2019
DOI: 10.11591/ijeecs.v16.i1.pp191-199
|View full text |Cite
|
Sign up to set email alerts
|

A cashless payment transaction (CPaT) using RFID technology

Abstract: <span>Virtual money is an actual money that a person own but in a form of a plastic card, an online account and a token or a ticket. Referring to the cash-base system, it is full of fraud and money scam activity. It even happens in a smaller division of a human population which are among family members. For example, when a child decided to do a money scam towards their parents by asking for extra money for what they actually needed to pay for school internal fee and with today’s technology, they can easi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Thus, it is more suitable to understand studies that are mostly affected by human factors [29]. UTAUT model is adapted from [27,[30][31][32][33][34][35][36] as guidelines in identifying key factors that influence the acceptance of e-wallet towards a cashless society in Malaysia. The proposed research model consists of seven 7 The hypothesis is an assumption made in the study and may differ from actual results after data collection and analysis.…”
Section: Research Model and Hypothesismentioning
confidence: 99%
“…Thus, it is more suitable to understand studies that are mostly affected by human factors [29]. UTAUT model is adapted from [27,[30][31][32][33][34][35][36] as guidelines in identifying key factors that influence the acceptance of e-wallet towards a cashless society in Malaysia. The proposed research model consists of seven 7 The hypothesis is an assumption made in the study and may differ from actual results after data collection and analysis.…”
Section: Research Model and Hypothesismentioning
confidence: 99%
“…Next, the employee proceeds to the RFID card data generation section using the Card Management System application (3) where they obtain an RFID card (4) that can be used to access the room. Finally, the employee can also view room access activities (5) and read RFID card data using a mobile application (6).…”
Section: Proposed Systemmentioning
confidence: 99%
“…money). An e-money is an example of the application of RFID in the financial category [6], [7], [8], [9], besides being used in the financial sector, smart cards are also often used for identity cards (e-identity). E-identity can be in the form of identification cards, for example identity cards, student cards, employee cards, and other identification cards [10], [11], [12], [13], [14], [15].…”
Section: Introductionmentioning
confidence: 99%
“…The website is: "The web can be interpreted as a collection of pages that display text data information, image data, animation data, sound, video and a combination of all of them, both static and dynamic which form a series of buildings that interconnected, each of which is linked by hyperlinks [9]. The web is: "A collection of pages consisting of several pages that contain information in the form of digital data in the form of text, images, video, audio, and other animations provided through an internet connection" [10].…”
Section: D) Webmentioning
confidence: 99%