• Title/Summary/Keyword: M-payment

Search Result 122, Processing Time 0.024 seconds

An Empirical Study on Factors Affecting Customer Intention to Use Mobile Payment System in Vietnam (베트남 모바일결재시스템 수용의도에 영향을 미치는 요인에 관한 실증연구)

  • Nguyen, Phuong Y;Lee, Sung Taek;Kang, Wi Man;Kim, Jeong Suk;Gim, Gwang Yong
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.171-184
    • /
    • 2015
  • Nowadays, mobile commerce is having an increasingly profound impact on our daily lives, and offer interesting and advantageous new services. Mobile payment is an emerging and important application of mobile commerce in smart work, enabling users to use their mobile devices (especially mobile phones) for paying goods and services wherever they go. The appearance of m-payment is expected to provide us a convenient and bright future to enjoy. That is the common trend on over the world, but in Vietnam, although the number of smart phone users has been increasing rapidly, the adoption of m-payment system still didn't succeed completely. The research reviewed literature regarding mobile payment services, analyzed the impact of customer characteristics and system characteristics on m-payment adoption in Vietnam. To analyze the adoption behaviors of m-payment users, m-payment research model which consists of three customer-characteristics (m-payment trust, personal innovativeness, m-payment knowledge) and four m-payment system characteristics (mobility, reachability, convenience, compatibility) were studied. The results indicate that perceived usefulness, trust, and compatibility are the important predictors to the intention to use m-payment. This study will assist m-payment services suppliers in implementing appropriate business models and service strategies to successfully attract customer to use m-payment in Vietnam, allowing managers to exert appropriate investment, time, and effort for m-payment system development in designing smart working.

Gamification on Mobile Payment Application: Uses and Gratification Perspective

  • Mutia Fadhila Putri;Ratna Juita;Achmad Nizar Nidayanto;Dedi I. Inan
    • Asia pacific journal of information systems
    • /
    • v.32 no.4
    • /
    • pp.750-769
    • /
    • 2022
  • Indonesia has the largest potential mobile payment (m-payment) market in Southeast Asia. The government has realised this through Government's National Non-Cash Movement to increase its adoption. This is then followed up by advocating its adoption massively. However, for this movement to be a success, ensuring its continued use is critical. Various studies have attempted to contribute to this issue. Incorporating game elements into the application that brings benefits and satisfaction to its user is envisaged as one of the most feasible ways. This study, therefore, sets out to investigate the effects of gamification on the m-payment application, which drive the intention to continued use by employing the Uses dan Gratification Theory (UGT). A total of 826 m-payment users were gathered to be analysed using Structural Equation Modelling. The results show that utilitarian, hedonic and social gratifications have significant effects on the continuance usage intention of m-payment. Theoretically, this study contributes to the literature by showing that gamification applied in the payment significantly affects the m-payment continuance usage intention. Practically, this research informs the m-payment providers to maintain the gamification elements in their applications to ensure their sustainable use. Limitations and future research directions are also discussed.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Design and implementation of Mobile Electronic Payment Gateway System based on M-Commerce Security Platform (M-Commerce 보안 플랫폼상의 무선 전자지불시스템 설계 및 구현)

  • 김성한;이강찬;민재홍
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.35-50
    • /
    • 2002
  • Recently, payment method is one of the most hot issues for transaction of contents in mobile and internet markets. Many kinds of mobile contents services are rapidly growing with the combination of internet application services. Payment method algorithms are demanded for the stable transaction between producer and consumer. Security protocol algorithms are widely adapted for mobile Platform terminals. In this Paper, we described security mechanism for the current wireless internet services and compared with the performance result. There are security protocols that based on java machine platform or WAP protocols. The system is based on J2ME technology for the java mobile platform. Based on this technology, a security system is proposed for the service of mobile commerce electronic payment. The system is designed for the stability of transaction so that it enables to apply into many kinds of internet payment system.

  • PDF

Implementation of Offline Payment Solution using USIM in IMT-2000 (IMT-2000 단말기용 USIM상에서의 오프라인 지불 솔루션 탑재에 관한 연구)

  • 백장미;하남수;홍인식
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.849-860
    • /
    • 2003
  • As mobile device is becoming more popular, E-Commerce changes into M-Commerce. Especially, IMT-2000 (International Mobile Telecommunication 2000) service is prepared for M-Commerce and this has USIM (Universal Subscriber Identity Module) as a core of certification of individuality and transactions. As a result, the area of mobile service going to expand by USIM. But, mobile services using USIM leave much to be desired, and developed application don't variety. In this paper, for the efficient design of USIM, the structure of USIM and protocol is analyzed, and secure payment solution in USIM is proposed. Specially, offline payment system is proposed for the verification of proposed protocols including security, saving, and calculation of balance. finally, the simulation of proposed payment system on USIM is performed using Java Card.

  • PDF

ID-based Payment Protocol for Mobile Electronic Commerce (모바일 전자상거래를 위한 ID 기반 지불 프로토콜)

  • 이현주;김선신;이충세
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.405-413
    • /
    • 2004
  • Design an efficient and secure electronic payment system is important for M-Commerce. In this paper, we propose an efficient Micro-Payment Protocol that allows multiple transactions using ID-based public key cryptosystem. Current PayWord system requires to generate certificate of the vendor for each transaction. In this paper, we use a session key instead of certificate key generated by Weil Pairing which use an Elliptic Curve Cryptosystem over finite field $F_q$ for transactions Therefore, it is more secure in Known key attacks as well as Man-in-the-middle attacks.

A Security Threats in Wireless Charger Systems in M2M (M2M에서 무선충전 시스템의 보안 위협)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.1
    • /
    • pp.27-31
    • /
    • 2013
  • The fast-paced development in the field of wireless charger based on M2M, which is available anytime and anywhere, is being underway in accordance with the development of IT technology. Wireless charger technology in M2M has various security threats because it is based on wireless network. The purpose of this paper is to examine the threats of authentication and payment attacks based on wireless network attacks, and to propose the response technique that fit the situation of the wireless charger service by modifying the existing detecting authentication and payment through wireless charger.

M-Commerce보안기술동향

  • 류재철
    • Proceedings of the CALSEC Conference
    • /
    • 2002.01a
    • /
    • pp.214-220
    • /
    • 2002
  • 안전한 지불 : M-Payment, M-Cash, M-Banking... 안전한 통신 : TLS, WTLS, ... 인증기술 : Wireless PKI, Smart Card, ... 암호화 기술 : 관용 암호 알고리즘, 공개키 알고리즘, 해쉬 함수 무선인터넷 기술 : WAP, HTTP, ...(중략)

  • PDF

An Optimal Pricing Strategy in An M/M/1 Queueing System Based on Customer's Sojourn Time-Dependent Reward Level (고객의 체류시간의존 보상에 기반한 M/M/1 대기행렬 시스템에서의 최적 가격책정 전략)

  • Lee, Doo Ho
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.7
    • /
    • pp.146-153
    • /
    • 2016
  • This work studies the equilibrium behavior of customers and optimal pricing strategies of the sever in a continuous-time M/M/1 queueing system. In this work, we consider two pricing models. The first one is called the ex-ante payment scheme where the server charges a flat price for all services, and the second one is called the ex-post payment scheme where the server charges a price that is proportional to the time a customer spends in the system. In each pricing model, the departing customer receives the reward that is inversely proportional to his/her sojourn time. The server should make the optimal pricing decisions in order to maximize its expected profit per unit time in each payment scheme. This work also investigates customer's equilibrium joining or balking behaviors under server's optimal pricing strategies. Numerical experiments are conducted to help the server best select one between two pricing models.

Theoretical Grounding of Perceived Risk in Adoption of Mobile Payment System and Behavioural Intention

  • Bharti Ramtiyal;Deepak Verma;Ajay Pal Singh Rathore
    • Asia pacific journal of information systems
    • /
    • v.31 no.4
    • /
    • pp.543-574
    • /
    • 2021
  • This study focuses on a better understanding of the importance of risk perception in adopting Mobile Payment Systems (MPS) by conducting a systematic literature review. From the social science field (using Scopus and Web of Science database) articles were selected. Overall, forty-four significant pieces were determined using a systematic methodology. In addition to providing a summary of the most used theories used to address perceived risk in MPS this paper also investigates the definition for the perceived risk in MPS literature. The study is performed through the identification of dominant theories used to explain perceived risk in the literature. The article gives a thematic analysis of theories and the relation of perceived risk with behavioural intention. As far as we know, this is the first effort of its kind to give a holistic, systematic literature review in light of perceived risk in MPS. Consequently, it is a crucial first step in establishing a solid theoretical framework involving the constructs of perceived risk and laying the groundwork for future research in this area.