{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:18:16Z","timestamp":1773778696394,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T00:00:00Z","timestamp":1646870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,10]]},"DOI":"10.1145\/3542954.3543002","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T23:13:51Z","timestamp":1660259631000},"page":"330-336","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Review on E-Banking Security in Bangladesh: An Empirical Study"],"prefix":"10.1145","author":[{"given":"Md. Ahosan Hossain","family":"Sijan","sequence":"first","affiliation":[{"name":"American International University-Bangladesh, Bangladesh"}]},{"given":"Arshad","family":"Shahoriar","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh, Bangladesh"}]},{"given":"Md.","family":"Salimullah","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh, Bangladesh"}]},{"given":"Ankan Shahriar","family":"Islam","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh, Bangladesh"}]},{"given":"Razib Hayat","family":"Khan","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2022,8,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Mohammad Shamsus Sadekin 2016. \"Security of E-Banking in Bangladesh\" \u00a0Journal of Finance and Accounting vol. 4 no. 1 pp. 1-8. Available: 10.11648\/j.jfa.20160401.11  Mohammad Shamsus Sadekin 2016. \"Security of E-Banking in Bangladesh\" \u00a0Journal of Finance and Accounting vol. 4 no. 1 pp. 1-8. Available: 10.11648\/j.jfa.20160401.11","DOI":"10.11648\/j.jfa.20160401.11"},{"key":"e_1_3_2_1_2_1","volume-title":"Md. Nazirul Islam Sarker","author":"Rahman Mahbub","year":"2017","unstructured":"Mahbub Rahman , Nilanjan Kumar Saha , Md. Nazirul Islam Sarker , Arifin Sultana and A. Z. M. Shafiullah Prodhan, 2017 . \"Problems and Prospects of Electronic Banking in Bangladesh : A Case Study on Dutch-Bangla Bank Limited\",\u00a0American Journal of Operations Management and Information Systems , vol. 2 , no. 1, pp. 42-53. Available: 10.11648\/j.ajomis.20170201.17 Mahbub Rahman, Nilanjan Kumar Saha, Md. Nazirul Islam Sarker, Arifin Sultana and A. Z. M. Shafiullah Prodhan, 2017. \"Problems and Prospects of Electronic Banking in Bangladesh: A Case Study on Dutch-Bangla Bank Limited\",\u00a0American Journal of Operations Management and Information Systems, vol. 2, no. 1, pp. 42-53. Available: 10.11648\/j.ajomis.20170201.17"},{"key":"e_1_3_2_1_3_1","volume-title":"Shaik Mazhar Hussain and Anilloy Frank","author":"Khalaf Al Hattali Sultan Saleem","year":"2020","unstructured":"Sultan Saleem Khalaf Al Hattali , Shaik Mazhar Hussain and Anilloy Frank , 2020 . \"Design and development for detection and prevention of ATM skimming frauds\",\u00a0Indonesian Journal of Electrical Engineering and Computer Science , vol. 17 , no. 3, p. 1224. Available: 10.11591\/ijeecs. v17.i3. pp1224-1231 Sultan Saleem Khalaf Al Hattali, Shaik Mazhar Hussain and Anilloy Frank, 2020. \"Design and development for detection and prevention of ATM skimming frauds\",\u00a0Indonesian Journal of Electrical Engineering and Computer Science, vol. 17, no. 3, p. 1224. Available: 10.11591\/ijeecs. v17.i3. pp1224-1231"},{"key":"e_1_3_2_1_4_1","volume-title":"Abdellah Madani and Najib El Kamoun","author":"Tabiaa Meriem","year":"2017","unstructured":"Meriem Tabiaa , Abdellah Madani and Najib El Kamoun , 2017 . \"E-Banking: Security risks, previsions and recommendations\",\u00a0IJCSNS International Journal of Computer Science and Network Security , vol. 17 , no. 11, pp. 189-196. Meriem Tabiaa, Abdellah Madani and Najib El Kamoun, 2017. \"E-Banking: Security risks, previsions and recommendations\",\u00a0IJCSNS International Journal of Computer Science and Network Security, vol. 17, no. 11, pp. 189-196."},{"key":"e_1_3_2_1_5_1","volume-title":"Phishing Attacks, Analysis and Prevention of Fraudulent Activities\",\u00a0International Journal of Emerging Technology and Advanced Engineering","author":"Alsayed Alhuseen Omar","unstructured":"Alhuseen Omar Alsayed and Anwar Bilgrami , 2017. \"E- Banking Security : Internet Hacking , Phishing Attacks, Analysis and Prevention of Fraudulent Activities\",\u00a0International Journal of Emerging Technology and Advanced Engineering , vol. 7 , no. 1, pp. 109-115. Available: https:\/\/www.researchgate.net\/publication\/315399380_E-Banking_Security_Internet_Hacking_Phishing_Attacks_Analysis_and_Prevention_of_Fraudulent_Activities. Alhuseen Omar Alsayed and Anwar Bilgrami, 2017. \"E-Banking Security: Internet Hacking, Phishing Attacks, Analysis and Prevention of Fraudulent Activities\",\u00a0International Journal of Emerging Technology and Advanced Engineering, vol. 7, no. 1, pp. 109-115. Available: https:\/\/www.researchgate.net\/publication\/315399380_E-Banking_Security_Internet_Hacking_Phishing_Attacks_Analysis_and_Prevention_of_Fraudulent_Activities."},{"key":"e_1_3_2_1_6_1","unstructured":"Banking with Safe Money Technology\" \u00a0Usa.kaspersky.com 2021. [Online]. Available: https:\/\/usa.kaspersky.com\/enterprise-security\/wiki-section\/products\/online-banking-the-safe-money-technology.  Banking with Safe Money Technology\" \u00a0Usa.kaspersky.com 2021. [Online]. Available: https:\/\/usa.kaspersky.com\/enterprise-security\/wiki-section\/products\/online-banking-the-safe-money-technology."},{"key":"e_1_3_2_1_7_1","unstructured":"Phishing\" \u00a0Mimecast.com 2021. [Online]. Available: https:\/\/www.mimecast.com\/content\/anti-phishing\/#:\u223c:text=Anti%2Dphishing%20technology%20is%20designed potential%20phishing%20or%20impersonation%20attack.  Phishing\" \u00a0Mimecast.com 2021. [Online]. Available: https:\/\/www.mimecast.com\/content\/anti-phishing\/#:\u223c:text=Anti%2Dphishing%20technology%20is%20designed potential%20phishing%20or%20impersonation%20attack."},{"key":"e_1_3_2_1_8_1","volume-title":"Prajoy Podder and Md Robiul","author":"Sarker Bipasha","year":"2020","unstructured":"Bipasha Sarker , Bidisha Sarker , Prajoy Podder and Md Robiul , 2020 . \"Progression of Internet Banking System in Bangladesh and its Challenges\",\u00a0International Journal of Computer Applications , vol. 177 , no. 29, pp. 11-15. Available: 10.5120\/ijca2020919762 Bipasha Sarker, Bidisha Sarker, Prajoy Podder and Md Robiul, 2020. \"Progression of Internet Banking System in Bangladesh and its Challenges\",\u00a0International Journal of Computer Applications, vol. 177, no. 29, pp. 11-15. Available: 10.5120\/ijca2020919762"},{"issue":"3","key":"e_1_3_2_1_9_1","first-page":"93","article-title":"Effect of E-Banking on Banking Sector of Bangladesh\",\u00a0International Journal of Economics","volume":"4","author":"Sadekin Mohammad Shamsus","year":"2016","unstructured":"Mohammad Shamsus Sadekin , 2016 . \" Effect of E-Banking on Banking Sector of Bangladesh\",\u00a0International Journal of Economics , Finance and Management Sciences , vol. 4 , no. 3 , p. 93 . Available: 10.11648\/j.ijefm.20160403.11 Mohammad Shamsus Sadekin, 2016. \"Effect of E-Banking on Banking Sector of Bangladesh\",\u00a0International Journal of Economics, Finance and Management Sciences, vol. 4, no. 3, p. 93. Available: 10.11648\/j.ijefm.20160403.11","journal-title":"Finance and Management Sciences"},{"key":"e_1_3_2_1_10_1","unstructured":"\"Guideline on ICT Security for Banks and Non-Bank Financial Institutions\" \u00a0Bb.org.bd 2015. [Online]. Available: https:\/\/www.bb.org.bd\/aboutus\/regulationguideline\/brpd\/guideline_v3_ict.pdf.  \"Guideline on ICT Security for Banks and Non-Bank Financial Institutions\" \u00a0Bb.org.bd 2015. [Online]. Available: https:\/\/www.bb.org.bd\/aboutus\/regulationguideline\/brpd\/guideline_v3_ict.pdf."},{"key":"e_1_3_2_1_11_1","unstructured":"arrest four with ties to Dutch-Bangla Bank ATM fraud\" \u00a0Bdnews24.com 2021. [Online]. Available: https:\/\/bdnews24.com\/bangladesh\/2021\/06\/16\/bangladesh-arrests-four-with-ties-to-dutch-bangla-bank-atm-fraud.  arrest four with ties to Dutch-Bangla Bank ATM fraud\" \u00a0Bdnews24.com 2021. [Online]. Available: https:\/\/bdnews24.com\/bangladesh\/2021\/06\/16\/bangladesh-arrests-four-with-ties-to-dutch-bangla-bank-atm-fraud."},{"key":"e_1_3_2_1_12_1","volume-title":"Available: https:\/\/www.thedailystar.net\/business\/banking\/bangladesh-bank-cyber-hacking-billion-dollar-hit-job-1863310. [2] Md. Mijanur Rahman and Anuva Rani Saha","author":"The","year":"2018","unstructured":"\" The billion-dollar hit job\",\u00a0 The Daily Star , 2021. [Online]. Available: https:\/\/www.thedailystar.net\/business\/banking\/bangladesh-bank-cyber-hacking-billion-dollar-hit-job-1863310. [2] Md. Mijanur Rahman and Anuva Rani Saha , 2018 . \"Automated Teller Machine Card Fraud of Financial Organizations in Bangladesh\",\u00a0Journal of Computer Science Applications and Information Technology, vol. 3, no. 1, pp. 1-6. Available: 10.15226\/2474-9257\/3\/1\/00126 \"The billion-dollar hit job\",\u00a0The Daily Star, 2021. [Online]. Available: https:\/\/www.thedailystar.net\/business\/banking\/bangladesh-bank-cyber-hacking-billion-dollar-hit-job-1863310. [2] Md. Mijanur Rahman and Anuva Rani Saha, 2018. \"Automated Teller Machine Card Fraud of Financial Organizations in Bangladesh\",\u00a0Journal of Computer Science Applications and Information Technology, vol. 3, no. 1, pp. 1-6. Available: 10.15226\/2474-9257\/3\/1\/00126"}],"event":{"name":"ICCA 2022: 2nd International Conference on Computing Advancements","location":"Dhaka Bangladesh","acronym":"ICCA 2022"},"container-title":["Proceedings of the 2nd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3542954.3543002","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3542954.3543002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:32Z","timestamp":1750182572000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3542954.3543002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,10]]},"references-count":12,"alternative-id":["10.1145\/3542954.3543002","10.1145\/3542954"],"URL":"https:\/\/doi.org\/10.1145\/3542954.3543002","relation":{},"subject":[],"published":{"date-parts":[[2022,3,10]]},"assertion":[{"value":"2022-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}