Fang et al., 2023 - Google Patents
Security measures applied on digital banking towards service improvement proposalFang et al., 2023
View PDF- Document ID
- 8904588459858833631
- Author
- Fang L
- Quintos D
- Publication year
- Publication venue
- Journal of Business and Management Studies
External Links
Snippet
The main objective of this study is to assess the security measures on digital banking as a basis for improving services. The researcher used a descriptive method of research, employed with the used of a standard questionnaire. Descriptive research design involves …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jin | Artificial intelligence and consumer privacy | |
Alghazo et al. | Cyber security analysis of internet banking in emerging countries: User and bank perspectives | |
Ali et al. | Phishing—A cyber fraud: The types, implications and governance | |
Levi et al. | The implications of economic cybercrime for policing | |
Makeri | Cyber security issues in Nigeria and challenges | |
Zweighaft | Business email compromise and executive impersonation: are financial institutions exposed? | |
Fang et al. | Security measures applied on digital banking towards service improvement proposal | |
Sadekin et al. | Security of e-banking in Bangladesh | |
Ama et al. | Cybersecurity Challenge in Nigeria Deposit Money Banks | |
Sinha et al. | AI based technologies for digital and banking fraud during covid-19 | |
Coleman et al. | E-banking fraud in Jamaica: A cross-sectional quantitative study | |
Das et al. | Protecting Your Assets: Effective Use of Cybersecurity Measures in Banking Industries | |
DoP et al. | effect of data protection frameworks against cybercrimes on cyber security in Nigeria | |
Tripathi et al. | Frauds and cyber security issues in the finance sector | |
Kanyongo et al. | IMPACT OF CYBERSECURITY ON RISK MITIGATION STRATEGY BY COMMERCIAL BANKS IN EMERGING MARKETS: A LEGAL PERSPECTIVE CASE STUDY. | |
Singh | Security and privacy issues in E-Banking: an empirical study of customers’ perception | |
JOSEPH | The Effectiveness of Cybersecurity Measures in Preventing Cyber-Attacks on Mobile Payment Systems | |
NJOROGE | Effect of Cyber Crime Related Costs On Development of Financial Innovation Products and Services | |
Fahad | Recovering consumer trust in FinTech products after a data breach | |
Stojanov | Protection Against Fraud In Electronic Trade Payments | |
Seshadri | Literature based Cyber Security Topics: Handbook | |
Ibrahimnur | Impact of Cybercrime on the Finance Sector: a Case of Banks in Nairobi County, Kenya (2008-2022) | |
Oreku | A Rule-based Approach for Resolving Cybercrime in Financial Institutions: The Tanzania case | |
Bala et al. | Data mining and E-banking security | |
Akinbowale et al. | Understanding and mitigating cyberfraud in Africa |