تقوا، م.؛ منصوری، ط.؛ فیضی، ک. و اخگر، ب. (1395). کشف تقلب در تراکنشهای کارتهای بانکی با استفاده از پردازش موازی ناهنجاری در بزرگداده، فصلنامۀ علمی ـ پژوهشی مدیریت فناوری اطلاعات، 8 (3)، 498- 477.
دامغانیان، ح. و کجوری، م.، س. (1391). بررسی تأثیر امنیت ادراکشده بر اعتماد به بانکداری اینترنتی از سوی مشتریان زن (پیمایشی دربارۀ بانک صادرات شهر سمنان)، فصلنامۀ علمی ـ پژوهشی مدیریت فناوری اطلاعات، 4 (13)، 88-71.
راسخی، ا. (1393). جرائم و تهدیدهای سایبری و نقش پلیس در توسعه امنیت نرم در محیط سایبر. فصلنامۀ مطالعات حفاظت و امنیت انتظامی، 32(3)، 201-252.
محقر، ع.؛ لوکس، ک.؛ حسینی، ف. و منشی آ. ع. (1387). کاربرد هوش تجاری بهعنوان یک تکنولوژی اطلاعات استراتژیک در بانکداری: بازرسی و کشف تقلب. فصلنامۀ علمی ـ پژوهشی مدیریت فناوری اطلاعات، 1(1)، 120- 105.
موسوی، پ.؛ زنوز، ر.ی. و حسنپور، ا. (1394). شناسایی ریسکهای امنیت اطلاعات سازمانی با استفاده از روش دلفی فازی در صنعت بانکداری. فصلنامۀ علمی ـ پژوهشی مدیریت فناوری اطلاعات، 7 (1)، 184- 163.
وثوق، م.؛ تقویفرد، م. ت و البرزی، م. (1393) شناسایی تقلب در کارتهای بانکی با استفاده از شبکههای عصبی مصنوعی، فصلنامۀ علمی ـ پژوهشی مدیریت فناوری اطلاعات، 6 (4)، 746- 721.
Abreu, R., Segura, L., David, F., Formigoni, H., Legčević, J. & Mantovani, F. (2015). Ethics and fraud in E-banking services. Information Systems and Technologies (CISTI), 2015 10th Iberian Conference on (pp. 1-6). IEEE.
AbuAli, A.N. & Abu-Addose, H.Y. (2010). Data warehouse critical success factors. European Journal of Scientific Research, 42(2), 326-335.
Abubakre, M., Coombs, C., Jayawardhena, C. & Hunt, A. (2010). Learning the Lessons from the Developed World: e-Banking Security in Nigeria. Learning, 3(1), 1-23.
Adams, R. (2010). Prevent, protect, pursue–a paradigm for preventing fraud. Computer Fraud & Security, 2010 (7), 5-11.
Akinyemi, O., Omogbadegun, Z.O. & Oyelami, O.M. (2011). Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E-Banking System. International Journal of Electrical & Computer Sciences, 10(6).
Albrecht, W.S., Albrecht, C & Albrecht, C.C. (2008). Current trends in fraud and its detection. Information Security Journal: A Global Perspective, 17(1), 2-12.
Auta, E.M. (2010). E-banking in developing economy: Empirical evidence from Nigeria. Journal of applied quantitative methods, 5(2), 212-222.
Benjamin, O.A. & Samson, B.S. (2011). Effect of perceived inequality and perceived job insecurity on fraudulent intent of bank employees in Nigeria. Europe’s Journal of Psychology, 7(1), 99-111.
Bhattacharyya, D., Ranjan, R., Alisherov F. A. & Choi, M. (2009). Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology, 2(3), 13-28.
Button, M. & Gee, J. (2013). Countering fraud for competitive advantage: the professional approach to reducing the last great hidden cost. United Kingdom: John Wiley & Sons.
Choplin, J.M., Stark, D.P. & Ahmad, J.N. (2011). A Psychological Investigation of Consumer Vulnerability to Fraud: Legal and Policy Implication. The Law & Psychology Review, 35, P. 61.
Coram, P., Ferguson, C. & Moroney, R. (2008). Internal audit, alternative internal audit structures and the level of misappropriation of assets fraud. Accounting & Finance, 48(4), 543-559.
Cox, G.M. & Cochran, W.G. (1953). Experimental designs. NewJersey: Wiley.
Damghanian, H. & Kojouri, M. S. (2013). A Study on the Effect of Perceived Security on the Trust of Female Customers in the Internet Banking: (A Survey of the SADERAT BANK in Semnan). Journal of Information Technology Management, 4(13), 71-88 (in Persian).
Dzomira, S. (2014). Electronic fraud (cyber fraud) risk in the banking industry, Zimbabwe. Risk Governance and Control: Financial Markets and Institutions, 4(2), 16-26.
Falzon, J. & Gardener, E. (2016). Strategic challenges in European banking. Berlin: Springer.
Fatima, A. (2011). E-Banking Security issues-Is there a solution in biometrics? Journal of Internet Banking and Commerce, 16(2), 1-15.
Fedrizzi, M., Molinari, A. & Ventre, V. (2004). A model for evaluating the transaction risk in e-banking. IADIS International Conference e-Society Avila, 7(1), 172-178.
Ganesan, R. (2009). A secured hybrid architecture model for internet banking (e-banking). Journal of Internet Banking and Commerce, 14(1), 1-17.
Giles, J. (2010). The problem with online banking. New Scientist, 205 (2745), 18-19.
Igwe, C.N. (2011). Socio-economic developments and the rise of 419 advanced-fee fraud in Nigeria. European Journal of Social Science, 20(1), 184-193.
Johnson, M. & Moore, S. (2007), October. A new approach to e-banking. Proc. 12th Nordic Workshop on Secure IT Systems (NORDSEC 2007), PP. 127-138.
Keely, D. (2001). A security strategy for mobile e-business, NewYork: IBM.
Khasawneh, A., Al Azzam, I. & Bsoul, M. (2009). A study on e-commerce security in Jordan. International Journal of Electronic Finance, 3(2), 166-176.
Koskosas, I. (2011). E-banking security: A communication perspective. Risk Management, 13(1), 81-99.
Leukfeldt, E.R., Kleemans, E.R. & Stol, W.P. (2016). Cybercriminal Networks, Social Ties and Online Forums: Social Ties versus Digital Ties within Phishing and Malware Networks. British Journal of Criminology, 57 (3), 704-722.
Liébana-Cabanillas, F., Muñoz-Leiva, F., Sánchez-Fernández, J. & Viedma-del Jesús, M.I. (2016). The moderating effect of user experience on satisfaction with electronic banking: empirical evidence from the Spanish case. Information Systems and e-Business Management, 14(1), 141-165.
Mathivanan, B. & Kavitha, S. (2015). A Study on Consumer Perception towards E-Banking Services of ICICI Bank. International Journal of Innovative Research and Development, 4(12), 26-33.
Mikhailov, L. (2004). Group prioritization in the AHP by fuzzy preference programming method. Computers & operations research, 31(2), 293-301.
Mohaghar, A., Lucas, C., Hoseini, F., Monshi, A. (2009). Use of Business Intelligence as a Strategic Information Technology in Banking: Farud Discovery & Detection, Journal of Information Technology Management, 1(1), 105-120. (in Persian)
Montazemi, A.R. & Qahri-Saremi, H. (2015). Factors affecting adoption of online banking: A meta-analytic structural equation modeling study. Information & Management, 52(2), 210-226.
Moskovitch, R., Feher, C., Messerman, A., Kirschnick, N., Mustafić, T., Camtepe, A., Löhlein, B., Heister, U., Möller, S., Rokach, L. & Elovici, Y. (2009). Identity theft, computers and behavioral biometrics. Intelligence and Security Informatics, 2009. ISI'09. IEEE International Conference on (pp. 155-160). IEEE.
Mousavi, P., Zonouz, R. Y. & Hasanpour, A. (2014). Identifying Organizational Information Security Risks Using Fuzzy Delphi. Journal of Information Technology Management, 7(1), 163-184. (in Persian)
Murdoch, S.J. & Anderson, R. (2010). Verified by visa and MasterCard secure code: or, how not to design authentication. In Financial Cryptography and Data Security. Springer Berlin Heidelberg.
Okpara, G.C. (2009). A synthesis of the critical factors affecting performance of the Nigerian banking system. European Journal of Economics, Finance and Administrative Sciences, 17, 34-44.
Ong, C.S. & Lin, Y.L. (2015). Security, risk and trust in individual internet banking adoption: an integrated model. International Journal of Electronic Commerce Studies, 6(2), 343.
Parameswar, N., Dhir, S. & Dhir, S. (2017). Banking on Innovation, Innovation in Banking at ICICI Bank. Global Business and Organizational Excellence, 36(2), 6-16.
Pikkarainen, T., Pikkarainen, K., Karjaluoto, H. & Pahnila, S. (2004). Consumer acceptance of online banking: an extension of the technology acceptance model. Internet research, 14(3), 224-235.
Pourreza, M. (2015). The evolution of cybercrime and the ways of dealing with the rights of Iran. National Conference on the Third Millennium and Humanities, Shiraz. (in Persian)
Rana, P. J. & Baria, J. (2015). A Survey on Fraud Detection Techniques in Ecommerce. International Journal of Computer Applications, 113(14), 5-7.
Rasekhi, A. (2014). Crime and cyber threats and the role of police in the development of soft security in cyberspace. Quarterly studies on security and protection, 32, 201-252. (in Persian)
Rizzardi, R. (2008). Financial Management-Payment Card Fraud Can Happen to You. Optometry and vision development, 39(2), 64.
Roberds, W. (1998). The impact of fraud on new methods of retail payment. Economic Review-Federal Reserve Bank of Atlanta, 83(1), 42-52.
Saaty, T. L. (1988). What is the analytic hierarchy process?. In Mathematical models for decision support. Springer Berlin Heidelberg.
Salameh, R., Al-Weshah, G., Al-Nsour, M. & Al-Hiyari, A. (2011). Alternative Internal Audit Structures and Perceived Effectiveness of Internal Audit in Fraud Prevention: Evidence from Jordanian Banking Industry. Canadian Social Science, 7(3), 40-50.
Salehi, M. & Alipour, M. (2010). E-banking in emerging economy: empirical evidence of Iran. International Journal of Economics and Finance, 2(1), 201-209.
Sathye, M. (1999). Adoption of Internet banking by Australian consumers: an empirical investigation. International Journal of bank marketing, 17(7), 324-334.
Saxena, M.D. & Agrawal, R. (2016). Review of the Literature on Adoption and Use of Electronic Banking Channels Over Last Three Decades. Imperial Journal of Interdisciplinary Research, 2(8), 1556-1569.
Shah, K.K. (2016). Electronic Banking: Its Use and Challenge in Nepal. Academic Voices: A Multidisciplinary Journal, 5, 9-15.
Simon, S.J., 2004. Critical success factors for electronic services: Challenges for developing countries. Journal of Global Information Technology Management, 7(2), 31-53.
Sun, Y. & Davidson, I. (2015). Influential factors of online fraud occurrence in retailing banking sectors from a global prospective: An empirical study of individual customers in the UK and China. Information & Computer Security, 23(1), 3-19.
Taghva, M., Mansouri, T., Feizi, K. & Akhgar, B. (2016). Fraud Detection in Credit Card Transactions; Using Parallel Processing of Anomalies in Big Data, Journal of Information Technology Management, 8(3), 477-498. (in Persian)
Tan, J.J., Titkov, L. & Poslad, S. (2002). Securing agent-based e-banking services. In Trust, Reputation, and Security: Theories and Practice. Springer Berlin Heidelberg.
Usman, A. K. & Shah M. H. 2013. Critical Success Factors for Preventing e-Banking Fraud. Journal of Internet Banking and Commerce, 18(2), 1-14.
Vandommele, T. (2010). Biometric authentication today. Proceedings of the Seminar on Network Security. Available in: http://www.cse.hut.fi/en/ publications/B/11/papers/vandommele.pdf.
Vosough, M., Taghavifard, M. T & Alborzi M. (2015). Bank card fraud detection using artificial neural network. Journal of Information Technology Management, 6(4), 721-746. (in Persian)