ELECTRONIC SECURITY ROLE OF PRIVATE AND PUBLIC SECTOR IN ELECTRONIC SECURITY


  • Department: Criminology
  • Project ID: CRI0050
  • Access Fee: ₦5,000
  • Pages: 86 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 1,292
Get this Project Materials

ABSTRACT

The over-riding aim of this research work is to examine the roles of private and public sectors in electronic security, a case study of Guaranty Trust Bank Plc.

To effectively carry out this research, data was collected in form of questionnaire from respondents who are staff of Guaranty Trust Bank Plc. Seventy (70) questionnaires was administered, fifty eight (58) was returned and fifty (50) copies was used. After critical analysis of the data collected, findings revealed that the roles of private and public sectors in electronic security cannot be over emphasized in reducing the rate of crime in upcoming economies.

Every day, governments, business, and consumers choose to use new technologies to build a global electronic economy. It is becoming apparent that the impacts of the use of these technologies on sustainable development deserve increased attention. This suggests the regulatory authorities to review current policies, practices, measures, and procedures to help assure that they meet the evolving challenges posed by threats to information systems and networks. 

TABLE OF CONTENTS

Title Page

Declaration I

Certification II

Dedication III

Acknowledgement IV

Abstract V

Table of content VI

CHAPTER ONE

Introduction 1

Background of the study 2

Statement of the research problem 3

1.4 Purpose of the study 3

1.5 Significance of the study 4

1.6 Research questions 4

1.7 Research hypothesis 5

1.8 Scope and limitations of the study 5

1.9 Definition of terms 5

CHAPTER TWO

2.0 Literature review 8

2.1 Introduction 8

2.2.1 What is electronic security and why needed? 11

2.2.2 Classes of computer security 13

2.3 The roles of private and public sectors in e-Security 13

2.4 Relevant theoretical framework to electronic security 19

2.5 Challenges of electronic security 28

2.6 Risk management 28

2.7 What type of monitoring approach is the most effective? 29

CHAPTER THREE

RESEARCH METHODOLOGY

3.1 Introduction 33

3.2 Research design 33

Population of the study 33

Sampling size 34

Sampling techniques 34

Data collection instrument 35

Administration of data collection instrument 35

Limitations of the methodology 36

3.9 Validation instrument 36

3.10 Reliability of instruments 36

3.11 Method of data analysis 36

CHAPTER FOUR

DATA ANALYSIS PRESENTATION

4.1 Introduction 38

Analysis of respondents’ characteristics and classifications 38

Analysis of individual research statement 41

Test of hypothesis 51

Conclusion of the findings 61

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.1 Summary of the findings 62

5.2 Conclusion 63

5.3 Recommendations 63

5.4 Suggestion for further study 64

References 65

Appendix

  • Department: Criminology
  • Project ID: CRI0050
  • Access Fee: ₦5,000
  • Pages: 86 Pages
  • Reference: YES
  • Format: Microsoft Word
  • Views: 1,292
Get this Project Materials
whatsappWhatsApp Us