Related Work. The primary focus of this work is on the development of online banking in general and the security in online banking in particular. Security in online banking has been an active research subject for many years. This section notes related work. Several references are made in Section 2.1 to work that examines what makes users accept online banking, based on the technology acceptance model. Two other models that are also used to examine the acceptance of technology are the theory of reasoned action and the theory of planned behavior. All three models have been examined in an online banking context. The technology acceptance model has the best fit to determine what makes online banking acceptable [Xxxxxxxxx et al. 2010]. Data was collected for the survey about methods used by banks to authenticate customers, which are discussed in Section 3. Many of these methods have also pre- viously been examined and proposed in the academic field. AlZomai et al. investi- gated the effectiveness of an information scheme that makes the customer verify transactions securely and also proposed a method that implemented such a scheme [AlZomai et al. 2008, 2010]. This scheme is known as What You See Is What You Sign (WYSIWYS). Xxxxxxx and Xxxxxxx proposed several methods that use WYSIWYS [Xxxxxxx and Xxxxxxx 2011]. An alternative to WYSIWYS was proposed by several ACM Computing Surveys, Vol. 49, No. 4, Article 61, Publication date: December 2016. A Survey of Authentication and Communications Security in Online Banking 61:29 authors of this article under the name What You Enter Is What You Sign [Xxxxxx et al. 2014b].
Appears in 6 contracts
Samples: End User Agreement, End User Agreement, End User Agreement