Home
PDF download
Cite article
Share options
Informations, rights and permissions
Issue image
Vol 6, 2016
Pages: 355 - 363
Conference paper
See full issue

INTERNACIONALNI UNIVERZITET TRAVNIK U TRAVNIKU
SAOBRAĆAJNI FAKULTET TRAVNIK U TRAVNIKU
EKOLOŠKI FAKULTET TRAVNIK U TRAVNIKU
FAKULTET INFORMACIONIH TEHNOLOGIJA TRAVNIK U TRAVNIKU
FAKULTET POLITEHNIČKIH NAUKA TRAVNIK U TRAVNIKU

u saradnji sa

FAKULTETA ZA LOGISTIKO UNIVERZA V MARIBORU, SLOVENIJA

organizuju

33. MEĐUNARODNU KONFERENCIJU

"IZAZOVI NOVIH TEHNOLOGIJA U FUNKCIJI MOBILNOSTI I ODRŽIVOG RAZVOJA"

15. - 16. maj 2026. godine

Metrics and citations
Abstract views: 71
PDF Downloads: 128
Google scholar: See link
Article content
  1. Abstract
  2. Disclaimer
Received: 05.12.2016. >> Accepted: 12.12.2016. >> Published: 17.12.2016. Conference paper

SIGURNOSNI PROTOKOLI U E-BANKARSTVU/ SAFETY PROTOCOLS IN E-BANKING

By
Almedina Hatarić ,
Almedina Hatarić

International University of Travnik , Travnik , Bosnia and Herzegovina

Imran Kasumović
Imran Kasumović

International University of Travnik , Travnik , Bosnia and Herzegovina

Abstract

Safety Information System includes actions, measures and procedures in order to protect data and information system from unforeseen events with undesirable consequences. In this direction is the increasing need for disabling any accidental or deliberate distortions and prevent the functions of computer systems. We should also create the necessary conditions for the proper use of predefined functions of information systems. As a basis for finding a satisfactory answer to the question of protection of information systems, we start from the classification of threats that can jeopardize the same accident, crime and error. On the basis of this classification,there are given four answers to questions where a partial response is received, and by their synthesisis receiveda fuller response: · the value of hardware and software; · versatility of computer systems; · characteriatics of computer systems. First, it is necessary to define the purpose of the protection system, that any system of protection has meaning only if something, somewhere, and for some reason needs to be protected, and in order to achieve the goal, we need to execute something in some way on the function. The solution of these set goals is that question is possible with logical units, and according to the "golden questions" of criminology, the corresponding "golden questions" of information protection and which require full answers.

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.