skip to main content
10.1145/3429551.3429576acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicibeConference Proceedingsconference-collections
research-article

Implementing Data-Based Bank Loan Application via MS Access

Published:10 December 2020Publication History

ABSTRACT

The Data-based bank loan application is a system where potential borrowers can assess their approvals using MS access application. It's for the ease of access for both the bank and borrowers. It contains all the customers’ necessary details of the same when applying on-site. It will then be used for an easy way of automating loan approvals depending on bank requirements and formulations used to approve a loan application.

References

  1. Berger, A. N. & Udell, G. F. (2006). A more complete conceptual framework for SME Finance. Journal of Banking and Finance 30, pp. 2945–2966.Google ScholarGoogle ScholarCross RefCross Ref
  2. D'Arcy J, Hovav A, Galletta DF (2009) User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research 20 (1):79-98Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Mudd, S. (2012). Bank Structure, Relationship Lending, and Small Firm Access to Finance: A Cross-Country Investigation. Journal of Financial Services Research, Vol. 44, Issue 2, pp. 149-174. DOI: 10.1007/s10693-012-0140-4Google ScholarGoogle ScholarCross RefCross Ref
  4. Forcht KA (1994) Computer Security Management. Boyd and Fraser, Danvers, MAGoogle ScholarGoogle Scholar
  5. Homolka, L., Doležal, J., & Novák, P. (2014). Longitudinal Design as an Extension to Standard Banking Approaches to Companies’ Financial Performance Assessment and Prediction. European Financial Systems 2014. Proceedings of the 11th International Scientific Conference, Brno: Masaryk University, 2014, pp. 48-59. ISBN 978-80-210-7153-7.Google ScholarGoogle Scholar
  6. Bartoli, F., Ferri, G., Murro, P., & Rotondi, Z. (2013). SME Financing and the choice of lending technology in Italy: Complementarity or substitutedGoogle ScholarGoogle Scholar
  7. Kankanhalli A, Teo H-H, Tan BCY, Wei K-K (2003) An Integrative Study of Information Systems Security Effectiveness. International Journal of Information Management 23:139-154Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Siponen M, Vance A (2010) Neutralization: New Insights into the Problem of Employee Information Systems security Policy Violations. MIS Quarterly 34 (3):487-502Google ScholarGoogle ScholarCross RefCross Ref
  9. Mileris, R. (2012). Macroeconomic Determinants Loan Portfolio Credit Risk in Banks. Inzinerine Ekonomika-EngineeringEconomics, Vol. 23, No. 5, pp. 496-504. DOI 10.5755/j.01.ee.23.5.1890.Google ScholarGoogle Scholar
  10. Straub DW (1990) Effective IS Security: An Empirical Study. Information Systems Research 1 (3):255-276Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Degryse, H., & Van Cayseele, P. (2000). Relationship lending within a bank-based system: Evidence from European small business data. Journal of Financial Intermediation, 9: 90-109. DOI: 10.1006/j n.1999.0278Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICIBE '20: Proceedings of the 6th International Conference on Industrial and Business Engineering
    September 2020
    235 pages
    ISBN:9781450387880
    DOI:10.1145/3429551

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 10 December 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format