Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
WAEC Past Questions, Objective & Theory, Study 100% offline, Download app now - 24709

Computer Fraud Detection, Prevention And Control In Nigeria Banking Sector (A case Study Of Keystone Bank)

Type Project Topics (docx)
Faculty Administration
Course Banking and Finance
Price ₦3,000
Buy Now
Key Features:
No. of pages: 63
No. of chapters: 5
Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
WAEC offline past questions - with all answers and explanations in one app - Download for free
WAEC Past Questions, Objective & Theory, Study 100% offline, Download app now - 24709
Abstract:
The rapid technological development of recent times of electronic computers have has a widespread effect on the banking industry and the public in general, electronic computers have outstripped the human being in the speed and efficiency with which they can absolve information, process it, and communicate the results.
The massive influx of computer devices for banking operations has brought about the use of the same computer system to perpetrate fraud within and outside the banking environment. The increasing occurrence of computer fraud has brought about the closure of some commercial banks in other parts of the world, with Nigeria especially not an exception.
This has generated great concern from expert and professionals in the banking and other financial sector on how to possibly eradicate or reduce the menace of computer fraud in the banking sector. This project work, therefore, studies computer fraud detection, prevention and control in the Nigerian banking sector, using Keystone Bank as case study.
Table of Content:
Title Page i
Certification ii
Dedication iii
Acknowledgment iv
Abstract v
Table of Content vi

CHAPTER ONE: BACKGROUND OF THE STUDY
1.0 Introduction & Background of the Study 1
1.1 Statement of Problem 6
1.2 Objectives of Study 7
1.3 Research Hypothesis 7
1.4 Scope and Limitation of the Study 8
1.5 Research Methodology 8
1.6 Significance of the Study 9
1.7 Definitions of Terms 9
1.8 Study Outlines 11

CHAPTER TWO: LITERATURE REVIEW
2.0 Historical Review of Computer Fraud 12
2.1 Computer Fraud Defined 14
2.2 Forms and Causes of Computer Fraud 16
2.3 Computer Fraud Prevention 19
2.4 Computer Fraud, Detection and Control 21
2.5 Management Roles in Prevention, Detection
and Control Computer Fraud 23
2.6 Reference Cases of Computer Fraud 25
2.7 List of all the Commercial Banks in Nigeria 27
2.8 The Use and Operations of Debit Card (ATM Card),
Value Card and Master Card and How They Are
Manouvred to Perpetrate Computer Fraud in Nigeria
Banking Sector 2.8
CHAPTER THREE: RESEARCH METHODOLOGY
3.0 Introduction 45
3.1 Re-Instatement of Research Hypothesis45
3.2 Research Methodology 45
3.3 ResearchInstruments46
3.4 Method of Data Analysis49
3.5 Justification of Method Used50
3.6Limitation of Research Methodology 50

CHAPTER FOUR: PRESENTATION AND ANALYSIS OF DATA
4.0 Introduction 51
4.1 Discussions of Findings 51
4.2 Data Presentation 55
4.3 Data Analysis and Interpenetration 59
4.5 Hypothesis Testing 60

CHAPTER FIVE: SUMMARY CONCLUSION AND RECOMMENDATIONS
5.1 Summary 62
5.2 Conclusion 63
5.3 Recommendation 63
References 65
Appendix68
Buy Now
 
WAEC offline past questions - with all answers and explanations in one app - Download for free
Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
WAEC Past Questions, Objective & Theory, Study 100% offline, Download app now - 24709
WAEC May/June 2024 - Practice for Objective & Theory - From 1988 till date, download app now - 99995