scholarly journals Biometric technology in banking institutions: ‘The customers’ perspectives’

2021 ◽  
Vol 23 (1) ◽  
Author(s):  
Abraham Morake ◽  
Lucas T. Khoza ◽  
Tebogo Bokaba

Background: Over the years, attention has been focused on digital banking and financial technology with little or no attention being paid to biometric banking technology.Objective: The study aimed to investigate the need for security and simplicity in the authentication of retail payments, digital banking and financial technology through the application of biometric systems.Method: The study employed quantitative research methodology and a response rate of 52% was achieved. A set of questionnaires was distributed for data collection.Results: The study’s findings indicated it is imperative for all businesses that participate in financial businesses to fully implement the best possible security measures or systems to ensure or enhance security for financial business activities.Conclusion: Based on the findings of the study, it is recommended that businesses must adopt the new innovative and secured mechanisms of financial dealings to enhance innovation, security and flexibility.

Author(s):  
Louis Smidt ◽  
Leandi Steenkamp ◽  
Aidi Ahmi ◽  
D. P. van der Nest ◽  
David Schalk Lubbe

This article explores the purpose for which GAS, as a data analytics tool, is utilised by internal audit functions in Australia. A quantitative research method was applied, and the data was analysed using descriptive statistics. The total number of online questionnaires returned was 50 (i.e., a response rate of 15.53%) from the total research population of 322 chief audit executives of internal audit functions of organisations that are registered members with the IIA-Australia. The purpose of descriptive statistics is to describe what the data looks like and to compare variables numerically; therefore, no inferences or extrapolation of the data results were made. The results of the study can be used as a benchmark that may enable CAEs to identify whether they are staying abreast of current best practice in the area of technology-based tools and techniques for tests of controls.


2021 ◽  
Vol 2 (2) ◽  
pp. 339-345
Author(s):  
Hilman Djafar ◽  
Rasid Yunus ◽  
Sarson W DJ Pomalato ◽  
Ruslan Rasid

Differences qualitative and quantitative research to academicians and researchers mainly concentrated on education  studies is only able to browse and identify with the fundamental difference merely as example: research that only uses quantitative data but using the qualitative as a benchmark often not considered as a quantitative research  Likewise ,  qualitative research that uses quantitative data is not considered qualitative research. If traced further, actually qualitative and quantitative research very spacious and is a level. Qualitative and quantitative research in the context of methodology includes a researcher's conception of social reality, the researcher's self placement in relation to the reality study and various other reviews. Therefore, in this research article,is stated that the correlation between qualitative and quantitative research in educational research methodology is possible if both are based on the same paradigm. Conversely qualitative and quantitative researchis difficult to reconcile if they depart from different paradigms, which have different epistemological assumptions, and different goodness criteria.


Author(s):  
S. Iqbal ◽  
Muzammil Hussain ◽  
Muhammad Umar Munir ◽  
Zunair Hussain ◽  
Sobia Mehrban ◽  
...  

This chapter sheds light on the future of crypto-currencies in the world as they have become a major part of trading and are now being adopted by leading investment firms as a new way of buying and selling. Despite the substantial security risk in crypto-currency trading, it has become the most traded commodity. Many new crypto-currencies are being introduced that attract investors. Banking institutions in USA and other leading countries have started to take part in investments in crypto-currency as it has revolutionized financial technology.


Author(s):  
Lizzy Oluwatoyin Ofusori ◽  
Prabhakar Rontala Subramaniam

As the adoption of bring your own device (BYOD) phenomenon by businesses and other sectors continues to grow. Employees find it desirable to use their personally owned mobile devices for work without the need to differentiate between their carrier services and their organizations' network. However, this practice makes such businesses vulnerable to various security threats. Nigeria banking institutions, like other businesses globally, have adopted the BYOD phenomenon. However, BYOD trend constitutes heterogeneity, and there is large diversity in mobile devices, hence the risk of corporate data being exposed to threats increases. Thus, this paper investigates the influence of technical and social threats as it relates to BYOD phenomenon in the banking institutions. Data was collected from the employees of four banks in Nigeria that supported BYOD trend. The study found out that there are some security threats that are integrated, and the existing security measures are not sufficient to mitigate those threats. Hence, this study has presented an integrated solution to curb these threats.


Author(s):  
Barbara Vis ◽  
Sjoerd Stolwijk

Abstract Conducting quantitative research (e.g., surveys, a large number of interviews, experiments) with the participation of political elites is typically challenging. Given that a population of political elites is typically small by definition, a particular challenge is obtaining a sufficiently high number of observations and, thus, a certain response rate. This paper focuses on two questions related to this challenge: (1) What are best practices for designing the study? And (2) what are best practices for soliciting the participation of political elites? To arrive at these best practices, we (a) examine which factors explain the variation in response rates across surveys within and between large-scale, multi-wave survey projects by statistically analyzing a newly compiled dataset of 342 political elite surveys from eight projects, spanning 30 years and 58 countries, (b) integrate the typically scattered findings from the existing literature and (c) discuss results from an original expert survey among researchers with experience with such research (n = 23). By compiling a comprehensive list of best practices, systematically testing some widely held believes about response rates and by providing benchmarks for response rates depending on country, survey mode and elite type, we aim to facilitate future studies where participation of political elites is required. This will contribute to our knowledge and understanding of political elites’ opinions, information processing and decision making and thereby of the functioning of representative democracies.


Author(s):  
Corrienna Abdul Talib ◽  
Hassan Aliyu ◽  
Adi Maimun Abdul Malik ◽  
Kang Hooi Siang ◽  
Igor Novopashenny ◽  
...  

These days, humans have been witnessing related technological and social development, by means of which mobile technologies and Internet yield global access to information with mobility of knowledge. Mobile learning platforms are designed based on electronic learning (e-learning) and mobility. It is regarded as a useful way to enhance the learning process. Sakai as a mobile learning platform, design intentions are to be adaptable to any educational purposes, within or outside the institution, dependent on the provision of effectiveness in classroom instruction based on the learning style of the students, extensible in the cultivation of thinking skills in the learner, and efficient in communicating and exchanging data among its enrolled classroom members and other online platforms. This study employed a systematic review of related literature to investigate the predominant research methodology adopted by various scholars to assess necessary factors concerning mobile learning platform. Fifteen articles are selected based on established criteria. The findings indicated that most of the researchers used quantitative research methodology in investigating the effectiveness and concern variable of mobile learning. Also find out is that most of the outcome of the studies include, achievement, perception, pedagogy, motivation and mobile learning platform as a form of educational technology.


2020 ◽  
Vol 37 (6) ◽  
pp. 324-329 ◽  
Author(s):  
Jesse Smith ◽  
Patrick Date ◽  
William Spencer ◽  
Erik de Tonnerre ◽  
David McDonald Taylor

ObjectiveWe aimed to determine trends over time in article origin, and article and methodology characteristics.MethodWe examined original research articles published every fifth year over a 20-year period (1997–2017) in six emergency medicine (EM) journals (Ann Emerg Med, Acad Emerg Med, Eur J Emerg Med, Emerg Med J, Am J Emerg Med, Emerg Med Australas). Explicit data extraction of 21 article characteristics was undertaken. These included regional contributions, specific article items and research methodology.Results2152 articles were included. Over the study period, the proportional contributions from the USA and the UK steadily fell while those from Australasia, Europe and ‘other’ countries increased (p<0.001). All specific article items increased (p<0.01). Institutional Review Board/Ethics Committee approval and conflicts of interest were almost universal by 2017. There were substantial increases in the reporting of keywords and authorship contributions. The median (IQR) number of authors increased from 4 (2) in 1997 to 6 (3) in 2017 (p<0.001) and the proportion of female first authors increased from 24.3% to 34.2% (p<0.01). Multicentre and international collaborations, consecutive sampling, sample size calculations, inferential biostatistics and the reporting of CIs and p values all increased (p<0.001). There were decreases in the use of convenience sampling and blinding (p<0.001). The median (IQR) study sample size increased from 148 (470) to 349 (2225) (p<0.001).ConclusionTrends over time are apparent within the EM research literature. The dominance in contributions from the US and UK is being challenged. There is more reporting of research accountability and greater rigour in both research methodology and results presentation.


2022 ◽  
pp. 214-234
Author(s):  
Heru Susanto ◽  
Nurul Mardhiah ◽  
Alifya Kayla Shafa Susanto

In recent years, the number of financial technology players and users have increased at a significant rate due to the rapid technological advancement in financial technology. While smart devices are providing more useful features to users, they have also made it possible for cyber threats to migrate from desktops to smart devices. Thus, it is important for smart device users to be aware that their device could be exposed to cyber threats and that users could protect their devices by employing data-centric cyber security measures. This study reveals how financial technology business model responded to the breach phenomenon by employing data-centric protection approaches. The result is very interesting. Data-centric security is very needed as it is capable of protecting data as a whole. It provides a gapless protection, meaning to say, the data are encrypted and classified wherever it moves. With persistent protection and cross-platform operability, data-centric security will eliminate gaps and keep data protected.


Sign in / Sign up

Export Citation Format

Share Document