71 |
Bankkontorens existens : en studie om online-bankings påverkan på fysiska bankkontorGreen, Rebecka, Johansson, Cecilia January 2015 (has links)
Syfte: Syftet med denna studie är att identifiera hur framfarten av online-banking påverkar de fysiska kontoren. Metod: Vår studie har genomförts med en kvalitativ metod och en abduktiv ansats. Valet av datainsamlingsmetod resulterade i semistrukturerade intervjuer. Urvalet för respondenterna har varit litet med bara 9 respondenter. Respondenterna valdes strategiskt och utefter vad som fanns att tillhandahålla. Vi använder både personal på bankkontor och bankkunder. Teoretiskt referensram: Utgångspunkten för vår studie är tidigare genomförd forskning på relaterade ämne. Även beslutsteorier och forskning om hur individer reagerar på förändring har legat till grund för vår studie. Dessutom använder vi oss av teorin diffusion of an innovation. Slutsats: Resultatet av denna studie blev att vi identifierade ett cirkulärt händelseförlopp när det gäller förhållandet mellan online-banking och bankkontor. Utefter analyser av de semistrukturerade intervjuerna kom vi även fram till att de fysiska bankkontoren fortfarande behövs både ur kunders och bankers perspektiv. / Purpose: The purpose with this study is to identify how the online-banking services has a impact on the physical branch offices. Methodology: The research strategy for our study has been of a qualitative nature and with a abductive approach. We have been using semi-structured interviews to collect our empirics. Our selection of respondents is fairly small with only 9 respondents. There has been an strategic selection of respondents. We are using both staff at branch office and banking customers. Theoretical Approach: The base for our study is earlier research on similar subjects. We have also been using decision making theories and proven research about how individuals react on changes. Furthermore, we are using the diffusion of innovation theory. Conclusions: The result of our study is that we identified a circular course of event that describe the relationship between online-banking services and bank offices. The analysis that was made on the semi-structured interviews shows that the branch offices still is desirable both from customers and from banks.
|
72 |
Factors that influence the adoption of internet banking by South Africans in the eThekweni metropolitan regionWu, Jun January 2005 (has links)
Thesis (M.Tech.: Marketing)-Dept. of Marketing, Durban Institute of Technology, 2005
xviii, 161 leaves / Information technology is fundamentally changing the banking industry worldwide. The advent of internet banking offers banking firms a new frontier of opportunities and challenges. An understanding of how demographic characteristics, social factors, and consumer perceptions and attitudes towards internet banking influence the adoption of internet banking can allow banks to create solutions and plans to attract consumers to their internet banking services, thus enabling them to gain a greater share in the banking market. In South Africa little is known and understood about the emergence of internet banking even though this is now beginning to represent an important share of the banking market. This is because internet banking is a new industry here, and so consumer acceptance and use of internet banking is still limited. To date very little research has been conducted into factors which influence consumer adoption of internet banking, and so therefore there is a need for a study such as this.
This study investigates attitudes of retail banking customers in South Africa, specifically in the Ethekweni metropolitan region, towards the adoption of internet banking.
|
73 |
Técnicas baseadas em grafos para priorização de investigações policiais de fraudes bancárias eletrônicas / Techniques based on graph for prioritisation investigations fraud cops banking electronicPatrocínio, Álex Moreira do 09 December 2016 (has links)
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2016. / Submitted by Camila Duarte (camiladias@bce.unb.br) on 2017-02-08T14:03:25Z
No. of bitstreams: 1
2016_AlexMoreiradoPatrocínio.pdf: 12525561 bytes, checksum: 54fc7d3d4f41b7c4c4e02ca6f0e392fd (MD5) / Approved for entry into archive by Raquel Viana(raquelviana@bce.unb.br) on 2017-04-19T21:22:19Z (GMT) No. of bitstreams: 1
2016_AlexMoreiradoPatrocínio.pdf: 12525561 bytes, checksum: 54fc7d3d4f41b7c4c4e02ca6f0e392fd (MD5) / Made available in DSpace on 2017-04-19T21:22:19Z (GMT). No. of bitstreams: 1
2016_AlexMoreiradoPatrocínio.pdf: 12525561 bytes, checksum: 54fc7d3d4f41b7c4c4e02ca6f0e392fd (MD5) / Ao longo dos últimos anos, a Polícia Federal do Brasil (PF) vem concentrando esforços para elucidar crimes de fraudes bancárias praticados contra a empresa pública e instituição financeira da Caixa Econômica Federal (CAIXA). A elucidação desses crimes é uma atribuição da PF, prevista na Constituição Federal do Brasil em seu artigo 144 § 1º. A abordagem proposta neste trabalho, denominada Kraken, é aprimorar o modelo de investigação existente utilizando-se de grafos e da análise de vínculos para auxiliar às técnicas de investigação da PF. O Kraken trata, em específico, de investigações contra fraudes eletrônicas relativas a transferência de valores entre contas bancárias. Para aplicar a abordagem do Kraken, foi necessária a criação de um ferramental que processe toda a informação contida na Base Nacional de Fraudes Bancárias Eletrônicas (BNFBE) e a transforme em grafos conexos, que representem os atores e seus relacionamentos (vínculos) na ação delitiva desse tipo de fraude. Para a realização desse trabalho tivemos acesso a um conjunto dos dados da BNFBE. O objetivo desse ferramental é servir como uma Interface Gráfica (IG) para que o investigador Policial Federal possa verificar os resultados do processamento da abordagem do Kraken em um formato de tabela, onde cada registro represente um grafo referente a um conjunto de atores e vínculos envolvidos na ação delitiva. É na IG do Kraken que o Policial Federal consegue reordenar a tabela que contém as investigações/grafos em ordem decrescente de métricas objetivas, como: quantidade de vítimas, pessoas beneficiadas e valor total das fraudes existentes em cada grafo gerado pelo Kraken. A principal hipótese é que com o reordenamento dos grafos, baseado nessas métricas objetivas, possa-se priorizar as investigações criminais a serem analisadas pela PF. A IG permite selecionar um grafo específico da tabela para ser exportado e visualizado no Analyst´s Notebook da IBM. Com a abordagem do Kraken e sua IG, espera-se diminuir a necessidade de interferência humana (investigador policial) nos relatórios de análise dos crimes e, consequentemente, acelerar as investigações da PF. / Over the last few years the Federal Police of Brazil (PF) has concentrated efforts to elucidate crimes of bank fraud committed against Caixa Econômica Federal (CAIXA) a public company and financial institution. The elucidation of these crimes is an attribution of the PF, provided for in the Federal Constitution of Brazil in its article 144 § 1º. The approach presented in this work, denominated Kraken, proposes to improve the existing research model, using graphs and link analysis, to assist in the investigation techniques of the PF. Kraken deals in particular with investigations into electronic fraud involving transfer of securities between bank accounts. In order to apply Kraken's approach it was necessary to create a tool to process all the information contained in the National Electronic Banking Fraud Database (BNFBE) and to transform it into related graphs that represent the actors and their relationships (links) in the criminal act of this type of fraud. For this work we had access to a set of BNFBE data. The objective of this tool is to serve as a Graphic Interface (IG) so that the Federal Police investigator can verify the results of the processing of the Kraken approach in a table format, where each record represents a graph referring to a set of actors and movements involved in the crime scene. In Kraken's IG the Federal Police officer can rearrange the table containing the investigations / graphs in descending order of objective metrics such as: number of victims, persons who have profited from crime and total value of frauds in each graph generated by Kraken. The main hypothesis is that with the rearrangement of the graphs, based on these objective metrics, it is possible to prioritize the criminal investigations to be analyzed by the PF. The IG allows to select a specific graph of the table to be exported and viewed on IBM's Analyst's Notebook. With the approach of Kraken and its IG, it is hoped that the need for human interference (police investigator) will be reduced in the crime analysis reports and, consequently, further accelerate investigations in the PF.
|
74 |
DAP (Dynamic Authorization Protocol) : uma abordagem segura out-of-band para e-bank com um segundo fator de autenticação visual / DAP (Dynamic Authorization Protocol) : secure approach out-of-band for e-bank with a two factor visual authenticationMelo, Laerte Peotta de 15 August 2012 (has links)
Tese (Doutorado)–Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2012. / Submitted by Liliane Simões (miix007@gmail.com) on 2013-04-12T13:43:44Z
No. of bitstreams: 1
2012_LaertePeottadeMelo.pdf: 7566808 bytes, checksum: 6812902c6f617269fdaa86f3f266ee8c (MD5) / Approved for entry into archive by Guimaraes Jacqueline(jacqueline.guimaraes@bce.unb.br) on 2013-04-29T15:01:24Z (GMT) No. of bitstreams: 1
2012_LaertePeottadeMelo.pdf: 7566808 bytes, checksum: 6812902c6f617269fdaa86f3f266ee8c (MD5) / Made available in DSpace on 2013-04-29T15:01:24Z (GMT). No. of bitstreams: 1
2012_LaertePeottadeMelo.pdf: 7566808 bytes, checksum: 6812902c6f617269fdaa86f3f266ee8c (MD5) / A comodidade gerada pelos serviços eletrônicos torna seu uso cada vez mais demandado e sua segurança constantemente colocada a prova, seja pela disponibilidade das informações, da integridade dos documentos acessados e armazenados e da confidencialidade, fator preponderante na garantia do sigilo e privacidade. Com números e tendências de crescimento, os modelos de segurança não evoluíram juntamente com a tecnologia de acesso. O incremento da sofisticação das técnicas de ataques aos sistemas de seguranças, tem desafiado pesquisadores e organizações a produzir novas soluções,onde os usuários tenham liberdade de mobilidade e acesso, que essas soluções não protejam apenas alguns sistemas proprietários, ou que restrinjam o uso a determinados navegadores e suas versões, difíceis de proteger e de administrar, onde a identificação da origem da conexão ou modelos de hardwares e suas versões de softwares não sejam impedimentos ao acesso seguro e eficiente. Utilizando um telefone inteligente e confiável, e possível determinar um modelo seguro para a identificação e autenticação de um usuário. Associando um desafio de autorizar uma mensagem especifica, através de um código único para cada mensagem. O usuário, pode então capturar essa mensagem, através de um computador não confiável, responder ao desafio. A câmera do telefone do usuário e usada para decifrar o desafio através de um código visual (Ex.QRCode). Neste trabalho e proposto um protocolo de autorização dinâmico que possua uma abordagem out-of-band e off-line para acesso seguro a sistemas de Internet Banking com um segundo fator visual de autenticação. _______________________________________________________________________________________________________ ABSTRACT / The convenience generated by electronic services its use becomes increasingly demanding1and constantly put their security proof, is the availability of information on1the integrity of documents stored and accessed and confidentiality, major factor in ensuring the confidentiality and privacy. With numbers and growth trends, the security models have not evolved along with technology access. The increasing sophistication1of attack techniques to system security, has challenged researchers and organizations1to produce new solutions, where users have the freedom of mobility and access, these solutions not only protecting some proprietary systems, or restricting the use of certain1browsers and their versions, difficult to secure and manage, where the identification of the connection origin or hardware models and software versions are not impediments1to access to safe and efficient. Using a true Smartphone, you can determine a safe model for identifying and authenticating a user. Combining a challenge to authorize1a specific message, using a unique code for each message. The user can then capture this message and, using a entrusted computer, answer the challenge. The user camera phone is used to decipher the challenge, capturing a visual code (QR-Code). The proposed authorization protocol having a dynamic approach out-of-band and offline to secure access to Internet Banking with a second factor visual authentication.
|
75 |
Elementos de sustentação da efetividade do uso da certificação digital em aplicações de Internet Banking : estudo de caso em uma instituição pública bancária / Elements to support the effectiveness of the use of certification in digital applications of Internet Banking : case study in a Public Institution BankScrócaro, Rúbia 15 July 2013 (has links)
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia,
Departamento de Engenharia Elétrica, 2013. / Submitted by Albânia Cézar de Melo (albania@bce.unb.br) on 2013-11-11T14:59:36Z
No. of bitstreams: 1
2013_RubiaScrocaro.pdf: 1141184 bytes, checksum: 58a0287bf969e61f0ee168acf3846245 (MD5) / Approved for entry into archive by Guimaraes Jacqueline(jacqueline.guimaraes@bce.unb.br) on 2013-11-13T14:34:37Z (GMT) No. of bitstreams: 1
2013_RubiaScrocaro.pdf: 1141184 bytes, checksum: 58a0287bf969e61f0ee168acf3846245 (MD5) / Made available in DSpace on 2013-11-13T14:34:37Z (GMT). No. of bitstreams: 1
2013_RubiaScrocaro.pdf: 1141184 bytes, checksum: 58a0287bf969e61f0ee168acf3846245 (MD5) / Esta dissertação apresenta uma análise dos elementos de sustentação da efetividade do uso do certificado digital em aplicações de Internet Banking, com estudo de caso de uma Instituição Pública Bancária, com nome fictício de Banco Capital. O Banco Capital, para implementar o projeto certificado digital no Internet Banking, adotou
uma solução de framework de certificado digital que assina e verifica a assinatura digital em documento eletrônico, requisição carimbo de tempo de uma autoridade certificadora, válida o certificado digital e sua correspondente cadeia de certificação e gerencia as listas de certificados revogados. O presente trabalho foi desenvolvido com embasamento em pesquisas do setor bancário e revisões de literatura relacionadas ao tema, com a finalidade de analisar se a solução de framework de certificado digital trata os elementos suficientes que garantem a sustentação da
efetividade do projeto na Instituição.
O projeto certificado digital no Internet Banking está em fase de testes, o piloto está disponível para os acessos de empregados do banco, com previsão de expansão para todos os clientes. Durante a realização do estudo, a solução de framework de certificado digital apresentou características não satisfatórias em relação às considerações apontadas pelos autores. Uma proposta com recomendações é sugerida em forma de plano de ação. ______________________________________________________________________________ ABSTRACT / This paper presents an analysis of the elements supporting the effectiveness of using the digital certificate in Internet Banking applications, with case study of a Public Bank, with real name of Bank Capital.
The Capital Bank, to implement the project digital certificate in Internet Banking, adopted a solution framework digital certificate that signs and verifies the digital signature on an
electronic document, requests the time stamp of a certification authority, validates the digital certificate and its corresponding certificate chain and manages the certificate revocation lists. This work was developed with grounding in research in banking and literature reviews related to the topic, in order to examine whether the solution framework of the digital certificate is sufficient to ensure the support of the effectiveness of the project in the institution. The project digital certificate in Internet Banking is in the testing phase, the pilot is available
for access to bank employees, with expected expansion to all customers. During the study, the solution framework of digital certificate presented unsatisfactory characteristics in relation to the considerations mentioned by authors. A proposal with recommendations is suggested in the form of an action plan.
|
76 |
Critérios de avaliação da qualidade da informação em sistemas de internet banking / Factors for information quality evaluation in internet banking systemsAlexandre Mattar 30 November 2007 (has links)
Diariamente surgem novas aplicações de sistemas baseados na internet, influenciando a forma como vivemos, trabalhamos e interagimos na sociedade. No entanto, a maioria dos sistemas é elaborada com base no senso comum e intuição, raramente utilizando conceitos de avaliação da qualidade da informação provida pelos websites. Numa tentativa de aprofundar mais este tipo de metodologia, este estudo faz uma adaptação ao modelo de avaliação de qualidade da informação de websites, proposto por Kim, Kishore e Sanders (2005), para avaliar de sistemas de internet banking. Foi realizado um levantamento entre alunos de graduação, com o objetivo de se verificar a aderência do modelo à sistemas de internet banking, bem como critérios factíveis de comparações entre instituições financeiras, a respeito de sistemas de internet banking. Como forma de atingir esses objetivos, foi feito uso de métodos estatísticos, com a utilização de análise fatorial, coeficiente alfa de Cronbach, método de escalas somadas e testes de médias, por meio de ANOVAS. / On a daily basis new internet based systems are born, changing the way we live, work and interact with the society. In spite of that, most of these systems are developed based on common sense and intuition, rarely using methodologies that involves data quality information. In order to explore more these methodologies, this study adapts the data quality information framework created by Kim, Kishore e Sanders (2005) in order to evaluate internet banking systems. A survey was made with undergraduate students, with the goal to verify how the framework applies to internet banking systems. A second goal is to reveal constructs that may be used to compare internet banking systems. In order to achieve these results, statistics will be taken place, using factor analysis, cronbach coefficient, summated scales and ANOVAS.
|
77 |
Beatrix: a model for multi-modal and fine-grained authentication for online bankingBlauw, Frans Frederik 26 June 2015 (has links)
M.Sc. (Information Technology) / Please refer to full text to view abstract
|
78 |
Online banking access system : Principles behind choices and further development, seen from a managerial perspective / Inloggningssystem för internet banker : Principer och val av bakomliggande faktorer och framtida utveckling, sett ur ett ledningsperspektivLi, Sofia, Ekberg, Patrik, Morina, Gentiana January 2007 (has links)
Online banking is a young way for banks to reach new and old customers. The concept has emerged over the last decade from being not very utilized to become a major channel for the bigger banks in Sweden but also in the world. This thesis will present a study of what principles the four major Swedish banks have based their decision on when choosing what type of online access system to use. Furthermore try to present what the future principles might be toward online banking access systems. This might also show how new systems might look like and what the banks strives to achieve when making these systems not only safer but more available and usable. The thesis will present what authentication is and how the authentication process is used today. Today in general what is used is the two factor au-thentication which is based upon passwords. This two factor authentication makes it hard for attackers to breach the systems in use today, but there are ways which are emerging to gain access. Such an emerging threat is the SSL-evading Trojans. Still these kinds of threats are not common at all but they need to be considered. Today passwords are the only means we can use to make the authentication processes safe but they are not enough, according to Bill Gates. Therefore we have looked at new ways to complement today’s password based authentication processes; such compliments might be the use of biometrics, which seems to be an emerging technology. This study have been a challenge from the beginning since we knew that this is a very in-tense subject for the banks to discuss and therefore we have had to be persuasive in many cases and let the banks answer anonymously to be able to gather as much information as possible from our sample banks. Furthermore we have collected up to date articles and studies to be able to get as accurate information as possible. The main findings we have discovered is the trade-off between security versus availability and flexibility and these factors were the same no matter what online access system, PDA or smart card, they have in use. But also that all the banks states that their authentication process is very safe and striving to become 100% secure, even though we have found new threats which is not of an authentication problem but a matter of transactional problem. The banks have shown through the interviews that they lack awareness of such a threat.
|
79 |
Understanding retail bank customers’ attitude towards and usage of cell phone and internet banking services in Gauteng, South AfricaMaduku, Daniel Kofi 02 November 2012 (has links)
M.Comm. / This dissertation reports on the findings of a study conducted in order to understand the factors that impact on retail bank customers‘ attitudes towards and usage of internet and cell phone banking services in Gauteng, South Africa. A conceptual model based on the Technology Acceptance Model (TAM) plus other variables including trust, subjective norm and demographic variables was used to help understand factors that impact on adoption of electronic banking. Data was collected from customers of the four biggest banks in South Africa namely ABSA, Standard Bank, First National Bank and Nedbank. A total of 394 usable responses were obtained. Statistical Package for Social Science (SPSS) was used to analyse the data. A number of statistical tools were used in the analysis including descriptive statistics, correlation analysis correlation analysis, regression analysis and independent sample ttesting. The findings of the study reveal that customers‘ attitude towards internet and cell phone banking contributes significantly to customer‘s intention to start using or continue using internet and cell phone banking services. The findings also show that while differences in attitude may exist between customers across different demographic groups, demographic factors, alone, are weak predictors of attitude. The study found that perceived usefulness, perceived ease of use and trust; significantly contribute to customers‘ attitude towards internet and cell phone banking. Of these variables, trust emerged as the most important predictor of attitude towards internet and cell phone banking while the subjective norm was found to be the weakest predicator of attitude. The findings have wider implications on efforts aimed at attracting more customers to start using or continue using internet or cell phone banking services. The implications have also been discussed and suggestions for future research made.
|
80 |
Electronic banking business practices and marketingAlomran, Abdullah 01 January 2002 (has links)
The purpose of this study is to determine how banks and consumers are adapting to the Internet age; to understand the privacy, security and other issues involved with money transfers; to determine steps being taken to make e-banking adaptable to meeting the needs of the bank, customers, business and industry; to forecast e-banking potential; and to understand the role of marketing in the process.
|
Page generated in 0.1002 seconds