Examinando por Autor "Segura Cañon, Oscar Alberto"
Mostrando 1 - 1 de 1
Resultados por página
Opciones de ordenación
- ÍtemSistema de enrolamiento, registro y control para la prestación de servicios para una cooperativa de ahorro y crédito -sarc(Fundación Universitaria Los Libertadores. Sede Bogotá., ) Segura Cañon, Oscar Alberto; Medina Velandia, Lucy NohemíDaily savings and credit cooperatives and financial institutions receive two types of visits at their facilities which are made by visitors or consultants and mostly by cooperative partners, within these activities there is no record of the visit and / or activity carried out within the cooperative, sometimes unscrupulous people arrive who seek to take advantage of registration and control weaknesses to commit fraud, the most exposed operations are those of credit granting because there is impersonation in the credit application process according to (Datacredit, 2020) Identity theft is a crime that is not yet controlled, and that so far, thousands of people have been victims of this type of theft. Identity thieves can get your personal information from a variety of sources. Among the most well-known and recurring identity thefts identified by (Datacrédito, 2020) you can find the following: Garbage collection: It's not common to see people checking trash, but identity thieves do it to find invoices or other documents that have personal information about you to use and commit crimes. Duplication: Your credit card data can be duplicated using only a special electronic storage device, which records the information when the card is processed. Impersonation: They may appear to be individuals or financial institutions or companies and send spam or text messages to try to deceive and thus disclose personal information. 15 Change of address: With the change of housing, you must be very careful when registering your current place of residence, thieves use this to fill out forms and change addresses in order to receive statements elsewhere. Theft to "old-fashioned": It is the classic "raponazo" of bags, wallets and wallets including statements and credit cards to bribe the holder of that account, or indeed make any type of transaction. Pretexts: Thieves act under false pretexts to obtain personal information from financial institutions, telephone companies and other sources. To develop these activities, it is necessary to software capable of controlling the visits of the person in front of the official and leave a specific record of the visit made and the activity that takes place for him. This tool will perform the reading of the PDF code 417 of the citizenship card with a scanner specially configured for reading this code which contains biographical data of the person as identification number, date of birth, gender, first and last names and HR, this data will be stored and validated each time an activity is performed by the partner in the cooperative, then the partner's fingerprint will be recorded through the biometric reader with an application that directly validates the footprint to the databases of the national registry and a photographic shot will be made to have the exact moment and how the person performing the event was presented. For the development of this tool it was necessary to analyse the registration and control activities carried out by visitors and partners of the cooperative and in this way determine 16 The Microsoft Visual Studio Community, Microsoft SQL Server, Team Foundation Server development tools were used, with these next-generation development tools you will get better results. The tool will allow you to obtain analysis of visits by being able to record the different types of events and the frequency.