Ogochukwu, 2019 - Google Patents
Identification management in Nigeria: innovations for financial inclusionOgochukwu, 2019
View PDF- Document ID
- 10120824532430395490
- Author
- Ogochukwu M
- Publication year
- Publication venue
- Ind. Int'l & Comp. L. Rev.
External Links
Snippet
ABSTRACT About 41.6% of Nigerians have no access to formal financial services. Studies have shown that apart from factors such as distance to banks, financial illiteracy, irregular income, unemployment and complexity of account opening; lack of proof of identity …
- 230000018109 developmental process 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11908016B2 (en) | Risk score-based anti-money laundering system | |
US11593806B2 (en) | Illicit proceeds tracking system | |
Hosein et al. | Aiding surveillance: an exploration of how development and humanitarian aid initiatives are enabling surveillance in developing countries | |
Lyon | Under my skin: from identification papers to body surveillance | |
KR102392036B1 (en) | System for prevention of real estate fraud transaction | |
Carmona | Is Biometric Technology in Social Protection Programmes Illegal Or Arbitrary?: An Analysis of Privacy and Data Protection | |
Ogochukwu | Identification management in Nigeria: innovations for financial inclusion | |
Rodgers | Biometric and auditing issues addressed in a throughput model | |
EP4275327A1 (en) | Email certification system | |
Umoh et al. | Biometrics and Fraud Control in the Akwa Ibom State Civil Service | |
Makulilo et al. | Data protection in Kenya | |
Bailey et al. | Analysing India’s KYC Framework: Can We Do Things Better? | |
Newell et al. | Regulating the US Consumer Data Market: Comparing the Material Scope of US Consumer Data Privacy Laws and the GDPR | |
Atick | The Identity Ecosystem of Rwanda | |
Jackson et al. | Identity management: Is an identity card the solution for Australia? | |
O'Neil | The Illinois Biometric Privacy Act: History, Developments, And Adapting Protection for the Future | |
Froomkin | The Uneasy Case for National ID Cards | |
Philips et al. | A Short Review on the Penetration of Fingerprint Identification and Authentication Systems in Nigeria. | |
Devi | Biometric Data, Identification and Authentication in India-Legal Framework, Challenges and Impact | |
Swire et al. | The ID Divide: Addressing the Challenges of Identification and Authentication in American Society | |
Briscoe | On the Cards: privacy, identity and trust in the age of smart technologies | |
Rodrigues et al. | Existing and Emerging Biometric Data Technologies 1 | |
Chacko et al. | UID for Dummies | |
Claypoole et al. | Developing Laws Address Flourishing Commercial Use of Biometric Information | |
Vasile et al. | SMART BORDERS-INITIATIVES AND PERSPECTIVES OF THE INFORMATION FLOWS MANAGEMENT WHITHIN SCHENGEN AREA. |