• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • Tagged with
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Three essays on banking agency, opacity, and fragility /

Haggard, K. Stephen. January 2006 (has links)
Thesis (Ph. D.)--University of Missouri-Columbia, 2006. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (March 2, 2007) Vita. Includes bibliographical references.
2

Computer security and the bank security officer : "You are required to render it secure"

Glavin, Howard E. 03 June 2011 (has links)
This thesis has taken an in-depth look into bank computer security, the bank security officer, and "The 1968 Bank Protection Act."To accomplish this, a questionnaire was developed and furnished to all bank members of the Indiana Bankers Association to be responded to by the bank security officers. This document was based on the premise that this bank officer is ill-trained, overworked by unrelated duties, and generally not interested in security."The 1968 Bank Protection Act" made this officer's position a legal requirement to maintain its banking operation and charged this officer with certain duties.The resultant responses verified the original hypothesis and showed a need for future training.This thesis shows the profile of, a computer criminal and also some cases to illustrate the type and scope of criminal ventures related to bank computer facilities. This was all coupled with an analysis of the law as it applies and offers a training vehicle to bring this officer up to a level of competency in this field.Ball State UniversityMuncie, IN 47306
3

An investigation of the bombing of automated teller machines (ATMs) with intent to steal cash content : case study from Gauteng

Sewpersad, Sarika 01 1900 (has links)
An investigation of the bombing of automated teller machines (ATMs) with intent to steal cash contentof ATMs. This is inclusive of the impact on society (banks clients) and banking institutions as well as the danger it poses to the general public and public and private law enforcement personnel. / (M.Tech. (Security Management))
4

An investigation of the bombing of automated teller machines (ATMs) with intent to steal cash content : case study from Gauteng

Sewpersad, Sarika 01 1900 (has links)
An investigation of the bombing of automated teller machines (ATMs) with intent to steal cash contentof ATMs. This is inclusive of the impact on society (banks clients) and banking institutions as well as the danger it poses to the general public and public and private law enforcement personnel. / (M.Tech. (Security Management))

Page generated in 0.1148 seconds