نتایج جستجو برای: automated teller machine atm
تعداد نتایج: 398381 فیلتر نتایج به سال:
The study sought to investigate customers’ satisfaction about the quality, accessibility and challenges associated with electronic banking in Ghana Kumasi Metropolis as Focus. Quantitative research method descriptive design was used. primary data obtained through purposive questionnaire were analyzed using Statistical Package for Social Sciences (SPSS), Principal Component Factor Analysis, Rela...
Using product and system design to influence user behaviour offers potential for improving performance and reducing user error, yet little guidance is available at the concept generation stage for design teams briefed with influencing user behaviour. This article presents the Design with Intent Method, an innovation tool for designers working in this area, illustrated via application to an ever...
R. M. Needham mentioned a Personal Identification Number (PIN) management scheme for Automatic Teller Machine (ATM) transactions which provides enhanced privacy and the responsibility separation [10]. This scheme was described as a rough example which supports his idea on security research under the changing computing environment. Though it shows a new approach to the role separation between a ...
In the context of this paper digital banking refers to online, mobile, and Automated Teller Machine (ATM) banking. Digital banking, particularly online and mobile banking, is growing rapidly in South Africa. This is happening despite heightened security concerns, created in part by the media. The 2008 World Wide Worx and Wits Business School Digital Banking Research found that the level of soph...
In this paper, we propose an operational semantics for UML2SD (Unified Modeling Language 2 Sequence Diagrams) to its equivalent Büchi automaton. The objective of this paper is twofold; first we provide UML2SD with Büchi automaton formal semantics, and second we bridge the gap between theoretic studies to practical studies by improving model transformations. The approach is based on Algebraic gr...
We consider evolvable computational systems built as hierarchies of evolvable components, where an evolvable component is an encapsulation of a supervisory component and its supervisee. Here, we extend our prior work on a revision-based logical modelling framework for such systems to incorporate programs within each component. We describe mechanisms for combining programs, possibly in different...
Impact analysis is an essential part of change management. Without adequate analysis it is not possible to confidently determine the extent, complexity and cost of proposed changes 10 a software system. This diminishes the ability of a developer or mamtainer to make informed decisions regarding the inclusion or rejection of proposed changes. The lack of coherent impact analysis can also hinder ...
There have been many studies on the management of personal information such as PIN code, password, etc. Most schemes include a server containing explicit personal information, and if one can attack this server successfully, then he/she can reach whole personal information on the server. Since information is centralised, the responsibility for services and information is also centralised. There ...
The paper deals with the technical background and the pedagogical issues of a specific implementation for the collection, assessment and archiving of the students' assignments written in Java. The implemented system automatically applies objectoriented metrics on the collected works in order to measure the characteristic features of the assignments. Tutors use these results for the detection of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید