Framework for evaluating suitability of graphical user authentication for mobile banking
User Authentication is a vital component in any Information System. There are various ways of implementing user authentication from using text-based passwords, biometric passwords and graphical images password. The importance of selecting an environment appropriate user authentication method is o...
| Main Author: | Kingsley Ugochukwu, Ejike Ekeke |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/69367/ http://psasir.upm.edu.my/id/eprint/69367/1/FSKTM%202016%2036%20-%20IR.pdf |
Similar Items
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2014)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2014)
Graphical user authentication algorithm for mobile banking user
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
A review on the graphical user authentication algorithm : recognition-based and recall-based.
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2013)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2013)
Determinant of customer intention to adopt mobile banking services in Sauda Arabia
by: Alsheikh, Layla Hodaed
Published: (2013)
by: Alsheikh, Layla Hodaed
Published: (2013)
E-service quality model for assessing customer satisfaction of mobile banking application
by: Owuamanam, Jude Ndubuisi
Published: (2021)
by: Owuamanam, Jude Ndubuisi
Published: (2021)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
A simulative study on the performance evaluation for simultaneous and successive mobility for mobile IPv6
by: Abdullah, Ibrahim, et al.
Published: (2010)
by: Abdullah, Ibrahim, et al.
Published: (2010)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Assessing 'functionality' in school mathematics examinations: what does being human have to do with it?
by: Drake, Pat, et al.
Published: (2012)
by: Drake, Pat, et al.
Published: (2012)
Analyzing and evaluating the service quality of foreign banks’ digital offerings in China: a case study of online banking and mobile banking
by: GUO, YIFEI
Published: (2017)
by: GUO, YIFEI
Published: (2017)
Increasing TCP friendliness by implementing simple adaptive congestion control framework in wireless network
by: Elangkovan, Sri Ganesh
Published: (2018)
by: Elangkovan, Sri Ganesh
Published: (2018)
A mobility management scheme for proxy mobile IPv6 wireless sensor networks
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
by: Ghaleb, Safwan Mahmood Yahya
Published: (2019)
Performance analysis of OSPF and EIGRP protocols in a very dynamic network
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
SmiDCA: Smishing attack detection for mobile computing on smishing dataset
by: Hasan, Dahah Ahmed Haidarah
Published: (2019)
by: Hasan, Dahah Ahmed Haidarah
Published: (2019)
Distributed authentication for the Western Australian University Libraries
by: Green, Peter
Published: (2004)
by: Green, Peter
Published: (2004)
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
by: Sjaugi, Muhammad Farhan
Published: (2008)
by: Sjaugi, Muhammad Farhan
Published: (2008)
A Distributed Authentication Infrastructure for Western Australian Universities
by: Green, Peter, et al.
Published: (2003)
by: Green, Peter, et al.
Published: (2003)
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002)
by: Green, Peter
Published: (2002)
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
by: Raja Mohd Auzar, Tengku Dian Shahida
Published: (2009)
by: Raja Mohd Auzar, Tengku Dian Shahida
Published: (2009)
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
by: Ahmad, Noor Azlan
Published: (2008)
by: Ahmad, Noor Azlan
Published: (2008)
Effects of economic freedom on bank efficiency, output reallocation and profit convergence in the Asean-5 banking sector
by: Yap, Woon Kan
Published: (2020)
by: Yap, Woon Kan
Published: (2020)
Implications of non-interest income on bank risk and performance of banks in selected developing and developed Asia Pacific countries
by: Koh, Chin Wei
Published: (2018)
by: Koh, Chin Wei
Published: (2018)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
Handover enhancement in IP mobility for 6LoWPAN scenario
by: Abdulrahman, Ahmed Faris
Published: (2016)
by: Abdulrahman, Ahmed Faris
Published: (2016)
The fantasy of authenticity: touring with Lacan
by: Knudsen, Daniel C., et al.
Published: (2016)
by: Knudsen, Daniel C., et al.
Published: (2016)
Impact of banking concentration on firm leverage in developoing countries
by: Abadi, Farzin
Published: (2015)
by: Abadi, Farzin
Published: (2015)
Factors that influencing an adoption of mobile banking: a case study in Kajang, Selangor / Muhammad Muhaimin Pozlan
by: Pozlan, Muhammad Muhaimin
Published: (2019)
by: Pozlan, Muhammad Muhaimin
Published: (2019)
Authentic assessment and the Internet: contributions within knowledge networks
by: Allen, Matthew
Published: (2009)
by: Allen, Matthew
Published: (2009)
Performance of Transmission Control Protocol (TCP) Congestion Control Over Wireless Links Using Modified Snoop Protocol
by: Moojid, Furat Asmat
Published: (2003)
by: Moojid, Furat Asmat
Published: (2003)
Web-Based Network Device Monitoring Tool Using Simple Network Management Protocol (Snmp)
by: Hossen, Md.Jakir
Published: (2003)
by: Hossen, Md.Jakir
Published: (2003)
Bank stability measures in dual banking system: a critical review / Norzitah Abdul Karim …[et al.]
by: Abdul Karim, Norzitah, et al.
Published: (2019)
by: Abdul Karim, Norzitah, et al.
Published: (2019)
Essays on European banking
by: Fusi, Giulia
Published: (2023)
by: Fusi, Giulia
Published: (2023)
DBS Bank unit eyes Malaysia acquisition
Published: (2008)
Published: (2008)
Public Affairs Division at AMR Bank
by: Mohamed Ariffin, Mohamed Fadzil
Published: (1999)
by: Mohamed Ariffin, Mohamed Fadzil
Published: (1999)
Effect of merger and acquisition on acquirer banks in the Middle East and North Africa Region
by: Sindi, Sameer Mohammed A
Published: (2019)
by: Sindi, Sameer Mohammed A
Published: (2019)
Traffic Balancing Method in Shortest Path Routing
by: Mohamed Abdulqader, Makarem
Published: (2007)
by: Mohamed Abdulqader, Makarem
Published: (2007)
HSBC Bank - powervantage package
by: Ahmad Shapian, Ruzaiyati
Published: (2000)
by: Ahmad Shapian, Ruzaiyati
Published: (2000)
International Evidence on Cost, Revenue, and Profit Efficiency of Conventional and Islamic Banks
by: I. Bader, Mohammed Khaled
Published: (2007)
by: I. Bader, Mohammed Khaled
Published: (2007)
Similar Items
-
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004) -
Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2014) -
Graphical user authentication algorithm for mobile banking user
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018) -
A review on the graphical user authentication algorithm : recognition-based and recall-based.
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2013) -
Determinant of customer intention to adopt mobile banking services in Sauda Arabia
by: Alsheikh, Layla Hodaed
Published: (2013)