ABSTRACT
The over-riding aim of this research work is to examine the roles of private and public sectors in electronic security, a case study of Guaranty Trust Bank Plc.
To effectively carry out this research, data was collected in form of questionnaire from respondents who are staff of Guaranty Trust Bank Plc. Seventy (70) questionnaires was administered, fifty eight (58) was returned and fifty (50) copies was used. After critical analysis of the data collected, findings revealed that the roles of private and public sectors in electronic security cannot be over emphasized in reducing the rate of crime in upcoming economies.
Every day, governments, business, and consumers choose to use new technologies to build a global electronic economy. It is becoming apparent that the impacts of the use of these technologies on sustainable development deserve increased attention. This suggests the regulatory authorities to review current policies, practices, measures, and procedures to help assure that they meet the evolving challenges posed by threats to information systems and networks.
TABLE OF CONTENTS
Title Page
Declaration I
Certification II
Dedication III
Acknowledgement IV
Abstract V
Table of content VI
CHAPTER ONE
Introduction 1
Background of the study 2
Statement of the research problem 3
1.4 Purpose of the study 3
1.5 Significance of the study 4
1.6 Research questions 4
1.7 Research hypothesis 5
1.8 Scope and limitations of the study 5
1.9 Definition of terms 5
CHAPTER TWO
2.0 Literature review 8
2.1 Introduction 8
2.2.1 What is electronic security and why needed? 11
2.2.2 Classes of computer security 13
2.3 The roles of private and public sectors in e-Security 13
2.4 Relevant theoretical framework to electronic security 19
2.5 Challenges of electronic security 28
2.6 Risk management 28
2.7 What type of monitoring approach is the most effective? 29
CHAPTER THREE
RESEARCH METHODOLOGY
3.1 Introduction 33
3.2 Research design 33
Population of the study 33
Sampling size 34
Sampling techniques 34
Data collection instrument 35
Administration of data collection instrument 35
Limitations of the methodology 36
3.9 Validation instrument 36
3.10 Reliability of instruments 36
3.11 Method of data analysis 36
CHAPTER FOUR
DATA ANALYSIS PRESENTATION
4.1 Introduction 38
Analysis of respondents’ characteristics and classifications 38
Analysis of individual research statement 41
Test of hypothesis 51
Conclusion of the findings 61
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 Summary of the findings 62
5.2 Conclusion 63
5.3 Recommendations 63
5.4 Suggestion for further study 64
References 65
Appendix