THE EFFECT OF FRAUDULENT PRACTICE IN THE BANKING INDUSTRY
CASE STUDY OCEANIC BANK PLC. UGHELLI
1.1 BACKGROUND OF THE STUDY
The late 1980’s and early 1990’s have been characterized with the increasing complexes and abrasiveness of the business environment as well as declining market. As a result of this, the urgency for information management has been accelerated with the increasing dependence of the business environment and of course the banking industry or sector on computer most management staff and computer operators are rather more concerned to move along with recent computer technology that they have not had time to think of some other sensitive issues effecting the computer for fraudulent practice that may arise through computer usage.
Fraudulent practices can be viewed from different people, depending on the perspective from which it is rampand in both developed countries.
Fraudulent practice could be defined in different ways. Fraudulent practice could be defined as a “criminal deception act of a person” it could also be defined as his theft of asset without the notice of lawful owners or international misrepresentation of truth in order to deceive. It can also be viewed as a criminal deception to obtain an unjust or illegal advantage of something. Fraudulent practice could be seen as the embezzlement of property by a person to whom property has been entrusted. It is an international distortion of financial statement among management employee or third parties. International auditing guideline (IAG) defined fraudulent practice as “a particular type of irregularity that involves the use of deceit to obtain an illegal or unjust advantage of money items”
Which ever way fraud is looked at, it connotes an intentional distortion of financial statement for which ever purpose the misappropriation of assets whether or not accompanied by distortion of financial statement.
This study attempts to sort out what the computer in banking sector is like whether is prone to fraudulent or fraudulent practice, the various control measures, detection and level of safety and security of data.
Banking: Banking has become totally dependent on the computer. In the past, a large but manageable amount of book keeping was handed manually but has been the expansion in banking that a huge labour force would be needed to tackle today massive volume of look keeping.
The computer is necessary because there is no other way of dealing with this problem, in most cases, the computer is sited centrally branches are equipped with terminal, giving them on line banking facilities and which enable them to interrogate the central system for information on such thing as a current balance record and so on.
Under the computer control customers statement are prepared and printed out especially designated stationary. Cheques are handled by computer at the clearing house central bank, a mouth operation carried out during the night when the system can concentrate on (dedicated) this purpose.
The cheques are sorted into batches through the computer order and then returned to the branches the next day. The computer also provides each branches and its customers also provides each branches and its customers access to information from a much wide financial would them that would be possible under a manual system.
1.2 STATEMENT OF THE PROBLEM
The banking sector in Nigeria has been taking bold steps in the introduction of computer usage in the operation of banking services. The reason being for obvious benefit derived form.
However, viewing it from another dimension one begin to wonder how safe the computer is. The question that comes to mind is the integrity and security of the computer. How easy it is for a staff and outsider to gain access into the computer room. How easy it is for compter personnel, whether in collusion with user personnel to manipulate the computer program fraudulently either to benefit him or for some other reasons. And how easy it is for user data to be attered fraudulent for the benefit of the perpetrators and increase of manipulation can the computer defect them quickly.
In general view of things computer fraud could be as a result of natural phenomenon accident mistake but largely as a result of fraudulent intention of individuals.
1.3 SIGNIFICANCE OF THE STUDY
The prime motive of this study is to expose various areas of computerized banking operation where fraud can be perpetrated, the types, defection, causes effect and possible control measures.
In this case, this research is significant in putting management and auditors at alert in various loopholes in computer usage in banks.
Thus, leading to overall security of fraud and assist the organization.
1.4 PURPOSE OF THE STUDY
The purpose of this study is:
1. To discover the extent of involvement of Nigeria in fraudulent acts.
2. To discover the key issue leaving to involvement in frauds by members of the public.
3. To evaluate the consequences of the frauds on the banking industry in the economy at large.
4. To discover way of checking and minimizing fraudulent practices to the barest minimum in banking industry.
1.5 RESEARCH QUESTION
1. Does fraudulent practices exist in banking industry?.
2. What are the effects of fraudulent practices in the banking industry?
3. What are the remedies to reduces or eliminate fraudulent practice in banking industry?
4. How can fraudulent practices be prevented in the banking industry?
1.6 LIMITATIONS OF THE STUDY
There are so many difficulties which this research work is confronted with firstly, is that most banks officials approved were reluctant to give out relevant helpful statistical data on financial frauds that occurred in the organization. None of them denied of ever being a victim of financial frauds, but they refused to set such vital information out so that their competitors will not use it as a parameter to determine or measure their internal control efficiency. There is also the problem of cost of acquisition of the relevant information needed for effection research work.
1.7 OPERATIONAL DEFINITION OF TERMS
Bank: There are central places as an establishment for keeping money, valuable items for safety; the money is paid out to customer’s orders.
Computer: These are machine that accept data from an input device, perform arithmetical operation in accordance with pre-defined programmed and finally transfer the processed data as final document. It is also known as a device that works under the control of share programmers automatically accepting storing and processing data to produce information that is the result of processing.
i. Hardware: This is the name given to all physical devices making up a computer system.
ii. Software: This is the general term used to describe the various programmers that may be used on a computer system together with their associated documents.
iii. System analysis: This is clear study of the operation in the organization to find out data processing problems and designing a system that can be applied to computer.
iv. Programmer: This is a person who encode the procedures of a programme in a language suitable for in specified computer.
v. Programme: A set of instruction that is written in the language of the computer to solve a specific task.
vi. Package: These are programmer or application systems which are used for complete sequence of operation. Such as payroll or sales ledger posting it may be purchased form the manufactures.
vii. Input: The raw data which is to be entered into a data processing system. Also referred to as existing file or information to which amendment is to be carried out to produce.
viii. Output: This is the information or result from data processing system via an out put device.
ix. Data: This is a raw fact or is any number, letter or symbols which are fed to computer system for processing.
TERMS AND CONDITIONS
Using our service is LEGAL and IS NOT prohibited by any university/college policies
You are allowed to use the original model papers you will receive in the following ways:
1. As a source for additional understanding of the subject
2. As a source for ideas for your own research (if properly referenced)
3. For PROPER paraphrasing ( see your university definition of plagiarism and acceptable paraphrase)
4. Direct citing ( if referenced properly)
Thank you so much for your respect to the authors copyright.
For more project materials
Log on to www.grossarchive.com