• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • Tagged with
  • 13
  • 13
  • 13
  • 13
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Factors impacting the adoption of biometric authentication in the local banking sector

Pooe, Antonio 08 November 2011 (has links)
M.Tech. / This research is concerned with establishing the causes for the slow adoption of biometric authentication in the South African banking sector and constitutes exploratory research. It looks at the widely accepted means of authentication and delves deeper into why these modes may not be sufficient to protect sensitive data. The scope of the research is limited to the banking sector only. The first sections of the study establish what the biometric authentication norms are amongst international banking institutions. This is then followed by an environmental study of the South African approach to biometric authentication. Owing to the limited number of banks in South Africa compared to developed countries, the study is limited to the four major banking institutions in South Africa, namely ABSA, Standard Bank, Nedbank and First National Bank. An online survey was used to gather the required data for analysis. The general approach adopted to investigate the extent to which biometric authentication is used by the said four banks was to first measure the respondents’ knowledge of biometrics and to establish the level of exposure the respondents had to the said technology. The next step was then to establish the extent to which the participating banks had investigated the use of biometric authentication. This was followed by consideration of the current use of biometric authentication and lastly, the future use and user perceptions regarding various aspects of biometric authentication in the financial services sector. A matrix that identifies the factors perceived to be impacting the adoption of biometric authentication concludes the last chapter on user perception.
2

The impact of securitisation on the effectiveness of the bank lending channel in South Africa

10 June 2014 (has links)
M.Com. (Financial Economics) / This study analyses the existence of a bank lending channel in South Africa and investigates the impact of the securitisation activity on the effectiveness of the bank lending channel during the period 2001–2010 using data from the South African banking sector. Structural Vector Auto Regression (SVAR) and Structural Vector Error Correction Model (SVECM) methods are used to interpret the impulse responses of bank lending to structural shocks (monetary policy) and to securitisation. The conclusion is that the bank lending channel is present and efficient in South Africa during the sample period with a lag and that securitisation acts as a shield against monetary impulses by constituting an additional source of funding for banks.
3

Beatrix: a model for multi-modal and fine-grained authentication for online banking

Blauw, Frans Frederik 26 June 2015 (has links)
M.Sc. (Information Technology) / Please refer to full text to view abstract
4

Governance responses to hacking in the banking sector of South Africa : an exploratory study

Roos, Christiaan J. 20 November 2013 (has links)
D.Comm. (Auditing) / Organisations today are critically dependent on IT to enable business operations and ensure competitiveness in a growing international marketplace. At the same time, IT also introduces significant risks, such as hacking. The board of directors is ultimately responsible for mitigating IT risk as a component of business risk. This task is included in its corporate governance responsibilities, which, in the South African context, is underpinned by the King Code of Corporate Governance. The board of directors also plays a key role in identifying and enabling the most appropriate responses to IT risk, including hacking. This inevitably necessitates greater focus on and understanding of risks such as hacking. The determined and elusive nature of hackers makes them a significant threat to organisations today. Not only are hackers characterised by various profiles and motives, but they are also exceptionally skilled in exploiting weak security practices and software vulnerabilities, with attack techniques which range from non-technical social engineering to advanced technical attacks and exploits. Hackers are role-players in cybercrime and cyber warfare, as is evident from the media and information security survey results explored in this thesis, in particular within the banking sector, which is the financial backbone of the country. It is for this reason that the South African banking sector has been selected as the target population for this study. This study considers the meaning and nature of hacking, viewing it as either a risk or an event, which requires preventative or detective responses. The effect of hacking on business risks is explored next by identifying common business risks and common IT risks themes, where after the fundamental links between hacking and the IT risk themes are established. This study further argues that business risks are increased by IT risks, which implies that, by indirect association, business risks are increased by hacking. A response to this threat is required, in particular from a governance perspective, with the board of directors playing a fundamental role in supporting the appropriate responses. This study explores the advantages and disadvantages of various responses to hacking, highlighting the point that most traditional responses are not effective enough in fully mitigating the hacking threat. It is argued that ethical hacking is an effective response to the threat of hacking. The nature of ethical hacking is explored, including its objectives, motivation, advantages and disadvantages. The multi-faceted nature of the ethical hacking response is also considered. In order to explore the risks and responses to hacking in the banking sector in South Africa, an analysis of annual reports was conducted and two questionnaires were administered. The analysis of the annual reports of the 16 locally registered banks in South Africa highlighted differences in disclosure practices around IT risk, IT governance and hacking. This was followed by empirical testing in the local banking sector, by using a mixed-method approach in order to solicit mostly quantitative, but also qualitative, responses from company secretaries and individuals responsible for IT at the 16 locally registered banks. The results of the questionnaires indicated that the board of directors is not fully embracing its IT governance responsibilities and that IT matters are mostly dealt with by risk management committees at board level or IT steering committees at executive management level. The effect of IT risks on business risks such as human resource risk and physical risk is underestimated. Respondents were unclear about the effect of hacking on IT risks, such as IT human resource risk and lack of software development. The local banking sector is not fully aware of how hacking can affect organisations, and banks are not making enough use of ethical hacking as a response to the hacker threat. This is the first study of its kind to explore ethical hacking in the context of governance responses. The study breaks new ground by providing a unique in-depth analysis of the link between business risk, IT risk and hacking. It is also the first study into the various responses to hacking in the SA banking sector and will assist not only the banking industry but business at large in defining appropriate preventative and detective responses to hacking.
5

Information security in a distributed banking environment, with specific reference to security protocols.

Van Buuren, Suzi 22 August 2012 (has links)
M.Comm. / The principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment and the security functionality needed to ward off these threats. Security solutions for each area at risk will be provided in short. The main focus of the dissertation will fall on the security protocols that can be used as solutions to protect a banking system. In the dissertation, indication will also be given of what the security protocols, in their turn, depend on to provide protection to a banking system. There are several security protocols that can be used to secure a banking system. The problem, however, is to determine which protocol will provide the best security for a bank in a specific application. This dissertation is also aimed at providing a general security framework that banks could use to evaluate various security protocols which could be implemented to secure a banking system. Such framework should indicate which security protocols will provide a bank in a certain banking environment with the best protection against security threats. It should also indicate which protocols could be used in combination with others to provide the best security.
6

The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship

Kleynhans, Stefan Anton. 12 1900 (has links)
The Internet has had and will continue to have a major impact in the way in which banking business is conducted. This dissertation primarily considers the allocation of risks associated with Internet banking and in doing so considers the role of trade usage in Internet banking. The question of what the Internet is and more specifically what constitutes Internet banking is addressed. In order to have an understanding of the allocation of risks in Internet banking a good understanding of the traditional bank-customer relationship is necessary. The contractual basis for this relationship is discussed. The duties of the bank and the customer are discussed. In this regard the duty of a bank to act in terms of its customers mandate, the banks duty of confidentiality and the customers duty to exercise reasonable care are considered. The concept of a customer is briefly discussed. As trade usage plays a significant role in the contract between the bank and its customer, attention is given to the requirement for the recognition of a trade usage generally and more particularly in South Africa. The effect of Internet banking on the traditional bank-customer relationship is considered. The fact that a bank is still required to act in terms of its customer's mandate but is unable to identify is examined. As most Internet banking contracts impose an obligation on the customer to take security precautions and also limit the liability of banks, consideration is finally given to the possibility that the practices of banks in regard to Internet banking may have acquired the status of trade usage in this particular sphere of banking. / LL.M. (Banking Law)
7

Computer security and the bank security officer : "You are required to render it secure"

Glavin, Howard E. 03 June 2011 (has links)
This thesis has taken an in-depth look into bank computer security, the bank security officer, and "The 1968 Bank Protection Act."To accomplish this, a questionnaire was developed and furnished to all bank members of the Indiana Bankers Association to be responded to by the bank security officers. This document was based on the premise that this bank officer is ill-trained, overworked by unrelated duties, and generally not interested in security."The 1968 Bank Protection Act" made this officer's position a legal requirement to maintain its banking operation and charged this officer with certain duties.The resultant responses verified the original hypothesis and showed a need for future training.This thesis shows the profile of, a computer criminal and also some cases to illustrate the type and scope of criminal ventures related to bank computer facilities. This was all coupled with an analysis of the law as it applies and offers a training vehicle to bring this officer up to a level of competency in this field.Ball State UniversityMuncie, IN 47306
8

The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship

Kleynhans, Stefan Anton. 12 1900 (has links)
The Internet has had and will continue to have a major impact in the way in which banking business is conducted. This dissertation primarily considers the allocation of risks associated with Internet banking and in doing so considers the role of trade usage in Internet banking. The question of what the Internet is and more specifically what constitutes Internet banking is addressed. In order to have an understanding of the allocation of risks in Internet banking a good understanding of the traditional bank-customer relationship is necessary. The contractual basis for this relationship is discussed. The duties of the bank and the customer are discussed. In this regard the duty of a bank to act in terms of its customers mandate, the banks duty of confidentiality and the customers duty to exercise reasonable care are considered. The concept of a customer is briefly discussed. As trade usage plays a significant role in the contract between the bank and its customer, attention is given to the requirement for the recognition of a trade usage generally and more particularly in South Africa. The effect of Internet banking on the traditional bank-customer relationship is considered. The fact that a bank is still required to act in terms of its customer's mandate but is unable to identify is examined. As most Internet banking contracts impose an obligation on the customer to take security precautions and also limit the liability of banks, consideration is finally given to the possibility that the practices of banks in regard to Internet banking may have acquired the status of trade usage in this particular sphere of banking. / LL.M. (Banking Law)
9

Information protection in the digital banking environment

Redlinghuis, André Jacques 01 August 2012 (has links)
M.A. / The evolution of the Internet has led to the establishment of various value-adding products and services such as Internet banking (IB). Internet banking has changed the formal banking landscape forever. Some may argue that Internet banking has positively affected the lives of many, through providing services in a more convenient, efficient and effective manner, 365 days a year. However, the growth of the Internet has lead to the increase of various Information Technology (IT) problems and challenges. Today, individuals and organisations are faced with an increasing number of attacks via computer and Internet viruses, phishing scams and Internet hackers. Individuals and organisations must place greater emphasis on ensuring that their financial well-being is protected. The investment in adequate software and hardware has become critical to conduct financial transactions securely via the Internet. The level of security awareness should also be increased and established at various levels through comprehensive educational programmes. Extensive Internet banking awareness campaigns have been launched, but the level to which these campaigns are successful is uncertain. The main focus of this dissertation is to understand Internet banking customers’ perceptions on information protection when using Internet banking services and products, as various factors influence the perceptions of trust with regards to Internet banking. Trust is formed through a variety of factors from the influence of others on our own beliefs and values, to the experiences gained by using specific technology or processes over a particular period of time. An in-depth literature review forms the basic framework for the dissertation and is followed by an empirical component. The main goal of the literature review is to provide a solid theoretical framework and basis from which to conduct the empirical research. Chapters 2 to 4 delve into the evolution and development of the Internet and provide a perspective on the South African banking landscape. The various challenges the Internet banking domain is faced with, is explored, and the various opportunities that exist are extensively discussed. Trust, the major factor influencing the adoption of Internet banking services and products, is explored, and the factors that shape and diminish trust are discussed. The empirical study consisted of a close-ended questionnaire that was completed by a sample of University of Johannesburg (UJ) alumni. The study included 138 individuals who completed the close-ended questionnaire and the results were analysed by Statistical Consultation Services (StatCon), a statistical research unit within UJ. The results indicate that more should be done to ensure that individuals and businesses are well-versed on issues pertaining to Internet banking security and safety. The results further highlight that the quality of most of the individuals’ relationships with their formal bank branch diminished due to Internet banking. An interesting finding was that 80.7% of the respondents indicated that they would make use of Internet banking services and products, even though they are aware of fraudulent activities that take place via this Internet medium. The research findings provide financial institutions with valuable guidelines on how to plan and implement effective and efficient Internet banking education and awareness strategies.
10

White collar crime: major bank fraud cases inHong Kong

Wong, Yuk-see., 黃玉司. January 1990 (has links)
published_or_final_version / Sociology / Master / Master of Social Sciences

Page generated in 0.1272 seconds