Статті в журналах з теми "Unauthorised banking"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-35 статей у журналах для дослідження на тему "Unauthorised banking".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Mohan Kumar, U., P. Siva SaiManikanta, and M. D. AntoPraveena. "Intelligent Security System for Banking Using Internet of Things." Journal of Computational and Theoretical Nanoscience 16, no. 8 (August 1, 2019): 3296–99. http://dx.doi.org/10.1166/jctn.2019.8180.
Hanefah, Mustafa Mohd, Muhammad Iqmal Hisham Kamaruddin, Supiah Salleh, Zurina Shafii та Nurazalia Zakaria. "Internal control, risk and Sharīʿah non-compliant income in Islamic financial institutions". ISRA International Journal of Islamic Finance 12, № 3 (19 листопада 2020): 401–17. http://dx.doi.org/10.1108/ijif-02-2019-0025.
Mathur, Sonali, Shankar Lal Gupta, and Payal Pahwa. "Enhancing Security in Banking Environment Using Business Intelligence." International Journal of Information Retrieval Research 10, no. 4 (October 2020): 21–34. http://dx.doi.org/10.4018/ijirr.2020100102.
Jaya Sakti, Mochamad Aji, Noer Azham Achsani, and Ferry Syarifuddin. "Online Banking Implementation: Risk Mapping Using ERM Approach." Buletin Ekonomi Moneter dan Perbankan 20, no. 3 (January 31, 2018): 279–306. http://dx.doi.org/10.21098/bemp.v20i3.824.
Смирнов, Е., and E. Smirnov. "In the Interests of Combating Financial Fraud." Auditor 4, no. 9 (October 10, 2018): 3–10. http://dx.doi.org/10.12737/article_5b616224585aa3.74179318.
Li, Siqi. "On interpretation of loss from unauthorized transactions in China’s e-banking business." Frontiers of Law in China 4, no. 1 (January 22, 2009): 114–26. http://dx.doi.org/10.1007/s11463-009-0007-2.
Shamanina, E. I., and Yu S. Zakharenko. "BIOMETRIC TECHNOLOGIES AS A PERSPECTIVE DIRECTION OF IMPROVING REMOTE BANK SERVICE." Vestnik Universiteta, no. 5 (July 16, 2020): 193–99. http://dx.doi.org/10.26425/1816-4277-2020-5-193-199.
Frolova, Evgenia E. "LEGAL REGULATION OF INTERNET BANKING IN INDIA." RUDN Journal of Law 23, no. 3 (December 15, 2019): 351–74. http://dx.doi.org/10.22363/2313-2337-2019-23-3-351-374.
Legeais, Dominique. "Integrated purchasing and banking data protection in the context of Directive (EU) 2015/2366: new payment service providers." Law, State and Telecommunications Review 11, no. 1 (May 20, 2019): 173–98. http://dx.doi.org/10.26512/lstr.v11i1.24856.
Ryzhkova, Marina, Ekaterina Soboleva, Anastasia Sazonova, and Mikhail Chikov. "Consumers’ Perception of Artificial Intelligence in Banking Sector." SHS Web of Conferences 80 (2020): 01019. http://dx.doi.org/10.1051/shsconf/20208001019.
Abu-Musa, Ahmad A. "Perceived Security Threats of Computerized Accounting Information Systems in the Egyptian Banking Industry." Journal of Information Systems 20, no. 1 (March 1, 2006): 187–203. http://dx.doi.org/10.2308/jis.2006.20.1.187.
Garifullin, I. I. "Risks of Islamic Banking Implementation (Through the Example of the Russian Federation)." Economics and Management 26, no. 8 (September 27, 2020): 912–18. http://dx.doi.org/10.35854/1998-1627-2020-8-912-918.
Ireri, Naomi Wanja, and Gladys Kimutai. "Financial Innovations and Performance of Commercial Banks in Kenya." International Journal of Current Aspects in Finance, Banking and Accounting 2, no. 2 (September 14, 2020): 21–33. http://dx.doi.org/10.35942/ijcfa.v2i2.128.
Kazachenok, Olesya. "The Impact of Digital Technologies on the Legal Regime for the Protection of Personal Data in Banking." Legal Concept, no. 1 (April 2021): 99–104. http://dx.doi.org/10.15688/lc.jvolsu.2021.1.15.
Linggoraharjo, Victoria. "TANGGUNG JAWAB KEJAHATAN PERBANKAN MELALUI MODUS OPERANDI SKIMMING." Jurnal Magister Hukum ARGUMENTUM 7, no. 1 (April 1, 2020): 34. http://dx.doi.org/10.24123/argu.v7i1.3013.
G. S . Wijesiri, P. A. S. D. Perera,. "Encryption and Decryption Algorithms in Symmetric Key Cryptography Using Graph Theory." Psychology and Education Journal 58, no. 1 (January 1, 2021): 3420–27. http://dx.doi.org/10.17762/pae.v58i1.1280.
Chhikara, Kuldip S., and Anand S. Kodan. "National Agricultural Insurance Scheme (NAIS) in India." Management and Labour Studies 37, no. 2 (May 2012): 143–62. http://dx.doi.org/10.1177/0258042x1203700205.
Almalki, Sultan, Nasser Assery, and Kaushik Roy. "An Empirical Evaluation of Online Continuous Authentication and Anomaly Detection Using Mouse Clickstream Data Analysis." Applied Sciences 11, no. 13 (June 30, 2021): 6083. http://dx.doi.org/10.3390/app11136083.
Prokopowicz, Dariusz. "THE QUESTION OF THE SECURITY OF FACILITATING, COLLECTING AND PROCESSING INFORMATION IN DATA BASES OF SOCIAL NETWORKING." International Journal of New Economics and Social Sciences 6, no. 2 (December 22, 2017): 0. http://dx.doi.org/10.5604/01.3001.0010.7645.
Kantsir, V., V. Kushpit, A. Palyukh, I. Tsylyuryk, and I. Kantsir. "SYNCHRONIZATION OF PROCEDURAL AND FINANCIAL (BANKING) FUSE OF THE IMMUNITY OF PROPERTY RIGHTS." Financial and credit activity: problems of theory and practice 2, no. 37 (April 30, 2021): 503–9. http://dx.doi.org/10.18371/fcaptp.v2i37.230677.
Kumar Baitha, Anuj, and Prof Smitha Vinod. "Session Hijacking and Prevention Technique." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.6.10566.
Gupta, Sandeep, Attaullah Buriro, and Bruno Crispo. "Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access." Mobile Information Systems 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/2649598.
Shulga, Olga. "Confidentiality and scam in the internet." University Economic Bulletin, no. 48 (March 30, 2021): 76–91. http://dx.doi.org/10.31470/2306-546x-2021-48-76-91.
Bwalya, Michael, and Christopher Chembe. "A Security Framework for Mobile Application Systems: Case of Android Applications." Zambia ICT Journal 3, no. 2 (February 21, 2020): 31–43. http://dx.doi.org/10.33260/zictjournal.v3i2.84.
Muravskyi, Volodymyr. "The impact of global technological trends on accounting." Herald of Ternopil National Economic University, no. 4 (86) (December 12, 2017): 138–48. http://dx.doi.org/10.35774/visnyk2017.04.138.
Wibowo, Sunarno Edy. "Government Anticipation in Tackling Crime of Money Laundering (White Collar Crime) in Indonesia." International Journal of Applied Business and International Management 3, no. 1 (August 7, 2018): 145–63. http://dx.doi.org/10.32535/ijabim.v3i1.85.
Rodliyah, Nunung, and Risti Dwi Ramasari. "IMPLEMENTATION OF SYARI'AH ECONOMIC PRINCIPLES ON THE MANAGEMENT OF SYARI'AH MUTUAL FUND IN INDONESIA." Yuridika 33, no. 2 (May 1, 2018): 316. http://dx.doi.org/10.20473/ydk.v33i2.7380.
Shirbhate, Prajakta, Vaishnavi Dhamankar, Aarti Kshirsagar, Purva Deshpande, and Smita Kapse. "Overview of Honeypot Security System for E-Banking." Undergraduate Academic Research Journal, July 2012, 98–102. http://dx.doi.org/10.47893/uarj.2012.1022.
"Prototype for Card-less Electronic Automated Teller Machine using Internet of Things." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 4317–19. http://dx.doi.org/10.35940/ijeat.a1417.109119.
Kawawa, Noriko. "The Japanese law on unauthorized on-line credit card and banking transactions: are current legal principles with respect to unauthorized transactions adequate to protect consumers against information technology crimes in contemporary society?" Digital Evidence and Electronic Signature Law Review 10 (January 31, 2014). http://dx.doi.org/10.14296/deeslr.v10i0.2025.
Md Siraj, Maheyzah. "Preface." International Journal of Innovative Computing 8, no. 1 (May 21, 2018). http://dx.doi.org/10.11113/ijic.v8n1.173.
"Face and Thumb Based Multimodal Bio-Metric Authentication using Harris Feature Extraction and Stenography." Regular 9, no. 3 (September 30, 2020): 550–55. http://dx.doi.org/10.35940/ijrte.c4629.099320.
Walker, Russell. "Scandal at Société Générale: Rogue Trader or Willing Accomplice?" Kellogg School of Management Cases, January 20, 2017, 1–8. http://dx.doi.org/10.1108/case.kellogg.2016.000295.
Kumar, Pratap Kumar, Sashank Kumar, and Biresh Kumar. "Usability and Security Issues in the Implementation of E-Commerce Website." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, May 7, 2020, 249–57. http://dx.doi.org/10.32628/cseit206356.
Barbrook, Richard. "(originally published in December 1998)." First Monday, December 5, 2005. http://dx.doi.org/10.5210/fm.v0i0.1517.