• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 15
  • 1
  • Tagged with
  • 19
  • 19
  • 19
  • 19
  • 8
  • 8
  • 8
  • 7
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

A gab analysis to compare best practice recommendations legal requirements when raising information security awareness amongst home users of online banking

Botha, Carla-Lee 06 1900 (has links)
South African home users of the Internet use the Internet to perform various everyday functions. These functions include, but are not limited to, online shopping, online gaming, social networking and online banking. Home users of online banking face multiple threats, such as phishing and social engineering. These threats come from hackers attempting to obtain confidential information, such as online banking authentication credentials, from home users. It is, thus, essential that home users of online banking be made aware of these threats, how to identify them and what countermeasures to implement to protect themselves from hackers. In this respect, information security awareness (ISA) programmes are an effective way of making the home users of online banking aware of both the threats they face and the countermeasures available to protect themselves from these threats. There are certain legal requirements with which South African banks have to comply when implementing ISA initiatives. Non-compliance or failure to demonstrate due care and due diligence should a security incident occur will result in financial penalties for the bank as well as possible brand damage and loss of customers. Banks implement international best practice recommendations in an effort to comply with legislation. These include recommendations for information security awareness. This research investigated both information security best practice recommendations and information security legal requirements for information security awareness. A selected list of information security best practices was investigated for best practice recommendations while a selected list of information security legislation was investigated for legal requirements imposed on South African banks. A gap analysis was performed on both these recommendations and requirements to determine whether the implementation of best practice recommendations resulted in compliance with legal requirements. The gap analysis found that the implementation of best practice recommendations does not result in compliance with legal requirements. Accordingly, the outcome of this research highlighted the importance of understanding the legal requirements and ensuring that adequate controls are in place with which to achieve compliance. / Business Information systems / Msc. (Information systems)
12

Management information system for bank treasury management in Hong Kong.

January 1991 (has links)
by Simon Leung Tak-wing, Elmen Li Pak-kee. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1991. / Bibliography: leaves 36-38. / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iii / CHAPTER / Chapter I --- INTRODUCTION --- p.1 / Chapter II --- IMPORTANCE OF RISK MANAGEMENT IN BANK MANAGEMENT --- p.4 / Chapter III --- RESEARCH METHODOLOGY OF THE STUDY --- p.7 / Chapter IV --- MANAGEMENT INFORMATION SYSTEM AND TREASURY MANAGEMENT --- p.12 / Chapter V --- IMPLICATIONS OF ADOPTING MANAGEMENT INFORMATION SYSTEM --- p.16 / Chapter VI --- FINDINGS WITH A FEW SELECTED BANKS IN HONG KONG --- p.21 / Chapter VII --- CONCLUSIONS AND OUTLOOK OF MIS IN TREASURY MANAGEMENT --- p.30 / BIBLIOGRAPHY --- p.36
13

Management information systems for a medium sized bank.

January 1987 (has links)
by Lam Siu Mui Elena, Ng Sheung Kwan Natalie. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1987. / Bibliography: leaf 128.
14

A gap analysis to compare best practice recommendations and legal requirements when raising information security awareness amongst home users of online banking

Botha, Carla-Lee 06 1900 (has links)
South African home users of the Internet use the Internet to perform various everyday functions. These functions include, but are not limited to, online shopping, online gaming, social networking and online banking. Home users of online banking face multiple threats, such as phishing and social engineering. These threats come from hackers attempting to obtain confidential information, such as online banking authentication credentials, from home users. It is, thus, essential that home users of online banking be made aware of these threats, how to identify them and what countermeasures to implement to protect themselves from hackers. In this respect, information security awareness (ISA) programmes are an effective way of making the home users of online banking aware of both the threats they face and the countermeasures available to protect themselves from these threats. There are certain legal requirements with which South African banks have to comply when implementing ISA initiatives. Non-compliance or failure to demonstrate due care and due diligence should a security incident occur will result in financial penalties for the bank as well as possible brand damage and loss of customers. Banks implement international best practice recommendations in an effort to comply with legislation. These include recommendations for information security awareness. This research investigated both information security best practice recommendations and information security legal requirements for information security awareness. A selected list of information security best practices was investigated for best practice recommendations while a selected list of information security legislation was investigated for legal requirements imposed on South African banks. A gap analysis was performed on both these recommendations and requirements to determine whether the implementation of best practice recommendations resulted in compliance with legal requirements. The gap analysis found that the implementation of best practice recommendations does not result in compliance with legal requirements. Accordingly, the outcome of this research highlighted the importance of understanding the legal requirements and ensuring that adequate controls are in place with which to achieve compliance. / Business Information systems / Msc. (Information systems)
15

A feasibility study on home-banking in Hong Kong.

January 1984 (has links)
by Vivien W.Y. Pau & Samuel S.K. Wan. / Bibliography: leaves 159-160 / Thesis (M.B.A.)--Chinese University of Hong Kong, 1984
16

Information technology and its economic impacts in Hong Kong with special emphasis on the financial sector.

January 1984 (has links)
by Wong Yiu Chung. / Bibliography: leaves 298-304 / Thesis (M.Ph.)--Chinese University of Hong Kong, 1984
17

Towards a framework to promote the development of secure and usable online information security applications

Mujinga, Mathias 01 1900 (has links)
The proliferation of the internet and associated online activities exposes users to numerous information security (InfoSec) threats. Such online activities attract a variety of online users who include novice computer users with no basic InfoSec awareness knowledge. Information systems that collect and use sensitive and confidential personal information of users need to provide reliable protection mechanisms to safeguard this information. Given the constant user involvement in these systems and the notion of users being the weakest link in the InfoSec chain, technical solutions alone are insufficient. The usability of online InfoSec systems can play an integral role in making sure that users use the applications effectively, thereby improving the overall security of the applications. The development of online InfoSec systems calls for addressing the InfoSec problem as a social problem, and such development must seek to find a balance between technical and social aspects. The research addressed the problem of usable security in online InfoSec applications by using an approach that enabled the consideration of both InfoSec and usability in viewing the system as a socio-technical system with technical and social sub-systems. Therefore, the research proposed a socio-technical framework that promotes the development of usable security for online information systems using online banking as a case study. Using a convergent mixed methods research (MMR) design, the research collected data from online banking users through a survey and obtained the views of online banking developers through unstructured interviews. The findings from the two research methods contributed to the selection of 12 usable security design principles proposed in the sociotechnical information security (STInfoSec) framework. The research contributed to online InfoSec systems theory by developing a validated STInfoSec framework that went through an evaluation process by seven field experts. Although intended for online banking, the framework can be applied to other similar online InfoSec applications, with minimum adaptation. The STInfoSec framework provides checklist items that allow for easy application during the development process. The checklist items can also be used to evaluate existing online banking websites to identify possible usable security problems. / Computer Science / D. Phil. (Computer Science)
18

Usability and Internet-based banking

Van Dyk, Tobias Jan 06 1900 (has links)
Usability refers to the study and measurement of the quality of human-computer interaction. Internet-based banking is a task-oriented, goal-directed, Web-based, E-commerce application where users access and manipulate bank accounts remotely through a Web browser interface. The examination of the usability of this interaction through the distributed medium of the Internet formed the research basis. The aims of the research are to review the application of general usability principles and properties to Internet-based banking, examine existing usability guidelines for hypermedia and Web design, and apply these during a structured evaluation of local and international online banking facilities. The research instrument is a combination of a checklist-based and heuristic evaluation, and is preceded by a task analysis. Three research questions are addressed and solutions suggested. These are related to improving Internet banking usability, finding the best approach for measuring this, and creating an awareness that Web usability is important. / Science / M.Sc. (Informatyion Systems)
19

Usability and Internet-based banking

Van Dyk, Tobias Jan 06 1900 (has links)
Usability refers to the study and measurement of the quality of human-computer interaction. Internet-based banking is a task-oriented, goal-directed, Web-based, E-commerce application where users access and manipulate bank accounts remotely through a Web browser interface. The examination of the usability of this interaction through the distributed medium of the Internet formed the research basis. The aims of the research are to review the application of general usability principles and properties to Internet-based banking, examine existing usability guidelines for hypermedia and Web design, and apply these during a structured evaluation of local and international online banking facilities. The research instrument is a combination of a checklist-based and heuristic evaluation, and is preceded by a task analysis. Three research questions are addressed and solutions suggested. These are related to improving Internet banking usability, finding the best approach for measuring this, and creating an awareness that Web usability is important. / Science / M.Sc. (Informatyion Systems)

Page generated in 0.1302 seconds