Xxx Xxxxxxxx. 2007. Using a personal device to strengthen password authentication from an untrusted computer. In Financial Cryptography and Data Security, Xxxx Xxxxxxxx ACM Computing Surveys, Vol. 49, No. 4, Article 61, Publication date: December 2016. 61:32 X. Xxxxxx et al. and Xxxxxx Xxxxxxx (Eds.). Lecture Notes in Computer Science, Vol. 4886. Springer, Berlin, 88–103. DOI:xxxx://xx.xxx.xxx/10.1007/978-3-540-77366-5_11 Egwali Xxxxx Xxxxxxxxxxxxx. 2009. Customers perception of security indicators in online banking sites in Nigeria. Journal of Internet Banking and Commerce 14, 1 (2009), 1–15. Xxxxxx Xxxxxxx. 2008. The evolution of commercial malware development kits and colour-by-numbers custom malware. Computer Fraud & Security 2008, 9 (2008), 4–7. DOI:xxxx://xx.xxx.xxx/10.1016/S1361- 3723(08)70135-0 Xxxxx Xxxxxxxxxx and Xxxxxxxx Xx Xxxxxxxxxx. 2015. Danger is my middle name: Experimenting with SSL vulnerabilities in android apps. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec’15). ACM, New York, NY, Article 15, 6 pages. DOI:xxxx://xx.xxx.xxx/ 10.1145/2766498.2766522 Xxxx Xxxxxxxxxxx, Xxxx Xxxxxxxxxxx, Xxxxxx Xxxxxxxxxx, and Xxxxx Xxxxxxx. 2004. Consumer acceptance of online banking: An extension of the technology acceptance model. Internet Research 14, 3 (2004), 224–235. DOI:xxxx://xx.xxx.xxx/10.1108/10662240410542652 Xxx X. X. Xxxx and X. Xxxxxxxxx. 2007. Real time credit card fraud detection using computational intelli- gence. In Proceedings of the International Joint Conference on Neural Networks (IJCNN 2007). 863–868. DOI:xxxx://xx.xxx.xxx/10.1109/IJCNN.2007.4371071 Xxxxxxx Xxxxxx, Xxxxx Xxxxxx, Xxxx Xxxxx, Xxxxxxx Xxxxxxx, and Xxxxx X. X. Xxxxxx. 2015. Mo(bile) money, mo(bile) problems: Analysis of branchless banking applications in the developing world. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC’15). USENIX Association, Berkeley, CA, 17–32. Xxx Xxxxxxx and Xxxx Xxxxx. 1998. The problems with secure on-line banking. Proceedings of the 17th Annual South East Asia Regional Conference (SEARCC’98). Xxxxx Xxxxxxxx. 2005. Two-factor authentication: Too little, too late. Communications of the ACM 48, 4 (April 2005), 136–136. DOI:xxxx://xx.xxx.xxx/10.1145/1053291.1053327 Xxx Xxxxx and Xxxx Xxxxxxxxxx. 2004. Who will rob you on the digital highway? Communications of the ACM 47, 5 (May 2004), 56–60. DOI:xxxx://xx.xxx.xxx/10.1145/986213.986240 Xxxxxxxx Xxxxx, Xxxxxx Xxxxxx, Xxxx X. Xxx Xxxxxxxx, and Xxxxxx Xxxxxxx. 2008. Exploring user reactions to new browser cues for extended validation certificates. In Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security (ESORICS’08). Springer-Verlag, Berlin, 411–427. DOI:xxxx://xx.xxx.xxx/10.1007/978-3-540-88313-5_27 Xxxx Xxxxxxxxxx. 2013. Mobile banking and sustainable growth. American Journal of Economics and Business Administration 5, 3 (2013), 89–94. DOI:xxxx://xx.xxx.xxx/10.3844/ajebasp.2013.89.94 Xxxxxxxx Xxx, Xxxx Xxx, and X. X. Xxxx. 2005. Graphical passwords: A survey. In Proceedings of the 21st An- nual Computer Security Applications Conference. 463–472. DOI:xxxx://xx.xxx.xxx/10.1109/CSAC.2005.27 Xxx Xxx, Xxxxxx Xx, Xxxxxxxx Xxx, Xxxxxx Xx, and Xxxxxxx Xxxx. 2013. Effective detection of sophisti- cated online banking fraud on extremely imbalanced data. World Wide Web 16, 4 (2013), 449–475. DOI:xxxx://xx.xxx.xxx/10.1007/s11280-012-0178-0 X. Xxxxxxx and X. Xxxxxxx. 2011. Secure confirmation of sensitive transaction data in modern internet banking services. In Proceedings of the 2011 World Congress on Internet Security (WorldCIS’11). 125–132. Xxxxxxxx X. Xxxxxxxxx, Xxxxxx X. Xxxxxx, and Xxxx X. Xxxxxxxxx. 2010. Explaining internet banking behavior: Theory of reasoned action, theory of planned behavior, or technology acceptance model? Journal of Ap- plied Social Psychology 40, 5 (2010), 1172–1202. DOI:xxxx://xx.xxx.xxx/10.1111/j.1559-1816.2010.00615.x Xxxxx Xxxxxx and Xxxxxxx X. Xxxx. 1990. Cognitive passwords: The key to easy access control. Computers & Security 9, 8 (1990), 723–736. DOI:xxxx://xx.xxx.xxx/10.1016/0167-4048(90)90115-A Xxxxx Xxxxxxx. 2012. A history of innovation in payments. Retrieved from xxxx://xxx.xxxxxxxxxxxxx.xxx/ 2012/11/28/a-history-of-innovation-in-payments/. Ally Bank. 2010. How We Protect You. Retrieved from xxxx://xxx.xxxx.xxx/security/. Bank of America. 2013. Online Banking Security from Bank of America. Retrieved from xxxxx://xxx.xxxxx xxxxxxxx.xxx/xxxxxxx/xxxxxx-xxxxxx-xxxxxxx-xxxxxxx/xxxxxx-xxxxxxx-xxxxxxxx.xx. Banking & Payments Federation Ireland. 2015. Online and Mobile Banking Report—Full Year 2014 and Q4 2014. Retrieved from xxxx://xxx.xxxx.xx/wp-content/uploads/2015/05/BPFI-Online-and-Mobile- Banking-Q4-2014-FINAL.pdf.
Appears in 5 contracts
Samples: End User Agreement, End User Agreement, End User Agreement