Journal articles on the topic 'Security of payment'

To see the other types of publications on this topic, follow the link: Security of payment.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security of payment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hassan, Md Arif, Zarina Shukur, Mohammad Kamrul Hasan, and Ahmed Salih Al-Khaleefa. "A Review on Electronic Payments Security." Symmetry 12, no. 8 (August 12, 2020): 1344. http://dx.doi.org/10.3390/sym12081344.

Full text
Abstract:
Modern technology is turning into an essential element in the financial trade. We focus the emphasis of this review on the research on the E-wallet and online payment, which is an element of an electric payment system, to get the pattern of using this service. This research presents a review of 131 research articles published on electronic payment between 2010 and 2020 that uses a qualitative method of answering the research questions (RQ): RQ1: “What are the major security issues regarding using electronic payments”? and RQ2: “What security properties need to comply for secure electronic payments?” With the systematic literature review approach, the results show that interest in E-wallet and online payment has grown significantly during this period, and it was found that for the increasing uses of electronic payments, researchers are more focused on security issues. The results show that, to conquer the key gaps, electronic payment must have some protection properties, namely, availability, authorization, integrity, non-repudiation, authentication, and confidentiality. Nowadays, security problems in electronic payment are usually more demanding than the present security problems on the web. These findings can enable electric transaction providers to strengthen their security methods by boosting their security gaps, as required for relevant services.
APA, Harvard, Vancouver, ISO, and other styles
2

Vishwakarma, Pinki Prakash, Amiya Kumar Tripathy, and Srikanth Vemuru. "The Fact-Finding Security Examination in NFC-enabled Mobile Payment System." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 3 (June 1, 2018): 1774. http://dx.doi.org/10.11591/ijece.v8i3.pp1774-1780.

Full text
Abstract:
Contactless payments devised for NFC technology are gaining popularity. Howbeit, with NFC technology permeating concerns about arising security threats and risks to lessen mobile payments is vital. The security analysis of NFC-enabled mobile payment system is precariously imperative due to its widespread ratification. In mobile payments security is a prevalent concern by virtue of the financial value at stave. This paper assays the security of NFC based mobile payment system. It discusses the security requirements, threats and attacks that could occur in mobile payment system and the countermeasures to be taken to secure pursuance suitability.
APA, Harvard, Vancouver, ISO, and other styles
3

Kanzafarova, I. S., and M. S. Fedorko. "SECURITY (GUARANTEE) PAYMENT AS AN INNOMINATED ENFORCEMENT OF OBLIGATIONS." Constitutional State, no. 42 (July 7, 2021): 154–63. http://dx.doi.org/10.18524/2411-2054.2021.42.232419.

Full text
Abstract:
The article is devoted to clarifying the features of a security (guarantee) payment as an innominated method of securing the enforcement of an obligation. As a result of the study, there are provisions that can serve as a basis for constructing a sub-institution of a security (guarantee) payment in the obligation law of Ukraine. The conclusion is justified that a security (guarantee) payment is possible only when the material objects of the main and accounting obligations are homogeneous. Homogeneity in security payments is that the subject matter and mode of performance of the principal obligation can be replaced by the same performance, but at the expense of reserved funds. A monetary security payment cannot provide non-monetary obligations in an obligation, since their fulfillment cannot be replaced by a monetary provision. It is proved that the security (guarantee) payment must have separate characteristics of the deposit, pledge, and predetermined losses. A distinctive feature of a security (guarantee) payment, in comparison with other methods of securing the performance of the obligation, is the weakened emphasis, which manifests itself at the stage of the occurrence of the obligation, allows to ensure obligations arising in the future. The regulatory fixation of a security payment in the Civil Code of Ukraine, of course, will be a logical result of its application in practice as an innominated method of ensuring the fulfillment of an obligation. The conclusion is justified that a security (guarantee) payment can perform a punitive function only indirectly: through the application of civil liability measures. In other words, a security payment is only a financial source of satisfaction for claims for forfeiture or damages, but unlike the mentioned measures of liability, a security payment does not have a punitive mechanism in its structure. A security payment is characterized by the existence of a compensation function that aims to restore the property sphere of the creditor, and not acting as a means of punishing the debtor. Attention is drawn to the need to introduce a certain mechanism for allocating funds from the estate of the person to whom they are transferred as a security payment. This mechanism will balance the interests of participants in civil traffic, leveling the risk of their non-return for the person who transferred money as a security payment.
APA, Harvard, Vancouver, ISO, and other styles
4

Polovenko, Liudmyla, Svitlana Merinova, and Kateryna Kopniak. "The development of electronic payment systems in Ukraine and their security." VUZF Review 6, no. 2 (June 29, 2021): 146–52. http://dx.doi.org/10.38188/2534-9228.21.2.17.

Full text
Abstract:
The paper is devoted to the study of innovations in the market of modern payment systems. The pandemic and quarantine restrictions have accelerated the expansion of the payment infrastructure in Ukraine, which in turn raises the issue of security of electronic payment systems. Ukrainians are more actively switching to electronic payments. At the same time, the trend of growing popularity of contactless payment instruments and settlements with them continues. A comparative analysis of the security of payment systems using electronic technologies in the implementation of money transfer services in Ukraine has been performed. The components of the payment system, information security measures in the electronic payment system have been also considered. The schema of electronic payments and the block diagram of the information protection subsystem of electronic payment system have been constructed. The criteria for assessing the security of the electronic payment system have been determined. A total of fifteen safety criteria have been identified, they are divided into six groups according to the degree of safety. Six electronic system payments were used for the study and the research results have been presented in this paper. The tendencies of development of electronic payment systems in modern conditions and ways of improvement of their activity taking into account the newest information technologies have been outlined.
APA, Harvard, Vancouver, ISO, and other styles
5

Kovács, Levente, and Sandor David. "Fraud risk in electronic payment transactions." Journal of Money Laundering Control 19, no. 2 (May 3, 2016): 148–57. http://dx.doi.org/10.1108/jmlc-09-2015-0039.

Full text
Abstract:
Purpose The purpose of this paper is the timely review of regulations on the security of electronic payments, payment innovations and their vulnerabilities and discussing the recommendations elaborated by the European Forum on the Security of Retail Payments. Design/methodology/approach First, the article presents a serious fraud case which happened in the Hungarian banking system. This case demonstrates all risks associated with the security of payment channels being used. Next, the article examines those international SecuRe Pay Forum recommendations which target the elimination of such fraud risks. Finally, the article compares current domestic regulations with these recommendations. Findings The fraud incidents and the speed of penetration of new fraud techniques and methods caught the attention of payment service providers, customers, supervisors and overseers. The result of their cooperation is the European Forum on the Security of Retail Payments. The forum elaborated three sets of recommendations on security of Internet payments, payment account access services and mobile payments, which are missing elements of the present Hungarian and pan-European regulations. Both domestic and international regulators should build on the revised Payment Services Directive and the recommendations in question, to avoid fraud incidents like the one this article initially portrayed. Originality/value The article presents a specific, true case which took place in Hungary in 2014.
APA, Harvard, Vancouver, ISO, and other styles
6

Bhutta, Muhammad Nasir Mumtaz, Surbhi Bhattia, Mohammed Ali Alojail, Kashif Nisar, Yue Cao, Shehzad Ashraf Chaudhry, and Zhili Sun. "Towards Secure IoT-Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)." Wireless Communications and Mobile Computing 2022 (January 24, 2022): 1–10. http://dx.doi.org/10.1155/2022/9942270.

Full text
Abstract:
IoT emergence has given rise to a new digital experience of payment transactions where physical objects like refrigerators, cars, and wearables will make payments. These physical objects will be storing the cardholder credentials and will directly make payments with the vendors over insecure public networks. For such payment transactions, government regulations and standards organizations require to implement PCI DSS for adapting similar set of security measures at the global level. The current version of PCI DSS is not suitable for IoT-based payment systems due to characteristics of IoT such as resource-constrained nature of devices and updating software/firmware of so many physical devices. Also, there arises an emergent need of implementing PCI DSS requirements and assessments for security of all stakeholders that store or process the user credentials in a payment. This paper is an initial effort to bring the researcher’s attention to make upcoming versions of PCI DSS suitable for IoT and thus securing the new ways of IoT-based payment systems. The paper has reviewed the traditional payment process along with considerations for IoT-based payment systems to make recommendations to modify the PCI DSS in a suitable way for IoT.
APA, Harvard, Vancouver, ISO, and other styles
7

Tsai, Shuo-Chang, Chih-Hsien Chen, and Keng-Chang Shih. "Exploring Transaction Security on Consumers’ Willingness to Use Mobile Payment by Using the Technology Acceptance Model." Applied System Innovation 5, no. 6 (November 11, 2022): 113. http://dx.doi.org/10.3390/asi5060113.

Full text
Abstract:
In recent years, with the increase in Fintech innovation, mobile payment has played an important role. This research is to investigate factors affecting consumers’ willingness to use mobile payment. The study found that perceived ease of use and perceived usefulness have a significant positive impact on consumer’s adoption of mobile payments. In addition, from empirical research on the mediating effect of transaction security on attitudes toward using it and behavioral intention to use, the study found that transaction security has a significant mediating effect, and empirical data shows that transaction security can strengthen consumers’ behavior towards using mobile payment intention, this also explained why the penetration rate of mobile payments in developed countries is lower than in developing countries. In summary, to encourage consumers to willingly use the new mobile payment tool, in addition to making the tool easy to use and useful, it is crucial that transaction security can assure consumers’ willingness to use mobile payment.
APA, Harvard, Vancouver, ISO, and other styles
8

Rabiah, Arbi Siti, Mochammad Fahlevi, Nendi Juhandi, and Pawit Winarto. "HARUSKAH E-PAYMENT TRUST DITERAPKAN E-COMMERCE SEBAGAI FAKTOR KEPUASAN KONSUMEN?" E-Jurnal Manajemen Universitas Udayana 9, no. 7 (July 3, 2020): 2724. http://dx.doi.org/10.24843/ejmunud.2020.v09.i07.p13.

Full text
Abstract:
Consumer trust related to payment is an important topic in several studies of online shopping. Consumers are very concerned about security in transactions including when making payments in cashless. This study uses a non-parametric test using SmartPLS with 243 respondents used as samples. The results of this study provide information that E-payment trust is an important factor for consumer satisfaction in E-commerce in Indonesia. Trust related to payments is closely related to information security and data privacy security of consumers when making transactions on E-commerce. Keywords: Trust; E-Payment; Kepuasan Konsumen; E-Commerce.
APA, Harvard, Vancouver, ISO, and other styles
9

Huddin, Muhammad Nurhaula Huddin, and Khairul Ikhsan. "MOBILE PAYMENT SATISFACTION POST PANDEMIC COVID-19 IN INDONESIA." Jurnal Riset Akuntansi Dan Bisnis Airlangga 7, no. 2 (November 27, 2022): 1326–79. http://dx.doi.org/10.20473/jraba.v7i2.39834.

Full text
Abstract:
This study aims to examine the effect of technology security, ease of use, usability, and continuousimprovement on the satisfaction of mobile payment users. This study uses a purposive sampling techniquewith certain criteria. The population of this study are respondents who have used m-payment services duringthe Covid-19 pandemic from 2020 to 2021 in Indonesia. Questionnaires were distributed through an onlinesurvey method with a total sample of 317 respondents. Hypothesis testing was carried out using StructuralEquation Modeling (SEM) AMOS 23. The results showed that technology security had a positive effect onmobile payment satisfaction, ease of use had a positive effect on mobile payment satisfaction, usability had apositive effect on mobile payment satisfaction, continuous improvement had a positive effect on satisfactionmobile payments, and satisfaction have a positive effect on the trustworthiness of mobile payments. Thisresearch provides information to payment service providers to continuously improve improvements in allaspects of services, especially security and ease of use, as well as benefits for consumers in conductingfinancial transactions.
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Ruohan. "Optimized Secure Payment Solution Using QR Code Scanning based on Operation-payment Dual Devices." BCP Business & Management 17 (February 23, 2022): 118–23. http://dx.doi.org/10.54691/bcpbm.v17i.383.

Full text
Abstract:
With the development of the internet and mobile payment technology, the mobile payment transaction volume in China is rising year by year. Likewise, an increasing number of people are using mobile payments for their convenience and stability. In recent years, however, security incidents involving these mobile payments have also occurred more frequently. Some lawbreakers have been known to add illegal information to QR codes so that the mobile phones of unwitting customers are infected with viruses when they scan the codes to make payments. These viruses result in losses of personal property. In view of this, we propose an optimized secure payment solution for QR code scanning based on Operating-payment dual devices. This sets a separation of the payment process by utilizing both an operating device and a payment device, so as to minimize losses when customers scan malware-infected QR codes. Through theoretical analysis, our proposed solution can effectively improve the security of QR code payments, and meet the requirements for secure payment in daily life.
APA, Harvard, Vancouver, ISO, and other styles
11

KVASNYTSKA, Raisa, Iryna FORKUN, and Tetyana GORDEEVA. "MODERN APPROACHES TO PROVIDING INFORMATION SECURITY OF PAYMENT SYSTEMS AND THEIR CYBER PROTECTION." Herald of Khmelnytskyi National University. Economic sciences 310, no. 5(1) (September 29, 2022): 47–52. http://dx.doi.org/10.31891/2307-5740-2022-310-5(1)-8.

Full text
Abstract:
The article analyzes the domestic and international approaches of scientists and financial institutions regarding the interpretation of the concept of payment systems and proposes the author’s interpretation of this category as “an organizationally formed set of system participants and the relations between them regarding the transfer of funds based on recognized legal norms at the level of sovereign countries or at the international level. The peculiarities of the payment systems’ functioning and the possibility of taking into account the international standards for the exchange of financial messages ISO 20022 in the payment infrastructure of Ukraine were analyzed, which will allow to harmonize the Ukrainian payment area with the world, to expand the details of payments with additional information, to increase the level of service and efficiency of payments, to enrich the functional content of payment instruments for the benefit of banks and their customers, increase the level of automation of payments. It was determined that the area of the payment systems’ functioning belongs to the risky spheres of activity. The typification of the payment systems’ risks of banking and non-banking institutions, determined by the regulations of the National Bank of Ukraine, defines such types of risks as legal, payment, operational, systemic and financial risks. It is substantiated that the basis of the effective functioning of banking institutions in conditions of uncertainty is the identification and management of risks inherent in banking activity. At the same time, the emphasis is on the fact that a component of operational risk is such a type of risk as cyber risk, which is considered as the risk of realizing cyber threats to information resources and/or information infrastructure, as well as the consequences of such events. Because modern payment systems are intermediaries in the movement of funds, and therefore are at risk of negative influences, challenges, threats and dangers, which can lead to damage to the national interests of states, it is proposed to consider cyber risk as a separate type of risks of the payment systems’ functioning. In order to prevent, detect, respond, absorb cyber risk, and ensure adaptability and the ability to restore the payment system, the central bank of the state should increase the level of information security and cyber protection in the field of funds transfer. The information security policy of banks must be constantly supplemented and changed in accordance with the specified set of criteria for assuring information security.
APA, Harvard, Vancouver, ISO, and other styles
12

Ali, Mostafa A., Nazimah Hussin, and Ibtihal A. Abed. "Electronic Payment Systems: Architecture, Elements, Challenges and Security Concepts: An Overview." Journal of Computational and Theoretical Nanoscience 16, no. 11 (November 1, 2019): 4826–38. http://dx.doi.org/10.1166/jctn.2019.8395.

Full text
Abstract:
In this paper, the major aim is to investigate the heightened awareness regarding various electronic payment systems-related concepts in terms of their advantages, problems, and security issues. The payment processing system providers use software as a service (SaaS) model and with this model, they form a single payment channel to numerous payment methods for their clients. Users often give away their personal information such as names, card details, and so on whenever they go online to make any firm of payment. An online payment system is referred to a system that facilitates electronic money exchange. This form of payment typically involves the deployment of the Internet, computer networks, and other digital stored value systems. Collecting any form of payment over the internet implies that the user has accepted an online payment and must have shared some confidential information with the service provider. This paper embarks on a thorough review of all aspects of online/electronic payment with emphasis on the analysis of numerous studies on electronic payment systems. The latest studies have been explored to gain insight on the electronic payments systems.
APA, Harvard, Vancouver, ISO, and other styles
13

Cavus, Nadire, and Adeoluwa Atanda. "Security and privacy concerns in mobile payment services." Global Journal of Information Technology: Emerging Technologies 12, no. 2 (October 31, 2022): 136–48. http://dx.doi.org/10.18844/gjit.v12i2.8264.

Full text
Abstract:
Mobile technology is becoming more central to human life, especially with the current ongoing global pandemic which points out that there will be an increasing need for mobile payment service as it requires little or no contact in making payments. However, mobile payment is not among the most commonly used mobile utilities because of the security and privacy concerns posed by mobile payment. The prime aim of this study is to determine the security and privacy concerns with the highest existence and then address them by identifying a rational and objectively agreed approach on how to resolve the problems discovered. A sensitive Analytical Hierarchy Process (AHP) Pairwise Comparison approach will be used to solve the security and privacy challenges associated with mobile payment services. This study shows that leakage of personal data is the highest risk concern by most users of the mobile payment system (MPS) while loss of “intended purchase” has the lowest risk concern from what we could derive. Keywords: AHP Model; Mobile Technology; Mobile Payment Services; Pairwise Comparison.
APA, Harvard, Vancouver, ISO, and other styles
14

Parvathy, V., and D. Durairaj. "A Study on Users Perception and Awareness towards Digital Payment Security Threats among Youngsters in Chennai, Tamil Nadu, India." Asian Review of Social Sciences 10, no. 2 (November 5, 2021): 30–34. http://dx.doi.org/10.51983/arss-2021.10.2.2988.

Full text
Abstract:
After demonetisation the usage of digital transaction is increased. Digital payment refers to doing money transaction through online with the help of internet. E wallets and prepaid payment instruments also introduced for the growth of digital payments. Since it is time saving and easy of doing transaction, users also slowly adopting the digital culture, But on the other side security related issues also faced by users. Digital payment security threats refer to stealing of information, unauthorised transaction, malware attack, and phishing. RBI and government of India has introduced guidance for digital transaction. This study focused on Chennai users perception and awareness towards digital payment security threats among youngster in Chennai area
APA, Harvard, Vancouver, ISO, and other styles
15

Sutia, Sabar, Mochammad Fahlevi, Mohamad Saparudin, Dasih Irma, and Sari Maemunah. "Should e-Payment Trust be e-Commerce Implemented as a Consumer Satisfaction Factor?" E3S Web of Conferences 202 (2020): 16002. http://dx.doi.org/10.1051/e3sconf/202020216002.

Full text
Abstract:
Consumer trust related to payment is an essential topic in several studies of online shopping. Consumers are very concerned about security in transactions including when making cashless payments. This study uses a non-parametric test using a SmartPLS with a sample of 243 respondents. The results of this study provide information that E-payment trust is an important factor for consumer satisfaction in E-commerce in Indonesia. Trust related to payments is closely linked to information security and data privacy security of consumers when making transactions on E-commerce.
APA, Harvard, Vancouver, ISO, and other styles
16

DUDIN, Mihail Nikolaevich, Vadim Nikolaevich ZASKO, Evgeniya Evgenevna FROLOVA, Natalya Georgievna PAVLOVA, and Ekaterina Petrovna RUSAKOVA. "Mitigation of Cyber Risks in the Field of Electronic Payments: Organizational and Legal Measures." Journal of Advanced Research in Law and Economics 9, no. 1 (September 19, 2018): 78. http://dx.doi.org/10.14505//jarle.v9.1(31).11.

Full text
Abstract:
The issues of ensuring the electronic payments’ security are currently in the limelight of participants in the monetary system and the scientific expert community. The goal of this paper is to develop organizational and legal measures aimed at improving the security of electronic payments in the Russian Federation. Research methods include the analysis of retrospective data describing the development of the payment system and electronic payments using bank cards, as well as the method of statistical observations and analysis of secondary data from surveys of Russian and foreign companies covering the information security. Through solving the research problems, the author managed to draw a number of conclusions: Dynamic development of the electronic payment system causes the growth of cybercrime and cyber risks in payment systems; Despite quite active actions of state bodies and the Bank of Russia, the legal framework and infrastructure for electronic payments are still in the development stage; Cyber attacks cause significant damage not only to financial institutions, but also to companies from a non-financial sector, as well as to ordinary citizens using electronic payment systems. In the opinion of the author, the key organizational and legal measures aimed at mitigating cyber risks in electronic payments may be measures to form the centralized payment infrastructure of the Bank of Russia, introduce the corporate cyber threat management systems, improve policies and procedures for the protection of personal data at the corporate level, as well as train the employees in the field of information security of electronic settlements.
APA, Harvard, Vancouver, ISO, and other styles
17

Singh, Jitendra, Anil Kumar, and Kamlesh Kumar Raghuvanshi. "Evaluation of Mobile-Based Digital Payments and Challenges." International Journal of Digital Literacy and Digital Competence 12, no. 1 (January 2021): 15–29. http://dx.doi.org/10.4018/ijdldc.2021010102.

Full text
Abstract:
Owing to the higher usage of internet post and during COVID-19, attacks on IT infrastructure and digital payment have surged. This work undertakes the empirical study on mobile-based payment and determines the impact of post-demonetization, during COVID-19 and post COVID-19. Number of banks supporting digital payment, value in each transaction, monthly values are the factors that have been undertaken for this study. Data revealed higher usage of mobile-based payments. On the other hand, security challenges on payment have been explored by considering the world's leading regulations and standards prevailing on mobile-based payment. Major recommendations of financial regulators and CERT-IN have been included for the deeper understanding of employed security. This work will be immensely helpful to all the stakeholders aiming to understand the mobile payment trends on multi dimensions and strengthening the security in mobile-based payment to avoid any losses that may be incurred due to cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
18

Liu, Ying Chun. "Online Payment Security System." Advanced Materials Research 756-759 (September 2013): 1930–32. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1930.

Full text
Abstract:
With the increase in the number of online payment, online payment system, the problems exposed, and with the use of the promotion and hacking technology development, the key technology of the online payment system proposed higherrequirements. One of the most important core key technical issues is the security issue.
APA, Harvard, Vancouver, ISO, and other styles
19

Botasheva, L. H., N. E. Ryzhenkova, and M. A. Tukhbatulina. "Analysis of the security system in the field of Internet - payments using payment cards." Voprosy regionalnoj ekonomiki 35, no. 4 (December 30, 2018): 127–32. http://dx.doi.org/10.21499/2078-4023-2018--4-127-132.

Full text
Abstract:
The main ways to protect money held on bank payment cards when making Internet payment were analyzed. A number of certificates and licenses were also analyzed, providing guarantees to customers of sites from which purchases using payment cards are made; an assessment of the effectiveness of existing methods has been made and new ways of implementing bank card security in the process of Internet payments using payment cards have been proposed.
APA, Harvard, Vancouver, ISO, and other styles
20

Sinclair, Wilbert, Lailan Maulia, and Tina Novianti Sitang. "Analisis Faktor-faktor yang Mempengaruhi Penerimaan dan Penggunaan Mobile Payment pada Teknologi Pembayaran Gopay." Owner 5, no. 1 (February 11, 2021): 229–39. http://dx.doi.org/10.33395/owner.v5i1.357.

Full text
Abstract:
This study aims to determine the factors that influence the acceptance and the use of mobile payments in GOPAY payment technology by integrating the Technology Acceptance Model (TAM) theory, mobile payment characteristics, trust and security, and privacy. The research method used is a survey method. The sample of this research is GOPAY users in the Faculty of Economics at Prima Indonesia University, with as many as 222 (two hundred and twenty-two) respondents through an online questionnaire. Data analysis using Smart Partial Least Square (PLS) 3.0. The results of this study can be concluded that the factors that influence the acceptance and the use of mobile payments on GOPAY payment technology are mobile payment characteristics, trust and security, and privacy which is not supported in this study. GOPAY has the characteristics of mobility, reachability, compatibility, and convenience. The characteristics of mobile payments are not supported because users cannot experience the benefits. Trust is not supported because not all users trust GOPAY, especially in the process of topping up balances and receiving cashback after making payment transactions. Security and privacy are not supported because users do not trust GOPAY regarding topping up balances, if the balance does not come in, they can contact the bank.
APA, Harvard, Vancouver, ISO, and other styles
21

Ningsih, Setia, Hendra Dukalang, and Armayani Arsal. "PEMODELAN STRUKTURAL EQUATION MODEL- PARTIAL LEAST SQUARE (SEM-PLS) PADA MINAT BERTRANSAKSI MENGGUNAKAN APLIKASI OVO." Jambura Journal of Probability and Statistics 3, no. 2 (November 30, 2022): 171–78. http://dx.doi.org/10.34312/jjps.v3i2.16882.

Full text
Abstract:
The payment system in Indonesia is transforming from making payments in cash to non-cash. Non-cash payments can be made with various payment applications, one of which is the OVO application. Non-cash payments are less loved by many people, this is due to concerns about the security or ease and effectiveness of non-cash payment applications. Therefore, this study was conducted to analyze the factors that influence student interest in Gorontalo province in transacting using the OVO application using the Structural Equation Model Partial Least Square (SEM-PLS). The data analysis technique used is variance-based SEM. The results showed that the perceived convenience, effectiveness and security variables affected the interest in transacting using the OVO application with an R-square value of 70.70 percent.
APA, Harvard, Vancouver, ISO, and other styles
22

Bogacheva, T. V. "The Security Deposit in Obligations under a Construction Contract: Theoretical and Practical Aspects." Actual Problems of Russian Law 16, no. 1 (January 28, 2021): 80–90. http://dx.doi.org/10.17803/1994-1471.2021.122.1.080-090.

Full text
Abstract:
The paper, on the basis of theoretical constructions, normative acts, materials of law enforcement practice, examines the peculiarities of legal regulation of relations arising during the use of security payment to enforce the obligation. Emphasis is placed on theoretical and practical aspects of the application of security payment in contractual obligations. The author justifies her viewpoint concerning the prospects of using a security payment to ensure the performance of tort obligations. It is concluded that the scope of application of a security payment in tort obligations is rather limited. On the example of securing the performance of tort obligations arising during the performance of work under the contract, the author argues that the security payment is mainly applicable to secure the fulfillment of the tort obligations arising between persons in contractual relations, in a situation where the counterparties face a threat of harm in execution of a civil obligation. The author emphasizes that the security payment agreement is a consensual transaction.
APA, Harvard, Vancouver, ISO, and other styles
23

Gill, Atif Ali, Riaz Hussain Ansari, Zobia Malik, and Muhammad Waseem Tufail. "An Empirical Analysis to Understand Consumer Intention to Use Mobile Payment Platform: The Mediating Role of Trust." Journal of Business and Social Review in Emerging Economies 7, no. 1 (March 31, 2021): 209–17. http://dx.doi.org/10.26710/jbsee.v7i1.1610.

Full text
Abstract:
Money transfer through third-party mobile payment platforms has become common nowadays in western countries. While in developing countries, the adoption of mobile payment channels still at the infancy stage. The current study based on diffusion of innovation theory investigates the antecedents of intention to use mobile payment channels through trust's mediating role. The survey method was used to collect data from the 250 consumers using the mobile payments services of JazzCash and Easypaisa in Pakistan. Partial least square structural equation modeling (PLS-SEM) technique employed to test the collected data statistically. Results found the significant impact of mobility, customization, and security on trust that intends to utilize mobile-payment channels. The current study's findings provide guidelines to the administration of mobile payment systems to improve security features, mobility, and customization that wins customers' trust and is inclined to use mobile payment platform.
APA, Harvard, Vancouver, ISO, and other styles
24

Gupta, Brij B., and Shaifali Narayan. "A Survey on Contactless Smart Cards and Payment System." Journal of Global Information Management 28, no. 4 (October 2020): 135–59. http://dx.doi.org/10.4018/jgim.2020100108.

Full text
Abstract:
In recent years, contactless transactions have risen rapidly. It includes NFC, MST, contactless cards, and many other payment methods. These payment methods have certain security issues, and attackers are in a regular search for the exploits to break its security. These security issues require proper analysis to secure user data from attackers. This article will discuss the contactless smart cards and payment systems in detail including the techniques used for securing user data and different possible attacks on the technology used for communication. The article also presents some countermeasures to prevent the attack and issues with those countermeasures. In addition, the article includes some future research issues and suggestions to overcome the security issues in contactless payment system.
APA, Harvard, Vancouver, ISO, and other styles
25

Chuah, S.-C., S.-T. Cao Stella, J.-Y. Guo Trey, and Z.-J. Lian Ivey. "Consumers’ Adoption of Mobile Payment: Comparison between China and Malaysia." ADVANCES IN BUSINESS RESEARCH INTERNATIONAL JOURNAL 5, no. 2 (September 30, 2019): 43. http://dx.doi.org/10.24191/abrij.v5i2.9980.

Full text
Abstract:
Mobile payment services has emerged as one of the prominent transaction payment methods. China is leading in mobile payment globally while mobile payment in Malaysia still in its infancy. This paper compares the factors in adoption of mobile payment among consumers’ in Zuhai, China and Kuala Lumpur, Malaysia. The factors included in the study were perceived usefulness, perceived ease of use, subjective norms and perceived security risk. A cross-sectional, descriptive study was undertaken on 96 smartphone users from China and 51 users from Malaysia. Inferential statistics Mann-Whitney U test was applied to compare between study variables. Spearman’s ho correlation was used to identify the association between the study variables and behavioral intention to adopt mobile payment services. The study found significant different between users’ perception on subjective norms and perceived security risk in these two city. There was no significant different for perceived usefulness and perceived ease of use between users in Zuhai and Kuala Lumpur. Significant negative linear correlations between perceived security risk and behavioral intention, and significant positive correlations between perceived usefulness, perceived ease of use and subjective norms and behavioral intention were observed from the study. The findings of this study indicate that the consumers in Kuala Lumpur have higher concern on mobile payment services security and greater social influences to adopt mobile payments.
APA, Harvard, Vancouver, ISO, and other styles
26

Huang, Echo, and Fa-Chang Cheng. "Online Security Cues and E-Payment Continuance Intention." International Journal of E-Entrepreneurship and Innovation 3, no. 1 (January 2012): 42–58. http://dx.doi.org/10.4018/jeei.2012010104.

Full text
Abstract:
Previous studies consider confidence in the Internet as a means of payment and existence of a legal framework that protect consumers in their activities on the Internet are the critical issues of B2C success. To respond, this study extends the IS Continuance Model with Cue Utilization Theory to examine the impact of offering e-payments to online users, specifically, the relationship between their perceived benefits, legal protection, risk avoidance, and satisfaction with prior experiences. The analytical results presented in this study indicate that perceived cues (benefits, legal protection and risk allocation) differentially affect consumer behavior. Notably, perceived cues and confirmation associated with satisfaction have influences on e-payment continuance intention. That is, if consumers’ perception of online security cues increases, their intentions to continue use of e-payment increase even if the systems or services are perceived low reliability. Finally the practical and theoretical implications of this study are discussed.
APA, Harvard, Vancouver, ISO, and other styles
27

Rachmat, Lukman M. Baga, and Ninuk Purnaningsih. "Penghimpunan Dana Zakat Infak Sedekah Berdasarkan Intensi Perilaku Muslim Gen Y dalam Penggunaan Teknologi Digital Payment." AL-MUZARA'AH 8, no. 2 (December 24, 2020): 95–108. http://dx.doi.org/10.29244/jam.8.2.95-108.

Full text
Abstract:
The development of lifestyle generation Y is inseparable from technological development. That changes the behavior of gen Y Muslims in making zakat, infaq, shodaqoh (ZIS) payments from conventional to digital. The purpose of this study is to describe the characteristics of Muslim gen Y related to digital ZIS payments, then to analyze what influences the behavior intention of gen Y Muslims in the use of digital payment technology for ZIS payments. The results of this study qualitatively indicate that the characteristics of digital payment technology users for ZIS payments are dominated by female gen Y Muslims. The most commonly used digital payment method is transfer via mobile banking and via e-wallet. Digital service partners that are widely used to channel digital ZIS payments to OPZ are banking institutions. The quantitative research results show that the overall variables studied, namely performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), hedonic motivation (HM), price value (PV), habit (HT), and perceived security (PS) have a significant influence on the behavioral intention (BI) of gen Y Muslims in the use of digital payment technology for ZIS payments, where the greatest factor influences the intention of gen Y Muslims behavior is perceived security.
APA, Harvard, Vancouver, ISO, and other styles
28

Ramdhani, Abdullah, Dini Turipanam Alamanda, Muhammad Husna Harisana, and Gugun Geusan Akbar. "The Factors that Determine Interest to Use of Mobile Payment: Study on the Students of Garut University, Indonesia." Asian Journal of Technology Management (AJTM) 13, no. 3 (2020): 257–65. http://dx.doi.org/10.12695/ajtm.2020.13.3.6.

Full text
Abstract:
Abstract. Mobile payment is generally a payment tool in the form of software available in smartphones to make it easier for its users to make transactions anytime and anywhere his research aims to give empirical evidence of the influence of perceived ease of use, perceived usefulness, trust, and security on the interest in the use of mobile payment in Garut University students. We collect questionnaires from 100 students that are selected using the proportionate sampling method. The data is then analyzed using multiple linear regression. The analysis’ results show that both perceived of benefit and security variables partially has a positive effect while the perceived ease of use and trust has an insignificant effect on the interest in using mobile payments. This study provides an essential insight into how academic users in rural areas in Indonesia adopt electronic payment technologies. Keywords: Perceived ease of use, Perceived of usefulness, Trust, Security, Interests.
APA, Harvard, Vancouver, ISO, and other styles
29

Polyakov, N. N., A. M. Purtinov, A. N. Legkonogikh, T. G. Nikishina, and L. V. Cherkesova. "SECURITY USER AUTHENTICATION PAYMENT SYSTEM." Современные наукоемкие технологии (Modern High Technologies), no. 7 2019 (2019): 78–84. http://dx.doi.org/10.17513/snt.37593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Životić, Ilija, Kristijan Ristić, Snežana Krstić, Srboljub Nikolić, and Bruno Đuran. "Management of organizational payment security." Oditor 8, no. 3 (2022): 72–95. http://dx.doi.org/10.5937/oditor2203072z.

Full text
Abstract:
Risk management in payment transactions includes identifying, measuring and managing risks. That is why it is necessary to establish its effective function in payment transactions. In the last ten years, the development of risk management in countries in transition is evident. Bearing these facts in mind, the aim of this research study is to analyze the risks in payment transactions, with special reference to the analysis of cash management. The results of this overview study show that each bank operates with a smaller or larger number of risks, positioning itself between two extremes: absolute risk acceptance and absolute risk non-acceptance. It is necessary that the level of risk acceptance be proportional to the bank's ability to cover the resulting losses, as well as to achieve an acceptable rate of return. Achieving higher returns is possible if the bank establishes effective identification, measurement and management of business risks. The carriers of security breaches arise from the types of sources from which forms of security breaches will later arise. In order to carry out the defense and protection function, it is necessary to include those measures that provide the possibility of eliminating elements that lead to the violation of security and danger. Those measures must be an integral part of the institution and the execution of the work process. The condition for safe and normal operations in cash payment transactions implies the necessity of having trained personnel for the implementation of the security function. In order to implement the security function and manage it successfully, it is necessary to integrate various norms in the existing legal regulations.
APA, Harvard, Vancouver, ISO, and other styles
31

Rybina, Liza. "Factors affecting usage of mobile payments by youth in Kazakhstan." Innovative Marketing 17, no. 4 (December 13, 2021): 103–10. http://dx.doi.org/10.21511/im.17(4).2021.09.

Full text
Abstract:
Mobile payments are developing at a rapid pace in the modern world, affecting most areas of business, economics, and consumer life. Mobile payment services in Kazakhstan have emerged recently driven mostly by young and tech-savvy consumers. The current study applies the modified Technology Adoption Model to investigate the factors that influence the usage of mobile payments by young consumers in Kazakhstan. The data were collected from 351 respondents through an online survey using a structured questionnaire. The results of the multiple regression analysis revealed that perceived usefulness, perceived ease of use, transaction security, and trust are important determinants of mobile payment usage intention. These findings call for improvements in the technological development of mobile payment services to deliver usefulness, ease of use, and security, as well as marketing communications to build trust. On the other hand, no support was found for the effects of usage cost and availability of alternatives on behavioral intention to use mobile payments in Kazakhstan.
APA, Harvard, Vancouver, ISO, and other styles
32

Yuwono, Wisnu, and Nurtia Sari. "ANALYSIS OF THE VARIABLES DRIVING THE E-PAYMENT INTENSITY AMONG COLLEGE STUDENTS." Journal of Business Studies and Mangement Review 4, no. 2 (June 30, 2021): 173–78. http://dx.doi.org/10.22437/jbsmr.v4i2.13783.

Full text
Abstract:
This study aims to analyze the influence of the variable performance expectancy, benefits, trust, self-efficacy, ease of use, and security on the use of electronic-based non-cash payment (e-payments) among students in Batam City, Riau Islands Province. The growth of e-payments in Indonesia has shown a high rate but it is still lagging behind that of several neighboring countries such as Vietnam and Thailand. Several studies on this subject have shown mixed results. By using primary data through the Smart PLS version 3.0 program tools, this study concluded that performance expectancy, benefits, self-efficacy showed a significant positive relationship with the e-payment intention, while trust, ease of use, and security showed insignificant. Based on these results, it is recommended that e-payment providers always pay attention to the needs of their users.
APA, Harvard, Vancouver, ISO, and other styles
33

Singh, Jitendra. "LD Based Framework to Mitigate Threats in Mobile Based Payment System." International Journal of Innovation in the Digital Economy 10, no. 4 (October 2019): 1–17. http://dx.doi.org/10.4018/ijide.2019100101.

Full text
Abstract:
Smartphones have deeply penetrated in modern lifestyle. Accordingly, usage has grown manifold in the area of social media, collaboration, and mobile-based payment. The security of smartphones is increasingly critical at the user end as well as at service provider's end due to the involvement of monetary payments and personal information. Despite using a smartphone for mobile payments, strong security measures have not been put into place by a majority of users, particularly those involved with electronic payments. This article is an attempt to identify threats applicable to smartphones and classify them based on a broader category of threats. Existing vulnerabilities have been explored. In the light of the digital India campaign, security preparedness among Indian users has been assessed by carrying out a survey that reveals a poor level of preparedness among mobile users. Finally, the authors have proposed a lotus diagram (LD)-based framework to mitigate threats that can negatively impact mobile-based payment. The proposed method will greatly help in strengthening security and mitigating the threats for the user.
APA, Harvard, Vancouver, ISO, and other styles
34

Simorangkir, Zxavian Zebadia, and Kurnia Fajar Afgani. "THE ANALYSIS ON FACTORS INFLUENCING THE USE OF MOBILE PAYMENT SYSTEM AMONG GENERATION Z IN BEKASI CITY." Advanced International Journal of Business, Entrepreneurship and SMEs 3, no. 9 (September 15, 2021): 334–48. http://dx.doi.org/10.35631/aijbes.39022.

Full text
Abstract:
The topic of the factors that influence the usage of Mobile Payments is not to be overlooked, given the rise in the use of Mobile Payments in recent years. The goal of this study is to identify the factors that have a major impact on users' use of mobile payment instruments. The study was carried out with the help of an online survey questionnaire, which was distributed to 414 people. The impact of performance expectancy, effort expectancy, social influence, trust, and perceived security on the behavioral intention of mobile payment usage was investigated in this study. This study used a quantitative approach, with Generation Z as the unit of analysis, and the respondents from Bekasi as the target population. Two of the criteria have a significant relationship with the behavioral intention to use the mobile payment instrument, according to the research. Based on the result of this study, it can be seen that perceived security has the most influence on the behavioral intention to use mobile payment, followed by social influence.
APA, Harvard, Vancouver, ISO, and other styles
35

Tan, Kendry, and Hari Sutra Disemadi. "Urgency of Electronic Wallet Regulation in Indonesia." Nagari Law Review 5, no. 1 (October 31, 2021): 1. http://dx.doi.org/10.25077/nalrev.v.5.i.1.p.1-14.2021.

Full text
Abstract:
The payment system in Indonesia has undergone significant changes to date. Starting from the barter system to the existence of an electronic payment system. This change is caused by the development of technology, which has an impact on changing people's lifestyles. The payment system has been known to the public since 2014 when Bank Indonesia issued the National Non-Cash Movement (GNNT) policy. This policy aims to create a cashless society eco-system while at the same time introducing the advantages of electronic payments to the public. Electronic payments are considered safer, more efficient, and easier to track. However, electronic payments are also inseparable from their shortcomings. The electronic payment system, which is relatively new in Indonesia, will face several problems, especially with the legal system. Until now, there has been no law specifically regulating electronic payment systems, specifically E-wallet. This legal vacuum will cause problems both in terms of security and legal protection for users. This study aims to find out the problems that will arise from the E-wallet and provide solutions to the problems raised from a legal perspective. The research method used is normative juridical, using a conceptual approach and a statutory approach to review E-wallets in Indonesia. The results of this study indicate that several problems arise from electronic payments. Therefore, regulations are needed to protect user security, oversee the smooth implementation of E-wallet and maintain Indonesia's economic stability.
APA, Harvard, Vancouver, ISO, and other styles
36

Zitha, Themba, and Darry Penceliah. "Perceptions Regarding Digital Payments in Online Shopping amongst Millennials in KwaZulu-Natal, South Africa." African Journal of Inter/Multidisciplinary Studies 4, no. 1 (2022): 338–49. http://dx.doi.org/10.51415/ajims.v4i1.1047.

Full text
Abstract:
Contemporary business continues to leverage the opportunities of internet connectivity for marketing, sales, and visibility. Digital payment plays an imperative role in online shopping transactions. With the evolution of online shopping, there has been a paradigm shift from traditional payment methods to a faster digital payment method. This paper assesses millennials’ perceptions of digital payments for online shopping. A cross-sectional study was undertaken using a quantitative method. Three hundred and ninety-three millennials completed a self-administered questionnaire. Descriptive and inferential statistical methods were utilised to summarise and analyse the results. Respondents used different types of digital payments for online shopping, namely, credit card, debit card, micropayment, digital wallet, PayPal, Bitcoin, and in-app purchase. Some of the challenges pertaining to digital payment methods are security, privacy, and trust issues. There is a dire need to develop various interventions and strategies such as standardisation of the browser and device support to educate consumers, integrate more banks, develop synergy with credit card companies, reduce fees for low-risk transactions, make digital payment easier, and personalise the digital payment process and its value chain to make digital payments more secure and safe for effective transaction and online payments.
APA, Harvard, Vancouver, ISO, and other styles
37

Nuryyev, Guych, Anastasia Spyridou, Simon Yeh, and Chen-Chang Lo. "Factors of digital payment adoption in hospitality businesses: A conceptual approach." European Journal of Tourism Research 29 (July 2, 2021): 2905. http://dx.doi.org/10.54055/ejtr.v29i.2416.

Full text
Abstract:
Hospitality businesses might achieve a competitive advantage by adopting cryptocurrency payments. This study provides insight into the factors that influence hospitality businesses’ intention to use new digital payments based on a conceptual approach. One of the contributions to the literature is in integrating an external variable – perceived security – into the Technology Acceptance Model. Perceived security is considered a strong predictor for a new payment technology adoption. This study also contributes to the academic research by illuminating potential directions for future empirical research.
APA, Harvard, Vancouver, ISO, and other styles
38

Wang, Feng, Ge Bao Shan, Yong Chen, Xianrong Zheng, Hong Wang, Sun Mingwei, and Li Haihua. "Identity Authentication Security Management in Mobile Payment Systems." Journal of Global Information Management 28, no. 1 (January 2020): 189–203. http://dx.doi.org/10.4018/jgim.2020010110.

Full text
Abstract:
Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the disclosure of users' information and to reduce identity theft. The proposed management flow integrates transaction key generation, encryption and decryption, and matching to process users' personal information and biometric characteristics based on mobile equipment authentication carrier.
APA, Harvard, Vancouver, ISO, and other styles
39

Shan, Mei Jing. "Research on Data Security of Mobile Payment App." Applied Mechanics and Materials 511-512 (February 2014): 1201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.1201.

Full text
Abstract:
This paper studies Mobile Payment App from Mobile payment and Application. We analyze the data security risks hidden in this payment model. Give the corresponding solutions. Finally, look forward the research direction of Mobile Payment App security.
APA, Harvard, Vancouver, ISO, and other styles
40

Mamatkazin, I. R. "Social Security Compensatory Payments and the Compensation Function of Social Security Law: Problems of Theory." Actual Problems of Russian Law 17, no. 6 (May 21, 2022): 90–98. http://dx.doi.org/10.17803/1994-1471.2022.139.6.090-098.

Full text
Abstract:
Social security law has a fairly wide list of payments characterized in the current legislation as compensation payments. A feature of compensativeness is manifested in pension provision, in various types of benefits, and in various kinds of social security insurance payments. In addition, social security law provides for payments that are directly referred to as “compensation payments”. This causes difficulty both in the formulation of definitions of the concepts of each category of payment, and in the practical application of social security legislation. The situation is aggravated by the fact that compensation is also characteristic of payments of other legal affiliation. Based on this, the study of socio-security monetary representations in order to identify distinctive features of the compensatory property is relevant. It should be noted that within the framework of the paper, a function is considered as an essential property of a certain legal phenomenon. Therefore, the function as a property is inextricably linked with the legal phenomenon. Accordingly, if we are talking about the compensatory function of social security law, then it should be taken into account that the mechanism of compensativeness should be incorporated into the procedure for calculating compensation payments.
APA, Harvard, Vancouver, ISO, and other styles
41

Susanto, Eko, Ikin Solikin, and Budi Supriatono Purnomo. "A REVIEW OF DIGITAL PAYMENT ADOPTION IN ASIA." Advanced International Journal of Business, Entrepreneurship and SMEs 4, no. 11 (March 1, 2022): 01–15. http://dx.doi.org/10.35631/aijbes.411001.

Full text
Abstract:
Digital payments have changed people's financial behavior, particularly in Asian countries. The expansion of the internet network and the intensification of gadget functions have grown digital payment systems in mobile payments, internet banking, QR Codes, and electronic payments. Using a Systematic Literature Review, the study examined various Scopus articles from Asian countries to obtain an overview of the factors that influence the adoption of digital payments. We analyzed 597 digital, electronic, and mobile payment articles. TAM and UTAUT were found to be the most widely found theories to significantly affect user intent and even the continuity of digital payment use. While in the method, the structural equation model becomes the most widely used analytical method in various scientific publications related to this topic. This study has found internal and external factors from users in the adoption process of digital payments, including trust, perceived risk, satisfaction, security social influences, and facilitation conditions. Interestingly, some of these factors were insignificant in some studies due to differences in digital payment products that were the object of the study, respondents, and differences in research methods and approaches.
APA, Harvard, Vancouver, ISO, and other styles
42

Temple, Jeromey, Sue Booth, and Christina Pollard. "Social Assistance Payments and Food Insecurity in Australia: Evidence from the Household Expenditure Survey." International Journal of Environmental Research and Public Health 16, no. 3 (February 4, 2019): 455. http://dx.doi.org/10.3390/ijerph16030455.

Full text
Abstract:
It is widely understood that households with low economic resources and poor labourmarket attachment are at considerable risk of food insecurity in Australia. However, little is knownabout variations in food insecurity by receipt of specific classes of social assistance payments thatare made through the social security system. Using newly released data from the 2016 HouseholdExpenditure Survey, this paper reports on variations in food insecurity prevalence across a range ofpayment types. We further investigated measures of financial wellbeing reported by food-insecurehouseholds in receipt of social assistance payments. Results showed that individuals in receiptof Newstart allowance (11%), Austudy/Abstudy (14%), the Disability Support Pension (12%),the Carer Payment (11%) and the Parenting Payment (9%) were at significantly higher risk of foodinsecurity compared to those in receipt of the Age Pension (<1%) or no payment at all (1.3%). Resultsfurther indicated that food-insecure households in receipt of social assistance payments enduredsignificant financial stress, with a large proportion co-currently experiencing “fuel” or “energy”poverty. Our results support calls by a range of Australian non-government organisations, politicians,and academics for a comprehensive review of the Australian social security system
APA, Harvard, Vancouver, ISO, and other styles
43

Kumar, Sumit. "Wi-Fi Security Card (WCS): A Novel Approach for Secure Payment System." CGC International Journal of Contemporary Technology and Research 3, no. 2 (July 16, 2021): 158–61. http://dx.doi.org/10.46860/cgcijctr.2021.06.31.158.

Full text
Abstract:
The latest technology is turning into a vital element in financial business. This paper presents a proposed system called Wi-Fi Security Card (WCS) based on the very common and growing problem of electronic transaction fraud in the countries of India. To solve such problems, we have proposed a novel secure payment method known as Wi-Fi Security Card (WCS). In this paper, we also compared the WCS system to another existing system called Dropped Card Detection (DCD) and Microcontroller and Sensors (MAS). The main advancement of our system over the existing system is that WCS can also prevent fraudulent transactions. Nowadays, security issues in e-payments are usually more demanding than current security issues on the internet. Our findings may enable e-transaction providers to extend their secure payment systems by increasing their protection as necessary for appropriate financial services.
APA, Harvard, Vancouver, ISO, and other styles
44

Urmetzer, Florian, and Isabelle Walinski. "User Acceptance and Mobile Payment Security." International Journal of E-Services and Mobile Applications 6, no. 2 (April 2014): 37–66. http://dx.doi.org/10.4018/ijesma.2014040104.

Full text
Abstract:
There have been multiple studies detailing mobile payment and its market potential. There is a gap in the literature when it comes to the study of acceptance factors focusing on security and trust. The researchers asked which qualities of security have an influence on the acceptance of a mobile payment service provider. Therefore this study will focus on distinguishing security in two dimensions: objective and subjective security. Objective security represents the user's perception of existing technical safety mechanisms. Subjective security is intangible, based on the user's feelings and perception towards security (trust). The Technology Acceptance Model (TAM) was the theoretical model used in the study. About three hundred responses were collected using an online questionnaire. The study showed that despite the financial crisis banks are still the preferred providers for mobile payment services, where over 80% of the respondents would like to receive the service from a bank. In contrast, only 20% would like to receive such a service from a mobile phone producer. Additionally objective security does not substantially increase subjective security; hence the user trusts the provider rather than the technology itself.
APA, Harvard, Vancouver, ISO, and other styles
45

Popova, V. V. "A pledge or a security payment?!" Право и государство: теория и практика, no. 8 (2022): 72–73. http://dx.doi.org/10.47643/1815-1337_2022_8_72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Goncharov, Alexander. "Banknote as a Payment Bank Security." Legal Concept 16, no. 2 (July 2017): 87–94. http://dx.doi.org/10.15688/lc.jvolsu.2017.2.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Goncharov, Alexander. "Banknote as a Payment Bank Security." Legal Concept 16, no. 2 (July 2017): 87–94. http://dx.doi.org/10.15688//lc.jvolsu.2017.2.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Sonntag, Michael, and Rudolf Hörmanseder. "Mobile agent security based on payment." ACM SIGOPS Operating Systems Review 34, no. 4 (October 2000): 48–55. http://dx.doi.org/10.1145/506106.506113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Gold, Steve. "Meeting the biometrics payment security challenge." Biometric Technology Today 2013, no. 10 (November 2013): 5–8. http://dx.doi.org/10.1016/s0969-4765(13)70175-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Faoro, Dave. "Taking a stand on payment security." Card Technology Today 20, no. 5 (May 2008): 10–11. http://dx.doi.org/10.1016/s0965-2590(08)70114-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography