Results 251 to 260 of about 817,194 (303)
Some of the next articles are maybe not open access.

Protecting the financial system from abuse

Journal of Money Laundering Control, 2006
PurposeTo examine the implications of the changing compliance environment confronting banks as the international anti‐money laundering/combating the financing of terrorism (AML/CFT) standards have become more rigorous and more attention is paid to integrity related concerns by supervisors and market participants.Design/methodology/approachThe paper ...
R. Barry Johnston, Ian Carrington
openaire   +3 more sources

MarketNet: protecting access to information systems through financial market controls

Decision Support Systems, 2000
Abstract This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for malicious attacks, and admit systematic and uniform monitoring and detection of attacks.
Yechiam Yemini   +3 more
openaire   +3 more sources

Lightning overvoltage protection for financial computerizing systems

Proceedings. Asia-Pacific Conference on Environmental Electromagnetics. CEEM'2000 (IEEE Cat. No.00EX402), 2002
Financial systems are nowadays dependent on electronic data processing technology. One of the most frequent causes of failure in this highly sensitive system are overvoltages mostly caused by lightning. This paper describes how lightning electromagnetic pulse intrudes into computer information systems and causes system damage. Damage prevention is also
null Qui Chuan Rui, null Li Shui Guang
openaire   +1 more source

Protecting the Financial Ecosystem: An Extensive Testing Approach for Systems Combating Financial Crime

Journal of Economics & Management Research, 2023
The global financial system faces significant challenges in combating financial crimes such as money laundering, terrorist financing, and fraud. The increasing sophistication of criminals and the rapid evolution of technology necessitate robust systems and processes to detect, prevent, and report suspicious activities. Effective testing strategies play
openaire   +1 more source

Face Recognition System for Financial Identity Theft Protection

2020 15th International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP), 2020
the paper propose a part of image processing for applying on security and authentication. This system looks to be about image processing techniques applied to work in security and data access authentication information through application on mobile. In regard to financial transactions by using Eigen face for face recognition to process and verify its ...
Thidarat Pinthong   +3 more
openaire   +1 more source

The Modeling of Processes of Design of Information Protection Systems in Financial Information Systems

Computational nanotechnology, 2023
The relevance and necessity of implementing measures to protect information in banks, as well as in other organizations of the financial and credit sphere of activity is due to a number of reasons. Firstly, these are the requirements of regulators in the field of information security.
Yaroslav E. Prokushev   +2 more
openaire   +1 more source

Authentication of Financial Wallet System and Data Protection using BlockChain

2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2020
In a BlockChain environment, during validation process or address lookup user personal information may be disclosed or hacked. To prevent this loophole, a Financial Wallet system with authentication and data protection is implemented. In this system, to avoid the disclosure of personal data and to limit the third party intermediaries a BlockChain with ...
Jhansi Rani P., Megha J.
openaire   +1 more source

Home - About - Disclaimer - Privacy