Gotowa bibliografia na temat „Unauthorised banking”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Unauthorised banking”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Unauthorised banking":
Mohan Kumar, U., P. Siva SaiManikanta i M. D. AntoPraveena. "Intelligent Security System for Banking Using Internet of Things". Journal of Computational and Theoretical Nanoscience 16, nr 8 (1.08.2019): 3296–99. http://dx.doi.org/10.1166/jctn.2019.8180.
Hanefah, Mustafa Mohd, Muhammad Iqmal Hisham Kamaruddin, Supiah Salleh, Zurina Shafii i Nurazalia Zakaria. "Internal control, risk and Sharīʿah non-compliant income in Islamic financial institutions". ISRA International Journal of Islamic Finance 12, nr 3 (19.11.2020): 401–17. http://dx.doi.org/10.1108/ijif-02-2019-0025.
Mathur, Sonali, Shankar Lal Gupta i Payal Pahwa. "Enhancing Security in Banking Environment Using Business Intelligence". International Journal of Information Retrieval Research 10, nr 4 (październik 2020): 21–34. http://dx.doi.org/10.4018/ijirr.2020100102.
Jaya Sakti, Mochamad Aji, Noer Azham Achsani i Ferry Syarifuddin. "Online Banking Implementation: Risk Mapping Using ERM Approach". Buletin Ekonomi Moneter dan Perbankan 20, nr 3 (31.01.2018): 279–306. http://dx.doi.org/10.21098/bemp.v20i3.824.
Смирнов, Е., i E. Smirnov. "In the Interests of Combating Financial Fraud". Auditor 4, nr 9 (10.10.2018): 3–10. http://dx.doi.org/10.12737/article_5b616224585aa3.74179318.
Li, Siqi. "On interpretation of loss from unauthorized transactions in China’s e-banking business". Frontiers of Law in China 4, nr 1 (22.01.2009): 114–26. http://dx.doi.org/10.1007/s11463-009-0007-2.
Shamanina, E. I., i Yu S. Zakharenko. "BIOMETRIC TECHNOLOGIES AS A PERSPECTIVE DIRECTION OF IMPROVING REMOTE BANK SERVICE". Vestnik Universiteta, nr 5 (16.07.2020): 193–99. http://dx.doi.org/10.26425/1816-4277-2020-5-193-199.
Frolova, Evgenia E. "LEGAL REGULATION OF INTERNET BANKING IN INDIA". RUDN Journal of Law 23, nr 3 (15.12.2019): 351–74. http://dx.doi.org/10.22363/2313-2337-2019-23-3-351-374.
Legeais, Dominique. "Integrated purchasing and banking data protection in the context of Directive (EU) 2015/2366: new payment service providers". Law, State and Telecommunications Review 11, nr 1 (20.05.2019): 173–98. http://dx.doi.org/10.26512/lstr.v11i1.24856.
Ryzhkova, Marina, Ekaterina Soboleva, Anastasia Sazonova i Mikhail Chikov. "Consumers’ Perception of Artificial Intelligence in Banking Sector". SHS Web of Conferences 80 (2020): 01019. http://dx.doi.org/10.1051/shsconf/20208001019.
Rozprawy doktorskie na temat "Unauthorised banking":
Ndlovu, Witness Nomfundo. "The regulation of electronic funds transfers : problematic aspects relating to banks liability". Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/77358.
Mini Dissertation (LLM (Banking Law))--University of Pretoria 2020.
GCRA Bursary
Mercantile Law
LLM (Banking Law)
Unrestricted
Kleynhans, Stefan Anton. "The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship". 2000. http://hdl.handle.net/10500/17100.
LL.M. (Banking Law)
Książki na temat "Unauthorised banking":
The Great American Bank Robbery The Unauthorized Report On What Really Caused The Great Recession. Thomas Nelson Publishers, 2011.
Części książek na temat "Unauthorised banking":
Corzo, C., F. Corzo S., N. Zhang i A. Carpenter. "Using Automated Banking Certificates to Detect Unauthorised Financial Transactions". W Financial Cryptography and Data Security, 36–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_3.
van Zyl, DH. "Unauthorised Payment and Unjust Enrichment in Banking Law". W Restitution and Banking Law, 1–26. Informa Law from Routledge, 2020. http://dx.doi.org/10.4324/9781003122609-1.
DeFilippi, Dan, i Katina Michael. "Credit Card Fraud". W Online Banking Security Measures and Data Protection, 263–82. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch015.
Sharma, Kunal, i A. J. Singh. "Biometric Security in the E-World". W Applied Cryptography for Cyber Security and Defense, 289–337. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch013.
Pejic Bach, Mirjana, i Martina Draganic. "Some Aspects of Implementing Always-On IT-Solutions and Standards in Banking Sector". W Always-On Enterprise Information Systems for Business Continuance, 149–74. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-723-2.ch009.
Shanmugapriya D. i Padmavathi Ganapathi. "A Framework for Improving the Accuracy of Keystroke Dynamics-Based Biometric Authentication Using Soft Computing Techniques". W Biometric Authentication in Online Learning Environments, 208–35. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7724-9.ch009.
Tong, Carrison K. S., i Eric T. T. Wong. "Information Security Management in Picture Archiving and Communication Systems for the Healthcare Industry". W Encyclopedia of Multimedia Technology and Networking, Second Edition, 682–90. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch092.
Streszczenia konferencji na temat "Unauthorised banking":
Wang, Junqi, i Duwei Deng. "Unauthorized Transactions and Unintended Transactions in Open Banking:". W 6th Annual International Conference on Social Science and Contemporary Humanity Development (SSCHD 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210121.072.
Hewamadduma, Shammi Ishara. "Detection and prevention of possible unauthorized login attempts through stolen credentials from a phishing attack in an online banking system". W 2017 5th International Conference on Research and Innovation in Information Systems (ICRIIS). IEEE, 2017. http://dx.doi.org/10.1109/icriis.2017.8002440.