Дисертації з теми "Security of payment"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Security of payment".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Huang, Enyang. "Automated security analysis of payment protocols." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78140.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (p. 173-182).
Formal analyses have been used for payment protocol design and verification but, despite developments in semantics and expressiveness, previous literature has placed little emphasis on the automation aspects of the proof systems. This research develops an automated analysis framework for payment protocols called PTGPA. PTGPA combines the techniques of formal analysis as well as the decidability afforded by theory generation, a general-purpose framework for automated reasoning. A comprehensive and self-contained proof system called TGPay is first developed. TGPay introduces novel developments and refinements in the formal language and inference rules that conform to the prerequisites of theory generation. These target desired properties in payment systems such as confidentiality, integrity, authentication, freshness, acknowledgement and non-repudiation. Common security primitives such as encryption, decryption, digital signatures, message digests, message authentication codes and X.509 certificates are modeled. Using TGPay, PTGPA performs analyses of payment protocols under two scenarios in full automation. An Alpha-Scenario is one in which a candidate protocol runs in a perfect environment without attacks from any intruders. The candidate protocol is correct if and only if all pre-conditions and post-conditions are met. PTGPA models actions and knowledge sets of intruders in a second, modified protocol that represents an attack scenario. This second protocol, called a Beta-Scenario, is obtained mechanically from the original candidate protocol, by applying a set of elementary capabilities from a Dolev-Yao intruder model. This thesis includes a number of case studies to demonstrate the feasibility and benefits of the proposed framework. Automated analyses of real-world bank card payment protocols as well as newly proposed contactless mobile payment protocols are presented. Security flaws are identified in some of the protocols; their causes and implications are addressed.
by Enyang Huang.
Ph.D.in the Field of Computer Engineering
Baqer, Khaled. "Resilient payment systems." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/285001.
Повний текст джерелаMarais, Terrence K. "Electronic payment and security on the Internet." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.
Повний текст джерелаENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues are new and many experts are only learning how to deal with these now. This thesis offers suggestions and strategies a user can follow to minimize misuse and abuse of payment details. Electronic payment is the backbone of e-commerce, and the biggest threat towards widespread acceptance and usage of e-commerce is security. Many innovative solutions have been developed by vendors to address security issues. For example, the Secure Electronic Transfer (SET) protocol was developed to ensure that credit card transactions could be conducted safely and securely on the Internet. Secure Socket Layer (SSL) ensures that all communications and transactions are conducted in a tightly secure environment. This is critical for online or mobile banking and other financial activities. Others developments include payment systems that ensure that credit card details are never exposed to a merchant (e.g. SET), while some ensure that credit card numbers never enter the Internet. The five corner stones of security are confidentiality, privacy, authentication, integrity and non-repudiation. Authentication, non-repudiation and integrity can be resolved with digital certificates, digital timestamps and digital signatures. Message confidentiality, on the other hand, is ensured through the use of strong encryption. Encryption systems mutilate data or a message to such an extent that it is totally useless to someone who does not have the appropriate algorithm and key to decode it. The most widely used encryption schemes are the secret key and public key encryption systems. The public key cryptosystem generates two keys, called a public and private key. The public key can be made generally known, but the private key must be kept secret. A unique property of the scheme is that once data is encrypted with one key, only the corresponding other key of the pair can decrypt it. This makes it possible to address issues of authentication, integrity and non-repudiation. Traditional payment instruments such as cash, cheques, debit and credit card transactions are being replaced by their electronic equivalents. The driving forces behind these are transactional security, efficiency and speed. Novel payment solutions and strategies have been devised to meet the challenges of this new economy. For example, smart cards can act as an electronic purse that can hold electronic money. Other information, such as personal details, medical records, driver's licence, etc. can also be stored on the card. Whilst many security experts are in agreement that security is not a barrier anymore for wider usage of the Internet for financial transactions, many consumers are still apprehensive about how secure and safe it really is. This work aims to diminish those fears and show that the Internet is safe for business.
AFRIKAANSE OPSOMMING: Een van die grootste bekommernisse wat 'n kliënt met aankope op die Internet kan ondervind, is die onsekerheid wat presies gebeur nadat betalings aangegaan is en "Submit" is gedruk. Is dit moontlik dat iemand die boodskap kan onderskep en betaling besonderhede vir eie gebruik kan herwin? Daar is ook baie publisiteit oor kodifisering, maar hoe kan die klient verseker wees dat betalings besonderhede wel gekodifiseer is wanneer "Submit" gedruk was? Is daar 'n manier waarmee 'n mens verseker kan wees dat betaling slegs eenkeer gaan geskied? Baie van die sekuriteits lokvalle is nuut en sekuritiets kenners is tans besig om te leer hoe om die probleme te hanteer. Die werkstuk offer wenke en strategieë vir die verbruiker om die misbruik van betaling besondehede op die Internet te minimiseer. Elektronies betalings meganisme is die ruggraat van elektroniese besigheid, en die grootste struikelblok tot die grootskaalse gebruik daarvan is sekuriteit. Daar is baie innoverende oplossings om die probleme hok te slaan. By voorbeeld, die Secure Electronic Transfer (SET) protokol was ontwikkel om te verseker dat betalings met kredietkaart met hoë sekuriteit en veiligheid aangegaan kan word. Secure Socket Layers (SSL), verseker dat alle kommunikasies en transaksies in 'n sekuur en veilige omgewing plaasvind. Dit is veral krities wanneer die verbruiker gebruik maak van die Internet of vanaf selfone om transaksies aan te gaan met 'n bank. Ander ontwikkelinge sluit in betalings metodes wat verseker dat die handelaar nooit die kredietkaart besonderhede sien nie (bv. SET). Ander verseker weer dat die betalings besonderhede nooit oor die Internet hoef gestuur te word nie. Die vyf hoekstene van sekuriteit is konfidensialiteit, privaatheid, outentisiteit, integriteit en non-repudiasie. Outentisiteit, integriteit en non-repudiasie word opgelos deur die gebruik maak van digitale sertifikate, digitale tydstempels en digitale handtekeninge. Konfidensialiteit kan verseker word deur die boodskap te kodifiseer. Kodifikasie behels die verandering van data of boodskappe op so 'n wyse dat dit van geen betekenis is vir 'n persoon wat nie die korrekte algoritme en sleutel het om dit te dekodifiseer nie. Die geheime en publieke kodifiserings stelsels word die meeste gebruik om data te kodifiseer. Die publieke kodifiserings stelsel genereer twee sleutels, naamlik 'n privaat en publieke sleutel. Die publieke sleutel kan alom bekend gemaak word, maar die private sleutel moet slegs bekend wees aan sy gebruiker. 'n Unieke eienskap van die stelsel is dat indien 'n boodskap gekodifiseer is met een sleutel, slegs die ander sleutel van die paar dit sal kan dekodifiseer. Dit maak dit moontlik om outentisiteit, integriteit en non-repudiasie toe te pas. Die tradisionele metodes van betaling soos kontant, tjek en debiet of kredietkaart, gaan mettertyd vervang word deur hul elektroniese eweknie. Die dryfkrag agter die verskynsel is die hoë sekuriteit, doeltreffendheid en spoed waarmee transaksies op die manier gehanteer kan word. Vindingryke betaling metodes is ontdek om die besondere uitdagings van die nuwe ekonomie aan te speek. Byvoorbeeld, knap kaarte kan gebruik word as 'n elektroniese beursie wat elektroniese geld bêre. Ander persoonlike inligting, mediese records, bestuurlisensies, ens. kan ook op die kaart geberg word. Terwyl baie sekuriteits kenners glo dat sekuriteit nie meer 'n stuikelblok is om die Internet vir besigheids transaksies te gebruik nie, bly baie van die verbruikers skepties. Die werkstuk se doel is om daardie onsekerhede uit die weg te ruim, deur te verduidelik hoe sekuriteit toe gepas word, en om te bewys dat die Internet interdaad veilig is as a medium vir besigheids transaksies.
Taylor-King, Darlean. "Parental payment abuse within the Supplemental Security Income program." ScholarWorks, 2008. https://scholarworks.waldenu.edu/dissertations/642.
Повний текст джерелаGarner, Philip David. "Security and fraud analysis for new models in mobile payment." Thesis, Lancaster University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.441830.
Повний текст джерелаRanda, Jakub. "Systém pro integraci platebních terminálů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412896.
Повний текст джерелаSifatullah, Bhuiyan Mohammad. "Securing Mobile Payment Protocol based on EMV Standard." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121512.
Повний текст джерелаChen, Bangdao. "Using human interactive security protocols to secure payments." Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3.
Повний текст джерелаMays, Shelley M. "Income Payment Structure and its Influence on Food Security and Fruit Consumption." Digital Archive @ GSU, 2013. http://digitalarchive.gsu.edu/iph_theses/294.
Повний текст джерелаGrundström, Niklas. "A Security Analysis of a Credit Card Payment System for Bitcoin Transactions." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148230.
Повний текст джерелаRaza, Syed Ali. "A novel electronic commerce payment system with inherent security, interoperability and negotiation capability." Thesis, Birmingham City University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.424482.
Повний текст джерелаKalkan, Kutay. "A critical look at payment card industry data security standards implementation in restaurants." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 110 p, 2009. http://proquest.umi.com/pqdweb?did=1885544321&sid=4&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Повний текст джерелаPourghomi, Pardis. "Managing near field communication (NFC) payment applications through cloud computing." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8538.
Повний текст джерелаBa, Jing. "Analysis of Security Risks in Mobile Payments : A Case Study Using DNAT." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119997.
Повний текст джерелаLövhall, Jakob. "Analysis of a Bitcoin debit card : Design of a novel Bitcoin payment system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139837.
Повний текст джерелаDeng, Ni. "A secure, payment-based email delivery system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2909.
Повний текст джерелаEriksson-Asp, Ebba, and Berglund Katarina Inta. "Betala nu, senare eller lite då och då : En kvalitativ studie om betalningsmetoders betydelse för svenska konsumenters köpprocess online." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-46039.
Повний текст джерелаAddo, Archie N. S. "An Expert System for the Selection of Electronic Payment Systems Based on Organizational Security Requirements." NSUWorks, 1999. http://nsuworks.nova.edu/gscis_etd/382.
Повний текст джерелаScherling, Daniel, and Roosa Antinoja. "The Effects of E-payment Methods on Online Purchasing Cancellation : An empirical study on Swedish consumers’ perception of trust and security in e-payments." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-44079.
Повний текст джерелаLindbäck, Karin, and Carl Blommé. "Attitudes towards mobile payment : An empirical study of the consumers’ perception of security, privacy and convenience." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-148640.
Повний текст джерелаDiakos, Thomas P. "An evaluation of security and privacy concerns in contactless payment systems through physical layer eavesdropping measurements." Thesis, University of Surrey, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.616478.
Повний текст джерелаEl, Madhoun Nour. "Towards more secure contact and NFC payment transactions : new security mechanisms and extension for small merchants." Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS168.
Повний текст джерелаEMV is the standard implemented to secure the communication, between a client’s payment device and a PoS, during a contact or NFC purchase transaction. It represents a set of security messages, exchanged between the transaction actors, guaranteeing several important security properties. Indeed, researchers in various studies, have analyzed the operation of this standard in order to verify its reliability: unfortunately, they have identified several security vulnerabilities that, today, represent major risks for our day to day safety. Consequently, in this thesis, we are interested in proposing new solutions that improve the reliability of this standard. In the first stage, we introduce an overview of the EMV security payment system and we survey its vulnerabilities identified in literature. In particular, there are two EMV security vulnerabilities that lead to dangerous risks threatening both clients and merchants: (1) the confidentiality of banking data is not guaranteed, (2) the authentication of the PoS is not ensured to the client’s device. Therefore, our interests move in the second stage to address these two weaknesses. We first review a selection of the related works that have been implemented to solve these vulnerabilities, and then, in order to obtain better results than the related works, we propose a new secure contact and NFC payment system that includes four innovative security mechanisms. Finally, in the third stage, we adapt our first security mechanism in the context of a new NFC payment architecture. This architecture is especially destined for small merchants, allowing them to take advantage of their NFC smartphones for use directly as NFC readers
Hu, Guo Dong. "The factors that influence electronic payment adoption by SMEs in two cities of China." Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_8049_1263765238.
Повний текст джерелаKlečka, Jakub. "Analýza požadavků ba bezpečnost karetního průmysli a problémy při jejich implementaci." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-4599.
Повний текст джерелаIvarsson, Samuel. "Mobile payment with customer controlled connection : Can it be constructed to be safe enough?" Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5058.
Повний текст джерелаBjurling, Patrik. "Design and Implementation of a Secure In-app Credit Card Payment System." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-112745.
Повний текст джерелаLimwiriyakul, Sunsern. "A method for securing online community service: A study of selected Western Australian councils." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2012. https://ro.ecu.edu.au/theses/479.
Повний текст джерелаRahaman, Sazzadur. "From Theory to Practice: Deployment-grade Tools and Methodologies for Software Security." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99849.
Повний текст джерелаDoctor of Philosophy
Automatic screening tools have great potentials to reduce the gap between the theory and the practice of software security. However, the goal of scalable automated code screening is largely hindered by the practical difficulty of reducing false positives without compromising analysis quality. To enable compile-time security checking of cryptographic vulnerabilities, I developed highly precise static analysis tools (CryptoGuard and TaintCrypt) that developers can use routinely. Both CryptoGuard and TaintCrypt uncovered numerous vulnerabilities in real-world software, which proves the effectiveness. Oracle has implemented our cryptographic code screening algorithms for Java in its internal code analysis platform, Parfait, and detected numerous vulnerabilities that were previously unknown. I also designed a specification language named SpanL to easily express rules for automated code screening. SpanL enables domain experts to create domain-specific security checking. Unfortunately, tools and guidelines are not sufficient to ensure baseline security in internet-wide ecosystems. I found that the lack of proper compliance checking induced a huge gap in the payment card industry (PCI) ecosystem. I showed that none of the PCI scanners (out of 6), we tested are fully compliant with the guidelines, issuing certificates to merchants that still have major vulnerabilities. Consequently, 86% (out of 1,203) of the e-commerce websites we tested, are non-compliant. To improve the testbeds in the light of our work, the PCI Security Council shared a copy of our PCI measurement paper to the dedicated companies that host the PCI certification testbeds.
Sieger, Hanul [Verfasser], Sebastian [Akademischer Betreuer] Möller, Matthew [Akademischer Betreuer] Smith, and Yuval [Akademischer Betreuer] Elovici. "Perceived security and usage of a mobile payment application / Hanul Sieger. Betreuer: Sebastian Möller. Gutachter: Matthew Smith ; Yuval Elovici." Berlin : Technische Universität Berlin, 2015. http://d-nb.info/1078950407/34.
Повний текст джерелаMakokoe, Isaac. "Selected antecedents towards the acceptance of m-payment services and the relationship with attitude and future intentions." Thesis, Vaal University of Technology, 2017. http://hdl.handle.net/10352/454.
Повний текст джерелаKeywords: Mobile payments, usefulness, ease of use, security, attitude, future intentions. An increased reliance on mobile phones by consumers for making retail purchases has been witnessed over the years. Given the pervasive use of m-payments and the incessant diffusion of innovations in South Africa, it is important for marketers to have knowledge of the right set of factors that enhance consumers’ intent towards favouring m-payments in future encounters. This study draws from the undertones of Davis’s (1989) Technology acceptance Model (TAM). Whereas the theory alludes to the influences of both usefulness and ease of use on consumer attitudes and behaviour, this study further amplifies the salience of cosumer perceptions of security as a salient drive towards m-payment acceptance. This is because m-payments involve moneybased transactions and therefore it is important for consumers to have assurance that they operate along a secure platform. The TAM was nominated as the underlying theory in this research owing to its effectiveness when applied during the initial phases of an innovation, to avoid costly mistakes of implementing innovation attributes that do not offer the requiredset of elements for persuading consumers. The purpose of this study was to test an integrative research model of the antecedents of mpayment acceptance using a South African sample of consumers. A quantitative study comprising a non-probability snowball sample of 474 consumers aged between 18 and 50 years was conducted in 2016, in and around the five major towns of Southern Gauteng province in South Africa. The structured questionnaire requested respondents to indicate their perceptions regarding the usefulness, ease of use and security of m-payment platforms they have utilised. In addition, the questionnaire relates to consumers’ attitude evaluations of m-payments in general, as well as their intentions to both use and recommending m-payments to others in the future. Initially, descriptive statistics were performed on the data set, including correlation analysis and multicolinearity testing. Subsequently, structural equation modelling was applied by first, assessing the measurement model using fit indices, confirmatory factor analysis and statistical accuracy tests of reliability and validity. Specification of the measurement model led to the conclusion that the future intentions model was a five-factor structure comprising usefulness, ease of use, security, attitude and future intentions. Thereafter, the results of the structural model (Structural model A) supported the existence of a direct influence between usefulness and security with attitude, while the latter was found to have a direct influence on future intentions. Nevertheless, the relationships between ease of use and attitude was not significant and therefore, alternative hypothesis Ha3 could not be supported in this study leading to the need to specify a vi subsequent competing model. Under Structural model B, perceived usefulness is used as both a dependent and an independent variable since it is predicted by perceived ease of use and in turn predicts attitude towards using and behavioural intention to use simultaneously. The results of Structural model B led to the decision to accept the competing model as the ultimate model for this research since the model presents complete evidence of path weights that are greater than 0.20, interpreted as evidence for significant path outcomes. Insights gained from this study could assist both marketing academics and practitioners to understand the perceptions of consumers towards m-payments. In this regard, if a determination is made that conducting m-payment transactions in secure and effort-free environments could enhance the effectiveness of consumers in their jobs and lives in general, then marketers could be in a better position to deliver a worthwhile innovation solution for South African consumers.
Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.
Повний текст джерелаThe rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing... Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure the physical proximity of the de- vices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this manuscript, we present several techniques that allow for an automatic verification of such protocols. To this aim, we first present a symbolic model which faithfully models time and locations. Then we develop two approaches : either ba- sed on a new verification procedure, or leveraging existing tools like Proverif. Along this manuscript, we pay a particular attention to apply our results to contactless payment protocols
Barvíková, Kamila. "Technicko-ekonomické aspekty platebního styku." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-360145.
Повний текст джерелаWestergren, Nathalie, and Andrea Viberg. "En ny typ av betalningslojalitet i ett digitalt paradigmskifte." Thesis, Södertörns högskola, Företagsekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-38632.
Повний текст джерелаKonsumenters beteende vid näthandel är fluktuerande och skiljer sig från beteenden i fysiska butiker. En av de bidragande orsakerna är expanderingen av nätshopping. I samband med den ökande konsumtionen online ställs det krav på att betalningsmetoder i samband med näthandel fungerar som dom ska. Denna studie berör digitalisering inom näthandel med fokus på betalningsmetoder. Studien syftar till att öka förståelsen för hur konsumenters köpintention påverkas av betalningsmetoder när de näthandlar. Syftet har lett oss in på frågeställningen: På vilket sätt påverkas konsumenter av betalningsmetoden inom näthandeln? Studien baseras på en flermetodsforskning, en blandning av kvalitativ samt kvantitativ forskningsdesign. Empirin är insamlad via fokusgruppsintervjuer med efterföljande enkätundersökning från svenska konsumenter. Studien kombinerar teorierna, Technology Acceptance Model, TAM med Task Technology Fit, TTF. Där TAM som bygger på teorin om individers faktiska mottagande och acceptans av teknisk lösning. Med hjälp av TTF kan man beskriva och mäta hur teknik hjälper användare att prestera. Slutsatsen tyder på att betalningsmetoden är avgörande för konsumenten, uppfyller inte betalningsmetoden de krav som ställs av konsumenten kommer köpet således att avbryts. Det råder stark konkurrens mellan olika aktörer och det är lätt för konsumenten välja den onlinebutik som erbjuder just den betalningsmetod som är bäst anpassat för hens behov. Slutsatsen visar vidare att det finns en betalningsmetod som föredras framför andra, denna metod är Klarnas. Det framgår även av studiens resultat att säkerhet och enkelhet är frågor som konsumenten ser som avgörande utifrån hur de genomför sina köp online. Lojalitet är även en faktor som behandlas, en kund är inte alltid lojal till en webbplats om det visar sig vara krångligt att genomföra köpet. Kunder väljer hellre att genomföra ett köp på en webbplats som erbjuder en betalningsmetod som en annan aktör inte gör.
Mráčková, Kateřina. "Návrh metodiky bezpečnosti informací v podniku provozující elektronický obchod." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224218.
Повний текст джерелаMatúška, Peter. "Metody návrhu platebních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236980.
Повний текст джерелаSun, Yan. "An investigation into financial fraud in online banking and card payment systems in the UK and China." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/8290.
Повний текст джерелаDowman, Charles Sydney. "Investigating social grant payment methods for old age grant recipients in the Western Cape." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86633.
Повний текст джерелаENGLISH ABSTRACT: The research focuses on social assistance within the context of the developmental state. In South Africa, the Social Assistance Act, 2004 (Act No.13 of 2004) makes provision for the administration of social assistance and the payment of social grants. The Act provides for the payment of eight grant types including the payment of the Old Age Grant (OAG). The research focuses on the OAG and the payment methods exercised by OAG beneficiaries. The South African Social Security Agency is established in terms of the South African Social Security Agency Act, 2004 (Act No. 9 of 2004) and the payment of social assistance has been transferred to the Agency. The literature review revealed that African countries in particular have followed a different path to the rest of the development world with regard to social security. There is a strong reliance on community management involvement of social protection programmes in middle Africa. The South African system is more advanced and is legislated. South Africa’s social security system is a system of targeted social grants. It makes access to social security a basic human right, as it is contained in the Bill of Rights. The rise of the developmental state after World War 11 was championed by Japan, in particular, and this rise gave effect to the Asian Miracle. A comparison of different systems in the developing context is undertaken in the study. One of the criteria from the comparison of systems is that developmental decisions should be informed by a country’s vision or longterm strategy. The research is being undertaken at a pinnacle point in the history of South Africa, in particular of the Agency responsible for the administration and payment of these grants. The SASSA introduced the SASSA debit card (Appendix I) in 2012. Beneficiaries can use this card at any store with a point of sale device to make purchases and withdraw money at selected vendors published in the SASSA merchant list on the website of the Agency. The implementation of this decentralised system is however not without disagreement about the ideal path – questions about the advantages of electronic versus cash payments; and SASSA as ‘Paymaster’ versus the use of external service providers, is still being debated. This research attempts to assist in this debate through an investigation of alternative methods to disburse social grants, with specific focus on the old age grant recipients.
AFRIKAANSE OPSOMMING: Die navorsing fokus op maatskaplike ondersteuning in die konteks van die ontwikkeling-gerigte staat. In Suid-Afrika, maak die Wet op Maatskaplike Bystand, 2004 (Wet No.13 van 2004) voorsiening vir die administrasie van maatskaplike bystand en die betaling van maatskaplike toelae. Die wet maak voorsiening vir die betaling van agt soorte toelae, insluitend die betaling van die ouderdomstoelaag . Hierdie navorsing was gerig op die ouderdomstoelaag en die betalingsmetodes wat vir ouderdomstoelaag begunstigdes beskikbaar is. Die Suid-Afrikaanse Maatskaplike Sekerheidsagentskap is in terme van die Suid- Afrikaanse Sosiale Sekerheidswet, 2004 (Wet No. 9 van 2004) ingestel en die betaling van maatskaplike bystand is aan hierdie agentskap oorgedra. Die literatuurstudie het getoon dat lande, veral in Afrika, ‘n ander pad as die res van die ontwikkelende wêreld ten opsigte van maatskaplike sekerheid gevolg het. Daar is ‘n groot afhanklikheid van gemeenskapsbestuur betrokkenheid by die ontwikkeling van sosiale programme in middel Afrika. Die Suid-Afrikaanse maatskaplike sekerheidstelsel is meer gevorderd en word deur wetgewing onderbou. Dit maak toegang tot maatskaplike sekerheid ‘n menslike reg, deur dit in die Handves van Menseregte te onderskryf. Die bevordering van die ontwikkeling-gerigte staat na die Tweede Wêreld Oorlog is veral deur Japan aangevoer, en die aanneem hiervan het die Asiatiese Wonderwerk bewerkstellig. ‘n Vergelyking van die verskillende stelsels in die ontwikkeling konteks word onderneem in die studie. Een van die kriteria met betrekking tot die vergelyking van die verskillende stelsels is dat die ontwikkelingsbesluite ondersteun moet word deur middel van ‘n visie of lang termyn strategie. Die navorsing vind plaas op ‘n kritieke tyd in die geskiedenis van Suid-Afrika, veral ten opsigte van die agentskap wat vir die administrasie en uitbetaling van hierdie toelae verantwoordelik is. Die Suid-Afrikaanse Maatskaplike Sekerheids agentskap het die SASSA debietkaart in 2012 uitgereik. Begunstigdes kan die kaart by enige winkel met ‘n verkooppunttoestel, soos op die lys van uitgesoekte handelaars op SASSA se webtuiste bekendgestel is, gebruik om aankope te doen of geld te onttrek. Die inwerkstelling van die gedesentraliseerde stelsel is ongetwyfeld nie bepalend en gesprekke rondom die ideale stelsel is steeds onderweg – vra rondom die voordele van ‘n elektroniese stelsel teenoor ‘n kontantstelsel; sowel as vrae om SASSA as die ‘betaalmeester’ teenoor die gebruik van eksterne diensverskaffers, duur steeds voort. Die navorsing onderneem om hierdie debat te bevorder deur ‘n ondersoek na alternatiewe betaal metodes om sosiale toelaes te versprei, met spesifieke fokus op die betaling van die begunstigdes van die ouderdomstoelaag.
Mbedzi, Ndivhuhweni Innocent. "A legal analysis on the distribution and payment of the special pensions under the Special Pensions Act, 69 of 1969." Thesis, University of Limpopo, 2013. http://hdl.handle.net/10386/1183.
Повний текст джерелаThe South African government has paid compensation in a form of special pension to individuals who have been exposed to certain types of hardship and suffering caused by the governments or their predecessors. This compensation is described as ‘the appreciation or sense of guilty of society towards those people on whom the government has rightfully or wrongfully and at any rate disproportionally inflicted damage’. Government have been prepared to pay compensation to the following persons: former enemies, victims of war, victims of harmful compulsory vaccination measures, persons who had sacrificed their jobs and education in the process of overturning oppressive governments establishing democratic government; and persons whose basic human rights had been violated by governments or their predecessors. These persons have sacrificed their lives either in exile or within South Africa fighting for South Africa to be democratic. These persons must prove that they served their respective political organisations for a period of five years or above or they were banished or restricted in certain area or imprisoned or sentenced.
Ly, Jonny, and Sebastian Mollgren. "Konsumenters tillit för mobila betalningar – en kvantitativ studie." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-12638.
Повний текст джерелаWhen we buy things in a store it is given that you also pay for the products you buy. There are a handful of payment services available on the market. More and more people choose to abandon cash as a payment method in Sweden. The usage of cash is in a negative trend and the number of card users increase, according to statistics. This in turns means that credit-/debit card providers will have a monopoly-like position over the payment market and can therefore set transactions fees that suit their needs. Only 1 % of all transactions consist of mobile payments. Despite these low numbers the successful mobile payment service Swish has over 5 million users in Sweden. Although mobile payments match all the criteria to be regarded as a payment service in stores, the lack of trust among consumers makes them not confident enough to use it as their primary payment method. This in turn creates problems for mobile payments to establish themselves on the market. With these problems in mind this study focuses on identifying and prioritizing factors that affect consumers trust for mobile payments. To answer this study’s research question a quantitative self-completion questionnaire was conducted with a selection of respondents. 130 respondents answered the self-completion questionnaire and the responses were used in a statistical analysis program to identify and create useful statistical data. A discussion that is grounded in theory and empirical data shows that the respondents mostly assesses safety based on their subjective perception, the subjective perception is often based on the perception of the application interface. Another interesting finding is that a majority of the respondent stated that benefits of mobile payment over traditional payment solutions are equally important. Respondents also point out that the benefits with mobile payments are an important contributing factor towards the trust they experience. Finally, a discussion about personal integrity and how it affects the choice of mobile payments is held. The result of the study shows that consumers value security the most. However, consumers perceive safety as inadequate, but they choose to ignore it. The benefits that mobile payments offer are also a very important factor for consumers in choosing mobile payments. To increase trust in mobile payment solutions, security and benefits should be the focus of the payment service provider. Even if the results only show a small number of respondents prioritizing personal integrity it should still be considered an important factor. Mobile payment providers should therefore also focus on personal integrity in order to attract customers who prioritize integrity.
Bouhafa, Mohamed. "Paiement électronique. Le secteur bancaire entre l'adoption de l'innovation et la lutte contre la fraude." Thesis, Université Côte d'Azur (ComUE), 2019. http://www.theses.fr/2019AZUR0001.
Повний текст джерелаThis research work explores innovative methods to fight fraudulent activity in electronic payment in the Tunisian banking sector, more specifically it aims to investigate the interrelation between the strategy of relationship marketing and the various involved parties: the individual, the bank and the merchant and their impact on the intention of employing electronic means of payment in Tunisian banks. The main objective of this work is to construct an integrative model, which illustrates the relationship between the customer's behavior and the factors, which lead to the adoption of electronic payment methods and fight against fraud. On the theoretical level, our research hopes to contribute to the improvement of the security foundations for the various stakeholders as well as the development of electronic payment methods. On the practical level, the aim of this study is twofold: (1) it contributes to the research on the innovations in the field of e-Payment (2) It values the link between the variables of the relational MKG, the adoption of innovative method and the fight against electronic fraudulent activities in the banking sector. Our adopted research strategy follows a quantitative approach based on the hypo-deductive reasoning method. The approach is carried out in three stages: an exploration stage, a confirmation stage and finally a complementary stage. Our analysis of the different stages demonstrates that commitment has a significant impact on the intention to employ the means of payment, as it has been already suggested by previous research studies. The research, however, suggests an integrative model which combines variables that have previously studied separately. Thus, the perception of the quality of electronic service (Netqual) and trust have a significant impact on the consumer's commitment to the use of electronic means online. Hence, a successful revamping of the strategy of relationship marketing should underscore the role of satisfaction, trust, and commitment as key variables in the quality of interactions
Westling, Sebastian, and Marcus Eliasson. "E-handel : En studie kring betallösningar, säkerhetslösningar och certifieringar för små e-handelsföretag." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16767.
Повний текст джерелаThe purpose of this study is, on behalf of Periallo, to identify what it is that customers consider to be of greatest importance from a security perspective. This has been conducted from the answers given by consumers when asked a question concerning what they deem to be important from a security perspective when they shop from small e-commerce companies. In addition, a consideration has also been given to the security and payment solutions that are relevant to small e-commerce companies. An examination has also been conducted as to whether it is worth a small e-commerce company investing in a certification. In this work, payment solutions, security solutions and certifications have been identified by means of a critical literature review and a questionnaire, which is a quantitative method. The results of the study have shown that the majority of customers feel that it is safe to shop online. The most secure payment solution is considered to be an invoice, while the most popular payment methods are debit/credit cards and direct payment. In addition, the study has also shown that it is more important for a small and unknown e-commerce company to properly reflect upon the security solutions that they use against the large and well-known companies, even though, the majority of the participants in this study, were not aware of the security solutions available to protect companies and consumers.
Axelsson, David, and Jesper Ingemarsson. "Rättssäkerhet och anstånd med betalning av skatt : En analys av 17 kap. 2 § p. 2-3 Skattebetalningslagen ur ett rättssäkerhetsperspektiv." Thesis, Jönköping University, JIBS, Commercial Law, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-663.
Повний текст джерелаThe aim of this thesis is to investigate whether legal rights are upheld when wording and applying the postponement of payment of tax regulations of chapter 17 section 2 p. 2-3 of the payment of Tax Act. We also investigate how the wording of the regulations relate to the requirement of legal security.
It has been questioned if the regulations concerning postponement of payment of tax are compatible with the requirement of legal security. Of course does not a taxpayer want to pay tax that he or she consider incorrect, and that has not been under trial by an impartial authority. If the request for postponement of payment of tax is rejected, the consequences for the taxpayer can lead to huge financial losses. The worse scenario for the taxpayer is if he or she goes bankrupt due to the rejected request.
The tax assessment regulations forming the basis for the postponement of payment of tax regulations are considered disputable, which has brought the matter to the fore. When ap-plying for reassessment or making an appeal, the question arises whether the tax in process should be submitted before the matter has been settled. The regulations of chapter 23 sec-tion 7 of the payment of Tax Act stipulate that the obligation to submit taxes remains re-gardless of its disputability. The only way the taxpayer can avoid having to submit taxes be-forehand is to apply for postponement of payment of the tax. When the application for postponement of payment of tax has reached the Tax Authority it is treated separately from the underlying tax assessment matter. However, the outcome of the postponement of payment of tax matter depends on the prerequisites on which the tax assessment is based.
This thesis is based on the regulations of chapter 17 section 2 p. 2-3 of the payment of Tax Act. The section stipulates that postponement of payment of tax may be granted in matters where the outcome of an ongoing tax assessment process may be uncertain, or where it may lead to considerable damage or else appear unreasonable to submit taxes. The founda-tions for judgment are very vaguely worded, which creates room for subjective interpreta-tions, and moreover, it means that judicial authorities must fill up the prerequisites with their judgments. Unclear bases for judgment limit taxpayers’ demands for predictable taxa-tion, and the risk both local tax offices and the Tax Authority and administrative courts make different assessments is great.
When the Tax Authority and the administrative courts treat claims for postponement of payment of tax, legal rights must always be considered. There are often deficiencies in the handling of the matters, which impair the taxpayers’ legal rights. The matters should be suf-ficiently investigated and the decisions motivated in a satisfactory manner. Moreover, the handling of claims for postponement of payment of tax should be objective, and decisions made with consideration to the consequences of the ruling.
As things are at present, it takes a considerable amount of time for the courts to investigate the underlying tax assessment, which means the consequences of not being granted a post-ponement of payment of tax are so much the graver. This also means that the taxpayer is forced to live a long time in financial and psychological uncertainty. One suggestion of how to come to terms with this problem is to increase specialization in the administrative courts.
The lack of clearly worded legal texts, preparatory work and practice leads to predictability being impaired for the individual and create difficulties for the Tax Authority and the ad-ministrative courts. From a legal rights perspective, more generous regulations regarding postponement of payment of tax should be introduced. One suggestion is to turn the main regulation of chapter 23 section 7 of the payment of Tax Act around. Postponement of payment of tax would then be granted unless particular reasons for its denial exist. An al-ternative to this suggestion may be to leave the main regulation in its current wording and have the exception regulations of chapter 17 section 2 of the payment of Tax Act grant postponement of payment of tax, unless particular reasons hindering this exist. In such a case of denying postponement of payment of tax the reasons for denial should be speci-fied.
I uppsatsen undersöks om rättssäkerheten upprätthålls vid tillämpningen av anståndsbe-stämmelserna i 17 kap. 2 § p. 2-3 SBL. Samt hur utformningen av bestämmelserna förhåller sig till kraven på rättssäkerhet.
Det har ifrågasatts om anståndsbestämmelserna är förenliga med rättssäkerhetens krav. Detta följer av att en skattskyldig naturligtvis inte vill betala skatt som denne anser är felak-tig och som inte ännu har hunnits prövats av en oberoende instans. Avslås en anståndsbe-gäran kan detta få stora ekonomiska konsekvenser för den skattskyldige. I värsta fall riske-rar den skattskyldige att försättas i konkurs.
Anledningen till att anståndsbestämmelserna uppkommer är att det underliggande taxe-ringsbeslutet som ligger till grund för dessa är tvistigt. Vid en begäran avseende ompröv-ning eller överklagan uppstår frågan huruvida den berörda skatten som är under process skall betalas innan ärendet är avgjort. Enligt huvudregeln i 23 kap. 7 § SBL stadgas det att skyldigheten att erlägga skatt består oavsett om den är tvistig. Den utväg som återstår för den skattskyldige att slippa att betala skatten innan beslutet vunnit laga kraft är att begära anstånd med betalningen av skatten. När begäran om anstånd inkommit till Skatteverket blir detta ett ärende som hanteras separat från den underliggande taxeringsfrågan, dock är utgången av anståndsärendet beroende av de rekvisit som ligger till grund för taxering.
Uppsatsens inriktning syftar till reglerna i 17 kap. 2 § p. 2-3 SBL. I paragrafen stadgas att anstånd kan ges i fall, där utgången i en pågående skatteprocess är tveksam eller där det kan medföra betydande skadeverkningar eller annars framstå som oskäligt att betala skatten. Dessa bedömningsgrunder är som synes mycket vagt utformade, vilket skapar utrymme för subjektiva tolkningar och dessutom innebär detta att de rättstillämpande instanserna måste fylla ut rekvisiten med sina bedömningar. Oklara grunder för bedömning medför att de skattskyldigas krav på en förutsebar beskattning inskränks, dessutom är risken för olikfor-mig bedömning mellan både lokala Skatteverkskontor samt mellan Skatteverket och för-valtningsdomstolarna stor.
I behandlingen av anståndsärendet hos Skatteverket och förvaltningsdomstolarna finns det flera rättssäkerhetsaspekter som bör uppfyllas. I flera av dess finns brister i handläggningen som gör att den skattskyldiges rättssäkerhet kan komma att begränsas. Ärendet skall utre-das tillräcklig och när beslut lämnas skall detta motiveras för den skattskyldige på ett till-fredsställande sätt. Dessutom bör hanteringen av anståndsärendet skötas objektivt och hän-syn till konsekvenserna av beslutet bör beaktas.
I nuläget är handläggningstiderna för att få den underliggande taxeringsfrågan utredd av domstolarna mycket lång, vilket innebär att konsekvenserna av att inte få anstånd med be-talning av skatten blir ännu större. Det innebär att den skattskyldige under lång tid tvingas leva i både ekonomisk och psykologisk ovisshet. Ett förslag för att komma till rätta med problemet är att en ökad specialisering inom förvaltningsdomstolarna sker.
Bristen på klar lagtext, förarbeten och praxis leder till att förutsebarheten inskränks för den enskilde samt svårigheter för Skatteverket och domstolarna vid lagtillämpning. Ur rättssä-kerhetssynpunkt bör generösare bestämmelser angående anstånd med betalning av skatt in-föras. Ett förslag är att vända på huvudregeln i 23 kap. 7 § SBL. Anstånd skulle då som hu-vudregel medges. Om det däremot föreligger särskilda skäl skall den skattskyldige nekas an-stånd. Ett alternativ till detta förslag skulle vara att huvudregeln står kvar i nuvarande ut-formning, men att undantagsreglerna i 17 kap. 2 § SBL regelmässigt medger anstånd om inte särskilda skäl talar emot detta. I ett sådant anståndsavslag skall skälen som ligger till grund för beslutet preciseras.
Alves, Diogo Rodrigues. "E-commerce : um novo caminho para o método de pagamento." Master's thesis, Instituto Superior de Economia e Gestão, 2017. http://hdl.handle.net/10400.5/14747.
Повний текст джерелаA globalização da economia e o desenvolvimento das tecnologias de informação levaram à criação do e-commerce. Este modelo de negócio tem-se desenvolvido, suprimindo as barreiras geográficas e permitindo que os consumidores possam ter acesso a um maior leque de produtos e a preços reduzidos. O número de utilizadores tem vindo a aumentar, no entanto, um grande número ainda não se sente confortável com as medidas de segurança. Há a necessidade de transmitir, essencialmente, confiança e segurança, para que possam comprar sem qualquer receio. Cabe ao vendedor, através da transparência e dos métodos de pagamento, transmitir estes sentimentos. É necessário estimular a facilidade e a diversidade nos sistemas de pagamentos eletrónicos, satisfazendo as necessidades dos utilizadores. Este estudo foca-se no desenvolvimento de um sistema de pagamento eletrónico e se este será útil e proporcionará um maior nível de segurança e confiança aos seus utilizadores. Para a realização do estudo, optou-se por uma abordagem quantitativa, através de um questionário. Posteriormente, com o auxílio dos softwares SPSS e Excel Analysis ToolPak, procedeu-se à análise dos resultados obtidos nos questionários, sendo que estes se revelaram bastante positivos. Os inquiridos demonstraram-se interessados e recetivos a este sistema. Do total da amostra, 62,7% responderam que utilizariam o sistema e 30,8% responderam "talvez".
The globalization of the economy and the development of information technologies led to the creation of e-commerce. This business model has developed a lot, removing geographical barriers and allowing consumers to have access to a wider range of products at lower prices. The number of users has been increasing, however, a large number still do not feel comfortable with the security measures. There is a need to transmit, essentially, confidence and security, so that they can buy without any fear. It is up to the seller, through transparency and payment methods, to convey these feelings. It is necessary to encourage ease and diversity in electronic payment systems, satisfying user needs. This study focuses on the development of an electronic payment system and whether it will be useful and provide a greater level of security and confidence to its users. For the accomplishment of the study a quantitative approach was chosen, through a questionnaire. Subsequently, with the help of SPSS and Excel Analysis ToolPak, the results obtained in the questionnaires were analyzed, which proved to be very positive. Respondents were interested and receptive to this system. Of the total sample, 62.7% answered that they would use the system and 30,8% answered "maybe".
info:eu-repo/semantics/publishedVersion
Zhang, Yusha, and Klavdija Zalar. "The Application of the Extended Technology Acceptance Model in Different Cultural Contexts to Understand Mobile Payment Adoption : A comparative study between China and Sweden." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96961.
Повний текст джерелаFiedler, Marielle, and Cecilia Uney. "Bitcoin i kassan : En kvalitativ studie om Bitcoin som betalningsmedel." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-36495.
Повний текст джерелаDen digitala valutan Bitcoin har uppmärksammats mycket på senaste tid, bland annat på grund av dess höga volatilitet och stigande popularitet. Syftet med denna studie är att ta reda på varför företag har valt att implementera och använda Bitcoin som ett betalningsalternativ. Dessutom undersöka vilka kostnader och fördelar företag upplever med att acceptera Bitcoin som betalningsmedel, samt hur de ser på säkerheten och risker som kan uppstå. Studien utfördes med ett kvalitativt tillvägagångssätt där sex intervjuer genomförts med sex olika företag som tar emot Bitcoin som betalningsmedel. Studiens resultat visade på att det är flera olika faktorer som leder till att företag väljer att implementera Bitcoin som betalningsmedel. Den upplevda säkerheten var hög och de risker som förknippas med Bitcoin upplevdes inte som stor hos de tillfrågade respondenterna. Resultatet visade även att kostnaderna med Bitcoin som betalningsmedel är låga för företag, men att de till skillnad från tidigare studier visade på en väldigt hög transaktionskostnad för konsumenter.
Karagöz, Elin. "Managing Innovation of Payments : A Study of Regulatory Compliance Within Swedish Banking." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279621.
Повний текст джерелаDenna studie undersöker de utmaningar som svenska storbanker står inför i en digitaliserad miljö där både IT-säkerhet och innovation behöver tillgodoses för att upprätthålla konkurrenskraft gällande betaltjänster. Då konkurrensen ökar inom betaltjänstsektorn blir utvecklingen av innovativa tjänster allt mer betydelsefull. Samtidigt är det viktigt att dessa lösningar håller en hög nivå av IT-säkerhet, dels för att bibehålla kundförtroende, men också för att banker lyder under finansiella regelverk. Följaktligen var syftet med denna studie att bidra till kunskap om utvecklingen av framtidens betaltjänster. Teori och empiri kretsade kring områdena teknik, regelverk och innovation, med en strävan att identifiera huvudutmaningar på området. I en kvalitativ fallstudie inkluderandes en serie intervjuer med experter inom banksektorn och ITsäkerhet. Resultaten visade att de viktigaste utmaningarna kopplat till regelefterlevnad och innovation inom betaltjänster för storbanker är nyttjandet av föråldrad teknik, behovet av en avvägning mellan att uppfylla regelverk och utveckling av nya produkter och tjänster, och slutligen kommunikation och samarbete inom både organisationen och med lagstiftare.
Orság, Lubomír. "CMS systém kombinovaný s eshop systémem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217289.
Повний текст джерелаRosado, Rosalina Rato Cardoso. "O incumprimento contributivo no sistema de segurança social: estudo do impacto financeiro e social." Master's thesis, Universidade de Évora, 2019. http://hdl.handle.net/10174/26698.
Повний текст джерелаGuler, Sevil. "Secure Bitcoin Wallet." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.
Повний текст джерелаEmms, Martin J. "Contactless payments : usability at the cost of security?" Thesis, University of Newcastle upon Tyne, 2016. http://hdl.handle.net/10443/3304.
Повний текст джерела