Wednesday, July 17, 2019

The Evolution and Potential Eradication of Cyber-crime in the Nigerian Banking Industry, using GTB as a case study.

Background to ProjectOver the years, the single-valued function of development communication technology has had a dramatic impact on intimately all beas of human operation including, in accompaniment, the margining and finance sector. To a certain extent, ICT rout out be seen to have simplified umteen of the business processes however, it has withal created a refreshing breed of criminal activity, many aspects of which are aimed at the banking sector, for example, credit card fraud, identicalness theft and ATM fraud, as wellspring as other related discipline technology issues (Singhal & Padhmanabhan, (2008).The proliferation of e-banking has offered opportunities in countries such(prenominal) as Nigeria to become much more world(a) in its operation and yet it has similarly opened up the jurisdiction to a broad range of cyber-crimes, which leave behind be the focus of the analysis in this interrogation. E-banking is non limited to the more developed countries and, arguably, hind ending be seen to transcend many of the jurisdictional b rambles, with countries which are developing, such as Nigeria, universe able to trade internationally in a way that was not possible, previously. However, this probability also fall ins challenges, particularly when it comes to establishing systems that will veto or limit cyber-crime.Problem specificationE-banking in Nigeria is still largely seen to be in its infancy, with the majority of banks using information technology as a direction of providing information, rather than creating an interactive banking arrangement (Howard et al 2008). To a certain extent, it could be argued that this comparatively low level of take-up for e-banking in Nigeria may be attributed to the insecurity and the mishap of the technology to keep pace with the call for of the public, if they are to fully engage with earnings banking and all its ramifications (Chiemeke, Evwiekpaefe, & Chete, 2006).Crime and corruption at bot tom the banking sectors have created a particular guardianship for businesses across Nigeria, which indicates that transaction with the area of cyber-crime is censoriously important and needs to be tackled, if Nigeria is to be able to develop as a strong international economic jurisdiction capable of attracting investment and stability. look into Aims and ObjectivesThe boilersuit aim of this look is to scent at the evolution of cyber-crime in Nigeria and to explore slipway in which it can strengthly be have a go at itd, or even eradicated. In couch to achieve this over-riding aim, several smaller research objectives have been identified.Firstly, it is required to gain an historical understanding of the Nigerian banking industry and to come across the ways in which the industry has operated, preliminary to the use of information technology, and how information technology has impacted upon the banking sector, to date. Secondly, an analysis of the current cyber-crime get the hang processes will be undertaken, tonicitying for at a range of different banks and how they look towards managing and controlling cyber-crime (Computer Crime Research sum total 2009). The research will and so pass on to compare banks in other regions, such as the United domain and the United States, with a view to establishing whether on that point are additional ways in which cyber-crime could be managed more efficiently, by flavor at the various different convey whereby cyber-crime is managed in these other jurisdictions. The findings can indeed be looked at in the condition of the problems being faced in Nigeria, and potential options explored. A specific case train of GTB will be used, in order to explore the issues raised above, before finally suggesting how the Nigerian banking sector can remediate its position and reduce the level of cyber-crime, to such an extent that it is presumable to improve the stability and trust within the banking sector. GTB in p articular has been the subject of much discussion delinquent to several high profile fraudulent activities that have raised the issue of managing cybercrime in Nigeria (Shittu, 2010). Offering this guidance is a critical element of the research as it will offer guidance on how to manage the difficulties being raised by the Nigerian banking industry.Research MethodologyThe research go about will be inductive in nature in that it will look at a wide mixing of ideas and observations with the view to ultimately establishing a theory and a framework that can be relied upon to develop the future of the Nigerian banking industry. In order to achieve this, both numeric and qualitative analysis will be undertaken. However, this will primarily involve looking at the selective information associated with cyber-crime, in the region, as part of the secondary research and then going on to undertake a case study, to improve the understanding of where the data has originated from, and in orde r to bridge amid the theory and practical reality of cyber-crime, in the region.ResourcesResources will primarily be derived from journals and reports dealing with the area of cyber-crime, in Nigeria, although it will also be necessary to undertake particular research with the employees of the case study bank, i.e. GTB. Suggested references to be used as a showtime point are listed at the end of the proposal.ConstraintsPotential issues may emerge when it comes to amass accurate data, as issues related to cyber-crime judge can be commercially sensitive, and so making it harder to ensure that the data and the attendant analysis are accurate. It is also necessary to recognise that issues relating to cyber-crime are likely to change, really rapidly, making the research quite time-specific, in terms of its value. Gaining detailed primary research by interviewing employees may also present a problem, as employees are marvelous to be prepared to speak openly, for upkeep of any com eback from their employer.Projected recordThe research will take ordinate over one academic year, which truly spans a total of nine months. It is judge that monitoring the case study bank will take the longest spot of time and therefore this is central to the quantify and is recognised as such in the chart below. M1M2M3M4M5M6M7M8M9 Background Research books Review Case Study epitome and Write-up Proofread and PresentationReferences Adeloye LA (2008). E-banking as new frontiers for banks. Sunday Punch, September 14, P. 25.Chiemeke, S. C., Evwiekpaefe, A. and Chete, F.(2006) The word sense of Internet margining in Nigeria An Empirical Investigation, ledger of Internet Banking and Commerce, Vol. 11, No.3,Computer Crime Research Center 2009. Preventive Measures for ATM frauds. http//www.crimeresearch.org/articles/ noise measures-ATMFraud,Howard, R., Thomas, R., Burstein, J., & Bradescu, R. (2008). Cyber Fraud Trends and Mitigation, 924.Litan, A. (2004). Phising attack victims likely targets for identity theft. Available http//www.gartner.com/DisplayDocument?doc_cd=120804Longe, O.B.& Chiemeke, S.C. (2008) Cybercrime and Criminality in Nigeria-What roles are internet Access Points in Playing. European Journal of SocialSciences, heap 6 No 4Ogunsemor AO (1992.) Banking work The emergence and impact of electronic banking. The Nigerian Banker, January March, 1992.Omankhanlen O. (2009). ATM fraud rises Nigerians groan in Nigeria. Daily News, Sunday, June 21, pp.8-10.Shittu, O., Submitted, P., The, T. O., Of, F., Akintola, L., State, O. Y. O., Fulfilment, I. N. P., et al. (2010). The Impact of Electronic Banking in Nigeria Banking System (Critical Appraisal Of Unity Bank Plc ), 162.Singhal, D., & Padhmanabhan, V. (2008). A Study on Customer Perception Towards Internet Banking Identifying study Contributing Factors, 5(1), pp. 101111.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.