0704-883-0675     |      dataprojectng@gmail.com
1

1. PUBLIC PERCEPTION OF NIGERIA ELECTRONIC NAIRA (E-NAIRA). A STUDY OF KANO METROPOLIS.

​​​​​​Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models have led in a slew of novel retail payment methods. These deve...

Read more

2. PUBLIC PERCEPTION OF NIGERIA ELECTRONIC NAIRA (E-NAIRA). A STUDY OF KANO METROPOLIS.

Background of the study

Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models...

Read more

3. THE EXTENT OF LIABILITY OF BANKS FOR E-BANKING FRAUD

Background to the study

With the global use of progressively more sophisticated internet and information technology (Papazoglou, 2003), electronic banking is developing as a key channel for banking businesses (Wei et al., 2012). Globally, remote banking...

Read more

4. THE IMPACT OF ENAIRA IN TRACKING MONEY LAUNDERING AND FRAUD IN NIGERIA

Background of the study 

The promotion of cashless policies has become a driving factor for global economies to investigate currency digitalization as it fast tracks online transactions. Various uses of e-transaction, includin...

Read more

5. ETHICAL HACKING AND CYBER SECURITY IN NIGERIAN TELECOMMUNICATION INDUSTRY: ISSUES AND SOLUTIONS

EXCERPT FROM THE STUDY

According to Reuter’s media briefs from Cameroon [16], British prime minister, cyber-crime costs the British economy some 27 billion pounds a year. On the other hand, the Economic and Financial Crimes Commission Report ranks Nigeria as third...

Read more

6. CRITICAL INFORMATION INFRASTRUCTURE PROTECTION TECHNIQUES IMPLEMENTATION AGAINST CYBER ATTACKS USING BIG DATA ANALYTICS (A CASE STUDY OF INEC & JAMB)

Introduction

In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...

Read more

7. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATA BASE SYSTEM

INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....

Read more

8. AN INVESTIGATION OF SOCIAL MEDIA USAGE AND ITS IMPACT ON STUDENTS EXPOSURE TO CYBERCRIMES

Background of the study

 Technology has been the success story of our century and has opened doors for beneficial inventions.  Technology has countries interconnected and the world has now become a global village (Ojo 2019). he information of...

Read more

9. IMPACT OF ICT IN SECURITY MANAGEMENT IN UNIVERSITY OF NIGERIA NSUKKA

Background Of The Study

Insecurity in Nigeria is not a new phenomenon. High levels of insecurity have resulted in fatalities and psychological distress for individuals, with companies, government institutions, and the economy as a whole suffering greatl...

Read more

10. THE ASSESSMENT OF BIG DATA ANALYTICS ROLE AS A PROTECTION TECHNIQUE AGAINST CYBER ATTACKS (A CASE STUDY OF JAMB)

BACKGROUND OF THE STUDY

Cyber-attacks are constantly making headlines, putting countries, industries, and businesses at danger of security breaches. With society's reliance on technology and the introduction of the internet, things could get even wo...

Read more

11. THE IMPACT OF TRIPLY ENTRY ACCOUNTING SYSTEM ON FINANCIAL REPORTING

ABSTRACT

The research proffers an assessment of the impact of triple entry accounting system on financial reporting, a study of bitcoins. It analyses triple entry accounting system and financial accounting, its functions and significance. The resear...

Read more

12. TRIPLY ENTRY ACCOUNTING SYSTEM AND FINANCIAL REPORTING

INTRODUCTION

Modern financial accounting is based on a double entry system. Described simply, double entry bookkeeping allows firms to maintain records that reflect what the firm owns and owes and also what the firm has earned and spent over any given p...

Read more

13. DEVELOPMENT OF A MORE SECURED BANKING TRANSACTION AUTHENTICATION APPLICATION

ABSTRACT

Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...

Read more

14. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more
whatsapp