A review of user authentication model for online banking system based on mobile IMEI number
The traditional banking system, such as transactions over the counter using bank book is enhanced by adding the elements of electronic banking, where nowadays all transaction can be done over the network, because of globalization and the advancement of information and communication technology. Howev...
| Main Authors: | Hammood, Waleed A., Ruzaini, Abdullah Arshah, Hammood, Omar A., Salwana, Mohamad, Al-Sharafi, Mohammed A., Hasan, Ali Muttaleb |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IOP Publishing
2020
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/28807/ http://umpir.ump.edu.my/id/eprint/28807/1/A%20review%20of%20user%20authentication%20model%20for%20online%20banking.pdf |
Similar Items
A review of user authentication model for online banking system based on mobile IMEI number
by: Hammood, Waleed A., et al.
Published: (2020)
by: Hammood, Waleed A., et al.
Published: (2020)
Factors influencing the success of information systems in flood early warning and response systems context
by: Hammood, Waleed A., et al.
Published: (2020)
by: Hammood, Waleed A., et al.
Published: (2020)
An Integrated Flood Warning and Response Model for Effective Flood Disaster Mitigation Management
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
A systematic review on flood early warning and response system (FEWRS): A deep review and analysis
by: Hammood, Waleed A., et al.
Published: (2021)
by: Hammood, Waleed A., et al.
Published: (2021)
The Impact of Customer Trust and Perception of Security and Privacy on the Acceptance of Online Banking Services: Structural Equation Modeling Approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Understanding Online Banking Acceptance By Jordanian Customers: The Effect Of Trust Perceptions
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
A combined weighting for the feature-based method on topological parameters in semantic taxonomy using social media
by: Ali Muttaleb, Hasan, et al.
Published: (2020)
by: Ali Muttaleb, Hasan, et al.
Published: (2020)
Extending delone and mclean success model with diffusion of innovation theory factors for flood early warning and response system success model : a case study at pahang civil defence department
by: Waleed Abdulmaged, Hammood
Published: (2021)
by: Waleed Abdulmaged, Hammood
Published: (2021)
The Effect of Perceived Ease of Use and Usefulness on Customers Intention to Use Online Banking Services: The Mediating Role of Perceived Trust
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
The VANET-Solution Approach for Data Packet Forwarding Improvement
by: Hammood, Omar A., et al.
Published: (2018)
by: Hammood, Omar A., et al.
Published: (2018)
Issues and Challenges of Video Dissemination in VANET and Routing Protocol: Review
by: Hammood, Omar A., et al.
Published: (2017)
by: Hammood, Omar A., et al.
Published: (2017)
Graphical user authentication algorithm for mobile banking user
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
Enhance video quality through VANET based on Transmit Packet Coding (TPC)
by: Hammood, Omar A., et al.
Published: (2018)
by: Hammood, Omar A., et al.
Published: (2018)
The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services An Extension of TAM
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
by: Omar Abdulmaged, Hammood
Published: (2022)
by: Omar Abdulmaged, Hammood
Published: (2022)
The Influence of Perceived Trust on Understanding Banks’ Customers behavior to Accept Internet Banking Services
by: Al-Sharafi, Mohammed A., et al.
Published: (2018)
by: Al-Sharafi, Mohammed A., et al.
Published: (2018)
Methods For Approximating And Stabilizing The Solution Of Nonlinear Riccati Matrix Delay Differential Equation
by: Mohammedali, Khalid Hammood
Published: (2019)
by: Mohammedali, Khalid Hammood
Published: (2019)
An effective transmit packet coding with trust-based relay nodes in VANETs
by: Hammood, Omar A., et al.
Published: (2020)
by: Hammood, Omar A., et al.
Published: (2020)
The Effect of Security and Privacy Perceptions on Customers’ Trust to Accept Internet Banking Services: An Extension of TAM
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
Development of data quality dimensions from user’s perspective framework
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
Framework for evaluating suitability of graphical user authentication for mobile banking
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
by: Kingsley Ugochukwu, Ejike Ekeke
Published: (2016)
The acceptance of online social networks as a technology-based education tools among higher institutes students: A structural equation modeling approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
by: Mohanaad, Shakir, et al.
Published: (2016)
by: Mohanaad, Shakir, et al.
Published: (2016)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
Graphical user authentication system (GUAS)
by: Tan, Woei Wen
Published: (2014)
by: Tan, Woei Wen
Published: (2014)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
An integrated model to evaluate the effects of cloud computing services on SMEs performance
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
A Review of Data Quality Assessment: Data Quality Dimensions from User’s Perspective
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
by: Misinem, ., et al.
Published: (2022)
by: Misinem, ., et al.
Published: (2022)
Review on user authentication on mobile devices
by: Abdul Gimba, Usman, et al.
Published: (2024)
by: Abdul Gimba, Usman, et al.
Published: (2024)
RESP: Relay suitability-based routing protocol for video streaming in vehicular Ad Hoc Networks
by: Hammood, Omar A., et al.
Published: (2019)
by: Hammood, Omar A., et al.
Published: (2019)
The impact of customer trust and perception of security and privacy on the acceptance of online banking services: structural equation modeling approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2018)
by: Al-Sharafi, Mohammed A., et al.
Published: (2018)
Behavioral Biometrics for User Authentication Using Self- Refreshing SOM
by: Teh, Chee Siong, et al.
Published: (2017)
by: Teh, Chee Siong, et al.
Published: (2017)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Acceptance of online social networks as technology-based education tools among higher institution students: structural equation modeling approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2014)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2014)
Factors Affecting the Continuous Use of Cloud Computing Services from Expert's Perspective
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Similar Items
-
A review of user authentication model for online banking system based on mobile IMEI number
by: Hammood, Waleed A., et al.
Published: (2020) -
Factors influencing the success of information systems in flood early warning and response systems context
by: Hammood, Waleed A., et al.
Published: (2020) -
An Integrated Flood Warning and Response Model for Effective Flood Disaster Mitigation Management
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018) -
A systematic review on flood early warning and response system (FEWRS): A deep review and analysis
by: Hammood, Waleed A., et al.
Published: (2021) -
The Impact of Customer Trust and Perception of Security and Privacy on the Acceptance of Online Banking Services: Structural Equation Modeling Approach
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)