ABSTRACT
The use of ATM has grown rapidly in popularity because of its low banks transaction costs and customers convenience which has made it a basic element of today’s financial service delivery. However, the ATM which is meant to be serving the customers better is now becoming a nightmare for some customers because of fraud perpetuated in their accounts through ATM withdrawals. The main purpose of this work is to examine the activities of fraudsters through ATM pin and how these frauds have affected financial institution growth and customers patronage of banks. This researcher made use of four banks as a case study for this research work. Data was collected from questionnaires, interviews and observation from the four banks under study. Three hypotheses was tested using the chi- square statistical tool and it was observed that there is a significant relationship between ATM fraud and fraud in Nigeria, it was also observed that ATM fraud affects customers patronage and financial institution growth. In conclusion, the activities of fraudsters needs to be monitored and measures should be put in place to mitigate these frauds. To solve this, additional security layer on the ATM is recommended and proper monitoring of the ATM machine by the banks. We believe that if banks and service providers heed to some of these suggestions in this work, we will have a safer, hassle- free and worth while banking experience in this country.
TABLE OF CONTENT
TITLE PAGE I
DECLARATION II
CERTIFICATION III
DEDICATION IV
ACKNOWLEDGEMENT V
ABSTRACT VI
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
1.2 STATEMENT OF THE PROBLEM
1.3 OBJECTIVE OF THE STUDY
1.4 RESEARCH QUESTIONS
1.5 RESEARCH HYPOTHESIS
1.6 SIGNIFICANT OF THE STUDY
1.7 SCOPE OF THE STUDY
1.8 LIMITATION OF THE STUDY
1.9 DEFINITION OF TERMS
1.10 REFERENCES
CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 CONCEPTUAL ISSUES
2.2 AUTOMATED TELLER MACHINE
2.3 AUTOMATED TELLER MACHINE FRAUD 38
2.4 AUTOMATED TELLER MACHINE FRAUD TECHNIQUES 43
2.4.1 CARD THEFT
2.4.2 SKIMMING DEVICE
2.4.3 PIN SECURITY
2.4.4 SHOULDER SURFING
2.4.5 UTILISING A FAKE PIN OUTLAY
2.4.6 PIN INTERCEPTION
2.4.7 ACCESSING THE CASH
2.4.8 APPLICATION OF A FALSE ATM PRESENTER 53
2.4.9 TRANSACTION REVERSAL
2.9.10 ATM BURGLARY ATTACK
2.5 C.B.N REGULATORY FRAMEWORK ON ATM FRAUD 57
2.6THEORETICAL CONTEXT
2.7 EMPERICAL LITERATURE
2.8 CONCLUSION
2.9 REFERENCES
CHAPTER THREE
3.0 RESEARCH DESIGN AND METHODOLOGY
3.1 INTRODUCTION
3.2 RESEARCH DESIGN
3.3 POPULATION OF THE STUDY
3.4 SAMPLE TECHNQUES
3.5 METHOD OF DATA COLLECTION
3.6 TECHNQUES OF DATA ANALYSIS
3.7 RELIABILITY OF INSTRUMENT
3.8 SUMMARY
3.9 REFERENCES
CHAPTER FOUR
4.0 DATA ANALYSIS, PRESENTATION AND INTERPRETATION INTRODUCTION
4.1 DATA ANALYSIS
4.2 TESTING OF HYPOTHESIS
4.3 DATA PRESENTATION
4.4 RESEARCH FINDINGS AND RESULT
CHAPTER FIVE
5.0 DISCUSSION OF FINDINGS, CONCLUSION AND RECOMMENDATION
5.1 DISCUSSION OF FINDINGS
5.2 CONCLUSION
5.3 RECOMMENDATIONS
BIBLOGRAPHY
APPENDIX I
APPENDIX II
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2017, 04). An Assessment On The Activities Of Fraudsters Using Atm Pin.. ProjectStoc.com. Retrieved 04, 2017, from https://projectstoc.com/read/8446/an-assessment-on-the-activities-of-fraudsters-using-atm-pin-4346
"An Assessment On The Activities Of Fraudsters Using Atm Pin." ProjectStoc.com. 04 2017. 2017. 04 2017 <https://projectstoc.com/read/8446/an-assessment-on-the-activities-of-fraudsters-using-atm-pin-4346>.
"An Assessment On The Activities Of Fraudsters Using Atm Pin.." ProjectStoc.com. ProjectStoc.com, 04 2017. Web. 04 2017. <https://projectstoc.com/read/8446/an-assessment-on-the-activities-of-fraudsters-using-atm-pin-4346>.
"An Assessment On The Activities Of Fraudsters Using Atm Pin.." ProjectStoc.com. 04, 2017. Accessed 04, 2017. https://projectstoc.com/read/8446/an-assessment-on-the-activities-of-fraudsters-using-atm-pin-4346.
- Related Works
- Design And Implementation Of A Bill Of Materials Processing System (a Case Study Of Emenite Nig. Ltd. Emene, Enugu)
- Design And Implementation Of An Expert Management System For Automobile Fault Detection And Diagnosis
- Design And Implementation Of A Computerized Security Information System For Enugu State (a Case Study Of Nigeria Police Force)
- Computer Aided Tutorials In Addition To Conventional Tutorials To Improve Learning In Hypertext Mark Up Language
- Design And Implement Of Computerized Population Analysis System (a Case Study Of National Population Commissioner (n P C) Enugu)
- Design And Implementation Of A Computerised Registration System For Universal Basic Education (a Case Study Of Delta State)
- Design And Implementation Of A Computerized Banking System (a Case Study Of United Bank For Africa)
- Design And Implementation Of Web User Authentication (case Study Of Unn Nsukka)
- Design And Implementation Of A Computerised Market Survey Reporting System
- Steganography – An Art Of Hiding Digital Information