is increased by the use of passwords and authorization controls and codes, and by the encryption of data. So-called "firewalls" can also be part of an intranet or extranet system, preventing access to sensitive account data by unauthorized persons, departments or agencies. No system is foolproof, however; industry encryption standards are constantly being upgraded to keep ahead of potential cyber criminals
Section 3: Alternatives for implementing change
The alternatives that banks must consider today have to follow this formula: (a) define and clarify the problem, (b) formulate questions, (c) observe without prejudice, (d) report as accurately as possible in a format everyone can understand, and (e) begin again.
Previous research in the value-creation nature of Electronic Data Interchange (EDI) erred in considering the electronic selling and buying of products withi
...