scispace - formally typeset
Search or ask a question
Journal Article

The Impact of Internet Fraud on Financial Performance of Banks

TL;DR: In this paper, the authors carried out a quantitative approach in a questionnaire distribution across a given number of data collection respondents and has shown that financial crime and its success contribute directly to the financial performance of banks.
Abstract: A business associate in an organization may represent fraud as a series of disappointing business practices to help individuals. Therefore, it is an act to mask the other by covering real facts and presenting fake information and statements. Online manipulation is the biggest field that has been opened up. Online fraud has been more widespread as technical innovation coupled with internet penetration and resulting improvements have arisen. In terms of internet sales and valuation, e-commerce development is expressed. During the eight-year duration from 2008 to 2014, the overall volume of the trade rose from $268 billion to $ 1.5 trillion. The study carried out the quantitative approach in a questionnaire distribution across a given number of data collection respondents and has shown that financial crime and its success contribute directly. The findings indicated that the greater the fraud, the poorer the bank's performance, the more the online fraud appears to impact the financial performance of banks adversely.
References
More filters
Journal ArticleDOI
Zulkifli Hasan1
TL;DR: In this article, the state of Shari'ah governance practices in Malaysia, GCC countries (Kuwait, Bahrain, United Arab Emirates, Qatar and Saudi Arabia) and the UK by highlighting five main elements of good corporate governance that consist of independence, competency, transparency, disclosure and consistency.
Abstract: Purpose – The purpose of this paper is to understand current Shari'ah governance practices with the purpose of promoting greater understanding of some of the crucial issues and to provide relevant information in guiding the future development of Shari'ah governance system. The paper illustrates the state of Shari'ah governance practices in Malaysia, GCC countries (Kuwait, Bahrain, United Arab Emirates, Qatar and Saudi Arabia) and the UK by highlighting five main elements of good corporate governance that consist of independence, competency, transparency, disclosure and consistency.Design/methodology/approach – Since the availability of secondary data on Shari'ah governance practices is very limited, a detailed survey questionnaire is generated for sourcing primary data from Islamic Financial Institutions (IFIs). The study utilizes descriptive analysis approach in extracting and analyzing the data and factual input derived from the questionnaire feedback.Findings – The survey findings affirm that there are...

651 citations

Journal ArticleDOI
TL;DR: A new quantum dialogue protocol is designed by using the continuous-variable two-mode squeezed vacuum states due to its entanglement property to encode their own secret information into the entangled optical modes with the translation operations.
Abstract: A new quantum dialogue protocol is designed by using the continuous-variable two-mode squeezed vacuum states due to its entanglement property. The two communication parties encode their own secret information into the entangled optical modes with the translation operations. Each communication party could deduce the secret information of their counterparts with the help of his or her secret information and the Bell-basis measurement results. The security of the proposed quantum dialogue protocol is guaranteed by the correlation between two-mode squeezed vacuum states and the decoy states performed with translation operations in randomly selected time slots. Compared with the discrete variable quantum dialogue protocols, the proposed continuous-variable quantum dialogue protocol is easy to realize with perfect utilization of quantum bits.

79 citations

Journal ArticleDOI
01 Jun 2017-Optik
TL;DR: Software simulation and the peak-signal-to-noise ratio (PSNR) calculation confirm that the presented scheme is more secure and applicable than the previous ones currently found in the literature.

74 citations

Journal ArticleDOI
TL;DR: A secured direct communication process between N users with partial and full cooperation of quantum server is generalized to ensure the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
Abstract: In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.

68 citations

Journal ArticleDOI
TL;DR: A secure key generation and distribution solution has been proposed for a single host sending to two or more receivers using centralized Quantum Multicast Key Distribution Centre “QMKDC” and classical symmetric encryption.
Abstract: Multicasting refers to the transmission of a message or information from one sender to multiple receivers simultaneously. Although encryption algorithms can be used to secure transmitted messages among group members, still there are many security aspects for designing a secured multicast cryptosystem. The most important aspects of Multicasting are key generation and management. The researchers have proposed several approaches for solving problems of multicast key distribution and management. In this paper, a secure key generation and distribution solution has been proposed for a single host sending to two or more (N) receivers using centralized Quantum Multicast Key Distribution Centre “QMKDC” and classical symmetric encryption. The proposed scheme uses symmetric classical algorithms for encryption and decryption transmitted messages among multicast group members, but the generated keys which are used for authentication, encryption and decryption also play an important role for designing a secured multicast cryptosystem come from QKD protocols. Authentication verified using EPR entangled Photons and controlled-NOT gate. Multiple requests for initialization as well for transmitting sensitive information handled through priority and sensitivity levels. Multiple members’ communication is achieved with full or partial support of QMKDC.

50 citations