0704-883-0675     |      dataprojectng@gmail.com
1

1. PUBLIC PERCEPTION OF NIGERIA ELECTRONIC NAIRA (E-NAIRA). A STUDY OF KANO METROPOLIS.

​​​​​​Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models have led in a slew of novel retail payment methods. These deve...

Read more

2. PROBLEM AND PROSPECT OF E-NAIRA IN NIGERIA.

Changing technology, economic advancement, and the desire to effectively fulfill the functions of money have all spurred monetary changes throughout history. These developments point to substantial changes in the retail payment environment, including a drop in cash usage. Digital money was born a...

Read more

3. A SURVEY OF THE INCREASE AND USAGE OF CRYPTOCURRENCIES IN AFRICA

Background of the study

Throughout history, people have exchanged products and services via a number of techniques and channels. Many of these methods and materials, such as metal coins or paper money, are typically physical.

Without a questio...

Read more

4. PROBLEM AND PROSPECT OF E-NAIRA IN NIGERIA.

Background of the study

Changing technology, economic advancement, and the desire to effectively fulfill the functions of money have all spurred monetary changes throughout history. These developments point to substantial changes in the retail payment e...

Read more

5. PUBLIC PERCEPTION OF NIGERIA ELECTRONIC NAIRA (E-NAIRA). A STUDY OF KANO METROPOLIS.

Background of the study

Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models...

Read more

6. THE BENEFIT OF E-NAIRA TO UNBANKED NIGERIANS

Background of the study

Many millions, if not billion of people will be able to use a range of convenient, accessible, and dependable financial instruments for the first time in the not-too-distant future, regardless of their proximity to tradition...

Read more

7. THE EFFECT OF E-NAIRA ON INFLATION

Background of the study

Inflation is a term used to describe the rate at which the price of goods and services rises over time. Inflation impacts not only the cost of life – items like transportation, power, and food – but also interest rate...

Read more

8. THE IMPACT OF ENAIRA IN TRACKING MONEY LAUNDERING AND FRAUD IN NIGERIA

Background of the study 

The promotion of cashless policies has become a driving factor for global economies to investigate currency digitalization as it fast tracks online transactions. Various uses of e-transaction, includin...

Read more

9. THE IMPACT OF E-NAIRA ON DEPOSIT MONEY BANK

Background of the study

Banks are a vital part of every economy. It is the driving force behind society and economic progress. The importance of banking services to any economy's growth and development cannot be overstated. Prior to the introduction...

Read more

10. THE INFLUENCE OF E-NAIRA AND SMALL BANKS SURVIVAL

Background of the study

A bank is a financial organization that collects deposits and puts those deposits into lending activities, either directly or through capital markets (Uremadu, S. 2012). Customers with capital shortages are linked to customers wi...

Read more

11. THE RELATIONSHIP BETWEEN E-NAIRA AND E-BANKING

Background of the study

The notion of electronic banking was born as a result of technological improvement in the banking system. Customers no longer need to visit a physical financial institution to complete a transaction; instead, they can do it from...

Read more

12. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATA BASE SYSTEM

INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....

Read more

13. Design and Implementation of an Intrusion Tolerant System

Abstract

The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...

Read more

14. DESIGN OF INTRUSION DETECTION AND PREVENTION SYSTEM IN MICRO FINANCE BANK IN IKOT EKPENE

Introduction

An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...

Read more

15. DESIGN AND IMPLEMENTATION COMPUTERIZED DATA ENCRYPTION SYSTEM

BACKGROUND OF THE STUDY

The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or e...

Read more

16. INTRUSION DETECTION, AND PREVENTION SYSTEM USING GUFAX MICRO FINANCE BANK PLC, IKOT EKPENE AS A CASE

Statement of the Problem

The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:

  1. Absence of an  intrusion  detection and prevention system.
  2. ...
Read more

17. DEVELOPMENT OF AN IMPROVED APPLICATION SPECIFIC TUNELLING PROTOCOL SELECTION SCHEME FOR SITE TO SITE VIRTUAL PRIVATE NETWORKS

ABSTRACT

This study presents the development of an improved application specific tunnelling protocol selection scheme (iASTPSS) for site-to-site virtual private network (VPN). The aim is to develop an improved tunnelling protocol selection scheme for site to site VPN that is application...

Read more

18. DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS

STATEMENT OF THE PROBLEM

The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.

The choice of data encryption comes next in...

Read more

19. DESIGN AND IMPLEMENTATION OF A STEGANOGRAPHIC SYSTEM- SECURTITY ENCRYPTION SYSTEM

ABSTRACT

Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are di...

Read more

20. PRACTICAL AND LIGHTWEIGHT DEFENSE AGAINST WEBSITE FINGERPRINTING

ABSTRACT

Website fingerprinting is a passive network traffic analysis technique which enables an adversary to identify the website a user visited despite encryption and the use of privacy services such as Tor. Several website fingerprinting defenses built on top of Tor have been put for...

Read more

21. DEVELOPMENT OF A MORE SECURED BANKING TRANSACTION AUTHENTICATION APPLICATION

ABSTRACT

Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...

Read more

22. THE DETECTION AND PREVENTION OF SNIFFING ON NETWORKS

ABSTRACT

With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to th...

Read more

23. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more

24. EXPLORING THE APPLICATION OF NUMBER THEORY IN CRYPTOGRAPHY

Background of the study

Cryptography has a long and intricate history that intertwines with the development of number theory. From the ancient ciphers of Julius Caesar to the complex algorithms used in modern-day encryption, the evolution of cryptograph...

Read more

25. AN ASSESSMENT OF CYBERCRIME AND DIGITAL FORENSIC ACCOUNTING TECHNIQUES

Abstract: AN ASSESSMENT OF CYBERCRIME AND DIGITAL FORENSIC ACCOUNTING TECHNIQUES

This study assesses the effectiveness of digital forensic accounting techniques in combating cybercrime in the financial sector in Lagos. The objectives are to evaluate the effectiveness of various digital...

Read more
whatsapp