1 |
N. Mallat, M. Rossi, and V. Tuunainen, "Mobile Banking Services," Communications of the ACM, vol 47, no. 8, pp. 42-46, 2004.
|
2 |
KISA, "Forum for Secured Online Transaction", May. 2010.
|
3 |
H. Marko, H. Konstantin, and T. Elena, "Utilizing national public-key infrastructure in mobile payment systems," Electronic Commerce Research and Applications, vol. 7, pp. 214-231, 2008.
DOI
ScienceOn
|
4 |
N. H. Kim, "Voice-based OTP Generation Techniques for Mobile Banking," Journal of KIIT, vol. 11, no. 5, pp. 113-119, 2013.
|
5 |
S. Yun and H. Lim, "The Biometric based Mobile ID and Its Application to Electronic Voting," TIIS, vol. 7, no. 1, pp.166-183, 2013.
DOI
|
6 |
S. Lee, Y. Chung, D. Moon, S. B. Pan and C. Seo, "A Practical Implementation of Fuzzy Fingerprint Vault," TIIS, vol. 5, no. 10, pp. 1783-1798, 2011.
|
7 |
Saaty, T.L. Decision Making with Dependence and Feedback: The Analytic Network Process, 2nd Edition, RWS Publications, Pennsylvania, 2001.
|
8 |
Saaty, T.L. The Analytic Network Process, RWS Publications, Pennsylvania, 1996.
|
9 |
J. H. Lee, "Development of SmartMobile and Information Security," Communications Policy, vol. 22, no. 13, pp. 17-33, 2010.
|
10 |
C. S. Weir, G. Douglas, T. Richardson, and M. Jack, "Usable security: User preferences for authentication methods in eBanking and the effects of experience," Interacting with Computers,vol. 22, no. 3, pp. 153-164, 2010.
DOI
ScienceOn
|
11 |
National Information Society Agency, National Informatization white paper 2012, National Information Society Agency, Seoul, 2012.
|
12 |
G. Kanai, "The Cost of Monoculture," Retrieved from blog, January 29, 2007. http://kanai.net/weblog/archive/2007/01/26/00h53m55s#003095
|
13 |
I. Y. Kang, "The problem is not ActiveX but Public Key Certificate," IT Donga, March 25, 2014. http://it.donga.com/17704/
|
14 |
B. G. Lee, Y. K. Yeo, K. Y. Kim, and J. H. Lee, "Effect of Trust and Cognitive Absorption on Smartphone Use and User Satisfaction," The KIPS Transations: Part D, vol.16, no. 6, pp.471-480, 2010.
|
15 |
Comptroller of Currency, "Internet Banking--Comptroller's Handbook," OCC, Washington, 1999.
|
16 |
P. Hanaeek, K. Malinka, and J. Schafer, "e-Banking Security-A Comparative Study," In Proc. of IEEE International Carnahan Conference on Security Technology, pp. 326-330, 2008.
|
17 |
T. Laukkanen, "Internet vs. mobile banking: comparing customer value perceptions," Business Process Management Journal, vol. 13, no. 6, pp. 788-797, 2007.
DOI
ScienceOn
|
18 |
M. Pura, "Linking perceived value and loyalty in location-based mobile services," Managing Service Quality, vol. 15, no. 6, pp. 509-538, 2005.
DOI
ScienceOn
|
19 |
H. Kim, J. H. Huh, and R. Anderson, "On the Security of Internet Banking in South Korea," Oxford University Computing Laboratory, CS-RP-10-01, University of OXFORD, 2010. http://www.cs.ox.ac.uk/publications/publication3442-abstract.html
|
20 |
H. J. Lim, H. W. Shim, S. H. Seo, and W. J. Kang, "Authentication Technology Status Analysis of Electronic Financial Transaction Environment," Korea Institutes of Information Security and Cryptology, vol. 18, no. 5, pp. 84-98, 2008.
|
21 |
S. C. Hwang, "A study on next generation e-banking Service channel," Information Technology & e-Commerce, vol. 39, pp. 29-54, 2010.
|
22 |
T. Dube, T. Chitura, and L. Runyowa, "Adoption and Use of Internet Banking in Zimbabwe: An Exploratory Study," Journal of Internet Banking and Commerce, vol.14, no.1, pp.1-13, 2009.
|
23 |
D. Sergios, and K. Nikolaos, "Linking Trust to Use Intention for Technology-Enabled Bank Channels: The Role of Trusting Intentions," Psychology & Marketing, vol. 27, no. 8, pp. 799-820, 2010.
DOI
ScienceOn
|
24 |
First Annapolis Consulting, "2012 Mobile Banking and Payment Study," 2012.11
|
25 |
Gartner, "Forecast: Mobile Payment, Worldwide, 2009-2016," 2012.5
|
26 |
S. M. Lee, "Trends of Authentication and Forecast," Information Technology & e-Commerce, vol.46, pp.31-69, 2011.
|
27 |
K. C. Park, S. J. Kim, and B. G. Lee, "Analysis of Security Priorities of u-Learning Environments using ANP," In Proc. of 6th International Conference on Ubiquitous Information Technologies & Applications, Korea, pp. 177-182, 2011.
|
28 |
K. Tracy, "Zeus Strikes Mobile Banking," BankInfo Security, Oct. 2010. http://www.bankinfosecurity.com/articles.php?art_id=3005
|
29 |
A. Castiglione, R. D. Prisco, and A. De Santis, "Do You Trust Your Phone?," EC-Web 2009, LNCS 5692, pp. 50-61, 2009.
|
30 |
McAfee, "Moile security report 2009," 2009. http://www.mcafee.com/us/resources/reports
|
31 |
Bank of Korea, "Domestic Internet Banking Service Trends in 2Q. 2013," Aug., 2013.
|
32 |
P. Kang, "Status of Public Key Certificate and Policy Direction in Mobile Innovation Era," KIISC review, vol.21 no.1, pp.51-56, 2011.
|
33 |
A. Denning, ActiveX Controls Inside Out, 2nd Edition, Microsoft Press, Washington, 1997. http://www.microsoft.com/security/resources/activex-whatis.aspx
|
34 |
Ministry of Science, ICT and Future Planning, "2013 Investigation of Web Compatibility," A press release, January 14, 2014.
|
35 |
The Federation of Korean Industries, "Survey on ActiveX Usage," A press release, March 24, 2014.
|