Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A Structural Topic Model for Exploring User Satisfaction with Mobile  Payments

    Jang Hyun Kim1,2,3, Jisung Jang1,3, Yonghwan Kim4, Dongyan Nan1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3815-3826, 2022, DOI:10.32604/cmc.2022.029507 - 16 June 2022

    Abstract This study explored user satisfaction with mobile payments by applying a novel structural topic model. Specifically, we collected 17,927 online reviews of a specific mobile payment (i.e., PayPal). Then, we employed a structural topic model to investigate the relationship between the attributes extracted from online reviews and user satisfaction with mobile payment. Consequently, we discovered that “lack of reliability” and “poor customer service” tend to appear in negative reviews. Whereas, the terms “convenience,” “user-friendly interface,” “simple process,” and “secure system” tend to appear in positive reviews. On the basis of information system success theory, we… More >

  • Open Access

    ARTICLE

    Fully Authentication Services Scheme for NFC Mobile Payment Systems

    Munefah Alshammari*, Shadi Nashwan

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 401-428, 2022, DOI:10.32604/iasc.2022.022065 - 26 October 2021

    Abstract One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC… More >

Displaying 1-10 on page 1 of 2. Per Page