Page 169 - ICDEBI2018
P. 169
I International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456nternational Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 | IF: 4.101
9. From all respondents using MobilFrom all respondents using Mobile Banking X. REFERENCES
services 35% respondents have a fear of hacking services 35% respondents have a fear of hacking 1. Abrams,M. Jajodia, S; Podell, H, June 1995, S; Podell, H, June 1995,
“Information Security An integrated Collection of Information Security An integrated Collection of
Mobile Banking Account. “
10. The majority of the respondents using Mobile The majority of the respondents using Mobile Essays“, IEEE Computer Society Press“, IEEE Computer Society Press, vol 2,
Banking are Afraid of loose money while Mobile Banking are Afraid of loose money while Mobile pno. 25
Banking due to careless mistakes.
2. Aycock, John, January 2006 ,“Computer Viruses Aycock, John, January 2006 ,“Computer Viruses
11. From all respondents using Mobile Banking From all respondents using Mobile Banking and Malware” Springer pno.26pno.26
services 15% are disagree with Mobile Banking as ces 15% are disagree with Mobile Banking as
secure and protect privacy. 3. Butler W. Lampson, January Butler W. Lampson, January 2004, “Computer
Security in the Real World”, ecurity in the Real World”, Principles of
12. Mobile Banking provides different services to Mobile Banking provides different services to S
users but most of the customers uses services like users but most of the customers uses services like Computer Systems, vol. 1,. P. no. 76, vol. 1,. P. no. 76
A/C Balance Enquiry, Bill Payment, Money A/C Balance Enquiry, Bill Payment, Money 4. Burnett, Mark, Kleiman, Dave. tt, Mark, Kleiman, Dave. , July 2006,
Transfer between A/C only 5% uses A/C Transfer between A/C only 5% uses A/C “Perfect Passwords” ” Rockland: Syngress
Statement Enquiry, Other Mobile Banking t Enquiry, Other Mobile Banking
Publishing, vol 2.
services.
13. Majority of the customers using Mobile Banking Majority of the customers using Mobile Banking 5. Cohen, Fred, June 1984, “Cohen, Fred, June 1984, “Computer Viruses –
services are disagree with that the Mobile Banking services are disagree with that the Mobile Banking Theory and Experiments” IBM, ” IBM, vol2 pno.53
services is a part of life. 6. Cohen, Fred, April 1984, “An Undetectable April 1984, “An Undetectable
14. All of the respondents using Mobile Banking All of the respondents using Mobile Banking Computer Viruses”, IBM”, IBMp.21 Michael Gibson,
services have allows to users services have allows to users do banking “Overview Overview V classification lassification
Virus irus
c
anywhere/anytime. w
www.wikidoc.org/index.php/ww.wikidoc.org/index.php/ Virus_classification,
15. Majority customers are adopted Mobile Banking Majority customers are adopted Mobile Banking 2009
services because of different factors like services because of different factors like
Accomplish task more quickly i.e.25%, Any Time Accomplish task more quickly i.e.25%, Any Time 7. Cortada, James W, April 2004,Cortada, James W, April 2004, “How Computers
Changed the Work of American Public Sector hanged the Work of American Public Sector
C
Banking i.e.20%, Built-in help facility i.e.15%, in help facility i.e.15%,
Industries” Oxford University Pressersity Press, vol. 2, ,p.no
Functions fulfill Banking needs i.e.30%, Security Functions fulfill Banking needs i.e.30%, Security
48.
i.e.10%.
16. The majority of the respondents i.e. 90 % using The majority of the respondents i.e. 90 % using 8. Denning, Dorothy E., May 1986, "An Intrusion Denning, Dorothy E., May 1986, "An Intrusion
Mobile Banking are agree with that Mobile Mobile Banking are agree with that Mobile Detection Model," Proceedings of the Seventh Proceedings of the Seventh
Banking provides sufficient services to customers Banking provides sufficient services to customers IEEE Symposium on Security and PrivacyEEE Symposium on Security and Privacy, p.no
I
for fulfill their banking needs. 13.
9. Denning, December 1998,“Computer Under Denning, December 1998,“Computer Under
IX. Conclusion Attack Intruder, Worm And Viruses” Worm And Viruses” Addison
For mobile banking awareness banks should take For mobile banking awareness banks should take
Wisely, p. 28
some responsive steps like in arranging Workshop, teps like in arranging Workshop,
Mobile Banking Training Program and Advertising. Mobile Banking Training Program and Advertising. 10. Fred Cohen, October 1988,"On the implications of Fred Cohen, October 1988,"On the implications of
Computer Viruses and Methods of Defense" omputer Viruses and Methods of Defense" IBM,
C
To develop a Mobile Banking learning Web Site and To develop a Mobile Banking learning Web Site and , p.35
App which helps to provides training and guide lines App which helps to provides training and guide lines
11. J Jurgens du Toit, November 2007, “J Jurgens du Toit, November 2007, “Resolving e-
to non mobile Banking users.
assesments issues security using agentsssesments issues security using agents” MS
a
Thesis, University of Johannesburghesis, University of Johannesburg, pno 33.
T
Arrange a customer interaction session Arrange a customer interaction session in which
customers can clear their queries and doubts regarding customers can clear their queries and doubts regarding 12. James D. Feist and Dale R. McCullough, APR D. Feist and Dale R. McCullough, APR
2010, “Behavior Patterns and Communication in 010, “Behavior Patterns and Communication in
mobile banking registration, security and privacy.mobile banking registration, security and privacy. 2
Feral Horses” International Journal of Behavioral ” International Journal of Behavioral
Create awareness regarding importance of mobile Create awareness regarding importance of mobile Biology, vol.3, , P.no 67
banking in case of conducting mobile banking banking in case of conducting mobile banking 13. Lunt, Teresa F., November 1993, "Detecting Lunt, Teresa F., November 1993, "Detecting
transaction and show them how it saves your timtransaction and show them how it saves your time and I Intruders in Computer Systems," ntruders in Computer Systems," Conference on
money by doing anytime and anywhere banking.money by doing anytime and anywhere banking. Auditing and nd C T SRI
a
Computer omputer
Technologyechnology,
Develop mobile banking apps which work on low Develop mobile banking apps which work on low International, ,pno. 88
configuration mobile and on poor network also.configuration mobile and on poor network also.
@ IJTSRD | Available Online @ www.ijtsrd.comwww.ijtsrd.com | Conference Issue: ICDEBI-2018 | | Oct 2018 Page: 161