Welcome to Guest !
 
       IUP Publications
              (Since 1994)
Home About IUP Journals Books Archives Publication Ethics
     
  Subscriber Services   |   Feedback   |   Subscription Form
 
 
 
Login:
- - - - - - - - - - - - - - - - - -- - - - - - - - - - - -
-
   
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
The IUP Journal of Information Technology
Focus

The rapid growth in the use of the Internet and computer technology over the past decade has given birth to new forms of crimes, the cyber crimes. These crimes have no boundaries and affect individuals, organizations and the society at large. According to Norton Cybercrime Report 2011, almost two-thirds of the adult web users globally have fallen victim to some sort of cybercrimes. Around 83% of web users in China were affected by cybercrimes, followed by India and Brazil at 76% each, and the USA at 73%.

The cybercrime incidents are no longer limited to sending of malicious emails. They may range from stealing vital information such as credit card details to launching of cyber attacks on nations’ infrastructure by terrorists. According to survey reports, banking and financial services, pharmaceuticals and IT/ITES sectors are the most preferred targets of cybercriminals. Cybercrime incidents are constantly evolving over the past several years and have emerged as a very concrete threat.

The increasing dependency on IT systems and the Internet to carry out business and provide services leads to exponential growth of vulnerability base which is exploited by the perpetrators of the crimes. Although organizations understand the need to safeguard their IT infrastructure, they are inadequately equipped to counter cyber attacks. Criminals explore diverse possibilities of existing vulnerabilities in the IT systems of the target organizations to achieve their objectives. Of late, cybercriminals have expanded their activities in the fast growing social networking and mobile platforms where most of the users are less aware of security risks. Cyber attacks that utilize social engineering, website defamation, cyber defamation and distributed denial of service have been increasing in recent times.

In its 2015 report, KPMG has revealed that there is a sharp rise in cybercrimes in India. The motive of the perpetrators has changed from cyber attacks that result in business disruption to cyber attacks that provide them financial gains. Consequently, it is imperative for organizations to focus on robust cyber risk management system. A robust cyber risk management system may include commitment by the top management, periodic risk management, a robust cyber defense strategy and a powerful incident response mechanism. It will not only ensure ample ability to fight against cyber attacks but also provide cyber resilience to the organization.

The first paper, “IP-Spoofing Vulnerability Protection Software for Data Communication Network Operators”, by Fidelis I Onah, presents an intelligent system using multi-agent approach for detecting IP-spoofing vulnerability. The author reports that the system is effective in detecting fraudulent transaction data from Real Estate Management network environments.

The second paper, “Particle Swarm Optimization for Feature Selection: A Study on Microarray Data Classification”, by Ajay Kumar Mishra, Subhendu Kumar Pani and Bikram Kesari Ratha, presents a comparative study wherein particle swarm 6 The IUP Journal of Information Technology, Vol. XII, No. 1, 2016 optimization and genetic algorithm techniques are used for feature selection in microarray datasets. Considering the classification performance of several popular classifiers, it is concluded that particle swarm optimization technique provides better results compared to genetic algorithm.

The third paper, “Innovative Cooling Strategies for Cloud Computing Data Centers”, by Manju Lata and Vikas Kumar, provides a review of the traditional and new techniques for data center cooling in large cloud deployment environments. It is informative and provides great help in the design of energy-efficient data centers.

Finally, the last paper, “Risk Perception and Adoption of Mobile Banking Services: A Review”, by Prerna Bagadia and Alok Bansal, presents a study on various factors along with the risk perception of the customers towards adoption of mobile banking services.


-- A C Ojha
Consulting Editor

<< Back
Search
 

  www
  IUP

Search
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Click here to upload your Article

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Automated Teller Machines (ATMs): The Changing Face of Banking in India

Bank Management
Information and communication technology has changed the way in which banks provide services to its customers. These days the customers are able to perform their routine banking transactions without even entering the bank premises. ATM is one such development in recent years, which provides remote banking services all over the world, including India. This paper analyzes the development of this self-service banking in India based on the secondary data.

The Information and Communication Technology (ICT) is playing a very important role in the progress and advancement in almost all walks of life. The deregulated environment has provided an opportunity to restructure the means and methods of delivery of services in many areas, including the banking sector. The ICT has been a focused issue in the past two decades in Indian banking. In fact, ICTs are enabling the banks to change the way in which they are functioning. Improved customer service has become very important for the very survival and growth of banking sector in the reforms era. The technological advancements, deregulations, and intense competition due to the entry of private sector and foreign banks have altered the face of banking from one of mere intermediation to one of provider of quick, efficient and customer-friendly services. With the introduction and adoption of ICT in the banking sector, the customers are fast moving away from the traditional branch banking system to the convenient and comfort of virtual banking. The most important virtual banking services are phone banking, mobile banking, Internet banking and ATM banking. These electronic channels have enhanced the delivery of banking services accurately and efficiently to the customers. The ATMs are an important part of a bank’s alternative channel to reach the customers, to showcase products and services and to create brand awareness. This is reflected in the increase in the number of ATMs all over the world. ATM is one of the most widely used remote banking services all over the world, including India. This paper analyzes the growth of ATMs of different bank groups in India.
International Scenario

If ATMs are largely available over geographically dispersed areas, the benefit from using an ATM will increase as customers will be able to access their bank accounts from any geographic location. This would imply that the value of an ATM network increases with the number of available ATM locations, and the value of a bank network to a customer will be determined in part by the final network size of the banking system. The statistical information on the growth of branches and ATM network in select countries.

Indian Scenario

The financial services industry in India has witnessed a phenomenal growth, diversification and specialization since the initiation of financial sector reforms in 1991. Greater customer orientation is the only way to retain customer loyalty and withstand competition in the liberalized world. In a market-driven strategy of development, customer preference is of paramount importance in any economy. Gone are the days when customers used to come to the doorsteps of banks. Now the banks are required to chase the customers; only those banks which are customercentric and extremely focused on the needs of their clients can succeed in their business today.

more...

 
View Previous Issues
Information Technology