Academic literature on the topic 'Banking security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Banking security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Banking security"

1

R. Melba Kani, R. Melba Kani, and Dr A. Merlin Thanga Joy. "Security Issues in Online Banking Services." Indian Journal of Applied Research 4, no. 3 (October 1, 2011): 100–101. http://dx.doi.org/10.15373/2249555x/mar2014/182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Das, Soumyajit, and Dr Pranam Dhar. "Technological Security Aspects for Internet Banking." Paripex - Indian Journal Of Research 3, no. 6 (January 15, 2012): 110–15. http://dx.doi.org/10.15373/22501991/june2014/35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

G Y, Cordelıa Jemıma, and Kavıtha V. "Mobile Banking - Security Risks And Security Preventions." International Journal of Computer Trends and Technology 68, no. 11 (November 25, 2020): 49–52. http://dx.doi.org/10.14445/22312803/ijctt-v68i11p106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stashchuk, Olena, and Rostyslav Martyniuk. "Banking innovations: security technology solution." VUZF Review 6, no. 1 (March 25, 2021): 79–86. http://dx.doi.org/10.38188/2534-9228.21.6.08.

Full text
Abstract:
The article identifies the essence of the concept of banking innovations and their role in the financial security of banking institutions. Features of development of technological banking innovations in Ukraine, including in the conditions of influence of COVID-19 are considered. The characteristics of banking innovations are considered, the criteria to be met by banking innovations both on the part of the client and on the part of the bank are identified. The classification of banking innovations according to such features as: by time aspect, by novelty, by causes of occurrence, by volume of influence, by influence on behavior, by scale of innovation, etc. is given. It is proved that the financial security of a banking institution should provide protection of banks from the impact of external and internal threats, as well as minimize the level of their negative impact. The basic principles of financial security of banking innovations in order to ensure the stable development of the latter are described. It is established that the most relevant and in demand in the market in the development of coronavirus infection were such technological innovations of remote capabilities as: contactless payments, online services, mobile banking applications, electronic money transfers, virtual cards. The peculiarities of the use of technological innovations by banking institutions in Ukraine and their impact on the security of banking institutions and customers are noted. In order to conduct the study, such general scientific and specific research methods were used as: the logical method, the method of analysis and synthesis, the system method, the method of theoretical generalization, the grouping method, the expert method and the method of logical analysis.
APA, Harvard, Vancouver, ISO, and other styles
5

SHELMENKOV, VALENTIN N. SHELMENKOV. "Information security in remote banking." Proceedings of the Institute of State and Law of the RAS 15, no. 3 (July 31, 2020): 188–204. http://dx.doi.org/10.35427/2073-4522-2020-15-3-shelmenkov.

Full text
Abstract:
Improving the technology for providing banking services via the Internet opens up a promising market for remote banking systems, which, in turn, leads to an increase in the number of frauds in this area, in this paper considered the main threats to information security in the banking system, protection and combating fraud in the provision of remote banking services, which are lacking for the appropriate protection of bank funds, as well as to identify ways to solve existing problems in the legislation to achieve security in a financial institution.
APA, Harvard, Vancouver, ISO, and other styles
6

Habibur Rahman, Md, Md Al-Amin, and Nusrat Sharmin Lipy. "An Investigation on The Intention to Adopt Mobile Banking on Security Perspective in Bangladesh." Risk and Financial Management 2, no. 2 (December 15, 2020): p47. http://dx.doi.org/10.30560/rfm.v2n2p47.

Full text
Abstract:
This research examines the information security of adopting mobile banking and suggests maximizing information security in mobile banking in different ways. Security issues pose a threat to mobile banking adoption and diffusion. Therefore, reliable security measures and improved trust improvement are suggested to address information security in adopting mobile banking for financial services. A questionnaire survey is conducted with users of mobile banking technology. Random sampling is adopted in the study. 650 questionnaires were sent to respondents, and 303 responses were recorded. A confirmatory factor analysis with varimax rotation was conducted following correlation and multiple regression analysis to test the hypothesis of the study. The research finds that (1) perceived security and trust affect mobile banking self-efficacy and performance (SEP) of adopting mobile banking for financial services; (2) Reliable security measure and perceive trust improvement positively influence (SEP) of adopting mobile banking for financial services. This study shows the significance of user perceptions of security by inspecting the content of the security rules of mobile banking for clients’ levels. It includes the adoption of technology in financial services. Therefore, the study links the technology acceptance model (TAM) with the literature on perceived security and trust of adopting mobile banking for financial services. The research has applied to the banking industry to develop and expand its banking market by developing reliable security measures and improving the perceived trust of customers to conduct banking transactions using mobile banking technology.
APA, Harvard, Vancouver, ISO, and other styles
7

Hinde, Steven. "Banking on security and control?" Computer Fraud & Security 2004, no. 8 (August 2004): 4–6. http://dx.doi.org/10.1016/s1361-3723(04)00098-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yaacob, Mashkuri, Farhat Anwar, Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, and Roohie Naaz Mir. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.10026783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Khan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir, and Mashkuri Yaacob. "Scrutinising internet banking security solutions." International Journal of Information and Computer Security 12, no. 2/3 (2020): 269. http://dx.doi.org/10.1504/ijics.2020.105180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hole, K. J., V. Moen, and T. Tjostheim. "Case study: online banking security." IEEE Security & Privacy Magazine 4, no. 2 (March 2006): 14–20. http://dx.doi.org/10.1109/msp.2006.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Banking security"

1

Messaggi, Kaya Monica. "Trust and security risks in mobile banking." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:bccf1f59-70cc-4b67-bf87-bfc7af22880f.

Full text
Abstract:
With the development and growth of mobile technologies, mobile phones enable users to perform a number of different tasks with their devices: from sending simple text messages, checking e-mails and browsing the internet, to running elaborated applications. Nowadays, the mobile phone platform creates great opportunities for businesses, especially due to its capabilities and population coverage: the number of mobile subscriptions approaches global population figures. In order to explore such opportunities, most banks have already launched their mobile applications and/or re-designed mobile version of their websites. One of the benefits of using mobile banking is the possibility for users to carry out bank transactions, such online payments or transfers, at anytime and anywhere. Expectations for the adoption of mobile banking were high; however, it represents about 20% of mobile phone users at the present. One factor has been recognised as being a strong reason for users not to adopt mobile banking: their concerns about security. This dissertation focuses on the relationship between the trust users have in mobile banking and the security risks that the use of mobile devices potentially pose. A questionnaire was created in order to gather users’ perception of security about mobile banking, and its results compared with recognised security issues.
APA, Harvard, Vancouver, ISO, and other styles
2

Kwaa-Aidoo, Ephrem Kwaku. "Culturally aligned security in banking : a system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.

Full text
Abstract:
This thesis is an investigation into the unique rural banking system in Ghana and the role of information systems in fraud control. It presents a robust information security and internal control model to deal with fraud for the banking system. The rural banking industry has been noted for poor internal control leading to fraud. This has resulted in poor performance and even the collapse of some banks. The Focus of the study was on the processes used to deliver banking services. To design a protection system, a number of rural banks were visited. This was to understand the environment, regulatory regimes and the structure and banking processes of the industry and banks. Systemic vulnerabilities within the industry which could be exploited for fraud were found. The lack of structures like an address system and unreliable identification documents makes it difficult to use conventional identification processes. Also the lack of adequate controls, small staff numbers and the cross organisational nature of some transactions among other cultural issues reduces the ability to implement transaction controls. Twenty fraud scenarios were derived to illustrate the manifestation of these vulnerabilities. The rural banking integrity model was developed to deal with these observations. This protection model was developed using existing information security models and banking control mechanisms but incorporating the nature of the rural banking industry and culture of its environment. The fraud protection model was tested against the fraud scenarios and was shown to meet the needs of the rural banking industry in dealing with its systemic vulnerabilities. The proposed community-based identification scheme deals with identification weaknesses as an alternative to conventional identity verification mechanisms. The Transaction Authentication Code uses traditional adinkra symbols. Whilst other mechanisms like the Transaction Verification Code design v internal controls into the banking processes. This deals with various process control weaknesses and avoids human discretion in complying with controls. Object based separation of duties is also introduced as a means of controlling conflicting tasks which could lead to fraud.
APA, Harvard, Vancouver, ISO, and other styles
3

Kwaa-Aidoo, Ephrem K. "Culturally aligned security in banking. A system for rural banking in Ghana." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.

Full text
Abstract:
This thesis is an investigation into the unique rural banking system in Ghana and the role of information systems in fraud control. It presents a robust information security and internal control model to deal with fraud for the banking system. The rural banking industry has been noted for poor internal control leading to fraud. This has resulted in poor performance and even the collapse of some banks. The Focus of the study was on the processes used to deliver banking services. To design a protection system, a number of rural banks were visited. This was to understand the environment, regulatory regimes and the structure and banking processes of the industry and banks. Systemic vulnerabilities within the industry which could be exploited for fraud were found. The lack of structures like an address system and unreliable identification documents makes it difficult to use conventional identification processes. Also the lack of adequate controls, small staff numbers and the cross organisational nature of some transactions among other cultural issues reduces the ability to implement transaction controls. Twenty fraud scenarios were derived to illustrate the manifestation of these vulnerabilities. The rural banking integrity model was developed to deal with these observations. This protection model was developed using existing information security models and banking control mechanisms but incorporating the nature of the rural banking industry and culture of its environment. The fraud protection model was tested against the fraud scenarios and was shown to meet the needs of the rural banking industry in dealing with its systemic vulnerabilities. The proposed community-based identification scheme deals with identification weaknesses as an alternative to conventional identity verification mechanisms. The Transaction Authentication Code uses traditional adinkra symbols. Whilst other mechanisms like the Transaction Verification Code design v internal controls into the banking processes. This deals with various process control weaknesses and avoids human discretion in complying with controls. Object based separation of duties is also introduced as a means of controlling conflicting tasks which could lead to fraud.
APA, Harvard, Vancouver, ISO, and other styles
4

Ngwenya, Bongani, and Khanyisa Malufu. "Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line Banking." IJCSN, 2012. http://hdl.handle.net/10150/271474.

Full text
Abstract:
Information systems concentrate data in computer files that have the potential to be accessed by large numbers of people in and outside of organisations. While security breaches and damages of information systems still come from organisational insiders, security breaches are increasing, especially in developing countries because organisations are now open to outsiders through the internet. As a result, automated data are more susceptible to error, destruction, fraud and misuse. The banking sector in Zimbabwe has introduced, of late, on-line banking facilities and these are heavily dependent on the use of internet.
The increase in computer crime has led to scepticism about the move made by the banks to introduce on-line banking. Some view this as a noble move which has made the banking system more efficient, reliable and secure, while others view it as a risky and insecure way of banking. The aim of this study was to assess whether on-line banking in the developing countries is secure or not. The researcher chose a descriptive-quantitative research design. Data was collected using a self constructed questionnaire. Convenience sampling and stratified random sampling techniques were used to select the main subjects of the study. Generally on average there was no significant difference between the perceptions of management bank personnel and non-management bank personnel on the security of on-line banking. The study recommends further future studies on the security of on-line banking in developing countries based on the perceptions of the customers themselves, who are using on-line banking services, the Common Criteria for Information Technology Security and also a study of the latent dimensions of on-line banking security as extracted by factor analysis, how they differ from elements of information security as derived from the theoretical framework and literature.
APA, Harvard, Vancouver, ISO, and other styles
5

Sofola, Olatokunbo. "The Nigerian law of consumer credit and security." Thesis, King's College London (University of London), 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gurlen, Stephanie. "Security Design Flaws that Affect Usability in Online Banking." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/169.

Full text
Abstract:
As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study analyzed 6 design flaws of this nature: (a) a break in the chain of trust, (b) providing a secure login method on an unsecure page, (c) providing bank contact information or security advice on an unsecure page, (d) having policies that are insufficient for userids and passwords, (e) generating e-mails containing sensitive information that are sent in an unsecure manner, and (f) the multi-factor authentication solution consisting of the presentation of an image in combination with the userid and password. Each of these flaws can lead to security and usability issues. Analysis of 80 banking sites was performed to determine the frequency of the flaws. The sampling of banking institutions was determined from banking institution lists available from the Federal Deposit Insurance Corporation (FDIC). Banking institutions were selected from 5 bank charter classes. The banking sites were downloaded for static analysis. The analysis was performed through a combination of automated programs and manual review. The results found instances of all 6 design flaws. The most prevalent issue found was insufficient policies for userids and passwords. The second most prevalent design flaw was the break in the chain of trust. The design flaw with the smallest number of occurrences was emailing sensitive information in an unsecure manner. The banking charter class of the banking institution did not appear to have a relationship to the frequency of the flaws. However, it appears that banking institutions with a smaller asset size have a higher frequency of the flaws than those with a larger asset size. It is recommended that banking institutions address these design flaws to improve usability for their customers while improving security.
APA, Harvard, Vancouver, ISO, and other styles
7

Oliveira, Johnatan Santos de. "Cross-domain deep face matching for banking security systems." reponame:Repositório Institucional da UnB, 2018. http://repositorio.unb.br/handle/10482/33033.

Full text
Abstract:
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2018.
Submitted by Fabiana Santos (fabianacamargo@bce.unb.br) on 2018-11-07T19:44:44Z No. of bitstreams: 1 2018_JohnatanSantosdeOliveira.pdf: 5538984 bytes, checksum: 20580b9ff8534339b6b7390d5c55d9fb (MD5)
Approved for entry into archive by Fabiana Santos (fabianacamargo@bce.unb.br) on 2018-11-12T17:49:55Z (GMT) No. of bitstreams: 1 2018_JohnatanSantosdeOliveira.pdf: 5538984 bytes, checksum: 20580b9ff8534339b6b7390d5c55d9fb (MD5)
Made available in DSpace on 2018-11-12T17:49:55Z (GMT). No. of bitstreams: 1 2018_JohnatanSantosdeOliveira.pdf: 5538984 bytes, checksum: 20580b9ff8534339b6b7390d5c55d9fb (MD5) Previous issue date: 2018-11-12
Um dos principais desafios enfrentados pelo sistema bancário é garantir a segurança das transações financeiras. Devido à conveniência e aceitação, o uso de caracterı́sticas faciais para autenticação biométrica de usuários em sistemas bancários está se tornando uma tendência mundial. Essa abordagem de autenticação de usuários está atraindo grandes investimentos de instituições bancárias e financeiras, especialmente em cenários de diferentes domı́nios, nos quais imagens faciais tiradas de documentos de identificação são comparadas com autorretratos digitais (selfies) tiradas com câmeras de dispositivos móveis. Neste estudo, coletamos das bases de dados do maior banco público brasileiro um grande dataset, chamado FaceBank, com 27.002 imagens de selfies e fotos de documentos de identificação de 13.501 sujeitos. Em seguida, avaliamos os desempenhos de dois modelos de Redes Neurais Convolucionais bem referenciados (VGG-Face e OpenFace) para extração de caracterı́sticas profundas, bem como os desempenhos de quatro classificadores (SVM Linear, SVM Power Mean, Random Forest e Random Forest com o Ensemble Vote) para autenticação robusta de face em diferentes domı́nios. Com base nos resultados obtidos (precisões superiores a 90%, em geral), é possı́vel concluir que a abordagem de matching de faces profundas avaliada neste estudo é adequada para autenticação de usuários em aplicações bancárias entre domı́nios. Até onde sabemos, este é o primeiro trabalho que usa um grande conjunto de dados composto por imagens bancárias reais para avaliar a abordagem de autenticação de face entre domı́nios. Além disso, este trabalho apresenta um estudo sobre as reais necessidades na implementação futura de um sistema biométrico, propondo um sistema de nuvem para permitir a adoção de tecnologias biométricas. Por fim, propõe também um modelo seguro e integrado de subsistema ABIS de transmissão de dados. Toda a análise e implementação leva em conta a total aderência e compatibilidade com padrões e especificações propostos pelo governo brasileiro.
Ensuring the security of transactions is currently one of the major challenges facing banking systems. The use of facial features for biometric authentication of users in banking systems is becoming a worldwide trend, due to the convenience and acceptability of this form of identification, and also because computers and mobile devices already have built-in cameras. This user authentication approach is attracting large investments from banking and financial institutions especially in cross-domain scenarios, in which facial images taken from ID documents are compared with digital self-portraits (selfies) taken with mobile device cameras. In this study, from the databases of the largest public Brazilian bank we collected a large dataset, called FaceBank, with 27,002 images of selfies and ID document photos from 13,501 subjects. Then, we assessed the performances of two well-referenced Convolutional Neural Networks models (VGG-Face and OpenFace) for deep face features extraction, as well as the performances of four effective classifiers (Linear SVM, Power Mean SVM, Random Forest and Random Forest with Ensemble Vote) for robust cross-domain face authentication. Based on the results obtained (authentication accuracies higher than 90%, in general), it is possible to conclude that the deep face matching approach assessed in this study is suitable for user authentication in cross-domain banking applications. To the best of our knowledge, this is the first study that uses a large dataset composed of real banking images to assess the cross-domain face authentication approach to be used in banking systems. As an additional, this work presents a study on the real needs in the future implementation of a biometric system proposing a cloud system to enable the adoption of biometrics technologies, creating a new model of service delivery. Besides that, proposes a secure and integrated ABIS Data Transmission subsystem model. All the analysis and implementation takes into account the total adherence and compatibility with the standards and specifications proposed by the Brazilian government, at the same time, establish mechanisms and controls to ensure the effective protection of data.
APA, Harvard, Vancouver, ISO, and other styles
8

Aburrous, Maher R., M. Alamgir Hossain, F. Thabatah, and Keshav P. Dahal. "Intelligent quality performance assessment for e-banking security using fuzzy logic." IEEE Computer Society Press, 2008. http://hdl.handle.net/10454/2493.

Full text
Abstract:
Security has been widely recognized as one of the main obstacles to the adoption of Internet banking and it is considered an important aspect in the debate over challenges facing internet banking. The performance evaluation of e-banking websites requires a model that enables us to analyze the various imperative factors and criteria related to the quality and performance of e-banking websites. Ebanking site evaluation is a complex and dynamic problem involving many factors, and because of the subjective considerations and the ambiguities involved in the assessment, Fuzzy Logic (FL) model can be an effective tool in assessing and evaluating of e-banking security performance and quality. In this paper, we propose an intelligent performance assessment model for evaluating e-banking security websites. The proposed model is based on FL operators and produces four measures of security risk attack dimensions: direct internal attack, communication tampering attack, code programming attack and denial of service attack with a hierarchical ring layer structure. Our experimental results show that direct internal attack risk has a large impact on e-banking security performance. The results also confirm that the risk of direct internal attack for e-banking dynamic websites is doubled that of all other attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Bham, Fayaaz Moosa. "Improving e-commerce security perception in banking / Fayaaz Moosa Bham." Thesis, North-West University, 2007. http://hdl.handle.net/10394/702.

Full text
Abstract:
E-crime has impacted consumer behavioural habits within the banking industry. This affects both the customer and business value, where customers have considered alternatives and the business not realising the return of investment due to diminishing usage. Combating the illegal activities of perpetrators of crime is seen as a cost to business without any reward. However, proactively acting against e-crime does alter the perception of the channel, returning the trust to customers. However, going beyond the scope and addressing other factors that influence perception provides a competitive edge. There are at least six factors that influence perception, namely that minds are limited, minds hate confusion, minds constantly evaluate risks (monetary and functional), minds don't adopt to change easily (they prefer a comfort zone), minds are affected by past experience or communication, and minds lose, focus. These are not restricted to the science of consumer behaviour, but need to be considered in both technical decisions and change management. By influencing the perception of consumers, technology changes and ecommerce threats, which continuously evolve, do not have the same impact. Consumers become aware of their existence and are empowered to deal with the issue at hand. Probable the greatest influence on perception is knowledge and education. Having a strategy that educates consumers about the operating environment is investing in an organisation's customers lifetime value.
Thesis (M.B.A.)--North-West University, Potchefstroom Campus, 2008.
APA, Harvard, Vancouver, ISO, and other styles
10

Birkeland, S. N. "E-Banking security and organisational changes : an action research study." Thesis, University of Liverpool, 2015. http://livrepository.liverpool.ac.uk/3001088/.

Full text
Abstract:
The thesis considers customer security in a major European bank Bank X. The action research focus is to strengthen the processes and the overall solution for online Bank customers which experience a significant growth and increase in use. There seem to be a common misperception between the internal staff of the bank and its customers regarding what security is, and the research considers several new security situations in the banking business. Moving from branch-oriented business to a digital orientation within the time space of just a few years has challenged banks to create new solutions for their customers. Such solutions must be secure, but technical security need separation from human security since new approaches as for example social engineering easily can be a source for fraud and losses for customers in a modern digital bank. This thesis uses action research by interviewing leaders and team members in one security team. The internal researcher role also introduce proposals and suggestions to the team during the research, which locate the action. A connection between stakeholders’ security definitions, re-organisations and the end solutions is important to understand, to improve the situation. Findings reveal that internal communications have an external customer’s communications effect and that re-organisational tasks should focus to adjust the external factors, not only internal benefits. Re-organisational planning does not increase customer security instantly, but some participants can see long-term benefits. The problem is, however, that the long-term world-view changes continuously, and without adjustments organisations depending on cyber security fall behind in the new, but ongoing battle between usability vs security and cost. A modern digital bank should no longer act as a traditional bank, but more as an IT company. This claim opens the way for new ideas and solutions, but blending the banking business and the computer industry can be challenging due to the professional distance between the groups. Future re-organisations should therefore aim for cross-divisional collaboration, increasing communication internally and opening routes for a dualistic contact with customers whereby information and awareness campaigns can be just as effective as technical and physical firewalls. The computer and banking industries are now working towards a remote market with a distance to the online-customers, and while the computer industry has experience to perform business with less customer contact, the banks have now also moved from close contact to digital contact. For this reason, modern banks must think differently and understand what the business is and how to secure it, but never forget the major resource and security problem – the human being.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Banking security"

1

Banking and security law in Ireland. Dublin: Butterworth (Ireland), 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

(Firm), Resurgent India, ed. E-banking: Revolution in Indian banking industry : risk, security, privacy. New Delhi: Associated Chambers of Commerce and Industry of India, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Essinger, James. Computer security in banking: Preventing computer fraud. London: Euromoney Books, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weil, Ann. Bank security. Northborough, Mass: Sundance, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bank security documents. London: Butterworths, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bank security documents. 3rd ed. London: Butterworths, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Calcutta, Law Research Institute, ed. Indian banking: Crime and security in Indian banks. New Delhi: Ashish Pub. House, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Biju, M. R. Strategic management, social security, and banking sector reforms. Delhi: Authorspress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Electronic banking: Experiences reported by banks in implementing on-line banking : report to the Chairman, Committee on Banking and Financial Services, House of Representatives. Washington, D.C: The Office, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cross, Richard F. Bank security desk reference. Boston: Warren, Gorham & Lamont, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Banking security"

1

Nicoletti, Bernardo. "Mobile Security." In Mobile Banking, 112–25. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137386564_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Whiting, D. P. "Security for an Advance." In Mastering Banking, 210–16. London: Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-17757-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Caelli, W. "Financial and Banking Networks." In Information Security for Managers, 225–57. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-10137-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chorafas, Dimitris N., and Heinrich Steinmann. "Taxation, Compliance and Security." In Expert Systems in Banking, 261–83. London: Palgrave Macmillan UK, 1991. http://dx.doi.org/10.1007/978-1-349-11368-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weerasinghe, Dasun, Veselin Rakocevic, and Muttukrishnan Rajarajan. "Security Framework for Mobile Banking." In Atlantis Ambient and Pervasive Intelligence, 207–25. Paris: Atlantis Press, 2012. http://dx.doi.org/10.2991/978-94-91216-71-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Szczepanik, Michał, and Ireneusz Jóźwiak. "Security of Mobile Banking Applications." In Advances in Intelligent Systems and Computing, 412–19. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64474-5_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Williams, Godfried. "Overview of technologies that support International banking." In Synchronizing E-Security, 1–19. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0493-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tsiakis, Theodosios, Aristeidis Chatzipoulidis, Theodoros Kargidis, and Athanasios Belidis. "Information Technology Security Governance Approach Comparison in E-banking." In Security Technology, 75–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27189-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bala, Manu, Seema Baghla, and Gaurav Gupta. "Data Mining and E-banking Security." In Green Information and Communication Systems for a Sustainable Future, 73–92. First edition. | Boca Raton : CRC Press, 2021. |: CRC Press, 2020. http://dx.doi.org/10.1201/9781003032458-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Paul Tak Shing. "Banking Security: A Hong Kong Perspective." In Cybercrime Risks and Responses, 182–93. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137474162_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Banking security"

1

"INFORMATION SECURITY PROBLEMS IN BANKING." In Current Issue of Law in the Banking Sphere. Samara State Economic University, 2019. http://dx.doi.org/10.46554/banking.forum-10.2019-21/26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hanaek, Petr, Kamil Malinka, and Jiri Schafer. "E-banking security - comparative study." In 2008 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, 2008. http://dx.doi.org/10.1109/ccst.2008.4751323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nosrati, Leili, and Amir Massoud Bidgoli. "Security assessment of mobile- banking." In 2015 International Conference and Workshop on Computing and Communication (IEMCON). IEEE, 2015. http://dx.doi.org/10.1109/iemcon.2015.7344489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weerasinghe, Dasun, Veselin Rakocevic, and Muttukrishnan Rajarajan. "Security framework for mobile banking." In the 8th International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1971519.1971591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shirali-Shahreza, Mohammad. "Improving Mobile Banking Security Using Steganography." In Fourth International Conference on Information Technology (ITNG'07). IEEE, 2007. http://dx.doi.org/10.1109/itng.2007.108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dandash, Osama, Phu Dung Le, and Bala Srinivasan. "Security Analysis for Internet Banking Models." In Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007). IEEE, 2007. http://dx.doi.org/10.1109/snpd.2007.532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nosrati, Leili, and Amir Massoud Bidgoli. "A review of mobile banking security." In 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2016. http://dx.doi.org/10.1109/ccece.2016.7726820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Botacin, Marcus, Anatoli Kalysch, and André Grégio. "The Internet Banking [in]Security Spiral." In ARES '19: 14th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3339252.3340103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Shujun, S. Amier Haider Shah, M. Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi, and Roland Schmitz. "Breaking e-banking CAPTCHAs." In the 26th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1920261.1920288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Neary, S. "Secure electronic banking." In IEE Seminar on Protecting Your Intellectual Property: Security, Encryption and Anti-copy Technologies. IEE, 1999. http://dx.doi.org/10.1049/ic:19990467.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Banking security"

1

Financial Stability Report - First Semester of 2020. Banco de la República de Colombia, March 2021. http://dx.doi.org/10.32468/rept-estab-fin.1sem.eng-2020.

Full text
Abstract:
In the face of the multiple shocks currently experienced by the domestic economy (resulting from the drop in oil prices and the appearance of a global pandemic), the Colombian financial system is in a position of sound solvency and adequate liquidity. At the same time, credit quality has been recovering and the exposure of credit institutions to firms with currency mismatches has declined relative to previous episodes of sudden drops in oil prices. These trends are reflected in the recent fading of red and blue tonalities in the performance and credit risk segments of the risk heatmaps in Graphs A and B.1 Naturally, the sudden, unanticipated change in macroeconomic conditions has caused the appearance of vulnerabilities for short-term financial stability. These vulnerabilities require close and continuous monitoring on the part of economic authorities. The main vulnerability is the response of credit and credit risk to a potential, temporarily extreme macroeconomic situation in the context of: (i) recently increased exposure of some banks to household sector, and (ii) reductions in net interest income that have led to a decline in the profitability of the banking business in the recent past. Furthermore, as a consequence of greater uncertainty and risk aversion, occasional problems may arise in the distribution of liquidity between agents and financial markets. With regards to local markets, spikes have been registered in the volatility of public and private fixed income securities in recent weeks that are consistent with the behavior of the international markets and have had a significant impact on the liquidity of those instruments (red portions in the most recent past of some market risk items on the map in Graph A). In order to adopt a forward-looking approach to those vulnerabilities, this Report presents a stress test that evaluates the resilience of credit institutions in the event of a hypothetical scenario thatseeks to simulate an extreme version of current macroeconomic conditions. The scenario assumes a hypothetical negative growth that is temporarily strong but recovers going into the middle of the coming year and has extreme effects on credit quality. The results suggest that credit institutions have the ability to withstand a significant deterioration in economic conditions in the short term. Even though there could be a strong impact on credit, liquidity, and profitability under the scenario being considered, aggregate capital ratios would probably remain at above their regulatory limits over the horizon of a year. In this context, the recent measures taken by both Banco de la República and the Office of the Financial Superintendent of Colombia that are intended to help preserve the financial stability of the Colombian economy become highly relevant. In compliance with its constitutional objectives and in coordination with the financial system’s security network, Banco de la República will continue to closely monitor the outlook for financial stability at this juncture and will make the decisions that are necessary to ensure the proper functioning of the economy, facilitate the flow of sufficient credit and liquidity resources, and further the smooth functioning of the payment system. Juan José Echavarría Governor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography