Electronic theft and reduce its impact on the bank's security

Authors

  • Abolfazl Azizi Electronic Branch, Islamic Azad University
  • Alireza Millanei Islamshahr Branch, Islamic Azad University

DOI:

https://doi.org/10.24200/jsshr.vol3iss03pp53-57

Abstract

Information technology affected all aspects of social, economic, cultural and deeply, including criminal law. Any change in today's world because of the complexity of human activities will have consequences. There is always the possibility of abusing in such a way of invention of new tools, as well as correct and legitimate use. Cyberspace, the result of scientific and industrial progress in recent centuries is not an exception to the positive and negative effects on human life and the most important works was the emergence of cybercrimes. Methodology: Computer crime of unauthorized use of computer technology to seize sensitive personal data and confidential information also applies to organizations. Advances in computer technology made it possible to create a new crime to forge compared to traditional methods, are much more technical. Although most electronic thieves are doing it to show off, but the theft is done for the purpose of access to information of the banks, has created a major problem. Results: The purpose of this study was to investigate the electronic theft and its impact on the bank's security. In this study, using documents and legal opinions and legal analysis of the data obtained will be discussed. It is optimized for the opinions of respected professors were used. As we know, in the traditional banking as well as those with some threats faced these threats on electronic systems for others. Conclusion: To provide and enhance the security of electronic banking and the banks should reduce threats, while respecting security policies, including privacy, authenticity, integrity and ... Of security tools such as encryption, user code and password, digital certificates, digital signatures, software and security protocols to be used. 

References

Abed, R., 2012, the criterion for applying this rule, a plurality of different crimes, crime, education, the judiciary monthly messages Department of Education, Issue 54

Brandt, W. M. 2012. U.S. Patent No. 8,321,946. Washington, DC: U.S. Patent and Trademark Office.

Grabosky, E. P., Grabosky, P., Smith, R. G., Smith, R. G., & Dempsey, G. 2001. Electronic theft: Unlawful acquisition in cyberspace. Cambridge University Press.

Hazrati, Shahin Dez, S. 2012, Juridical Nature Of Electronic Theft, Focal Journal, No. 128, Page 75-94

Johnson, R. C. 2003. U.S. Patent No. 6,529,885. Washington, DC: U.S. Patent and Trademark Office.

Lynch, J. 2005. Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks. Berkeley Tech. LJ, 20, 259.

McLean, Jean, 2001, a new era of banking security in today's highly technical world, the fight against crime banking, numerous fronts, translation Kamran Sepehri, the banks and the economy, 18, Ss29-31

Mousavi Bojnordi, S.M. & Bani Hashem, M., 2012, juridical study of internet theft with imam khomein approach, matin journal,no 1, no. 60, page 29-40

Norian, Ali Reza, 2012, FATA, police specialized professional or a trusted ?, week, the security forces of the Islamic Republic of Iran, 23

Saraei, S., Taghavi, H., 2012, nature of internet theft, seman journal, third year, no. 7, page 43-54

Schwartz, P. M., & Janger, E. J. 2006. Notification of data security breaches. Mich. L. Rev., 105, 913.

Smith, T. B. 2004. Electricity theft: a comparative analysis. Energy policy, 3218, 2067-2076.

Downloads

Published

2019-08-10

Issue

Section

Articles