Cyber Crime and E-Banking in Nigeria: An Empirical Evaluation of Fidelity Bank’s Experiences and Challenges
Chapter One
OBJECTIVESย OFย THE STUDY
Theย following areย theย objectives of this study:
- To assess the relationship between e-banking and cybercrime
- To identify the factors that reduce the effectiveness of e-banking services
- To identify solutions to cybercrime problems associated with e-banking.
CHAPTER TWO
LITERATUREย REVIEW
ย INTRODUCTION
Several innovations have changed both the dynamics of banking and the electronic banking revolution.ย Banksย aroundย theย worldย areย reorganizingย theirย businessย strategiesย toย takeย advantage of the new business opportunities e-banking provides. Electronic banking is believed to have originatedย inย theย earlyย 1980s.ย Sinceย then,ย itย hasย grownย toย anย unprecedentedย sizeย withย theย devel- opmentย ofย ICT.ย Electronicย bankingย hasย enabledย banksย toย crossย borders,ย embraceย strategicย per- spectives,ย and provide newย opportunities.ย Accordingย toย Nitsure, informationย and communica- tion technologies have reduced processing costs and facilitated the transfer of information, whichย hasย ledย toย aย fundamentalย changeย inย theย bankingย business.ย Itย shouldย beย notedย thatย e-bank- ingย isย notย limitedย toย developedย countries,ย butย isย foundย evenย inย countriesย withย lessย developedย e- banking systems dueย to theย largeย number ofย new business opportunities e-banking offers.ย The emergingย conceptย ofย electronicย bankingย hasย caughtย theย attentionย ofย criminals.ย Thisย chapterย will explore theories and related concepts of electronic banking and cybercrime.
THEORETICALย FRAMEWORK
This section discusses several theories related to security and electronic media. Electronic me- dia has been emphasized by various theoretical traditions. For example, sociologists argue that in the intermediate case of point-to-point communication, telephones that support common goals exhibit strong collective representatively. Marxists view the media as a tool to exploit the elites for socio-economic and political control over their own contribution to digital media. Bell, Garland and Platt argue that the invention of small electronic and optical circuits that can increase the speed of information transmission over networks will have a large impact on so- ciety. Despite the positive impact of technology on society, on the other hand, it has led to unintentional use in criminal activities such as cybercrime. Millions of bank account holders use the Internet instead of physically hacking.
ROUTINE ACTIVITY THEORY
This theory suggests that three situations are conducive to the commission of crime, which argue that events should occur at the same time and in the same space, three situations are proper targeting, insecurity and crime motivated by incident. The assessment of the situation determines whether a crime has occurred.
The theory of routine activity is one of the main theories of “ecological criminology”. The theory is that crime occurs when three factors combine in a given space and time:
- An accessible target
- The absence of capable guardians that could intervene
- The presence of a motivated offender.
CHAPTER THREE
Advertisements
RESEARCHย METHODOLOGY
INTRODUCTION
The term methodology is used to describe all activities associated with the collection of the necessary information required for this research work. This chapter describes how the study was designed, outlines the methods and procedures used for the study, and accumulates data forย theย study.ย Itย includesย aย descriptionย ofย theย studyย design,ย population, samplingย andย sampling methods, data sources, tools for collecting and analyzing data, and data processing methods.
A methodology is a โcontextual frameworkโ for research, a coherent and logical framework basedย onย attitudes,ย beliefsย andย valuesย thatย guidesย theย decisionsย thatย researchersย [orย users]ย make. Other uses of]ย dataโ. It includes aย theoretical analysis of aย set of methods and principles asso- ciated with a branch of knowledge in such a way that the methodologies used from different disciplines change in accordance with the historical development of knowledge. conflicting viewsย onย howย itย works.ย toย beย done.ย theyย gainย aย betterย understandingย ofย knowledgeย andย practice, which allows methodologies to be used within common philosophies and approaches. The methodology can be seen as a spectrum from a predominantly quantitative approach to a pre- dominantly qualitative approach. Although the methodological agreement may be specific to one of these approaches, researchers can combine approaches to achieve their research goals andย thusย useย differentย methods,ย multi-methodology,ย andย /ย orย multi-methodology.ย Interdiscipli- nary in general, the technology approach is not intended to provide solutions, so it is not the sameย asย aย method,ย butย aย methodologyย thatย providesย aย theoreticalย perspectiveย forย understanding which methods, sets of methods or best practices can be applied in research. question at this time. hand.
RESEARCHย DESIGN
This is a causal study. Typical research consists of examining what causes each other among different variables.
Causalย researchย isย theย studyย (study)ย ofย cause-and-effectย relationships.ย Toย determineย causality, itย isย necessaryย toย identifyย theย changeย inย aย variableย thatย isย believedย toย affectย theย differenceย inย the other variable (s), and then the change in that (s) variable (s).) Another variable. Do not skew the results by keeping them constant while obtaining empirical data. This type of research is very difficult, and a researcher can never be completely sure that no other factors influence causation,ย especiallyย whenย itย comesย toย attitudesย andย motivationsย ofย childrenย andย people.ย There areย oftenย muchย deeperย psychologicalย considerationsย thatย evenย theย respondentย mayย notย beย aware of. There are two methods of investigating causal relationships between variables: experi- mental (for example, in a laboratory) and statistical research.
CHAPTERย FOUR
DATAย ANALYSIS AND INTERPRETATION
ย INTRODUCTION
This chapter deals with the presentation and analysis of the result obtained from published annual reports of the bank under.
Data analysis and interpretation is the process of assigning meaning to the collected infor- mation and determining the conclusions, significance, and implications of the findings. The steps involved in data analysis are a function of the type of information collected, however, returningย toย theย purposeย ofย theย assessmentย andย theย assessmentย questionsย willย provideย aย structure for the organization of the data and a focus for the analysis.
The data gathered were presented according to the order in which they were arranged in the research questions, simple percentage and pie graphs were used to analyze the demographic information of the respondents while regression techniques were adopted to test the research hypothesis.
CHAPTERย FIVE
SUMMARY,ย CONCLUSIONย ANDย RECOMMENDATION
ย Summaryย of Finding
Theย objectives ofย theย studyย wereย to
- To assess the relationship between e-banking and cybercrime.
- To Identify the factors that reduce the effectiveness of e-banking services.
- To Identify solutions to cybercrime problems associated with e-banking.
Findingsย fromย theย studyย revealedย theย following
- Electronic banking benefits customers in Nigeria.
- Customers are very satisfied with e-banking in Nigeria.
- Electronic banking exists in the banking sector in Nigeria.
- In Nigeria, there is a significant relationship between e-banking and cybercrime
- E-banking aids cybercrime in Nigeria.
- There are factors militating against effective e banking in Nigeria.
ย Conclusionย
In fact, there is no doubt that most organizations, including banks, have taken advantage of informationย technologyย toย improveย theirย operations.ย Mostย ofย themย todayย haveย anย Internetย web- site that allows them to expand their services globally, provide operational services and pro- mote quality service delivery. Driving by ambitious ambitions to dominate the financial ser- vices market in Africa, Under the leadership of a dynamic and forward-looking management team,ย Nigerianย banksย haveย rapidlyย evolvedย fromย aย simpleย bankย toย aย one-stopย providerย ofย finan- cial solutions through information technology. As the economies of Nigeria and Africa con- tinueย toย improve,ย followingย theย establishedย trajectoryย ofย otherย emergingย markets;ย thatย is,ย higher politicalย stability,ย betterย publicย finances,ย increasedย demandย fromย domesticย consumers, Thanks to prices and significant improvements in other economic indicators, Nigeria’s banks are well positioned as pledges to the history of the African Renaissance. When the 3G network is launched, it is expected to increase mobile commerce in Nigeria, but may require additional investmentย inย theย qualityย ofย mobileย phones,ย thereย areย manyย opportunitiesย forย mobileย commerce deployedย inย Nigeriaย dueย toย theย growthย andย proliferationย ofย mobileย devices.ย Thereย isย theย prospect of funding, but this may depend on the services available.
Theย Nigerianย bankingย sectorย hasย usedย modernย technologiesย toย improveย operationalย competence toย enableย themย remainย competitiveย inย theย globalย financialย industry. Inย bankingย services Indus- try, the Internet Banking is a new era which explores the new horizons of success and devel- opment to enhance businesses operations. But unluckily, the evidences from the field work show that, this innovation comes with certain degree of exposure to cybercrimes and infor- mation security breaches which create negative perception towards the bank. The cybercrime definition in relation to the banking services industry can be said as an attack on financial institutionย resultingย inย theย financialย fraudย andย lossย ofย vitalย financialย data.ย Theย literatureย reveals that,ย theย majorย issuesย concerningย theย financialย institutionย operatingย withinย theย cyberย spaceย haveย been information security breaches, safety and the lack of trust, fraudulent transactions, rob- bery and identity theft. In conclusion Nigeria needs strong laws and countermeasures, with combine effort from industrial players, government and the banks as well as cyber security experts to address this societal problem.
Theย growingย globalย waveย ofย cybercrimeย andย itsย negativeย consequencesย stillย requireย immediate action. As technology advances, new methods are being used to commit cybercrime. Nigeria is not immune to these attacks, although statistics show a decrease in the damage done by cybercrime in the country. This may be due to the track record of fraud prevention agencies suchย asย theย EFCCย andย otherย lawย enforcementย agencies,ย asย wellย asย theย creationย ofย aย legalย frame- workย toย combatย cybercrimeย throughย theย passageย ofย theย Nigeriaย Cybercrimeย Actย 2015.However, the cost of cybercrime is expected to continue to rise as the convergence of IT and finance (FINTECH) becomes evident globally, as well as the rise of cryptocurrencies and transaction anonymity.ย Therefore,ย itย isย necessaryย toย takeย proactiveย measuresย toย limitย theย threat.ย Cybercrime posesย aย seriousย riskย toย theย economy,ย thereforeย itย isย necessaryย toย establishย anย effectiveย riskย man- agementย systemย andย improveย theย forensicย investigativeย capacityย toย combatย it.ย electronicย crime. Cyberspace is a complex environment that is evolving rapidly and continuously. Thus, those whoย are responsibleย forย security in various fields areย faced with theย taskย of keeping abreast of developmentsย inย theย cyberย world.ย Economicย viabilityย andย nationalย securityย areย highlyย depend- ent on a stable, secure and resilient cyber environment.
ย Recommendations
Buildingย andย rebuildingย trustย inย banksย requiresย aย proactiveย cyberย reportingย andย reportingย system thatย includesย allย employees.ย CCTVย camerasย shouldย beย installedย nearย ATMsย toย protectย custom- ers. There should be public education and consumer education goals. When it comes to how cybercriminals operate, financial institutions must disclose information about data breaches and take action to remedy them. international partners to help fight cross-border crime.
REFERENCES
- Crimeย Museum. (n.d.). Internet Banking Scams. [online]ย Available at: https://www.crimemu- seum.org/crime-library/robberies/internet-banking-scams/ [Accessed 5 Sep. 2021].
- www.linkedin.com.ย (n.d.). Space Transition Theory Simplified* R. Rochin Chandra and K. Jaishankar. [online] Available at: https://www.linkedin.com/pulse/space-transition-theory-ย simplified-r-rochin-chandra-k-k-jaishankar/.
- Wyman,ย O. (2017). Global Cyber Terrorism Incidents on the Rise.ย [online] Mmc.com. Avail- able at: https://www.mmc.com/insights/publications/2018/nov/global-cyber-terrorism-inci-ย dents-on-the-rise.html.
- Wikipedia Contributors (2019). Email spam. [online]ย Wikipedia. Available at: https://en.wik- ipedia.org/wiki/Email_spam.
- katharina.kiener-manu (n.d.). Cybercrime Module 12 Key Issues: Cyberbullying. [online] www.unodc.org.ย Available at: https://www.unodc.org/e4j/en/cybercrime/module-12/key-is-ย sues/cyberbullying.html.
- Wikipediaย Contributorsย (2019).ย Methodology.ย [online]ย Wikipedia.ย Availableย at:ย https://en.wik- ipedia.org/wiki/Methodology.
- Wikipedia Contributors (2019). Causal research. [online] Wikipedia. Available at: https://en.wikipedia.org/wiki/Causal_research.
