IDEAS home Printed from https://ideas.repec.org/a/ris/joibac/0419.html
   My bibliography  Save this article

Computer Crimes and Counter Measures in the Nigerian Banking Sector

Author

Listed:
  • O, Olasanmi

    (Obafemi Awolowo University)

Abstract

The increase in the use of the information and communication technology (ICT) facilities such as computers and the Internet in the perpetration of criminal activities like spamming, credit card frauds, ATM frauds, phishing, identity theft, denial-of-service, and a host of others has lend credence to the view that ICT is contributing to crime in the banking sector. A greater understanding of such computer crimes may complement existing security practices by possibly highlighting new areas of counter measures. This paper thus assesses whether these crimes can be totally eradicated or not and whether the new generation banks experience more computer crimes than the old generation banks in Nigeria. Based on the findings of this study, the paper concludes that total eradication of computer crimes is not possible but can be highly reduced if internal control measures are adequately put in place within a bank’s organizational structure and that new generation banks seem to experience more crimes than their old generation counterparts due to the fact that majority of their services, which are automated, are subjected to technological changes at a rapid rate.

Suggested Citation

  • O, Olasanmi, 2010. "Computer Crimes and Counter Measures in the Nigerian Banking Sector," Journal of Internet Banking and Commerce, , vol. 15(1), pages 01-10, April.
  • Handle: RePEc:ris:joibac:0419
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a search for a similarly titled item that would be available.

    More about this item

    Keywords

    Computer crimes; Control measures; The Internet; ICT;
    All these keywords.

    JEL classification:

    • E58 - Macroeconomics and Monetary Economics - - Monetary Policy, Central Banking, and the Supply of Money and Credit - - - Central Banks and Their Policies

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ris:joibac:0419. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dale Pinto (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.