2019
DOI: 10.1080/10919392.2019.1633123
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of an Additional Factor for Secure Authentication in Online Transactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…The owners of organizations engaged with financial transactions have implemented different secure authentication and authorization procedures at all stages in order to deter electronic transaction fraud [40]. Only approved users must be eligible on the basis of electronic transfers, and only authorized users must, therefore, be able to access details exchanged for payment [42]. On the other hand, strong client authentication should shield the initiation of online payments besides access [43].…”
Section: • Authorization and Authenticationmentioning
confidence: 99%
“…The owners of organizations engaged with financial transactions have implemented different secure authentication and authorization procedures at all stages in order to deter electronic transaction fraud [40]. Only approved users must be eligible on the basis of electronic transfers, and only authorized users must, therefore, be able to access details exchanged for payment [42]. On the other hand, strong client authentication should shield the initiation of online payments besides access [43].…”
Section: • Authorization and Authenticationmentioning
confidence: 99%
“…The past experience of a consumer affects the future purchase decision especially in situations where there was breach in privacy resulting in a cybercrime (Alhouti et al, 2016) which ultimately affects trust and intention to use (Wirtz & Göttel 2016). Khattri & Singh (2019) observed from their experiment and previous studies that although the rate of digitized services (e-services) adoption keeps increasing due to efforts of governments to reduce the fraud associated with physical transactions, there is a concurrent increase in cybercrimes. Cybercrime has been divided into: (a) Account takeover fraud, (b) stolen card fraud, (c) counterfeit (Carneiro et al, 2015;Vardhani et al, 2019), (d) ATM Fraud (Kaur et al, 2018) and (e) phone fraud (Khattri & Singh 2018).…”
Section: Curbing Cybercrimementioning
confidence: 99%
“…The primary purpose of the authentication process is to allow only legitimate users for which they are eligible and prohibit those users who are not valid (Khattri and Singh, 2019;Khattri and Singh, 2018a;Dasgupta et al, 2017;Kennedy and Millard, 2016;Gunson et al, 2011;Barker et al, 2008). At the initial level of security, the most useful authentication process is the password, and it implements in almost all applications.…”
Section: Plastic Card Fraud Prevention Techniques 21 Authenticationmentioning
confidence: 99%