[go: up one dir, main page]

Fang et al., 2023 - Google Patents

Security measures applied on digital banking towards service improvement proposal

Fang et al., 2023

View PDF
Document ID
8904588459858833631
Author
Fang L
Quintos D
Publication year
Publication venue
Journal of Business and Management Studies

External Links

Snippet

The main objective of this study is to assess the security measures on digital banking as a basis for improving services. The researcher used a descriptive method of research, employed with the used of a standard questionnaire. Descriptive research design involves …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
Jin Artificial intelligence and consumer privacy
Alghazo et al. Cyber security analysis of internet banking in emerging countries: User and bank perspectives
Ali et al. Phishing—A cyber fraud: The types, implications and governance
Levi et al. The implications of economic cybercrime for policing
Makeri Cyber security issues in Nigeria and challenges
Zweighaft Business email compromise and executive impersonation: are financial institutions exposed?
Fang et al. Security measures applied on digital banking towards service improvement proposal
Sadekin et al. Security of e-banking in Bangladesh
Ama et al. Cybersecurity Challenge in Nigeria Deposit Money Banks
Sinha et al. AI based technologies for digital and banking fraud during covid-19
Coleman et al. E-banking fraud in Jamaica: A cross-sectional quantitative study
Das et al. Protecting Your Assets: Effective Use of Cybersecurity Measures in Banking Industries
DoP et al. effect of data protection frameworks against cybercrimes on cyber security in Nigeria
Tripathi et al. Frauds and cyber security issues in the finance sector
Kanyongo et al. IMPACT OF CYBERSECURITY ON RISK MITIGATION STRATEGY BY COMMERCIAL BANKS IN EMERGING MARKETS: A LEGAL PERSPECTIVE CASE STUDY.
Singh Security and privacy issues in E-Banking: an empirical study of customers’ perception
JOSEPH The Effectiveness of Cybersecurity Measures in Preventing Cyber-Attacks on Mobile Payment Systems
NJOROGE Effect of Cyber Crime Related Costs On Development of Financial Innovation Products and Services
Fahad Recovering consumer trust in FinTech products after a data breach
Stojanov Protection Against Fraud In Electronic Trade Payments
Seshadri Literature based Cyber Security Topics: Handbook
Ibrahimnur Impact of Cybercrime on the Finance Sector: a Case of Banks in Nairobi County, Kenya (2008-2022)
Oreku A Rule-based Approach for Resolving Cybercrime in Financial Institutions: The Tanzania case
Bala et al. Data mining and E-banking security
Akinbowale et al. Understanding and mitigating cyberfraud in Africa