December 2007
Credit Union Journal;12/17/2007, Vol. 11 Issue 50, p24
Trade Publication
The article offers some insights into technology issues related to the operations of credit unions which these organizations must prepare for in 2008. Credit unions must be prepared to employ technology to increase marketing return on investment and improve risk monitoring. Popular technologies include mobile banking and tighter security measures through biometrics among others.


Related Articles

  • Get Your Mobile On. Molvig, Dianne // Credit Union Magazine;Jul2008, Vol. 74 Issue 7, p48 

    The article focuses on the security issues concerning the use of mobile banking by credit unions in the U.S. Tim Wooldridge of Virtual Branch Services suggests that credit unions offering mobile banking should make sure that consumers get the same data. It cites that mobile banking allows users...

  • 4 Mobile Takeaways.  // Credit Union Magazine;Dec2016, Vol. 82 Issue 12, p41 

    The article reports on the credit union's consumer trend on mobile banking and payments in which security is the leading concern which can be eliminated through takeaways such as educating members on mobile banking services, knowledge in biometric security and demand for mobile transactions.

  • Anticipating Users' Desires Frames 2015 Forecast. MCGARVEY, ROBERT // Credit Union Times;12/10/2014, Vol. 25 Issue 47, p18 

    The article discusses mobile banking services highlighting popularity of apps by financial institutions for the customer. According to a study by Texas based app developer Malauzai, credit unions lead in use of mobile financial apps. The apps features include biometric authentication and card...

  • Want Speed to Market? Be a Test Pilot. Kite, Shane // Bank Technology News;Jul2012, Vol. 25 Issue 7, p26 

    The article presents a case study on how Sharon Credit Union offers the latest technology to customers in 2012. It highlights the participation by the credit union as frequently as it can in the first pilot tests its vendors provide for new functionality to deliver technologies to its members....

  • SWIM Makes a Splash in Mobile Banking. West, Louise // Bank Technology News;Dec2001, Vol. 14 Issue 12, p41 

    Reports on the introduction of the subscriber Wireless Application Protocol identity module (SWIM) from SchlumbergerSema to the mobile banking industry in Netherlands. Protection of mobile banking services by a digital signature security; Capability of the SWIM card to be loaded into handsets;...

  • Mobile Banking Don't Cell It Short. Condon, Mark // Credit Union Magazine;Jun2007, Vol. 73 Issue 6, p22 

    The author reflects on the use of mobile phones to conduct bank transactions in the U.S. Although the trend is not widely used in the country, the author believes that it is not far from happening. He says that it could greatly benefit consumers because it lightens the load on their wallets....

  • Verify, Schmerify. Jepson, Kevin // Credit Union Journal;12/17/2007, Vol. 11 Issue 50, p22 

    The article reports on the addition of layers of multi-factor authentication features such as digital certificates and biometrics into the online and automated systems of credit unions in the U.S. Digital certificates and biometrics are added as features to elaborate passwords and maiden names...

  • Employee Preview Events Help Staff Promote Mobile Usage. Passman, Aaron // Credit Union Journal;10/29/2012, Vol. 16 Issue 44, p33 

    The article reports that Tower Federal Credit Union (FCU) has used the Mobile Mania employee event to introduce its mobile banking offerings to employees. It informs that the demonstration stations offered previews of the CU's mobile applications (apps) which gave Tower employees better...

  • Enhanced Authentication Mechanisms for Desktop Platform and Smart Phones. Menshawy, Dina EL; Mokhtar, Hoda M. O.; Hegazy, Osman // International Journal of Advanced Computer Science & Application;Oct2012, Vol. 3 Issue 10, p100 

    With hundreds of millions using computers and mobile devices all over the globe, these devices have an established position in modern society. Nevertheless, most of these devices use weak authentication techniques with passwords and PINs which can be easily hacked. Thus, stronger identification...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics