Results 101 to 110 of about 35,083 (135)
Some of the next articles are maybe not open access.
EPRA International Journal of Environmental Economics, Commerce and Educational Management
This study presents a depth analysis of cutting edge technology adoption and information systems audit within the banking sector of India. As cyber threats become increasingly complex and sophisticated, banks must prioritize robust security measures ...
CA Rounika Dhoot
semanticscholar +1 more source
This study presents a depth analysis of cutting edge technology adoption and information systems audit within the banking sector of India. As cyber threats become increasingly complex and sophisticated, banks must prioritize robust security measures ...
CA Rounika Dhoot
semanticscholar +1 more source
Privacy and Security Matters Related To Use Of Mobile Devices and Social Media
SoutheastCon, 2021Mobile device usage and social media have become an integral part of our lives in this day and age. The sharing of images, videos, news, music, doing business, purchasing online, working online, and sharing of sensitive information such as bank account ...
McKringle Xolani Mhlanga +2 more
semanticscholar +1 more source
2025 IEEE 2nd International Conference on Computing, Applications and Systems (COMPAS)
The chance of inadvertently disclosing personal information has significantly grown due to the rapid expansion of social networking sites, posing serious privacy and security issues.
K. dhar, Dhiman Sarma
semanticscholar +1 more source
The chance of inadvertently disclosing personal information has significantly grown due to the rapid expansion of social networking sites, posing serious privacy and security issues.
K. dhar, Dhiman Sarma
semanticscholar +1 more source
Mapping Internal Control of Data Security Issues of BYOD Program in Indonesian Banking Sector
International Conference Computing Engineering and Design, 2019Nowadays Bring Your Own Devices (BYOD) has become a trend in the development of Information Technology (IT). BYOD has been used in Indonesian banking sector, in 2016 a Bank in Indonesia has been put BYOD program in their IT transformation strategic.
Aboeryzal Ahmed Koesyairy +4 more
semanticscholar +1 more source
Humanities and Social Sciences
Bangladesh’s rapid digital transformation under the national vision of “Digital Bangladesh” has created both opportunities and vulnerabilities within cyberspace. As financial systems, e-governance, and communication networks expand, cyber incidents, such
S. Ferdous
semanticscholar +1 more source
Bangladesh’s rapid digital transformation under the national vision of “Digital Bangladesh” has created both opportunities and vulnerabilities within cyberspace. As financial systems, e-governance, and communication networks expand, cyber incidents, such
S. Ferdous
semanticscholar +1 more source
International Journal for Research in Applied Science and Engineering Technology
This research introduces a highly secure and scalable Bank Management System (BMS) that integrates Advanced Encryption Standard (AES-256) encryption to safeguard sensitive user and financial data.
Divyansh Vishwakarma
semanticscholar +1 more source
This research introduces a highly secure and scalable Bank Management System (BMS) that integrates Advanced Encryption Standard (AES-256) encryption to safeguard sensitive user and financial data.
Divyansh Vishwakarma
semanticscholar +1 more source
Bisnis-Net Jurnal Ekonomi dan Bisnis
The title of this study is "The Role of Cybersecurity in Enhancing Transparency and Accountability of Financial Reports in Islamic Banks in Indonesia." The aim of this study is to identify the relationship between the role of cybersecurity and the ...
Putri Salbiah Nasution +3 more
semanticscholar +1 more source
The title of this study is "The Role of Cybersecurity in Enhancing Transparency and Accountability of Financial Reports in Islamic Banks in Indonesia." The aim of this study is to identify the relationship between the role of cybersecurity and the ...
Putri Salbiah Nasution +3 more
semanticscholar +1 more source
Frontiers Artif. Intell.
Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat.
Ramprasath Jayaprakash +9 more
semanticscholar +1 more source
Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat.
Ramprasath Jayaprakash +9 more
semanticscholar +1 more source
A Real-Time Cybersecurity Monitoring Framework Using SIEM and Honeypot: Implementation in BUMN Bank
International Conference on Orange TechnologiesAs the digital transformation of banking services accelerates, cyber threats have become a critical risk for financial institutions such as BUMN Bank. This study aims to design and implement a real-time cybersecurity monitoring framework that integrates ...
Edwin Wiyanto Saputra +2 more
semanticscholar +1 more source
Neobanks Operations and Security Features
International Scientific-Practical Conference Problems of Infocommunications Science and Technology, 2019There is a steady tendency in the world to increase the level of use of the latest information technologies in the financial sphere, in particular new forms of banks -digital and neobank are gaining popularity. Such a business is promising, attractive to
Gorodianska Larisa +2 more
semanticscholar +1 more source

