0704-883-0675     |      dataprojectng@gmail.com
1

1. PUBLIC PERCEPTION OF NIGERIA ELECTRONIC NAIRA (E-NAIRA). A STUDY OF KANO METROPOLIS.

​​​​​​Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models have led in a slew of novel retail payment methods. These deve...

Read more

2. PUBLIC PERCEPTION OF NIGERIA ELECTRONIC NAIRA (E-NAIRA). A STUDY OF KANO METROPOLIS.

Background of the study

Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models...

Read more

3. THE EXTENT OF LIABILITY OF BANKS FOR E-BANKING FRAUD

Background to the study

With the global use of progressively more sophisticated internet and information technology (Papazoglou, 2003), electronic banking is developing as a key channel for banking businesses (Wei et al., 2012). Globally, remote banking...

Read more

4. THE IMPACT OF ENAIRA IN TRACKING MONEY LAUNDERING AND FRAUD IN NIGERIA

Background of the study 

The promotion of cashless policies has become a driving factor for global economies to investigate currency digitalization as it fast tracks online transactions. Various uses of e-transaction, includin...

Read more

5. ETHICAL HACKING AND CYBER SECURITY IN NIGERIAN TELECOMMUNICATION INDUSTRY: ISSUES AND SOLUTIONS

EXCERPT FROM THE STUDY

According to Reuter’s media briefs from Cameroon [16], British prime minister, cyber-crime costs the British economy some 27 billion pounds a year. On the other hand, the Economic and Financial Crimes Commission Report ranks Nigeria as third...

Read more

6. CRITICAL INFORMATION INFRASTRUCTURE PROTECTION TECHNIQUES IMPLEMENTATION AGAINST CYBER ATTACKS USING BIG DATA ANALYTICS (A CASE STUDY OF INEC & JAMB)

Introduction

In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...

Read more

7. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATA BASE SYSTEM

INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....

Read more

8. AN INVESTIGATION OF SOCIAL MEDIA USAGE AND ITS IMPACT ON STUDENTS EXPOSURE TO CYBERCRIMES

Background of the study

 Technology has been the success story of our century and has opened doors for beneficial inventions.  Technology has countries interconnected and the world has now become a global village (Ojo 2019). he information of...

Read more

9. IMPACT OF ICT IN SECURITY MANAGEMENT IN UNIVERSITY OF NIGERIA NSUKKA

Background Of The Study

Insecurity in Nigeria is not a new phenomenon. High levels of insecurity have resulted in fatalities and psychological distress for individuals, with companies, government institutions, and the economy as a whole suffering greatl...

Read more

10. THE ASSESSMENT OF BIG DATA ANALYTICS ROLE AS A PROTECTION TECHNIQUE AGAINST CYBER ATTACKS (A CASE STUDY OF JAMB)

BACKGROUND OF THE STUDY

Cyber-attacks are constantly making headlines, putting countries, industries, and businesses at danger of security breaches. With society's reliance on technology and the introduction of the internet, things could get even wo...

Read more

11. THE IMPACT OF TRIPLY ENTRY ACCOUNTING SYSTEM ON FINANCIAL REPORTING

ABSTRACT

The research proffers an assessment of the impact of triple entry accounting system on financial reporting, a study of bitcoins. It analyses triple entry accounting system and financial accounting, its functions and significance. The resear...

Read more

12. TRIPLY ENTRY ACCOUNTING SYSTEM AND FINANCIAL REPORTING

INTRODUCTION

Modern financial accounting is based on a double entry system. Described simply, double entry bookkeeping allows firms to maintain records that reflect what the firm owns and owes and also what the firm has earned and spent over any given p...

Read more

13. DEVELOPMENT OF A MORE SECURED BANKING TRANSACTION AUTHENTICATION APPLICATION

ABSTRACT

Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...

Read more

14. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more

15. An Assessment of the Prospect and Challenges of Artificial Intelligence in Securing Northern Nigeria’s Digital Infrastructure: A Case Study of Sokoto State Technology Hub

1.1 Background of the Study

The rapid digital transformation occurring across Nigeria, especially in the northern region, has created new opportunities for growth, innovation, and development. However, this increased reliance on digital infrastructure has also heightened the vulnerabili...

Read more

16. An Examination of Cybersecurity Challenges in Digital Government Accounting in Nigeria: A Case Study of the TSA

Background of the Study
The advent of digital government accounting systems in Nigeria, particularly the implementation of the Treasury Single Account (TSA), marks a significant leap toward enhancing financial accountability and transparency. The TSA integrates all governm...

Read more

17. The role of forensic accounting in combating financial cybercrimes in Nigerian banks: A case study of GTBank

Background of the Study

Cybercrime, particularly financial cybercrimes, has become a significant challenge in the banking sector globally, and Nigeria is no exception. Nigerian banks, such as Guaranty Trust Bank (GTBank), have been at the forefront of adopting advanced...

Read more

18. The impact of forensic accounting on mitigating cyber fraud in Nigeria’s e-commerce industry: A case study of Jumia Nigeria.

Background of the Study

Nigeria’s e-commerce sector has witnessed rapid growth, with companies like Jumia Nigeria leading the way in transforming online retailing. The increased use of digital platforms for transactions has made e-commerce companies vulnerable to...

Read more

19. The Role of Forensic Accountants in Combating Cyber Financial Crimes in Nigeria: A Case Study of Nigerian Fintech Companies

Background of the Study

With the rise of digital financial transactions and the rapid growth of the fintech industry in Nigeria, cyber financial crimes have become an increasing concern. Cybercriminals target financial systems and institutions, engaging in activities such as hacking, on...

Read more

20. The effect of digital forensic accounting on online scam investigations in Nigeria: A case study of Lagos State Police Command.

Background of the Study

Online scams are a growing issue in Nigeria, with the increasing use of the internet and social media platforms contributing to the rise in cybercrime (Ajayi & Abiola, 2024). These scams involve various fraudulent schemes, including phishing,...

Read more

21. Digital Media and the Challenges of Cybersecurity in Katsina Local Government Area, Katsina State

Chapter One: Introduction

1.1 Background of the Study
With the growth of digital media usage in Katsina Local Government Area, cybersecurity has become an increasingly important issue. As individ...

Read more

22. An Evaluation of Cybersecurity Challenges in the Fintech Industry in Nigeria: Evidence from Kuda Bank

Background of the Study

The rapid growth of the fintech sector in Nigeria has been accompanied by an increase in cybersecurity challenges, which pose significant risks to the industry’s integrity and trustworthiness. Fintech companies, such as Kuda Bank, have revolutionized the fi...

Read more

23. An Examination of Fraud Detection and Prevention Techniques in Banking Institutions in Jigawa State

Background of the Study

Fraud in banking institutions poses significant risks to the financial system, affecting not only the banks themselves but also their customers, investors, and the broader economy. The growing sophistication of fraud schemes, combined with rapid technological adv...

Read more

24. The Impact of Cybersecurity Measures on Data Security in Financial Institutions: A Case Study of Microfinance Banks in Sokoto State

Background of the Study

In an era of digital banking, the security of data is paramount, especially for financial institutions like microfinance banks that deal with sensitive customer information and financial transactions. Cybersecuri...

Read more

25. The Role of Print Media in Combating Cybercrime Awareness: A Study of Damaturu Local Government, Yobe State

Chapter One: Introduction

1.1 Background of the Study

As cybercrime continues to grow globally, the role of media in raising awareness about its dangers and preventive measures becomes critical. In Damaturu Local Government, Yobe State, print media provides a vital platform fo...

Read more

26. The Effects of Cybersecurity Risks on Supply Chain Information Systems: A Study of Lafarge Africa in Taraba State

Background of the Study
Supply chain information systems (SCIS) have become critical for managing the complexities of modern logistics and operations. These systems rely heavily on digital infrastructures that are increasingly vulnerable to cybersecurity threats such as ha...

Read more

27. An Analysis of Enterprise-Wide IT Security Policies and Their Effectiveness: A Study of Commercial Banks in Gombe State

Background of the Study

As cyber threats become more sophisticated, it is critical for organizations, especially commercial banks, to implement comprehensive IT security policies to protect sensitive data and ensure the integrity of their operations (Ogunyemi & Bell...

Read more

28. An Analysis of Virtual Private Networks (VPNs) and Data Privacy: A Study of Multinational Firms in Nasarawa State

Background of the Study

Virtual Private Networks (VPNs) are widely used by multinational firms to secure data transmission, particularly when employees work remotely or access company resources from different locations. VPNs encrypt internet traffic, protecting sensitiv...

Read more

29. An Investigation into Cybersecurity Threats in Nigerian Businesses: A Study of SMEs in Taraba State

Background of the Study

Small and medium-sized enterprises (SMEs) are the backbone of many economies, including Nigeria's, but they are increasingly vulnerable to cybersecurity threats due to limited resources and expertise in managing digital security risks. As SME...

Read more

30. An Investigation into the Impact of Digital Forensics in Cybersecurity Management: A Case Study of Telecom Firms in Nasarawa State

Background of the Study

Digital forensics involves the process of collecting, preserving, analyzing, and presenting digital evidence from electronic devices to investigate cybercrimes and security incidents. In telecom firms, digital forensics plays a crucial role in re...

Read more

31. A Review of Digital Identity Management Solutions and Their Security Risks: A Study of Banks in Bauchi State

Background of the Study

Digital identity management has become a cornerstone of modern cybersecurity, particularly for institutions like banks that handle sensitive personal and financial information (Nash, 2023). Effective digital identity management solutions (DIMS) e...

Read more

32. An Investigation of Predictive Analytics in Detecting Cyber Threats: A Case Study of Financial Institutions in Yobe State

Background of the Study

As digital transformation continues to shape industries worldwide, cybersecurity has become a critical concern, especially for financial institutions. The financial sector in Nigeria has been increasingly targeted by cybercrimina...

Read more

33. An Appraisal of Real-Time Analytics in Fraud Detection for Mobile Banking Applications: A Study of Fintech Companies in Yobe State

Background of the Study

The rapid adoption of mobile banking has revolutionized the financial sector in Nigeria, making banking services more accessible and convenient. However, this shift has also led to an increase in digital fraud, such as account hacking, phishing a...

Read more

34. An Investigation of Social Engineering Threats and Employee Awareness: A Study of Financial Institutions in Kaduna State

Background of the Study

Social engineering is a technique used by cybercriminals to manipulate individuals into divulging confidential information, typically by exploiting human psychology rather than relying on technical hacking skills (Okafor & Anya, 2024). In the financial sector...

Read more

35. An Examination of the Effectiveness of Biometric Authentication in Financial Transactions: A Study of Fintech Firms in Niger State

Background of the Study

Biometric authentication has gained traction as a secure and efficient method for verifying user identities in financial transactions. By using unique biological characteristics such as fingerprints, facial recognition, and voice patterns, biometric systems offer...

Read more

36. An Examination of Cybersecurity Challenges in Nigeria’s Hospitality Industry

Background of the Study

The hospitality industry in Nigeria, comprising hotels, resorts, and other accommodation services, plays a vital role in the nation’s economy, attracting both domestic and international tourists. However, as the industry embraces digital technologies to imp...

Read more

37. An Assessment of Cybersecurity Challenges in Digital Real Estate Transactions in Niger State

Background of the Study

The digitalization of real estate transactions has significantly transformed the property market globally, offering increased convenience, speed, and transparency. In Niger State, as in many other regions of Nigeria, the real est...

Read more

38. An Assessment of Cybersecurity Challenges in Digital Real Estate Transactions in Niger State

Background of the Study
The digitalization of real estate transactions has revolutionized the industry, offering efficiency, convenience, and broader access to properties for both buyers and sellers. However, this transition has brought significant challenges, particularly...

Read more

39. An Investigation of the Constitutional Right to Privacy and Its Enforcement: A Case Study of Kano Municipal Local Government Area, Kano State

Background of the Study

The right to privacy is a fundamental human right recognized under international human rights law and enshrined in many national constitutions, including Nigeria’s. Section 37 of the 1999 Constitution of the Federal...

Read more

40. An Appraisal of Constitutional Law on Combating Cybercrimes: A Case Study of Zango-Kataf Local Government Area, Kaduna State

Background of the Study

Cybercrimes have emerged as one of the most pervasive threats in the digital age, with serious implications for personal privacy, security, and economic stability. The advent of technology has led to the proliferation of ...

Read more

41. An assessment of cybercrime awareness and digital security in Kano Municipal Local Government Area, Kano State.

Chapter One: Introduction

1.1 Background of the Study
As the digital age progresses, the prevalence of cybercrime has risen dramatically across the world, including in Nigeria. In Kano Municipal LGA, the growth of internet usage, mobile phones, a...

Read more

42. Design and Implementation of a Virtual Private Network (VPN) for University of Jos, Plateau State

Background of the Study
In recent years, universities have increasingly relied on secure network communication to protect sensitive academic and administrative data. The University of Jos, Plateau State, faces challenges related to the security of its network infrastructur...

Read more

43. Evaluation of Network Security Policies in Federal University, Dutse, Jigawa State

Background of the Study
Network security policies are fundamental to protecting digital resources in any organization, especially in universities, where sensitive data such as student records, research findings, and financial information is regularly transmitted and stored...

Read more

44. Development of an Intrusion Detection System for Kaduna State University, Kaduna State

Background of the Study
Cybersecurity threats in higher education institutions have grown significantly, with universities being prime targets due to their large volumes of sensitive data and open network access (Suleiman et al., 2023). Kaduna State University (KASU), loca...

Read more

45. Development of a Network-Based Multi-Factor Authentication System for Federal University, Lokoja, Kogi State

Background of the Study:
As cyber threats continue to evolve, securing user authentication processes has become a top priority for institutions like Federal University, Lokoja, Kogi State. Multi-factor authentication (MFA) is an effective strategy for enhancing the securit...

Read more

46. Exploring the Role of Ethical Hacking in Strengthening Network Security in Federal University, Wukari, Taraba State

Background of the Study

Cybersecurity threats have become a growing concern for academic institutions, with universities increasingly targeted by hackers seeking to exploit vulnerabilities. Ethical hacking, also known as penetration testing, involves us...

Read more

47. Design and Implementation of a Secure Online Examination System in Federal University, Dutsin-Ma, Katsina State

Background of the Study

The digitalization of education has led to a growing interest in online examinations, especially in higher education institutions where remote learning and assessments have become more prevalent (Adebayo & Yusuf, 2024). Unive...

Read more

48. An Investigation of the Use of Blockchain for Secure Academic Records in Federal University, Gusau, Zamfara State

Background of the Study

The security of academic records is a significant concern for universities worldwide. Academic records, including transcripts, grades, and certificates, must be protected from unauthorized access, tampering, and fraud. Traditiona...

Read more

49. Enhancing Data Privacy in University Networks Using Encryption Techniques in Federal University, Kashere, Gombe State

Background of the Study

Data privacy has become a paramount concern for universities, as they store sensitive information about students, faculty, and research. Federal University, Kashere, Gombe State, like many higher learning institutions, is tasked...

Read more

50. An Investigation into the Use of Blockchain for Secure University Transactions in Federal University, Gusau, Zamfara State

Background of the Study

Blockchain technology, initially popularized by cryptocurrencies, has shown great potential in enhancing security, transparency, and accountability in various fields, including finance and supply chain management. Its decentraliz...

Read more
whatsapp