ELECTRONIC SECURITY: ROLE OF PRIVATE AND PUBLIC SECTOR IN ELECTRONIC SECURITY

ABSTRACT

The over-riding aim of this research work is to examine the roles of private and public sectors in electronic security, a case study of Guaranty Trust Bank Plc.

To effectively carry out this research, data was collected in form of questionnaire from respondents who are staff of Guaranty Trust Bank Plc. Seventy (70) questionnaires was administered, fifty eight (58) was returned and fifty (50) copies was used. After critical analysis of the data collected, findings revealed that the roles of private and public sectors in electronic security cannot be over emphasized in reducing the rate of crime in upcoming economies.

Every day, governments, business, and consumers choose to use new technologies to build a global electronic economy. It is becoming apparent that the impacts of the use of these technologies on sustainable development deserve increased attention. This suggests the regulatory authorities to review current policies, practices, measures, and procedures to help assure that they meet the evolving challenges posed by threats to information systems and networks. 

TABLE OF CONTENTS

Title Page

DeclarationI

CertificationII

DedicationIII

AcknowledgementIV

Abstract V

Table of contentVI

CHAPTER ONE

Introduction1

Background of the study2

Statement of the research problem3

1.4Purpose of the study3

1.5Significance of the study4

1.6Research questions4

1.7Research hypothesis5

1.8Scope and limitations of the study5

1.9Definition of terms5

CHAPTER TWO

2.0Literature review8

2.1Introduction 8

2.2.1What is electronic security and why needed?11

2.2.2Classes of computer security13

2.3The roles of private and public sectors in e-Security13

2.4Relevant theoretical framework to electronic security19

2.5Challenges of electronic security28

2.6Risk management28

2.7What type of monitoring approach is the most effective?29

CHAPTER THREE

RESEARCH METHODOLOGY

3.1Introduction33

3.2Research design33

Population of the study33

Sampling size34

Sampling techniques34

Data collection instrument35

Administration of data collection instrument35

Limitations of the methodology36

3.9Validation instrument36

3.10Reliability of instruments36

3.11Method of data analysis36

CHAPTER FOUR

DATA ANALYSIS PRESENTATION

4.1Introduction38

Analysis of respondents’ characteristics and classifications38

Analysis of individual research statement41

Test of hypothesis51

Conclusion of the findings61

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.1Summary of the findings62

5.2Conclusion 63

5.3Recommendations63

5.4Suggestion for further study64

References65

Appendix