Добірка наукової літератури з теми "Unauthorised banking"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Unauthorised banking".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Unauthorised banking":
Mohan Kumar, U., P. Siva SaiManikanta, and M. D. AntoPraveena. "Intelligent Security System for Banking Using Internet of Things." Journal of Computational and Theoretical Nanoscience 16, no. 8 (August 1, 2019): 3296–99. http://dx.doi.org/10.1166/jctn.2019.8180.
Hanefah, Mustafa Mohd, Muhammad Iqmal Hisham Kamaruddin, Supiah Salleh, Zurina Shafii та Nurazalia Zakaria. "Internal control, risk and Sharīʿah non-compliant income in Islamic financial institutions". ISRA International Journal of Islamic Finance 12, № 3 (19 листопада 2020): 401–17. http://dx.doi.org/10.1108/ijif-02-2019-0025.
Mathur, Sonali, Shankar Lal Gupta, and Payal Pahwa. "Enhancing Security in Banking Environment Using Business Intelligence." International Journal of Information Retrieval Research 10, no. 4 (October 2020): 21–34. http://dx.doi.org/10.4018/ijirr.2020100102.
Jaya Sakti, Mochamad Aji, Noer Azham Achsani, and Ferry Syarifuddin. "Online Banking Implementation: Risk Mapping Using ERM Approach." Buletin Ekonomi Moneter dan Perbankan 20, no. 3 (January 31, 2018): 279–306. http://dx.doi.org/10.21098/bemp.v20i3.824.
Смирнов, Е., and E. Smirnov. "In the Interests of Combating Financial Fraud." Auditor 4, no. 9 (October 10, 2018): 3–10. http://dx.doi.org/10.12737/article_5b616224585aa3.74179318.
Li, Siqi. "On interpretation of loss from unauthorized transactions in China’s e-banking business." Frontiers of Law in China 4, no. 1 (January 22, 2009): 114–26. http://dx.doi.org/10.1007/s11463-009-0007-2.
Shamanina, E. I., and Yu S. Zakharenko. "BIOMETRIC TECHNOLOGIES AS A PERSPECTIVE DIRECTION OF IMPROVING REMOTE BANK SERVICE." Vestnik Universiteta, no. 5 (July 16, 2020): 193–99. http://dx.doi.org/10.26425/1816-4277-2020-5-193-199.
Frolova, Evgenia E. "LEGAL REGULATION OF INTERNET BANKING IN INDIA." RUDN Journal of Law 23, no. 3 (December 15, 2019): 351–74. http://dx.doi.org/10.22363/2313-2337-2019-23-3-351-374.
Legeais, Dominique. "Integrated purchasing and banking data protection in the context of Directive (EU) 2015/2366: new payment service providers." Law, State and Telecommunications Review 11, no. 1 (May 20, 2019): 173–98. http://dx.doi.org/10.26512/lstr.v11i1.24856.
Ryzhkova, Marina, Ekaterina Soboleva, Anastasia Sazonova, and Mikhail Chikov. "Consumers’ Perception of Artificial Intelligence in Banking Sector." SHS Web of Conferences 80 (2020): 01019. http://dx.doi.org/10.1051/shsconf/20208001019.
Дисертації з теми "Unauthorised banking":
Ndlovu, Witness Nomfundo. "The regulation of electronic funds transfers : problematic aspects relating to banks liability." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/77358.
Mini Dissertation (LLM (Banking Law))--University of Pretoria 2020.
GCRA Bursary
Mercantile Law
LLM (Banking Law)
Unrestricted
Kleynhans, Stefan Anton. "The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship." 2000. http://hdl.handle.net/10500/17100.
LL.M. (Banking Law)
Книги з теми "Unauthorised banking":
The Great American Bank Robbery The Unauthorized Report On What Really Caused The Great Recession. Thomas Nelson Publishers, 2011.
Частини книг з теми "Unauthorised banking":
Corzo, C., F. Corzo S., N. Zhang, and A. Carpenter. "Using Automated Banking Certificates to Detect Unauthorised Financial Transactions." In Financial Cryptography and Data Security, 36–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_3.
van Zyl, DH. "Unauthorised Payment and Unjust Enrichment in Banking Law." In Restitution and Banking Law, 1–26. Informa Law from Routledge, 2020. http://dx.doi.org/10.4324/9781003122609-1.
DeFilippi, Dan, and Katina Michael. "Credit Card Fraud." In Online Banking Security Measures and Data Protection, 263–82. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch015.
Sharma, Kunal, and A. J. Singh. "Biometric Security in the E-World." In Applied Cryptography for Cyber Security and Defense, 289–337. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch013.
Pejic Bach, Mirjana, and Martina Draganic. "Some Aspects of Implementing Always-On IT-Solutions and Standards in Banking Sector." In Always-On Enterprise Information Systems for Business Continuance, 149–74. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-723-2.ch009.
Shanmugapriya D. and Padmavathi Ganapathi. "A Framework for Improving the Accuracy of Keystroke Dynamics-Based Biometric Authentication Using Soft Computing Techniques." In Biometric Authentication in Online Learning Environments, 208–35. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7724-9.ch009.
Tong, Carrison K. S., and Eric T. T. Wong. "Information Security Management in Picture Archiving and Communication Systems for the Healthcare Industry." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 682–90. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch092.
Тези доповідей конференцій з теми "Unauthorised banking":
Wang, Junqi, and Duwei Deng. "Unauthorized Transactions and Unintended Transactions in Open Banking:." In 6th Annual International Conference on Social Science and Contemporary Humanity Development (SSCHD 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210121.072.
Hewamadduma, Shammi Ishara. "Detection and prevention of possible unauthorized login attempts through stolen credentials from a phishing attack in an online banking system." In 2017 5th International Conference on Research and Innovation in Information Systems (ICRIIS). IEEE, 2017. http://dx.doi.org/10.1109/icriis.2017.8002440.