Mgt Da 1.docx

  • Uploaded by: Mahammad Rehaman
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Mgt Da 1.docx as PDF for free.

More details

  • Words: 2,550
  • Pages: 10
Problem Statement: The project entitled ATM system has a drastic change to that of the olderversion of banking system, customer feel inconvenient with the transaction method as it wasin the hands of the bank employees.In our ATM system, the above problem is overcome here, the transactions are done in person by the customer thus makes the customers feel safe and secure.Thus the application of our system helps the customer in checking the balanceand transaction of the amount by validating the pin number therefore ATM system is more State Bank of India is planning to introduce Automated Teller Machine (ATM)system for its customers to provide convenient withdrawal service in everywhere,even if customer doesn’t come to a bank. A software is to be designed that willcontrol ATM having a magnetic stripe reader for reading an ATM card, a customerconsole (keyboard and display) for interaction with the customer, a slot fordepositing envelopes, a dispenser for cash (in multiples of Rs.100) and a printer forprinting customer receipts. The bank provides computer to maintain its ownaccounts and process transactions against them.The ATM will service one customer at a time. A customer will be required to insertan ATM card and enter a personal identification number (PIN) - both of which willbe sent to the bank for validation as part of each transaction. The customer willthen be able to perform one or more transactions. The card will be retained in themachine until the customer indicates that he/she desires no further transactions,at which point it will be returned.The ATM will communicate each transaction to the bank and obtain verificationthat it was allowed by the bank. If the bank determines that the customer's PIN isinvalid, the customer will be required to re-enter the PIN before a transaction canproceed. If the customer is unable to successfully enter the PIN after three tries,the card

will be permanently retained by the machine, and the customer will haveto contact the bank to get it back. If a transaction fails for any reason other thanan invalid PIN, the ATM will display an explanation of the problem, and will thenask the customer whether he/she wants to do another transaction.The ATM will also maintain an internal log of transactions to facilitate resolvingambiguities arising from a hardware failure in the middle of a transaction. Entrieswill be made in the log when the ATM is started up and shut down, for eachmessage sent to the Bank (along with the response back, if one is expected), forthe dispensing of cash, and for the receiving of an envelope. Log entries maycontain card numbers and amounts, but for security will never contain a PIN.To avail ATM facility, a customer is required to open/have an account in the bankand apply for the ATM card. A customer can have one or more accounts and foreach account, only one ATM card will be provided. The bank also provides SMS updates for every transaction of customer’s account . To obtain SMS updates,customer is required to register his/her mobile number against his account in thebank. Tariq Mahmood,gulam mujhtaba sheik[2013]:Nowadays, Automated Teller Machines (ATMs) provide significant online support to bank customers. A limitation of ATM usage is that customers often have to wait in a queue, especially at ATMs installed at busy locations. Also, old people tend to consume more ATM usage time, possibly frustrating customers in the queue. In these situations, ATMs should “adapt” to the behavior of the customers to minimize the usage time. To this end, we apply data mining techniques to an ATM transaction dataset obtained from an international bank based in Kuwait. We pre-process this dataset, and convert it into a specific XML format to mine it through the ProM (process mining) tool. Our results reveal that customers withdraw money most frequently, followed by purchases (through an ATM card) and balance inquiry transactions. Customers re-do these transactions

frequently, and also employ them one after the other. We acquire the distributions of the withdrawn amount, based on individual customers, the location (ATM terminal) and time of the withdrawl.

MohsinKarovaliya SaifaliKaredia,SharadOza,D.R.Kalbande,[2015]:he purpose of this paper is to reinforce security of the conventional ATM model. We have posited a new concept that enhances the overall experience, usability and convenience of the transaction at the ATM. Features like face recognition and One-Time Password (OTP) are used for the enhancement of security of accounts and privacy of users. Face recognition technology helps the machine to identify each and every user uniquely thus making face as a key. This completely eliminates the chances of fraud due to theft and duplicity of the ATM cards. Moreover, the randomly generated OTP frees the user from remembering PINs as it itself acts as a PIN.

MohsinKarovaliya,SaifaliKaredia,SharadOza,MohsinKarovaliyaaSa ifaliKarediabSharadOza[2015]:The purpose of this paper is to reinforce security of the conventional ATM model. We have posited a new concept that enhances the overall experience, usability and convenience of the transaction at the ATM. Features like face recognition and One-Time Password (OTP) are used for the enhancement of security of accounts and privacy of users. Face recognition technology helps the machine to identify each and every user uniquely thus making face as a key. This completely eliminates the chances of fraud due to theft and duplicity of the ATM cards. Moreover, the randomly generated OTP frees the user from remembering PINs as it itself acts as a PIN.

Caitlin E.Tolbert, Matthew V.Beck, Claire E.Kilmer, Melissa C.Srougi[2019]:Ataxia-telangiectasia mutated (ATM) is a serinethreonine kinase that is integral in the response to DNA double-stranded breaks (DSBs). Cells and tissues lacking ATM are prone to tumor development and enhanced tumor cell migration and invasion. Interestingly, ATM-deficient cells exhibit high levels of oxidative stress; however, the direct mechanism whereby ATM-associated oxidative stress may contribute to the cancer phenotype remains largely unexplored. Rac1, a member of the Rho family of GTPases, also plays an important regulatory role in cellular growth, motility, and cancer formation. Rac1 can be activated directly by reactive oxygen species (ROS), by a mechanism distinct from canonical guanine nucleotide exchange factor-driven activation. Here we show that loss of ATM kinase activity elevates intracellular ROS, leading to Rac1 activation. Rac1 activity drives cytoskeletal rearrangements resulting in increased cellular spreading and motility.\ NigelWalsh[2005]:As technology and administrative measures have borne down on credit card fraud at point of sale (POS), criminals have turned to card-not-present fraud and the vulnerable ATM infrastructure to perpetrate their crimes. In recent years there have been a number of instances of ATMs owned by independent sales organisations (ISO) being internally compromised. External skimming and video devices are also increasingly being used to capture magnetic stripe data and customers' PINs.

Phil scarfo[2017]:In the drive to secure identity in an increasingly connected digital world, biometric technology is flourishing throughout the worldwide banking infrastructure. In many banking services markets, biometrics is authenticating millions of users at the ATM while improving the user experience, increasing transaction security and delivering trust in transactions. connected digital world, biometric technology is flourishing throughout the worldwide banking infrastructure. In many banking services markets, biometrics is authenticating millions of users at the ATM while improving the user experience, increasing transaction security

ThierryMagnac[2017]:We evaluate the impact of “foreign” fees paid by consumers on their cash withdrawals at automatic teller machines (henceforth ATMs). These so called foreign fees are paid when consumers withdraw cash from ATMs which are not owned by their home bank. We take advantage of a natural experiment whereby (non linear) foreign ATM fees in one specific bank became suddenly applicable at one point in time. We also use this experiment to evaluate the substitutions between foreign ATM withdrawals and other home ATM or desk withdrawals as well as with payments by card. Using panel data on accounts, we first estimate average treatment effects on the treated before carrying on with the estimation of a simple structural model. N.Raghu Kisore, CH.B Koteswaraiah[2017]: location is a problem of paramount importance and optimizing business operations without affecting customer service is very challenging. In the case of banking services, the location of bank branches and ATMs must match the service demands (turn around time for service, reachability etc) of the customers’ and the expected quality of service is determined by the socio-economic background of the customer. Therefore, it is necessary to formulate the optimization problem so as to reflect the customers’ expectations and tolerance for quality of service in a given geographical region. The ability to do so requires clustering people living in the

region into several smaller areas called service areas. An ideal clustering algorithm should consider the social behavior of people living in the service area and the uncertainty associated with their social behavior. K.KawashimaH.Saito[2009]: This paper addresses the traffic issues in ATM networks and reviews some recent results. Design of ATM networks is divided into a call level and a cell level. Modelling of a cell arrival process, which is an essential part of a network design, is surveyed. Traffic control also consists of a call level and a cell level. It includes a call admission control, routing, policing, a GOS control and a congestion control. Proposed controls are investigated. . Modelling of a cell arrival process, which is an essential part of a network design, is surveyed. Traffic control also consists of a call level and a cell level

Christopher R.Knittel, VictorStango[2011]:We test whether firms use incompatibility strategically, using data from ATM markets. High ATM fees degrade the value of competitors’ deposit accounts, and can in principle serve as a mechanism for siphoning depositors away from competitors or for creating deposit account differentiation. Our empirical framework can empirically distinguish surcharging motivated by this strategic concern from surcharging that simply maximizes ATM profit considered as a stand-alone operation. The results are consistent with such behavior by large banks, but not by small banks. For large banks, the effect of incompatibility seems to operate through higher deposit account fees rather than increased deposit account base. Our empirical framework can empirically distinguish surcharging motivated by this strategic concern from surcharging that simply maximizes ATM profit considered as a stand-alone operation. The results are consistent with such behavior by large banks, but not by small banks.

FOCUS GROUP DISCUSSION: Problem with Money Withdrawal from an ATM machine ? You have to inform the bank where you have account i.e. in your case SBI. SBI will talk to the other bank (whose ATM you were using) and settle the transaction. I had similar problem and it took 3 months to get settled (in my case I was using ICICI Visa Debit card in SBI ATM and after such mishap, I was advised to apprach ICICI by the adjacent SBI bank branch). Rememebr that you need to keep the ATM transaction slip (in case you have) with you very carefully becuase this is the only proof you would be having about this "disputed" transaction.

What should YOU do if the ATM does not give my card back?

First of all, you need to block your card by calling to (+992 3422) 6-69-99. In the event your card has been captured by our ATM, you should contact the nearest branch of our bank and fill out an application for the return of your card captured by the ATM. As soon as your card is removed from the ATM, you will be contacted and told where you can get your card back. If your card has been captured by another bank's ATM, you need to contact that bank, and as a rule, with provision of the client's passport, the captured card is returned. If that bank refuses to return you the card, you can call the section of plastic cards service of Bank Eskhata.

What should you do when you forget my password (code)?

Surely it is desirable for you always to remember your password or to write it down somewhere without any comments. Otherwise, you need to write an application to get a new card stating the reason. The PIN code is known only to you, and if you forget the PIN code, you will have to get a new card due to the loss of a PIN code.

Can I replenish my card account from any location? The card can be replenished from any bank. For this the detail of the beneficiary is required.

Is there any minimum and maximum cash withdrawal limit per day? From this card, SBI allows cash withdrawals up to R 40,000 per day. The minimum amount that you can withdraw using this card is R 100. However, if you make online transactions or shop using your debit card at point of sales (PoS), a daily limit of R 50,000 is applicable, according to SBI's website. What is the difference between an ATM Card and a debit card? An ATM card is used primarily for cash withdrawal at ATMs. However, a debit card can not only be used for cash withdrawals at ATMs, but also for purchases online or at retail outlets by directly debiting your Bank account. What type of cards can be used at an ATM? The ATM cards/debit cards, credit cards and prepaid cards(that permit cashwhdrawal) can be used at ATMs for various transactions. How do I update my mobile number from the ATM? Procedure to update Indian Mobile Number in Savings account: You can update the Mobile number though any of the following Channels:

ICICI Bank ATM: Visit the nearest ICICI Bank ATM > Select ‘More options’ > Register your Mobile > Enter the mobile number. Your mobile number will be updated in 1 working day. ICICI Bank Branch: Please visit the nearest ICICI Bank branch along with your original photo ID proof. Once the request is placed, your mobile number will be updated in 2 working days. To locate the nearest ICICI Bank Branch, visit maps.icicibank.com/mobile.

What security issues do ATMs have? Because ATMs contain large amounts of cash, they are attractive targets for criminals. The most brazen thefts have involved physically stealing the ATM as a whole, though muggers have also accosted ATM users, who, unsurprisingly, are likely to be carrying cash. Can ATMs be hacked? Tech-savvy criminals have several options for hacking ATMs. The outer casings of ATMs often conceal hidden USB ports, used for software maintenance and update. If an attacker can locate the hidden port, he can insert a portable USB drive with a malicious program installed, taking control of the machine. That essentially allows the attacker to dispense cash without using a card.

What security measures are or can be deployed? ATM-related fraud and theft can’t be completely prevented. Banks are working to develop additional security measures, such as the three-digit CVV on the back of cards. Individuals can also take preventive measures to protect themselves when using ATMs:

How can new technology make ATMs more secure? As the ever-escalating arms race between ATM security professionals and criminals continues, customers will find themselves urged to use increasingly advanced security methods to identify themselves at ATMs. One method is twofactor authentication, which adds an additional layer of security a user must pass before being allowed access to an account. Often used when logging in to online services like social media and email systems, two-factor authentication has most commonly involved entering not only the PIN but also a numeric code received by text message on the user’s phone and valid for only a short period of time.

Related Documents

Mgt Da 1.docx
May 2020 14
Mgt
November 2019 43
Mgt
November 2019 41
Mgt
November 2019 41
Mgt
November 2019 40
Mgt
November 2019 32

More Documents from ""

Mgt Da 1.docx
May 2020 14
Permohonan Siujk.doc
April 2020 14
Permohonan Siujk.doc
April 2020 12
Wc_bracket_16.pdf
November 2019 10
Mohanty
June 2020 11