ABSTRACT
The financial institutions seek to cut the cost of mediators through direct deal with the consumers and share information with the Internet users as well as encourage customers to pay on-line. One of the main problems faced by Organizations in terms of dealing and paying on-line that Internet users are worried and unwilling to send sensitive information through the Internet. In fact customers are scared that during the transactions hackers and Internet interlopers will steal their information. This study suggests that there are some security features such as authentication, authorization, privacy and encryption can influence user’s perceptions of security for electronic finance transactions and contribute toward enhancing customers' perceptions that the e-finance transactions are secure and safe to send through sensitive information and pay on-line.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
Chapter one: introduction
1.0 BACKGROUND TO THE STUDY
1.1 STATEMENT OF THE PROBLEM
1.2 AIM AND OBJECTIVES OF THE STUDY
1.3 RELEVANT RESEARCH QUESTIONS
1.4 SIGNIFICANCE OF THE STUDY
1.5 SCOPE OF THE STUDY
1.6 CONTRIBUTIONS TO ICT BODY OF KNOWLEDGE
1.7 DEFINITION OF TERMS
CHAPTER TWO: LITERATURE REVIEW
2.1 THEORETICAL FRAMEWORK OF THE STUDY
2.2 EMPIRICAL REVIEW OF PREVIOUS WORK IN THE AREA OF STUDY
2.3 EVOLUTION ELECTRONIC PAYMENT OF
2.4 LIMITATIONS OF TRADITIONAL PAYMENT SYSTEMS
2.6 CATEGORIES OF ELECTRONIC PAYMENT SYSTEMS
2.6.1 ELECTRONIC CASH (E CASH) PAYMENT SYSTEM
2.6.2 ELECTRONIC CHEQUE (ECHEQUE) PAYMENT SYSTEM
2.6.3 SMART CARD PAYMENT SYSTEM
2.6.4 ONLINE CREDIT CARD ELECTRONIC PAYMENT SYSTEM
2.7 ANALYSIS OF THE DIFFERENT AUTHENTICATION MECHANISMS FOR ELECTRONIC PAYMENT SYSTEMS
2.8 SECURITY REQUIREMENTS OF E-PAYMENT
2.8.1 THE PROBLEMS AND SOLUTIONS ASSOCIATED WITH THE DEVELOPMENT OF ELECTRONIC BANKING IN NIGERIA
2.8.2 NEGATIVE IMPACT OF ELECTRONIC BANKING IN NIGERIA
2.9 POSITIVE IMPACT OF ELECTRONIC BANKING IN NIGERIA
CHAPTER THREE: RESEARCH METHODOLOGY
3.0 RESEARCH DESIGN
3.1 DATA FLOW DIAGRAM OF THE EXISTING SYSTEM
3.2 METHOD OF DATA COLLECTION USED
3.3 METHOD OF DATA ANALYSIS
3.4 LIMITATION OF THE METHODOLOGY
3.5 PRESENTATION AND ANALYSIS OF DATA ACCORDING TO RESEARCH QUESTIONS.
3.6 PROBLEM OF THE EXISTING SYSTEM
3.7 JUSTIFICATION OF THE PROPOSED SYSTEM
CHAPTER FOUR: SYSTEM DESIGN AND IMPLEMENTATION
4.0 OVERVIEW OF SYSTEM DESIGN
4.1 INPUT DESIGN
4.2 PROCESS DESIGN
4.2.1 SYSTEM DATA FLOW DIAGRAM
4.2.2 SYSTEM STRUCTURE CHARTS
4.3 OUTPUT DESIGN
4.4 DATABASE DESIGN
4.5 PROGRAM DESIGN
4.6 SYSTEM IMPLEMENTATION
4.7 PROJECT COSTING
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATION
5.1 SUMMARY
5.2. RECOMMENDATIONS
5.3 CONCLUSION
References
Appendixes
Research, A. (2018). THE ELECTRONIC PAYMENT SECURITY SYSTEM. Afribary. Retrieved from https://track.afribary.com/works/electronic-payment-security-system-1230
Research, Afri "THE ELECTRONIC PAYMENT SECURITY SYSTEM" Afribary. Afribary, 29 Jan. 2018, https://track.afribary.com/works/electronic-payment-security-system-1230. Accessed 25 Nov. 2024.
Research, Afri . "THE ELECTRONIC PAYMENT SECURITY SYSTEM". Afribary, Afribary, 29 Jan. 2018. Web. 25 Nov. 2024. < https://track.afribary.com/works/electronic-payment-security-system-1230 >.
Research, Afri . "THE ELECTRONIC PAYMENT SECURITY SYSTEM" Afribary (2018). Accessed November 25, 2024. https://track.afribary.com/works/electronic-payment-security-system-1230