NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bright Siaw Afriyie; Samuel Sambasivam – Information Systems Education Journal, 2023
Nearly half the adult population in developing nations lacks a formal bank account and other financial services. Ghana is no exception, having a massive community of unbanked adults and among those countries positioned at the bottom of the spectrum of financial inclusion. The advent of mobile financial services (MFS) claims an alternative mode to…
Descriptors: Computer Security, Information Security, Prevention, Deception
Peer reviewed Peer reviewed
Buck, S. Peter – Internet Research, 1996
Discussion of use of the Internet for online payments focuses on payment mechanisms for conducting transactions. Highlights include commercial requirements; security requirements; various proposed and currently used mechanisms; and future possibilities. (LRW)
Descriptors: Banking, Computer Security, Futures (of Society), Internet
Peer reviewed Peer reviewed
Jayawardhena, Chanaka; Foley, Paul – Internet Research, 2000
Discussion of changes in the banking industry focuses on an analysis of 12 Internet banking operations in the United Kingdom. Topics include delivery strategies; customer demand and requirements; and an evaluation of banking Web sites that considers speed, content and design, navigation, interactivity, and security. (LRW)
Descriptors: Banking, Computer Security, Content Analysis, Delivery Systems
Peer reviewed Peer reviewed
Soh, Christina; Mah, Quee Yong; Gan, Fong Jek; Chew, Daniel; Reid, Edna – Internet Research, 1997
A survey of Singapore-based firms in computer/information technology, hospitality, manufacturing, retail, travel, publishing, and banking/finance that use the Internet for business found that most of the respondents use the Internet for marketing and advertising, customer service and support, information gathering, and, to a lesser degree,…
Descriptors: Advertising, Banking, Business, Computer Security