International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (P): 2394-5443 ISSN (O): 2394-7454 Vol - 7, Issue - 65, April 2020
  1. 1
    Google Scholar
Analysis of card management and associated operational risk in banks of Nepal

Gajendra Sharma and Ravi Shrestha

Abstract

Analysis of card management and associated operational risk in banks of Nepal’ gives us insight on how banks are performing their card management and reconciliation process. This allows us to understand their card management and reconciliation process and operational risk associated with it. Understanding these processes grants us insights to provide suggestions and tips to the employees to efficiently carry out their task. Respondents were provided with questionnaires, and some were interviewed personally regarding the subject matter. The secondary data were collected via reports, journals and websites. After the data collection, it was found that most of the banks are using the card management software and most of them are not efficient enough to satisfy the need of users using it and the institutions. Finally, it is recommended that the institutions should implement few concepts immediately to reduce the operational risk and add additional features to the existing system as mentioned in the prototype.

Keyword

Card management, Bank, Reconciliation, Operational risk, ATM, Maker, Checker, Debit card, Credit card.

Cite this article

Sharma G, Shrestha R

Refference

[1][1]Kamal A Q, Sulieman A. H. I., Mahmoud A.-M. A. S. Electronic credit cards usage and their impact on Banka™s profitability: the rate of return on owners equity model an empirical study. IJCRB Journal, UK. 2012

[2][2]https://www.theseus.fi/bitstream/handle/10024/68609/Thesis_doc.pdf?sequence. Accessed 10 January 2020.

[3][3]Ilnicki D. The automated teller machine as a new service (Poland case study). Moravian Geographical Reports. 2003; 11(1):20-6.

[4][4]Nair DJ, Nahar S. ATM transaction: a new time based approach research paper. International Journal of Science, Engineering and Technology Research.2015; 4(6):2254-6.

[5][5]Hooda K. ATM security. International Journal of Scientific and Research Publications. 2016; 6(4):159-66.

[6][6]Hayashi F, Sullivan RJ, Weiner SE. A guide to the ATM and debit card industry-2006 update. Monograph. 2006.

[7][7]Simiyu JS, Momanyi G, Naibei KI, Odondo AJ. Credit and debit card usage and cash flow management control by customers: evidences from commercial banks customers in Kisumu City, Kenya. African Research Review. 2012; 6(4):157-72.

[8][8]http://www.imnepal.com/debit-credit-cards-nepal/. Accessed 10 January 2020.

[9][9]Dhungel A, Banodita A, Upadhyay-Dhungel K. Perception of bank customers about automated teller machine (ATM) service quality. Banking Journal. 2012; 2(2):23-38.

[10][10]Kani M, Joy MT. Issues and challenges faced by ATM customers of state bank of India in South Tamil Nadu. Indian Journal of Research. 2013; 2(7):158-61.

[11][11]https://www.statista.com/statistics/673235/automated-teller-machines-nepal/. Accessed 10 January 2020.

[12][12]Bank NR. Banking and financial statistics. 2009.

[13][13]https://blog.khalti.com/fintech-trends/brief-history-of-banking-in-nepal/. Accessed 10 January 2020.

[14][14]Bank NR. Financial Institutions and Its Reach in Nepal. RB, Kathmandu, 2019.

[15][15]Rao S, Mane H. ATM availability management system. IOSR Journal of Computer Engineering. 2018; 2(5): 21-32.

[16][16]http://www.svtuition.org/2017/05/how-to-do-atm-reconciliation.htm. Accessed 10 January 2020.

[17][17]https://www.investopedia.com/. Accessed 10 January 2020.

[18][18]https://www.bis.org/publ/bcbs35.pdf. Accessed 20 February 2020.

[19][19]https://www.nibl.com.np/index.php?option=com_content&view=article&id=17 &Itemid=25&limitstart=1. Accessed 10 January 2020.

[20][20]https://ithandbook.ffiec.gov/media/274860/ffiec_itbooklet_retailpaymentsystems.pdf. Accessed 16 February 2020.

[21][21]Nuthan K, Nagarathna BM, Sumana NRL, Vidya RB. An automated teller machine: literature review. International Journal of Novel Research in Computer Science and Software Engineering. 2015; 2(1):43-5.

[22][22]Bhatta KP. Customer behavior and preferences: a survey report. Banking Journal. 2011; 1(1):63-74.

[23][23]Sidel R. Theft of debit-card data from ATMs soars. The Wall Street Journal. 2015.

[24][24]Fenlon W. How does ATM skimming work. HowStuffWorks. 2010.

[25][25]https://crimedoctor.com/. Accessed 20 February 2020.

[26][26]Vennila A, Rathnaraj SN. Impact on customer perception towards ATM services provided by the banks today: a conceptual study. International Journal of Scientific Research and Management. 2018; 6(1): 31-9.

[27][27]Moosa IA. Operational risk management. New York: Palgrave Macmillan; 2007.

[28][28]Okeke MN, Aganoke CU, Onuorah AN. Operational risk management and organizational performance of banks in, edo state. International Journal of Academic Research Economics and Management Sciences. 2018; 7(4):103-20.

[29][29]https://www.thebalance.com/atms-use-biometrics-to-combat-fraud-315794. Accessed 20 March 2020.

[30][30]http://www.forensicsciencesimplified.org/prints/. Accessed 12 March 2020.

[31][31]https://www.isaca.org/resources/isaca-journal/issues/2016/volume-2/atm-risk. Accessed 10 March 2020.

[32][32]https://searchsecurity.techtarget.com/feature/the-basics-of-network-intrusion-prevention-systems. Accessed 12 March 2020.