461 Hits in 3.9 sec

An Inter-Banking Auditing Security Solution For Detecting Unauthorised Financial Transactions Entered By Authorised Insiders

C. A. Corzo, N. Zhang, F. Corzo
2011 Zenodo  
With the above, a security auditing service is designed to detect integrity drifts with and between organizations in order to detect unauthorised financial transactions entered by authorised users.  ...  Insider abuse has recently been reported as one of the more frequently occurring security incidents, suggesting that more security is required for detecting and preventing unauthorised financial transactions  ...  Authorised users (insiders), e.g. banking employees, have privileges that allow them to access, to operate and to perform financial transactions using the financial services provided by automated banking  ... 
doi:10.5281/zenodo.1075055 fatcat:w32fe5x5uzan3cbvobibh4uxwm

Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example

Rajpreet Jassal
2013 IOSR Journal of Computer Engineering  
Billions of financial data transactions occur online every day and bank cyber crimes take place every day when bank information is compromised by skilled criminal hackers by manipulating a financial institution's  ...  But Online banking continues to present challenges to financial security and personal privacy.  ...  To protect our accounts against unauthorised access, ICICI bank systems are designed to terminate a secure online session automatically if extended inactivity is detected.  ... 
doi:10.9790/0661-131114121 fatcat:hpymz2kiebabbcufeyzi2gajxq

Info-Communicative and Protective Function of the State as Combating Fraud using Sberbank Bank Cards

Igor Yu. Nikodimov, Igor A. Burmistrov, Tatyana N. Sinyukova, Elena A. Mironova, Sergey I. Zakhartsev
2020 International Journal of Criminology and Sociology  
Intensive transformation processes in financial markets, their automation and virtualisation, the spread of remote interaction between banks and their clients, the influence of unauthorised persons on  ...  The leading method to study this problem is the method of analysis, which allows to identify and comprehensively consider ways to counter financial crimes in banks to improve the level of financial security  ...  a special group/unit in the structure of the banking supervision department to detect financial crimes/scheme transactions in banks.  ... 
doi:10.6000/1929-4409.2020.09.166 fatcat:wlcjqflgojfq3ittx252o4ligy


Shewangu Dzomira
2014 Risk Governance and Control: Financial Markets & Institutions  
The paper investigates digital analytical tools and technologies used in electronic fraud prevention and detection, used in the banking industry.  ...  It is concluded that banking institutions should reshape their anti-fraud strategies to be effective by considering fraud detection efforts using advanced analytics and related tools, software and application  ...  Whilst, according to survey in Tanzania most of the organisations use the following financial crimes detection mechanisms (50%); risk based internal audits (100%), ongoing risk based transaction monitoring  ... 
doi:10.22495/rgcv4i2c1art4 fatcat:oawifxb3gbcxhojpia7bocujwe

Cyber-Attacks – Trends, Patterns and Security Countermeasures

Andreea Bendovschi
2015 Procedia Economics and Finance  
Technology is rapidly evolving in a world driven by social networks, online transactions, cloud computing, and automated processes.  ...  reported all around the world over the last three years in order to determine patterns and trends in cyber-crime.  ...  Introduction In a world driven more and more by big data, social networks, online transactions, information stored or managed via internet and automated processes performed through the use of IT systems  ... 
doi:10.1016/s2212-5671(15)01077-1 fatcat:mgc5ntj5pzbbbptbytc6agyf5m

E-Fraud in Nigerian Banks: Why and How?

Babatunde Moses Ololade, Mary Kehinde Salawu, Aderemi Daniel Adekanmi
2020 Journal of Financial Risk Management  
Also, the human resources department of the Banks should institute whistleblowing policy that can assist employees to get a reprieve from a supervisor that may want to influence them using any form of  ...  other employees to commit e-fraud against the Banks.  ...  of the account details to use the account for fraudulent transaction through internal collusion.  ... 
doi:10.4236/jfrm.2020.93012 fatcat:gnttry5clrarhaf3ar3pnl6ltm

International approaches to organizing an internal control system at an enterprise in the digital era

Yulia Klius, Volodymyr Dahl East Ukrainian National University, Yevhen Ivchenko, Anzhelika Izhboldina, Yuliia Ivchenko, Volodymyr Dahl East Ukrainian National University, Volodymyr Dahl East Ukrainian National University, Volodymyr Dahl East Ukrainian National University
2020 Economic Annals-ХХI  
robotization of automated processes, the use of drones or blockchains is highlighted.  ...  The purpose of the study is to analyze the existing approaches to the organization of the internal control system used to effectively support the activities of enterprises in foreign countries and determine  ...  The banking sector is also a target for fraud. Credit card providers have long been using analytics to detect suspicious activities, e.g. large values of overseas transactions.  ... 
doi:10.21003/ea.v185-13 fatcat:cmriqnxhcfarleqtibw5loljfi

Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures

Guma Ali, Mussa Ally Dida, Anael Elikana Sam
2020 Future Internet  
The proliferation of digital financial innovations like mobile money has led to the rise in mobile subscriptions and transactions.  ...  This review study reveals that the current 2FA scheme for mobile money has security gaps that need to be addressed since it only uses a personal identification number (PIN) and a subscriber identity module  ...  The authors extend their appreciations to Muni University and NM-AIST.  ... 
doi:10.3390/fi12100160 fatcat:vc6qoiaf5rdjpi6nqf3j2iam6y

Blockchain, health disparities and global health

Dominique Vervoort, Camila R Guetter, Alexander W Peters
2021 BMJ Innovations  
Various industries have successfully leveraged blockchain technology to disintermediate and reduce costs, but its use in healthcare and global health has remained limited.  ...  Blockchain technology is a novel, distributed peer-to-peer ledger technology that uses unique, immutable and time-stamped blocks of records or sets of data that are linked as chains through cryptography  ...  Device donations are often reported to be dysfunctional, which may cause safety issues with their use in clinical care if not detected in time. 18 Creating a mechanism to track devices and use smart  ... 
doi:10.1136/bmjinnov-2021-000667 fatcat:gqftlpmp4nac5beysud7m5zbhq

Cybersecurity Resilience in Digital Society – the Practical Approach [chapter]

E. Niewiadomska-Szynkiewicz, M. Amanowicz, A. Wronska, P. Kostkiewicz
2021 Internet and New Technologies Law  
They pointed out the importance of cybersecurity certification procedures and conformity assessment schemes for increasing the resilience to cyberthreats.  ...  The authors discuss commonly used protection techniques and mechanisms and safeguard systems to increase society's resilience to cybercrime and give examples of such solutions developed and implemented  ...  Web fraud attempts detection is a set of processes and analyses that identify and prevent unauthorised financial activity.  ... 
doi:10.5771/9783748926979-405 fatcat:a34c6x7hsvbuxau7qyqfmviurq

Stock market scams, shell companies, penny shares, boiler rooms and cold calling: The UK experience

Paul Barnes
2017 International Journal of Law, Crime and Justice  
and prosecutors in taking criminal actions against the perpetrators (usually unauthorised brokers running boiler rooms).  ...  as parties to a fraud or sued for negligence.  ...  They must be up to date in their financial reporting and undergo an annual verification and management certification process.  ... 
doi:10.1016/j.ijlcj.2016.11.001 fatcat:qhyfkktitrddrofbo43dl2i4ei

Towards a Financial Fraud Ontology: A Legal Modelling Approach

John Kingston, Burkhard Schafer, Wim Vandenberghe
2004 Artificial Intelligence and Law  
This document discusses the status of research on detection and prevention of financial fraud undertaken as part of the European Commission funded FF POIROT ( financial fraud prevention oriented information  ...  resources using ontology technology) project.  ...  The ontology should at least be useful to three different and EU-relevant types of user communities: financial professionals : Accountants, auditors, banks, insurance agencies, government departments,  ... 
doi:10.1007/s10506-005-4163-0 fatcat:3fyjovcn7bbcnn3m2mfmagtv4i

A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues [article]

Khizar Hameed, Mutaz Barika, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang
2021 arXiv   pre-print
Blockchain began its journey from the concept of cryptocurrency and is now part of a range of core applications to achieve resilience and automation between various tasks.  ...  We also analyse and provide the classification of different security and privacy techniques used in these applications to enhance the advancement of security features.  ...  The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.  ... 
arXiv:2105.11665v1 fatcat:bsm7w2shjneajp425oddszr6ju

The e-Government digital credentials

Flavio Corradini, Eleonora Paganelli, Alberto Polzonetti
2007 International Journal of Electronic Governance  
Digital identities, profiles and their management enable online interactions and transactions among people, enterprises, service providers and government institutions.  ...  In contrast to security, which is aimed at preventing access by unauthorised outsiders, the other basic privacy principles are primarily aimed at unauthorised use by insiders.  ...  Citizens should be able to use their credentials in internet-based transactions.  ... 
doi:10.1504/ijeg.2007.014341 fatcat:zlniyd657fdejn3lrg6nh4kqea

The online stolen data market: disruption and intervention approaches

Alice Hutchings, Thomas J. Holt
2016 Global crime  
In addition to suspicious credit card transactions, banks and other financial institutions have the capacity to detect other suspicious transactions, such as those undertaken by money mules or for the  ...  Peacock and Friedman 67 suggest that merchants utilise anti-automation technology for online credit card transactions to stop botnets automating credit card transactions.  ... 
doi:10.1080/17440572.2016.1197123 fatcat:2qjuesjsnndlnbpkcvaavkfmsa
« Previous Showing results 1 — 15 out of 461 results