Auswahl der wissenschaftlichen Literatur zum Thema „Unauthorised banking“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Unauthorised banking" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Unauthorised banking":
Mohan Kumar, U., P. Siva SaiManikanta und M. D. AntoPraveena. „Intelligent Security System for Banking Using Internet of Things“. Journal of Computational and Theoretical Nanoscience 16, Nr. 8 (01.08.2019): 3296–99. http://dx.doi.org/10.1166/jctn.2019.8180.
Hanefah, Mustafa Mohd, Muhammad Iqmal Hisham Kamaruddin, Supiah Salleh, Zurina Shafii und Nurazalia Zakaria. „Internal control, risk and Sharīʿah non-compliant income in Islamic financial institutions“. ISRA International Journal of Islamic Finance 12, Nr. 3 (19.11.2020): 401–17. http://dx.doi.org/10.1108/ijif-02-2019-0025.
Mathur, Sonali, Shankar Lal Gupta und Payal Pahwa. „Enhancing Security in Banking Environment Using Business Intelligence“. International Journal of Information Retrieval Research 10, Nr. 4 (Oktober 2020): 21–34. http://dx.doi.org/10.4018/ijirr.2020100102.
Jaya Sakti, Mochamad Aji, Noer Azham Achsani und Ferry Syarifuddin. „Online Banking Implementation: Risk Mapping Using ERM Approach“. Buletin Ekonomi Moneter dan Perbankan 20, Nr. 3 (31.01.2018): 279–306. http://dx.doi.org/10.21098/bemp.v20i3.824.
Смирнов, Е., und E. Smirnov. „In the Interests of Combating Financial Fraud“. Auditor 4, Nr. 9 (10.10.2018): 3–10. http://dx.doi.org/10.12737/article_5b616224585aa3.74179318.
Li, Siqi. „On interpretation of loss from unauthorized transactions in China’s e-banking business“. Frontiers of Law in China 4, Nr. 1 (22.01.2009): 114–26. http://dx.doi.org/10.1007/s11463-009-0007-2.
Shamanina, E. I., und Yu S. Zakharenko. „BIOMETRIC TECHNOLOGIES AS A PERSPECTIVE DIRECTION OF IMPROVING REMOTE BANK SERVICE“. Vestnik Universiteta, Nr. 5 (16.07.2020): 193–99. http://dx.doi.org/10.26425/1816-4277-2020-5-193-199.
Frolova, Evgenia E. „LEGAL REGULATION OF INTERNET BANKING IN INDIA“. RUDN Journal of Law 23, Nr. 3 (15.12.2019): 351–74. http://dx.doi.org/10.22363/2313-2337-2019-23-3-351-374.
Legeais, Dominique. „Integrated purchasing and banking data protection in the context of Directive (EU) 2015/2366: new payment service providers“. Law, State and Telecommunications Review 11, Nr. 1 (20.05.2019): 173–98. http://dx.doi.org/10.26512/lstr.v11i1.24856.
Ryzhkova, Marina, Ekaterina Soboleva, Anastasia Sazonova und Mikhail Chikov. „Consumers’ Perception of Artificial Intelligence in Banking Sector“. SHS Web of Conferences 80 (2020): 01019. http://dx.doi.org/10.1051/shsconf/20208001019.
Dissertationen zum Thema "Unauthorised banking":
Ndlovu, Witness Nomfundo. „The regulation of electronic funds transfers : problematic aspects relating to banks liability“. Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/77358.
Mini Dissertation (LLM (Banking Law))--University of Pretoria 2020.
GCRA Bursary
Mercantile Law
LLM (Banking Law)
Unrestricted
Kleynhans, Stefan Anton. „The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship“. 2000. http://hdl.handle.net/10500/17100.
LL.M. (Banking Law)
Bücher zum Thema "Unauthorised banking":
The Great American Bank Robbery The Unauthorized Report On What Really Caused The Great Recession. Thomas Nelson Publishers, 2011.
Buchteile zum Thema "Unauthorised banking":
Corzo, C., F. Corzo S., N. Zhang und A. Carpenter. „Using Automated Banking Certificates to Detect Unauthorised Financial Transactions“. In Financial Cryptography and Data Security, 36–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_3.
van Zyl, DH. „Unauthorised Payment and Unjust Enrichment in Banking Law“. In Restitution and Banking Law, 1–26. Informa Law from Routledge, 2020. http://dx.doi.org/10.4324/9781003122609-1.
DeFilippi, Dan, und Katina Michael. „Credit Card Fraud“. In Online Banking Security Measures and Data Protection, 263–82. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch015.
Sharma, Kunal, und A. J. Singh. „Biometric Security in the E-World“. In Applied Cryptography for Cyber Security and Defense, 289–337. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch013.
Pejic Bach, Mirjana, und Martina Draganic. „Some Aspects of Implementing Always-On IT-Solutions and Standards in Banking Sector“. In Always-On Enterprise Information Systems for Business Continuance, 149–74. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-723-2.ch009.
Shanmugapriya D. und Padmavathi Ganapathi. „A Framework for Improving the Accuracy of Keystroke Dynamics-Based Biometric Authentication Using Soft Computing Techniques“. In Biometric Authentication in Online Learning Environments, 208–35. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7724-9.ch009.
Tong, Carrison K. S., und Eric T. T. Wong. „Information Security Management in Picture Archiving and Communication Systems for the Healthcare Industry“. In Encyclopedia of Multimedia Technology and Networking, Second Edition, 682–90. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch092.
Konferenzberichte zum Thema "Unauthorised banking":
Wang, Junqi, und Duwei Deng. „Unauthorized Transactions and Unintended Transactions in Open Banking:“. In 6th Annual International Conference on Social Science and Contemporary Humanity Development (SSCHD 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210121.072.
Hewamadduma, Shammi Ishara. „Detection and prevention of possible unauthorized login attempts through stolen credentials from a phishing attack in an online banking system“. In 2017 5th International Conference on Research and Innovation in Information Systems (ICRIIS). IEEE, 2017. http://dx.doi.org/10.1109/icriis.2017.8002440.