Skip to main content

2022 | OriginalPaper | Buchkapitel

Mobile Payment Technology

verfasst von : Mohammed Faris, Mohd Nazri Mahmud

Erschienen in: Artificial Neural Networks and Structural Equation Modeling

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Using mobile payment technology improves many tasks. Mobile payment technology has a high value due to the perceived benefit of such a technology. Adopting mobile payment technology increases purchasing convenience, improves customer satisfaction, and increases efficiency at checkout. However, the SEM and ANN literature has explored many of the determinants of mobile payment technology adoption such as mobile usefulness, price savings, and referent network size. This chapter contributes to describing the determinants of mobile payment and provides practitioners with insight into how to motivate customers to adopt mobile payment technology.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ahamad SS, Pathan AK (2019) Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification. Complex Adapt Syst Model (springer) 7(1):1–18 Ahamad SS, Pathan AK (2019) Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification. Complex Adapt Syst Model (springer) 7(1):1–18
Zurück zum Zitat Ahamad SS, Sastry VN, Udgata SK (2017) A secure and optimized proximity mobile payment framework with formal verification. Mobile commerce: concepts, methodologies, tools, and applications 6:161–189 Ahamad SS, Sastry VN, Udgata SK (2017) A secure and optimized proximity mobile payment framework with formal verification. Mobile commerce: concepts, methodologies, tools, and applications 6:161–189
Zurück zum Zitat Ahmed R, Dharaskar RV (2009) Mobile forensics: an introduction from Indian law enforcement perspective. International Conference on Information Systems, Technol Manag (ICISTM’2009), CCIS (Springer) 31:173–184, 12–13 Mar 2009, Ghaziabad, India. Ahmed R, Dharaskar RV (2009) Mobile forensics: an introduction from Indian law enforcement perspective. International Conference on Information Systems, Technol Manag (ICISTM’2009), CCIS (Springer) 31:173–184, 12–13 Mar 2009, Ghaziabad, India.
Zurück zum Zitat Akter S, Chellappan S, Chakraborty T, Khan TA, Rahman A, Al I, Alim ABM (2020) Man-in-the-middle attack on contactless payment over NFC communications: design. Implementation, experiments and detection, IEEE transactions on dependable and secure computing. Akter S, Chellappan S, Chakraborty T, Khan TA, Rahman A, Al I, Alim ABM (2020) Man-in-the-middle attack on contactless payment over NFC communications: design. Implementation, experiments and detection, IEEE transactions on dependable and secure computing.
Zurück zum Zitat Alliance SC (2008) Proximity mobile payments business scenarios: research report on stakeholder perspective. A Smart Card Alliance Contactless Payments Council White Paper. Princeton Junction, NJ. Alliance SC (2008) Proximity mobile payments business scenarios: research report on stakeholder perspective. A Smart Card Alliance Contactless Payments Council White Paper. Princeton Junction, NJ.
Zurück zum Zitat Almuairfi S, Veeraraghavan P, Chilamkurti N, Doo-Soon P (2014) Anonymous proximity mobile payment (APMP). Peer-to-Peer Net Appl (springer) 7(4):620–627CrossRef Almuairfi S, Veeraraghavan P, Chilamkurti N, Doo-Soon P (2014) Anonymous proximity mobile payment (APMP). Peer-to-Peer Net Appl (springer) 7(4):620–627CrossRef
Zurück zum Zitat Bell CJ, Hogarth JM, Robbins E (2009) US households’ access to and use of electronic banking. 1989–2007. Federal Reserve Bulletin (July) Bell CJ, Hogarth JM, Robbins E (2009) US households’ access to and use of electronic banking. 1989–2007. Federal Reserve Bulletin (July)
Zurück zum Zitat Bellare M, Garay JA, Hauser R, Herzberg A, Krawczyk H, Steiner M, Waidner M (2000) Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J Sel Areas Commun 18(4):611–627CrossRef Bellare M, Garay JA, Hauser R, Herzberg A, Krawczyk H, Steiner M, Waidner M (2000) Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J Sel Areas Commun 18(4):611–627CrossRef
Zurück zum Zitat Bojjagani S, Reddy BR, Sandhya M, Vemula DR (2020) CybSec-MLC: a comparative analysis on cyber security intrusion detection using machine learning classifiers. Symposium on machine learning and metaheuristics algorithms, and applications (SoMMA’2020):232–245, 14–17 Oct 2020, Chennai, India. Bojjagani S, Reddy BR, Sandhya M, Vemula DR (2020) CybSec-MLC: a comparative analysis on cyber security intrusion detection using machine learning classifiers. Symposium on machine learning and metaheuristics algorithms, and applications (SoMMA’2020):232–245, 14–17 Oct 2020, Chennai, India.
Zurück zum Zitat Bojjagani S, Sastry VN (2015) Stamba: security testing for Android mobile banking apps. In Proceedings of the second international symposium on signal processing and intelligent recognition systems Bojjagani S, Sastry VN (2015) Stamba: security testing for Android mobile banking apps. In Proceedings of the second international symposium on signal processing and intelligent recognition systems
Zurück zum Zitat Bojjagani S, Sastry VN (2017) VAPTAi: a threat model for vulnerability assessment and penetration testing of android and iOS mobile banking apps. In IEEE 3rd international conference on collaboration and internet computing (CIC), San Jose. California, USA:77–86. https://doi.org/10.1109/CIC.2017.00022 Bojjagani S, Sastry VN (2017) VAPTAi: a threat model for vulnerability assessment and penetration testing of android and iOS mobile banking apps. In IEEE 3rd international conference on collaboration and internet computing (CIC), San Jose. California, USA:77–86. https://​doi.​org/​10.​1109/​CIC.​2017.​00022
Zurück zum Zitat Bouazzouni MA, Conchon E, Peyrard F (2018) Trusted mobile computing: an overview of existing solutions. Fut Gen Comput Syst (elsevier) 80:596–612CrossRef Bouazzouni MA, Conchon E, Peyrard F (2018) Trusted mobile computing: an overview of existing solutions. Fut Gen Comput Syst (elsevier) 80:596–612CrossRef
Zurück zum Zitat Bujang SDA, Selamat A (2009) Verification of mobile SMS application with model checking agent. International conference on information and multimedia technology (ICIMT’2009):361–365, 16–18 Dec 2009, Jeju, Korea (South). Bujang SDA, Selamat A (2009) Verification of mobile SMS application with model checking agent. International conference on information and multimedia technology (ICIMT’2009):361–365, 16–18 Dec 2009, Jeju, Korea (South).
Zurück zum Zitat Bubukayr MAS, Almaiah MA (2021, July) Cybersecurity concerns in smart-phones and applications: a survey. In 2021 international conference on information technology (ICIT) (pp. 725–731). IEEE. Bubukayr MAS, Almaiah MA (2021, July) Cybersecurity concerns in smart-phones and applications: a survey. In 2021 international conference on information technology (ICIT) (pp. 725–731). IEEE.
Zurück zum Zitat Chaum D, Fiat A, Naor M (1988, August) Untraceable electronic cash. In Conference on the theory and application of cryptography (pp. 319–327). Springer, New York, NY Chaum D, Fiat A, Naor M (1988, August) Untraceable electronic cash. In Conference on the theory and application of cryptography (pp. 319–327). Springer, New York, NY
Zurück zum Zitat Dahlberg T, Mallat N, Öörni A (2003) Trust enhanced technology acceptance model consumer acceptance of mobile payment solutions: tentative evidence. Stockholm Mobility Roundtable 22(1):145 Dahlberg T, Mallat N, Öörni A (2003) Trust enhanced technology acceptance model consumer acceptance of mobile payment solutions: tentative evidence. Stockholm Mobility Roundtable 22(1):145
Zurück zum Zitat Dizaj MVA, Moghaddam RA, Momenebellah S (2011, August) New mobile payment protocol: mobile pay center protocol 2 (MPCP2) by using new key agreement protocol: VAM. In Proceedings of 2011 IEEE pacific rim conference on communications, computers and signal processing (pp. 12–18). IEEE Dizaj MVA, Moghaddam RA, Momenebellah S (2011, August) New mobile payment protocol: mobile pay center protocol 2 (MPCP2) by using new key agreement protocol: VAM. In Proceedings of 2011 IEEE pacific rim conference on communications, computers and signal processing (pp. 12–18). IEEE
Zurück zum Zitat Du K (2018) Complacency, capabilities, and institutional pressure: understanding financial institutions’ participation in the nascent mobile payments ecosystem. Electron Mark 28(3):307–319CrossRef Du K (2018) Complacency, capabilities, and institutional pressure: understanding financial institutions’ participation in the nascent mobile payments ecosystem. Electron Mark 28(3):307–319CrossRef
Zurück zum Zitat de Luna IR, Liébana-Cabanillas F, Sánchez-Fernández J, Muñoz-Leiva F (2019) Mobile payment is not all the same: the adoption of mobile payment systems depending on the technology applied. Technol Forecast Soc Chang 146:931–944CrossRef de Luna IR, Liébana-Cabanillas F, Sánchez-Fernández J, Muñoz-Leiva F (2019) Mobile payment is not all the same: the adoption of mobile payment systems depending on the technology applied. Technol Forecast Soc Chang 146:931–944CrossRef
Zurück zum Zitat Fan J, Shao M, Li Y, Huang, X (2018) Understanding users’ attitude toward mobile payment use: a comparative study between China and the USA. Ind Manag Data Syst. Fan J, Shao M, Li Y, Huang, X (2018) Understanding users’ attitude toward mobile payment use: a comparative study between China and the USA. Ind Manag Data Syst.
Zurück zum Zitat Flavián C, Guinaliu M, Lu Y (2020) Mobile payments adoption–introducing mindfulness to better understand consumer behavior. Int J Bank Mark Flavián C, Guinaliu M, Lu Y (2020) Mobile payments adoption–introducing mindfulness to better understand consumer behavior. Int J Bank Mark
Zurück zum Zitat Gao L, Waechter KA (2017) Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation. Inform Syst Frontiers (springer) 19(3):525–548CrossRef Gao L, Waechter KA (2017) Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation. Inform Syst Frontiers (springer) 19(3):525–548CrossRef
Zurück zum Zitat Gerpott TJ, Meinert P (2017) Who signs up for NFC mobile payment services? mobile network operator subscribers in Germany. Electron Commer Res Appl 23:1–13CrossRef Gerpott TJ, Meinert P (2017) Who signs up for NFC mobile payment services? mobile network operator subscribers in Germany. Electron Commer Res Appl 23:1–13CrossRef
Zurück zum Zitat Gera T, Singh J, Thakur D, Kaur A (2021, October) A survey on andro-financial Malware attacks, detection methods and current issues. In 2021 6th international conference on signal processing, computing and control (ISPCC) (pp. 587–593). IEEE. Gera T, Singh J, Thakur D, Kaur A (2021, October) A survey on andro-financial Malware attacks, detection methods and current issues. In 2021 6th international conference on signal processing, computing and control (ISPCC) (pp. 587–593). IEEE.
Zurück zum Zitat Hayashi, F (2012) Mobile payments: What’s in it for consumers? Economic Review, First Quarter, 35–66. Hayashi, F (2012) Mobile payments: What’s in it for consumers? Economic Review, First Quarter, 35–66.
Zurück zum Zitat Hidayat-ur-Rehman I, Alzahrani S, Rehman MZ, Akhter F (2022) Determining the factors of m-wallets adoption. a twofold SEM-ANN approach. Plos One 17(1):e0262954CrossRef Hidayat-ur-Rehman I, Alzahrani S, Rehman MZ, Akhter F (2022) Determining the factors of m-wallets adoption. a twofold SEM-ANN approach. Plos One 17(1):e0262954CrossRef
Zurück zum Zitat Hogarth JM, Anguelov C (2004) Are families who use e-banking better financial managers? J Financ Couns Plan 15(2):61–77 Hogarth JM, Anguelov C (2004) Are families who use e-banking better financial managers? J Financ Couns Plan 15(2):61–77
Zurück zum Zitat Huang LK (2017) A cultural model of online banking adoption: Long-term orientation perspective. J Organ End User Comput (JOEUC) 29(1):1–22CrossRef Huang LK (2017) A cultural model of online banking adoption: Long-term orientation perspective. J Organ End User Comput (JOEUC) 29(1):1–22CrossRef
Zurück zum Zitat Isaac, JT, & Sherali, Z (2014) Secure mobile payment systems. It Professional, 16(3), 36–43. Isaac, JT, & Sherali, Z (2014) Secure mobile payment systems. It Professional, 16(3), 36–43.
Zurück zum Zitat Isaac JT, Zeadally S, Camara JS (2012) A lightweight secure mobile payment protocol for vehicular ad-hoc networks (vanets). Electron Commer Res 12(1):97–123CrossRef Isaac JT, Zeadally S, Camara JS (2012) A lightweight secure mobile payment protocol for vehicular ad-hoc networks (vanets). Electron Commer Res 12(1):97–123CrossRef
Zurück zum Zitat Kadhiwal S, Zulfiquar AUS (2007) Analysis of mobile payment security measures and different standards. Comput Fraud Secur 6:12–16CrossRef Kadhiwal S, Zulfiquar AUS (2007) Analysis of mobile payment security measures and different standards. Comput Fraud Secur 6:12–16CrossRef
Zurück zum Zitat Kailar R (1996) Accountability in electronic commerce protocols. IEEE Trans Software Eng 22(5):313–328CrossRef Kailar R (1996) Accountability in electronic commerce protocols. IEEE Trans Software Eng 22(5):313–328CrossRef
Zurück zum Zitat Kolodinsky JM, Hogarth JM, Hilgert MA (2004) The adoption of electronic banking technologies by US consumers. Int J Bank Mark Kolodinsky JM, Hogarth JM, Hilgert MA (2004) The adoption of electronic banking technologies by US consumers. Int J Bank Mark
Zurück zum Zitat Kungpisdan S (2005) Modelling, design, and analysis of secure mobile payment systems (Doctoral dissertation, Monash University). Kungpisdan S (2005) Modelling, design, and analysis of secure mobile payment systems (Doctoral dissertation, Monash University).
Zurück zum Zitat Kungpisdan S (2009, September) Accountability in centralized payment environments. In 2009 9th international symposium on communications and information technology (pp. 1022–1027). IEEE. Kungpisdan S (2009, September) Accountability in centralized payment environments. In 2009 9th international symposium on communications and information technology (pp. 1022–1027). IEEE.
Zurück zum Zitat Lassar WM, Manolis C, Lassar SS (2005) The relationship between consumer innovativeness, personal characteristics, and online banking adoption. Int J Bank Mark Lassar WM, Manolis C, Lassar SS (2005) The relationship between consumer innovativeness, personal characteristics, and online banking adoption. Int J Bank Mark
Zurück zum Zitat Leong LY, Hew TS, Ooi KB, Wei J (2020) Predicting mobile wallet resistance: a two-staged structural equation modeling-artificial neural network approach. Int J Inf Manage 51:102047CrossRef Leong LY, Hew TS, Ooi KB, Wei J (2020) Predicting mobile wallet resistance: a two-staged structural equation modeling-artificial neural network approach. Int J Inf Manage 51:102047CrossRef
Zurück zum Zitat Li W, Xia Y, Lu L, Chen H, Zang B (2019) TEEv: virtualizing trusted execution environments on mobile platforms. In Proceedings of the 15th ACM SIGPLAN/SIGOPS international conference on virtual execution environments (pp. 2–16) Li W, Xia Y, Lu L, Chen H, Zang B (2019) TEEv: virtualizing trusted execution environments on mobile platforms. In Proceedings of the 15th ACM SIGPLAN/SIGOPS international conference on virtual execution environments (pp. 2–16)
Zurück zum Zitat Li Y, Wang Y (2014) Secure electronic transaction (SET protocol) Li Y, Wang Y (2014) Secure electronic transaction (SET protocol)
Zurück zum Zitat Liébana-Cabanillas F, Marinkovic V, de Luna IR, Kalinic Z (2018) Predicting the determinants of mobile payment acceptance: a hybrid SEM-neural network approach. Technol Forecast Soc Chang 129:117–130CrossRef Liébana-Cabanillas F, Marinkovic V, de Luna IR, Kalinic Z (2018) Predicting the determinants of mobile payment acceptance: a hybrid SEM-neural network approach. Technol Forecast Soc Chang 129:117–130CrossRef
Zurück zum Zitat Loh XM, Lee VH, Hew TS, Lin B (2022) The cognitive-affective nexus on mobile payment continuance intention during the COVID-19 pandemic. Int J Bank Mark Loh XM, Lee VH, Hew TS, Lin B (2022) The cognitive-affective nexus on mobile payment continuance intention during the COVID-19 pandemic. Int J Bank Mark
Zurück zum Zitat Lu J, Yang Z, Li L, Yuan W, Li L, Chang CC (2017) Multiple schemes for mobile payment authentication using qr code and visual cryptography. Mobile Information Systems (Hindawi). Lu J, Yang Z, Li L, Yuan W, Li L, Chang CC (2017) Multiple schemes for mobile payment authentication using qr code and visual cryptography. Mobile Information Systems (Hindawi).
Zurück zum Zitat Liu Y, Ai Z, Sun S, Zhang S, Liu Z, Yu H (2020) Fedcoin: a peer-to-peer payment system for federated learning. In Federated learning (pp. 125–138). Springer, Cham Liu Y, Ai Z, Sun S, Zhang S, Liu Z, Yu H (2020) Fedcoin: a peer-to-peer payment system for federated learning. In Federated learning (pp. 125–138). Springer, Cham
Zurück zum Zitat Mallat N, Tuunainen VK (2008) Exploring merchant adoption of mobile payment systems: an empirical study. E-Service J 6(2):24–57CrossRef Mallat N, Tuunainen VK (2008) Exploring merchant adoption of mobile payment systems: an empirical study. E-Service J 6(2):24–57CrossRef
Zurück zum Zitat Medvinsky G, Neuman C (1993, December) NetCash: a design for practical electronic currency on the Internet. In Proceedings of the 1st ACM conference on computer and communications security (pp. 102–106) Medvinsky G, Neuman C (1993, December) NetCash: a design for practical electronic currency on the Internet. In Proceedings of the 1st ACM conference on computer and communications security (pp. 102–106)
Zurück zum Zitat Moonsamy V, Batten L (2014) Mitigating man-in-the-middle attacks on smartphones-a discussion of ssl pinning and dnssec. In Proceedings of the 12th Australian information security management Conference (pp 5–13) Moonsamy V, Batten L (2014) Mitigating man-in-the-middle attacks on smartphones-a discussion of ssl pinning and dnssec. In Proceedings of the 12th Australian information security management Conference (pp 5–13)
Zurück zum Zitat Nguyen TNT, Shum P, Chua EH (2005, November) Secure end-to-end mobile payment system. In 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems (pp. 4-pp). IEEE Nguyen TNT, Shum P, Chua EH (2005, November) Secure end-to-end mobile payment system. In 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems (pp. 4-pp). IEEE
Zurück zum Zitat Nyamtiga BW, Sam A, Laizer LS (2013) Security perspectives for ussd versus sms in conducting mobile transactions: a case study of tanzania. Int J Technol Enhancements Emerg Eng Res 1(3):38–43 Nyamtiga BW, Sam A, Laizer LS (2013) Security perspectives for ussd versus sms in conducting mobile transactions: a case study of tanzania. Int J Technol Enhancements Emerg Eng Res 1(3):38–43
Zurück zum Zitat Ok K, Coskun V, Ozdenizci B (2012) Near field communication: from theory to practice. John Wiley and Sons. Ok K, Coskun V, Ozdenizci B (2012) Near field communication: from theory to practice. John Wiley and Sons.
Zurück zum Zitat Ooi KB, Tan GWH (2016) Mobile technology acceptance model: an investigation using mobile users to explore smartphone credit card. Expert Syst Appl 59:33–46CrossRef Ooi KB, Tan GWH (2016) Mobile technology acceptance model: an investigation using mobile users to explore smartphone credit card. Expert Syst Appl 59:33–46CrossRef
Zurück zum Zitat Oentoro W (2021) Mobile payment adoption process: a serial of multiple mediation and moderation analysis. The Bottom Line. Oentoro W (2021) Mobile payment adoption process: a serial of multiple mediation and moderation analysis. The Bottom Line.
Zurück zum Zitat Pauluzzo R, Geretto EF (2018) Validating the EUCS model to measure the level of satisfaction of Internet users in local banks in Italy. J Organ End User Comput (JOEUC) 30(1):66–81CrossRef Pauluzzo R, Geretto EF (2018) Validating the EUCS model to measure the level of satisfaction of Internet users in local banks in Italy. J Organ End User Comput (JOEUC) 30(1):66–81CrossRef
Zurück zum Zitat Perry P, Kent A, Bonetti F (2019) The use of mobile technologies in physical stores: the case of fashion retailing. Exploring omnichannel retailing:169–195 Perry P, Kent A, Bonetti F (2019) The use of mobile technologies in physical stores: the case of fashion retailing. Exploring omnichannel retailing:169–195
Zurück zum Zitat Prakasha K, Muniyal B, Acharya V (2019) Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure. Information Discovery and Delivery Prakasha K, Muniyal B, Acharya V (2019) Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure. Information Discovery and Delivery
Zurück zum Zitat Qian T, Zhen L (2018, May) Design of transnational mobile e-payment application based on SIM card. In AIP conference proceedings (Vol. 1967, No. 1, p. 020011). AIP Publishing LLC Qian T, Zhen L (2018, May) Design of transnational mobile e-payment application based on SIM card. In AIP conference proceedings (Vol. 1967, No. 1, p. 020011). AIP Publishing LLC
Zurück zum Zitat Qiao Z, Yang Q, Zhou Y, Zhang M (2021) Improved secure transaction scheme with certificateless cryptographic primitives for iot-based mobile payments. IEEE Systems Journal Qiao Z, Yang Q, Zhou Y, Zhang M (2021) Improved secure transaction scheme with certificateless cryptographic primitives for iot-based mobile payments. IEEE Systems Journal
Zurück zum Zitat Rogers EM (2010) Diffusion of innovations. Simon and Schuster, New York Rogers EM (2010) Diffusion of innovations. Simon and Schuster, New York
Zurück zum Zitat Samadani MH, Shajari M, Ahaniha M (2010) A survey on mobile digital signature models. In:Proceedings of the 12th ACM International Conference on. Electronic Commerce: Roadmap for the Future of Electronic Business (ICEC’10), pp 141–145, 02–04 (August 2010) Honolulu. HI, USA Samadani MH, Shajari M, Ahaniha M (2010) A survey on mobile digital signature models. In:Proceedings of the 12th ACM International Conference on. Electronic Commerce: Roadmap for the Future of Electronic Business (ICEC’10), pp 141–145, 02–04 (August 2010) Honolulu. HI, USA
Zurück zum Zitat Sekhar VC, Sarvabhatla M (2012, January) Secure lightweight mobile payment protocol using symmetric key techniques. In:2012 International Conference on Computer Communication and Informatics (pp. 1–6). IEEE Sekhar VC, Sarvabhatla M (2012, January) Secure lightweight mobile payment protocol using symmetric key techniques. In:2012 International Conference on Computer Communication and Informatics (pp. 1–6). IEEE
Zurück zum Zitat Sharma SK, Sharma M (2019) Examining the role of trust and quality dimensions in the actual usage of mobile banking services: an empirical investigation. Int J Inf Manage 44:65–75CrossRef Sharma SK, Sharma M (2019) Examining the role of trust and quality dimensions in the actual usage of mobile banking services: an empirical investigation. Int J Inf Manage 44:65–75CrossRef
Zurück zum Zitat Shedid SM, Kouta M (2010, October) Modified SET protocol for mobile payment: an empirical analysis. In 2010 2nd international conference on software technology and engineering (Vol. 1, pp. V1–350). IEEE Shedid SM, Kouta M (2010, October) Modified SET protocol for mobile payment: an empirical analysis. In 2010 2nd international conference on software technology and engineering (Vol. 1, pp. V1–350). IEEE
Zurück zum Zitat Sinigaglia F, Carbone R, Costa G, Ranise S (2019) Mufasa: a tool for high-level specification and analysis of multi-factor authentication protocols. In Second international workshop on emerging technologies for authorization and authentication, (ETAA’2019), pp 138–155, 27 September 2019, Luxembourg Sinigaglia F, Carbone R, Costa G, Ranise S (2019) Mufasa: a tool for high-level specification and analysis of multi-factor authentication protocols. In Second international workshop on emerging technologies for authorization and authentication, (ETAA’2019), pp 138–155, 27 September 2019, Luxembourg
Zurück zum Zitat Solat S (2017) Security of electronic payment systems: a comprehensive survey. arXiv preprint arXiv: 1701. 04556. Solat S (2017) Security of electronic payment systems: a comprehensive survey. arXiv preprint arXiv: 1701. 04556.
Zurück zum Zitat Suryaman M, Cahyono Y, Muliansyah D, Bustani O, Suryani P, Fahlevi M, Munthe AP (2020) COVID-19 pandemic and home online learning system: does it affect the quality of pharmacy school learning. Syst Rev Pharm 11(8):524–530 Suryaman M, Cahyono Y, Muliansyah D, Bustani O, Suryani P, Fahlevi M, Munthe AP (2020) COVID-19 pandemic and home online learning system: does it affect the quality of pharmacy school learning. Syst Rev Pharm 11(8):524–530
Zurück zum Zitat Sumathy M, Vipin KP (2017) Digital payment systems: perception and concerns among urban consumers. IJAR 3(6):1118–1122 Sumathy M, Vipin KP (2017) Digital payment systems: perception and concerns among urban consumers. IJAR 3(6):1118–1122
Zurück zum Zitat Saranya A, Naresh R (2021) Cloud based efficient authentication for mobile payments using key distribution method. J Ambient Intelligence Humanized Comput:1–8 Saranya A, Naresh R (2021) Cloud based efficient authentication for mobile payments using key distribution method. J Ambient Intelligence Humanized Comput:1–8
Zurück zum Zitat Tellez Jesus and Zeadally S (2017) Architectures and models for mobile payment systems. In Mobile payment systems, pp 35–91 Tellez Jesus and Zeadally S (2017) Architectures and models for mobile payment systems. In Mobile payment systems, pp 35–91
Zurück zum Zitat Tripathi DM, Ojha A (2012, March) LPMP: an efficient lightweight protocol for mobile payment. In 2012 3rd national conference on emerging trends and applications in computer science (pp. 41–45). IEEE Tripathi DM, Ojha A (2012, March) LPMP: an efficient lightweight protocol for mobile payment. In 2012 3rd national conference on emerging trends and applications in computer science (pp. 41–45). IEEE
Zurück zum Zitat Tuecke S, Welch V, Engert D, Pearlman L, Thompson M et al (2004) Internet X.509 public key infrastructure (pki) proxy certificate profile. Technical report, RFC-3820 (Proposed Standard) Tuecke S, Welch V, Engert D, Pearlman L, Thompson M et al (2004) Internet X.509 public key infrastructure (pki) proxy certificate profile. Technical report, RFC-3820 (Proposed Standard)
Zurück zum Zitat Verkijika SF, Neneh BN (2021) Standing up for or against: A text-mining study on the recommendation of mobile payment apps. J Retail Consum Serv 63:102743CrossRef Verkijika SF, Neneh BN (2021) Standing up for or against: A text-mining study on the recommendation of mobile payment apps. J Retail Consum Serv 63:102743CrossRef
Zurück zum Zitat Wang L, Luo XR, Yang X, Qiao Z (2019) Easy come or easy go? empirical evidence on switching behaviors in mobile payment applications. Inf Manag J 56(7):103150 Wang L, Luo XR, Yang X, Qiao Z (2019) Easy come or easy go? empirical evidence on switching behaviors in mobile payment applications. Inf Manag J 56(7):103150
Zurück zum Zitat Wei KJ, Lee JS, Chen SJ (2015) Enhancing the security of credit card transaction based on visual DSC. KSII Trans Internet Inf Syst (TIIS) 9(3):1231–1245 Wei KJ, Lee JS, Chen SJ (2015) Enhancing the security of credit card transaction based on visual DSC. KSII Trans Internet Inf Syst (TIIS) 9(3):1231–1245
Zurück zum Zitat Yang W, Zhang Y, Li J, Liu H, Wang Q, Zhang Y, Gu D (2017) Show me the money! finding flawed implementations of third-party in app payment in android apps. In Network and distributed system security symposium (NDSS), San Diego, CA, USA Yang W, Zhang Y, Li J, Liu H, Wang Q, Zhang Y, Gu D (2017) Show me the money! finding flawed implementations of third-party in app payment in android apps. In Network and distributed system security symposium (NDSS), San Diego, CA, USA
Zurück zum Zitat Yen SM, Lin HC, Chen YC, Hung JJ, Wu JM (2014) PayStar: a denomination flexible micropayment scheme. Inf Sci 259:160–169CrossRef Yen SM, Lin HC, Chen YC, Hung JJ, Wu JM (2014) PayStar: a denomination flexible micropayment scheme. Inf Sci 259:160–169CrossRef
Zurück zum Zitat Yue W (2015) Semopias: a novel secure and efficient mutual open PKI identity authentication scheme for mobile commerce. InThe proceedings of the third international conference on communications, signal processing, and systems, pp 373–380, July 14–15 2015, Hohhot, China. Yue W (2015) Semopias: a novel secure and efficient mutual open PKI identity authentication scheme for mobile commerce. InThe proceedings of the third international conference on communications, signal processing, and systems, pp 373–380, July 14–15 2015, Hohhot, China.
Zurück zum Zitat Zaman A, Islam MN, Zaki T, Hossain MS (2020) ICT intervention in the containment of the pandemic spread of COVID-19: an exploratory study. arXiv preprint arXiv:2004.09888. Zaman A, Islam MN, Zaki T, Hossain MS (2020) ICT intervention in the containment of the pandemic spread of COVID-19: an exploratory study. arXiv preprint arXiv:​2004.​09888.
Metadaten
Titel
Mobile Payment Technology
verfasst von
Mohammed Faris
Mohd Nazri Mahmud
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-6509-8_11