[go: up one dir, main page]

Sarel et al., 2006 - Google Patents

Addressing consumers' concerns about online security: A conceptual and empirical analysis of banks' actions

Sarel et al., 2006

Document ID
1697038683350910232
Author
Sarel D
Marmorstein H
Publication year
Publication venue
Journal of Financial Services Marketing

External Links

Snippet

Online security is a major problem for financial institutions worldwide. Account hijacking and online fraud are on the rise. Financial losses in the banking industry due to attacks have been estimated in 2003 to be about US $1.2 billion in the US alone. Studies also indicate …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07318Means for preventing undesired reading or writing from or onto record carriers by hindering electromagnetic reading or writing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Similar Documents

Publication Publication Date Title
Frank et al. Approach to cyber security issues in Nigeria: challenges and solution
Cross et al. Exploiting trust for financial gain: An overview of business email compromise (BEC) fraud
Saini et al. Cyber-crimes and their impacts: A review
Al-Musib et al. Business email compromise (BEC) attacks
Makeri Cyber security issues in Nigeria and challenges
Zweighaft Business email compromise and executive impersonation: are financial institutions exposed?
Zulkipli et al. Synthesizing cybersecurity issues and challenges for the elderly
Chevers The impact of cybercrime on e-banking: A proposed model
Bregant et al. Cybercrime and computer crime
Sugunaraj et al. Cyber fraud economics, scam types, and potential measures to protect US seniors: A short review
Ahmad et al. An empirical analysis of cybercrime trends and its impact on moral decadence among secondary school level students in Nigeria
Sarel et al. Addressing consumers’ concerns about online security: A conceptual and empirical analysis of banks’ actions
Garba et al. The Current state of cybersecurity readiness in Nigeria organizations
Al-Tkhayneh et al. The crime in metaverse (the future scenarios for crime patterns and the prospective legal challenges)
Scharfman Crypto phishing and spoofing scams
ISER et al. Role of awareness to prevent personal disasters: reducing the risks of falling for phishing by strengthening user awareness
Hussien et al. An overview of fraud applications and software on social media
Okoru et al. Cybercrime, Crime Security and National Development in Nigeria
Gercke Internet-related identity theft
Medlin et al. The cost of electronic retailing: Prevalent security threats and their results
Oluyemisi et al. The Effect of Cyber-Crimes on Depositors Funds in Deposit Money Banks in Nigeria
Kryshevych et al. Modern methods of computer-related fraud: legal characteristics and qualification.
Halouzka et al. Personal cyber security in email communication
Steinmetz et al. Social engineering
Adenusi et al. Challenges and way out of cyber security issues in Nigeria