ABSTRACT
The rapid technological development of recent times of the electronic computer have has a wide spread effect on the banking industry and the public in general, electronic computers have outstripped the human being in the speed and efficiency with which they can absolve information, process it and communicate the results. The massive influx of computer devices for banking operations has brought about the use of the same computer system to perpetrate fraud within and outside the banking environment. The increasing occurrence of computer fraud has brought about the closure of some commercial banks in other parts of the world, with Nigeria especially not an exception. This has generated great concern from expert and professionals in the banking and other financial sector on how to possibly eradicate or reduce the menace of computer fraud in the banking sector. This project work, therefore, studies computer fraud detection, prevention and control in the Nigerian banking sector, using Keystone Bank as case study.
TABLE OF CONTENT
Title Page i
Certification ii
Dedication iii
Acknowledgement iv
Abstract v
Table of Content vi
CHAPTER ONE: BACKGROUND OF THE STUDY
1.0 Introduction & Background of the Study 1
1.1 Statement of Problem 6
1.2 Objectives of Study 7
1.3 Research Hypothesis 7
1.4 Scope and Limitation of the Study 8
1.5 Research Methodology 8
1.6 Significance of the Study 9
1.7 Definitions of Terms 9
1.8 Study Outlines 11
CHAPTER TWO: LITERATURE REVIEW
2.0 Historical Review of Computer Fraud 12
2.1 Computer Fraud Defined 14
2.2 Forms and Causes of Computer Fraud 16
2.3 Computer Fraud Prevention 19
2.4 Computer Fraud, Detection and Control 21
2.5 Management Roles in Prevention, Detection
and Control Computer Fraud 23
2.6 Reference Cases of Computer Fraud 25
2.7 List of all the Commercial Banks in Nigeria 27
2.8 The Use and Operations of Debit Card (ATM Card),
Value Card and Master Card and How They Are
Manouvred to Perpetrate Computer Fraud in Nigeria
Banking Sector 2.8
CHAPTER THREE: RESEARCH METHODOLOGY
3.0 Introduction 45
3.1 Re-Instatement of Research Hypothesis45
3.2 Research Methodology 45
3.3 ResearchInstruments46
3.4 Method of Data Analysis49
3.5 Justification of Method Used50
3.6Limitation of Research Methodology 50
CHAPTER FOUR: PRESENTATION AND ANALYSIS OF DATA
4.0 Introduction 51
4.1 Discussions of Findings 51
4.2 Data Presentation 55
4.3 Data Analysis and Interpenetration 59
4.5 Hypothesis Testing 60
CHAPTER FIVE: SUMMARY CONCLUSION AND RECOMMENDATIONS
5.1 Summary 62
5.2 Conclusion 63
5.3 Recommendation 63
References 65
Appendix68