preview

Analysis of the Causes and Measures of Curbing Fraud in the Banking Sector

Decent Essays
ANALYSIS OF THE CAUSES AND MEASURES OF CURBING FRAUD IN THE BANKING SECTOR.

BY

ESSIEN NSIKAK U.

A RESEARCH PROJECT SUBMITED TO
THE DEPARTMENT OF ACCOUNTING, COLLEGE OF BUSINESS AND SOCIAL SCIENCES, COVENANT UNIVERSITY, OTA.
IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF BACHELOR OF SCIENCE (B.sc) DEGREE IN ACCOUNTING.

CERTIFICATION
I certify that this project titled “The Analysis of the causes and measures of curbing fraud in the banking sector” was carried out by ESSIEN, Nsikak U. (05AA01752) under my supervision and is found to be adequate in scope for the requirement of a Bachelor of Science Degree in Accounting.

_________________________ ______________________
MRS.
…show more content…
Finally, it was recommended that The bank 's control system should be of high priority both at management and operational levels, the regulatory authorities have a responsibility of exposing staff to the dynamics of modern day banking operations, The level of punishment meted out to fraudsters is not commensurate enough to deter others from committing such crimes in the future. The penalties already in place should be reviewed. In this regard, a Nigerian version of the Sarbanes Oxley act must be enacted and since the most important resource of any organization is the human resource, there must be a standard audit department staffed with the best material in terms of knowledge, experience, human relations, integrity, dedication and commitment to the success of the bank.

TABLE OF CONTENTS
Title page............................................................................................................I
Certification........................................................................................................II
Dedication..........................................................................................................III
Abstract...............................................................................................................IV
Acknowledgements.............................................................................................V
Table of
Get Access