DEVELOPING A REAL-TIME ELECTRONIC FUNDS TRANSFER SYSTEM FOR CREDIT UNIONS
Keywords:
EFT, Credit Union, Real-time TIS Processing, Fintech, Payment Card Industry Data Security Standard, Gramm-Leach-Bliley Act, Go, Security, Client SupportAbstract
Technological advancement was evidenced by the emergence of a real-time EFT suitable for credit unions only. The purpose of this system was to enable easy, secure, and real-time processing of the funds transfers for the customers and staff members. The core system comprised the front-end client interface and the staff application that would help reduce manual work done in transferring cheques and other bills, improve customer service, and eliminate exposure to penalties from the PCI DSS and the GLBA, among other acts. This paper aims to identify the key issues the system was supposed to solve, the technical solution details, and the performance outcomes, including increased organizational performance, clients’ satisfaction, and security gained by the system. Additionally, the compliance frameworks currently in use, cyber threats and risks, and trends in the RTFT systems are discussed in the industry context.
References
Adnan, H. B., Rahimah, K., & Hasnah, M. (2018). Information Real-Time Delivery (IRTD) System through Internet of Things (IoT): An Improvement in Truck Management Environment. International Journal of Engineering & Technology, 7(4.28), 263-266.
Albahri, O. S., Albahri, A. S., Mohammed, K. I., Zaidan, A. A., Zaidan, B. B., Hashim, M., & Salman, O. H. (2018). Systematic review of real-time remote health monitoring system in triage and priority-based sensor technology: Taxonomy, open challenges, motivation and recommendations. Journal of medical systems, 42, 1-27.
Ali, M. I., Ono, N., Kaysar, M., Shamszaman, Z. U., Pham, T. L., Gao, F., ... & Mileo, A. (2017). Real-time data analytics and event detection for IoT-enabled communication systems. Journal of Web Semantics, 42, 19-37.
Aliero, M. S., Ghani, I., Zainudden, S., Khan, M. M., & Bello, M. (2015). Review on SQL injection protection methods and tools. Jurnal Teknologi, 77(13).
Azzopardi, M. A. (2015). Computational Air Traffic Management.
Bhasin, M. L. (2016). The fight against bank frauds: Current scenario and future challenges. Ciencia e Tecnica Vitivinicola Journal, 31(2), 56-85.
Bugiotti, F., Cabibbo, L., Atzeni, P., & Torlone, R. (2013). A logical approach to nosql databases.
Cleaver, H. (2017). Rupturing the dialectic: The struggle against work, money, and financialization. AK Press.
Colley, D. (2018). Improving Database Security for Relational Database Management Systems.
Danso Junior, M. (2015). An assessment of credit management process of credit unions:(A case of societies in Obuasi municipality) (Doctoral dissertation).
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security issues in cloud environments: a survey. International journal of information security, 13, 113-170.
Gherardi, S., & Nicolini, D. (2016). To transfer is to transform: The circulation of safety knowledge. In Knowing in organizations: A practice-based approach (pp. 204-224). Routledge.
Gladden, M. E. (2017). The handbook of information security for advanced neuroprosthetics. Synthypnion Academic.
Gupta, M., Asadullah, A., Padmanabhuni, S., & Serebrenik, A. (2018). Reducing user input requests to improve IT support ticket resolution process. Empirical Software Engineering, 23(3), 1664-1703.
Hossain, M., Islam, S. R., Ali, F., Kwak, K. S., & Hasan, R. (2018). An Internet of Things-based health prescription assistant and its security system design. Future generation computer systems, 82, 422-439.
Jain, S. (2013). Electronic Fund Transfers: A Critical Study in Indian Context with Special Reference to Security & Privacy Issues. Available at SSRN 2208110.
Jain, S. (2013). Electronic Fund Transfers: A Critical Study in Indian Context with Special Reference to Security & Privacy Issues. Available at SSRN 2208110.
Jain, S. (2013). Electronic Fund Transfers: A Critical Study in Indian Context with Special Reference to Security & Privacy Issues. Available at SSRN 2208110.
Jans, M., Alles, M. G., & Vasarhelyi, M. A. (2014). A field study on the use of process mining of event logs as an analytical procedure in auditing. The Accounting Review, 89(5), 1751-1773.
Kohli, M., & Suarez, E. (2016, December). Centralized solution to securely transfer payment information electronically to banks from multiple enterprise resource planning (ERP) systems. In 2016 International Conference on Information Technology (ICIT) (pp. 275-282). IEEE.
Mazmanian, M., Orlikowski, W. J., & Yates, J. (2013). The autonomy paradox: The implications of mobile email devices for knowledge professionals. Organization science, 24(5), 1337-1357.
Mills, D. C., Wang, K., Malone, B., Ravi, A., Marquardt, J., Badev, A. I., ... & Baird, M. (2016). Distributed ledger technology in payments, clearing, and settlement.
Mongson, R. (2016). Assessing information and communication technology among Small and Medium− Sized Enterprises in the Birim Central Municipalty (Doctoral dissertation, University Of Cape Coast).
Moniruzzaman, A. B. M., & Hossain, S. A. (2013). Nosql database: New era of databases for big data analytics-classification, characteristics and comparison. arXiv preprint arXiv:1307.0191.
Naert, F., Geeroms, H., & Ide, S. (2014). The European Union and the Euro: How to deal with a currency built on dreams?. Intersentia.
Nyawanga, J. O. (2015). Meeting the challenge of cyber threats in emerging electronic transaction technologies in in Kenyan banking sector (Doctoral dissertation, University of Nairobi).
Pantanowitz, L., Mackinnon Jr, A. C., & Sinard, J. H. (2013). Tracking in anatomic pathology. Archives of Pathology and Laboratory Medicine, 137(12), 1798-1810.
Pavlovski, C. (2013). A multi-channel system architecture for banking. International Journal of Computer Science,
Engineering and Applications (IJCSEA) Vol, 3.
Prakash, G. L., Prateek, M., & Singh, I. (2014, July). Data encryption and decryption algorithms using key rotations for data security in cloud system. In 2014 International conference on signal propagation and computer technology (ICSPCT 2014) (pp. 624-629). IEEE.
Rahman, S. (2015). Electronic fund transfer-Pioneered by Citibank NA, Bangladesh.
Rymer, J. R., Richardson, C., Mines, C., Jones, D., Whittaker, D., Miller, J., & McPherson, I. (2015). Low-code platforms deliver customerfacing apps fast, but will they scale up?. Forrester Research.
Shin, I. H., Lee, M. G., & Park, W. (2013). Implementation of the continuous auditing system in the ERP‐based environment. Managerial Auditing Journal, 28(7), 592-627.
Stewart, H., & Jürjens, J. (2018). Data security and consumer trust in FinTech innovation in Germany. Information & Computer Security, 26(1), 109-128.
Strumeyer, G. (2017). The capital markets: evolution of the financial ecosystem. John Wiley & Sons.
Sun, D., & Huang, R. (2016). A stable online scheduling strategy for real-time stream computing over fluctuating big data streams. IEEE Access, 4, 8593-8607.
Taft, R., Mansour, E., Serafini, M., Duggan, J., Elmore, A. J., Aboulnaga, A., ... & Stonebraker, M. (2014). E-store: Fine-grained elastic partitioning for distributed transaction processing systems. Proceedings of the VLDB Endowment, 8(3), 245-256.
Talesh, S. A. (2016). Insurance companies as corporate regulators: The good, the bad, and the ugly. DePaul L. Rev., 66, 463.
Tankard, C. (2017). Encryption as the cornerstone of big data security. Network Security, 2017(3), 5-7.
Thomas, T. W., Tabassum, M., Chu, B., & Lipford, H. (2018, April). Security during application development: An application security expert perspective. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (pp. 1-12).
Wilmarth Jr, A. E. (2014). Citigroup: A case study in managerial and regulatory failures. Ind. L. Rev., 47, 69.
Wolff, P. (2016). Development of Customer Recognition Plugin for Contact Center Application.
Zaman, A. (2017). Security system of credit cards provided by NCC Bank Ltd.
Downloads
Published
Issue
Section
License
Copyright (c) 2018 Akash Gill (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.