The opportunities and challenges of Internet medicine transaction services providers

Author(s):  
Bin Dun ◽  
Ying Lu ◽  
Feng Chen ◽  
Jian Zhou
Keyword(s):  
Paradigma ◽  
2020 ◽  
Vol 17 (1) ◽  
pp. 72-86
Author(s):  
Siti Noviatun ◽  
Isfandayani

Abstract             The main fuction of the Bank as an funding and lending activities by offering various types of financial transaction services an attractive choice for people who do money laundering to hide money proceeds of crime. Because of that the government and Indonesian Banks make regulations related prevent money laundering that contains Customer Due Dilligence and Enhanced Due Dilligence. Bank Mandiri Syariah has implementation Customer Due Dilligence and Enhanced Due Dilligence as an effort to prevent money laundering. This analyze aims for knowing implementation Customer Due Dilligence and Enhanced Due Dilligence that has been applied by Bank Syariah Mandiri. In this study using a qualitative descriptive method. Data retrieval is done by observation, interviews and documentation to three sources of informants Bank Syariah Mandiri KCP Bekasi Timur and one sources of informants that specifically handles money laundering prevention program that is SKAP( Satuan Kerja APU PPT) Bank Mandiri Syariah. Data analysis will be done by doing three steps, they are; data reductions, data display, and verification.The observation result shows that implementation Customer Due Dilligence done at the time prospective customer open the account and the Bank doubt information customer by doing identification and verification. implementation Enhanced Due Dilligence is done to customers Politically Exposed Person/ High Risk open the account, but in practiceat Bank Syariah Mandiri KCP Bekasi Timur done when there is suspicious transaction or there is a case. Reporting process suspicious transaction through the system SIAP (System Aplikasi APU PPT) to Satuan Kerja APU PPT (SKAP) Bank Syariah Mandiri then SKAP reports to PPATK (Pusat Pelaporan Analisis Transaksi Keuangan). From implementation Customer Due Dilligence and Enhanced Due Dilligence Bank Mandiri Syariah has been prevent money laundering enter the financial system at Mandiri Sharia Bank.


2017 ◽  
pp. 7-1-7-13
Author(s):  
Mark Goodyear ◽  
Hugh W. Ryan ◽  
Scott R. Sargent ◽  
Stanton J. Taylor ◽  
Timothy M. Boudreau ◽  
...  
Keyword(s):  

Author(s):  
Srividhya Srinivasan ◽  
Priya Krishnamoorthy ◽  
Raghuraman Koteeswaran

Automated Teller Machine (ATM) is a kiosk that is being used widely for money transaction across the globe. Several banking sectors have showed interest in deploying ATM. The cash dispenser system manages the transaction services with less manual effort. When it comes to deploy an ATM, two methods are being under practice: Onsite ATM and Offsite ATM. Safeguarding cash kept inside the ATM is a challengeable one. Researchers suggested several built-in security measures to secure the money in ATM. Nevertheless, the burglars handle new techniques to loot the money. Some widely used looting methods include Card Skimming, Cash Trapping and Phishing etc. One amongst is the physical attack to it by using explosives and tools to break a standalone ATM at highways. So, it is time, to give intelligence for the ATM itself to react to the situation. Proposed is a system that implements the idea of making machine to identify the situation and performs the action accordingly. This mechanism is not only about giving intelligence to it, but also a cost effective one.


Author(s):  
Srividhya Srinivasan ◽  
Priya Krishnamoorthy ◽  
Raghuraman Koteeswaran

An automated teller machine (ATM) is a kiosk that is used widely for money transactions across the globe. Several banking sectors have showed interest in deploying ATMs. The cash dispenser system manages the transaction services with less manual effort. When it comes to deploying an ATM, two methods are practiced: onsite ATM and offsite ATM. Safeguarding cash kept inside the ATM is a challenge. Researchers suggested several built-in security measures to secure the money in ATMs. Nevertheless, burglars still loot the money. Some widely used looting methods include card skimming, cash trapping, and phishing. So, it is time to give intelligence to the ATM itself to react to the situation. Proposed is a system that implements the idea of making machines to identify the situation and perform actions accordingly. This mechanism is not only about giving intelligence to it, but also a cost-effective one.


2011 ◽  
pp. 56-65
Author(s):  
Pierre F. Tiako

Deficient information and communication technologies (ICT) infrastructure, lack of awareness on e-commerce issues, network payment and secure transaction services present enormous challenges to developing countries. For e-commerce to be a viable tool for trade in developing countries (DC), a “secure infrastructure” which makes possible the electronic exchange of financial transactions is a necessary prerequisite. There has been significant research on e-commerce security, although most of these studies have focused on developed countries. Less attention has been paid to underdeveloped countries that face different circumstances due to the above challenges. From technological perspectives, this work discusses important issues of e-commerce security for developing countries in regards to lack of fraud repression and justice in those countries.


Author(s):  
Pierre F. Tiako

Deficient information and communication technologies (ICT) infrastructure, lack of awareness on e-commerce issues, network payment and secure transaction services present enormous challenges to developing countries. For e-commerce to be a viable tool for trade in developing countries (DC), a “secure infrastructure” which makes possible the electronic exchange of financial transactions is a necessary prerequisite. There has been significant research on e-commerce security, although most of these studies have focused on developed countries. Less attention has been paid to underdeveloped countries that face different circumstances due to the above challenges. From technological perspectives, this work discusses important issues of e-commerce security for developing countries in regards to lack of fraud repression and justice in those countries.


Author(s):  
s. A. Chun ◽  
V. Atluri

The government services needed by citizens or businesses often require horizontal integration across autonomous government agencies. The information and services needed are typically scattered over different agencies in diverse formats, and therefore are not interoperable. This results in the so-called “stove-pipe” service and information paradigm, which raises a number of challenges. First, the service consumers, both citizens and businesses, face the challenging task of locating relevant services and information from a large number of documents scattered at different locations on the Web. Therefore, it is beneficial to have a system to locate and integrate available services that are tailored to individual preferences and needs according to regulations. Second, due to the fact that information is not shared among the different agencies, service consumers are required to re-enter certain data repeatedly to obtain interagency services. Service integration should allow sharing among agencies. Digital governments have been evolving with different focuses in terms of information and transaction services. The evolution has shown at least four different stages. At the first stage, with the Internet and the WWW, governments digitized paper forms and started to disseminate information with static Web pages, electronic forms, and data displays. The focus of this initial stage has been to make information digitally available on the Web. The transaction services tended to resort to off-line paper-based traditional methods (e.g., by submitting the printed form with a payment) such as by credit cards. In the second stage, governments started to provide services for the citizens by developing applications for service delivery and databases to support the transactions. The citizens and businesses can “pull down” the needed services and information through “active” interaction with individual agency Web sites separately, as in self-services. In both of these stages, the digital government efforts did not consider what other government agencies have been doing and how their services may be related to other agencies’ services. The information and service consumers need to “visit” each agency separately and actively search for information and services. The digital government up to this stage mimics the physical government, and citizens and business entities navigate digital boundaries instead of physical boundaries for complex services, such as business registration or welfare benefits. When agency interactions are needed, data and forms are forwarded in batch mode to other agencies through paper or fax, where the data is re-entered, or the digital data captured from a form is forwarded in a file via CD-ROM or a floppy disk. The streamlining of business processes within individual agencies may have been achieved, but not the streamlining of business processes across agencies. In the third stage, digital government agencies strive to provide seamless, integrated services by different agencies with sharing necessary information. The services and documents are organized such that they are easily identified and the consumers do not have to scour large amounts of information for the right ones. This stage of digital government is characterized as one-stop portal stage. In the fourth stage, the governments create digital environments where citizens’ participation is encouraged to define government policies and directions. The services up to the third stage are often enforced by government regulations and policies. These very rules and policies can be modified by citizens’ participation. In this fourth stage, digital government efforts focus on developing collaborative systems that allow collaboration among government agencies and citizens in order to reflect the constituents’ inputs. Today’s digital governments characterized by “self-service” and “one stop portal” solutions, between stages two and three, need to provide front-end (citizen-facing) tools to deliver relevant, customized information and services, and a back-end (processing) infrastructure to integrate, automate, manage, and control the service delivery. The service integrations vary according to user requirements and need to be dynamically achieved in an ad-hoc manner with personalized processes as end results.


2020 ◽  
Vol 53 ◽  
pp. 101302
Author(s):  
Kyeongsik Yoo ◽  
Kunwoo Bae ◽  
Eunil Park ◽  
Taeyong Yang

Sign in / Sign up

Export Citation Format

Share Document