The project topic, "Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems," focuses on the integration of machine learn...
Anomaly detection in Internet of Things (IoT) networks using machine learning algorithms is a critical research area that aims to enhance the security and effic...
Anomaly detection in network traffic using machine learning algorithms is a crucial aspect of cybersecurity that aims to identify unusual patterns or behaviors ...
Predictive maintenance is a proactive maintenance strategy that aims to predict equipment failures before they occur, thereby reducing downtime and maintenance ...