<p>
</p><p>Title page – – – – – – – – –<br>Certification – – – – – – – –<br>Dedication – – – – – – – – –<br>Acknowledgment – – – – – – – –<br>Abstract – – – – – – – – –<br>Table of contents – – – – – – – –</p><p><strong>
Chapter ONE
- INTRODUCTION</strong><br>1.0 Introduction – – – – – – –<br>1.1 Theoretical Background – – – – –<br>1.2 Statement of Problem – – – – – –<br>1.3 Aim and Objectives of Study – – – – –<br>1.4 Significance of Study – – – – – –<br>1.5 Scope of the Study – – – – – – –<br>1.6 Organization of study – – – – – –<br>1.7 Definition of Terms – – – – – –</p><p><strong>
Chapter TWO
</strong><br><strong>REVIEW OF RELATED LITERATURE</strong><br>2.0 Introduction – – – – – – –<br>2.1 Overview of Online Monetary transaction – – –<br>2.2 Concept of Monetary Transaction – – –<br>2.3 Features of Online Monetary Transaction – – –<br>2.4 Security of Online Transaction – – – – –<br>2.5 Attacks of Online transaction System – – –<br>2.6 Counter Measures of Net-Banking System – – –<br>2.7 Advantages and Disadvantages of Online Monetary<br>Transaction – – – – – – –<br>2.7-1 Client Focus – – – – – – –<br>2.7-2 Cost Reduction – – – – – – –<br>2.7-3 Market Expansion – – – – – – –<br>2.8 Risks of Online Banking – – – – – –<br>2.8-1 Strategic Risk – – – – – – –<br>2.8-2 Operational Risk – – – – – – –<br>2.8-3 Legal Risk – – – – – – – –<br>2.8-4 Reputational Risk – – – – – – –</p><p><strong>
Chapter THREE
: </strong>SYSTEM ANALYSIS AND DESIGN<br>3.0 Introduction – – – – – – –<br>3.1 Research Methodology – – – – – –<br>3.2 System Analysis – – – – – – –<br>3.2-1 Analysis of the Existing System – – – – –<br>3.2-2 Problems of the Existing System – – – –<br>3.2-3 Analysis of the Proposed System – – – –<br>3.2.3-1 Advantages of Proposed System – – – –<br>3.2.3-2 Disadvantages of Proposed System – – –<br>3.3 System Design – – – – – – –<br>3.3.1 Input Layout – – – – – – –<br>3.3.2 Program Flowchart – – – – – –<br>3.3.3 Output Layout – – – – – – –</p><p><strong>
Chapter FOUR
:</strong> SYSTEM IMPLEMENTATION<br>4.0 Introduction – – – – – –<br>4.1 System Flowchart – – – – – –<br>4.2 Choice of Programming language – – – –<br>4.3 Analysis of Modules – – – – – –<br>4.4 Programming Environment – – – – –<br>4.5 System Implementation – – – — –</p><p><strong>
Chapter FIVE
: </strong>CONSTRAINTS OF THE STUDY, SUMMARY, CONCLUSION AND RECOMMENDATIONS<br>5.0 Introduction – – – – – – –<br>5.1 Constraints of the Study – – – – –<br>5.2 Summary – – – – – – – –<br>5.3 Conclusion – – – – – – – –<br>5.4 Recommendations – – – – – –<br>References – – – – – – – –<br>Appendix A: Program Flowchart – – – –<br>Appendix B: Source Code – – – – –<br>Appendix C: System Output – – – – –</p>
<br><p></p>