Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models have led in a slew of novel retail payment methods. These deve...
Background of the study
Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models...
Background to the study
With the global use of progressively more sophisticated internet and information technology (Papazoglou, 2003), electronic banking is developing as a key channel for banking businesses (Wei et al., 2012). Globally, remote banking...
Background of the study
The promotion of cashless policies has become a driving factor for global economies to investigate currency digitalization as it fast tracks online transactions. Various uses of e-transaction, includin...
EXCERPT FROM THE STUDY
According to Reuter’s media briefs from Cameroon [16], British prime minister, cyber-crime costs the British economy some 27 billion pounds a year. On the other hand, the Economic and Financial Crimes Commission Report ranks Nigeria as third...
Introduction
In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...
INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....
Background of the study
Technology has been the success story of our century and has opened doors for beneficial inventions. Technology has countries interconnected and the world has now become a global village (Ojo 2019). he information of...
Background Of The Study
Insecurity in Nigeria is not a new phenomenon. High levels of insecurity have resulted in fatalities and psychological distress for individuals, with companies, government institutions, and the economy as a whole suffering greatl...
BACKGROUND OF THE STUDY
Cyber-attacks are constantly making headlines, putting countries, industries, and businesses at danger of security breaches. With society's reliance on technology and the introduction of the internet, things could get even wo...
ABSTRACT
The research proffers an assessment of the impact of triple entry accounting system on financial reporting, a study of bitcoins. It analyses triple entry accounting system and financial accounting, its functions and significance. The resear...
INTRODUCTION
Modern financial accounting is based on a double entry system. Described simply, double entry bookkeeping allows firms to maintain records that reflect what the firm owns and owes and also what the firm has earned and spent over any given p...
ABSTRACT
Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...
1.1 Background of the Study
The rapid digital transformation occurring across Nigeria, especially in the northern region, has created new opportunities for growth, innovation, and development. However, this increased reliance on digital infrastructure has also heightened the vulnerabili...
Background of the Study
The advent of digital government accounting systems in Nigeria, particularly the implementation of the Treasury Single Account (TSA), marks a significant leap toward enhancing financial accountability and transparency. The TSA integrates all governm...
Background of the Study
Cybercrime, particularly financial cybercrimes, has become a significant challenge in the banking sector globally, and Nigeria is no exception. Nigerian banks, such as Guaranty Trust Bank (GTBank), have been at the forefront of adopting advanced...
Background of the Study
Nigeria’s e-commerce sector has witnessed rapid growth, with companies like Jumia Nigeria leading the way in transforming online retailing. The increased use of digital platforms for transactions has made e-commerce companies vulnerable to...
Background of the Study
With the rise of digital financial transactions and the rapid growth of the fintech industry in Nigeria, cyber financial crimes have become an increasing concern. Cybercriminals target financial systems and institutions, engaging in activities such as hacking, on...
Background of the Study
Online scams are a growing issue in Nigeria, with the increasing use of the internet and social media platforms contributing to the rise in cybercrime (Ajayi & Abiola, 2024). These scams involve various fraudulent schemes, including phishing,...
Chapter One: Introduction
1.1 Background of the Study
With the growth of digital media usage in Katsina Local Government Area, cybersecurity has become an increasingly important issue. As individ...
Background of the Study
The rapid growth of the fintech sector in Nigeria has been accompanied by an increase in cybersecurity challenges, which pose significant risks to the industry’s integrity and trustworthiness. Fintech companies, such as Kuda Bank, have revolutionized the fi...
Background of the Study
Fraud in banking institutions poses significant risks to the financial system, affecting not only the banks themselves but also their customers, investors, and the broader economy. The growing sophistication of fraud schemes, combined with rapid technological adv...
Background of the Study
In an era of digital banking, the security of data is paramount, especially for financial institutions like microfinance banks that deal with sensitive customer information and financial transactions. Cybersecuri...
Chapter One: Introduction
1.1 Background of the Study
As cybercrime continues to grow globally, the role of media in raising awareness about its dangers and preventive measures becomes critical. In Damaturu Local Government, Yobe State, print media provides a vital platform fo...
Background of the Study
Supply chain information systems (SCIS) have become critical for managing the complexities of modern logistics and operations. These systems rely heavily on digital infrastructures that are increasingly vulnerable to cybersecurity threats such as ha...
Background of the Study
As cyber threats become more sophisticated, it is critical for organizations, especially commercial banks, to implement comprehensive IT security policies to protect sensitive data and ensure the integrity of their operations (Ogunyemi & Bell...
Background of the Study
Virtual Private Networks (VPNs) are widely used by multinational firms to secure data transmission, particularly when employees work remotely or access company resources from different locations. VPNs encrypt internet traffic, protecting sensitiv...
Background of the Study
Small and medium-sized enterprises (SMEs) are the backbone of many economies, including Nigeria's, but they are increasingly vulnerable to cybersecurity threats due to limited resources and expertise in managing digital security risks. As SME...
Background of the Study
Digital forensics involves the process of collecting, preserving, analyzing, and presenting digital evidence from electronic devices to investigate cybercrimes and security incidents. In telecom firms, digital forensics plays a crucial role in re...
Background of the Study
Digital identity management has become a cornerstone of modern cybersecurity, particularly for institutions like banks that handle sensitive personal and financial information (Nash, 2023). Effective digital identity management solutions (DIMS) e...
Background of the Study
As digital transformation continues to shape industries worldwide, cybersecurity has become a critical concern, especially for financial institutions. The financial sector in Nigeria has been increasingly targeted by cybercrimina...
Background of the Study
The rapid adoption of mobile banking has revolutionized the financial sector in Nigeria, making banking services more accessible and convenient. However, this shift has also led to an increase in digital fraud, such as account hacking, phishing a...
Background of the Study
Social engineering is a technique used by cybercriminals to manipulate individuals into divulging confidential information, typically by exploiting human psychology rather than relying on technical hacking skills (Okafor & Anya, 2024). In the financial sector...
Background of the Study
Biometric authentication has gained traction as a secure and efficient method for verifying user identities in financial transactions. By using unique biological characteristics such as fingerprints, facial recognition, and voice patterns, biometric systems offer...
Background of the Study
The hospitality industry in Nigeria, comprising hotels, resorts, and other accommodation services, plays a vital role in the nation’s economy, attracting both domestic and international tourists. However, as the industry embraces digital technologies to imp...
Background of the Study
The digitalization of real estate transactions has significantly transformed the property market globally, offering increased convenience, speed, and transparency. In Niger State, as in many other regions of Nigeria, the real est...
Background of the Study
The digitalization of real estate transactions has revolutionized the industry, offering efficiency, convenience, and broader access to properties for both buyers and sellers. However, this transition has brought significant challenges, particularly...
Background of the Study
The right to privacy is a fundamental human right recognized under international human rights law and enshrined in many national constitutions, including Nigeria’s. Section 37 of the 1999 Constitution of the Federal...
Background of the Study
Cybercrimes have emerged as one of the most pervasive threats in the digital age, with serious implications for personal privacy, security, and economic stability. The advent of technology has led to the proliferation of ...
Chapter One: Introduction
1.1 Background of the Study
As the digital age progresses, the prevalence of cybercrime has risen dramatically across the world, including in Nigeria. In Kano Municipal LGA, the growth of internet usage, mobile phones, a...
Background of the Study
In recent years, universities have increasingly relied on secure network communication to protect sensitive academic and administrative data. The University of Jos, Plateau State, faces challenges related to the security of its network infrastructur...
Background of the Study
Network security policies are fundamental to protecting digital resources in any organization, especially in universities, where sensitive data such as student records, research findings, and financial information is regularly transmitted and stored...
Background of the Study
Cybersecurity threats in higher education institutions have grown significantly, with universities being prime targets due to their large volumes of sensitive data and open network access (Suleiman et al., 2023). Kaduna State University (KASU), loca...
Background of the Study:
As cyber threats continue to evolve, securing user authentication processes has become a top priority for institutions like Federal University, Lokoja, Kogi State. Multi-factor authentication (MFA) is an effective strategy for enhancing the securit...
Background of the Study
Cybersecurity threats have become a growing concern for academic institutions, with universities increasingly targeted by hackers seeking to exploit vulnerabilities. Ethical hacking, also known as penetration testing, involves us...
Background of the Study
The digitalization of education has led to a growing interest in online examinations, especially in higher education institutions where remote learning and assessments have become more prevalent (Adebayo & Yusuf, 2024). Unive...
Background of the Study
The security of academic records is a significant concern for universities worldwide. Academic records, including transcripts, grades, and certificates, must be protected from unauthorized access, tampering, and fraud. Traditiona...
Background of the Study
Data privacy has become a paramount concern for universities, as they store sensitive information about students, faculty, and research. Federal University, Kashere, Gombe State, like many higher learning institutions, is tasked...
Background of the Study
Blockchain technology, initially popularized by cryptocurrencies, has shown great potential in enhancing security, transparency, and accountability in various fields, including finance and supply chain management. Its decentraliz...