“…39 % of respondents have said only the English language is available in the ATM they use. Language plays a vital role in understanding the message (Abuarqoub, 2019). Most of the respondents said it is available in both English and Nepali languages in ATMs they use.…”
Section: Knowledge About Plastic Money By the Usersmentioning
This study aims to understand the users’ knowledge about plastic money, its current use, challenges they faced and way-forward. Based on descriptive research design, primary data is used for the purpose as per its suitability. A structured questionnaire has been arranged with the help of KOBO and devised for the information assortments from 404 plastic money users. Results found that people who use plastic money usually work in banks and financial institutions (33.87%) and are from the nuclear family (62.62%), with income between 25001 – 50000 (56%). 95.79 % of the respondents know about plastic money, and 86.3 % have plastic money. 88 % of respondents said they feel safe while using plastic money. 40.72% of respondents have faced challenges and problems while using plastic money. The majority (79.28%) of respondents believed that using the bank's services could be solved. It can be solved by giving training (34.85%), quick response to the problem raised by users (44.32%), update technology (34.47%) and keep a good network in the ATMs (71.79%) and quick solutions to the user's problems (75.76%). This study concludes that hassle-free transactions, a low-interest rate of credit cards, attractive advertisement, and awareness of how plastic money can use help and attract users of plastic money.
.
“…39 % of respondents have said only the English language is available in the ATM they use. Language plays a vital role in understanding the message (Abuarqoub, 2019). Most of the respondents said it is available in both English and Nepali languages in ATMs they use.…”
Section: Knowledge About Plastic Money By the Usersmentioning
This study aims to understand the users’ knowledge about plastic money, its current use, challenges they faced and way-forward. Based on descriptive research design, primary data is used for the purpose as per its suitability. A structured questionnaire has been arranged with the help of KOBO and devised for the information assortments from 404 plastic money users. Results found that people who use plastic money usually work in banks and financial institutions (33.87%) and are from the nuclear family (62.62%), with income between 25001 – 50000 (56%). 95.79 % of the respondents know about plastic money, and 86.3 % have plastic money. 88 % of respondents said they feel safe while using plastic money. 40.72% of respondents have faced challenges and problems while using plastic money. The majority (79.28%) of respondents believed that using the bank's services could be solved. It can be solved by giving training (34.85%), quick response to the problem raised by users (44.32%), update technology (34.47%) and keep a good network in the ATMs (71.79%) and quick solutions to the user's problems (75.76%). This study concludes that hassle-free transactions, a low-interest rate of credit cards, attractive advertisement, and awareness of how plastic money can use help and attract users of plastic money.
.
As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are getting substantial attention in the field. Currently, a considerable number of papers have been published on MCC with a growing interest in privacy and data protection. Along with this advance in MCC, however, no specific investigation highlights the results of the existing studies in privacy and data protection. In addition, there are no particular exploration highlights trends and open issues in the domain. Accordingly, the objective of this paper is to highlight the results of existing primary studies published in privacy and data protection in MCC to identify current trends and open issues. In this investigation, a systematic mapping study was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 were obtained. Following a filtering process, a collection of 74 primary studies were selected. As a result, the present data privacy threats, attacks, and solutions were identified. Also, the ongoing trends of data privacy exercise were observed. Moreover, the most utilized measures, research type, and contribution type facets were emphasized. Additionally, the current open research issues in privacy and data protection in MCC were highlighted. Furthermore, the results demonstrate the current state-of-the-art of privacy and data protection in MCC, and the conclusion will help to identify research trends and open issues in MCC for researchers and offer useful information in MCC for practitioners.
“…This paper extends our previous work in ref. [19] which introduces the blueprints of a new authentication protocol that would address the mobile devices resource limitations to conserve their energy and address the security issues of the MCC. The protocol produces a secure and reliable dual factor authentication that is based on smart card and password authentication methods.…”
Emerging Mobile Cloud Computing (MCC) technologies offer a new world of promise by leveraging the quality of mobile services. With MCC, resource-constrained mobile devices could capitalize on the computation/storage resources of cloud servers via communication networks. While MCC adoption is growing significantly, several challenges need to be addressed to make MCC-based solutions scale and meet the ever-growing demand for more resource intensive applications. Security is a critical problem hindering the adoption of MCC. One of the most important aspects of MCC security is to establish authenticated communication sessions between mobile devices and cloud servers. The huge amount of data stored on mobile devices poses information security risks and privacy concerns for individuals, enterprises, and governments. The ability to establish authenticated communication sessions between mobile devices and cloud servers can resolve many security concerns. Limited computing and energy resources on mobile devices makes authentication and encryption a challenging task. In this paper, an overview of MCC authentication protocols is presented. Then, a Dual-Factor Authentication Protocol for MCC devices (D-FAP) is proposed. D-FAP aims at increasing authentication security by using multi-factors while offloading computation to the cloud to reduce battery consumption. The security of the protocol is formally verified and informal analysis is performed for various attacks. The results prove that the D-FAP is successful in mitigating various outsider and insider attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.