نتایج جستجو برای: online banking security

تعداد نتایج: 447060  

2016
Stefan Kimak

over the past 20 years web browsers have changed considerably from being a simple text display to now supporting complex multimedia applications [1]. The client can now enjoy chatting, playing games and Internet banking. All these applications have something in common, they can be run on multiple platforms and in some cases they will run offline. With the introduction of HTML5 this evolution wi...

2011
Rajinesh Ravendran

This research addresses the problem of website customization in online banking, particularly in the Australian context. Australia has the fourth highest online banking adoption rate among developed nations (behind Canada, US and UK) and Australian consumers prefer online banking over ATM, phone and branch. The existence of large number of users who use online banking services on a regular basis...

2012
Abdelghani Echchabi

The main purpose of this paper is to study the future prospects of online banking in Morocco, based on the technology acceptance model, by examining the intention of the Moroccan customers to adopt online banking and the factors that influence it. The questionnaire used in this study was distributed to 300 Moroccan banks’ customers, and the data gathered were then analysed using structural equa...

Journal: :Information & Management 2015
Ali R. Montazemi Hamed Qahri Saremi

Despite the potential benefits that online banking offers consumers, it has low adoption rate. We systematically review online banking adoption literature to propose two research models of factors affecting pre-adoption and post-adoption of the online banking. To test our proposed models, we applied a two-stage random-effects meta-analytic structural equation modeling method to data collected f...

2013
Manal Adham Amir Azodi Yvo Desmedt Ioannis Karaolis

Cyber-criminals have benefited from on-line banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, we try to predict how hacking tools might evolve. We briefly survey the state-of-the-art tools developed by black-hat hackers and conclude that automation is starting to take place. To demonstrate the feasibility of ou...

Journal: :CAIS 2010
Emad AbuShanab John Michael Pearson Andrew J. Setterstrom

2017
Marco Baldi Franco Chiaraluce Emanuele Frontoni Giuseppe Gottardi Daniele Sciarroni Luca Spalazzi

Public key infrastructures (PKIs) are of crucial importance for the life of online services relying on certificate-based authentication, like e-commerce, e-government, online banking, as well as e-mail, social networking, cloud services and many others. One of the main points of failure (POFs) of modern PKIs concerns reliability and security of certificate revocation lists (CRLs), that must be ...

2017

Today, everything has been digitized and Banking is one of the sectors which faces online threats and Phishing is one of the threat. Phishing is an online uniqueness fraud, which intends to seize classified data mainly alias name, keys and online trading aspects from its sufferers. Primarily, an intruder cheats people to disclose sensible data by emailing a fraudulent broadcast to huge number o...

2015
Shi-Ming Huang Wei-Cheng Shen David C. Yen Ling-Yi Chou

2014
Steven J. Murdoch Ross J. Anderson

As security protocols are used to authenticate more transactions, they end up being relied on in legal proceedings. Designers often fail to anticipate this. Here we show how the EMV protocol – the dominant card payment system worldwide – does not produce adequate evidence for resolving disputes. We propose five principles for designing systems to produce robust evidence. We apply these to other...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید