Academic literature on the topic 'Internet banking Security measures Australia'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet banking Security measures Australia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet banking Security measures Australia"

1

Gomes, Leandre, Abhinav Deshmukh, and Nilesh Anute. "Cyber Security and Internet Banking: Issues and Preventive Measures." Journal of Information Technology and Sciences 8, no. 2 (July 14, 2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.

Full text
Abstract:
The internet brought a new revolution to the financial sector and it has changed the way of operations in the last two decades. Now, people have the option to carry out banking transactions from a place of their choice without having to go to a nearby bank office. E-banking has become an integral part of the banking system and has become a popular method of transaction for the majority of people. A user has a wide range of options for managing his money through numerous internet banking methods. While internet banking is an aid for customers, they still have to be vigilant to keep their accounts safe from cybercriminals and hackers, as everything on the internet is prone to security threats. Internet security measures followed by the majority of the bank sites to protect their information are not up-to-date as compared to the dynamic cyber threats. Such problems have made it easy for confidential financial information to fall into the hands of third parties and cybercriminals. Although there are several security measures to stop data breaches, there are still flaws in these systems. The goal of this study article is to look at the number of cyber security issues in internet banking in India and the consumer’s awareness of these issues and preventive measures used by them. Our research is particularly based on primary data.
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Supriya. "The Social Dimensions of the Security of Internet Banking." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (August 1, 2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.

Full text
Abstract:
This paper examines the users’ perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the technological and industrial approaches to security. The user-centered research on banking was conducted at the Royal Melbourne University of Technology University and Griffith University, both of which are part of the Smart Internet Technology Cooperative Research Centre. We conclude that the most effective way to increase the perception of Internet banking security is to increase ease of use, convenience, personalisation and trust. Without the perception of security, there will be little trust in banking and transactions on the Internet. This will impede the use of Internet banking and e-commerce which are increasingly important aspects of the nation’s critical infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
3

ÇELİK, Rüveyda, and Ali GEZER. "Detection of Trickbot and Emotet Banking Trojans with Machine Learning." Balkan Journal of Electrical and Computer Engineering 10, no. 4 (October 1, 2022): 377–87. http://dx.doi.org/10.17694/bajece.1031021.

Full text
Abstract:
Internet banking is getting more popular with the increasing number and demand of online banking customers. Almost all transactions that could be performed in bank branches could also be realized through internet banking. Internet banking, which has become widespread with the increasing use of the Internet, has also led to an increase in cases of financial fraud. This has made the protection of personal data and the security of banking services more important than ever. It is very important for institutions and organizations providing online banking services to take security measures in their systems. Cybercriminals target internet users with methods such as malware infection, botnets, spam, phishing, identity theft, and social engineering that they use and develop every day. Therefore, there are always potential risks in using internet banking. Banking viruses commonly used by cybercriminals today are TrickBot and Emotet. Nowadays TrickBot and Emotet are popular banking trojans which gives hard times for online banking customers. Their primary goal is to steal user’s banking and personal information. In this study, we will investigate the behavior analysis and new tricks of TrickBot and Emotet banking viruses, which use different methods to compromise the security of online banking customers. We benefited WEKA program to detect these banking viruses. In addition to this, we also focused on the detection of TrickBot and Emotet Banking viruses with using Random Tree, J48, Naive Bayes, SMO Techniques.
APA, Harvard, Vancouver, ISO, and other styles
4

Malaquias, Fernanda Francielle de Oliveira, and Daniela De Santi Silva. "Disclosure de Informações sobre Segurança do Internet Banking em sites Bancários: o Papel da Internet na Difusão de Inovações." Future Studies Research Journal: Trends and Strategies 12, no. 1 (January 1, 2020): 112–29. http://dx.doi.org/10.24023/futurejournal/2175-5825/2020.v12i1.456.

Full text
Abstract:
AbstractPurpose: This paper aims to analyze the level of disclosure of information about Internet Banking security on bank websites, as well as its determinants.Methodology: The analysis of the disclosure level was based on a framework consisting of 25 items divided into physical, administrative and technical measures. We adopted quantitative (descriptive statistics and multivariate regression analysis) and qualitative (content analysis) approaches for data analysis.Originality / Value: Considering that security is one of the main determinants of Internet Banking adoption, this study aims to expand the discussion on banking services and information security, focusing on a topic that has still been little explored in the Brazilian scenario.Findings: The main results showed that the level of security information disclosed by banks on their websites is low. Banks with a greater number of branches, with higher profitability and private banks showed better levels of disclosure.Theoretical / methodological contributions: At the theoretical level, the study brings contributions to the literature by addressing a topic that has been little explored, especially in Brazil. In addition, this research addresses this issue considering both a quantitative and qualitative perspective, which allows a greater detail on the items to be considered by financial institutions when offering electronic services to their customers.Managerial implications: The results of the study may help banks to assess and improve the level of information being disclosed to their customers in order to increase consumer trust in Internet Banking and, consequently, the diffusion of this technology.
APA, Harvard, Vancouver, ISO, and other styles
5

Zangana, Hewa M., and Marwan Omar. "Threats, Attacks, and Mitigations of Smartphone Security." Academic Journal of Nawroz University 9, no. 4 (December 4, 2020): 324. http://dx.doi.org/10.25007/ajnu.v9n4a989.

Full text
Abstract:
Mobile devices such as Smart Phones and Personal Assistant Devices (PDA) that are Internet based are becoming much more capable of handling complex tasks such as online shopping, online banking as well as social media networking; However, the security mechanisms and defense measures that are built into those devices are not commensurate with those powerful communication and computational capabilities. This in turn, creates critical vulnerabilities thus promoting the chance for imminent security threats. The intent of this paper is to take a look into some of the vulnerabilities and risks associated with the use of smart phones that are Internet based, explore the current security mechanisms and strategies that are in place, and finally propose some proactive defense strategies to ensure appropriate protection of critical information contained in Smart phone devices.
APA, Harvard, Vancouver, ISO, and other styles
6

Zolait, Ali Hussein Saleh, Abdul Razak Ibrahim, and Ahmad Farooq. "A Study on the Internet Security and its Implication for E-Commerce in Yemen." International Journal of Technology Diffusion 1, no. 3 (July 2010): 34–47. http://dx.doi.org/10.4018/jtd.2010070102.

Full text
Abstract:
This study examines the use of the Internet for business purposes in Yemen, where main sectors of banking and private trade organizations are observed. Through interviews, a thorough study is performed concerning the Internet facilities available in Yemen, the literacy and use of Information Communication Technology (ICT) in organizations, the level of e-commerce adopted, the main hurdles in the adoption of e-commerce, and measures required to increase the adoption of e-commerce. The study finds that both organizations realize the importance of e-commerce for their business. The main causes in the delay of e-commerce adoption by some are the discrepancies in the infrastructure, high costing of the Internet facilities, bureaucratic hurdles in obtaining the facilities, and the non-availability of a secure environment. Beyond concerns about Internet security, their awareness of security hazards and protection measures is minimal. In light of the data collected, the study has come up with certain recommendations for the interested authorities to improve e-commerce in Yemen.
APA, Harvard, Vancouver, ISO, and other styles
7

Raza, Syed Ali, Syed Tehseen Jawaid, and Ayesha Hassan. "Internet banking and customer satisfaction in Pakistan." Qualitative Research in Financial Markets 7, no. 1 (February 2, 2015): 24–36. http://dx.doi.org/10.1108/qrfm-09-2013-0027.

Full text
Abstract:
Purpose – This study aims to determine the effects of service quality dimensions on customer satisfaction in Pakistan by using the SERVQUAL model. Design/methodology/approach – A survey research questionnaire of 30 items has been adopted, and the data of 400 respondents were collected from the users of Internet banking of different banks located in Karachi city of Pakistan. Findings – The reliability analysis shows that all dimensions are reliable. Results of the factor analysis confirm the grouping of adopted questioner. At last, the regression analysis indicates a significant positive relationship between assurance, tangibility, reliability and responsiveness with customer satisfaction. Conversely, empathy shows a positive but insignificant effect on the customer satisfaction. Practical implications – It is recommended that the management of online banks has to focus on making the design and content of the Web sites more visually appealing to grab the attention of existing customers, as well as to attract new customers. The management has to take effective measures to further enhance the security and safety of online bank accounts, so that customers can maintain long-term relationships with the usage of online banking. Online banks have to provide more reliable services to the customers at heart to make the customers more comfortable and confident. The management should develop more effective systems to quickly solve the issues of customers. Originality/value – This paper makes a unique contribution to the literature with reference to Pakistan, being a pioneering attempt to investigate the customer satisfaction in the banking industry of Pakistan by using a large sample and advance statistical techniques.
APA, Harvard, Vancouver, ISO, and other styles
8

M. Abdullah, Rozin, and Araz Rajab Abrahim. "Review of Image Encryption using Different Techniques." Academic Journal of Nawroz University 11, no. 3 (June 30, 2022): 170–77. http://dx.doi.org/10.25007/ajnu.v11n3a1301.

Full text
Abstract:
Encryption is one of the measures that ensure the security of images used in various fields such as military understanding, secure clinical imaging offices, Internet and intranet media, electronic banking, and individual association images such as Facebook, WhatsApp, Twitter, etc. On this huge number of images that are sent in a free and open link either during selection or messaging; Then their security ends up being a central need in individual insurance organizations and the arrangement. This article audits and summarizes various image encryption systems to further develop advanced image encryption strategies that operate with expanded flexibility and security.
APA, Harvard, Vancouver, ISO, and other styles
9

Estrela, Priscila Morais Argôlo Bonfim, Robson de Oliveira Albuquerque, Dino Macedo Amaral, William Ferreira Giozza, and Rafael Timóteo de Sousa Júnior. "A Framework for Continuous Authentication Based on Touch Dynamics Biometrics for Mobile Banking Applications." Sensors 21, no. 12 (June 19, 2021): 4212. http://dx.doi.org/10.3390/s21124212.

Full text
Abstract:
As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers. Therefore, user authentication countermeasures based on biometrics, whether physiological or behavioral, have been developed, including those based on touch dynamics biometrics. These measures take into account the unique behavior of a person when interacting with touchscreen devices, thus hindering identitification fraud because it is hard to impersonate natural user behaviors. Behavioral biometric measures also balance security and usability because they are important for human interfaces, thus requiring a measurement process that may be transparent to the user. This paper proposes an improvement to Biotouch, a supervised Machine Learning-based framework for continuous user authentication. The contributions of the proposal comprise the utilization of multiple scopes to create more resilient reasoning models and their respective datasets for the improved Biotouch framework. Another contribution highlighted is the testing of these models to evaluate the imposter False Acceptance Error (FAR). This proposal also improves the flow of data and computation within the improved framework. An evaluation of the multiple scope model proposed provides results between 90.68% and 97.05% for the harmonic mean between recall and precision (F1 Score). The percentages of unduly authenticated imposters and errors of legitimate user rejection (Equal Error Rate (EER)) are between 9.85% and 1.88% for static verification, login, user dynamics, and post-login. These results indicate the feasibility of the continuous multiple-scope authentication framework proposed as an effective layer of security for banking applications, eventually operating jointly with conventional measures such as password-based authentication.
APA, Harvard, Vancouver, ISO, and other styles
10

Dupont, Alan. "An Analysis of China’s Proposal to Control and Centrally Manage the Internet." Journal of Telecommunications and the Digital Economy 8, no. 2 (June 30, 2020): 159–66. http://dx.doi.org/10.18080/jtde.v8n2.298.

Full text
Abstract:
Governments and telecommunications companies have invested heavily in measures designed to protect overall system security. But these measures may not be enough if China is successful in setting the rules and designing the architecture of a new internet, because the one-party state’s internet vision reflects authoritarian values that are diametrically opposed to ours. China has suggested a radical change to the way the internet functions to the International Telecommunications Union. This would bake authoritarianism into the architecture underpinning the web, giving state-run internet service providers granular control over citizens’ use. The authoritarian state’s ability to monitor and control undersea fibre optic cables is emerging as a major national security issue for Australia and other democracies. The world could split into two separate information worlds, one led by the US and the other by China. A Balkanised internet is not in Australia’s interest. We must engage with friends and allies to come up with a fit-for-purpose world wide web that is more efficient, secure, user friendly and compatible with democracy.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Internet banking Security measures Australia"

1

Utakrit, Nattakant. "Security awareness by online banking users in Western Australian of phishing attacks." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2012. https://ro.ecu.edu.au/theses/503.

Full text
Abstract:
Phishing involves sending e-mails pretending to be from the legitimate financial institutions to recipients and asking for personal information such as username and password. It also redirects network traffic to malicious sites, deny network traffic to web services, and modify protection mechanisms in the targeted computer systems. Consequences of successful attacks can include identity and financial losses, and unauthorised information disclosure. The purpose of this study was to investigate the experiences of Western Australian bank users in using online banking. The study considered the relationship between the background of the Western Australian bank users and their experience in using online banking security. The research analysed phishing through case studies that highlighted some of the experiences of phishing attacks and how to deal with the problems. Emphasis was placed on knowledge of phishing and threats and how they were actually implemented, or may be used, in undermining the security of users’ online banking services. The preferences and perspectives of Western Australian bank users about the deployment of online banking security protection and about future online banking services, in order to safeguard themselves against phishing attacks, are presented. The aim was to assist such Australian bank users through exploring potential solutions and making recommendations arising from this study. Research respondents had positive attitudes towards using online banking. Overall, they were satisfied with the security protection offered by their banks. However, although they believed that they had adequate knowledge of phishing and other online banking threats, their awareness of phishing attacks was not sufficient to protect themselves. Essentially, the respondents who had experienced a phishing attack believed it was due to weak security offered by their banks, rather than understanding that they needed more knowledge about security protection of their personal computers. Further education is required if users are to become fully aware of the need for security within their personal online banking.
APA, Harvard, Vancouver, ISO, and other styles
2

Hsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.

Full text
Abstract:
The main purpose of this project is to build a bank system that offers a friendly and simple interface to let users easily manage their lightweight currencies. The Lightweight Currency Protocol (LCP) was originally proposed to solve the problem of fairness in resource cooperatives. However, there are other possible applications of the protocol, including the control of spam and as a general purpose medium of exchange for low value transactions. This project investigates the implementation issues of the LCP, and also investigates LCP bank services to provide human interface to currency operations.
APA, Harvard, Vancouver, ISO, and other styles
3

Valli, Craig. "Non-business use of the World Wide Web : A study of selected Western Australian organisations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1311.

Full text
Abstract:
Employees undertake a wide range of activities when they use the World Wide Web in the work place. Some of these activities may leave the modem Internet connected organisation vulnerable to undue or unknown risk, potential productivity losses and expense us a result of misuse or abuse or the Internet provision. Much of the existing literature on this subject points to a purported epidemic of misuse in the workplace. If this practice is so prevalent and widespread, what can modem Internet connected organisations do to identify the abuse and reduce the risks and losses that these abuses represent? To what extent is the World Wide Web used by employees for non-business related activities in organisations and can filtering or organisational policies impact on this activity? This research specifically examines contextually, the level of misuse with respect to the use of the World Wide Web in three selected Western Australian organisations using multiple interpretive case study as the vehicle for the study. The research is significant internationally to all organisations that use Internet in their everyday work. The research has discovered anomalous behaviour on the part of non-business users who have employed a variety of techniques and tactics to mask their activities. Also, organisational management in the cases examined had demonstrated shortfalls in their perception of misuse within their organisations and, the implementation of effective policy.
APA, Harvard, Vancouver, ISO, and other styles
4

Redlinghuis, André Jacques. "Information protection in the digital banking environment." Thesis, 2012. http://hdl.handle.net/10210/5380.

Full text
Abstract:
M.A.
The evolution of the Internet has led to the establishment of various value-adding products and services such as Internet banking (IB). Internet banking has changed the formal banking landscape forever. Some may argue that Internet banking has positively affected the lives of many, through providing services in a more convenient, efficient and effective manner, 365 days a year. However, the growth of the Internet has lead to the increase of various Information Technology (IT) problems and challenges. Today, individuals and organisations are faced with an increasing number of attacks via computer and Internet viruses, phishing scams and Internet hackers. Individuals and organisations must place greater emphasis on ensuring that their financial well-being is protected. The investment in adequate software and hardware has become critical to conduct financial transactions securely via the Internet. The level of security awareness should also be increased and established at various levels through comprehensive educational programmes. Extensive Internet banking awareness campaigns have been launched, but the level to which these campaigns are successful is uncertain. The main focus of this dissertation is to understand Internet banking customers’ perceptions on information protection when using Internet banking services and products, as various factors influence the perceptions of trust with regards to Internet banking. Trust is formed through a variety of factors from the influence of others on our own beliefs and values, to the experiences gained by using specific technology or processes over a particular period of time. An in-depth literature review forms the basic framework for the dissertation and is followed by an empirical component. The main goal of the literature review is to provide a solid theoretical framework and basis from which to conduct the empirical research. Chapters 2 to 4 delve into the evolution and development of the Internet and provide a perspective on the South African banking landscape. The various challenges the Internet banking domain is faced with, is explored, and the various opportunities that exist are extensively discussed. Trust, the major factor influencing the adoption of Internet banking services and products, is explored, and the factors that shape and diminish trust are discussed. The empirical study consisted of a close-ended questionnaire that was completed by a sample of University of Johannesburg (UJ) alumni. The study included 138 individuals who completed the close-ended questionnaire and the results were analysed by Statistical Consultation Services (StatCon), a statistical research unit within UJ. The results indicate that more should be done to ensure that individuals and businesses are well-versed on issues pertaining to Internet banking security and safety. The results further highlight that the quality of most of the individuals’ relationships with their formal bank branch diminished due to Internet banking. An interesting finding was that 80.7% of the respondents indicated that they would make use of Internet banking services and products, even though they are aware of fraudulent activities that take place via this Internet medium. The research findings provide financial institutions with valuable guidelines on how to plan and implement effective and efficient Internet banking education and awareness strategies.
APA, Harvard, Vancouver, ISO, and other styles
5

Van, Buuren Suzi. "Information security in a distributed banking environment, with specific reference to security protocols." Thesis, 2012. http://hdl.handle.net/10210/6484.

Full text
Abstract:
M.Comm.
The principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment and the security functionality needed to ward off these threats. Security solutions for each area at risk will be provided in short. The main focus of the dissertation will fall on the security protocols that can be used as solutions to protect a banking system. In the dissertation, indication will also be given of what the security protocols, in their turn, depend on to provide protection to a banking system. There are several security protocols that can be used to secure a banking system. The problem, however, is to determine which protocol will provide the best security for a bank in a specific application. This dissertation is also aimed at providing a general security framework that banks could use to evaluate various security protocols which could be implemented to secure a banking system. Such framework should indicate which security protocols will provide a bank in a certain banking environment with the best protection against security threats. It should also indicate which protocols could be used in combination with others to provide the best security.
APA, Harvard, Vancouver, ISO, and other styles
6

Du, Toit Jaco Louis. "Using virtualisation to create a more secure online banking infrastructure." Thesis, 2013. http://hdl.handle.net/10210/8723.

Full text
Abstract:
M.Sc. (Computer Science)
Sim swop, Phishing, Zeus and SpyEye are all terms that may be found in articles concerning online banking fraud. Home users are unsure of how the configuration of their computers affects the risk profile for conducting online banking. Software installed by a home user on their computer may be malware designed to steal banking details. Customers expect banks to provide a safe online banking system. The challenge that banks have is that they cannot control the configuration that exists on a client operating system. The V-Bank system was designed to determine whether virtualisation can be used as a means to increase the security for online banking. The V-Bank system uses a virtual machine that is run from a guest that is single purpose, read-only and fulfils the configuration requirements that the bank has for a client system. The V-Bank system also utilises public and private key encryption for identification, authentication and authorisation mechanisms in the online banking system. The architecture of the V-Bank system defines online banking as an end-to-end system. It approaches online banking as a system that consists of three major components. The three major components is a client-side component, network and server-side environment. The V-Bank system gives banks the ability to provide customers with a system that is controlled from the client, through the network to the server. The V-Bank system demonstrates that virtualisation can be used to increase the security of online banking.
APA, Harvard, Vancouver, ISO, and other styles
7

Blauw, Frans Frederik. "Beatrix: a model for multi-modal and fine-grained authentication for online banking." Thesis, 2015. http://hdl.handle.net/10210/13809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Johnston, James. "A framework for secure human computer interaction." Thesis, 2008. http://hdl.handle.net/10210/493.

Full text
Abstract:
This research is concerned with the development of a framework for the analysis and design of interfaces found in a security environment. An example of such an interface is a firewall. The purpose of this research is to use the framework as a method to improve the usability of an interface, thus aiding the user to implement the correct security features. The purpose is also to use the framework to assist in the development of trust between a user and a computer system. In this research the framework comprises six criteria which are used to analyse interfaces found in the traditional software environment, Internet banking environment and e-commerce environment. In order to develop the framework an overview of the fields of information security and human computer interfaces (HCI) is given. The overview provides background information and also establishes the existing research which has been done in these fields. Due to its popularity, the Windows Internet Connection Firewall is analysed in this research. Based on the criteria a level of trust fostered between the user and interface is calculated for the firewall. It is then shown how this level of trust can be improved by modifying the interface. A proposed interface for the firewall is presented according to the criteria. Interfaces found in the online Internet environment are discussed. This is important in order to identify the similarities and differences between traditional software interfaces and web interfaces. Due to these differences the criteria are modified to be relevant in the analysis and design of security interfaces found on the Internet. Three South African online banking websites are analysed according to the modified framework. Each interface is broken down into a number of components which are then analysed individually. The results of the analysis are compared between the three banking sites to identify the elements which make up a successful interface in an online banking environment. Lastly, three interfaces of e-commerce websites are analysed. Recommendations are made on how the interfaces can be improved, thus leading to a higher level of trust.
Labuschagne, L., Prof.
APA, Harvard, Vancouver, ISO, and other styles
9

Kleynhans, Stefan Anton. "The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship." 2000. http://hdl.handle.net/10500/17100.

Full text
Abstract:
The Internet has had and will continue to have a major impact in the way in which banking business is conducted. This dissertation primarily considers the allocation of risks associated with Internet banking and in doing so considers the role of trade usage in Internet banking. The question of what the Internet is and more specifically what constitutes Internet banking is addressed. In order to have an understanding of the allocation of risks in Internet banking a good understanding of the traditional bank-customer relationship is necessary. The contractual basis for this relationship is discussed. The duties of the bank and the customer are discussed. In this regard the duty of a bank to act in terms of its customers mandate, the banks duty of confidentiality and the customers duty to exercise reasonable care are considered. The concept of a customer is briefly discussed. As trade usage plays a significant role in the contract between the bank and its customer, attention is given to the requirement for the recognition of a trade usage generally and more particularly in South Africa. The effect of Internet banking on the traditional bank-customer relationship is considered. The fact that a bank is still required to act in terms of its customer's mandate but is unable to identify is examined. As most Internet banking contracts impose an obligation on the customer to take security precautions and also limit the liability of banks, consideration is finally given to the possibility that the practices of banks in regard to Internet banking may have acquired the status of trade usage in this particular sphere of banking.
LL.M. (Banking Law)
APA, Harvard, Vancouver, ISO, and other styles
10

Obeng-Adjei, Akwasi. "Analysis of cybercrime activity: perceptions from a South African financial bank." Thesis, 2017. https://hdl.handle.net/10539/24373.

Full text
Abstract:
Research report submitted to the School of Economic and Business Sciences, University of the Witwatersrand in partial fulfilment of the requirements for the degree of Master of Commerce (Information Systems) by coursework and research. Johannesburg, 28 February 2017.
This study is informed by very little empirical research in the field of cybercrime and specifically in the context of South African banks. The study bridges this gap in knowledge by analyzing the cybercrime phenomenon from the perspective of a South African bank. It also provides a sound basis for conducting future studies using a different perspective. In order to achieve this, an interpretive research approach was adopted using a case study in one of the biggest banks in South Africa where cybercrime is currently a topical issue and one that is receiving attention from senior management. Cohen and Felson (1979) Routine Activity Theory was used as a theoretical lens to formulate a conceptual framework which informed the data collection, analysis and synthesis of cybercrime in the selected bank. Primary data was obtained via semistructured interviews. Secondary data was also obtained which allowed for data triangulation. From the perspective of a South African bank, the study concluded that weak security and access controls, poor awareness and user education, prevalent use of the internet, low conviction rates and perceived material gain are the major factors that lead to cybercriminal activity. In order to curb the ever increasing rate of cybercrime, South African banking institutions should consider implementing stronger security and access controls to safeguard customer information, increase user awareness and education, implement effective systems and processes and actively participate in industry wide focus groups. The transnational nature of cybercrime places an onus on all banks in South Africa and other countries to collaborate and define a joint effort to combat the increasing exposure to cybercriminal activity. The use of the Routine Activity Theory provided an avenue to study the cybercrime phenomenon through a different theoretical lens and aided a holistic understanding of the trends and the behavioral attributes contributing to cybercriminal activity that can help South African banks model practical solutions to proactively combat the splurge of cybercrime. Keywords: Cybercrime, internet, crime, computer networks, Routine Activity Theory, South African banks.
GR2018
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Internet banking Security measures Australia"

1

National Automated Clearing House Association. Understanding Internet-initiated ACH debits. Herndon, VA: NACHA, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Association, National Automated Clearing House. Understanding Internet-initiated ACH debits. 2nd ed. Herndon, VA: NACHA, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Janisch, Sonja. Online Banking: Rechtsfragen des elektronischen Überweisungsverkehrs. Wien: Orac, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang luo jing ji jiu fen ding xing zheng yi yu xue li fen xi. Changchun Shi: Jilin ren min chu ban she, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

author, Mitsoff Tom, ed. Bitcoin decoded. United States]: [Propellerhead Marketing Group], 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lohana, Sarika R. Digital Banking and Cyber Security. New Century Publications, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aljawarneh, Shadi A. Online Banking Security Measures and Data Protection. IGI Global, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

ONLINE BANKING SECURITY MEASURES AND DATA PROTECTION. IGI GLOBAL, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aljawarneh, Shadi A. Online Banking Security Measures and Data Protection. IGI Global, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kuo, C. C. Jay, Wanlei Zhou, Yang Xiang, and Javier Lopez. Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Internet banking Security measures Australia"

1

Ndaw, Marie, Gervais Mendy, Samuel Ouya, and Diaraf Seck. "Quantify the Maturity of Internet Banking Security Measures in WAEMU (West African Economic and Monetary Union) Banks." In Innovation and Interdisciplinary Solutions for Underserved Areas, 125–30. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72965-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Özer, Ahu Coşkun, and Hayrünisa Gürel. "Internet Banking Usage Level of Bankers." In Online Banking Security Measures and Data Protection, 27–39. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch002.

Full text
Abstract:
Banks provide service not only through branches in the countries but also offers banking services to customers over the internet. However, customers concern using internet banking because of the various troubles and adversities that may occur on the web and because of their habits. The using of internet banking is still not reached the desired level due to various reasons such as security, troubles on web and habits of customers. In this research, bankers using rate of internet banking and bankers approach on internet banking are determined. According to the survey results in Turkey, almost all of the bankers use internet banking but using of mobile applications does not appear to fully spread. Even though the using of internet banking is very common among the bankers, some of the participants said that they encountered some problems while using internet banking. Solutions of systemic deficiencies, password security problems and other security problems will increase the using of internet banking.
APA, Harvard, Vancouver, ISO, and other styles
3

Yıldırım, İsmail. "Internet Banking and Financial Customer Preferences in Turkey." In Online Banking Security Measures and Data Protection, 40–57. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch003.

Full text
Abstract:
The first online banking service was introduced in Turkey by Is Bank in 1998. However, the number of internet users has been increasing rapidly in Turkey, the number of online banking users did not increase with a similar pace. Although banks are taking measures for the security of online banking transactions, many financial consumers are still concerned about the security of these transactions therefore preferring not to use online banking. This study reveals the development of internet banking in Turkey and consumer percentages. Previous research on the factors affecting the usage of e-banking are also addressed in this study. It was found that the majority of these studies focus on the correlation between the security concerns which result in avoiding to use internet banking.
APA, Harvard, Vancouver, ISO, and other styles
4

Rossi, Fabio Diniz, Rumenigue Hohemberger, Marcos Paulo Konzen, and Daniel Chaves Temp. "E-Banking Security." In Encyclopedia of Criminal Activities and the Deep Web, 893–904. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9715-5.ch060.

Full text
Abstract:
The online banking industry has overgrown in recent years and will continue to grow as economic organizations remain to encourage customers to handle online banking transactions such as money transfers, access to account information, or payment of monthly bills. During this period, internet criminals and fraudsters attempting to steal personal customer information hijacked online banking. This article proposes reviewing the ways by which fraudulent activities are performed and what banks are doing to prevent such activities, as well as the new security measures that banks are using to increase customer confidence. Therefore, the authors present the threats, challenges to address such threats, some trends, and future landscapes regarding online banking security.
APA, Harvard, Vancouver, ISO, and other styles
5

Rossi, Fabio Diniz, Rumenigue Hohemberger, Marcos Paulo Konzen, and Daniel Chaves Temp. "E-Banking Security." In Research Anthology on Concepts, Applications, and Challenges of FinTech, 385–97. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8546-7.ch021.

Full text
Abstract:
The online banking industry has overgrown in recent years and will continue to grow as economic organizations remain to encourage customers to handle online banking transactions such as money transfers, access to account information, or payment of monthly bills. During this period, internet criminals and fraudsters attempting to steal personal customer information hijacked online banking. This article proposes reviewing the ways by which fraudulent activities are performed and what banks are doing to prevent such activities, as well as the new security measures that banks are using to increase customer confidence. Therefore, the authors present the threats, challenges to address such threats, some trends, and future landscapes regarding online banking security.
APA, Harvard, Vancouver, ISO, and other styles
6

Ray, Nilanjan. "Expectation and Perception of Internet Banking Service Quality of Select Indian Private and Public Sector Banks." In Online Banking Security Measures and Data Protection, 58–68. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch004.

Full text
Abstract:
This research paper mainly deals with expectation and perception of service quality of select Indian Banks i.e. SBI and HDFC on the customer satisfaction. The research survey was based on IS-QUAL dimensions (Ray & Ghosh,2014) a diagnostic model developed in 2014, which measures service quality and internet service quality in terms of customer expectations and perceptions of banking services. This present research tends to evaluate the overall idea of expected and perceived services of the two banks. This study is a cross-sectional survey that employed the use of pre-structured questionnaire to collect primary data from a sample of 120 respondents through personal contact, field survey and email. Collected data have been analyzed through SPSS 21 software by different statistical tools like Reliability test for judgment of internal consistency of collected data and paired t- test.
APA, Harvard, Vancouver, ISO, and other styles
7

Bhardwaj, Akashdeep. "Ransomware." In Online Banking Security Measures and Data Protection, 189–221. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch012.

Full text
Abstract:
Compared to the last five to six years, the massive scale by which innocent users are being subjected to a new age threat in form of digital extortion has never been seen before. With the rise of Internet, use of personal computers and devices has mushroomed to immense scale, with cyber criminals subjecting innocent users to extortion using malware. The primary victim to be hit the most has been online banking, impacting the security and reputation of banking and financial transactions along with social interactions. Online security revolves around three critical aspects – starting with the use of digital data and files, next with the use of computer systems and finally the internet as an unsecure medium. This is where Ransomware has become one of the most malicious form of malware for digital extortion threats to home and corporate user alike.
APA, Harvard, Vancouver, ISO, and other styles
8

Tomaševic, Violeta, Goran Pantelic, and Slobodan Bojanic. "Internet and E-Business Security." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 776–81. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch105.

Full text
Abstract:
Originally developed for research and education purposes as Arpanet in 1970s, the Internet has become a worldwide network that offers numerous services to the immense community of users. An everyday progress of the network technology brings also new security risks regarding a lot of sensitive data transferred over the network, especially in banking, commercial, and medical applications. Therefore the Internet security could be in general defined as a set of measures that should prevent vulnerabilities and misuse of data transmitted and used through the network.
APA, Harvard, Vancouver, ISO, and other styles
9

Biswas, Ranjit. "Anytime Anywhere Any-Amount Anybody to Anybody Real-Time Payment (5A-RTP)." In Online Banking Security Measures and Data Protection, 140–56. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch009.

Full text
Abstract:
This chapter introduces about a Proposal to any bank of any country for fast but secured transfer of money anytime anywhere any-amount by anybody to anybody on the spot with confirmation from the payee on the spot. The work here is on a new method of real time payment system, which is highly secured and fast, and 100% technology-based without any paper format or paper work of the bank. This breaking scheme is entitled as “5A-RTP scheme” where ‘5A' stands for Anytime Anywhere Any-amount Anybody to Anybody and ‘RTP' stands for Real-Time Payment. There is no paper-work at all. It is completely secured, realization of payment (debit + credit) happens immediately very fast, without any man-hour or manpower of the bank. It is claimed that 5A-RTP scheme, if incorporated in all the banks in any country, will give the country a huge momentum of customers' satisfaction, huge momentum in country's growth and economic progress. The revolutionary breakthrough in 5A-RTP scheme is that it dominates each of the existing banking instruments and facilities like Cheque, Pay-order, Draft, ATM machine, Credit Card, Debit Card, Internet Banking, Mobile Banking, Traveller's Cheque, etc. The 5A-RTP scheme may even slowly cause a natural death of the existing Cheque and Draft facilities from the country because of its huge application potential, in particular in vast countries like China, India, Brazil, USA, UK, etc.
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Manish, JinKyu Lee, and H. R. Rao. "Implications of FFIEC Guidance on Authentication in Electronic Banking." In Handbook of Research on Information Security and Assurance, 266–78. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch022.

Full text
Abstract:
The Internet has emerged as the dominant medium in enabling banking transactions. Adoption of e-banking has witnessed an unprecedented increase over the last few years. In today’s online financial services environment, authentication is the bedrock of information security. Simple password authentication is the prevailing paradigm, but its weaknesses are all too evident in today’s context. In order to address the nature of similar vulnerabilities, in October 2005, the Federal Financial Institutions Examination Council (FFIEC)—which comprises the United States’ five federal banking regulators—published joint guidance entitled Authentication in an Internet Banking Environment, recommending that financial institutions deploy security measures to reliably authenticate their online banking customers. The analysis of FFIEC guidance presented in the article are with the view to equip the reader with a glimpse of the issues involved in understanding the guidance for specific banking organization that may help towards learned and better decisions regarding compliance and improved security. The chapter will allow Information Technology managers to understand information assurance issues in e-banking in a holistic manner, and help them make recommendations and actions to ensure security of e-banking components.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography