ITECH5500 Professional Research and Communication Assignment

ITECH5500 Professional Research and Communication Assignment

Aim 

To identify role of Cyber security in banking sector.

Research objective

Research on informational technology plays an important role in security of banks and their sector. It is involving bank accounts to balance in account, secure by informational technology. There is huge number of coding program, password security and softwares applications for computational work security. There is usage of customer for mobile banking, internet banking, booking, digital wallet and ATM. 

Research questions

To identified IT role in organisational innovation and success

To determine Research philosophies for IT projects and bank approaches

To study about IT sector contribute to bank security 

Literature review

IT role in bank organisation on high level to low level like organisation designs, dashboards setup, digital profiles, planning, schemes, advertisement and company messages on customer mobile and emails of services. All services are in digital mode and technological mode for customer facilities. Bank services are used technology in confidential details in secure folders with history charts. Customer details, accounts, money reports, online transaction by mobile applications, internet banking, and software transaction and bank applications are in secure code system. It is not easy to break and assessable for anyone (Martins, et. al.,2014). 

In informational technology and organisational approaches together for customers for fast working is found in digital world. Large number of customers are used mobile banking and banks are used to secure folder and code for application security and customers details. Customer details are insecure with account details with not use by others (Bamrara, et. al., 2013).

Fast and easy to work style by using informational technology by customers are used frequently. It is also facilities and cyber crime increase in world of money transaction. Transaction details are captured by applications, softwares online that are blink on screen of laptop and work as transfer the data base of account. It is dangerous in case of login is not going to logout. There is system for login in bank account in online or software application that can be stopped in three minutes (Biener, et. al.,2015).

Login details are saved in password and account access are not for anyone in bank manager authorities. There are security types of question, finger prints, biometrics, face expressions and password in strong characters (Baikalov, et. al., 2016).

Informational technology has projects with online applications of shopping and banks tie up. Banking sector tie ups specific online shopping market are now in trends, which encourages customers to gain more benefits. Some banks offer cash backs and reward for shopping with their bank cards. Banking tie ups with Digital wallets are also trending. These all tie ups either bank to Digital wallet, Bank to Online market, Bank to Government online service apps like Railway e-tickets have encouraged customers to purchase online safer and economical (He, et. al., 2015). So customers are now relying on online market for shopping, services and many more online marketing. Faith in online marketing is developed in such a way that sometimes customer didn’t read the policies of digital market apps and they faithfully purchase items while using their bank cards.

It sectors in bank security as information alerts on mobile number. There are mobile number details in account of customer in bank but not on display. It is also IT application and reason for security. Pin code for ATM and money transactions are not fully displayed on blank place. ATM pin generates in register mobile and validated only for three minutes are security steps. Cameras and biometrics in bank for security reasons are found in banks (Keisidou, et. al.,2013). Management authority and administrations have security cameras monitors in office. Cyber security is found in networking of computers and internet access in all computers is linked by one. Because it is security check of any type of mislead in bank offices. Biometric and password system for unlock locker rooms.

Account accessible by customer or concern bank branches is also security of digital. All banks have security in account codes and reference numbers that can be detected customer identifications and their account detail with all data bases. Mobile numbers are registered with account details and it can be easily hacks of account if they are displayed. / By the cyber security it is not on fully displayed on account details and account number also in coding. There is branch code, bank code and last digits are account numbers that are in or the alphabetic form to hidden numbers (Karimi, et.al.,2015). 

Research methodology

Research methodology adopted step wise process –

Research data collection 

There are two sources for data collection one is primary and other is secondary.

Primary source of data– Banks and their cyber security reviews by customers and bank staff.

Secondary source of data– Banks and cyber security data and relation cases are available on internet and literatures.

Data interpretation– data is manipulated according to research need. The data is analysis and categorised for important study. It is outcome to importance of cyber security and customer relief for money in bank and technology uses. Type of cyber securities are safe banks and their networks with customers. There is instruction also on display that not share any password and card for anyone. There are no responsibilities of bank. There are also facilities of ATM card and pin is missed by customer that can be blocked account by bank in digital way. It is not in money transaction services and customer money will be safe (Karimi, et.al.,2015).

Data Analysis – Data is collected and divided in classes and folders. It is used group wise analysis of role of technology in banking security. Technology is helpful in security. It is also analysed cyber security is personal security for bank users (Keisidou, et. al.,2013).

Justification

Most of technology is used in bank work like facilities to customer for quick access, technology in mobile for bank transactions, ATM facilities and online transaction by application softwares. There is all work fast by technology called as informational technology. It is generated crime also in money transfer like password stolen and money transfer so data base of bank information come secure (He, et. al., 2015). It is termed as cyber security. It is most commonly used in Bank for digital work of transaction of money by shopping applications, softwares of bank for mobile banking, sms alert and internet banking. It is very vast topic to study because technology not only in progress for banks transactions but also progressive in cyber crime. It is break the security of accounts and money transfers in very small amount and not in noticeable form. It is included in cyber crime (Baikalov, et. al., 2016). It is popular in bank sector due to money directly involved. Many information technology company are work of create security for bank softwares and their management of networking access.

In case of fraud calls for ask pin number of ATM and account details of mobile numbers etc are track by cyber security. It can be in mentioned spam and fraud calls. It is help of customers to prevent thief in bank sectors. 

Ethical view

This Topic is choose randomly it is not concern from any organisation, information technology innovations, and softwares in particular way and not related to any bank case. It is simple and analysis research report for study purposes.

Significance

Significance of IT in bank sectors is in fast technology, bank account accessibility, mobile banking, check account transactions and statement in online copy etc. The bank is secure in network by password, security by cameras and records of customers in computational records (Biener, et. al.,2015).

Limitation

Cyber security is beneficial as well as harmful in bank sectors like software crack by hackers, accounts security code crack and security passwords lick b customers in bank (Martins, et. al.,2014).

References

  • Martins, C., Oliveira, T. and Popovič, A., 2014. Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application. International Journal of Information Management, 34(1), pp.1-13.
  • Bamrara, D., Singh, G., & Bhatt, M. (2013). Cyber Attacks and Defense Strategies in India: An Empirical Assessment of Banking Sector. Gajendra and Bhatt, Mamta, Cyber Attacks and Defense Strategies in India: An Empirical Assessment of Banking Sector (January 1, 2013).
  • Biener, C., Eling, M., & Wirfs, J. H. (2015). Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice, 40(1), 131-158.
  • Baikalov, I. A., Froelich, C., McConnell, T., & McGloughlin, J. P. (2016). U.S. Patent No. 9,516,041. Washington, DC: U.S. Patent and Trademark Office.
  • He, W., Tian, X., & Shen, J. (2015, April). Examining Security Risks of Mobile Banking Applications through Blog Mining. In MAICS (pp. 103-108).
  • Keisidou, E., Sarigiannidis, L., Maditinos, D. I., & Thalassinos, E. I. (2013). Customer satisfaction, loyalty and financial performance: A holistic approach of the Greek banking sector. International Journal of Bank Marketing, 31(4), 259-288.
  • Karimi, S., Papamichail, K. N., & Holland, C. P. (2015). The effect of prior knowledge and decision-making style on the online purchase decision-making process: A typology of consumer shopping behaviour. Decision Support Systems, 77, 137-147.