نتایج جستجو برای: online banking security
تعداد نتایج: 447060 فیلتر نتایج به سال:
over the past 20 years web browsers have changed considerably from being a simple text display to now supporting complex multimedia applications [1]. The client can now enjoy chatting, playing games and Internet banking. All these applications have something in common, they can be run on multiple platforms and in some cases they will run offline. With the introduction of HTML5 this evolution wi...
This research addresses the problem of website customization in online banking, particularly in the Australian context. Australia has the fourth highest online banking adoption rate among developed nations (behind Canada, US and UK) and Australian consumers prefer online banking over ATM, phone and branch. The existence of large number of users who use online banking services on a regular basis...
The main purpose of this paper is to study the future prospects of online banking in Morocco, based on the technology acceptance model, by examining the intention of the Moroccan customers to adopt online banking and the factors that influence it. The questionnaire used in this study was distributed to 300 Moroccan banks’ customers, and the data gathered were then analysed using structural equa...
Despite the potential benefits that online banking offers consumers, it has low adoption rate. We systematically review online banking adoption literature to propose two research models of factors affecting pre-adoption and post-adoption of the online banking. To test our proposed models, we applied a two-stage random-effects meta-analytic structural equation modeling method to data collected f...
Cyber-criminals have benefited from on-line banking (OB), regardless of the extensive research on financial cyber-security. To better be prepared for what the future might bring, we try to predict how hacking tools might evolve. We briefly survey the state-of-the-art tools developed by black-hat hackers and conclude that automation is starting to take place. To demonstrate the feasibility of ou...
Public key infrastructures (PKIs) are of crucial importance for the life of online services relying on certificate-based authentication, like e-commerce, e-government, online banking, as well as e-mail, social networking, cloud services and many others. One of the main points of failure (POFs) of modern PKIs concerns reliability and security of certificate revocation lists (CRLs), that must be ...
Today, everything has been digitized and Banking is one of the sectors which faces online threats and Phishing is one of the threat. Phishing is an online uniqueness fraud, which intends to seize classified data mainly alias name, keys and online trading aspects from its sufferers. Primarily, an intruder cheats people to disclose sensible data by emailing a fraudulent broadcast to huge number o...
As security protocols are used to authenticate more transactions, they end up being relied on in legal proceedings. Designers often fail to anticipate this. Here we show how the EMV protocol – the dominant card payment system worldwide – does not produce adequate evidence for resolving disputes. We propose five principles for designing systems to produce robust evidence. We apply these to other...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید