Professional Documents
Culture Documents
RESEARCH DESIGN
1.1 INTRODUCTION
The last decade has seen dramatic losses in the banking industry. Firms
that have been performing well suddenly announced large losses due to credit
exposures that may or may not have been assumed to hedge balance sheet
risk. In response to this, commercial bank has almost universally embarked
upon upgrading of their management and control system.
1
Bank rise funds by collecting deposit from business and individuals.
Business and the government through buying bonds, thus, the primary assets
of banks are loans and bonds while primary liabilities are made of deposit. A
bank balance sheet has loans representing the majority of banks assets, but
the loan come with security if the banks makes bad loans to firm or consumer
for example, the bank will be in crisis if those loans are not paid.
2
performance. This prompted the federal government of Nigeria though the
instrumentality of the act of the national assembly to establish the asset
management cooperation of Nigeria in July, 2010 to provide a lasting solution
to the recurring problem of non-performing loans to Ahmad and Arriff, most
banks in economic such as Thailand, Indonesia, Malaysia, Japan and Mexico
experienced high non-performing loans and significant increase in credit risk
during financing and banking crisis, which result in the downfall of several
banks in Indonesia and Thailand.
This research credit looks into the problem associated with bank credits
and seeks to ascertain the impact of proper security management on banks
credit management.
3
1.3 OBJECTIVE OF THE STUDY
The significance of the study will be to make efficient reviews and analytical
demonstration and also add to the general body of knowledge, enlighten the banks
on the impact of security management and banks performance.
i. It will serve useful guide to banks on how to go about setting strategies for security
management.
ii. The study will serve as reference point for future research.
4
iii. This study will help provide analysis of information on security management
to bank and other financial institutions through the data collected from both
secondary and primary source.
iv. Information gathered from this study will also help bank managers in decision
making regarding security management.
1.6 LIMITATION OF THE STUDY
The researcher has for at the cause of this study constrained by financial
incapacitation that leads him to narrowing down the scope of the work to
concentrate on few sample size of the entire staff of GTBank, Jos branch.
Another limitation was the inability to obtained full questionnaires on time due
to the hectic nature of work of the respondents. Thus they had, had not much on the
study.
On July 26, 2007 the bank was a very first sub-Saharan and first
Nigeria joined stock company listed on London stock exchange and Deustsche
5
Borse. The IPO raised U$$750,000 000. In the same year, the successfully
placed Nigerias first private Eurobond issue on the international market.
The GTBank USD 500, 000 000, Eurobond was the first ever
benchmark Eurobond issue by a Nigerian corporate and the second Eurobond
programme by GTBank in the last 5years.
True long term debts of Guarantee Trust Bank Plc are rated BB by
standard & and poors and AA by Fitch Ratings, which are the highest rating
for a Nigeria bank. They introduces online banking and SMS banking in
Nigeria and a naira dominated master card as well as the Platinum and world
Signia Cards and with GTB-no-Wheels, Mobile branch.
On March 12, 2008, GTB was given a banking license for the United
Kingdom by the Financial Services Authority. GTB is a partner of Eko
Atlantic City a new made Island in the Atlantic Ocean, Adjacent to Victoria
Island Lagos, it will be the home of new financial Ostrich. The building of
Eko Atlantic City started in 2009 and expected to be finished in 2006.
6
Security: is a financial instrument that represents an ownership position in a
publicity traded corporation (stock) a creditor relationship with government
body a corporation (bond) or right to ownership as represented by option.
REFERENCES
7
Eguziokpe .E.E (2008), Research Methodology, a Practical Treatise for Student 2 nd
Ed. Jos Quality Function Publishers.
Pandey, I.M (1987) Financial Management, New Printer-Dia Publishing Ltd, India
CHAPTER TWO
8
LITERATURE REVIEW
2.0 INTRODUCTION
The study reveals that credit security, market security and operational
security are the major security to the banker which is managed into three
layers of management system. The board of directors performs the
responsibility of main security oversight, the executive committee monitors
risk and the audit committee oversees all the activities of banking operations.
It is found that internal rating system and risk adjusted rate of return on capital
are relatively more important technique used by banks.
9
banks. It concluded that banks profitability is inversely influenced by the
levels of loans and advances, non perforating loans and deposits thereby
exposing them to great security of liquidity and distress.
In the above stated definitions one can posit that security means: a financial
instrument that represents an ownership position in a publicity-traded
10
operation (stock) or relationship with government or a cooperation (bond) or
rights to ownership as represented by an option.
11
attempt to ensure that investors have an informed, accurate idea of the rate of
interest they are purchasing and its value.
12
services. Contingent obligations like commercial letter of securities are
expected to be transformed into absolute obligations.
i. To arrive at figure for the provision of bad and doubtful debts this must be
deducted from the aggregate loan and advance of the bank to obtain a
reasonable assessment of the credit portfolio.
ii. To gauge the financial condition of individual banks this is done by
segregating bank security into performing.
iii. To identify diligent or problem credits so that actions can be taken early to
remedy the situation. (Raghavan 2009)
13
2.3 MANAGEMENT OF DEBTORS
14
DEBT COLLECTION POLICY
New customers should give two good references including one from bank
before being granted credit terms.
New customer credit limit should be fixed at a low level and only increased if
his repayment record subsequently warrants it.
For large value customers, a file should be maintained of any available
financial information about the customer the file should be review regularly.
Aged list of debt should be produced and received at regular interval.
15
The 1997 central bank of Nigeria monetary policy described credit
policy as an instruction used by the monetary authorities to credit to preferred
or less preferred sectors of the economic taking into account acceptable level
in other relevant economic variable such as domestic prices, reserve and
money supply.
16
key principle in security management processes are sequenced as follows:
establishment of a clear structure, allocation of responsibilities should be
clearly communicated and accountability assigned. The strategies for lending
credit security include but not limited to these.
i. Credit derivatives: this provide bank with an approach which does not
requires them to adjust their loan portfolio. Security derivatives provides
banks with a new source of five income and offer banks the opportunity to
reduce their regulatory capital(Shao and Veager, 2007)
17
stability. The Accord was introduced in 1988 in Switzerland. Compliance
with the Accord means being able to identify, generate, track and report on
risk related data in an integrated manner with full audit ability and
transparency and creates the opportunity to improve the security
management process of bank (Chen and Pan, 2012)
iv. Adoption of sound internal lending policy: the lending policy guides banks
in disbursing loans to customers. Strict adherence to the lending policy is by
far the cheapest and easiest method of security management. The lending
policy should be in line with the overall bank strategy and the factors
considered in designing a lending policy should include: the existing credit
policy, industry norms, general economic condition of the country and the
prevailing economic climate (Kithinji, 2010)
v. Bureau: this is an institution which compiles information and sells this
information to banks as regards to lending profile of a borrower. The bureau
awards credit scores called statistical odd to the borrower which makes it
easy for banks to make instantaneous lending decision. Example of security
bureau is the security management system of the commercial bank of
Nigeria.
REFERENCES
Bales (2008) the Financial of Small Business, Sweet and Maxwell Publishing Ltd
London. Bq1 Banking Report (2010) Getting Banks to Lend Against the
18
Bankers Managing of July, 2012 Publication of the Financial Times ltd
London
CHAPTER THREE
RESEARCH METHODOLOGY
3.1 INTRODUCTION
19
This chapter will give detailed explanation on how data can be collected and
analyzed. It explains the type of data used in collection and analysis.
However, in selecting the sampling size, for the purpose of this research work,
the sampling techniques that we have are as follows:
20
a. Simple random sampling
b. Stratified random sampling
c. Systematic sampling
d. Cluster sampling
While non-profitability sampling can also be grouped into four which are:
a. Availability sampling
b. Quota sampling
c. Purposive sampling
d. Snowball sampling
The researcher will adopt the use of simple random sampling technique to select
the simple size of this project.
Basically the method used for data collection is primary and secondary sources
of data collection.
1. Primary sources of data: these are data whose sources are original. They
are also data used for specific purposes for which they are collected;
examples include personal interviews, questionnaires, direct observation
etc. The method to be used in this study is questionnaires, as well as oral
interviews and personal observations.
2. Secondary sources of data: they are data whose sources are not original to
present users; they are data that have already been collected by other main
users. Those used in this research work include published newspapers,
journals and websites.
NR x 100
TQ 1
Where:
NR= number of respondent in each category of observation
TQ=total questionnaire will be distributed and retrieved.
Thus, the group of observation with the highest percentage of some opinion is
considered relevant and inference is the drawn on such basis.
REFERENCES
Olusola, A.J (1998). The Preparation and Presentation of Research Project. Jos.
Planning research publication PP.13
22
CHAPTER FOUR
DATA PRESENTATION/ANALYSIS
4.1 INTRODUCTION
This chapter shall represent data presentation and analysis, data presentation is
presented using statistical table while analysis is presented using simple
percentage.
23
Data presentation shall be presented using the method specified above, that is
using sample percentage.
Table 1
From the table above 26 respondents representing 86.7% said Yes banks carry out
security management to gain efficiency, while 4 respondents representing 13.3%
said No.
Table 2
From the above table, 24 respondents representing 80% said Yes, security
management is an essential strategy of banking operation in Nigeria, while 6
respondents representing 20% said No.
24
Question 3: appropriate security management in banking industry depends on the
efficiency of management?
Table 3
The table above shows that 25 respondents representing 83% agreed that
appropriate security management in banking industry depends on the efficiency of
the management, while 5 respondents representing 17% disagreed.
Table 4
The table above shows that 30 respondents representing 100% said Yes security
management in their bank is effective, while non respondents said No
Table 5
25
Variable No. of respondents Percentage (%)
YES 23 77
NO 7 23
TOTAL 30 100
Source: field survey 2016
The table above shows that 23 respondents representing 77% said Yes, the
strategies taken by the security management in their bank is favourable, while 7
respondents representing 23% said No
Question 6: how does the current economic policy affect your level of security
management?
Table 6
The table above shows that 24 respondents representing 80% said current
economic policy affects their bank positively while 6 respondents representing
20% said it affects their bank negatively.
Table 7
The table above shows that 70% of the respondents are satisfied with the level of
security management in their bank, while 30% are not satisfied.
Table 8
From the table above 30 respondents representing 100% said quality security
management helps in maintaining the liquidity of their bank, while no respondent
said No.
Question 9: how can you assess the level of the performance of security
management in your bank?
Table 9
27
From the table above, 19 respondents representing 63.3% said the level of the
performance of security management in their bank is satisfactory, while 11
respondents representing 36.7 said they are not satisfied.
Question 10: have the security management in your bank properly identified their
roles in the performance of banking activities?
Table 10
The table above shows that 30 respondents representing 100% of the respondents
said the security management in their bank properly identified their roles in the
performance of banking activities, while no respondent said no.
Question 11: does adequate security management has effect on banking operation?
Table 11
The table above shows that 28 respondents representing 93.3% agreed that
adequate security management has effect on banking operation, while 2
respondents representing 6.7% said it does not.
28
Question 12: if yes, how does it affect the performance of banking?
Table 12
The table above shows that 28 respondents representing 93.3% said adequate
security management affects banking operation positively, while 2 respondents
representing 6.7% said it affects it negatively.
Question 13: what strategies are being put in place to ensure the security of your
bank?
Table 13
From the information in the table above 7 respondents representing 23.3% there is
the use of mobile police as a strategy put in place to ensure the security of their
bank, 11 respondents representing 36.7% insurance while 12 respondents
representing 40% said CCTV camera.
29
CHAPTER FIVE
CONCLUSION
5.1 INTRODUCTION
30
objectives with the aid of survey design and questionnaires which is been validated
by the use of simple percentage.
The study as well focuses on all universal bank presently in the country with
special reference to GTBank, departments were selected as sample size in which
the staff in these department constitute the respondents with the use of table and
percentage interpretation of analysis were made to give a clear understanding.
5.3 CONCLUSION
31
Bank security management on the other hand was realized to be the regulation
and controlling of credit which involves the creation, extension and collection of
debt which intervene with the diligence and default of business as well as we
know, the fundamental core business of a bank is to mobilize deposits and lend the
funds to those who can repay (provision of credit facilities)
5.4 RECOMMENDATION
32
The researcher suggested that further research should be made on the
following areas:
33
BIBLIOGRAPHY
Bales (2008) the Financial of Small Business, Sweet and Maxwell Publishing Ltd
London. Bq1 Banking Report (2010) Getting Banks to Lend Against the
Bankers Managing of July, 2012 Publication of the Financial Times ltd
London
Eguziokpe .E.E (2008), Research Methodology, a Practical Treatise for Student 2nd Ed.
Jos Quality Function Publishers.
Olusola, A.J (1998). The Preparation and Presentation of Research Project. Jos.
Planning research publication PP.13
Pandey, I.M (1987) Financial Management, New Printer-Dia Publishing Ltd, India
Jos.
Yours Faithfully
35
Blessing Silvia Ogueri
APPENDIX B
Section A
Profile:
Qualification: ND ( ) BSC ( )
Section B
Please tick the boxes below that best explain your opinion.
37