Analysis of Data Validation Techniques for Online Banking Services

Author(s):  
Shadi A. Aljawarneh

The insufficient preparation for the information and communication technologies revolution led to few offering online transaction platforms, information security features, and credit facilities. One of the security concerns is a lack of data validation. Data that is not validated or not properly validated is the main issue for serious security vulnerabilities affecting online banking applications. In this chapter, the influences of security issues on world banks will be discussed. A number of data validation methods will be also reviewed to date to provide a systematic summary to banking environment. Based on the advantages and disadvantages of each method, the IT developer will decide which is best suited to develop the systematic online banking application. From this analysis, a global view of the current and future tendencies of data validation will be obtained and therefore provision of possible recommendations for solving the security and privacy issues for the online banking services.

Author(s):  
Shadi A. Aljawarneh

The insufficient preparation for the information and communication technologies revolution led to few offering online transaction platforms, information security features, and credit facilities. One of the security concerns is a lack of data validation. Data that is not validated or not properly validated is the main issue for serious security vulnerabilities affecting online banking applications. In this chapter, the influences of security issues on world banks will be discussed. A number of data validation methods will be also reviewed to date to provide a systematic summary to banking environment. Based on the advantages and disadvantages of each method, the IT developer will decide which is best suited to develop the systematic online banking application. From this analysis, a global view of the current and future tendencies of data validation will be obtained and therefore provision of possible recommendations for solving the security and privacy issues for the online banking services.


Author(s):  
Christos Kalloniatis ◽  
Dimitris Kavroudakis ◽  
Amalia Polidoropoulou ◽  
Stefanos Gritzalis

Intelligent transport systems (ITSs) play a key role in people's daily activities. ITSs significantly improve mobility offering a variety of services to a vast number of users that increase on a daily basis, as more and new services are introduced. These services are based on advanced information and communication technologies (ICTs) and rely strongly on connectivity and computing resources. However, technical vulnerabilities of the technologies used in ITS, as well as the increase in users' awareness has brought security and privacy concerns to the forefront. This article aims at identifying a set of privacy concepts that provide the bases for designing trustworthy ITS services identifying possible threats and users' privacy concerns. A key contribution of the article is a roadmap that presents in detail how for every ITS function corresponding to privacy concepts can be realized for overcoming specific threats and users' privacy concerns in a smart city context.


Author(s):  
Maryna V. Andryiashka

The phenomenon of security since the time of Plato, who identified it as one of the human needs, belongs to that rare group of phenomena that will remain in demand forever, regardless of the change of ideologies and eras. Only technologies and mechanisms for ensuring security are changing, which is facilitated by the tech-nological singularity, the accelerated progress of information and communication technologies. Nevertheless, the question remains open of what comes first: the security of human or state. Even in the Modern Era, after the terrible world wars, terrorist attacks, man-made disasters, the approaches to answering this question have changed many times. In connection with the above, the purpose of this work is to trace the development of philosophical thought on security issues, as well as to de-termine approaches to the modern understanding of this phenomenon, prob-lems of meanings and values. Through the use of general logical, empirical and theoretical methods, an idea of new trends in the field of security is formed, which testify to the formation of the concept of human security.


2016 ◽  
Vol 14 (1) ◽  
pp. 34-44 ◽  
Author(s):  
Michael B. Spring

The history of modern standards development provides support for the argument that the process of standardization has evolved in response to crises and opportunities. In the information and communication technologies (ICT) sector, many new groups have become involved in standards setting. In a period of rapid change, standards development in these areas has focused primarily on the provision of functionality. That is, there are few overarching roadmaps for development and issues such as security and interoperability are of less concern for many of the new standards developers. In addition, new oversight structures have emerged that appear to be more responsive to the particular needs of developers in the ICT arena. It may be important for nation states to consider assisting in roadmap development in the ICT arena to insure security and privacy issues are addressed such that these increasingly essential systems are less vulnerable.


Author(s):  
Ana Ferreira ◽  
Ricardo Cruz-Correia ◽  
Luís Antunes ◽  
David Chadwick

This chapter reports the authors’ experiences regarding security of the electronic medical record (EMR). Although the EMR objectives are to support shared care and healthcare professionals’ workflow, there are some barriers that prevent its successful use. These barriers comprise not only costs, regarding resources and time, but also patient / health professional relations, ICT (information and communication technologies) education as well as security issues. It is very difficult to evaluate EMR systems; however some studies already made show problems regarding usability and proper healthcare workflow modeling. Legislation to guide the protection of health information systems is also very difficult to implement in practice. This chapter shows that access control, as a part of an EMR, can be a key to minimize some of its barriers, if the means to design, develop and evaluate access control are closer to users’ needs and workflow complexity.


Author(s):  
Ana M. González Ramos

The mass use of technologies, especially, in terms of participation in social networks and mobile apps seems oriented to providing an extension of humanity to digital tools that they do not really possess. Information and communication technologies pose challenges and threats to the public, particularly, due to the sometimes unreflecting and irresponsible use that the public make of them. Their advanced development provide so many utilities and recreative functions that they have become familiar, everyday instruments. Technologies seem to have acquired humanity, but what differentiates them from humans is their lack of ethical responsibility. Gender structures and inequalities remain wherever we do not make a conscious and purposive effort to eliminate them; in online social activity one often encounters diverse situations of gender-, class- or race-related violence. Digital humanities must urgently address the dimension of gender from an intersectional approach to be able to promote greater equality in social relationships and to reduce discrimination in the social networks. The purpose is to create safe spaces (that is, resources for population who can assess the impact, adopt a critical perspective to identify security vulnerabilities, situations of discrimination, and so on) and take responsibility by adopting safety codes for themselves and for others.


Upravlenie ◽  
2021 ◽  
Vol 9 (3) ◽  
pp. 99-111
Author(s):  
E. V. Vasilieva ◽  
A. Alhannah

The analysis of the provision of electronic banking services in Arab countries has been performed. The banking sector is an important part of the economy in any country, however in the Arab countries there are certain problems in the application of the concept of electronic banking. The purpose of this study is a comparative analysis of approaches to the application of information and communication technologies in the banking sector in Algeria, the United Arab Emirates and Syria, identification of the features and bottlenecks in the development of electronic banking services.It has been shown that in order to develop a strong economy and provide quality services that meet customer needs, Arab countries are clearly keen to implement the concept of electronic banking in their banks, but there are still some obstacles which prevent them from competing with international financial organisations. On the other hand, there are several successful scenarios for providing electronic services around the world, for example, the experience of the United Arab Emirates, Algeria, Lebanon and other Arab countries.To assess the level of use of electronic services by the Syrian population at the present time, the authors conducted a survey of clients of the Syrian state and private banks. Based on the survey results, it has been concluded that customers are interested in receiving services in electronic form, but this is hindered by the political situation in the country and a number of other problems. General conclusions have been made about the priority of measures that should be taken at the state level in order for Arab banks to meet modern trends in the financial sector.


2014 ◽  
Vol 989-994 ◽  
pp. 4432-4436
Author(s):  
Gang Zeng

Cloud computing is getting more and more attention from the information and communication technologies industry recently, security issues is becoming more important. Forensics technology on cloud computing is becoming a researched focus. In this paper, we discuss the impact and challenges to digital forensics, finally we present the improved measure of log and forensics system based on logs on SaaS.


Author(s):  
Babar Bhatti

Social media is transforming the way we find, create, and share information during the course of our personal life and work. The rapid growth of social media and the ubiquitous sharing and access of information through various digital channels has created new vulnerabilities and cyber threats. This chapter will provide an overview of the security and privacy implications of social networks and communities. The goal of this chapter is to examine and raise awareness about cyber security threats from social media, to describe the state of technology to mitigate security risks introduced by social networks, to shed light on standards for identity and information sharing or lack thereof, and to present new research and development. The chapter will serve as a reference to students, researchers, practitioners, and consultants in the area of social media, cyber security, and Information and Communication technologies (ICT).


Cyber Crime ◽  
2013 ◽  
pp. 1711-1727
Author(s):  
Babar Bhatti

Social media is transforming the way we find, create, and share information during the course of our personal life and work. The rapid growth of social media and the ubiquitous sharing and access of information through various digital channels has created new vulnerabilities and cyber threats. This chapter will provide an overview of the security and privacy implications of social networks and communities. The goal of this chapter is to examine and raise awareness about cyber security threats from social media, to describe the state of technology to mitigate security risks introduced by social networks, to shed light on standards for identity and information sharing or lack thereof, and to present new research and development. The chapter will serve as a reference to students, researchers, practitioners, and consultants in the area of social media, cyber security, and Information and Communication technologies (ICT).


Sign in / Sign up

Export Citation Format

Share Document