A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Inter-Banking Auditing Security Solution For Detecting Unauthorised Financial Transactions Entered By Authorised Insiders
2011
Zenodo
With the above, a security auditing service is designed to detect integrity drifts with and between organizations in order to detect unauthorised financial transactions entered by authorised users. ...
Insider abuse has recently been reported as one of the more frequently occurring security incidents, suggesting that more security is required for detecting and preventing unauthorised financial transactions ...
Authorised users (insiders), e.g. banking employees, have privileges that allow them to access, to operate and to perform financial transactions using the financial services provided by automated banking ...
doi:10.5281/zenodo.1075055
fatcat:w32fe5x5uzan3cbvobibh4uxwm
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example
2013
IOSR Journal of Computer Engineering
Billions of financial data transactions occur online every day and bank cyber crimes take place every day when bank information is compromised by skilled criminal hackers by manipulating a financial institution's ...
But Online banking continues to present challenges to financial security and personal privacy. ...
To protect our accounts against unauthorised access, ICICI bank systems are designed to terminate a secure online session automatically if extended inactivity is detected. ...
doi:10.9790/0661-131114121
fatcat:hpymz2kiebabbcufeyzi2gajxq
Info-Communicative and Protective Function of the State as Combating Fraud using Sberbank Bank Cards
2020
International Journal of Criminology and Sociology
Intensive transformation processes in financial markets, their automation and virtualisation, the spread of remote interaction between banks and their clients, the influence of unauthorised persons on ...
The leading method to study this problem is the method of analysis, which allows to identify and comprehensively consider ways to counter financial crimes in banks to improve the level of financial security ...
a special group/unit in the structure of the banking supervision department to detect financial crimes/scheme transactions in banks. ...
doi:10.6000/1929-4409.2020.09.166
fatcat:wlcjqflgojfq3ittx252o4ligy
DIGITAL FORENSIC TECHNOLOGIES AS E-FRAUD RISK MITIGATION TOOLS IN THE BANKING INDUSTRY: EVIDENCE FROM ZIMBABWE
2014
Risk Governance and Control: Financial Markets & Institutions
The paper investigates digital analytical tools and technologies used in electronic fraud prevention and detection, used in the banking industry. ...
It is concluded that banking institutions should reshape their anti-fraud strategies to be effective by considering fraud detection efforts using advanced analytics and related tools, software and application ...
Whilst, according to survey in Tanzania most of the organisations use the following financial crimes detection mechanisms (50%); risk based internal audits (100%), ongoing risk based transaction monitoring ...
doi:10.22495/rgcv4i2c1art4
fatcat:oawifxb3gbcxhojpia7bocujwe
Cyber-Attacks – Trends, Patterns and Security Countermeasures
2015
Procedia Economics and Finance
Technology is rapidly evolving in a world driven by social networks, online transactions, cloud computing, and automated processes. ...
reported all around the world over the last three years in order to determine patterns and trends in cyber-crime. ...
Introduction In a world driven more and more by big data, social networks, online transactions, information stored or managed via internet and automated processes performed through the use of IT systems ...
doi:10.1016/s2212-5671(15)01077-1
fatcat:mgc5ntj5pzbbbptbytc6agyf5m
E-Fraud in Nigerian Banks: Why and How?
2020
Journal of Financial Risk Management
Also, the human resources department of the Banks should institute whistleblowing policy that can assist employees to get a reprieve from a supervisor that may want to influence them using any form of ...
other employees to commit e-fraud against the Banks. ...
of the account details to use the account for fraudulent transaction through internal collusion. ...
doi:10.4236/jfrm.2020.93012
fatcat:gnttry5clrarhaf3ar3pnl6ltm
International approaches to organizing an internal control system at an enterprise in the digital era
2020
Economic Annals-ХХI
robotization of automated processes, the use of drones or blockchains is highlighted. ...
The purpose of the study is to analyze the existing approaches to the organization of the internal control system used to effectively support the activities of enterprises in foreign countries and determine ...
The banking sector is also a target for fraud. Credit card providers have long been using analytics to detect suspicious activities, e.g. large values of overseas transactions. ...
doi:10.21003/ea.v185-13
fatcat:cmriqnxhcfarleqtibw5loljfi
Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures
2020
Future Internet
The proliferation of digital financial innovations like mobile money has led to the rise in mobile subscriptions and transactions. ...
This review study reveals that the current 2FA scheme for mobile money has security gaps that need to be addressed since it only uses a personal identification number (PIN) and a subscriber identity module ...
The authors extend their appreciations to Muni University and NM-AIST. ...
doi:10.3390/fi12100160
fatcat:vc6qoiaf5rdjpi6nqf3j2iam6y
Blockchain, health disparities and global health
2021
BMJ Innovations
Various industries have successfully leveraged blockchain technology to disintermediate and reduce costs, but its use in healthcare and global health has remained limited. ...
Blockchain technology is a novel, distributed peer-to-peer ledger technology that uses unique, immutable and time-stamped blocks of records or sets of data that are linked as chains through cryptography ...
Device donations are often reported to be dysfunctional, which may cause safety issues with their use in clinical care if not detected in time. 18 Creating a mechanism to track devices and use smart ...
doi:10.1136/bmjinnov-2021-000667
fatcat:gqftlpmp4nac5beysud7m5zbhq
Cybersecurity Resilience in Digital Society – the Practical Approach
[chapter]
2021
Internet and New Technologies Law
They pointed out the importance of cybersecurity certification procedures and conformity assessment schemes for increasing the resilience to cyberthreats. ...
The authors discuss commonly used protection techniques and mechanisms and safeguard systems to increase society's resilience to cybercrime and give examples of such solutions developed and implemented ...
Web fraud attempts detection is a set of processes and analyses that identify and prevent unauthorised financial activity. ...
doi:10.5771/9783748926979-405
fatcat:a34c6x7hsvbuxau7qyqfmviurq
Stock market scams, shell companies, penny shares, boiler rooms and cold calling: The UK experience
2017
International Journal of Law, Crime and Justice
and prosecutors in taking criminal actions against the perpetrators (usually unauthorised brokers running boiler rooms). ...
as parties to a fraud or sued for negligence. ...
They must be up to date in their financial reporting and undergo an annual verification and management certification process. ...
doi:10.1016/j.ijlcj.2016.11.001
fatcat:qhyfkktitrddrofbo43dl2i4ei
Towards a Financial Fraud Ontology: A Legal Modelling Approach
2004
Artificial Intelligence and Law
This document discusses the status of research on detection and prevention of financial fraud undertaken as part of the European Commission funded FF POIROT ( financial fraud prevention oriented information ...
resources using ontology technology) project. ...
The ontology should at least be useful to three different and EU-relevant types of user communities: financial professionals : Accountants, auditors, banks, insurance agencies, government departments, ...
doi:10.1007/s10506-005-4163-0
fatcat:3fyjovcn7bbcnn3m2mfmagtv4i
A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues
[article]
2021
arXiv
pre-print
Blockchain began its journey from the concept of cryptocurrency and is now part of a range of core applications to achieve resilience and automation between various tasks. ...
We also analyse and provide the classification of different security and privacy techniques used in these applications to enhance the advancement of security features. ...
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. ...
arXiv:2105.11665v1
fatcat:bsm7w2shjneajp425oddszr6ju
The e-Government digital credentials
2007
International Journal of Electronic Governance
Digital identities, profiles and their management enable online interactions and transactions among people, enterprises, service providers and government institutions. ...
In contrast to security, which is aimed at preventing access by unauthorised outsiders, the other basic privacy principles are primarily aimed at unauthorised use by insiders. ...
Citizens should be able to use their credentials in internet-based transactions. ...
doi:10.1504/ijeg.2007.014341
fatcat:zlniyd657fdejn3lrg6nh4kqea
The online stolen data market: disruption and intervention approaches
2016
Global crime
In addition to suspicious credit card transactions, banks and other financial institutions have the capacity to detect other suspicious transactions, such as those undertaken by money mules or for the ...
Peacock and Friedman 67 suggest that merchants utilise anti-automation technology for online credit card transactions to stop botnets automating credit card transactions. ...
doi:10.1080/17440572.2016.1197123
fatcat:2qjuesjsnndlnbpkcvaavkfmsa
« Previous
Showing results 1 — 15 out of 461 results