Letteratura scientifica selezionata sul tema "Unauthorised banking"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Unauthorised banking".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Unauthorised banking":
Mohan Kumar, U., P. Siva SaiManikanta e M. D. AntoPraveena. "Intelligent Security System for Banking Using Internet of Things". Journal of Computational and Theoretical Nanoscience 16, n. 8 (1 agosto 2019): 3296–99. http://dx.doi.org/10.1166/jctn.2019.8180.
Hanefah, Mustafa Mohd, Muhammad Iqmal Hisham Kamaruddin, Supiah Salleh, Zurina Shafii e Nurazalia Zakaria. "Internal control, risk and Sharīʿah non-compliant income in Islamic financial institutions". ISRA International Journal of Islamic Finance 12, n. 3 (19 novembre 2020): 401–17. http://dx.doi.org/10.1108/ijif-02-2019-0025.
Mathur, Sonali, Shankar Lal Gupta e Payal Pahwa. "Enhancing Security in Banking Environment Using Business Intelligence". International Journal of Information Retrieval Research 10, n. 4 (ottobre 2020): 21–34. http://dx.doi.org/10.4018/ijirr.2020100102.
Jaya Sakti, Mochamad Aji, Noer Azham Achsani e Ferry Syarifuddin. "Online Banking Implementation: Risk Mapping Using ERM Approach". Buletin Ekonomi Moneter dan Perbankan 20, n. 3 (31 gennaio 2018): 279–306. http://dx.doi.org/10.21098/bemp.v20i3.824.
Смирнов, Е., e E. Smirnov. "In the Interests of Combating Financial Fraud". Auditor 4, n. 9 (10 ottobre 2018): 3–10. http://dx.doi.org/10.12737/article_5b616224585aa3.74179318.
Li, Siqi. "On interpretation of loss from unauthorized transactions in China’s e-banking business". Frontiers of Law in China 4, n. 1 (22 gennaio 2009): 114–26. http://dx.doi.org/10.1007/s11463-009-0007-2.
Shamanina, E. I., e Yu S. Zakharenko. "BIOMETRIC TECHNOLOGIES AS A PERSPECTIVE DIRECTION OF IMPROVING REMOTE BANK SERVICE". Vestnik Universiteta, n. 5 (16 luglio 2020): 193–99. http://dx.doi.org/10.26425/1816-4277-2020-5-193-199.
Frolova, Evgenia E. "LEGAL REGULATION OF INTERNET BANKING IN INDIA". RUDN Journal of Law 23, n. 3 (15 dicembre 2019): 351–74. http://dx.doi.org/10.22363/2313-2337-2019-23-3-351-374.
Legeais, Dominique. "Integrated purchasing and banking data protection in the context of Directive (EU) 2015/2366: new payment service providers". Law, State and Telecommunications Review 11, n. 1 (20 maggio 2019): 173–98. http://dx.doi.org/10.26512/lstr.v11i1.24856.
Ryzhkova, Marina, Ekaterina Soboleva, Anastasia Sazonova e Mikhail Chikov. "Consumers’ Perception of Artificial Intelligence in Banking Sector". SHS Web of Conferences 80 (2020): 01019. http://dx.doi.org/10.1051/shsconf/20208001019.
Tesi sul tema "Unauthorised banking":
Ndlovu, Witness Nomfundo. "The regulation of electronic funds transfers : problematic aspects relating to banks liability". Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/77358.
Mini Dissertation (LLM (Banking Law))--University of Pretoria 2020.
GCRA Bursary
Mercantile Law
LLM (Banking Law)
Unrestricted
Kleynhans, Stefan Anton. "The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship". 2000. http://hdl.handle.net/10500/17100.
LL.M. (Banking Law)
Libri sul tema "Unauthorised banking":
The Great American Bank Robbery The Unauthorized Report On What Really Caused The Great Recession. Thomas Nelson Publishers, 2011.
Capitoli di libri sul tema "Unauthorised banking":
Corzo, C., F. Corzo S., N. Zhang e A. Carpenter. "Using Automated Banking Certificates to Detect Unauthorised Financial Transactions". In Financial Cryptography and Data Security, 36–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_3.
van Zyl, DH. "Unauthorised Payment and Unjust Enrichment in Banking Law". In Restitution and Banking Law, 1–26. Informa Law from Routledge, 2020. http://dx.doi.org/10.4324/9781003122609-1.
DeFilippi, Dan, e Katina Michael. "Credit Card Fraud". In Online Banking Security Measures and Data Protection, 263–82. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch015.
Sharma, Kunal, e A. J. Singh. "Biometric Security in the E-World". In Applied Cryptography for Cyber Security and Defense, 289–337. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch013.
Pejic Bach, Mirjana, e Martina Draganic. "Some Aspects of Implementing Always-On IT-Solutions and Standards in Banking Sector". In Always-On Enterprise Information Systems for Business Continuance, 149–74. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-723-2.ch009.
Shanmugapriya D. e Padmavathi Ganapathi. "A Framework for Improving the Accuracy of Keystroke Dynamics-Based Biometric Authentication Using Soft Computing Techniques". In Biometric Authentication in Online Learning Environments, 208–35. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7724-9.ch009.
Tong, Carrison K. S., e Eric T. T. Wong. "Information Security Management in Picture Archiving and Communication Systems for the Healthcare Industry". In Encyclopedia of Multimedia Technology and Networking, Second Edition, 682–90. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch092.
Atti di convegni sul tema "Unauthorised banking":
Wang, Junqi, e Duwei Deng. "Unauthorized Transactions and Unintended Transactions in Open Banking:". In 6th Annual International Conference on Social Science and Contemporary Humanity Development (SSCHD 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210121.072.
Hewamadduma, Shammi Ishara. "Detection and prevention of possible unauthorized login attempts through stolen credentials from a phishing attack in an online banking system". In 2017 5th International Conference on Research and Innovation in Information Systems (ICRIIS). IEEE, 2017. http://dx.doi.org/10.1109/icriis.2017.8002440.