Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models have led in a slew of novel retail payment methods. These deve...
Background of the study
Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models...
Background to the study
With the global use of progressively more sophisticated internet and information technology (Papazoglou, 2003), electronic banking is developing as a key channel for banking businesses (Wei et al., 2012). Globally, remote banking...
Background of the study
The promotion of cashless policies has become a driving factor for global economies to investigate currency digitalization as it fast tracks online transactions. Various uses of e-transaction, includin...
EXCERPT FROM THE STUDY
According to Reuter’s media briefs from Cameroon [16], British prime minister, cyber-crime costs the British economy some 27 billion pounds a year. On the other hand, the Economic and Financial Crimes Commission Report ranks Nigeria as third...
Introduction
In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...
INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....
Background of the study
Technology has been the success story of our century and has opened doors for beneficial inventions. Technology has countries interconnected and the world has now become a global village (Ojo 2019). he information of...
Background Of The Study
Insecurity in Nigeria is not a new phenomenon. High levels of insecurity have resulted in fatalities and psychological distress for individuals, with companies, government institutions, and the economy as a whole suffering greatl...
BACKGROUND OF THE STUDY
Cyber-attacks are constantly making headlines, putting countries, industries, and businesses at danger of security breaches. With society's reliance on technology and the introduction of the internet, things could get even wo...
ABSTRACT
The research proffers an assessment of the impact of triple entry accounting system on financial reporting, a study of bitcoins. It analyses triple entry accounting system and financial accounting, its functions and significance. The resear...
INTRODUCTION
Modern financial accounting is based on a double entry system. Described simply, double entry bookkeeping allows firms to maintain records that reflect what the firm owns and owes and also what the firm has earned and spent over any given p...
ABSTRACT
Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...