ABSTRACT
The use of ATM has grown rapidly in popularity because of its low banks transaction costs and customers convenience which has made it a basic element of today’s financial service delivery. However, the ATM which is meant to be serving the customers better is now becoming a nightmare for some customers because of fraud perpetuated in their accounts through ATM withdrawals. The main purpose of this work is to examine the activities of fraudsters through ATM pin and how these frauds have affected financial institution growth and customers patronage of banks. This researcher made use of four banks as a case study for this research work. Data was collected from questionnaires, interviews and observation from the four banks under study. Three hypotheses was tested using the chi- square statistical tool and it was observed that there is a significant relationship between ATM fraud and fraud in Nigeria, it was also observed that ATM fraud affects customers patronage and financial institution growth. In conclusion, the activities of fraudsters needs to be monitored and measures should be put in place to mitigate these frauds. To solve this, additional security layer on the ATM is recommended and proper monitoring of the ATM machine by the banks. We believe that if banks and service providers heed to some of these suggestions in this work, we will have a safer, hassle- free and worth while banking experience in this country.
TABLE OF CONTENT
TITLE PAGE I
DECLARATIONII
CERTIFICATIONIII
DEDICATIONIV
ACKNOWLEDGEMENTV
ABSTRACTVI
CHAPTER ONE
1.0INTRODUCTION
1.1BACKGROUND OF THE STUDY
1.2STATEMENT OF THE PROBLEM
1.3OBJECTIVE OF THE STUDY
1.4RESEARCH QUESTIONS
1.5RESEARCH HYPOTHESIS
1.6SIGNIFICANT OF THE STUDY
1.7SCOPE OF THE STUDY
1.8LIMITATION OF THE STUDY
1.9DEFINITION OF TERMS
1.10REFERENCES
CHAPTER TWO
2.0LITERATURE REVIEW
2.1CONCEPTUAL ISSUES
2.2AUTOMATED TELLER MACHINE
2.3AUTOMATED TELLER MACHINE FRAUD38
2.4AUTOMATED TELLER MACHINE FRAUD TECHNIQUES43
2.4.1CARD THEFT
2.4.2SKIMMING DEVICE
2.4.3PIN SECURITY
2.4.4SHOULDER SURFING
2.4.5UTILISING A FAKE PIN OUTLAY
2.4.6PIN INTERCEPTION
2.4.7ACCESSING THE CASH
2.4.8APPLICATION OF A FALSE ATM PRESENTER53
2.4.9TRANSACTION REVERSAL
2.9.10 ATM BURGLARY ATTACK
2.5C.B.N REGULATORY FRAMEWORK ON ATM FRAUD57
2.6THEORETICAL CONTEXT
2.7EMPERICAL LITERATURE
2.8CONCLUSION
2.9REFERENCES
CHAPTER THREE
3.0RESEARCH DESIGN AND METHODOLOGY
3.1INTRODUCTION
3.2 RESEARCH DESIGN
3.3 POPULATION OF THE STUDY
3.4 SAMPLE TECHNQUES
3.5 METHOD OF DATA COLLECTION
3.6TECHNQUES OF DATA ANALYSIS
3.7RELIABILITY OF INSTRUMENT
3.8SUMMARY
3.9REFERENCES
CHAPTER FOUR
4.0DATA ANALYSIS, PRESENTATION AND INTERPRETATION INTRODUCTION
4.1DATA ANALYSIS
4.2TESTING OF HYPOTHESIS
4.3DATA PRESENTATION
4.4RESEARCH FINDINGS AND RESULT
CHAPTER FIVE
5.0DISCUSSION OF FINDINGS, CONCLUSION AND RECOMMENDATION
5.1 DISCUSSION OF FINDINGS
5.2 CONCLUSION
5.3 RECOMMENDATIONS
BIBLOGRAPHY
APPENDIX I
APPENDIX II