21,447 research outputs found

    Quality assessment technique for ubiquitous software and middleware

    Get PDF
    The new paradigm of computing or information systems is ubiquitous computing systems. The technology-oriented issues of ubiquitous computing systems have made researchers pay much attention to the feasibility study of the technologies rather than building quality assurance indices or guidelines. In this context, measuring quality is the key to developing high-quality ubiquitous computing products. For this reason, various quality models have been defined, adopted and enhanced over the years, for example, the need for one recognised standard quality model (ISO/IEC 9126) is the result of a consensus for a software quality model on three levels: characteristics, sub-characteristics, and metrics. However, it is very much unlikely that this scheme will be directly applicable to ubiquitous computing environments which are considerably different to conventional software, trailing a big concern which is being given to reformulate existing methods, and especially to elaborate new assessment techniques for ubiquitous computing environments. This paper selects appropriate quality characteristics for the ubiquitous computing environment, which can be used as the quality target for both ubiquitous computing product evaluation processes ad development processes. Further, each of the quality characteristics has been expanded with evaluation questions and metrics, in some cases with measures. In addition, this quality model has been applied to the industrial setting of the ubiquitous computing environment. These have revealed that while the approach was sound, there are some parts to be more developed in the future

    Technology payment cards communication with banking institutions in the field of cashless payment

    Get PDF
    The aim is now used to describe the infrastructure of payment cards, ATMs, now used to describe the infrastructure of payment systems, mainly the payment cards and NFC technology and secure payment throw the internet. In this article, we examine a new technology application which is coming into its own around the world, in association with the revolution in wireless connectivity. Our findings are intended to guide in dealing with the economic aspects of mobile payments, and to help identify some important directions for the research

    The Enigma of Mobile Money Systems

    Get PDF
    In this paper we argue that the success of mobile banking models represents an enigma in terms of their replicability to other countries. These models offer the opportunity to diminish the financial exclusion suffered by the poor by offering access to credit, savings, and transfers, which are key tools capable of transforming the livelihoods of the poor as well as the efficiency of the market. We show that mobile phones need a complete ecosystem that supports its application to a functioning mobile banking service. The aim of this paper is to contribute to existing knowledge of mobile money across the value chain by providing insight into the mechanisms of m-money and the value propositions within the business of m-banking. We develop a taxonomy of the key drivers of the business model to help assess the replicability of these models in other countries. We focus on models developed in Kenya, the Philippines, and Brazil, and explore if some of the conditions present in these models are lacking for a widespread adoption in other. We conclude, however, that there appears to be no set of clearly identifiable variables that serve as a basis for success and that those necessary conditions for the replication of m-banking models identified by the existing literature to other countries around the world do not guarantee results. Moreover, we find that some of these conditions are not present in countries where m-banking models have been successful.M-banking, financial inclusion, mobile applications, mobile opportunities, developing countries.

    Analysis of roles and position of mobile network operators in mobile payment infrastructure

    Get PDF
    A number of different mobile payment solutions have been presented the last decade. The phone subscription with its security mechanisms are used for user identification and payments. This is the case for SMS based payment and ticketing systems that are getting more and more popular. However, there are other ways to implement a Trusted Element (TE) , where a SIM card architecture is only one. It can be in the mobile phone, as a separate integrated circuit, as an optional customer deployed plug-in device (e.g., microSD) or be running as an application on a server existing entirely as software. In this paper we analyze what roles and responsibilities different actors have in different types of mobile payments solutions. The main focus is on the implications for the mobile operator business. It turns out that new types of intermediary actors in most cases play an important role. Sometimes mobile operators are not even involved. The emergence of new payment together with other non-SIM card based TE solutions opens up for many different market scenarios for mobile payment services. --

    The Impact Of Technology Trust On The Acceptance Of Mobile Banking Technology Within Nigeria

    Get PDF
    With advancement in the use of information technology seen as a key factor in economic development, developed countries are increasingly reviewing traditional systems, in various sectors such as education, health, transport and finance, and identifying how they may be improved or replaced with automated systems. In this study, the authors examine the role of technology trust in the acceptance of mobile banking in Nigeria as the country attempts to transition into a cashless economy. For Nigeria, like many other countries, its economic growth is linked, at least in part, to its improvement in information technology infrastructure, as well as establishing secure, convenient and reliable payments systems. Utilising the Technology Acceptance Model, this study investigates causal relationships between technology trust and other factors influencing user’s intention to adopt technology; focusing on the impact of seven factors contributing to technology trust. Data from 1725 respondents was analysed using confirmatory factor analysis and the results showed that confidentiality, integrity, authentication, access control, best business practices and non-repudiation significantly influenced technology trust. Technology trust showed a direct significant influence on perceived ease of use and usefulness, a direct influence on intention to use as well as an indirect influence on intention to use through its impact on perceived usefulness and perceived ease of use. Furthermore, perceived ease of use and perceived usefulness showed significant influence on consumer’s intention to adopt the technology. With mobile banking being a key driver of Nigeria’s cashless economy goals, this study provides quantitative knowledge regarding technology trust and adoption behaviour in Nigeria as well as significant insight on areas where policy makers and mobile banking vendors can focus strategies engineered to improve trust in mobile banking and increase user adoption of their technology
    • 

    corecore