Nigerian Cashless Banking Policy: A Multi-Aspectual View of Trust Issues Affecting the Adoption of E-Commerce and Other Technology Tools
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4
Abstract
"The growth in Information Technology has led to the transformation of the banking system towards providing efficient services while simultaneously being time and cost effective. This led to the introduction of the cashless policy in Nigeria. Understanding both the negative and positive implications of this policy as well as factors that will help or deter it is crucial to its long-term success hence the use of Aspectual Analysis to dissect the various aspects that influence implementation and rate of adoption. "
Improving Data Distribution in Delay Tolerant Mobile Network
This work center on data dissemination in mobile ad-hoc network. The main operation involved in such networks is the data sharing. The day-to-day increasing demand of wireless communication creates various problems such...
Comparison of Certain Types of Continuous Sampling Plans (CSPs) and its Operating Procedures
"Abstract Sampling is widely used in manufacturing industries and government agencies for controlling the quality of shipments of components, supplies, raw materials and final products. Continuous sampling plans are usef...
SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)
Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they...
Image Resolution Enhancement via Multi Surface Fitting
A new method of image resolution enhancement via multi-surface fitting is proposed. Image resolution generally results in loss of image quality. Therefore image resolution requires interpolation to read between the pixel...
Proposed Approach for Iris Recognition in Security Based Applications
Proposed Approach for Iris Recognition in Security Based Applications