Internet banking security Research Papers (original) (raw)

The development of information technology and internet is influencing all industry sectors including hotel industry. To support the sustainability of business, the hotel has implemented information technology such as: online booking... more

The development of information technology and internet is influencing all industry sectors including hotel industry. To support the sustainability of business, the hotel has implemented information technology such as: online booking system, Wi-fi in the public area, and information system for internal hotel needs.This Information technology is run in the IT infrastructure and connected with local network and internet. To support this technology, the hotel has been doing the procurement of IT devices such as: Server, network devices (switches, routers, etc.) and IT security devices (firewall, antivirus).There is currently no evaluation of how effective and efficient the use of server devices, network devices and security devices IT. Therefore it is necessary to evaluate the information technology implementation at Le Meridien Hotel Jakarta. This evaluation uses the COBIT 4.1 framework. By evaluating the information technology infrastructure at Le Meridien Hotel Jakarta, it is expected to provide input on the effectiveness and efficiency of the use of devices that currently used in the hotel.

Trust, security, and privacy have been factors in many studies, were tested, and do significantly affect the adoption of virtual banking. However, studies with regards to customer perceive trust in relation to virtual banking adoption in... more

Trust, security, and privacy have been factors in many studies, were tested, and do significantly affect the adoption of virtual banking. However, studies with regards to customer perceive trust in relation to virtual banking adoption in Malaysia is limited. Due to low customers' adoption of the internet and mobile banking in Malaysia, this study was conducted to evaluate customers' perception of trusting internet and data security in adopting virtual banking. In this study, 402 samples were collected from local and foreign bank customers and were analyzed using SPSS and AMOS. Sample selection was based on convenience sampling technique, and quantitative method has been applied to evaluate the study objectives. Through the descriptive analysis and research findings, it has been evaluated that that customer perception on Privacy (Pr) does not significantly and positively influence virtual banking adoption in Malaysia. And, the analysis in this study has also proven the hypothesis on Privacy (Pr) to be not valid. However, Privacy (Pr) is found significantly important in many studies. Further analysis showed weak agreement on customers perception with regards to their privacy protection in its' virtual banking platform. However, various study previous conducted have proven Privacy (Pr) to be significant in influencing adoption of virtual banking services. Therefore, perhaps Malaysian local banks should also focus on improving its' virtual banking strategy with regards to Privacy (Pr). The results obtained in this study are limited to questionnaires distributed within the Klang Valley. Future researchers may expand its boundary by taking a diverse sample and including qualitative approach.

With the phenomenal growth of B2C e-commerce, most industries including banking and financial services sector have been influenced, in one way or another. Several studies suggest that customers have not adopted B2C e-commerce in the same... more

With the phenomenal growth of B2C e-commerce, most industries including banking and financial services sector have been influenced, in one way or another. Several studies suggest that customers have not adopted B2C e-commerce in the same degree primarily because of risk concerns and trust-related issues. This paper extends an area of information systems research into a marketing of financial services context by looking into the element of trust and risk in e-banking. A conceptual model of trust in e-banking is proposed with two main antecedents that influence customer's trust: perceived security and perceived privacy. The antecedent variables are moderated by the perceived trustworthiness attributes of the bank, which includes benevolence, integrity and competence. Trust is being defined as a function of the degree of risk involved in the e-banking transaction, and the outcome of trust is proposed to be reduced perceived risk, leading to positive intentions towards adoption of e-banking. 

Modern cyber defense requires a realistic and thorough understanding of web application security issues. Anyone can learn to sling a few web hacks, but web application penetration testing requires something deeper. Major web application... more

Modern cyber defense requires a realistic and thorough understanding of web application security
issues. Anyone can learn to sling a few web hacks, but web application penetration testing
requires something deeper. Major web application flaws and their exploitation, a field-tested and
repeatable process to consistently finding these flaws and convey them will be discussed in this
article. Modern attacks principles will be analyzed on purpose to create the most sufficient
penetration tests.

Security is one of the key aspects in despite of time, location and domain. Providing a better security is an essential obligation to all sectors (state and private) and workers. Rendering better security is not only difficult but also... more

Security is one of the key aspects in despite of time, location and domain. Providing a better security is an essential obligation to all sectors (state and private) and workers. Rendering better security is not only difficult but also fairly impossible due to growth of new technologies and constantly growing Information Technology domain. Rapid Improvement of banking sector provides many acceptable ways of managing the accounts, information and activities. This advancement has been a main driving force to the account activities with the help of Automatic Teller Machine (ATM). With the increase number of ATM usage among the public, hackers also use the technological growth to hack the data / information and apply the fraud actions. The said vulnerabilities have been increasing in a gradual manner and also ATM fraud has spread and become nightmare all around the world. This paper elaborates to mitigate the possible frauds can be happened at the ATM cubical with the hybrid multi-layered security concept. Here, previous studies were reviewed and compared in order to support to develop a system with the less loopholes. A three-layered architecture including PIN, OTP or finger print and pattern lock has been used in this system to mitigate the frauds. 400 students were selected to test the system and 384 students roughly 96% of students have successfully entered their pin number at the first attempt, in the second layer 95% of the students out of 384 students were succeeded and the third layer 99% of the students out of 363 students were success in drawing the patterns. The overall result of this evaluation process shows that, the suggested security tiers can be applicable since the accuracy in performance is better and accepted by the sample selected.

Electronic commerce) involves buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, predominantly the Internet. E-commerce (Electronic commerce) is a paradigm shift influencing both... more

Electronic commerce) involves buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, predominantly the Internet. E-commerce (Electronic commerce) is a paradigm shift influencing both marketers and the customers. Rather e-commerce is more than just another way to boost the existing business practices. It is leading a complete change in traditional way of doing business. This significant change in business model is witnessing a tremendous growth around the globe and India is not an exception. A massive internet penetration has added to growth of E-commerce and more particularly start-ups have been increasingly using this option as a differentiating business model. Moreover, E-Commerce has significant influences on the environment. Although the model is highly used in current business scenario but the option has not been explored at its fullest. The current research has been undertaken to describe the scenario of E-Commerce, analyze the trends of E-Commerce. The study further examines the key variables imperative for the success of E-commerce business models.

Along with the development of the Internet in Indonesia, the Internet Banking service has an added value for banks in Indonesia in providing the best service to its customers. With a growing number of banks offering Internet Banking... more

Along with the development of the Internet in Indonesia, the Internet Banking service has an added value for banks in Indonesia in providing the best service to its customers. With a growing number of banks offering Internet Banking facility caused the competitive rivalry between banks. This study aims to determine the effect on the perception of benefits, Perceived Ease, Perceived Risk, Security and Trust in Interests In Using Internet Banking at PT. Bhakti Utama Kharisma. The research method is quantitative model TAM (Technology Acceptance Model). The data used in this study are primary data. The data collection is done by using a questionnaire. Regression analysisusing the test using SPSS. This study showed that variables simultaneously Perceived Benefits, Perceived Ease, Perceived Risk, Security and Trust significantly affect the Customer Interests in Using Internet Banking.

With the phenomenal growth of B2C e-commerce, most industries including banking and financial services sector have been influenced, in one way or another. Several studies suggest that customers have not adopted B2C e-commerce in the same... more

With the phenomenal growth of B2C e-commerce, most industries including banking and financial services sector have been influenced, in one way or another. Several studies suggest that customers have not adopted B2C e-commerce in the same degree primarily because of risk concerns and trust-related issues. This paper extends an area of information systems research into a marketing of financial services context by looking into the element of trust and risk in e-banking. A conceptual model of trust in e-banking is proposed with two main antecedents that influence customer's trust: perceived security and perceived privacy. The antecedent variables are moderated by the perceived trustworthiness attributes of the bank, which includes benevolence, integrity and competence. Trust is being defined as a function of the degree of risk involved in the e-banking transaction, and the outcome of trust is proposed to be reduced perceived risk, leading to positive intentions towards adoption of e-banking. 

With the phenomenal growth of B2C e-commerce, most industries including banking and financial services sector have been influenced, in one way or another. Several studies suggest that customers have not adopted B2C e-commerce in the same... more

With the phenomenal growth of B2C e-commerce, most industries including banking and financial services sector have been influenced, in one way or another. Several studies suggest that customers have not adopted B2C e-commerce in the same degree primarily because of risk concerns and trust-related issues. This paper extends an area of information systems research into a marketing of financial services context by looking into the element of trust and risk in e-banking. A conceptual model of trust in e-banking is proposed with two main antecedents that influence customer's trust: perceived security and perceived privacy. The antecedent variables are moderated by the perceived trustworthiness attributes of the bank, which includes benevolence, integrity and competence. Trust is being defined as a function of the degree of risk involved in the e-banking transaction, and the outcome of trust is proposed to be reduced perceived risk, leading to positive intentions towards adoption of e-banking.

[Abstract: Despite the increasing number of online users and products that are being offered on the Web, there is relatively little work that specifically examines the role of gender and educational level on the attitudes of Internet... more

[Abstract: Despite the increasing number of online users and products that are being offered on the Web, there is relatively little work that specifically examines the role of gender and educational level on the attitudes of Internet users in the Bangladesh context. Our findings reveal that there is a general consensus amongst Singaporeans that the Internet is a convenient medium for information search or making purchases. The better-educated respondents seem to be less concerned with security issues. They also perceive that Internet shopping provides better prices and more cost savings. Females indicate a strong dislike for not being able to savour a physically fulfilling shopping experience online.]

Localization attacks, in which IP addresses located as sensors comprising Darknet systems are detected, are well-known. Attackers can detect sensors in secret by sending probing traffic with concealed signals to the target network. In... more

Localization attacks, in which IP addresses located as sensors comprising Darknet systems are detected, are well-known. Attackers can detect sensors in secret by sending probing traffic with concealed signals to the target network. In response to this, we have developed countermeasures using a dynamic monitoring method, in which there is a dynamic switchover of sensors reflected in the published monitoring results. In this study, we will consider a case wherein the attacker is attempting to embed concealed signals between multiple ports within one sensor. Therefore, we propose a countermeasure method in which there is dynamic monitoring of each destination port. In this paper, we have verified the impact on publishable monitoring results when applying the proposed method to the nicter Darknet in Japan.