There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will …
The previous chapters explored cybercriminal activities associated with computer intrusion and manipulation, which are generally labelled as hacking. This chapter critically explores …
The overwhelming popularity of technology-based solutions and innovations to address day- to-day processes has significantly contributed to the emergence of smart cities. where …
S Inder, K Sood, S Grima - Journal of Risk and Financial Management, 2022 - mdpi.com
Technology is emerging as an as an important banking mode for customers, and although almost all the banks in India are offering Internet Banking, India faces problems related to …
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant …
Personal data is valuable and vulnerable to individuals who have wrong intentions as any other possessions. This can be mitigated by good cyber hygiene habits. The main aim of this …
Although the Internet of Things (IoT) provides many benefits for our life but it also raises many security threats. The main risk is the security of the transferred data comprising very …
Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is …
Mobile technology has revolutionised various business processes. Banking is one of them. Traditional banking operations are gradually changing with the introduction of efficient …