Academic literature on the topic 'Electronic funds transfer'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic funds transfer.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Electronic funds transfer"
Henderson, Ian. "Electronic funds transfer fraud." Computer Fraud & Security 2003, no. 12 (December 2003): 6–9. http://dx.doi.org/10.1016/s1361-3723(03)00006-x.
Full textTanaka, Yoshiaki, Minoru Akiyama, and Takanori Uchida. "Untraceable electronic funds transfer systems." Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 72, no. 9 (1989): 47–55. http://dx.doi.org/10.1002/ecjc.4430720905.
Full textDharma, Anak Agung Bagus Ari Satya, Anak Agung Sagung Laksmi Dewi, and Ni Made Puspasutari Ujianti. "Akibat Hukum Terjadinya Salah Transfer Dana Perbankan." Jurnal Konstruksi Hukum 3, no. 2 (March 29, 2022): 420–25. http://dx.doi.org/10.55637/jkh.3.2.4849.420-425.
Full textCho, George. "Electronic funds transfer: new legal issues?" International Journal of Technology Policy and Law 1, no. 2 (2012): 168. http://dx.doi.org/10.1504/ijtpl.2012.050215.
Full textLee, Chang-Woon. "A study on the Electronic Funds Transfer." Korea Financial Law Association 12, no. 1 (April 30, 2015): 265–322. http://dx.doi.org/10.15692/kjfl.12.1.9.
Full textRupp, William T., and Alan D. Smith. "Electronic Funds Transfer in Faith-Based Organizations." Journal of Ministry Marketing & Management 7, no. 2 (August 2002): 21–33. http://dx.doi.org/10.1300/j093v07n02_02.
Full textBrown, Brandon. "Audit and Control of Electronic Funds Transfer." EDPACS 23, no. 10 (April 1996): 1–6. http://dx.doi.org/10.1080/07366989609451384.
Full textLewis, Jacqueline. "The DOCLINE Electronic Funds Transfer System (EFTS)." Journal of Interlibrary Loan,Document Delivery & Electronic Reserve 17, no. 3 (August 1, 2007): 75–83. http://dx.doi.org/10.1300/j474v17n03_11.
Full textAraújo, Carlos, Paulo Maciel, Armin Zimmermann, Ermeson Andrade, Erica Sousa, Gustavo Callou, and Paulo Cunha. "Performability modeling of electronic funds transfer systems." Computing 91, no. 4 (October 13, 2010): 315–34. http://dx.doi.org/10.1007/s00607-010-0121-0.
Full textMulawardhana, Rengga Aditya, and Go Lisanawati. "Tindak Pidana Terkait Akses Akun Mobile Banking dengan Mengaktifkan Kembali Simcard yang Sudah Tidak Aktif." JURNAL YUSTIKA: MEDIA HUKUM DAN KEADILAN 23, no. 02 (December 18, 2020): 77–89. http://dx.doi.org/10.24123/yustika.v23i02.3057.
Full textDissertations / Theses on the topic "Electronic funds transfer"
Abdulah, Samahir. "Legal risk associated with electronic funds transfer." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/2910.
Full textStovall, Shawn Eric. "Global electronic funds transfer between small and medium sized companies." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/37228.
Full textIncludes bibliographical references (leaf 64).
Cross-border electronic funds transfer is a rapidly expanding field for business and consumer payments. Large multi-national corporations have been able to invest the capital necessary to create infrastructures or work with banking institutions to facilitate payments in the past, but small and medium sized companies were limited in their ability to utilize electronic payment systems. The growth of global business has created a need for effective payment systems for the many small and medium sized companies. The evolution of the industry is dependent on the convergence of business, technology and government regulation in order to succeed. This paper provides an overview of global funds transfer and future trends in the context of both business and consumer payments.
by Shawn Eric Stovall.
M.B.A.
Lyons-Davis, Andrew E. "Electronic funds transfer systems and the household's transactions demand for money /." Title page, contents and introduction only, 1986. http://web4.library.adelaide.edu.au/theses/09EC/09ecl991.pdf.
Full textNdlovu, Witness Nomfundo. "The regulation of electronic funds transfers : problematic aspects relating to banks liability." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/77358.
Full textMini Dissertation (LLM (Banking Law))--University of Pretoria 2020.
GCRA Bursary
Mercantile Law
LLM (Banking Law)
Unrestricted
Hong, Ki Young. "Why are electronic payments preferred? : evidence from international data /." free to MU campus, to others for purchase, 2002. http://wwwlib.umi.com/cr/mo/fullcit?p3060105.
Full textDavis, Albert L. "Implementation of Electronic Funds Transfer (EFT)/Financial Electronic Data Interchange (FEDI) in the Department of Defense : lessons learned from private industry /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA316495.
Full textNimer, Muna. "A critical examination of aspects of liability for fraudulent electronic funds transfer in English, US and EU law with particular reference to the UNCITRAL Model Law." Thesis, University of Leicester, 2007. http://hdl.handle.net/2381/31094.
Full textAndrade, Alexandre Luis de. "GetLB: uma nova arquitetura para balanceamento de carga dinâmicos em sistemas de transações eletrônicas financeiras." Universidade do Vale do Rio dos Sinos, 2013. http://www.repositorio.jesuita.org.br/handle/UNISINOS/3703.
Full textMade available in DSpace on 2015-05-28T14:17:29Z (GMT). No. of bitstreams: 1 Getlb.pdf: 3597932 bytes, checksum: 9c794d7c5c59244cce8b65e3ccd9e1d3 (MD5) Previous issue date: 2013
Nenhuma
Transações eletrônicas financeiras - em inglês EFT (Electronic Funds Transfer) - representam uma realidade em expansão que impulsiona a aproximação entre consumidores e fornecedores. As transações podem ser originadas de diferentes meios de captura da informação e são transmitidas para um centro de processamento, que decodifica, executa e retorna os resultados no menor tempo possível. Em especial, a presente dissertação de mestrado está enquadrada no dia-a-dia da empresa GetNet e no balanceamento de carga sobre um de seus sistemas de processamento. O sistema em estudo dispõe atualmente de uma arquitetura na qual as transações são recebidas em um nó centralizador, representado por um chaveador Cisco, e são distribuídas para Máquinas Processadoras (MP) segundo o algoritmo de escalonamento Round Robin. Esse algoritmo é adequado para as situações onde as MP são homogêneas e o tempo de rede entre elas e o nó centralizador é também uniforme. Essa configuração pode ser restritiva para um sistema transacional que precisa estar dimensionado para atender uma empresa em expansão geográfica que use MP em diferentes localizações. Em adição, a atuação do algoritmo Round Robin permite que transações sejam repassadas para MP que já possuem alta carga de trabalho ou se encontram indisponíveis. Nesse contexto, essa dissertação descreve uma arquitetura para o sistema transacional chamada GetLB, que proporciona um balanceamento de carga a partir do chaveador com base em monitoração das máquinas de processamento. A infraestrutura GetLB propõe um novo escalonador chamado LL (Load Level). Diferente do Round Robin, para cada transação i, LL calcula n funções LL(i; j), onde j é a MP alvo e n a quantidade das mesmas. Para tal, serão verificadas as suas condições para atender à demanda conforme índices de ocupação de CPU, memória, disco e estado das filas das máquinas processadoras, entre outros. A eficiente combinação desses fatores, para o despacho de transações, configura a contribuição científica do trabalho. Assim como a eficiência em notificar o chaveador quando ocorrem eventos assíncronos no sistema, como parada ou perda de capacidade de processamento de alguma máquina. A arquitetura GetLB também visa proporcionar capacidade de operação com heterogeneidade de máquinas processadoras, possibilitando o uso de máquinas especialistas para certos tipos de transações e a integração de MPs de diferentes redes (domínios administrativos). Os resultados dos testes mostraram que GetLB é mais eficiente que Round-Robin em muitos aspectos, sobressaindo mais em situações de heterogeneidade de recursos e dinamicidade de eventos. Verificou-se também que as notificações acrescentam muito valor ao sistema, auxiliando na manutenção e melhoria contínua da solução.
Electronic financial transactions represents an expanding reality that drives the approach between consumers and suppliers. Transactions can be originated from different information’s capture terminals and are transmitted to a processing center, which decodes, executes and returns the results in the shortest time possible. In particular, this dissertation is framed in the day-to-day operations of GetNet, a network and service provider company, and load balancing on one of its processing systems. The system under study currently has an architecture in which transactions are received at a centralized node, represented by a Cisco switch, and are distributed to machines processors (MP) according to Round Robin scheduling algorithm. This algorithm is suitable for situations where the MP are homogeneous and network transfer time between them and the centralized node is also uniform. This setting can be restrictive for a transactional system that needs to be sized to meet an expanding company and uses geographic MP at different locations. In addition, the performance of Round Robin algorithm enables transactions to be passed to MP who already have high workload or are unavailable. In this context, this work describes an architecture for a transactional system called GetLB, which provides load balancing from the switch based on processing machines’s monitoring. The infrastructure GetLB proposes a new scheduler called LL (Load Level). Unlike the Round Robin, for each transaction i, LL calculates n functions LL (i, j) where j is the target MP and n quantity of machines. This will check their conditions to meet demand as occupancy rate of CPU, memory, disk, and state of the queues of processing machines, among others. The efficient mix of these factors to dispatch transactions, sets the scientific work. As well as the efficiency to notify the switch when asynchronous events occur in the system, such as stopping or loss of processing capacity of some machine. The architecture also aims to provide GetLB operation capability with heterogeneous processing machines, enabling the use of machinery specialists for certain types of transactions and the integration of MPs from different networks (administrative domains). The test results showed that GetLB is more efficient than Round-Robin in many aspects and stand out in case of heterogeneous resources and dynamic events. It was also found that the notifications adds much value to system, assisting in the maintenance and continuous solution’s improvement
Marais, Terrence K. "Electronic payment and security on the Internet." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.
Full textENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues are new and many experts are only learning how to deal with these now. This thesis offers suggestions and strategies a user can follow to minimize misuse and abuse of payment details. Electronic payment is the backbone of e-commerce, and the biggest threat towards widespread acceptance and usage of e-commerce is security. Many innovative solutions have been developed by vendors to address security issues. For example, the Secure Electronic Transfer (SET) protocol was developed to ensure that credit card transactions could be conducted safely and securely on the Internet. Secure Socket Layer (SSL) ensures that all communications and transactions are conducted in a tightly secure environment. This is critical for online or mobile banking and other financial activities. Others developments include payment systems that ensure that credit card details are never exposed to a merchant (e.g. SET), while some ensure that credit card numbers never enter the Internet. The five corner stones of security are confidentiality, privacy, authentication, integrity and non-repudiation. Authentication, non-repudiation and integrity can be resolved with digital certificates, digital timestamps and digital signatures. Message confidentiality, on the other hand, is ensured through the use of strong encryption. Encryption systems mutilate data or a message to such an extent that it is totally useless to someone who does not have the appropriate algorithm and key to decode it. The most widely used encryption schemes are the secret key and public key encryption systems. The public key cryptosystem generates two keys, called a public and private key. The public key can be made generally known, but the private key must be kept secret. A unique property of the scheme is that once data is encrypted with one key, only the corresponding other key of the pair can decrypt it. This makes it possible to address issues of authentication, integrity and non-repudiation. Traditional payment instruments such as cash, cheques, debit and credit card transactions are being replaced by their electronic equivalents. The driving forces behind these are transactional security, efficiency and speed. Novel payment solutions and strategies have been devised to meet the challenges of this new economy. For example, smart cards can act as an electronic purse that can hold electronic money. Other information, such as personal details, medical records, driver's licence, etc. can also be stored on the card. Whilst many security experts are in agreement that security is not a barrier anymore for wider usage of the Internet for financial transactions, many consumers are still apprehensive about how secure and safe it really is. This work aims to diminish those fears and show that the Internet is safe for business.
AFRIKAANSE OPSOMMING: Een van die grootste bekommernisse wat 'n kliënt met aankope op die Internet kan ondervind, is die onsekerheid wat presies gebeur nadat betalings aangegaan is en "Submit" is gedruk. Is dit moontlik dat iemand die boodskap kan onderskep en betaling besonderhede vir eie gebruik kan herwin? Daar is ook baie publisiteit oor kodifisering, maar hoe kan die klient verseker wees dat betalings besonderhede wel gekodifiseer is wanneer "Submit" gedruk was? Is daar 'n manier waarmee 'n mens verseker kan wees dat betaling slegs eenkeer gaan geskied? Baie van die sekuriteits lokvalle is nuut en sekuritiets kenners is tans besig om te leer hoe om die probleme te hanteer. Die werkstuk offer wenke en strategieë vir die verbruiker om die misbruik van betaling besondehede op die Internet te minimiseer. Elektronies betalings meganisme is die ruggraat van elektroniese besigheid, en die grootste struikelblok tot die grootskaalse gebruik daarvan is sekuriteit. Daar is baie innoverende oplossings om die probleme hok te slaan. By voorbeeld, die Secure Electronic Transfer (SET) protokol was ontwikkel om te verseker dat betalings met kredietkaart met hoë sekuriteit en veiligheid aangegaan kan word. Secure Socket Layers (SSL), verseker dat alle kommunikasies en transaksies in 'n sekuur en veilige omgewing plaasvind. Dit is veral krities wanneer die verbruiker gebruik maak van die Internet of vanaf selfone om transaksies aan te gaan met 'n bank. Ander ontwikkelinge sluit in betalings metodes wat verseker dat die handelaar nooit die kredietkaart besonderhede sien nie (bv. SET). Ander verseker weer dat die betalings besonderhede nooit oor die Internet hoef gestuur te word nie. Die vyf hoekstene van sekuriteit is konfidensialiteit, privaatheid, outentisiteit, integriteit en non-repudiasie. Outentisiteit, integriteit en non-repudiasie word opgelos deur die gebruik maak van digitale sertifikate, digitale tydstempels en digitale handtekeninge. Konfidensialiteit kan verseker word deur die boodskap te kodifiseer. Kodifikasie behels die verandering van data of boodskappe op so 'n wyse dat dit van geen betekenis is vir 'n persoon wat nie die korrekte algoritme en sleutel het om dit te dekodifiseer nie. Die geheime en publieke kodifiserings stelsels word die meeste gebruik om data te kodifiseer. Die publieke kodifiserings stelsel genereer twee sleutels, naamlik 'n privaat en publieke sleutel. Die publieke sleutel kan alom bekend gemaak word, maar die private sleutel moet slegs bekend wees aan sy gebruiker. 'n Unieke eienskap van die stelsel is dat indien 'n boodskap gekodifiseer is met een sleutel, slegs die ander sleutel van die paar dit sal kan dekodifiseer. Dit maak dit moontlik om outentisiteit, integriteit en non-repudiasie toe te pas. Die tradisionele metodes van betaling soos kontant, tjek en debiet of kredietkaart, gaan mettertyd vervang word deur hul elektroniese eweknie. Die dryfkrag agter die verskynsel is die hoë sekuriteit, doeltreffendheid en spoed waarmee transaksies op die manier gehanteer kan word. Vindingryke betaling metodes is ontdek om die besondere uitdagings van die nuwe ekonomie aan te speek. Byvoorbeeld, knap kaarte kan gebruik word as 'n elektroniese beursie wat elektroniese geld bêre. Ander persoonlike inligting, mediese records, bestuurlisensies, ens. kan ook op die kaart geberg word. Terwyl baie sekuriteits kenners glo dat sekuriteit nie meer 'n stuikelblok is om die Internet vir besigheids transaksies te gebruik nie, bly baie van die verbruikers skepties. Die werkstuk se doel is om daardie onsekerhede uit die weg te ruim, deur te verduidelik hoe sekuriteit toe gepas word, en om te bewys dat die Internet interdaad veilig is as a medium vir besigheids transaksies.
Algudah, Fayyad. "The liability of banks in electronic fund transfer transaction." Thesis, University of Edinburgh, 1993. http://hdl.handle.net/1842/1902.
Full textBooks on the topic "Electronic funds transfer"
Peterson, Lorna. Electronic funds transfer systems: A bibliography. Monticello, Ill., USA: Vance Bibliographies, 1988.
Find full textTien, James M. Electronic fund transfer systems fraud. Boulder, Colo: Paladin Press, 1989.
Find full textOrganisation for Economic Co-operation and Development. Committee on Consumer Policy., ed. Electronic funds transfer: Plastic cards and the consumer. Paris: Organisation for Economic Co-operation and Development, 1989.
Find full textTien, James M. Electronic fund transfer systems fraud: Computer crime. Washington, D.C: U.S. Dept. of Justice, Bureau of Justice Statistics, 1986.
Find full textAmerican Bar Association. UCC Committee. Working Group on Electronic Financial Services., ed. Model funds transfer services agreement and commentary. Chicago, Ill: Business Law Section, American Bar Association, 1994.
Find full textBaker, Donald I. The law of electronic fund transfer systems. 2nd ed. Boston: Warren, Gorham & Lamont, 1988.
Find full textWoehrle, William. The accredited ACH professional handbook: ACH--an overview. Herndon, VA (607 Herndon Pkwy., Suite 200, Herndon 22070): National Automated Clearing House Association, 1993.
Find full textKirkman, P. R. A. Electronic funds transfer systems: The revolution in cashless banking and payment methods. Oxford: Basil Blackwell, 1987.
Find full textBook chapters on the topic "Electronic funds transfer"
Jensen, Kurt. "Electronic Funds Transfer System." In Coloured Petri Nets, 189–201. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-642-60794-3_14.
Full textWeik, Martin H. "electronic funds transfer system." In Computer Science and Communications Dictionary, 501. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_5976.
Full textWillain, Jean, Pierrot Baesens, Joël Sanzot, and Stef van Vlierberghe. "Real time electronic funds transfer and Ada." In Ada: The Choice for '92, 199–209. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/bfb0018497.
Full textAsaadi, Hamid Reza, Ramtin Khosravi, MohammadReza Mousavi, and Neda Noroozi. "Towards Model-Based Testing of Electronic Funds Transfer Systems." In Fundamentals of Software Engineering, 253–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29320-7_17.
Full textSeo, Moonseog, and Kwangjo Kim. "Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme." In Lecture Notes in Computer Science, 269–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10719994_21.
Full textArbeit, Stanley, and Joseph G. Glynn. "Strategic Market Evaluation of Two Retail Electronic Funds Transfer Systems (EFTS)." In Proceedings of the 1986 Academy of Marketing Science (AMS) Annual Conference, 264–68. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11101-8_56.
Full textKarim, Yasser, and Ragib Hasan. "Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer." In Advances in Intelligent Systems and Computing, 193–210. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58703-1_12.
Full textSolomon, Elinor Harris. "Introduction." In Electronic Funds Transfers and Payments: The Public Policy Issues, 1–11. Dordrecht: Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-015-7738-0_1.
Full textSolomon, Elinor Harris. "EFT: A Consumer’s View." In Electronic Funds Transfers and Payments: The Public Policy Issues, 211–37. Dordrecht: Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-015-7738-0_10.
Full textHenderson, Paul B. "Modern Money." In Electronic Funds Transfers and Payments: The Public Policy Issues, 17–37. Dordrecht: Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-015-7738-0_2.
Full textConference papers on the topic "Electronic funds transfer"
Nascimento, Tiago, Cristiano Andre da Costa, and Rodrigo da Rosa Righi. "LoadEFT: Efficient scheduler proposal for electronic funds transfer companies." In 2014 XL Latin American Computing Conference (CLEI). IEEE, 2014. http://dx.doi.org/10.1109/clei.2014.6965134.
Full textda Rosa Righi, Rodrigo, Cristiano André da Costa, Luiz Gonzaga, Kleinner Farias, Alexandre Luis Andrade, and Lucas Graebin. "Redesigning transaction load balancing on electronic funds transfer scenarios." In SAC 2014: Symposium on Applied Computing. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2554850.2555121.
Full textSousa, Erica, Paulo Maciel, Carlos Araujo, Gabriel Alves, and Fabio Chicout. "Performance modeling for evaluation and planning of Electronic Funds Transfer Systems." In 2009 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2009. http://dx.doi.org/10.1109/iscc.2009.5202403.
Full textLiang, Pengcheng, and John Bigham. "A Taxonomy of Electronic Funds Transfer Domain Intrusions and its Feasibility Converting into Ontology." In 2006 Asia-Pacific Conference on Communications. IEEE, 2006. http://dx.doi.org/10.1109/apcc.2006.255948.
Full textAraújo, Carlos, Erica Sousa, Paulo Maciel, Fábio Chicout, and Ermeson Andrade. "Performance Modeling for Evaluation and Planning of Electronic Funds Transfer Systems with Bursty Arrival Traffic." In 2009 First International Conference on Intensive Applications and Services (INTENSIVE). IEEE, 2009. http://dx.doi.org/10.1109/intensive.2009.17.
Full textSharma, Viiay Kumar, Pratistha Mathur, and Devesh Kumar Srivastava. "Secure Electronic Fund Transfer Model based on Two level Authentication." In 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2018. http://dx.doi.org/10.1109/iceca.2018.8474883.
Full textVenkatesh, Gotimukul, Sunkara Venu Gopal, Mrudula Meduri, and C. Sindhu. "Application of session login and one time password in fund transfer system using RSA algorithm." In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. http://dx.doi.org/10.1109/iceca.2017.8212763.
Full textReports on the topic "Electronic funds transfer"
Bridges, W. M., and Bruce J. Kaplan. Implementation of Electronic Funds Transfer for Transportation Vendor Payment. Fort Belvoir, VA: Defense Technical Information Center, February 1992. http://dx.doi.org/10.21236/ada251446.
Full textPayment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.
Full textPayment Systems Report - June of 2020. Banco de la República de Colombia, February 2021. http://dx.doi.org/10.32468/rept-sist-pag.eng.2020.
Full text