Home Proceedings Contact
PDF download
Cite article
Share options
Informations, rights and permissions
Issue image
Vol 6, 2016
Pages: 355 - 363
Conference paper
See full issue

INTERNACIONALNI UNIVERZITET TRAVNIK U TRAVNIKU
EKONOMSKI FAKULTET TRAVNIK U TRAVNIKU
PRAVNI FAKULTET TRAVNIK U TRAVNIKU
FAKULTET ZA MEDIJE I KOMUNIKACIJE TRAVNIK U TRAVNIKU

u saradnji sa

MIT UNIVERZITET SKOPLJE, SJEVERNA MAKEDONIJA
VEVU, VELEUČILIŠTE LAVOSLAV RUZIČKA U VUKOVARU, HRVATSKA
VELEUČILIŠTE VIMAL, SISAK, HRVATSKA
CKKPI, TRAVNIK, BOSNA I HERCEGOVINA

organizuju

31. MEĐUNARODNU KONFERENCIJU

EKONOMSKE, PRAVNE I MEDIJSKE INTEGRACIJE BOSNE I HERCEGOVINE I ZEMALJA ZAPADNOG
BALKANA KAO KLJUČNI POKRETAČ EUROPSKIH VRIJEDNOSTI

12. – 13. decembar 2025. godine

Metrics and citations
Abstract views: 4
PDF Downloads: 3
Google scholar: See link
Article content
  1. Abstract
  2. Disclaimer
Received: 05.12.2016. >> Accepted: 12.12.2016. >> Published: 16.12.2016. Conference paper

SIGURNOSNI PROTOKOLI U E-BANKARSTVU/ SAFETY PROTOCOLS IN E-BANKING

By
Almedina Hatarić ,
Almedina Hatarić

International University of Travnik , Travnik , Bosnia and Herzegovina

Imran Kasumović
Imran Kasumović

International University of Travnik , Travnik , Bosnia and Herzegovina

Abstract

Safety Information System includes actions, measures and procedures in order to protect data and information system from unforeseen events with undesirable consequences. In this direction is the increasing need for disabling any accidental or deliberate distortions and prevent the functions of computer systems. We should also create the necessary conditions for the proper use of predefined functions of information systems. As a basis for finding a satisfactory answer to the question of protection of information systems, we start from the classification of threats that can jeopardize the same accident, crime and error. On the basis of this classification,there are given four answers to questions where a partial response is received, and by their synthesisis receiveda fuller response: · the value of hardware and software; · versatility of computer systems; · characteriatics of computer systems. First, it is necessary to define the purpose of the protection system, that any system of protection has meaning only if something, somewhere, and for some reason needs to be protected, and in order to achieve the goal, we need to execute something in some way on the function. The solution of these set goals is that question is possible with logical units, and according to the "golden questions" of criminology, the corresponding "golden questions" of information protection and which require full answers.

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.