ABSTRACT
The over-riding aim of this research work is to examine the roles of private and public sectors in electronic security, a case study of Guaranty Trust Bank Plc.
To effectively carry out this research, data was collected in form of questionnaire from respondents who are staff of Guaranty Trust Bank Plc. Seventy (70) questionnaires was administered, fifty eight (58) was returned and fifty (50) copies was used. After critical analysis of the data collected, findings revealed that the roles of private and public sectors in electronic security cannot be over emphasized in reducing the rate of crime in upcoming economies.
Every day, governments, business, and consumers choose to use new technologies to build a global electronic economy. It is becoming apparent that the impacts of the use of these technologies on sustainable development deserve increased attention. This suggests the regulatory authorities to review current policies, practices, measures, and procedures to help assure that they meet the evolving challenges posed by threats to information systems and networks.
TABLE OF CONTENTS
Title Page
DeclarationI
CertificationII
DedicationIII
AcknowledgementIV
Abstract V
Table of contentVI
CHAPTER ONE
Introduction1
Background of the study2
Statement of the research problem3
1.4Purpose of the study3
1.5Significance of the study4
1.6Research questions4
1.7Research hypothesis5
1.8Scope and limitations of the study5
1.9Definition of terms5
CHAPTER TWO
2.0Literature review8
2.1Introduction 8
2.2.1What is electronic security and why needed?11
2.2.2Classes of computer security13
2.3The roles of private and public sectors in e-Security13
2.4Relevant theoretical framework to electronic security19
2.5Challenges of electronic security28
2.6Risk management28
2.7What type of monitoring approach is the most effective?29
CHAPTER THREE
RESEARCH METHODOLOGY
3.1Introduction33
3.2Research design33
Population of the study33
Sampling size34
Sampling techniques34
Data collection instrument35
Administration of data collection instrument35
Limitations of the methodology36
3.9Validation instrument36
3.10Reliability of instruments36
3.11Method of data analysis36
CHAPTER FOUR
DATA ANALYSIS PRESENTATION
4.1Introduction38
Analysis of respondents’ characteristics and classifications38
Analysis of individual research statement41
Test of hypothesis51
Conclusion of the findings61
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1Summary of the findings62
5.2Conclusion 63
5.3Recommendations63
5.4Suggestion for further study64
References65
Appendix
Kolawole, S. (2018). ELECTRONIC SECURITY: ROLE OF PRIVATE AND PUBLIC SECTOR IN ELECTRONIC SECURITY. Afribary. Retrieved from https://track.afribary.com/works/electronic-security-role-of-private-and-public-sector-in-electronic-security-1
Kolawole, Sodiq "ELECTRONIC SECURITY: ROLE OF PRIVATE AND PUBLIC SECTOR IN ELECTRONIC SECURITY" Afribary. Afribary, 20 Apr. 2018, https://track.afribary.com/works/electronic-security-role-of-private-and-public-sector-in-electronic-security-1. Accessed 27 Nov. 2024.
Kolawole, Sodiq . "ELECTRONIC SECURITY: ROLE OF PRIVATE AND PUBLIC SECTOR IN ELECTRONIC SECURITY". Afribary, Afribary, 20 Apr. 2018. Web. 27 Nov. 2024. < https://track.afribary.com/works/electronic-security-role-of-private-and-public-sector-in-electronic-security-1 >.
Kolawole, Sodiq . "ELECTRONIC SECURITY: ROLE OF PRIVATE AND PUBLIC SECTOR IN ELECTRONIC SECURITY" Afribary (2018). Accessed November 27, 2024. https://track.afribary.com/works/electronic-security-role-of-private-and-public-sector-in-electronic-security-1