scholarly journals Scanning Hybrid Transaction Algorithm for Secure Financial Transactions

Author(s):  
Divyansh Joshi

Abstract: Identity theft is a frightening and often very serious concern to everyone. A novel risk-mitigation algorithm, the Hybrid Transaction Algorithm, is given in an effort to provide individuals with peace of mind (HTA). With the random codes, the proposed HTA aims to implement two-factor authentication. This kind of user authentication has been generally recognized, and many businesses have begun to employ it as a security feature. This may be used to identify people and provide a secure method of buying products online. The suggested method involves using mobile devices to log into card accounts using an application in order to examine the randomly generated code. This is then entered when required on an online retailer's website in order to verify the person making the transaction. This reduces the chance of an unauthorized user using someone else's details to make fraudulent transactions. Identity thieves cannot use stolen card information to make transactions unless they have a valid code. This, in turn, protects both the customer and the credit card companies, who may be financially affected. We give one case study to demonstrate the security of our methodology in order to better understand how it may safeguard someone from having a stolen credit card used. Keywords: Two-Factor Authentication; Hybrid Transaction Algorithm (HTA); AES Encryption; SHA–256.

GIS Business ◽  
2016 ◽  
Vol 12 (4) ◽  
pp. 45-56
Author(s):  
Kingstone Mutsonziwa ◽  
Obert K. Maposa

Mobile money in Zimbabwe has extensively extended the frontiers of financial inclusion to reach millions who were earlier excluded within a relatively short space of time. The growing use of mobile phones in transferring money and making payments has significantly altered the countrys financial inclusion landscape as millions who had been hitherto excluded can now perform financial transactions in a relatively cheap, reliable and secure way. The FinScope results found out that 45% of the adult population use mobile money services. Of those using mobile money, 65% mentioned that is convenient, while 36% mentioned that it is cheap. Mobile money is accessible. These drivers are in the backdrop of few or no bank branches in rural communities as well as time and cost of accessing the bank branches. In Zimbabwe, mobile money is mostly used as a vehicle for remittances. While some people are enjoying mobile money services, it is important to mention that there are still people who are excluded from the formal financial system. The reasons why people do not use mobile money are mainly related to poverty issues. Mobile money remains a viable option to push the landscape of financial inclusion in Zimbabwe and other emerging markets where the formal financial system might not be strong.


2014 ◽  
Vol 33 (3) ◽  
pp. 45 ◽  
Author(s):  
David Ward ◽  
James Hahn ◽  
Lori Mestre

<p>This article presents a case study exploring the use of a student Coding Camp as a bottom-up mobile design process to generate library mobile apps. A code camp sources student programmer talent and ideas for designing software services and features.  This case study reviews process, outcomes, and next steps in mobile web app coding camps. It concludes by offering implications for services design beyond the local camp presented in this study. By understanding how patrons expect to integrate library services and resources into their use of mobile devices, librarians can better design the user experience for this environment.</p>


2021 ◽  
Vol 13 (8) ◽  
pp. 1553
Author(s):  
Atsushi Higuchi

Third-generation geostationary meteorological satellites (GEOs), such as Himawari-8/9 Advanced Himawari Imager (AHI), Geostationary Operational Environmental Satellites (GOES)-R Series Advanced Baseline Imager (ABI), and Meteosat Third Generation (MTG) Flexible Combined Imager (FCI), provide advanced imagery and atmospheric measurements of the Earth’s weather, oceans, and terrestrial environments at high-frequency intervals. Third-generation GEOs also significantly improve capabilities by increasing the number of observation bands suitable for environmental change detection. This review focuses on the significantly enhanced contribution of third-generation GEOs for disaster monitoring and risk mitigation, focusing on atmospheric and terrestrial environment monitoring. In addition, to demonstrate the collaboration between GEOs and Low Earth orbit satellites (LEOs) as supporting information for fine-spatial-resolution observations required in the event of a disaster, the landfall of Typhoon No. 19 Hagibis in 2019, which caused tremendous damage to Japan, is used as a case study.


2021 ◽  
pp. 1-22
Author(s):  
RAM A. CNAAN ◽  
MARQUISHA LAWRENCE SCOTT ◽  
H. DANIEL HEIST ◽  
M. S. MOODITHAYA

Abstract In the digital age, financial inclusion continues to be connected to social inclusion. While most personal financial transactions are shifting from cash currency to digital transactions, we must ensure that marginalized members of society are not unbanked and excluded from financial opportunities. Many countries are declaring their intention to transform to cashless societies. India is one such country. As a case study, we investigated rural Indian villages that declared themselves as cashless to assess the financial reality of villagers. We conducted a survey of households (N=3,159) within villages across seven Indian states. In each state, we studied a village that was officially declared cashless and a nearby comparison village. Our findings suggest that the comparison villages did as well as the cashless villages, as financial inclusion via digital banking was minimal to nonexistent. Alongside significant state variations, we found that financial literacy and online access were the best predictors of performing any digital banking activity. This study concludes with a warning against rushing toward digital banking and the formation of cashless societies, as marginalized populations may be excluded.


2018 ◽  
Vol 10 (12) ◽  
pp. 4668 ◽  
Author(s):  
Antonio Nesticò ◽  
Shuquan He ◽  
Gianluigi De Mare ◽  
Renato Benintendi ◽  
Gabriella Maselli

The process of allocating financial resources is extremely complex—both because the selection of investments depends on multiple, and interrelated, variables, and constraints that limit the eligibility domain of the solutions, and because the feasibility of projects is influenced by risk factors. In this sense, it is essential to develop economic evaluations on a probabilistic basis. Nevertheless, for the civil engineering sector, the literature emphasizes the centrality of risk management, in order to establish interventions for risk mitigation. On the other hand, few methodologies are available to systematically compare ante and post mitigation design risk, along with the verification of the economic convenience of these actions. The aim of the paper is to demonstrate how these limits can be at least partially overcome by integrating, in the traditional Cost-Benefit Analysis schemes, the As Low as Reasonably Practicable (ALARP) logic. According to it, the risk is tolerable only if it is impossible to reduce it further or if the costs to mitigate it are disproportionate to the benefits obtainable. The research outlines the phases of an innovative protocol for managing investment risks. On the basis of a case study dealing with a project for the recovery and transformation of an ancient medieval village into a widespread-hotel, the novelty of the model consists of the characterization of acceptability and tolerability thresholds of the investment risk, as well as its ability to guarantee the triangular balance between risks, costs and benefits deriving from mitigation options.


2012 ◽  
Vol 25 (3) ◽  
pp. 30-60 ◽  
Author(s):  
Mahmud A. Shareef ◽  
Vinod Kumar

This study provides an application framework toward measures to prevent/control identity theft in conjunction with sources. It also identifies the impact of overall protection of identity theft on consumer trust, the cost of products/services, and operational performance, all of which in turn contribute to a purchase intention using E-commerce (EC). For the first objective, this study proposes a matrix of sources and measures to prevent and control identity theft. From this matrix, using knowledge from a literature review and judgment based on plausibility, the authors identify global laws, controls placed on organizations, publications to develop awareness, technical management, managerial policy, risk management tools, data management, and control over employees are the potential measuring items to prevent identity theft related to EC. A case study in banking sector through a qualitative approach was conducted to verify the proposed relations, constructs, and measuring items. For the second objective, this research paper conceptualizes a model based on literature review and validates that based on the case study in the financial sector. The model reflects the effects of preventing and controlling identity theft on the costs of products/services, operational performance, and customers’ perception of trust, which would lead to purchase intention in EC.


2012 ◽  
Vol 10 (3) ◽  
pp. 1-16 ◽  
Author(s):  
Lee Chao

The objective of this article is to facilitate mobile teaching and learning by providing an alternative course material deployment method. This article suggests a course material deployment platform for small universities or individual instructors. Different from traditional course material deployment methods, the method discussed deploys course materials by using services provided by Android Market. After comparing the traditional course material deployment and the alternative deployment, the author presents strategies to take advantage of Android Market in delivering course materials to mobile devices. Through a case study, this article illustrates the application of these strategies in deploying a class menu for an object-oriented programming course in the computer science curriculum.


Sign in / Sign up

Export Citation Format

Share Document