Essays about: "IT and Internet Fraud"
Showing result 11 - 15 of 17 essays containing the words IT and Internet Fraud.
-
11. Digital Signature : Comparative study of its usage in developed and developing countries
University essay from InformationssystemAbstract : The online trading is growing widely day by day, which makes safety the biggest concern while carrying out trading by electronic means. As many other operations can be done with digital environment and internet, operation that provides identity validation should also be added to the digital environment. READ MORE
-
12. Documentation fraud, Fraudulent bills of lading
University essay from Lunds universitet/Juridiska institutionenAbstract : This thesis investigates the issue of bill of lading fraud and discusses the impact of electronic bills of lading. The thesis will focus on English common law and international conventions under which the issue of bill of lading frauds will be analysed. READ MORE
-
13. Detecting GNSS Attacks on Smartphones
University essay from KTH/KommunikationsnätAbstract : There has been a significant growth in Location-Based Services (LBS) on mobileapplications. These applications provide service to users based on theirgeographical locations. Emergency services, tracking, navigation, advertisingand social networking are examples of them. READ MORE
-
14. Accessing E-banking based on Resilient Transaction
University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesignAbstract : The adoption of Electronic Banking by commercial enterprise has been in existence since the mid 90s, much greater in number due to lower operating costs associated with it. Electronic banking has been in the form of automatic teller machines and telephone transactions. READ MORE
-
15. Workflow management systems, their security and access control mechanisms
University essay from Institutionen för systemteknikAbstract : This paper gives an overview of workflow management systems (WfMSs) and their security requirements with focus on access mechanisms. It is a descriptive paper in which we examine the state of the art of workflow systems, describe what security risks affect WfMSs in particular, and how these can be diminiuished. READ MORE