Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


E-banking: Online Transactions and Security Measures

Hameed Ullah Khan
Department of Information Systems, College of Computer and Information Sciences, King Saud University, Kingdom of Saudi Arabia
Research Journal of Applied Sciences, Engineering and Technology  2014  19:4056-4063
http://dx.doi.org/10.19026/rjaset.7.766  |  © The Author(s) 2014
Received: November 20, 2013  |  Accepted: December 13, 2013  |  Published: May 15, 2014

Abstract

This study presents the technology involved in the more important payment systems currently available to internet users. As the field is undergoing a major upheaval by changing the traditional banking services, e-commerce is facilitating change in recent years. These programs in-returns have shown lucrative growth in internet businesses and capital generation. Transactions on an international scale are the mark of highly demanding businesses with a global consumer base. Banks around the world provide their banking services online though electronic channels, one of the most widely used is the internet channel. Many people avail internet banking services which is convenient in this day and age. On-line banking platforms allow consumers to manage their accounts globally and at their convenience. The internet banking services have to be at top level of security and risk free in order to be trusted by customers. In this study the attack models have been explained and the top risks factors that the internet banking services come to face and applications have been discussed. This study deals with experimental models that can be applied to curb cybercrime attacks and make the internet banking applications more secure to the consumer strata.

Keywords:

Internet banking, internet banking risks, internet banking services,


References

  1. Asli, Y., 2011. Customer's perspectives and risk issues on e-banking. J. Internet Bank. Commer., 16: 1.
  2. Booz, A. and I. Hamilton, 1996. Internet Banking: A Survey of Current and Future Development. Financial Services Group, New York.
  3. Dean, L. and D. Widrig, 2012. Managing Software Requirements: A Use Case Approach. Addison-Wesley, Boston.
  4. Ecommerce Sales Topped $1 Trillion, 2012.
    Direct Link
  5. E-marketer, 2001. The E-Commerce: B2B Report.
    Direct Link
  6. Furst, K., W.W. Lang and D. Nolle, 2000. Internet banking: Developments and prospects. Office of the Comptroller of the Currency Economic and Policy Analysis Working Paper No. 2000-9.
  7. Harris, L. and J.S. Laura, 2002. The ethics of e-banking. J. Electron. Commer. Res., 3(2): 59-66.
  8. Hiltgen, A., T. Kramp and T. Weigold, 2006. Secure internet banking authentication. IEEE Secur. Priv., 4.2: 21-29.
    CrossRef    
  9. Hole, K.J., V. Moen and T. Tjostheim, 2006. Case study: Online banking security. IEEE Secur. Priv., 4.2: 14-20.
    CrossRef    
  10. Humphreys, E., 2008. Information security management standards: Compliance, governance and risk management. Information Security Technical Report, pp: 247-255.
    CrossRef    
  11. Internet Host Count Maintained by the Internet Software Consortium, 2011.
    Direct Link
  12. Ismail, S., 2013. Factors affecting the adoption of B2B e-commerce technologies. Electron. Commer. Res., 13: 199-236.
    CrossRef    
  13. Ivar, J., 2012. Object Oriented Software Engineering, Addison Wesley. Retrieved form: Designing Web Interfaces: Principles and Patterns for Rich Interactions.
  14. Koskosas, I., 2011. The pros and cons of internet banking: A short review. Bus. Excellence Manage., 1: 49-58.
  15. Mu, Y., 2003. E-banking: Status, Trends, Challenges and Policy Implications.
    CrossRef    Direct Link
  16. Nua Internet Surveys, 2001. How Many Online?
    Direct Link
  17. Open Web Application Security Project, 2011. Denial of Service.
    Direct Link
  18. Pitkow, J., 1997. The WWW User Population: Emerging Trends, GUV Centre, Georgia Institute of Technology, Atlanta, GA.
  19. Robert, M., D. Alan and H. Barbara, 2013. System Analysis and Design. 4th Edn., Wiley, Hoboken, NJ.
  20. Schneier, B., 2005. Two-factor authentication: Too little, too late. Commun. ACM, 48(4): 136.
    CrossRef    
  21. US Retail Ecommerce Holiday Season Sales, 2011.
    Direct Link

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved