529 research outputs found

    Performance Analysis of Debit Card Services on Deposit-Taking SACCOs’ Financial Performance: A Case of Kenya

    Get PDF
    The Co-operative Bank of Kenya has partnered with Deposit-Taking Savings and Credit Cooperative Societies (SACCOs) in Kenya to allow their members access to Co-operative Bank automated teller machines (ATMs) via Saccolink debit cards. However, the adoption and utilization of debit cards has opened financial institutions to fraud associated with the use of debit cards for transactions on automated teller machines and point-of-sale terminals. Given this limitation, this study sought to investigate the effect of Saccolink debit card services on the financial performance of Deposit-Taking SACCOs in Kenya. Through a combination of agency, information systems success models, and task-technology fit theories to explain financial performance, the study found a positive effect of Saccolink debit card services on the financial performance of Deposit-Taking SACCOs in Kenya. The study therefore recommends continued utilization of Saccolink debit cards and an enhancement of their features within the Deposit-Taking SACCOs in Kenya

    Blockchain-based data privacy management with Nudge theory in open banking

    Get PDF
    Open banking brings both opportunities and challenges to banks all over the world especially in data management. A blockchain as a continuously growing list of records managed by a peer-to-peer network is widely used in various application scenarios; and it is commonly agreed that the blockchain technology can improve the protection of financial data privacy. However, current blockchain technology still poses some challenges in fully meeting the needs of financial data privacy protection. In order to address the existing problems, this paper proposes a new data privacy management framework based on the blockchain technology for the financial sector. The framework consists of three components: (1) a data privacy classification method according to the characteristics of financial data; (2) a new collaborative-filtering-based model; and (3) a data disclosure confirmation scheme for customer strategies based on the Nudge Theory. We implement a prototype and propose a set of algorithms for this framework. The framework is validated through field experiments and laboratory experiments. © 2019 Elsevier B.V

    Advances in Data Mining Knowledge Discovery and Applications

    Get PDF
    Advances in Data Mining Knowledge Discovery and Applications aims to help data miners, researchers, scholars, and PhD students who wish to apply data mining techniques. The primary contribution of this book is highlighting frontier fields and implementations of the knowledge discovery and data mining. It seems to be same things are repeated again. But in general, same approach and techniques may help us in different fields and expertise areas. This book presents knowledge discovery and data mining applications in two different sections. As known that, data mining covers areas of statistics, machine learning, data management and databases, pattern recognition, artificial intelligence, and other areas. In this book, most of the areas are covered with different data mining applications. The eighteen chapters have been classified in two parts: Knowledge Discovery and Data Mining Applications

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications
    • …
    corecore