International comparison of bank fraud reimbursement: customer perceptions and contractual terms
نویسندگان
چکیده
The study presented in this article investigated to what extent bank customers understand the terms and conditions (T&Cs) they have signed up to. If many customers are not able to understand T&Cs and the behaviours they are expected to comply with, they risk not being compensated when their accounts are breached. An expert analysis of 30 bank contracts across 25 countries found that most contract terms were too vague for customers to infer required behaviour. In some cases the rules vary for different products, meaning the advice can be contradictory at worst. While many banks allow customers to write Personal identification numbers (PINs) down (as long as they are disguised and not kept with the card), 20% of banks categorically forbid writing PINs down, and a handful stipulate that the customer have a unique PIN for each account. We tested our findings in a survey with 151 participants in Germany, the USA and UK. They mostly agree: only 35% fully understand the T&Cs, and 28% find important sections are unclear. There are strong regional variations: Germans found their T&Cs particularly hard to understand, and USA bank customers assumed some of their behaviours contravened the T&Cs, but were reassured when they actually read them.
منابع مشابه
FDiBC: A Novel Fraud Detection Method in Bank Club based on Sliding Time and Scores Window
One of the recent strategies for increasing the customer’s loyalty in banking industry is the use of customers’ club system. In this system, customers receive scores on the basis of financial and club activities they are performing, and due to the achieved points, they get credits from the bank. In addition, by the advent of new technologies, fraud is growing in banking domain as well. Therefor...
متن کاملFeasibility of customer relationship management implementation from employees and managers perspective of Melli Bank in Esfahan city
The purpose of this study is the feasibility of customer relationship management implementation from employees and managers' perspective of Melli bank in Esfahan city by using structural equation modeling (SEM). This study is applicable in terms of purpose and descriptive –survey in terms of method. The sample population of this study was employees and managers of Melli bank in Esfahan city in ...
متن کاملDetecting Suspicious Card Transactions in unlabeled data of bank Using Outlier Detection Techniqes
With the advancement of technology, the use of ATM and credit cards are increased. Cyber fraud and theft are the kinds of threat which result in using these Technologies. It is therefore inevitable to use fraud detection algorithms to prevent fraudulent use of bank cards. Credit card fraud can be thought of as a form of identity theft that consists of an unauthorized access to another person's ...
متن کاملCustomer Orientation and Business Performance of Financial Institution: A Case Study of Eastern Hararghe Commercial Bank of Ethiopia
The main objective of the paper is to investigate customer treatment, financial efficiency and supporting customer services with modern banking technology in financial institutions. The customer orientation and business performance of financial institutions targets customer services to maintain long term mutual relationships. The findings of the study has direct practical relevance for the bank...
متن کاملImpact Organizational Learning is about CRM Performance Regarding the Relationship Between Integration of Marketing
Purpose: What is changing today is expanding customer loyalty. In organizations such as the Melli Bank, customer relationship management is more sensitive. Because the customer is considered to be part of the service provided in the service delivery process, and the customers are the lifeblood of the banks. The Melli Bank can not only seek new customers, but also keep customers and convert them...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Cybersecurity
دوره 3 شماره
صفحات -
تاریخ انتشار 2017