Добірка наукової літератури з теми "Internet banking Security measures Australia"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Internet banking Security measures Australia".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Internet banking Security measures Australia"
Gomes, Leandre, Abhinav Deshmukh, and Nilesh Anute. "Cyber Security and Internet Banking: Issues and Preventive Measures." Journal of Information Technology and Sciences 8, no. 2 (July 14, 2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.
Повний текст джерелаSingh, Supriya. "The Social Dimensions of the Security of Internet Banking." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (August 1, 2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.
Повний текст джерелаÇELİK, Rüveyda, and Ali GEZER. "Detection of Trickbot and Emotet Banking Trojans with Machine Learning." Balkan Journal of Electrical and Computer Engineering 10, no. 4 (October 1, 2022): 377–87. http://dx.doi.org/10.17694/bajece.1031021.
Повний текст джерелаMalaquias, Fernanda Francielle de Oliveira, and Daniela De Santi Silva. "Disclosure de Informações sobre Segurança do Internet Banking em sites Bancários: o Papel da Internet na Difusão de Inovações." Future Studies Research Journal: Trends and Strategies 12, no. 1 (January 1, 2020): 112–29. http://dx.doi.org/10.24023/futurejournal/2175-5825/2020.v12i1.456.
Повний текст джерелаZangana, Hewa M., and Marwan Omar. "Threats, Attacks, and Mitigations of Smartphone Security." Academic Journal of Nawroz University 9, no. 4 (December 4, 2020): 324. http://dx.doi.org/10.25007/ajnu.v9n4a989.
Повний текст джерелаZolait, Ali Hussein Saleh, Abdul Razak Ibrahim, and Ahmad Farooq. "A Study on the Internet Security and its Implication for E-Commerce in Yemen." International Journal of Technology Diffusion 1, no. 3 (July 2010): 34–47. http://dx.doi.org/10.4018/jtd.2010070102.
Повний текст джерелаRaza, Syed Ali, Syed Tehseen Jawaid, and Ayesha Hassan. "Internet banking and customer satisfaction in Pakistan." Qualitative Research in Financial Markets 7, no. 1 (February 2, 2015): 24–36. http://dx.doi.org/10.1108/qrfm-09-2013-0027.
Повний текст джерелаM. Abdullah, Rozin, and Araz Rajab Abrahim. "Review of Image Encryption using Different Techniques." Academic Journal of Nawroz University 11, no. 3 (June 30, 2022): 170–77. http://dx.doi.org/10.25007/ajnu.v11n3a1301.
Повний текст джерелаEstrela, Priscila Morais Argôlo Bonfim, Robson de Oliveira Albuquerque, Dino Macedo Amaral, William Ferreira Giozza, and Rafael Timóteo de Sousa Júnior. "A Framework for Continuous Authentication Based on Touch Dynamics Biometrics for Mobile Banking Applications." Sensors 21, no. 12 (June 19, 2021): 4212. http://dx.doi.org/10.3390/s21124212.
Повний текст джерелаDupont, Alan. "An Analysis of China’s Proposal to Control and Centrally Manage the Internet." Journal of Telecommunications and the Digital Economy 8, no. 2 (June 30, 2020): 159–66. http://dx.doi.org/10.18080/jtde.v8n2.298.
Повний текст джерелаДисертації з теми "Internet banking Security measures Australia"
Utakrit, Nattakant. "Security awareness by online banking users in Western Australian of phishing attacks." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2012. https://ro.ecu.edu.au/theses/503.
Повний текст джерелаHsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.
Повний текст джерелаValli, Craig. "Non-business use of the World Wide Web : A study of selected Western Australian organisations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1311.
Повний текст джерелаRedlinghuis, André Jacques. "Information protection in the digital banking environment." Thesis, 2012. http://hdl.handle.net/10210/5380.
Повний текст джерелаThe evolution of the Internet has led to the establishment of various value-adding products and services such as Internet banking (IB). Internet banking has changed the formal banking landscape forever. Some may argue that Internet banking has positively affected the lives of many, through providing services in a more convenient, efficient and effective manner, 365 days a year. However, the growth of the Internet has lead to the increase of various Information Technology (IT) problems and challenges. Today, individuals and organisations are faced with an increasing number of attacks via computer and Internet viruses, phishing scams and Internet hackers. Individuals and organisations must place greater emphasis on ensuring that their financial well-being is protected. The investment in adequate software and hardware has become critical to conduct financial transactions securely via the Internet. The level of security awareness should also be increased and established at various levels through comprehensive educational programmes. Extensive Internet banking awareness campaigns have been launched, but the level to which these campaigns are successful is uncertain. The main focus of this dissertation is to understand Internet banking customers’ perceptions on information protection when using Internet banking services and products, as various factors influence the perceptions of trust with regards to Internet banking. Trust is formed through a variety of factors from the influence of others on our own beliefs and values, to the experiences gained by using specific technology or processes over a particular period of time. An in-depth literature review forms the basic framework for the dissertation and is followed by an empirical component. The main goal of the literature review is to provide a solid theoretical framework and basis from which to conduct the empirical research. Chapters 2 to 4 delve into the evolution and development of the Internet and provide a perspective on the South African banking landscape. The various challenges the Internet banking domain is faced with, is explored, and the various opportunities that exist are extensively discussed. Trust, the major factor influencing the adoption of Internet banking services and products, is explored, and the factors that shape and diminish trust are discussed. The empirical study consisted of a close-ended questionnaire that was completed by a sample of University of Johannesburg (UJ) alumni. The study included 138 individuals who completed the close-ended questionnaire and the results were analysed by Statistical Consultation Services (StatCon), a statistical research unit within UJ. The results indicate that more should be done to ensure that individuals and businesses are well-versed on issues pertaining to Internet banking security and safety. The results further highlight that the quality of most of the individuals’ relationships with their formal bank branch diminished due to Internet banking. An interesting finding was that 80.7% of the respondents indicated that they would make use of Internet banking services and products, even though they are aware of fraudulent activities that take place via this Internet medium. The research findings provide financial institutions with valuable guidelines on how to plan and implement effective and efficient Internet banking education and awareness strategies.
Van, Buuren Suzi. "Information security in a distributed banking environment, with specific reference to security protocols." Thesis, 2012. http://hdl.handle.net/10210/6484.
Повний текст джерелаThe principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment and the security functionality needed to ward off these threats. Security solutions for each area at risk will be provided in short. The main focus of the dissertation will fall on the security protocols that can be used as solutions to protect a banking system. In the dissertation, indication will also be given of what the security protocols, in their turn, depend on to provide protection to a banking system. There are several security protocols that can be used to secure a banking system. The problem, however, is to determine which protocol will provide the best security for a bank in a specific application. This dissertation is also aimed at providing a general security framework that banks could use to evaluate various security protocols which could be implemented to secure a banking system. Such framework should indicate which security protocols will provide a bank in a certain banking environment with the best protection against security threats. It should also indicate which protocols could be used in combination with others to provide the best security.
Du, Toit Jaco Louis. "Using virtualisation to create a more secure online banking infrastructure." Thesis, 2013. http://hdl.handle.net/10210/8723.
Повний текст джерелаSim swop, Phishing, Zeus and SpyEye are all terms that may be found in articles concerning online banking fraud. Home users are unsure of how the configuration of their computers affects the risk profile for conducting online banking. Software installed by a home user on their computer may be malware designed to steal banking details. Customers expect banks to provide a safe online banking system. The challenge that banks have is that they cannot control the configuration that exists on a client operating system. The V-Bank system was designed to determine whether virtualisation can be used as a means to increase the security for online banking. The V-Bank system uses a virtual machine that is run from a guest that is single purpose, read-only and fulfils the configuration requirements that the bank has for a client system. The V-Bank system also utilises public and private key encryption for identification, authentication and authorisation mechanisms in the online banking system. The architecture of the V-Bank system defines online banking as an end-to-end system. It approaches online banking as a system that consists of three major components. The three major components is a client-side component, network and server-side environment. The V-Bank system gives banks the ability to provide customers with a system that is controlled from the client, through the network to the server. The V-Bank system demonstrates that virtualisation can be used to increase the security of online banking.
Blauw, Frans Frederik. "Beatrix: a model for multi-modal and fine-grained authentication for online banking." Thesis, 2015. http://hdl.handle.net/10210/13809.
Повний текст джерелаJohnston, James. "A framework for secure human computer interaction." Thesis, 2008. http://hdl.handle.net/10210/493.
Повний текст джерелаLabuschagne, L., Prof.
Kleynhans, Stefan Anton. "The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship." 2000. http://hdl.handle.net/10500/17100.
Повний текст джерелаLL.M. (Banking Law)
Obeng-Adjei, Akwasi. "Analysis of cybercrime activity: perceptions from a South African financial bank." Thesis, 2017. https://hdl.handle.net/10539/24373.
Повний текст джерелаThis study is informed by very little empirical research in the field of cybercrime and specifically in the context of South African banks. The study bridges this gap in knowledge by analyzing the cybercrime phenomenon from the perspective of a South African bank. It also provides a sound basis for conducting future studies using a different perspective. In order to achieve this, an interpretive research approach was adopted using a case study in one of the biggest banks in South Africa where cybercrime is currently a topical issue and one that is receiving attention from senior management. Cohen and Felson (1979) Routine Activity Theory was used as a theoretical lens to formulate a conceptual framework which informed the data collection, analysis and synthesis of cybercrime in the selected bank. Primary data was obtained via semistructured interviews. Secondary data was also obtained which allowed for data triangulation. From the perspective of a South African bank, the study concluded that weak security and access controls, poor awareness and user education, prevalent use of the internet, low conviction rates and perceived material gain are the major factors that lead to cybercriminal activity. In order to curb the ever increasing rate of cybercrime, South African banking institutions should consider implementing stronger security and access controls to safeguard customer information, increase user awareness and education, implement effective systems and processes and actively participate in industry wide focus groups. The transnational nature of cybercrime places an onus on all banks in South Africa and other countries to collaborate and define a joint effort to combat the increasing exposure to cybercriminal activity. The use of the Routine Activity Theory provided an avenue to study the cybercrime phenomenon through a different theoretical lens and aided a holistic understanding of the trends and the behavioral attributes contributing to cybercriminal activity that can help South African banks model practical solutions to proactively combat the splurge of cybercrime. Keywords: Cybercrime, internet, crime, computer networks, Routine Activity Theory, South African banks.
GR2018
Книги з теми "Internet banking Security measures Australia"
National Automated Clearing House Association. Understanding Internet-initiated ACH debits. Herndon, VA: NACHA, 2001.
Знайти повний текст джерелаAssociation, National Automated Clearing House. Understanding Internet-initiated ACH debits. 2nd ed. Herndon, VA: NACHA, 2006.
Знайти повний текст джерелаJanisch, Sonja. Online Banking: Rechtsfragen des elektronischen Überweisungsverkehrs. Wien: Orac, 2001.
Знайти повний текст джерелаWang luo jing ji jiu fen ding xing zheng yi yu xue li fen xi. Changchun Shi: Jilin ren min chu ban she, 2001.
Знайти повний текст джерелаauthor, Mitsoff Tom, ed. Bitcoin decoded. United States]: [Propellerhead Marketing Group], 2014.
Знайти повний текст джерелаLohana, Sarika R. Digital Banking and Cyber Security. New Century Publications, 2020.
Знайти повний текст джерелаAljawarneh, Shadi A. Online Banking Security Measures and Data Protection. IGI Global, 2016.
Знайти повний текст джерелаONLINE BANKING SECURITY MEASURES AND DATA PROTECTION. IGI GLOBAL, 2017.
Знайти повний текст джерелаAljawarneh, Shadi A. Online Banking Security Measures and Data Protection. IGI Global, 2016.
Знайти повний текст джерелаKuo, C. C. Jay, Wanlei Zhou, Yang Xiang, and Javier Lopez. Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings. Springer, 2012.
Знайти повний текст джерелаЧастини книг з теми "Internet banking Security measures Australia"
Ndaw, Marie, Gervais Mendy, Samuel Ouya, and Diaraf Seck. "Quantify the Maturity of Internet Banking Security Measures in WAEMU (West African Economic and Monetary Union) Banks." In Innovation and Interdisciplinary Solutions for Underserved Areas, 125–30. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72965-7_11.
Повний текст джерелаÖzer, Ahu Coşkun, and Hayrünisa Gürel. "Internet Banking Usage Level of Bankers." In Online Banking Security Measures and Data Protection, 27–39. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch002.
Повний текст джерелаYıldırım, İsmail. "Internet Banking and Financial Customer Preferences in Turkey." In Online Banking Security Measures and Data Protection, 40–57. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch003.
Повний текст джерелаRossi, Fabio Diniz, Rumenigue Hohemberger, Marcos Paulo Konzen, and Daniel Chaves Temp. "E-Banking Security." In Encyclopedia of Criminal Activities and the Deep Web, 893–904. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9715-5.ch060.
Повний текст джерелаRossi, Fabio Diniz, Rumenigue Hohemberger, Marcos Paulo Konzen, and Daniel Chaves Temp. "E-Banking Security." In Research Anthology on Concepts, Applications, and Challenges of FinTech, 385–97. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8546-7.ch021.
Повний текст джерелаRay, Nilanjan. "Expectation and Perception of Internet Banking Service Quality of Select Indian Private and Public Sector Banks." In Online Banking Security Measures and Data Protection, 58–68. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch004.
Повний текст джерелаBhardwaj, Akashdeep. "Ransomware." In Online Banking Security Measures and Data Protection, 189–221. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch012.
Повний текст джерелаTomaševic, Violeta, Goran Pantelic, and Slobodan Bojanic. "Internet and E-Business Security." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 776–81. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch105.
Повний текст джерелаBiswas, Ranjit. "Anytime Anywhere Any-Amount Anybody to Anybody Real-Time Payment (5A-RTP)." In Online Banking Security Measures and Data Protection, 140–56. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch009.
Повний текст джерелаGupta, Manish, JinKyu Lee, and H. R. Rao. "Implications of FFIEC Guidance on Authentication in Electronic Banking." In Handbook of Research on Information Security and Assurance, 266–78. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch022.
Повний текст джерела