Banking systems fraud and technology approach, Strategic Management

Assignment Help:

Banking Systems Fraud and Technology Approach

It is my intention to use the Banking Systems in Nigeria for this case study. I have observed that the process of banking operations in Nigeria is very porous and with little technological advancement so the verification of customers' transaction is difficult. These transaction verifications include signature authentication, balance inquiry and facial recognition.

Banking systems can be compromised if certain confidential information finds its way into the hands of fraudsters. Such information can be in form of

(i)  Personal data for example national identification number and address

(ii)  Banking data for example account details and electronic card pin number.

Conventional knowledge-based methods do not really provide positive personal recognition because they rely on surrogate representations of the person's identity (e.g exclusive knowledge or possession) (Jain A.K, 2004). However, biometrics-based methods provide several advantages over these authentication methods because of its true and precise representation of a person's identity, which is very useful and effective in securing personal and banking data.

The use of biometrics, for instance fingerprints, can be used to verify withdrawals of cash over the counter in banking halls or online. This technology commonly called cryptology registers a customer's fingerprint and prevents someone else from accessing the account. Another approach is to verify the signature of a customer and determine if the handwriting is that of a registered customer in the case of a cheque.

Another useful aspect of biometrics is voice testing which can be applied in the verification of online banking transactions.


Related Discussions:- Banking systems fraud and technology approach

Benefits of shared service centres, Q. Benefits of shared service centres ?...

Q. Benefits of shared service centres ? ¸ Economies of scale e.g. sharing overhead of a centralised function or process across divisions in the same group, it avoids divisions

Swot analysis, Before conducting SWOT analysis, it is essential to conduct ...

Before conducting SWOT analysis, it is essential to conduct internal and external analysis for the company. Internal Analysis Product quality and variety: The cCompany is goo

Importance of costs in the pricing strategy, Explain the importance of cost...

Explain the importance of costs in the pricing strategy of your chosen organisation. Importance of Cost Cost is more important than ever before, especially in the current e

Internal buying decisions, Transfer pricing is applied internally within a ...

Transfer pricing is applied internally within a group for management accounting purposes e.g. to measure the performance of divisions.   Increasing or decreasing an internal transf

Show the features of international and global strategies, Question: (a)...

Question: (a) Firms are always looking to outperform each other; three generic strategies have been identified to allow them not only to attain advantages over competitors b

What do you mean by controllable costs, Q. What do you mean by Controllable...

Q. What do you mean by Controllable costs? Controllable costs Divisional variable (marginal) cost. Divisional 'specific' fixed cost e.g. Specifically incurred by

Knowledge management techniques, Bert's Bonsai sells Bonsai plants, tools a...

Bert's Bonsai sells Bonsai plants, tools and materials to cultivate them, and literature in book and magazine form. An early adopter of electronic records, they are still happily u

What is organizational design, 1.Middle managers are often at the center of...

1.Middle managers are often at the center of efforts to develop tactical plans to implement established strategies. How are tactical plans typically established? What challenges co

Difference between symmetric and asymmetric encryption, (a) Illustrate the ...

(a) Illustrate the difference between symmetric and asymmetric encryption, listing an advantages and a disadvantage of each. (b) What functions should be given by a public key

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd