Дисертації з теми "Security of payment"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Security of payment.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 дисертацій для дослідження на тему "Security of payment".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Huang, Enyang. "Automated security analysis of payment protocols." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78140.

Повний текст джерела
Анотація:
Thesis (Ph. D. in the Field of Computer Engineering)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2012.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 173-182).
Formal analyses have been used for payment protocol design and verification but, despite developments in semantics and expressiveness, previous literature has placed little emphasis on the automation aspects of the proof systems. This research develops an automated analysis framework for payment protocols called PTGPA. PTGPA combines the techniques of formal analysis as well as the decidability afforded by theory generation, a general-purpose framework for automated reasoning. A comprehensive and self-contained proof system called TGPay is first developed. TGPay introduces novel developments and refinements in the formal language and inference rules that conform to the prerequisites of theory generation. These target desired properties in payment systems such as confidentiality, integrity, authentication, freshness, acknowledgement and non-repudiation. Common security primitives such as encryption, decryption, digital signatures, message digests, message authentication codes and X.509 certificates are modeled. Using TGPay, PTGPA performs analyses of payment protocols under two scenarios in full automation. An Alpha-Scenario is one in which a candidate protocol runs in a perfect environment without attacks from any intruders. The candidate protocol is correct if and only if all pre-conditions and post-conditions are met. PTGPA models actions and knowledge sets of intruders in a second, modified protocol that represents an attack scenario. This second protocol, called a Beta-Scenario, is obtained mechanically from the original candidate protocol, by applying a set of elementary capabilities from a Dolev-Yao intruder model. This thesis includes a number of case studies to demonstrate the feasibility and benefits of the proposed framework. Automated analyses of real-world bank card payment protocols as well as newly proposed contactless mobile payment protocols are presented. Security flaws are identified in some of the protocols; their causes and implications are addressed.
by Enyang Huang.
Ph.D.in the Field of Computer Engineering
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Baqer, Khaled. "Resilient payment systems." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/285001.

Повний текст джерела
Анотація:
There have been decades of attempts to evolve or revolutionise the traditional financial system, but not all such efforts have been transformative or even successful. From Chaum's proposals in the 1980s for private payment systems to micropayments, previous attempts failed to take off for a variety of reasons, including non-existing markets, or issues pertaining to usability, scalability and performance, resilience against failure, and complexity of protocols. Towards creating more resilient payment systems, we investigated issues related to security engineering in general, and payment systems in particular. We identified that network coverage, central points of failure, and attacks may cripple system performance. The premise of our research is that offline capabilities are required to produce resilience in critical systems. We focus on issues related to network problems and attacks, system resilience, and scalability by introducing the ability to process payments offline without relying on the availability of network coverage; a lack of network coverage renders some payment services unusable for their customers. Decentralising payment verification, and outsourcing some operations to users, alleviates the burden of contacting centralised systems to process every transaction. Our secondary goal is to minimise the cost of providing payment systems, so providers can cut transaction fees. Moreover, by decentralising payment verification that can be performed offline, we increase system resilience, and seamlessly maintain offline operations until a system is back online. We also use tamper-resistant hardware to tackle usability issues, by minimising cognitive overhead and helping users to correctly handle critical data, minimising the risks of data theft and tampering. We apply our research towards extending financial inclusion efforts, since the issues discussed above must be solved to extend mobile payments to the poorest demographics. More research is needed to integrate online payments, offline payments, and delay-tolerant networking. This research extends and enhances not only payment systems, but other electronically-enabled services from pay-as-you-go solar panels to agricultural subsidies and payments from aid donors. We hope that this thesis is helpful for researchers, protocol designers, and policy makers interested in creating resilient payment systems by assisting them in financial inclusion efforts.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Marais, Terrence K. "Electronic payment and security on the Internet." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.

Повний текст джерела
Анотація:
Thesis (MBA)--Stellenbosch University, 2002.
ENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues are new and many experts are only learning how to deal with these now. This thesis offers suggestions and strategies a user can follow to minimize misuse and abuse of payment details. Electronic payment is the backbone of e-commerce, and the biggest threat towards widespread acceptance and usage of e-commerce is security. Many innovative solutions have been developed by vendors to address security issues. For example, the Secure Electronic Transfer (SET) protocol was developed to ensure that credit card transactions could be conducted safely and securely on the Internet. Secure Socket Layer (SSL) ensures that all communications and transactions are conducted in a tightly secure environment. This is critical for online or mobile banking and other financial activities. Others developments include payment systems that ensure that credit card details are never exposed to a merchant (e.g. SET), while some ensure that credit card numbers never enter the Internet. The five corner stones of security are confidentiality, privacy, authentication, integrity and non-repudiation. Authentication, non-repudiation and integrity can be resolved with digital certificates, digital timestamps and digital signatures. Message confidentiality, on the other hand, is ensured through the use of strong encryption. Encryption systems mutilate data or a message to such an extent that it is totally useless to someone who does not have the appropriate algorithm and key to decode it. The most widely used encryption schemes are the secret key and public key encryption systems. The public key cryptosystem generates two keys, called a public and private key. The public key can be made generally known, but the private key must be kept secret. A unique property of the scheme is that once data is encrypted with one key, only the corresponding other key of the pair can decrypt it. This makes it possible to address issues of authentication, integrity and non-repudiation. Traditional payment instruments such as cash, cheques, debit and credit card transactions are being replaced by their electronic equivalents. The driving forces behind these are transactional security, efficiency and speed. Novel payment solutions and strategies have been devised to meet the challenges of this new economy. For example, smart cards can act as an electronic purse that can hold electronic money. Other information, such as personal details, medical records, driver's licence, etc. can also be stored on the card. Whilst many security experts are in agreement that security is not a barrier anymore for wider usage of the Internet for financial transactions, many consumers are still apprehensive about how secure and safe it really is. This work aims to diminish those fears and show that the Internet is safe for business.
AFRIKAANSE OPSOMMING: Een van die grootste bekommernisse wat 'n kliënt met aankope op die Internet kan ondervind, is die onsekerheid wat presies gebeur nadat betalings aangegaan is en "Submit" is gedruk. Is dit moontlik dat iemand die boodskap kan onderskep en betaling besonderhede vir eie gebruik kan herwin? Daar is ook baie publisiteit oor kodifisering, maar hoe kan die klient verseker wees dat betalings besonderhede wel gekodifiseer is wanneer "Submit" gedruk was? Is daar 'n manier waarmee 'n mens verseker kan wees dat betaling slegs eenkeer gaan geskied? Baie van die sekuriteits lokvalle is nuut en sekuritiets kenners is tans besig om te leer hoe om die probleme te hanteer. Die werkstuk offer wenke en strategieë vir die verbruiker om die misbruik van betaling besondehede op die Internet te minimiseer. Elektronies betalings meganisme is die ruggraat van elektroniese besigheid, en die grootste struikelblok tot die grootskaalse gebruik daarvan is sekuriteit. Daar is baie innoverende oplossings om die probleme hok te slaan. By voorbeeld, die Secure Electronic Transfer (SET) protokol was ontwikkel om te verseker dat betalings met kredietkaart met hoë sekuriteit en veiligheid aangegaan kan word. Secure Socket Layers (SSL), verseker dat alle kommunikasies en transaksies in 'n sekuur en veilige omgewing plaasvind. Dit is veral krities wanneer die verbruiker gebruik maak van die Internet of vanaf selfone om transaksies aan te gaan met 'n bank. Ander ontwikkelinge sluit in betalings metodes wat verseker dat die handelaar nooit die kredietkaart besonderhede sien nie (bv. SET). Ander verseker weer dat die betalings besonderhede nooit oor die Internet hoef gestuur te word nie. Die vyf hoekstene van sekuriteit is konfidensialiteit, privaatheid, outentisiteit, integriteit en non-repudiasie. Outentisiteit, integriteit en non-repudiasie word opgelos deur die gebruik maak van digitale sertifikate, digitale tydstempels en digitale handtekeninge. Konfidensialiteit kan verseker word deur die boodskap te kodifiseer. Kodifikasie behels die verandering van data of boodskappe op so 'n wyse dat dit van geen betekenis is vir 'n persoon wat nie die korrekte algoritme en sleutel het om dit te dekodifiseer nie. Die geheime en publieke kodifiserings stelsels word die meeste gebruik om data te kodifiseer. Die publieke kodifiserings stelsel genereer twee sleutels, naamlik 'n privaat en publieke sleutel. Die publieke sleutel kan alom bekend gemaak word, maar die private sleutel moet slegs bekend wees aan sy gebruiker. 'n Unieke eienskap van die stelsel is dat indien 'n boodskap gekodifiseer is met een sleutel, slegs die ander sleutel van die paar dit sal kan dekodifiseer. Dit maak dit moontlik om outentisiteit, integriteit en non-repudiasie toe te pas. Die tradisionele metodes van betaling soos kontant, tjek en debiet of kredietkaart, gaan mettertyd vervang word deur hul elektroniese eweknie. Die dryfkrag agter die verskynsel is die hoë sekuriteit, doeltreffendheid en spoed waarmee transaksies op die manier gehanteer kan word. Vindingryke betaling metodes is ontdek om die besondere uitdagings van die nuwe ekonomie aan te speek. Byvoorbeeld, knap kaarte kan gebruik word as 'n elektroniese beursie wat elektroniese geld bêre. Ander persoonlike inligting, mediese records, bestuurlisensies, ens. kan ook op die kaart geberg word. Terwyl baie sekuriteits kenners glo dat sekuriteit nie meer 'n stuikelblok is om die Internet vir besigheids transaksies te gebruik nie, bly baie van die verbruikers skepties. Die werkstuk se doel is om daardie onsekerhede uit die weg te ruim, deur te verduidelik hoe sekuriteit toe gepas word, en om te bewys dat die Internet interdaad veilig is as a medium vir besigheids transaksies.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Taylor-King, Darlean. "Parental payment abuse within the Supplemental Security Income program." ScholarWorks, 2008. https://scholarworks.waldenu.edu/dissertations/642.

Повний текст джерела
Анотація:
Management of Social Security Administration (SSA) has been challenged by the phenomena of overpayments with its Supplemental Security Income (SSI) program. Oversight authorities of SSA had expressed concerns about the overpayment abuse caused by parents as representative payees for disabled minor children. It was important to address this problem because the amount of overpayments prior to 1998 had caused integrity issues for management of SSA and increased federal debt from SSI claimants. The purpose of this study was to examine how management of SSA and the SSI program had responded to the concerns of the oversight authorities. Theoretical foundations for this study were based on systems concepts and theories as basic rationale for the examination of feedback from systems operation and for organizational learning about the phenomena of overpayments. This study employed a case study methodology using an approach that examined the SSI program and its operational procedures. The questions for this study involved inquiries into processes and procedures that were developed for improving payment accuracy of SSI claims. Data analysis was performed by comparing the change in overpayment amounts to the implementation of different technological and operational procedures for the SSI program over time using time series analysis. The results of this study suggested that technology that allows sharing communications between federal and state governmental organizations improved overpayment detection and collection for the SSI program. This sharing provided positive social change that could have implications for improved operational efficiency in many other social service programs in the United States.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Garner, Philip David. "Security and fraud analysis for new models in mobile payment." Thesis, Lancaster University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.441830.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Randa, Jakub. "Systém pro integraci platebních terminálů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412896.

Повний текст джерела
Анотація:
This master's thesis describes the process of integration of electronic payment terminals into another technological solutions and eventually enabling the opportunity to make electronic payments using these solutions. It analyses the current situation on the field of electronic payments and the possibilities of own solution for these payments. It discusses the security aspects of payment operations and terminals and it also describes current legal situation involving the electronic payments in Czech Republic. It describes the process of implementation of the application for payment terminal integration and analyses the results of testing.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sifatullah, Bhuiyan Mohammad. "Securing Mobile Payment Protocol based on EMV Standard." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121512.

Повний текст джерела
Анотація:
This is an era of communication technology. This era has faced a lot of innovation in technology sector. Mobile phones were once used for calling or text messaging only, now slowly becoming competitor of computers. The rapid development of hardware, software and operating system of smartphones made it possible to do multiple tasks through the phones. Nowadays, smart phones have powerful operating systems which provide wide range of applications. Smart phones can be interfaced with external hardware also. The payment industry is about to see a drastic change because of these features. People can now pay through their smartphones; they can use payment cards to pay through it etc. But financial transaction is a very sensitive service and security is very crucial here. For financial services, the major security services such as confidentiality, integrity, authenticity, authorization and non-repudiation must be ensured. There are two major types of payment cards, magnetic-stripe based cards and chip based cards. Chip based card provides better security. Magnetic stripe based cards being static, is easy to counterfeit. But the fact that these magnetic stripe cards are still used in many countries, it is necessary to provide a security solution in order to protect customers from treachery. In this thesis, it has been investigated how to secure the mobile payment based on EMV standard. EMV is a chip based payment card. It has strong security features which made skimming or tampering it very hard. But, Magstripe based payments still remained insecure. This thesis paper aims to secure the transaction when paid with magnetic stripe based cards. Several measures have been taken to ensure that major security services are met. In addition, a prototype was developed and tested to demonstrate the practicality of the designed solution. The research results of this paper show that by transacting through the secured mobile payment protocol, customers can avail payment service more securely than traditional magnetic striped card based payments.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Chen, Bangdao. "Using human interactive security protocols to secure payments." Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3.

Повний текст джерела
Анотація:
We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our research by conducting extensive investigations into the payment industry. After interacting with different payment companies and banks, we present two case studies: online payment and mobile payment. We show how to adapt HISPs for payments by establishing the reverse authentication method. In order to properly and thoroughly evaluate different payment examples, we establish two attack models which cover the most commonly seen attacks against payments. We then present our own payment solutions which aim at solving the most urgent security threats revealed in our case studies. Demonstration implementations are also made to show our advantages. In the end we show how to extend the use of HISPs into other domains.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mays, Shelley M. "Income Payment Structure and its Influence on Food Security and Fruit Consumption." Digital Archive @ GSU, 2013. http://digitalarchive.gsu.edu/iph_theses/294.

Повний текст джерела
Анотація:
Background: Despite the growing evidence of the positive effects of fruit consumption on health, many individuals do not consume the recommended dietary guideline amounts. It has been suggested that socioeconomic status and income have an influence on food choices and consumption. The aim of this study is not only to examine whether payment structure has an association with food choices but also to assess fruit consumption independent of vegetables in the US. Methods: The 2011 Behavioral Risk Factor Surveillance System was utilized and the study design led to a sample size that was n= 19,122 respondents. Variables that were selected for associations with sufficient fruit consumption included demographic data, employment status, payment structure, education, and home ownership status. A p-value of <0.05 and 95% confidence intervals were used to determine statistical significance of the analyses performed. Results: Factors that were associated with greater odds of sufficient fruit consumption included being African-American, education- all levels of high school graduate and higher, all income categories above $15,000 annually, those employed, and those who rent a home (p-value<0.01). Multivariate logistic regression analysis indicated that respondents' education defined as having college education was associated with increased odds of sufficient fruit consumption (OR = 7.09: CI =1.86-27.09] (p-value<0.01). Conclusions: Assessing fruit consumption alone did not provide greater insight on sufficiency with the exception of race's (specifically African American) influence. Payment structure was found not associated with increased fruit consumption. Promotion of education on the relevance of fruit consumption to overall health is critical and necessary in the United States.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Grundström, Niklas. "A Security Analysis of a Credit Card Payment System for Bitcoin Transactions." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148230.

Повний текст джерела
Анотація:
Cryptocurrencies has become a very hot topic recently, with Bitcoin being the most popular. The increase in interest has led to an incentive to create payment systems for the currency that makes it easier to use for day-to-day shopping. A lot of companies are inves- tigating possible solutions for credit cards that are used for cryptocurrencies. This thesis aims to present and perform a security analysis on an already created concept of a credit card payment system for Bitcoin. The security analysis is done in a systematical approach where the modules were analyzed with predetermined restrictions and assumptions. The restricitons and assumptions are then removed one-by-one to find potential threats in the system. The outcome of the analysis is then evaluated in an attempt to find possible im- plementation methods that would mitigate or prevent the discovered threats. The possible implementations are also evaluated in terms of how they would affect the system.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Raza, Syed Ali. "A novel electronic commerce payment system with inherent security, interoperability and negotiation capability." Thesis, Birmingham City University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.424482.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Kalkan, Kutay. "A critical look at payment card industry data security standards implementation in restaurants." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 110 p, 2009. http://proquest.umi.com/pqdweb?did=1885544321&sid=4&Fmt=2&clientId=8331&RQT=309&VName=PQD.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Pourghomi, Pardis. "Managing near field communication (NFC) payment applications through cloud computing." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8538.

Повний текст джерела
Анотація:
The Near Field Communication (NFC) technology is a short-range radio communication channel which enables users to exchange data between devices. NFC provides a contactless technology for data transmission between smart phones, Personal Computers (PCs), Personal Digital Assistants (PDAs) and such devices. It enables the mobile phone to act as identification and a credit card for customers. However, the NFC chip can act as a reader as well as a card, and also be used to design symmetric protocols. Having several parties involved in NFC ecosystem and not having a common standard affects the security of this technology where all the parties are claiming to have access to client’s information (e.g. bank account details). The dynamic relationships of the parties in an NFC transaction process make them partners in a way that sometimes they share their access permissions on the applications that are running in the service environment. These parties can only access their part of involvement as they are not fully aware of each other’s rights and access permissions. The lack of knowledge between involved parties makes the management and ownership of the NFC ecosystem very puzzling. To solve this issue, a security module that is called Secure Element (SE) is designed to be the base of the security for NFC. However, there are still some security issues with SE personalization, management, ownership and architecture that can be exploitable by attackers and delay the adaption of NFC payment technology. Reorganizing and describing what is required for the success of this technology have motivated us to extend the current NFC ecosystem models to accelerate the development of this business area. One of the technologies that can be used to ensure secure NFC transactions is cloud computing which offers wide range advantages compared to the use of SE as a single entity in an NFC enabled mobile phone. We believe cloud computing can solve many issues in regards to NFC application management. Therefore, in the first contribution of part of this thesis we propose a new payment model called “NFC Cloud Wallet". This model demonstrates a reliable structure of an NFC ecosystem which satisfies the requirements of an NFC payment during the development process in a systematic, manageable, and effective way.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Ba, Jing. "Analysis of Security Risks in Mobile Payments : A Case Study Using DNAT." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119997.

Повний текст джерела
Анотація:
Technology development always makes the life easier and faster thus it also impacts the way we do business in our lives. As the widespread usage of mobile devices in recent years mobile technology has created an environment in which people around the world are getting closer. Recently the popularity of personal mobile devices like Ipad and Iphone leads to the appearance of opportunities to improve payments more fast and efficient. And for the past years various services and applications for mobile payment have been developed by the companies which are eager for the leader positions in the new market. With the development of mobile payment and the important relationship between payment and our lives, a lot of security risks associated with this field should be extensively studied. This thesis aims to analyze the security risks related to the mobile payment. This thesis uses an explorative method to research the stakeholders, critical assets and vulnerabilities within mobile payment by utilizing case studies of Square and Google Wallet. The information gathered from the case studies and security analysis is further analyzed by the dynamic network analysis tool (ORA) in order to discover the security risks. The results of this thesis indicate that accounts and business data are the most critical assets in mobile payment because accounts are the foundation to perform payment transactions. Further, the mobile payment service provider, merchant and consumer are the stakeholders affected most by the security risks. And this thesis concludes that all the stakeholders should be aware of the security risks within the mobile payment environment, and further if service and device providers want to keep continuous business they should make more effort to cooperate with each other to protect the users against these risks.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Lövhall, Jakob. "Analysis of a Bitcoin debit card : Design of a novel Bitcoin payment system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139837.

Повний текст джерела
Анотація:
This thesis introduces a debit card based payment system that aims to provide fast in-store payments using Bitcoin. The system introduces physical constraints to Bitcoin payments to enable stores to accept payments before they are in a block.The proposed system was tested in a proof of concept model to estimate the time itwould take to pay with the system on the real Bitcoin network. A security analysis was performed to validate system security and to point out potential problems. The security analysis was done by interviewing five experts from different organizations to receive different views on the system. The analysis of the system indicated that it could potentially be fast enough to be used in stores, however security problems exist and need to be considered.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Deng, Ni. "A secure, payment-based email delivery system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2909.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Eriksson-Asp, Ebba, and Berglund Katarina Inta. "Betala nu, senare eller lite då och då : En kvalitativ studie om betalningsmetoders betydelse för svenska konsumenters köpprocess online." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-46039.

Повний текст джерела
Анотація:
The growing e-commerce market has fundamentally changed the consumption behaviors among swedes, and it is more popular than ever for people to carry out their everyday transactions online. These new shopping opportunities place different demands on the consumer compared to traditional shopping, and the consumer behavior has come to include more analysis regarding risk and security especially when it comes to the final payment step. This study therefore aims to create an understanding of consumers' experience of the importance of payment methods during the online buying process. To execute this aqualitative approach was used where the data collection has been carried out through method triangulation, in the form of a combination of observations together with semi-structured interviews. A total of 10 purchase interviews were made with respondents aged 26 - 59, where the participants fictitiously made an optional product purchase online, which they simultaneously verbally described through sharing their thoughts and motivations for their actions in the process. The observations were complemented with interviews to confirm the buying process but also to achieve an in-depth understanding of their behavior.  Results show that most of the respondents generally value the benefits that different payment methods provide when buying online, because it facilitates smooth and secure online transactions. Half of the participants prefer to pay directly for online purchases, while the other half prefer to pay after the product has been delivered, but it varies in what way these preferences affect their behavior during the buying process. Most of the respondents appear to place less emphasis on specific payment options during the buying process and devote more focus to other factors. It is shown that only three out of ten respondents value the payment method (invoice via Klarna) as a significant factor in their buying process in a way that they experience this influencing their choice of website. Part of the conclusion is that the result shows tendencies that the importance of payment methods in the online buying process varies with the type of purchase situation the payment takes place in, related to the consumer's perceived uncertainty about the purchase.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Addo, Archie N. S. "An Expert System for the Selection of Electronic Payment Systems Based on Organizational Security Requirements." NSUWorks, 1999. http://nsuworks.nova.edu/gscis_etd/382.

Повний текст джерела
Анотація:
The widespread popularity of the Internet has made the promise of worldwide electronic commerce (EC) a reality. Companies are exploring how to provide goods and services over the Internet in order to extend their reach to a global marketplace that conducts business 24 hours a day, seven days a week. The low cost of transacting business electronically has been the motivating factor as consumers eagerly look toward the Internet to create economic opportunities. Electronic payment, a financial exchange that takes place online between buyers and sellers, is an integral part of EC. The content of this exchange usually involves some form of digital financial instrument (such as encrypted credit card numbers, electronic checks, or digital cash) that is backed by a bank or an intermediary, or by legal tender. With the rapid growth in EC, organizations are often faced with the problem of selecting an appropriate electronic payment system (EPS) to meet their requirements. While demand is rapidly growing, security concern is a major reason that impedes EC growth. Organizations selecting individual EPS with different security methods find it extremely difficult to do business with each other. Selection of an EPS is a complex task. Firms often lack the necessary in-house expertise to make this choice. Hiring external consultants with expertise in the area can be expensive. A poor decision may have a significant negative impact. Implementing an EPS requires considerable technical expertise. Difficulties involved in selection and implementation include identifying the firm’s requirements, understanding available EPS options, and evaluating the best option based on economic, technical, and operational concerns. To deal with the complex decision of EPS selection in a changing environment, an expert system may be used. An expert system prototype for the selection of EPS was proposed, based on analysis and evaluation of major electronic payment systems (EPSs). The goal of this dissertation was to develop a rule-based expert system that would aid the requirement analysis process by asking appropriate questions; maintain a knowledge base on the security characteristics of various EPSs; and contain the expertise required to select and implement an appropriate system that meets an organization's security requirements. An extensive literature review was conducted to evaluate major EPSs to ascertain each system's applicability, strengths and weaknesses. Features of each were analyzed, with an emphasis on security aspects. Results were used to help design and build a prototype rule-based system to help organizations determine an appropriate strategy for security in EPS. The following EPSs were considered: Electronic card-based systems: First Virtual (FV), Cyber Cash, and Secure Electronic Transactions (SET). Electronic checks: Net Bill and NetCheque. Electronic cash payment systems: Ecash and CyberCoin. Micropayment systems: Millicent and Pay word. The decision table approach was utilized to ensure that the rule base was well designed. The proposed system is capable of providing security advice related to those EPSs that have been included in the system. The proposed system handles questions based on security characteristics, but is not able to handle new systems whose characteristics have not been entered into the system. The expert system was designed in such a way that future changes to EPS characteristics require minimum change to the knowledge base. A prototype expert system for the selection of electronic payment systems was built and tested to validate the system. The recommendations of the expert system were compared to the recommendations of experts. Test results indicated that the rule-based paradigm with decision tables is useful in the design of a successful expert system for the selection of EPSs.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Scherling, Daniel, and Roosa Antinoja. "The Effects of E-payment Methods on Online Purchasing Cancellation : An empirical study on Swedish consumers’ perception of trust and security in e-payments." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-44079.

Повний текст джерела
Анотація:
Abstract Background: Around 45% of Swedish consumers canceled their online purchase in 2018, due to too high delivery fees and issues concerning payments. This research is focusing on e-payments by utilizing the Technology Acceptance Model 3 and its determinants perceived usefulness and perceived ease of use, and how they contribute to the e-payment method decision. Additionally, the relevance of online trust and online security are examined in relation to purchasing cancellations due to trust and security issues in e-payment methods.   Purpose: The purpose of this research paper is to understand how Swedish millennial consumers’ perceptions of online security and online trust of e-payment methods effect on online purchasing cancellation. Furthermore, this paper examines how perceptions of usefulness and ease of use contribute as determinants in choosing between e-payment methods according to Swedish millennial consumers.   Method: The research is carried out in a qualitative manner by conducting a series of semi-structured face-to-face interviews. Fifteen Swedish millennials contributed to the empirical study. The gathered primary data is analyzed and then presented in chapter 4 and connected to the existing literature in chapter 5.   Conclusion: For the Swedish millennials, both online trust and online security are perceived as important determinants when evaluating whether or not the e-payment method could be used. When choosing between different e-payment methods, perceived ease of use seemed to be more important. Additionally, the decisions are made based on which e-payment method is secure, trustworthy, and easy to use. The presence of those determinants also increases perceived usefulness. When making purchases online domestically it appears that perceived ease of use and perceived usefulness weight heavier. While trust and security are given more importance if the purchase is made from a foreign website.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Lindbäck, Karin, and Carl Blommé. "Attitudes towards mobile payment : An empirical study of the consumers’ perception of security, privacy and convenience." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-148640.

Повний текст джерела
Анотація:
Mobile payment is a new payment method that is being introduced on the Swedish market, but has not yet come to its breakthrough. This thesis investigates the attitude the Swedish consumer has towards mobile payment. Based on previous surveys and theory, three main attributes, security, privacy and convenience, were chosen to represent the attitude of the consumer towards mobile payment. In order to analyze the data obtained from the surveys conducted, the multi-attribute attitude model was used. The model showed that convenience was the most beneficial attribute in mobile payment, followed by security and then privacy. Security was the attribute that the survey participants valued the most when it comes to payment methods, but was also the attribute they thought that mobile payment would lack the most. Therefore security was determined to be the most important aspect when it comes to the success of mobile payment.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Diakos, Thomas P. "An evaluation of security and privacy concerns in contactless payment systems through physical layer eavesdropping measurements." Thesis, University of Surrey, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.616478.

Повний текст джерела
Анотація:
Near-field contact less payments using contactless cards or NFC devices are quickly becoming a quicker and more convenient alternative to conventional means of carrying out small value purchases. Along with their increased popularity, there are rising concerns regarding their security. Existing research has shown that certain attacks can be used successfully against contact less technology, but it is unclear how such attacks can be translated into a feasible and clear threat to a user's privacy and financial security. Therefore there is a need for an evaluation to determine whether physical layer based attacks could be used by attackers to cause financial or anonymity loss to an individual. This dissertation presents the design and implementation of an inconspicuous, easily concealable and portable system that could be used to reliably eavesdrop contactless transactions. This includes guidelines on the effective and efficient design of eavesdropping antennas, including the use of large metallic structures already within the vicinity of such an attack, along with the assembly of a communications receiver consisting of readily available electronics with a moderate cost.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

El, Madhoun Nour. "Towards more secure contact and NFC payment transactions : new security mechanisms and extension for small merchants." Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS168.

Повний текст джерела
Анотація:
EMV est la norme implémentée pour sécuriser une transaction d'achat avec contact ou sans contact (NFC) entre un appareil de paiement d'un client et un PoS. Elle représente un ensemble de messages de sécurité échangés entre les acteurs de la transaction, garantissant plusieurs propriétés de sécurité importantes. En effet, plusieurs chercheurs ont analysé le fonctionnement de la norme EMV afin de vérifier sa fiabilité: ils ont identifié plusieurs vulnérabilités de sécurité qui représentent aujourd'hui des risques majeurs pour notre sécurité au quotidien. Par conséquent, nous sommes intéressés à proposer de nouvelles solutions qui visent à améliorer la fiabilité d’EMV. Dans un premier temps, nous présentons un aperçu du système de sécurité EMV et nous étudions ses vulnérabilités identifiées dans la littérature. En particulier, il existe deux vulnérabilités de sécurité EMV, qui mènent à des risques dangereux menaçant à la fois les clients et les commerçants. Par conséquent, nous sommes intéressés dans la deuxième étape à répondre à ces deux faiblesses. Nous examinons d'abord une sélection des travaux qui ont été conçus pour résoudre ces vulnérabilités. Ensuite, afin d'obtenir de meilleurs résultats par rapport à ces travaux, nous proposons un nouveau système pour le paiement avec contact et NFC qui intègre 4 mécanismes de sécurité innovants. Enfin, dans la troisième étape, nous adaptons notre premier mécanisme de sécurité dans le contexte d'une nouvelle architecture de paiement NFC. Cette architecture est particulièrement destinée aux petits commerçants, leur permettant de profiter de leurs smartphones NFC pour une utilisation directe en tant que des lecteurs NFC
EMV is the standard implemented to secure the communication, between a client’s payment device and a PoS, during a contact or NFC purchase transaction. It represents a set of security messages, exchanged between the transaction actors, guaranteeing several important security properties. Indeed, researchers in various studies, have analyzed the operation of this standard in order to verify its reliability: unfortunately, they have identified several security vulnerabilities that, today, represent major risks for our day to day safety. Consequently, in this thesis, we are interested in proposing new solutions that improve the reliability of this standard. In the first stage, we introduce an overview of the EMV security payment system and we survey its vulnerabilities identified in literature. In particular, there are two EMV security vulnerabilities that lead to dangerous risks threatening both clients and merchants: (1) the confidentiality of banking data is not guaranteed, (2) the authentication of the PoS is not ensured to the client’s device. Therefore, our interests move in the second stage to address these two weaknesses. We first review a selection of the related works that have been implemented to solve these vulnerabilities, and then, in order to obtain better results than the related works, we propose a new secure contact and NFC payment system that includes four innovative security mechanisms. Finally, in the third stage, we adapt our first security mechanism in the context of a new NFC payment architecture. This architecture is especially destined for small merchants, allowing them to take advantage of their NFC smartphones for use directly as NFC readers
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Hu, Guo Dong. "The factors that influence electronic payment adoption by SMEs in two cities of China." Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_8049_1263765238.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Klečka, Jakub. "Analýza požadavků ba bezpečnost karetního průmysli a problémy při jejich implementaci." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-4599.

Повний текст джерела
Анотація:
Rapid development of new technologies and their easy implementation introduces new risks that must be faced. This diploma thesis concentrates at payment card industry. Payment card industry come through significant development. Billions of dollar each year flow through these systems. New technologies like contactless cards, prepaid brand cards are emerging, ATM and payment terminal support new services and products. Merchant are looking for new opportunities. This situation brings along new threats and introduces new vulnerabilities. These are not necessarily new, only the whole environment got much more complicated and digger. Unfortunately the acting threats and vulnerabilities were not eliminated. Missing legislation measures and restricted enforceability are not sufficient to effectively fight against crime in this area. On the other hand sever organizations are aware of these threats and tries to face them. New security requirements were introduced for each separate subjects of payment card industry so that the risks are eliminated or their impact is reduced to an acceptable degree. Some of these requirements were already implemented and are in the scope of this work. The goal of this work is to explore these requirements. To find out what risks they are affecting and how effective they are. And in case of need help to implement the appropriate security measure. This work is practically oriented and can help responsible persons to ensure compliance with the requirements and face all effecting threats.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Ivarsson, Samuel. "Mobile payment with customer controlled connection : Can it be constructed to be safe enough?" Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5058.

Повний текст джерела
Анотація:
The mobile commerce has given birth to many mobile payment systems and this thesis covers the security of a theoretical system where the communication is handled by the customer. There are many technologies that can be used when implementing such a system, each with different strengths and weaknesses. The system designed in this project was constructed for micropayments in vending machines that has no connection to the vendor except for the connection supplied by the customer. The design was then used for analyzing the threats against the designed system and comparing it to an identical system where the connection is supplied by the seller in order to find out the effects on security when changing the communication channel. The comparison shows that even though the designed system is more vulnerable, it is not a major difference and with low value payments, the mobile payment system can depend on the connection supplied by the user. The main advantages to security with this method is the protection against Denial of Service attacks and the protection against mass identity thefts as authentication is no longer done on the machine.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Bjurling, Patrik. "Design and Implementation of a Secure In-app Credit Card Payment System." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-112745.

Повний текст джерела
Анотація:
Smartphones are often used in order to make purchases today and mobile payments are estimated to continue growing in numbers the following years. This makes mobile payment systems attractive to companies as a new business platform. It also increases the number of malicious users trying to exploit the systems for financial gain. This thesis is conducted for the company TaxiCaller which desires to integrate mobile payments into their existing service. It discusses the current security standards for mobile payments and evaluates existing mobile payment solutions. The focus of the evaluation is on the security of the solutions and vulnerabilities, as well as mitigations of identified vulnerabilities, are discussed. Based on the evaluation, a mobile payment solution is designed and implemented. This system fully integrates with TaxiCaller’s existing system. A threat analysis of the implemented mobile payment solution is performed to provide confidence in the security. This thesis also provides an insight into the ecosystem of mobile payments including the stakeholders, the regulations, the security standards and difficulties during implementations.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Limwiriyakul, Sunsern. "A method for securing online community service: A study of selected Western Australian councils." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2012. https://ro.ecu.edu.au/theses/479.

Повний текст джерела
Анотація:
Since the Internet was made publicly accessible, it has become increasingly popular and its deployment has been broad and global thereby facilitating a range of available online services such as Electronic Mail (email), news or bulletins, Internet Relay Chat (IRC) and World Wide Web (WWW). Progressively, other online services such as telephony, video conference, video on demand, Interactive Television (ITV) and Geographic Information System (GIS) have been integrated with the Internet and become publicly available. Presently, Internet broadband communication services incorporating both wired and wireless network technologies has seen the emergence of the concept of a digital community which has been growing and expanding rapidly around the world. Internet and the ever expanding online services to the wider digital community has raised the issue of security of these services during usage. Most local councils throughout Western Australia have resorted to delivering online services such as library, online payments and email accessibility. The provision and usage of these services have inherent security risks. Consequently, this study investigated the concept of a secure digital community in the secure provision and usage of these online services in selected local councils in Western Australia (WA). After an extensive review of existing literature, information security frameworks were derived from the adaptation of various resources, such as the OSSTMM 2.2 Section C: Internet Technology Security benchmark which was used as the main template. In addition, this template was enhanced into a framework model by incorporating other benchmarks such as NIST, CIS, ISSAF as well as other sources of information. These included information security related books, related ICT network and security websites such as CERT, CheckPoint, Cisco, GFI, Juniper, MS, NESSUS and NMAP together with journals and personal interviews. The proposed information security frameworks were developed to enhance the level of security strength of the email and online web systems as well as to increase the level of confidence in the system security within the selected local councils in WA. All the investigative studies were based upon the available selected local councils’ data and the associated analyses of the results as obtained from the testing software. In addition, the interpretive multiple-case study principles were used during the investigation to achieve or fulfil the purpose of this study. The findings from this study were then abstracted for use in a framework and made available for use as a model for possible adaptation and implementation to other similarly structured councils or organisations. As a result, the study confirmed that the proposed information security frameworks have the capability and potential to improve the level of security strength. In addition, the level of satisfaction and confidence of council staff of the selected local councils in WA in the system security would also be increased due to the application of these frameworks. Although these information security frameworks may be recommended as practical and supporting tools for local councils, the findings from this study were specific only to the selected local councils used in this study. Further research using other councils, may be necessary in order for the information security frameworks to be adopted within a wider range of councils or organisations in WA or elsewhere.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Rahaman, Sazzadur. "From Theory to Practice: Deployment-grade Tools and Methodologies for Software Security." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99849.

Повний текст джерела
Анотація:
Following proper guidelines and recommendations are crucial in software security, which is mostly obstructed by accidental human errors. Automatic screening tools have great potentials to reduce the gap between the theory and the practice. However, the goal of scalable automated code screening is largely hindered by the practical difficulty of reducing false positives without compromising analysis quality. To enable compile-time security checking of cryptographic vulnerabilities, I developed highly precise static analysis tools (CryptoGuard and TaintCrypt) that developers can use routinely. The main technical enabler for CryptoGuard is a set of detection algorithms that refine program slices by leveraging language-specific insights, where TaintCrypt relies on symbolic execution-based path-sensitive analysis to reduce false positives. Both CryptoGuard and TaintCrypt uncovered numerous vulnerabilities in real-world software, which proves the effectiveness. Oracle has implemented our cryptographic code screening algorithms for Java in its internal code analysis platform, Parfait, and detected numerous vulnerabilities that were previously unknown. I also designed a specification language named SpanL to easily express rules for automated code screening. SpanL enables domain experts to create domain-specific security checking. Unfortunately, tools and guidelines are not sufficient to ensure baseline security in internet-wide ecosystems. I found that the lack of proper compliance checking induced a huge gap in the payment card industry (PCI) ecosystem. I showed that none of the PCI scanners (out of 6), we tested are fully compliant with the guidelines, issuing certificates to merchants that still have major vulnerabilities. Consequently, 86% (out of 1,203) of the e-commerce websites we tested, are non-compliant. To improve the testbeds in the light of our work, the PCI Security Council shared a copy of our PCI measurement paper to the dedicated companies that host, manage, and maintain the PCI certification testbeds.
Doctor of Philosophy
Automatic screening tools have great potentials to reduce the gap between the theory and the practice of software security. However, the goal of scalable automated code screening is largely hindered by the practical difficulty of reducing false positives without compromising analysis quality. To enable compile-time security checking of cryptographic vulnerabilities, I developed highly precise static analysis tools (CryptoGuard and TaintCrypt) that developers can use routinely. Both CryptoGuard and TaintCrypt uncovered numerous vulnerabilities in real-world software, which proves the effectiveness. Oracle has implemented our cryptographic code screening algorithms for Java in its internal code analysis platform, Parfait, and detected numerous vulnerabilities that were previously unknown. I also designed a specification language named SpanL to easily express rules for automated code screening. SpanL enables domain experts to create domain-specific security checking. Unfortunately, tools and guidelines are not sufficient to ensure baseline security in internet-wide ecosystems. I found that the lack of proper compliance checking induced a huge gap in the payment card industry (PCI) ecosystem. I showed that none of the PCI scanners (out of 6), we tested are fully compliant with the guidelines, issuing certificates to merchants that still have major vulnerabilities. Consequently, 86% (out of 1,203) of the e-commerce websites we tested, are non-compliant. To improve the testbeds in the light of our work, the PCI Security Council shared a copy of our PCI measurement paper to the dedicated companies that host the PCI certification testbeds.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Sieger, Hanul [Verfasser], Sebastian [Akademischer Betreuer] Möller, Matthew [Akademischer Betreuer] Smith, and Yuval [Akademischer Betreuer] Elovici. "Perceived security and usage of a mobile payment application / Hanul Sieger. Betreuer: Sebastian Möller. Gutachter: Matthew Smith ; Yuval Elovici." Berlin : Technische Universität Berlin, 2015. http://d-nb.info/1078950407/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Makokoe, Isaac. "Selected antecedents towards the acceptance of m-payment services and the relationship with attitude and future intentions." Thesis, Vaal University of Technology, 2017. http://hdl.handle.net/10352/454.

Повний текст джерела
Анотація:
M. Tech. (Marketing, Faculty of Management Sciences), Vaal University of Technology
Keywords: Mobile payments, usefulness, ease of use, security, attitude, future intentions. An increased reliance on mobile phones by consumers for making retail purchases has been witnessed over the years. Given the pervasive use of m-payments and the incessant diffusion of innovations in South Africa, it is important for marketers to have knowledge of the right set of factors that enhance consumers’ intent towards favouring m-payments in future encounters. This study draws from the undertones of Davis’s (1989) Technology acceptance Model (TAM). Whereas the theory alludes to the influences of both usefulness and ease of use on consumer attitudes and behaviour, this study further amplifies the salience of cosumer perceptions of security as a salient drive towards m-payment acceptance. This is because m-payments involve moneybased transactions and therefore it is important for consumers to have assurance that they operate along a secure platform. The TAM was nominated as the underlying theory in this research owing to its effectiveness when applied during the initial phases of an innovation, to avoid costly mistakes of implementing innovation attributes that do not offer the requiredset of elements for persuading consumers. The purpose of this study was to test an integrative research model of the antecedents of mpayment acceptance using a South African sample of consumers. A quantitative study comprising a non-probability snowball sample of 474 consumers aged between 18 and 50 years was conducted in 2016, in and around the five major towns of Southern Gauteng province in South Africa. The structured questionnaire requested respondents to indicate their perceptions regarding the usefulness, ease of use and security of m-payment platforms they have utilised. In addition, the questionnaire relates to consumers’ attitude evaluations of m-payments in general, as well as their intentions to both use and recommending m-payments to others in the future. Initially, descriptive statistics were performed on the data set, including correlation analysis and multicolinearity testing. Subsequently, structural equation modelling was applied by first, assessing the measurement model using fit indices, confirmatory factor analysis and statistical accuracy tests of reliability and validity. Specification of the measurement model led to the conclusion that the future intentions model was a five-factor structure comprising usefulness, ease of use, security, attitude and future intentions. Thereafter, the results of the structural model (Structural model A) supported the existence of a direct influence between usefulness and security with attitude, while the latter was found to have a direct influence on future intentions. Nevertheless, the relationships between ease of use and attitude was not significant and therefore, alternative hypothesis Ha3 could not be supported in this study leading to the need to specify a vi subsequent competing model. Under Structural model B, perceived usefulness is used as both a dependent and an independent variable since it is predicted by perceived ease of use and in turn predicts attitude towards using and behavioural intention to use simultaneously. The results of Structural model B led to the decision to accept the competing model as the ultimate model for this research since the model presents complete evidence of path weights that are greater than 0.20, interpreted as evidence for significant path outcomes. Insights gained from this study could assist both marketing academics and practitioners to understand the perceptions of consumers towards m-payments. In this regard, if a determination is made that conducting m-payment transactions in secure and effort-free environments could enhance the effectiveness of consumers in their jobs and lives in general, then marketers could be in a better position to deliver a worthwhile innovation solution for South African consumers.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.

Повний текст джерела
Анотація:
L’essor des nouvelles technologies, et en particulier la Communication en Champ Proche (NFC), a permis l’apparition de nouvelles applications. Á ce titre, nous pouvons mentionner le paiement sans contact, les clefs mains libres ou encore les carte d’abonnement dans les transports en commun. Afin de sécuriser l’ensemble de ces applications, des protocoles de sécurité, appelés protocoles délimiteurs de distance on été développés. Ces protocoles ont pour objectif d’assurer la proximité physique des appareils mis en jeu afin protocole cryptographique, protocole de paiement de limiter le risque d’attaque. Dans ce manuscrit, nous présentons diverses approches permettant une analyse formelle de ces protocoles. Dans ce but, nous proposons un modèle symbolique permettant une modélisation précise du temps ainsi que des positions dans l’espace de chaque participant. Nous proposons ensuite deux approches : la première développant une nouvelle procédure de vérification, la seconde permettant la ré-utilisation d’outils existants tels que Proverif. Tout au long de ce manuscrit, nous porterons une attention parti- culières aux protocoles de paiement sans contact
The rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing... Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure the physical proximity of the de- vices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this manuscript, we present several techniques that allow for an automatic verification of such protocols. To this aim, we first present a symbolic model which faithfully models time and locations. Then we develop two approaches : either ba- sed on a new verification procedure, or leveraging existing tools like Proverif. Along this manuscript, we pay a particular attention to apply our results to contactless payment protocols
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Barvíková, Kamila. "Technicko-ekonomické aspekty platebního styku." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-360145.

Повний текст джерела
Анотація:
Thesis describes technical and economic aspects of payment transaction using the empirical analysis on real data of payment institution. It focuses on the description of selected products provided by payment institution and empirically analyzes them on the basis of the available data in terms of the number of transactions in individual currencies, the ratio of product types utilization and clearing and settlement used by the payment institution. The thesis also describes the security requirements necessary for the conduct of payment transactions on the Internet for non-technically educated audiences. At the end of the thesis there are several recommendations for the development of payment institution based on empirical knowledge from data analysis, which can be used for further analysis of the payment institution.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Westergren, Nathalie, and Andrea Viberg. "En ny typ av betalningslojalitet i ett digitalt paradigmskifte." Thesis, Södertörns högskola, Företagsekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-38632.

Повний текст джерела
Анотація:
Consumer behaviour when shopping online differs from their behavior when shopping in a physical store. One contributory reason is the increasing level of consumption and range of goods online. When online shopping increases it demands the payment methods to work as expected. This paper aims to evaluate and analyse the payment methods when shopping online. The paper aims to increase the knowledge of how consumers are affected by these method when shopping online. This has lead us in to our issue: In what way will consumers be affected when it comes to payment methods within shopping online. The study is based on a qualitative and quantitative research design. The empirical data is collected through focus group interviews with subsequent surveys from Swedish consumers. The study combines the theories, Technology Acceptance Model, TAM, with Task Technology Fit, TTF. TAM is based on the theory of individuals' actual reception and acceptance of a technical solution. With the help of TTF you can describe and measure how technology helps users to perform. The conclusion indicates that the payment method is crucial for the consumer, if the payment method does not meet the requirements set by the consumer, the purchase will thus be canceled. There is strong competition between different players and it is easy for the consumer to choose the online store that offers the exact payment method that is best adapted to their needs. The conclusion further shows that there is a payment method that is preferred over others, this method is Klarnas. The study also shows that safety and simplicity are issues that the consumer sees as decisive based on how they make their purchases online. Loyalty is also a factor being dealt with, a customer is not always loyal to a website if it proves to be difficult to complete the purchase. Customers prefer to make a purchase on a website that offers a payment method that another operator does not.
Konsumenters beteende vid näthandel är fluktuerande och skiljer sig från beteenden i fysiska butiker. En av de bidragande orsakerna är expanderingen av nätshopping. I samband med den ökande konsumtionen online ställs det krav på att betalningsmetoder i samband med näthandel fungerar som dom ska. Denna studie berör digitalisering inom näthandel med fokus på betalningsmetoder. Studien syftar till att öka förståelsen för hur konsumenters köpintention påverkas av betalningsmetoder när de näthandlar. Syftet har lett oss in på frågeställningen: På vilket sätt påverkas konsumenter av betalningsmetoden inom näthandeln? Studien baseras på en flermetodsforskning, en blandning av kvalitativ samt kvantitativ forskningsdesign. Empirin är insamlad via fokusgruppsintervjuer med efterföljande enkätundersökning från svenska konsumenter. Studien kombinerar teorierna, Technology Acceptance Model, TAM med Task Technology Fit, TTF. Där TAM som bygger på teorin om individers faktiska mottagande och acceptans av teknisk lösning. Med hjälp av TTF kan man beskriva och mäta hur teknik hjälper användare att prestera. Slutsatsen tyder på att betalningsmetoden är avgörande för konsumenten, uppfyller inte betalningsmetoden de krav som ställs av konsumenten kommer köpet således att avbryts. Det råder stark konkurrens mellan olika aktörer och det är lätt för konsumenten välja den onlinebutik som erbjuder just den betalningsmetod som är bäst anpassat för hens behov. Slutsatsen visar vidare att det finns en betalningsmetod som föredras framför andra, denna metod är Klarnas. Det framgår även av studiens resultat att säkerhet och enkelhet är frågor som konsumenten ser som avgörande utifrån hur de genomför sina köp online. Lojalitet är även en faktor som behandlas, en kund är inte alltid lojal till en webbplats om det visar sig vara krångligt att genomföra köpet. Kunder väljer hellre att genomföra ett köp på en webbplats som erbjuder en betalningsmetod som en annan aktör inte gör.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Mráčková, Kateřina. "Návrh metodiky bezpečnosti informací v podniku provozující elektronický obchod." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224218.

Повний текст джерела
Анотація:
The work deals with the analysis of security management in company selling goods trought the stone shop and the electronic commerce. The assets and threats affecting them were identified and an analysis of risks and selected measures was evaluated. The work is based on the theoretical background from series of standards ISO/IEC 27000 given in the first part of it.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Matúška, Peter. "Metody návrhu platebních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236980.

Повний текст джерела
Анотація:
This paper analyses some existing approaches in security and payment protocol design. It describes protocol design using simple BAN logic and using derivation system. Special attention is paid to composition method, which is based on the design of complicated protocols from small parts called primitives and it is demonstrated on design of purchase procedure of SET protocol. This method was automated and implemented in C++ language, which allows designer to generate set of candidate protocols according to his needs and this set can be further used for next phase of protocol design process.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Sun, Yan. "An investigation into financial fraud in online banking and card payment systems in the UK and China." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/8290.

Повний текст джерела
Анотація:
This doctoral thesis represents an investigation into financial fraud in online banking and card payment systems in the UK and China, involving network security, online financial transactions, internet fraud, card payment systems and individuals' perception of and behaviours towards electronic environments. In contrast to previous studies, the research questions were tackled by survey questionnaires both in the UK and China, with a particular interest in fraud and attempted fraud. The main findings from the UK respondents were that those with higher IT skill and younger respondents are more likely to be defrauded on the internet. Certain types of online activities are associated with higher risks of fraud, these being internet banking; online shopping and media downloading. Furthermore, four predictors (internet banking, online education services, downloading media and length of debit card usage) provided significant effects in the logistic regression model to explain fraud occurrence in the UK. Based on the data collected in China, younger respondents were more likely to have higher general IT skill and higher educational qualifications. However, online shopping was the only online activity which was significantly correlated to fraud occurrence. Finally, two predictors (frequency of usage of online shopping and number of debit cards) were selected in the logistic regression model to explain fraud occurrence in China.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Dowman, Charles Sydney. "Investigating social grant payment methods for old age grant recipients in the Western Cape." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86633.

Повний текст джерела
Анотація:
Thesis (MPA)--Stellenbosch University, 2014.
ENGLISH ABSTRACT: The research focuses on social assistance within the context of the developmental state. In South Africa, the Social Assistance Act, 2004 (Act No.13 of 2004) makes provision for the administration of social assistance and the payment of social grants. The Act provides for the payment of eight grant types including the payment of the Old Age Grant (OAG). The research focuses on the OAG and the payment methods exercised by OAG beneficiaries. The South African Social Security Agency is established in terms of the South African Social Security Agency Act, 2004 (Act No. 9 of 2004) and the payment of social assistance has been transferred to the Agency. The literature review revealed that African countries in particular have followed a different path to the rest of the development world with regard to social security. There is a strong reliance on community management involvement of social protection programmes in middle Africa. The South African system is more advanced and is legislated. South Africa’s social security system is a system of targeted social grants. It makes access to social security a basic human right, as it is contained in the Bill of Rights. The rise of the developmental state after World War 11 was championed by Japan, in particular, and this rise gave effect to the Asian Miracle. A comparison of different systems in the developing context is undertaken in the study. One of the criteria from the comparison of systems is that developmental decisions should be informed by a country’s vision or longterm strategy. The research is being undertaken at a pinnacle point in the history of South Africa, in particular of the Agency responsible for the administration and payment of these grants. The SASSA introduced the SASSA debit card (Appendix I) in 2012. Beneficiaries can use this card at any store with a point of sale device to make purchases and withdraw money at selected vendors published in the SASSA merchant list on the website of the Agency. The implementation of this decentralised system is however not without disagreement about the ideal path – questions about the advantages of electronic versus cash payments; and SASSA as ‘Paymaster’ versus the use of external service providers, is still being debated. This research attempts to assist in this debate through an investigation of alternative methods to disburse social grants, with specific focus on the old age grant recipients.
AFRIKAANSE OPSOMMING: Die navorsing fokus op maatskaplike ondersteuning in die konteks van die ontwikkeling-gerigte staat. In Suid-Afrika, maak die Wet op Maatskaplike Bystand, 2004 (Wet No.13 van 2004) voorsiening vir die administrasie van maatskaplike bystand en die betaling van maatskaplike toelae. Die wet maak voorsiening vir die betaling van agt soorte toelae, insluitend die betaling van die ouderdomstoelaag . Hierdie navorsing was gerig op die ouderdomstoelaag en die betalingsmetodes wat vir ouderdomstoelaag begunstigdes beskikbaar is. Die Suid-Afrikaanse Maatskaplike Sekerheidsagentskap is in terme van die Suid- Afrikaanse Sosiale Sekerheidswet, 2004 (Wet No. 9 van 2004) ingestel en die betaling van maatskaplike bystand is aan hierdie agentskap oorgedra. Die literatuurstudie het getoon dat lande, veral in Afrika, ‘n ander pad as die res van die ontwikkelende wêreld ten opsigte van maatskaplike sekerheid gevolg het. Daar is ‘n groot afhanklikheid van gemeenskapsbestuur betrokkenheid by die ontwikkeling van sosiale programme in middel Afrika. Die Suid-Afrikaanse maatskaplike sekerheidstelsel is meer gevorderd en word deur wetgewing onderbou. Dit maak toegang tot maatskaplike sekerheid ‘n menslike reg, deur dit in die Handves van Menseregte te onderskryf. Die bevordering van die ontwikkeling-gerigte staat na die Tweede Wêreld Oorlog is veral deur Japan aangevoer, en die aanneem hiervan het die Asiatiese Wonderwerk bewerkstellig. ‘n Vergelyking van die verskillende stelsels in die ontwikkeling konteks word onderneem in die studie. Een van die kriteria met betrekking tot die vergelyking van die verskillende stelsels is dat die ontwikkelingsbesluite ondersteun moet word deur middel van ‘n visie of lang termyn strategie. Die navorsing vind plaas op ‘n kritieke tyd in die geskiedenis van Suid-Afrika, veral ten opsigte van die agentskap wat vir die administrasie en uitbetaling van hierdie toelae verantwoordelik is. Die Suid-Afrikaanse Maatskaplike Sekerheids agentskap het die SASSA debietkaart in 2012 uitgereik. Begunstigdes kan die kaart by enige winkel met ‘n verkooppunttoestel, soos op die lys van uitgesoekte handelaars op SASSA se webtuiste bekendgestel is, gebruik om aankope te doen of geld te onttrek. Die inwerkstelling van die gedesentraliseerde stelsel is ongetwyfeld nie bepalend en gesprekke rondom die ideale stelsel is steeds onderweg – vra rondom die voordele van ‘n elektroniese stelsel teenoor ‘n kontantstelsel; sowel as vrae om SASSA as die ‘betaalmeester’ teenoor die gebruik van eksterne diensverskaffers, duur steeds voort. Die navorsing onderneem om hierdie debat te bevorder deur ‘n ondersoek na alternatiewe betaal metodes om sosiale toelaes te versprei, met spesifieke fokus op die betaling van die begunstigdes van die ouderdomstoelaag.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Mbedzi, Ndivhuhweni Innocent. "A legal analysis on the distribution and payment of the special pensions under the Special Pensions Act, 69 of 1969." Thesis, University of Limpopo, 2013. http://hdl.handle.net/10386/1183.

Повний текст джерела
Анотація:
Thesis (LLM. (Labour Law)) -- University of Limpopo, 2013
The South African government has paid compensation in a form of special pension to individuals who have been exposed to certain types of hardship and suffering caused by the governments or their predecessors. This compensation is described as ‘the appreciation or sense of guilty of society towards those people on whom the government has rightfully or wrongfully and at any rate disproportionally inflicted damage’. Government have been prepared to pay compensation to the following persons: former enemies, victims of war, victims of harmful compulsory vaccination measures, persons who had sacrificed their jobs and education in the process of overturning oppressive governments establishing democratic government; and persons whose basic human rights had been violated by governments or their predecessors. These persons have sacrificed their lives either in exile or within South Africa fighting for South Africa to be democratic. These persons must prove that they served their respective political organisations for a period of five years or above or they were banished or restricted in certain area or imprisoned or sentenced.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Ly, Jonny, and Sebastian Mollgren. "Konsumenters tillit för mobila betalningar – en kvantitativ studie." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-12638.

Повний текст джерела
Анотація:
När vi går och handlar är det självklart att betala för sina varor i butiken. Det finns många metoder för att genomföra denna betalning. Allt fler i Sverige har börjat överge användandet av kontanter. I takt med att kontanterna minskas visar statistiken att antalet kortanvändare ökar. Detta leder till att leverantörerna av korttjänsterna kan få en monopolliknande ställning där de kan sätta avgifter efter eget tycke utan konsekvenser. Ett alternativ som fortfarande håller på att etablera sig på marknaden är mobila betalningar. Endast 1 % av alla transaktioner består av mobila betalningar. Trots denna låga siffra har den framgångsrika mobila betaltjänsten Swish över 5 miljoner användare i Sverige. Mobila betalningar har förutsättningar för att fungera som en vanlig betalmetod i butiker men bristande tillit hos konsumenter hindrar de från att använda det som sin primära betalmetod. Detta leder till problematik när mobila betalningar ska etablera sig i marknaden. På grund av problematiken med mobila betalningar fokuserar denna studie på att identifiera och prioritera de faktorer som påverkar konsumenternas tillit till mobila betalningar. För att uppnå studiens syfte utfördes en kvantitativ enkätstudie med ett urval av respondenter. 130 respondenter svarade på enkäten där deras svar analyserades i ett analysprogram för att identifiera upplysande relationer i deras svar. Diskussionen som förs med grund i teori och den insamlade empirin där det framgår att respondenterna i större utsträckning bedömer säkerhet utifrån sin subjektiva uppfattning och baserar den på upplevelsen av gränssnittet. En överväldigande majoritet angav att fördelarna som mobila betallösningar erbjuder utöver de traditionella betallösningarna är viktiga för användandet av mobila betalningar. Respondenterna syftar även på att fördelarna är en viktig bidragande faktor till den tillit de känner. Slutligen diskuteras även hur den personliga integriteten påverkar valet av mobila betalningar. Resultatet av studien visar på att konsumenterna värdesätter säkerhet mest. Dock upplever konsumenterna att säkerheten är bristande men konsumenterna bortser från det. Fördelarna som mobila betalningar erbjuder är även en mycket viktig faktor för konsumenterna vid val av mobila betalningar. För att öka tilliten för mobila betallösningar bör säkerhet och fördelar vara fokus för betaltjänsteleverantören. Dock bör personlig integritet ses som en viktig faktor. Resultatet visar att en liten mängd respondenter prioriterar denna faktor vid val av mobila betalningar. Leverantörerna av betaltjänsterna bör därför även fokusera på personlig integritet för att attrahera de konsumenter som prioritera personlig integritet.
When we buy things in a store it is given that you also pay for the products you buy. There are a handful of payment services available on the market. More and more people choose to abandon cash as a payment method in Sweden. The usage of cash is in a negative trend and the number of card users increase, according to statistics. This in turns means that credit-/debit card providers will have a monopoly-like position over the payment market and can therefore set transactions fees that suit their needs. Only 1 % of all transactions consist of mobile payments. Despite these low numbers the successful mobile payment service Swish has over 5 million users in Sweden. Although mobile payments match all the criteria to be regarded as a payment service in stores, the lack of trust among consumers makes them not confident enough to use it as their primary payment method. This in turn creates problems for mobile payments to establish themselves on the market. With these problems in mind this study focuses on identifying and prioritizing factors that affect consumers trust for mobile payments. To answer this study’s research question a quantitative self-completion questionnaire was conducted with a selection of respondents. 130 respondents answered the self-completion questionnaire and the responses were used in a statistical analysis program to identify and create useful statistical data. A discussion that is grounded in theory and empirical data shows that the respondents mostly assesses safety based on their subjective perception, the subjective perception is often based on the perception of the application interface. Another interesting finding is that a majority of the respondent stated that benefits of mobile payment over traditional payment solutions are equally important. Respondents also point out that the benefits with mobile payments are an important contributing factor towards the trust they experience. Finally, a discussion about personal integrity and how it affects the choice of mobile payments is held. The result of the study shows that consumers value security the most. However, consumers perceive safety as inadequate, but they choose to ignore it. The benefits that mobile payments offer are also a very important factor for consumers in choosing mobile payments. To increase trust in mobile payment solutions, security and benefits should be the focus of the payment service provider. Even if the results only show a small number of respondents prioritizing personal integrity it should still be considered an important factor. Mobile payment providers should therefore also focus on personal integrity in order to attract customers who prioritize integrity.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Bouhafa, Mohamed. "Paiement électronique. Le secteur bancaire entre l'adoption de l'innovation et la lutte contre la fraude." Thesis, Université Côte d'Azur (ComUE), 2019. http://www.theses.fr/2019AZUR0001.

Повний текст джерела
Анотація:
Ce travail de recherche porte sur l’adoption de l’innovation et la lutte contre la fraude dans le paiement électronique du secteur bancaire tunisien, plus spécifiquement il vise l’exploration de la relation entre les composantes du marketing relationnel et les variables liées ; à l’individu, à la banque et au site marchand et leur impact sur l’intention d’utilisation des moyens de paiement électroniques dans les banques tunisiennes. L’objectif principal de ce travail étant la construction d’un modèle intégrateur qui illustre la relation entre le comportement du client et les facteurs influant l’adoption des moyens de paiement électroniques et la lutte contre la fraude. Sur le plan théorique, notre recherche a pour intérêt la contribution à l’amélioration des fondations sécuritaires pour les différents intervenants ainsi que le développement des moyens de paiement électronique. Sur le plan pratique l’intérêt de cette recherche est double, il s’agit de contribuer à la recherche sur les innovations dans le domaine d’e paiement d’une part et d’apprécier la relation entre les variables du MKG relationnel, l’adoption de l’innovation et la lutte contre la fraude monétique dans le domaine bancaire d’autre part. Notre stratégie de recherche adoptée suit une démarche quantitative selon un mode de raisonnement hypothético-déductif. La démarche est effectuée en trois itérations de terrain : une première à visée exploratoire, une deuxième confirmatoire et enfin une troisième dite complémentaire. Notre analyse des différentes itérations montre que l’engagement a un impact significatif sur l’intention d’utilisation des moyens de paiement et ce à l’image des recherches et des études antérieures. Ainsi, la perception de la qualité de service électronique (netqual) et la confiance ont un impact significatif sur l’engagement du consommateur à l’égard de l’utilisation des moyens électroniques en ligne. En renouvelant la lecture autour du concept de marketing relationnel par la mise en exergue du rôle de la satisfaction, la confiance et l’engagement comme variables clés dans la qualité de la relation, les principales contributions de cette recherche se présentent donc dans la proposition d’un modèle intégrateur combinant des variables qui autrefois ont fait l’objet des études séparées
This research work explores innovative methods to fight fraudulent activity in electronic payment in the Tunisian banking sector, more specifically it aims to investigate the interrelation between the strategy of relationship marketing and the various involved parties: the individual, the bank and the merchant and their impact on the intention of employing electronic means of payment in Tunisian banks. The main objective of this work is to construct an integrative model, which illustrates the relationship between the customer's behavior and the factors, which lead to the adoption of electronic payment methods and fight against fraud. On the theoretical level, our research hopes to contribute to the improvement of the security foundations for the various stakeholders as well as the development of electronic payment methods. On the practical level, the aim of this study is twofold: (1) it contributes to the research on the innovations in the field of e-Payment (2) It values the link between the variables of the relational MKG, the adoption of innovative method and the fight against electronic fraudulent activities in the banking sector. Our adopted research strategy follows a quantitative approach based on the hypo-deductive reasoning method. The approach is carried out in three stages: an exploration stage, a confirmation stage and finally a complementary stage. Our analysis of the different stages demonstrates that commitment has a significant impact on the intention to employ the means of payment, as it has been already suggested by previous research studies. The research, however, suggests an integrative model which combines variables that have previously studied separately. Thus, the perception of the quality of electronic service (Netqual) and trust have a significant impact on the consumer's commitment to the use of electronic means online. Hence, a successful revamping of the strategy of relationship marketing should underscore the role of satisfaction, trust, and commitment as key variables in the quality of interactions
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Westling, Sebastian, and Marcus Eliasson. "E-handel : En studie kring betallösningar, säkerhetslösningar och certifieringar för små e-handelsföretag." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16767.

Повний текст джерела
Анотація:
Syftet har varit att på uppdrag av Periallo identifiera vad kunder tycker är viktigast ur ett säkerhetsperspektiv. Detta har skett genom att besvara frågorna vad som är viktigt för konsumenterna ur ett säkerhetsperspek-tiv när de handlar av små e-handelsföretag och vilka säkerhetslösningar samt betallösningar som är relevanta för små e-handelsföretag. Vi har även undersökt om det är värt för ett litet e-handelsföretag att investera i en certifiering. Arbetet har kartlagt betallösningar, säkerhetslösningar och certifieringar med hjälp av en kritisk litteraturstudie och med en enkät, det vill säga en kvantitativ metod. Resultatet av undersökningen har visat att de flesta kunderna känner sig trygga när de handlar på Internet. Den säkraste betallösningen anses vara faktura, medan de populäraste betalsätten är konto/kreditkort och direktbetalning. Utöver det har undersökningen också visat att det är viktigare för mindre och okända e-handelsföretag att tydligt visa vilka säkerhetslösningar de använder sig av gentemot de stora och kända företagen trots att de flesta av deltagarna inte var medvetna om vilka säkerhetslösningar som finns för att skydda företag och konsument.
The purpose of this study is, on behalf of Periallo, to identify what it is that customers consider to be of greatest importance from a security perspective. This has been conducted from the answers given by consumers when asked a question concerning what they deem to be important from a security perspective when they shop from small e-commerce companies. In addition, a consideration has also been given to the security and payment solutions that are relevant to small e-commerce companies. An examination has also been conducted as to whether it is worth a small e-commerce company investing in a certification. In this work, payment solutions, security solutions and certifications have been identified by means of a critical literature review and a questionnaire, which is a quantitative method. The results of the study have shown that the majority of customers feel that it is safe to shop online. The most secure payment solution is considered to be an invoice, while the most popular payment methods are debit/credit cards and direct payment. In addition, the study has also shown that it is more important for a small and unknown e-commerce company to properly reflect upon the security solutions that they use against the large and well-known companies, even though, the majority of the participants in this study, were not aware of the security solutions available to protect companies and consumers.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Axelsson, David, and Jesper Ingemarsson. "Rättssäkerhet och anstånd med betalning av skatt : En analys av 17 kap. 2 § p. 2-3 Skattebetalningslagen ur ett rättssäkerhetsperspektiv." Thesis, Jönköping University, JIBS, Commercial Law, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-663.

Повний текст джерела
Анотація:

The aim of this thesis is to investigate whether legal rights are upheld when wording and applying the postponement of payment of tax regulations of chapter 17 section 2 p. 2-3 of the payment of Tax Act. We also investigate how the wording of the regulations relate to the requirement of legal security.

It has been questioned if the regulations concerning postponement of payment of tax are compatible with the requirement of legal security. Of course does not a taxpayer want to pay tax that he or she consider incorrect, and that has not been under trial by an impartial authority. If the request for postponement of payment of tax is rejected, the consequences for the taxpayer can lead to huge financial losses. The worse scenario for the taxpayer is if he or she goes bankrupt due to the rejected request.

The tax assessment regulations forming the basis for the postponement of payment of tax regulations are considered disputable, which has brought the matter to the fore. When ap-plying for reassessment or making an appeal, the question arises whether the tax in process should be submitted before the matter has been settled. The regulations of chapter 23 sec-tion 7 of the payment of Tax Act stipulate that the obligation to submit taxes remains re-gardless of its disputability. The only way the taxpayer can avoid having to submit taxes be-forehand is to apply for postponement of payment of the tax. When the application for postponement of payment of tax has reached the Tax Authority it is treated separately from the underlying tax assessment matter. However, the outcome of the postponement of payment of tax matter depends on the prerequisites on which the tax assessment is based.

This thesis is based on the regulations of chapter 17 section 2 p. 2-3 of the payment of Tax Act. The section stipulates that postponement of payment of tax may be granted in matters where the outcome of an ongoing tax assessment process may be uncertain, or where it may lead to considerable damage or else appear unreasonable to submit taxes. The founda-tions for judgment are very vaguely worded, which creates room for subjective interpreta-tions, and moreover, it means that judicial authorities must fill up the prerequisites with their judgments. Unclear bases for judgment limit taxpayers’ demands for predictable taxa-tion, and the risk both local tax offices and the Tax Authority and administrative courts make different assessments is great.

When the Tax Authority and the administrative courts treat claims for postponement of payment of tax, legal rights must always be considered. There are often deficiencies in the handling of the matters, which impair the taxpayers’ legal rights. The matters should be suf-ficiently investigated and the decisions motivated in a satisfactory manner. Moreover, the handling of claims for postponement of payment of tax should be objective, and decisions made with consideration to the consequences of the ruling.

As things are at present, it takes a considerable amount of time for the courts to investigate the underlying tax assessment, which means the consequences of not being granted a post-ponement of payment of tax are so much the graver. This also means that the taxpayer is forced to live a long time in financial and psychological uncertainty. One suggestion of how to come to terms with this problem is to increase specialization in the administrative courts.

The lack of clearly worded legal texts, preparatory work and practice leads to predictability being impaired for the individual and create difficulties for the Tax Authority and the ad-ministrative courts. From a legal rights perspective, more generous regulations regarding postponement of payment of tax should be introduced. One suggestion is to turn the main regulation of chapter 23 section 7 of the payment of Tax Act around. Postponement of payment of tax would then be granted unless particular reasons for its denial exist. An al-ternative to this suggestion may be to leave the main regulation in its current wording and have the exception regulations of chapter 17 section 2 of the payment of Tax Act grant postponement of payment of tax, unless particular reasons hindering this exist. In such a case of denying postponement of payment of tax the reasons for denial should be speci-fied.


I uppsatsen undersöks om rättssäkerheten upprätthålls vid tillämpningen av anståndsbe-stämmelserna i 17 kap. 2 § p. 2-3 SBL. Samt hur utformningen av bestämmelserna förhåller sig till kraven på rättssäkerhet.

Det har ifrågasatts om anståndsbestämmelserna är förenliga med rättssäkerhetens krav. Detta följer av att en skattskyldig naturligtvis inte vill betala skatt som denne anser är felak-tig och som inte ännu har hunnits prövats av en oberoende instans. Avslås en anståndsbe-gäran kan detta få stora ekonomiska konsekvenser för den skattskyldige. I värsta fall riske-rar den skattskyldige att försättas i konkurs.

Anledningen till att anståndsbestämmelserna uppkommer är att det underliggande taxe-ringsbeslutet som ligger till grund för dessa är tvistigt. Vid en begäran avseende ompröv-ning eller överklagan uppstår frågan huruvida den berörda skatten som är under process skall betalas innan ärendet är avgjort. Enligt huvudregeln i 23 kap. 7 § SBL stadgas det att skyldigheten att erlägga skatt består oavsett om den är tvistig. Den utväg som återstår för den skattskyldige att slippa att betala skatten innan beslutet vunnit laga kraft är att begära anstånd med betalningen av skatten. När begäran om anstånd inkommit till Skatteverket blir detta ett ärende som hanteras separat från den underliggande taxeringsfrågan, dock är utgången av anståndsärendet beroende av de rekvisit som ligger till grund för taxering.

Uppsatsens inriktning syftar till reglerna i 17 kap. 2 § p. 2-3 SBL. I paragrafen stadgas att anstånd kan ges i fall, där utgången i en pågående skatteprocess är tveksam eller där det kan medföra betydande skadeverkningar eller annars framstå som oskäligt att betala skatten. Dessa bedömningsgrunder är som synes mycket vagt utformade, vilket skapar utrymme för subjektiva tolkningar och dessutom innebär detta att de rättstillämpande instanserna måste fylla ut rekvisiten med sina bedömningar. Oklara grunder för bedömning medför att de skattskyldigas krav på en förutsebar beskattning inskränks, dessutom är risken för olikfor-mig bedömning mellan både lokala Skatteverkskontor samt mellan Skatteverket och för-valtningsdomstolarna stor.

I behandlingen av anståndsärendet hos Skatteverket och förvaltningsdomstolarna finns det flera rättssäkerhetsaspekter som bör uppfyllas. I flera av dess finns brister i handläggningen som gör att den skattskyldiges rättssäkerhet kan komma att begränsas. Ärendet skall utre-das tillräcklig och när beslut lämnas skall detta motiveras för den skattskyldige på ett till-fredsställande sätt. Dessutom bör hanteringen av anståndsärendet skötas objektivt och hän-syn till konsekvenserna av beslutet bör beaktas.

I nuläget är handläggningstiderna för att få den underliggande taxeringsfrågan utredd av domstolarna mycket lång, vilket innebär att konsekvenserna av att inte få anstånd med be-talning av skatten blir ännu större. Det innebär att den skattskyldige under lång tid tvingas leva i både ekonomisk och psykologisk ovisshet. Ett förslag för att komma till rätta med problemet är att en ökad specialisering inom förvaltningsdomstolarna sker.

Bristen på klar lagtext, förarbeten och praxis leder till att förutsebarheten inskränks för den enskilde samt svårigheter för Skatteverket och domstolarna vid lagtillämpning. Ur rättssä-kerhetssynpunkt bör generösare bestämmelser angående anstånd med betalning av skatt in-föras. Ett förslag är att vända på huvudregeln i 23 kap. 7 § SBL. Anstånd skulle då som hu-vudregel medges. Om det däremot föreligger särskilda skäl skall den skattskyldige nekas an-stånd. Ett alternativ till detta förslag skulle vara att huvudregeln står kvar i nuvarande ut-formning, men att undantagsreglerna i 17 kap. 2 § SBL regelmässigt medger anstånd om inte särskilda skäl talar emot detta. I ett sådant anståndsavslag skall skälen som ligger till grund för beslutet preciseras.

Стилі APA, Harvard, Vancouver, ISO та ін.
43

Alves, Diogo Rodrigues. "E-commerce : um novo caminho para o método de pagamento." Master's thesis, Instituto Superior de Economia e Gestão, 2017. http://hdl.handle.net/10400.5/14747.

Повний текст джерела
Анотація:
Mestrado em Gestão de Sistemas de Informação
A globalização da economia e o desenvolvimento das tecnologias de informação levaram à criação do e-commerce. Este modelo de negócio tem-se desenvolvido, suprimindo as barreiras geográficas e permitindo que os consumidores possam ter acesso a um maior leque de produtos e a preços reduzidos. O número de utilizadores tem vindo a aumentar, no entanto, um grande número ainda não se sente confortável com as medidas de segurança. Há a necessidade de transmitir, essencialmente, confiança e segurança, para que possam comprar sem qualquer receio. Cabe ao vendedor, através da transparência e dos métodos de pagamento, transmitir estes sentimentos. É necessário estimular a facilidade e a diversidade nos sistemas de pagamentos eletrónicos, satisfazendo as necessidades dos utilizadores. Este estudo foca-se no desenvolvimento de um sistema de pagamento eletrónico e se este será útil e proporcionará um maior nível de segurança e confiança aos seus utilizadores. Para a realização do estudo, optou-se por uma abordagem quantitativa, através de um questionário. Posteriormente, com o auxílio dos softwares SPSS e Excel Analysis ToolPak, procedeu-se à análise dos resultados obtidos nos questionários, sendo que estes se revelaram bastante positivos. Os inquiridos demonstraram-se interessados e recetivos a este sistema. Do total da amostra, 62,7% responderam que utilizariam o sistema e 30,8% responderam "talvez".
The globalization of the economy and the development of information technologies led to the creation of e-commerce. This business model has developed a lot, removing geographical barriers and allowing consumers to have access to a wider range of products at lower prices. The number of users has been increasing, however, a large number still do not feel comfortable with the security measures. There is a need to transmit, essentially, confidence and security, so that they can buy without any fear. It is up to the seller, through transparency and payment methods, to convey these feelings. It is necessary to encourage ease and diversity in electronic payment systems, satisfying user needs. This study focuses on the development of an electronic payment system and whether it will be useful and provide a greater level of security and confidence to its users. For the accomplishment of the study a quantitative approach was chosen, through a questionnaire. Subsequently, with the help of SPSS and Excel Analysis ToolPak, the results obtained in the questionnaires were analyzed, which proved to be very positive. Respondents were interested and receptive to this system. Of the total sample, 62.7% answered that they would use the system and 30,8% answered "maybe".
info:eu-repo/semantics/publishedVersion
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Zhang, Yusha, and Klavdija Zalar. "The Application of the Extended Technology Acceptance Model in Different Cultural Contexts to Understand Mobile Payment Adoption : A comparative study between China and Sweden." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96961.

Повний текст джерела
Анотація:
Rapid technological progress has transformed our daily activities. One of these is how we pay for goods. Mobile payment is a payment option with great potential, but it is still struggling to become part of individuals' daily life. Previous research shows that adoption and acceptance of mobile payment vary widely between different countries. It is important to understand the determinants of mobile payment adoption, as cultural differences between countries may be one of the primary reasons for the different degrees of user mobile payment adoption. The purpose of this study is to investigate the factors, which influence user adoption of mobile payment in one Asian country, China, and one European country, Sweden. In addition, the aim of the study is to explore the difference in mobile payment adoption from the cultural point of view at an individual level. In this study, two research questions are proposed: what influences user intention to adopt mobile payment in the context of China and Sweden, and how does an individual culture influence user adoption of mobile payment in the context of China and Sweden. The research was conducted with a combination of an extended UTAUT (Unified Theory of Acceptance and Use of Technology) model with the added concept of Perceived Information security and Hofstede's cultural theory. Altogether, it was studied how these concepts influence Behavioural intention.  Based on the literature review of mobile payment adoption by users and Hofstede's culture theory, this study uses qualitative research to interpret the phenomenon on a deeper level with the intention of explaining it. Through observation, interviews, and questionnaires, several conclusions were drawn. The analysis of the results showed that the proposed research model applies to China and Sweden. Performance Expectancy, Effort Expectancy, and Social Influence have influenced the user mobile payment adoption in both studied countries, and Perceived Information Security has a strong influence on users in Sweden. The results also show that Power Distance, Collectivism, and Masculinity have a strong moderating effect on the behavioural intention of users in China, while Collectivism and Femininity have a strong moderating effect on the behavioural intention of users in Sweden. On this basis, it is suggested that cultural factors be incorporated into the research model of technology acceptance, and further research should be conducted in different countries to provide different perspectives.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Fiedler, Marielle, and Cecilia Uney. "Bitcoin i kassan : En kvalitativ studie om Bitcoin som betalningsmedel." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-36495.

Повний текст джерела
Анотація:
The digital currency Bitcoin has attracted a lot of attention lately, partly because of its high volatility and rising popularity. The purpose of this study was to find out why companies have chosen to implement and accept Bitcoin as a payment method. Furthermore, investigate what costs and benefits companies experience from accepting Bitcoin as a means of payment, as well security concerns and risks related to Bitcoin. The scientific method of observation used to gather information was through qualitative research where interviews were conducted with six different companies that accepts Bitcoin as a means of payment. The study's results indicate that there are several factors that lead to companies choosing to implement Bitcoin as a payment method. It is perceived to be of high level of security as well the risks associated with Bitcoin are not perceived to be major among the respondents. The result showed that the costs of accepting Bitcoin as a means of payment are low for companies but unlike previous studies, it showed very high transaction fees for consumers.
Den digitala valutan Bitcoin har uppmärksammats mycket på senaste tid, bland annat på grund av dess höga volatilitet och stigande popularitet. Syftet med denna studie är att ta reda på varför företag har valt att implementera och använda Bitcoin som ett betalningsalternativ. Dessutom undersöka vilka kostnader och fördelar företag upplever med att acceptera Bitcoin som betalningsmedel, samt hur de ser på säkerheten och risker som kan uppstå. Studien utfördes med ett kvalitativt tillvägagångssätt där sex intervjuer genomförts med sex olika företag som tar emot Bitcoin som betalningsmedel. Studiens resultat visade på att det är flera olika faktorer som leder till att företag väljer att implementera Bitcoin som betalningsmedel. Den upplevda säkerheten var hög och de risker som förknippas med Bitcoin upplevdes inte som stor hos de tillfrågade respondenterna. Resultatet visade även att kostnaderna med Bitcoin som betalningsmedel är låga för företag, men att de till skillnad från tidigare studier visade på en väldigt hög transaktionskostnad för konsumenter.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Karagöz, Elin. "Managing Innovation of Payments : A Study of Regulatory Compliance Within Swedish Banking." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279621.

Повний текст джерела
Анотація:
This study investigates challenges that emerge for Swedish incumbent banks when pursuing compliance with IT security regulations, while simultaneously striving towards innovation in order to maintain market competitiveness in terms of digital payment service offerings. As competition increases within the payment service industry, developing innovative services becomes increasingly important. At the same time, it is essential that these solutions maintain a high level of IT security, both in terms of the preservation of customer trust as well as in terms of compliance with financial regulations. Consequently, the aim of this study was to contribute to research from an incumbent banking perspective, where theory together with a qualitative case study has revolved around the topics of technology, compliance, and innovation in the pursuit of identifying key challenges. The study included a series of interviews with respondents within banking, IT security, and compliance management. This resulted in three principal challenges regarding compliance and innovation within payment services at incumbent banks, along with proposed actions to be taken. Firstly, the necessity of incrementally transitioning from legacy infrastructure towards modernized platforms was established. Secondly, banks are encouraged to make trade-offs between regulations and deploying new products and services. Finally, for banks to engage in communication and collaboration within the organization as well as with regulators can facilitate compliance as well as promoting harmonization of regulations.
Denna studie undersöker de utmaningar som svenska storbanker står inför i en digitaliserad miljö där både IT-säkerhet och innovation behöver tillgodoses för att upprätthålla konkurrenskraft gällande betaltjänster. Då konkurrensen ökar inom betaltjänstsektorn blir utvecklingen av innovativa tjänster allt mer betydelsefull. Samtidigt är det viktigt att dessa lösningar håller en hög nivå av IT-säkerhet, dels för att bibehålla kundförtroende, men också för att banker lyder under finansiella regelverk. Följaktligen var syftet med denna studie att bidra till kunskap om utvecklingen av framtidens betaltjänster. Teori och empiri kretsade kring områdena teknik, regelverk och innovation, med en strävan att identifiera huvudutmaningar på området. I en kvalitativ fallstudie inkluderandes en serie intervjuer med experter inom banksektorn och ITsäkerhet. Resultaten visade att de viktigaste utmaningarna kopplat till regelefterlevnad och innovation inom betaltjänster för storbanker är nyttjandet av föråldrad teknik, behovet av en avvägning mellan att uppfylla regelverk och utveckling av nya produkter och tjänster, och slutligen kommunikation och samarbete inom både organisationen och med lagstiftare.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Orság, Lubomír. "CMS systém kombinovaný s eshop systémem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217289.

Повний текст джерела
Анотація:
Aim of this master’s thesis was design of front-end and back-end interfaces of electronic shopping system. Design consists of completing individual use-case and workflow diagrams. Next it was explored possible security risks, designed security actions against these risks, explored payment methods usable in electronic shopping systems and methods of its implementation. There was chosen PHP programming language in combination with MySQL relation database management system to be used for development of final application. As result of this work was development of electronic shopping system final application with extended user options, ability of placement at any business type and possibilities that present-day internet user expects from electronic shopping system. To accomplishment the aim of this work contributed implementation of extended user options as advanced catalog items sorting, multi level catalog structure and advanced search options. It succeeded in choosing and implementing designed security prevention and implementing of template engine into final application. Whole system is described in detail using data modeling and class diagrams.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Rosado, Rosalina Rato Cardoso. "O incumprimento contributivo no sistema de segurança social: estudo do impacto financeiro e social." Master's thesis, Universidade de Évora, 2019. http://hdl.handle.net/10174/26698.

Повний текст джерела
Анотація:
O pilar contributivo do sistema português de segurança social (Sistema Previdencial – Repartição) é financiado essencialmente pelas contribuições e quotizações pagas por trabalhadores e empresas. Os contribuintes nem sempre cumprem atempadamente as suas obrigações, gerando dívida por incumprimento. Neste trabalho analisa-se a evolução do incumprimento contributivo à Segurança Social usando as séries históricas observadas entre 2005 e 2016, desagregadas por Nuts II. É quantificado o impacto anual da recuperação de dívida contributiva na receita efectiva do sistema previdencial. Em termos específicos, desagrega-se o processo de execução na fase extinta, penhora e reversão, concluindo-se por uma maior eficácia na regularização da dívida na fase extinta: subfase de pagamento voluntário e/ou acordo prestacional. Mostra-se que esta modalidade se verifica por unanimidade. Referem-se, ainda, as medidas programadas pelos governos para acelerar o processo de recuperação do incumprimento, que contemplam benefícios, nomeadamente a redução dos montantes pelo perdão de juros. Pese embora a recuperação apresente melhorias, a evolução incerta do incumprimento constitui um factor de risco no financiamento do Sistema e, por conseguinte, afecta a evolução dos montantes atribuídos nas eventualidades cobertas pelo Regime; Abstract: Predictive Model of Default in the Social Security System The contributory pillar of the Portuguese social security system (Sistema Previdencial – Repartição) is funded essentially by contributions paid by workers and employers. Taxpayers do not always meet their obligations on time, generating debt for default. This paper analyzes the evolution of contributory non-compliance with Social Security using the historical series observed between 2005 and 2016, broken down by Nuts II regions. The annual impact of debt recovery on the social security system effective revenue is quantified. Specifically, the process of execution in the extinguished, seizure and reversal phase is broken down, resulting in greater effectiveness in settling debt in the extinct phase: sub-phase of voluntary payment and / or installment agreement. This modality is shown to be unanimous. Also mentioned are the measures planned by governments to accelerate the recovery process of defaults, which include benefits, including the reduction or bailout of interest payments. Although the recovery is improving, the uncertain evolution of default is a risk factor in the financing of the System and therefore affects the evolution of the amounts allocated in the eventualities covered by the Scheme.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Guler, Sevil. "Secure Bitcoin Wallet." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.

Повний текст джерела
Анотація:
Virtual currencies and mobile banking are technology advancements that are receiving increased attention in the global community because of their accessibility, convenience and speed. However, this popularity comes with growing security concerns, like increasing frequency of identity theft, leading to bigger problems which put user anonymity at risk. One possible solution for these problems is using cryptography to enhance security of Bitcoin or other decentralised digital currency systems and to decrease frequency of attacks on either communication channels or system storage. This report outlines various methods and solutions targeting these issues and aims to understand their effectiveness. It also describes Secure Bitcoin Wallet, standard Bitcoin transactions client, enhanced with various security features and services.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Emms, Martin J. "Contactless payments : usability at the cost of security?" Thesis, University of Newcastle upon Tyne, 2016. http://hdl.handle.net/10443/3304.

Повний текст джерела
Анотація:
EMV (Europay, MasterCard, Visa), commonly termed “Chip & PIN”, is becoming the dominant card based payment technology globally. The EMV Chip & PIN transaction protocol was originally designed to operate in an environment where the card was physically inserted into the POS terminal/ATM and used a wired connection to communicate. The introduction of EMV contactless payments technology raises an interesting question “has usability been improved at the cost of security?”. Specifically, to make contactless payments more convenient/usable, a wireless interface has been added to EMV cards and PIN entry has been waived for contactless payments. Do these new usability features make contactless cards less secure? This PhD thesis presents an analysis of the security of the EMV contactless payments. It considers the security of the EMV contactless transaction protocols as stand-alone processes and the wider impact of contactless technology upon the security of the EMV card payment system as a whole. The thesis contributes a structured analysis methodology which identifies vulnerabilities in the EMV protocol and demonstrates the impact of these vulnerabilities on the EMV payment system. The analysis methodology comprises UML diagrams and reference tables which describe the EMV protocol sequences, a protocol emulator which implements the protocol, a Z abstract model of the protocol and practical demonstrations of the research results. Detailed referencing of the EMV specifications provide a documented link between the exploitable vulnerabilities observed in real EMV cards and the source of the vulnerability in the EMV specifications. Our analysis methodology has identified two previously undocumented vulnerabilities in the EMV contactless transaction protocol. The potential existence of these vulnerabilities was identified using the Z abstract model with the protocol emulator providing experimental confirmation of the potential for real-world exploitation of the vulnerabilities and test results quantifying the extent of the impact. Once a vulnerability has been shown to be exploitable using the protocol emulator, we use practical demonstrations to show that these vulnerabilities can be exploited in the real-world using off-the-shelf equipment. This presents a stronger impact message when presenting our research results to a nontechnical audience. This has helped to raise awareness of security issues relating to EMV contactless cards, with our work appearing in the media, radio and TV.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії