M-Banking Payment Service Model Concepts
Keywords:
M-payments, M-order, SMS, 2D barcode, DOV(Data Over Voice), NFC(Near Field Communication), Mobile micro payments, Ticketing system, Cashless Payments.Abstract
This paper consists of four important sections to identifying how mobile phone (Smart phone) works to pay the online payments. First section has an introduction for the mobile payments requirements for reliable service. Second section shows types & models of mobile payment service but not taking into account the service patterns and the electronic money systems. In the third section as a case study is shown an author solution may be improved taking into account the security and economic issues presented in the first two sections. The fourth or last section presents a summery of technologies available for improvement of the mobile payments services. The main method is achieving the goal of the research is the modeling method which will be used to descriptively model global events and processes as well as construct the fundamental model of mobile payment. For the purpose of correct defining of analogies in the process of creating the model according to the original, we will be using the systematic approach. This approach my means of system analysis and synthesis assures dynamic modeling of the process and events relevant to the construction of the model and the result of this payment system (m-banking) are the potential of the mobile telephony globally and the technical security related to the technologies, but also with the customer trust, privacy and security in terms of social experience.
References
Sathye, M. (1999).Adoption of Internet banking by Australian consumers: an empirical investigation. International Journal of Bank Marketing, Vol. 17, No. 7, pp: 324-334.
W. Lampson Butler," Computer Security in the Real World “Annual Computer Security Applications Conference, 2000."
Dr. Abha Chandra, Mrs. Vinita Sharma “Analytical Research on Indian Online Banking and UsersÕPr Ivacyâ€, Global Journal of Enterprise Information System jan-june2010 vol-2 issue1.
White Paper, "Best Security Practices in online Bankingâ€, easy Solutions 2009.
“Internet Banking Flaws in India Banking†web Devil, 20th Oct, 2008.
"Banking Securely Online “US-CERT" a government organization. 2006, Updated 2008.
Mohammad Mennen, P.C. van Oorschot, “Security and Usability: The Gap in Real-World Online Bankingâ€, New Security Paradigms Workshop (NSPW) 2007 New Hampshire, USA.
Neha Dixit,â€Acceptance of E-banking among Adult Customers: An Empirical Investigation in India, “Journal of Internet Banking and Commerce, August 2010, vol. 15, no.2.
“Online Banking: threats and Countermeasures Revised Version: 1.3†AhnLab, Inc., June, 2010.
â€State of Data Security and Privacy in Indian banking Industry- DSCI-KPMG Survey-2010†Data Security Council of India, published in Feb. 2011.
Authentication in an Internet Banking Environment online available at http://www.fdic.gov/news/news/financial/2010/index.html. Federal Financial Institutions Examination Council, June 29, 2011.
Zakaria Karim1, Karim Mohammed Rezaul2, Aliar Hossain1, “Towards Secure Information Systems in Online Bankingâ€, International Conference on 2qInternet Technology and Secured Transactions, ICITST 2009.
http://www.zsecure.net/blog/vulnerabilities/hdfc-bank-sql-injection-vulnerability.html
http://www.zdnet.com/hackers-gunning-for-banks-web-servers-sites-2062301212.
Sue Marquette Porembaâ€Study: Security flaws threaten online bankingâ€, July 28, 2008 [online]Avaialable:http://www.scmagazine.com/study-security-flaws-threaten-online-banking/article/113010.
http://ptlbindia.blogspot.com.au/2012/03/rbi-warned-indian-banks-for-inadequate.html.
l Doll, W.J., Raghunathan, T.S., Lim, J.S. and Gupta, Y.P. (1995), “Research Report – A Confirmatory Factor Analysis of the User Information Satisfaction Instrumentâ€, Information Systems Research, Vol. 6 No. 2, pp. 177-188.
Seth, N., Deshmukh, S.G. and Vrat, P. (2005), “Service quality models: a reviewâ€, International Journal of Quality & Reliability Management, Vol. 22 No. 9, pp. 913-949.
Status, B. and Nihaus, P. (1997), “The qualitative satisfaction modelâ€, International Journal of Service Industry Management, Vol. 8 No. 3, pp. 236-249.
National Irish Bank (2010), Target, 2013, Modernizing Payments in Ireland Report – September2010, National Irish Bank, Dublin.
Downloads
Published
How to Cite
Issue
Section
License
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.