نتایج جستجو برای: online banking security

تعداد نتایج: 447060  

Journal: :International Journal of Security and Its Applications 2014

2008
Mohammed Al Zomai Bander AlFayyadh Audun Jøsang Adrian McCullagh

Security for online banking has changed considerably during the relatively short period that online banking has been in use. In particular, authentication and identity management in the early implementations were, and sometimes still are, vulnerable to various attacks such as phishing. Current state-of-the art solutions include methods for re-authenticating users via out-of-band channels for ea...

2015
Parvinder Singh Mandeep Singh

With the enhancement in technology e-banking like credit Card, Debit Card, Mobile Banking and Internet Banking is the popular medium to transfer the money from one account to another. E-Banking is gaining popularity day by day, which increases the online transaction with the increase in online shopping, online bill payment like electricity, Insurance Premium and other charges, online recharges ...

2014
Martin Butler Rika Butler

Online security remains a challenge to ensure safe transacting on the internet. User authentication, a human-centric process, is regarded as the basis of computer security and hence secure access to online banking services. The increased use of technology to enforce additional actions has the ability to improve the quality of authentication and hence online security, but often at the expense of...

2007
Mohammed AlZomai Bander AlFayyadh Audun Jøsang Adrian McCullagh

Security for online banking has changed considerably during the relatively short period that online banking has been in use. In particular, authentication and identity management in the early implementations were, and sometimes still are, vulnerable to various attacks such as phishing. Current state-of-the art solutions include methods for re-authenticating users via out-of-band channels for ea...

2009
Syed Shah Alam Faridah Hassan

This paper summarizes academic literature on Internet banking drivers and found that there is a need to conduct research on corporate customer Internet banking adoption behaviour. The empirical data were collected from a questionnaire survey of 223 business firms selected from the telephone directory in Klang Valley area in Malaysia. This study examines the relationship between Internet banking...

2013
Dileep Kumar Singh Vishnu Swaroop Madan Mohan Malaviya

Database mining can be defined as the process of mining for implicit, formerly unidentified, and potentially essential information from awfully huge databases by efficient knowledge discovery techniques. The privacy and security of user information have become significant public policy anxieties and these anxieties are receiving increased interest by the both public and government lawmaker and ...

Journal: :JSW 2012
Zhengwei Ma

The purpose of the research is to analyze factors of serviceability and reliability that could influence internet banking customer satisfaction in China. Moreover, the paper also tries to explain the relationship among serviceability, reliability and customer satisfaction, and to find some major variables for keeping high level internet banking customer satisfaction. The data demonstrated that ...

2014
Navneet Kaur Ravi Kiran

This study has been focused on finding the key determinants of customer loyalty and customer satisfaction in e-banking. The key factors of Customer loyalty are: customer retention; Security and Virtual Banking; and Technology invasion. Customer Retention emerges as an important factor influencing customer Loyalty with highest Eigen value and it explains maximum variation. This is followed by Se...

2017
Mumin Abubakre Crispin Coombs Chanaka Jayawardhena Alan Hunt Robert Gordon

In the past decade banks invested heavily in internet technology so as to engage in e-business and ecommerce activities. However, this development exposed banks to threats, such as online fraud. Consequently, there was a need to adopt security measures and controls to mitigate such threats. Banks in developed countries have developed a level of ‘best practice’ to reduce such online threats. The...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید