Internet Banking

Name:

Tutor:

Course:

Date:

Internet Banking

Shah, Mahmood, and Steve Clarke. E-banking Management: Issues, Solutions, and Strategies. Hershey, PA: Information Science Reference, 2009. Print.

In this book, Shah and Steve present how the provision of banking services on the internet has expanded the field of business and banking systems around the world. The book is useful in that it focuses on managerial, strategic, organizational and operational issues in Internet banking. The authors have succeeded in providing an innovative theoretical basis currently underpinning practices and research in the field of E-banking. The book covers key elements, ideas, important perspectives, and principal theories involving the field of e-banking management. The strengths of this book are that it evaluates the problems, strategies and solutions to issues related to E-banking. The authors have however failed in explaining to the readers how E-banking differs from the traditional banking systems and the advantages and disadvantages that come with the online banking system.

SCN Education B.V.Electronic Banking: The Ultimate Guide to Business and Technology of Online Banking. Braunschweig: Vieweg, 2001. Print.

In this book, the authors introduce readers to the new world of online financial services. The book focuses on new financial delivery channels, which help, improve customer service and facilitate a 24 hours access to transaction and other banking services. The book clearly outlines the threats and prospects of E-banking, the pricing strategies that banks should develop, the effects of online banking in today’s world and ways in which secure electronic transactions can be made. The book is of great quality as it is written by information technology experts with easy access to the latest information on IT developments. The main limitation of this book is that more research needs to conduct in order to provide further in-depth information about the new banking systems and provide incredible reasons as to why the system needs to be adopted.

Gottwald, Siegfried. Electronic Banking: The Ultimate Guide to Business and Technology of. S.l.: Friedrick Vieweg & Son, 2012. Print.

Gottwald`s` book explores the evolution of online investment banking and gives people an illustration of how to find the effective online banking system. The author explains how people are replacing paper transactions with the use of electronic technology and making transactions through the internet. This book is useful as it gives an elaboration on how customers should perform non-transactional services through their mobile phones; how they should download bank statements, download application for internet banking like M-banking and how people can use the internet to view images of their paid cheques. The weakness of this material is that it was mainly based on informing readers on the issue of E-banking rather than explaining the benefits of net banking and the future of Internet banking.

Koskosas, Ioannis. “E-banking security: A communication perspective” Risk Management 13 (2011): 81–99. Print.

This article is somehow related to Shah and Steve’s book as they both analyze innovative theoretical basis currently underpinning practices and research in the field of internet banking. Koskosas focuses on the communication of security risk messages among organizations especially the communication between IT employees and managers within the banking environment. The article is based on the research of the communication procedures and standards that play a crucial role in the success of internet banking security adoption and the experience of organization that follow the internet banking security measures. This article is quite dependable as the author used the case study method to get the accuracy of his data. This means that the results of the study are accurate as they reveal the role of communication in the following areas-banking project alignment, transparency of internet banking information and privacy of client transaction information. However, the author does not expound on the reason why he thinks communication problems should be addressed in the banking system, which is an important part of the research.

Jantori,Parichat. “Security of Internet Banking – A Comparative Study of Security Risks and Legal Protection in Internet Banking” Thailand Journal of Law and policy. 14 (2011):1-3.Print

The article addresses the introduction of internet banking system and discusses the relevant legislation measures, which regulate the internet banking systems as well as analyzing the risks involved in online transaction. Jantori`s article explores specific bank software used to carry out the banking services and explains the risks of internet banking like Email hacking to access personal banking information. Unlike in the other articles, the author succeeds in describing the regulation of online banking based on the law of banker-customer relationship and legal responsibilities for ones failure to meet those responsibilities. More details should be added on this research about the legal acts provided by different constitutions of diverse countries on the violation of laws and limitations of the new banking system.

Normalini M. and Ramayah T.Biometrics Technologies Implementation in Internet Banking Reduce Security Issues” Procedia – Social and Behavioral Sciences 65(2012):364-365.Print.

This article explores the solutions used to enhance the security issues in online banking implementation. The authors explain how online transactions data need to be readily available for the people who desire to have access, and it must be kept securely from imposters. Normalini and Ramaya`s article is valuable in that it gives guides in which bank customers have to protect themselves when handling with Internet banking such as ignoring the phishing emails as banks do not request for PINs or passwords via email and avoiding the use of the banking system in public among other safety measures. The article also gives the three basic approaches to the verification of ones identity to ensure security of the E-banking; the debit card, password and fingerprints. The article provides less information on the importance of the introduction of biometric authentication, which helps eliminate calls for password reset, which hackers might use to access the banking data of another person.

Kelly G and McKenzie B.Security, privacy, and confidentiality issues on the Internet Banking” Banking Internet Research 4.2 (2002):1-18.Print.

Kelly and McKenzie explore the security, privacy and confidentiality issues of internet banking through focusing on the methods used to protect local banking data, the risks of connecting to services like M-banking, transaction message encryption, digital signatures  and protecting viruses and hackers from interfering with one’s banking information. The authors tackle the new ways of issuing digital certificates used against hoax. The certificates are used to uncover manipulation software of the transacted bank data. Their research is useful as it notifies internet bank users on how they should use virus scanners to detect fraud in e-mail attachments and downloaded softwares. One main limitation of this article is that it only gives the security measures to be taken when making online transaction but does not highlight the attacks used in deceiving the user to access login.

Pslmer Kimberly. “Is It Safe to Bank Online?” Standalone network encryption platforms from Thales e-Security. (2011):1-2 .Print.

Pslmer`s article places most of its focus on giving consumers ten important steps to undertake to ensure that their banking information is safe. Her information is valuable as it explains the issues of security breach associated with E-banking. She explores the method of electronic money transfers in the markets today and explains their effectiveness. She addresses three security levels of internet banking; the first one concern the safety of the setting in which customers banking database exist, the second concern is the security of customers` banking information as it is sent from their personal computer to the web server. Finally, are the safety actions taken to bar illegal users from attempting to hack the online banking information of the clients. The research would have been more relevant if the author had based his facts on the benefits and risks of internet banking.

Nasir Ahmad and Zin Mohd, “How to make Online Banking Secure”. National ICT security and Emergence Response centre 3.1 (2005): 1-5. Print.

This article provides similar information as discussed in Normalini and Ramayah`s article on the three factor authentication; password, fingerprints and debit card. The article gives a brief description of the techniques used by online attackers to access private information like the Trojan attack and man-in-the middle attack whereby the attacker creates a fake website and attracts the awareness of user to his or her website. What makes this article authentic is the fact that it gives factual data on the issues of banking fraud in 2004 and 2005 and the reported cases about the attackers’ means of accessing personal information. The information provided should have been based more on giving local financial institutions recommendation to help them ensure confidentiality of clients’ information.

Ahmad Kabir. “Critical Success Factors for Preventing e-Banking Fraud” Journal of Internet Banking and Commerce 18.2(2013):1-16.Print.

The author explores the reasons why frauds in e-banking services occur which he describes are as a result of various security controversies ranging from insufficient internal controls to weak authentication forces. Kabir`s research is important as it helps individuals to understand the important factors of strengthening fraud prevention systems in internet banking. The findings of his research show other factors that need to be considered like customer education, staff education and internal controls rather than the use of technology. The main strength of this article is that it helps regulators and banks with information on specific areas that should be put in place to help in building their fraud protection systems.

How to place an order?

Take a few steps to place an order on our site:

  • Fill out the form and state the deadline.
  • Calculate the price of your order and pay for it with your credit card.
  • When the order is placed, we select a suitable writer to complete it based on your requirements.
  • Stay in contact with the writer and discuss vital details of research.
  • Download a preview of the research paper. Satisfied with the outcome? Press “Approve.”

Feel secure when using our service

It's important for every customer to feel safe. Thus, at Supreme Assignments, we take care of your security.

Financial security You can safely pay for your order using secure payment systems.
Personal security Any personal information about our customers is private. No other person can get access to it.
Academic security To deliver no-plagiarism samples, we use a specially-designed software to check every finished paper.
Web security This website is protected from illegal breaks. We constantly update our privacy management.

Get assistance with placing your order. Clarify any questions about our services. Contact our support team. They are available 24\7.

Still thinking about where to hire experienced authors and how to boost your grades? Place your order on our website and get help with any paper you need. We’ll meet your expectations.

Order now Get a quote