Sarel et al., 2006 - Google Patents
Addressing consumers' concerns about online security: A conceptual and empirical analysis of banks' actionsSarel et al., 2006
- Document ID
- 1697038683350910232
- Author
- Sarel D
- Marmorstein H
- Publication year
- Publication venue
- Journal of Financial Services Marketing
External Links
Snippet
Online security is a major problem for financial institutions worldwide. Account hijacking and online fraud are on the rise. Financial losses in the banking industry due to attacks have been estimated in 2003 to be about US $1.2 billion in the US alone. Studies also indicate …
- 238000004458 analytical method 0 title description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
- G06K19/07318—Means for preventing undesired reading or writing from or onto record carriers by hindering electromagnetic reading or writing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Frank et al. | Approach to cyber security issues in Nigeria: challenges and solution | |
Cross et al. | Exploiting trust for financial gain: An overview of business email compromise (BEC) fraud | |
Saini et al. | Cyber-crimes and their impacts: A review | |
Al-Musib et al. | Business email compromise (BEC) attacks | |
Makeri | Cyber security issues in Nigeria and challenges | |
Zweighaft | Business email compromise and executive impersonation: are financial institutions exposed? | |
Zulkipli et al. | Synthesizing cybersecurity issues and challenges for the elderly | |
Chevers | The impact of cybercrime on e-banking: A proposed model | |
Bregant et al. | Cybercrime and computer crime | |
Sugunaraj et al. | Cyber fraud economics, scam types, and potential measures to protect US seniors: A short review | |
Ahmad et al. | An empirical analysis of cybercrime trends and its impact on moral decadence among secondary school level students in Nigeria | |
Sarel et al. | Addressing consumers’ concerns about online security: A conceptual and empirical analysis of banks’ actions | |
Garba et al. | The Current state of cybersecurity readiness in Nigeria organizations | |
Al-Tkhayneh et al. | The crime in metaverse (the future scenarios for crime patterns and the prospective legal challenges) | |
Scharfman | Crypto phishing and spoofing scams | |
ISER et al. | Role of awareness to prevent personal disasters: reducing the risks of falling for phishing by strengthening user awareness | |
Hussien et al. | An overview of fraud applications and software on social media | |
Okoru et al. | Cybercrime, Crime Security and National Development in Nigeria | |
Gercke | Internet-related identity theft | |
Medlin et al. | The cost of electronic retailing: Prevalent security threats and their results | |
Oluyemisi et al. | The Effect of Cyber-Crimes on Depositors Funds in Deposit Money Banks in Nigeria | |
Kryshevych et al. | Modern methods of computer-related fraud: legal characteristics and qualification. | |
Halouzka et al. | Personal cyber security in email communication | |
Steinmetz et al. | Social engineering | |
Adenusi et al. | Challenges and way out of cyber security issues in Nigeria |