Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 14 February 2023

Lemma Lessa and Daniel Gebrehawariat

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an…

1150

Abstract

Purpose

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark. It is to identify the gaps and recommend best security practices to help financial institutions meet the required security compliance.

Design/methodology/approach

Two financial sectors were purposively selected. A total of twenty-five respondents (IT executives and IT staff) were included in the study. Quantitative data was collected using the PCI-DSS (Payment Card Industry Data Security Standard) security standard questionnaire. In addition, observation and document analysis were made.

Findings

The result shows that most of the essential security management activities in the financial sectors do not comply with the international security standard. Similarly, the level of most of the indispensable security requirements that should be in place is found to be below the acceptable level. The study also revealed major security factors that prohibit the financial sectors from PCI-DSS security standard compliance.

Originality/value

This study assessed the information security management practice with a focus on banking card security and tried to figure out the limitations of security practices of the organizations surveyed based on the standard adopted. The topic has not been well explored especially in the Ethiopia context. Hence, the result can positively influence security policies, particularly in the banking sector.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Article
Publication date: 3 August 2020

Chen Kuilin, Feng Xi, Fu Yingchun, Liu Liang, Feng Wennan, Jiang Minggang, Hu Yi and Tang Xiaoke

The data protection is always a vital problem in the network era. High-speed cryptographic chip is an important part to ensure data security in information interaction. This paper…

Abstract

Purpose

The data protection is always a vital problem in the network era. High-speed cryptographic chip is an important part to ensure data security in information interaction. This paper aims to provide a new peripheral component interconnect express (PCIe) encryption card solution with high performance, high integration and low cost.

Design/methodology/approach

This work proposes a System on Chip architecture scheme of high-speed cryptographic chip for PCIe encryption card. It integrated CPU, direct memory access, the national and international cipher algorithm (data encryption standard/3 data encryption standard, Rivest–Shamir–Adleman, HASH, SM1, SM2, SM3, SM4, SM7), PCIe and other communication interfaces with advanced extensible interface-advanced high-performance bus three-level bus architecture.

Findings

This paper presents a high-speed cryptographic chip that integrates several high-speed parallel processing algorithm units. The test results of post-silicon sample shows that the high-speed cryptographic chip can achieve Gbps-level speed. That means only one single chip can fully meet the requirements of cryptographic operation performance for most cryptographic applications.

Practical implications

The typical application in this work is PCIe encryption card. Besides server’s applications, it can also be applied in terminal products such as high-definition video encryption, security gateway, secure routing, cloud terminal devices and industrial real-time monitoring system, which require high performance on data encryption.

Social implications

It can be well applied on many other fields such as power, banking, insurance, transportation and e-commerce.

Originality/value

Compared with the current strategy of high-speed encryption card, which mostly uses hardware field-programmable gate arrays or several low-speed algorithm chips through parallel processing in one printed circuit board, this work has provided a new PCIe encryption card solution with high performance, high integration and low cost only in one chip.

Details

Circuit World, vol. 47 no. 2
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 1 March 1998

Daniel P. Murphy

Crimes are committed for personal reasons or for profit. In any crime for a profit scenario the state has an interest in removing the profit from the criminal. Drug offences…

Abstract

Crimes are committed for personal reasons or for profit. In any crime for a profit scenario the state has an interest in removing the profit from the criminal. Drug offences, other than simple possession, are the paradigm. People use drugs for a variety of reasons but, at least in the illicit drug trade, individuals sell drugs in order to make money. Traditionally, this was a cash‐based enterprise and, frequently, a misplaced investigative opportunity. A state can attack the criminal profit in order to attack the enterprise. When an illicit criminal activity is undertaken for cash prosecutors and investigators must look at this as an opportunity.

Details

Journal of Financial Crime, vol. 6 no. 1
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 1 March 1997

Michael Pattison

Observes the extensive legal implications in conducting business on the Internet and looks also at the pitfalls which are involved. Gives a clear run‐down on the dos and don’ts…

1315

Abstract

Observes the extensive legal implications in conducting business on the Internet and looks also at the pitfalls which are involved. Gives a clear run‐down on the dos and don’ts and rights and wrongs and gives clear advice for both business and personal transactions.

Details

Information Management & Computer Security, vol. 5 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 March 1998

Françoise Vandooren

TOLIMAC is a research project funded by the Telematics for Libraries Programme of the EU and is developing a system to provide controlled access to, and management of, networked…

Abstract

TOLIMAC is a research project funded by the Telematics for Libraries Programme of the EU and is developing a system to provide controlled access to, and management of, networked information resources and other services in a library environment. The system is based on smart cards and encryption technology integrating management functionalities ‐such as user identification, remote access control, electronic payment‐, and security requirements ‐such as secure information transfer and financial transactions, document integrity. The system also enables libraries to adjust user access rights, and charges for available electronic resources, whether local or remote, according to user categories. The system is based on standards. It has a Web interface. The pilot system will provide users from three university libraries with access to an electronic document delivery service based at INIST (France), including search, order and delivery of journal articles, as well as payment facilities by means of the electronic purse on the user's smart card.

Details

VINE, vol. 28 no. 3
Type: Research Article
ISSN: 0305-5728

Article
Publication date: 1 April 1999

Russell G. Smith

This paper examines the security risks associated with conducting commercial transactions through the use of electronic technologies such as the Internet. It will not deal with…

Abstract

This paper examines the security risks associated with conducting commercial transactions through the use of electronic technologies such as the Internet. It will not deal with the many other problems which arise out of online commerce such as those relating to misleading and deceptive practices which create particular concerns for consumer protection agencies. Instead, it focuses on the ways in which the various electronic payment systems may be abused for fraudulent purposes.

Details

Journal of Financial Crime, vol. 7 no. 2
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 1 August 1994

Kenneth P. Weiss

There is a hierarchically related set of fundamental securitytechnologies that have been used (sometimes without need for thehierarchy) in the late 1970s and 80s to protect…

542

Abstract

There is a hierarchically related set of fundamental security technologies that have been used (sometimes without need for the hierarchy) in the late 1970s and 80s to protect information. The critical assumptions which provided the rationale for protection of information in those times are now challenged by the networked information resource environment of the 1990s. The weakest link in most information security systems is the reliance upon inappropriate methods of identifying and authenticating authorized users to the exclusion of all others. Proposes token based, two‐factor identity authenticator as a solution which reconciles the security hierarchy with the typical 1990s distributed information environment.

Details

Information Management & Computer Security, vol. 2 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 August 2000

Campbell McPherson

This article is concerned with a specific market niche composed of very small, and small enterprises (SE) providing access to satellite television channels directly to an…

Abstract

This article is concerned with a specific market niche composed of very small, and small enterprises (SE) providing access to satellite television channels directly to an individual’s home (DTH). It focuses on the role within that niche of a specific segment providing products which are generally termed “pirate” by governments, companies and the public. In this context, it examines the nature, and consequences, of information and influence asymmetry between SEs and large broadcasting companies, especially as it relates to the national and European policy process. Finally, it considers whether other small enterprises can learn from the experience of the satellite television sector.

Details

European Business Review, vol. 12 no. 4
Type: Research Article
ISSN: 0955-534X

Keywords

Article
Publication date: 1 April 1990

Ralf Herweg and Hans Gliss

The problems peculiar to use of microcomputers operating in MS‐DOSare outlined. These include outside threats as well as inherent flaws inthe system. Protective measures are…

Abstract

The problems peculiar to use of microcomputers operating in MS‐DOS are outlined. These include outside threats as well as inherent flaws in the system. Protective measures are discussed in relation to typical threats, and basic methods for making microcomputers secure are described.

Details

Managerial Auditing Journal, vol. 5 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 12 October 2010

Petter Gottschalk

The purpose of this paper is to present a systematic approach to classify financial crime into main categories as well as sub categories.

8109

Abstract

Purpose

The purpose of this paper is to present a systematic approach to classify financial crime into main categories as well as sub categories.

Design/methodology/approach

Based on a literature review, the main four categories were labeled corruption, fraud, theft, and manipulation, respectively.

Findings

There is a massive variety of crime types and crime names in the literature that can successfully be allocated to main categories of financial crime.

Research limitations/implications

The paper is based on exploratory research to stimulate future research in refining and improving the categories suggested here.

Practical implications

The great variety of criminal activities is classified in this paper so that practitioners can organize their thinking around crime themes rather than crime examples when mapping crime.

Social implications

The public and society at large will be able to understand the confusing variety of financial crime in terms of main categories.

Originality/value

There has been some confusion among both researchers and practitioners when communicating about examples of financial crime. The organizing framework in this paper will help allocate crime examples to main categories of financial crime.

Details

Journal of Financial Crime, vol. 17 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of over 1000