Search results for: mobile banking in Ghana
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2303

Search results for: mobile banking in Ghana

1853 Signature Verification System for a Banking Business Process Management

Authors: A. Rahaf, S. Liyakathunsia

Abstract:

In today’s world, unprecedented operational pressure is faced by banks that test the efficiency, effectiveness, and agility of their business processes. In a typical banking process, a person’s authorization is usually based on his signature on most all of the transactions. Signature verification is considered as one of the highly significant information needed for any bank document processing. Banks usually use Signature Verification to authenticate the identity of individuals. In this paper, a business process model has been proposed in order to increase the quality of the verification process and to reduce time and needed resources. In order to understand the current process, a survey has been conducted and distributed among bank employees. After analyzing the survey, a process model has been created using Bizagi modeler which helps in simulating the process after assigning time and cost of it. The outcomes show that the automation of signature verification process is highly recommended for a banking business process.

Keywords: business process management, process modeling, quality, Signature Verification

Procedia PDF Downloads 400
1852 Study on the OTP Authentication Method and Security for User Mobility in the Cloud

Authors: Jong-Won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.

Keywords: cloud, OTP, mobility, security, authentication

Procedia PDF Downloads 334
1851 Maturity Transformation Risk Factors in Islamic Banking: An Implication of Basel III Liquidity Regulations

Authors: Haroon Mahmood, Christopher Gan, Cuong Nguyen

Abstract:

Maturity transformation risk is highlighted as one of the major causes of recent global financial crisis. Basel III has proposed new liquidity regulations for transformation function of banks and hence to monitor this risk. Specifically, net stable funding ratio (NSFR) is introduced to enhance medium- and long-term resilience against liquidity shocks. Islamic banking is widely accepted in many parts of the world and contributes to a significant portion of the financial sector in many countries. Using a dataset of 68 fully fledged Islamic banks from 11 different countries, over a period from 2005 – 2014, this study has attempted to analyze various factors that may significantly affect the maturity transformation risk in these banks. We utilize 2-step system GMM estimation technique on unbalanced panel and find bank capital, credit risk, financing, size and market power are most significant among the bank specific factors. Also, gross domestic product and inflation are the significant macro-economic factors influencing this risk. However, bank profitability, asset efficiency, and income diversity are found insignificant in determining the maturity transformation risk in Islamic banking model.

Keywords: Basel III, Islamic banking, maturity transformation risk, net stable funding ratio

Procedia PDF Downloads 394
1850 The Effect Analysis of Monetary Instruments through Islamic Banking Financing Channel toward Economic Growth in Indonesia, Period January 2008-December 2015

Authors: Sobar M. Johari, Ida Putri Anjarsari

Abstract:

In the transmission of monetary instrument towards real sector of the economy, Bank Indonesia as monetary authority has developed Islamic Bank Indonesia Certificate (abbreviated as SBIS) as an instrument in Islamic open market operation. One of the monetary transmission channels could take place through financing channel from which the fund is used as the source of banking financing. This study aims to analyse the impact of Islamic monetary instrument towards output or economic growth. Data used in this research is taken from Bank Indonesia and Central Board of Statistics for the period of January 2008 until December 2015. The study employs Granger Causality Test, Vector Error Correction Model (VECM), Impulse Response Function (IRF) technique and Forecast Error Variance Decomposition (FEVD) as its analytical methods. The results show that, first, the transmission mechanism of banking financing channel are not linked to output. Second, estimation results of VECM show that SBIS, PUAS, and FIN have significant impact in the long term towards output. When there is monetary shock, output or economic growth could be recovered and stabilized in the short term. FEVD results show that Islamic banking financing contributes 1.33 percent to increase economic growth.

Keywords: Islamic monetary instrument, Islamic banking financing channel, economic growth, Vector Error Correction Model (VECM)

Procedia PDF Downloads 253
1849 Energy Efficient Routing Protocol with Ad Hoc On-Demand Distance Vector for MANET

Authors: K. Thamizhmaran, Akshaya Devi Arivazhagan, M. Anitha

Abstract:

On the case of most important systematic issue that must need to be solved in means of implementing a data transmission algorithm on the source of Mobile adhoc networks (MANETs). That is, how to save mobile nodes energy on meeting the requirements of applications or users as the mobile nodes are with battery limited. On while satisfying the energy saving requirement, hence it is also necessary of need to achieve the quality of service. In case of emergency work, it is necessary to deliver the data on mean time. Achieving quality of service in MANETs is also important on while. In order to achieve this requirement, Hence, we further implement the Energy-Aware routing protocol for system of Mobile adhoc networks were it being proposed, that on which saves the energy as on every node by means of efficiently selecting the mode of energy efficient path in the routing process by means of Enhanced AODV routing protocol.

Keywords: Ad-Hoc networks, MANET, routing, AODV, EAODV

Procedia PDF Downloads 345
1848 Comparative Analysis of Data Gathering Protocols with Multiple Mobile Elements for Wireless Sensor Network

Authors: Bhat Geetalaxmi Jairam, D. V. Ashoka

Abstract:

Wireless Sensor Networks are used in many applications to collect sensed data from different sources. Sensed data has to be delivered through sensors wireless interface using multi-hop communication towards the sink. The data collection in wireless sensor networks consumes energy. Energy consumption is the major constraints in WSN .Reducing the energy consumption while increasing the amount of generated data is a great challenge. In this paper, we have implemented two data gathering protocols with multiple mobile sinks/elements to collect data from sensor nodes. First, is Energy-Efficient Data Gathering with Tour Length-Constrained Mobile Elements in Wireless Sensor Networks (EEDG), in which mobile sinks uses vehicle routing protocol to collect data. Second is An Intelligent Agent-based Routing Structure for Mobile Sinks in WSNs (IAR), in which mobile sinks uses prim’s algorithm to collect data. Authors have implemented concepts which are common to both protocols like deployment of mobile sinks, generating visiting schedule, collecting data from the cluster member. Authors have compared the performance of both protocols by taking statistics based on performance parameters like Delay, Packet Drop, Packet Delivery Ratio, Energy Available, Control Overhead. Authors have concluded this paper by proving EEDG is more efficient than IAR protocol but with few limitations which include unaddressed issues likes Redundancy removal, Idle listening, Mobile Sink’s pause/wait state at the node. In future work, we plan to concentrate more on these limitations to avail a new energy efficient protocol which will help in improving the life time of the WSN.

Keywords: aggregation, consumption, data gathering, efficiency

Procedia PDF Downloads 473
1847 A Study of the Impact of the Global Financial Crisis on the Financial Performance of Banks in Mauritius

Authors: Narvada Ramdhany, Reena Bhattu Babajee

Abstract:

The 2007-2008 Global Financial Crisis which initiated in the US had a global outreach, impacting the financial and banking sectors of several economies; such as European countries, developing and emerging countries in Asia, Latin America and Africa. European countries represent one of the main sources of export earnings for Mauritius and given that Europe has been quite profoundly affected by the crisis, the Mauritian economy also could have been negatively affected. This study is being undertaken to see if the crisis had a spill-over effect on the Mauritian banking system. It will also enable to determine if the measures put in place to counteract the crisis by regulatory authorities have been effective. The study will be carried out on 17 banks and data will be collected over a time frame of seven years; with a pre-crisis period from 2005 to 2007 and a post-crisis period from 2009 to 2011. The impact of the crisis as such will be measured through the financial performance of the banks, using financial ratios and regression analysis. The results show that during the period concerned Mauritian banks have remained solvent and relatively stable. One of the main explanations put forward to explain the resilience of the banking sector to the crisis is that foreign exposure was relatively low. Another explanation put forward is that Mauritian banks normally transact mainly with prime borrowers unlike most the banks which were affected by the financial crisis.  

Keywords: global financial crisis, banking sector, financial performance, Mauritian banks

Procedia PDF Downloads 419
1846 Modeling Usage Patterns of Mobile App Service in App Market Using Hidden Markov Model

Authors: Yangrae Cho, Jinseok Kim, Yongtae Park

Abstract:

Mobile app service ecosystem has been abruptly emerged, explosively grown, and dynamically transformed. In contrast with product markets in which product sales directly cause increment in firm’s income, customer’s usage is less visible but more valuable in service market. Especially, the market situation with cutthroat competition in mobile app store makes securing and keeping of users as vital. Although a few service firms try to manage their apps’ usage patterns by fitting on S-curve or applying other forecasting techniques, the time series approaches based on past sequential data are subject to fundamental limitation in the market where customer’s attention is being moved unpredictably and dynamically. We therefore propose a new conceptual approach for detecting usage pattern of mobile app service with Hidden Markov Model (HMM) which is based on the dual stochastic structure and mainly used to clarify unpredictable and dynamic sequential patterns in voice recognition or stock forecasting. Our approach could be practically utilized for app service firms to manage their services’ lifecycles and academically expanded to other markets.

Keywords: mobile app service, usage pattern, Hidden Markov Model, pattern detection

Procedia PDF Downloads 310
1845 Mobile Application for Construction Sites Management

Authors: A. Khelifi, M. Al Kaabi, B. Al Rawashdeh

Abstract:

The infrastructure is one of the most important pillars of the UAE, where it spends millions of dollars for investments in the construction sectors. The research done by Kuwait Finance House (KFH) Research showed clearly that the UAE investments in the construction sectors have exceeded 30 billion dollars in 2013. There are many construction companies in the UAE and each one of them is taking the responsibilities to build different infrastructures. The large scale construction projects consist of multi human activities which can affect the efficiency and productivity of the running projects. The Construction Administration System is developed to increase the efficiency and productivity at the construction sites. It runs on two platforms: web server and mobile phone and supports two main users: mobile user and institution employee. With Construction Administration Mobile Application the user can manage and control several projects, create several reports and send these reports in Portable Document Format (PDF) formats through emails, view the physical location of each project, capturing and save photos. An institution employee can use the system to view all existing workers and projects, send emails and view the progress of each project.

Keywords: construction sites, management, mobile application, Portable Document Format (PDF)

Procedia PDF Downloads 354
1844 Hybrid Gravity Gradient Inversion-Ant Colony Optimization Algorithm for Motion Planning of Mobile Robots

Authors: Meng Wu

Abstract:

Motion planning is a common task required to be fulfilled by robots. A strategy combining Ant Colony Optimization (ACO) and gravity gradient inversion algorithm is proposed for motion planning of mobile robots. In this paper, in order to realize optimal motion planning strategy, the cost function in ACO is designed based on gravity gradient inversion algorithm. The obstacles around mobile robot can cause gravity gradient anomalies; the gradiometer is installed on the mobile robot to detect the gravity gradient anomalies. After obtaining the anomalies, gravity gradient inversion algorithm is employed to calculate relative distance and orientation between mobile robot and obstacles. The relative distance and orientation deduced from gravity gradient inversion algorithm is employed as cost function in ACO algorithm to realize motion planning. The proposed strategy is validated by the simulation and experiment results.

Keywords: motion planning, gravity gradient inversion algorithm, ant colony optimization

Procedia PDF Downloads 124
1843 Modelling Forest Fire Risk in the Goaso Forest Area of Ghana: Remote Sensing and Geographic Information Systems Approach

Authors: Bernard Kumi-Boateng, Issaka Yakubu

Abstract:

Forest fire, which is, an uncontrolled fire occurring in nature has become a major concern for the Forestry Commission of Ghana (FCG). The forest fires in Ghana usually result in massive destruction and take a long time for the firefighting crews to gain control over the situation. In order to assess the effect of forest fire at local scale, it is important to consider the role fire plays in vegetation composition, biodiversity, soil erosion, and the hydrological cycle. The occurrence, frequency and behaviour of forest fires vary over time and space, primarily as a result of the complicated influences of changes in land use, vegetation composition, fire suppression efforts, and other indigenous factors. One of the forest zones in Ghana with a high level of vegetation stress is the Goaso forest area. The area has experienced changes in its traditional land use such as hunting, charcoal production, inefficient logging practices and rural abandonment patterns. These factors which were identified as major causes of forest fire, have recently modified the incidence of fire in the Goaso area. In spite of the incidence of forest fires in the Goaso forest area, most of the forest services do not provide a cartographic representation of the burned areas. This has resulted in significant amount of information being required by the firefighting unit of the FCG to understand fire risk factors and its spatial effects. This study uses Remote Sensing and Geographic Information System techniques to develop a fire risk hazard model using the Goaso Forest Area (GFA) as a case study. From the results of the study, natural forest, agricultural lands and plantation cover types were identified as the major fuel contributing loads. However, water bodies, roads and settlements were identified as minor fuel contributing loads. Based on the major and minor fuel contributing loads, a forest fire risk hazard model with a reasonable accuracy has been developed for the GFA to assist decision making.

Keywords: forest, GIS, remote sensing, Goaso

Procedia PDF Downloads 431
1842 Conceptual Model for Knowledge Sharing Model in Creating Idea for Mobile Application

Authors: Hanafizan Hussain

Abstract:

This study shows that several projects will be conducted at the workshop in which using the conceptual model for knowledge sharing approach to create an idea for mobile application. The sharing idea has been done through the collaborative activity in which a group of different field sought to define the mobile application which will lead to new media approach of using social media platform. The collaborative activity will be provided and implemented in the form of one day workshop to determine the approach towards the theme given. The activity later will be continued for four weeks for the participant to prepare for the pitch day workshop. This paper shows the pitch of idea including the interface and prototype for the said products. The collaboration between the members with different field of study shows that social media influenced the knowledge sharing model and its creation or innovations. One of the projects supported a collaborative activity in which a group of young designers sought to define the knowledge sharing model of their ability in creating idea for mobile applications.

Keywords: mobile application, collaborative activity, conceptual knowledge sharing model, social media platform

Procedia PDF Downloads 121
1841 The Effects of Using Telephone and Social Media Applications While Driving in Kuwait

Authors: Bashaiar Alsanaa

Abstract:

Social media have totally converged with social life all around the globe. Using social media applications and mobile phones have become somewhat of an addiction to most people. Driving while using mobile applications falls under such addiction when usage is not of urgency. This study aims to investigate the impact of using such applications while driving in the small rich state of Kuwait, where most people juggle more than one phone for different purposes. Positive and negative effects will be explored in detail as well as causes for these effects and possible reasons. A full range of recommendations will be presented so as to give other countries a specific case study upon which to build solutions and remedies to this emerging and dangerous social phenomenon.

Keywords: social media, driving, mobile applications, communication

Procedia PDF Downloads 339
1840 Willingness to Use Mobile Telephone Technology to Improve Pregnancy Outcomes among Women in Lagos, Nigeria

Authors: O. Onigbogi, M. Onigbogi Jr., O. Ojo

Abstract:

Background: The advances in mobile telephone technology has led to a rise in its use globally which has improved service delivery, empowered businesses and changed the way people access information. The practice of many health professionals has also been affected by the information and communications technology (ICT) revolution because they have better access to information. This study was conducted to assess the willingness to participate in mobile technology interventions to improve pregnancy outcomes in Lagos, Nigeria. Materials and Methods: A total of 238 respondents completed self-administered questionnaires. SPSS version 18 data editor was used to analyze data. Univariate odds ratios and 95% confidence intervals (95 % CI) were used to evaluate the correlates of Willingness to Use (WTU) mobile phones to receive health messages during pregnancy. Results: A total of 107 women (45% of the respondents) reported that they will be willing to receive health-related information on their phones during pregnancy. Greater willingness was associated with higher education (OR = 1.25, 95% CI: 1.13–1.53), involvement with community volunteer organizations (OR = 1.25, 95% CI: 1.05–1.52), monetary incentives (OR = 1.37, 95% CI: 1.14–1.45) and nulliparity (OR = 1.39, 95% CI: 1.02–1.42). Decreased willingness was associated with concerns about wrong interpretation of information (OR = 0.42, 95% CI: 0.21–0.54), poor mobile telephone service by providers (OR = 0.61, 95% CI: 0.52–0.78), increase in number of messages (OR = 0.78, 95% CI: 0.53–0.76). Conclusion: The level of WTU recorded indicates that much work still needs to be done before this novel approach could be used adopted in delivering health-related information. Incentives for would-be subjects should also be a part of the planning to encourage greater participation.

Keywords: mobile, outcomes, pregnancy, technology, telephone

Procedia PDF Downloads 202
1839 Nonlinear Control of Mobile Inverted Pendulum: Theory and Experiment

Authors: V. Sankaranarayanan, V. Amrita Sundari, Sunit P. Gopal

Abstract:

This paper presents the design and implementation of a nonlinear controller for the point to point control of a mobile inverted pendulum (MIP). The controller is designed based on the kinematic model of the MIP to stabilize all the four coordinates. The stability of the closed-loop system is proved using Lyapunov stability theory. The proposed controller is validated through numerical simulations and also implemented in a laboratory prototype. The results are presented to evaluate the performance of the proposed closed loop system.

Keywords: mobile inverted pendulum, switched control, nonlinear systems, lyapunov stability

Procedia PDF Downloads 303
1838 The Influence of Cultural Perceptions in the Preference and Choice of STEM Programs

Authors: Priscilla Adoley Moffat

Abstract:

This study explored perceptions rooted in and acquired from the cultures of many developing countries and how they impact applicants’ preferences and choices of STEM programs. The context of developing countries was chosen for this study because gender role socialization continues to maintain an important place in most of these cultures. This study’s relevance rests in the fact that, as the world takes steps to encourage and promote the choice and study of STEM programs, especially among females, there is a need for efforts towards understanding various cultural perceptions towards some programs of study, particularly STEM programs, which have diverse gender attributions in many developing cultures. Also, as the world strives to achieve gender equity in education, such a study comes in handy, as it provides a useful understanding of the underlying cultural factors that affect study program preferences of applicants, particularly in developing countries like Ghana as well as others in Africa. The study analyzed the admission application data of five public universities in Ghana. 1600 randomly-sampled final-year students of 32 randomly-selected senior high schools from the 16 regions of Ghana were interviewed. Since parents and teachers often guide and influence the study program choices of applicants, the study examined the perceptions of 180 teachers and 360 parents. The study found, among other things, that STEM programs are commonly perceived to pose much more difficulty to females than they do to males. As a result, many female applicants are discouraged from choosing these programs. While nursing programs are perceived more as programs for females, with the justification that females are better caregivers, males are perceived to be better medical doctors, engineers, and computer technicians. Thus, many females are less encouraged to choose Technology and Engineering programs.

Keywords: culture, perceptions, STEM, choice, preference

Procedia PDF Downloads 58
1837 Analysis of User Data Usage Trends on Cellular and Wi-Fi Networks

Authors: Jayesh M. Patel, Bharat P. Modi

Abstract:

The availability of on mobile devices that can invoke the demonstrated that the total data demand from users is far higher than previously articulated by measurements based solely on a cellular-centric view of smart-phone usage. The ratio of Wi-Fi to cellular traffic varies significantly between countries, This paper is shown the compression between the cellular data usage and Wi-Fi data usage by the user. This strategy helps operators to understand the growing importance and application of yield management strategies designed to squeeze maximum returns from their investments into the networks and devices that enable the mobile data ecosystem. The transition from unlimited data plans towards tiered pricing and, in the future, towards more value-centric pricing offers significant revenue upside potential for mobile operators, but, without a complete insight into all aspects of smartphone customer behavior, operators will unlikely be able to capture the maximum return from this billion-dollar market opportunity.

Keywords: cellular, Wi-Fi, mobile, smart phone

Procedia PDF Downloads 342
1836 Independent Encryption Technique for Mobile Voice Calls

Authors: Nael Hirzalla

Abstract:

The legality of some countries or agencies’ acts to spy on personal phone calls of the public became a hot topic to many social groups’ talks. It is believed that this act is considered an invasion to someone’s privacy. Such act may be justified if it is singling out specific cases but to spy without limits is very unacceptable. This paper discusses the needs for not only a simple and light weight technique to secure mobile voice calls but also a technique that is independent from any encryption standard or library. It then presents and tests one encrypting algorithm that is based of frequency scrambling technique to show fair and delay-free process that can be used to protect phone calls from such spying acts.

Keywords: frequency scrambling, mobile applications, real-time voice encryption, spying on calls

Procedia PDF Downloads 453
1835 Social Media Effects on Driving: An Exploratory Study Applied to Drivers in Kuwait

Authors: Bashaiar Alsanaa

Abstract:

Social media have totally converged with social life all around the globe. Using social media applications and mobile phones have become somewhat of an addiction to most people. Driving while using mobile applications falls under such addiction when usage is not of urgency. This study aims to investigate the impact of using such applications while driving in the small, rich state of Kuwait, where most people juggle more than one phone for different purposes. Positive and negative effects will be explored in detail as well as causes for these effects and possible reasons. A full range of recommendations will be presented so as to give other countries a specific case study upon which to build solutions and remedies to this emerging and dangerous social phenomenon.

Keywords: communications, driving, mobile, social media

Procedia PDF Downloads 312
1834 A User Study on the Adoption of Context-Aware Destination Mobile Applications

Authors: Shu-Lu Hsu, Fang-Yi Chu

Abstract:

With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.

Keywords: mobile application, context-aware, privacy concern, TAM

Procedia PDF Downloads 236
1833 Ubiquitous Collaborative Mobile Learning (UCML): A Flexible Instructional Design Model for Social Learning

Authors: Hameed Olalekan Bolaji

Abstract:

The digital natives are driving the trends of literacy in the use of electronic devices for learning purposes. This has reconfigured the context of learning in the exploration of knowledge in a social learning environment. This study explores the impact of Ubiquitous Collaborative Mobile Learning (UCML) instructional design model in a quantitative designed-based research approach. The UCML model was a synergetic blend of four models that are relevant to the design of instructional content for a social learning environment. The UCML model serves as the treatment and instructions were transmitted via mobile device based on the principle of ‘bring your own device’ (BYOD) to promote social learning. Three research questions and two hypotheses were raised to guide the conduct of this study. A researcher-designed questionnaire was used to collate data and the it was subjected to reliability of Cronbach Alpha which yielded 0.91. Descriptive statistics of mean and standard deviation were used to answer research questions while inferential statistics of independent sample t-test was used to analyze the hypotheses. The findings reveal that the UCML model was adequately evolved and it promotes social learning its design principles through the use of mobile devices.

Keywords: collaboration, mobile device, social learning, ubiquitous

Procedia PDF Downloads 128
1832 The Effectiveness of Banks’ Web Sites: A Study of Turkish Banking Sector

Authors: Raif Parlakkaya, Huseyin Cetin, Duygu Irdiren

Abstract:

By the development of World Wide Web, the usage rate of Internet has rapidly grown globally; and provided a basis for the emergence of electronic business. As well as other sectors, the banking sector has adopted the use of internet with the developments in information and communication technologies. Due to the public disclosure and transparency principle of Corporate Governance, the importance of information disclosure of banks on their web sites has increased significantly. For the purpose of this study, a Bank Disclosure Attribute Index (BDAI) in Turkey has been constructed through classifying the information disclosure on banks’ web sites into general, financial, investors and corporate governance attributes. All 47 banks in Turkish Banking System have been evaluated according to the index with the aim of providing a comparison between banks. By Chi Square Test, Pearson Correlation, T-Test, and ANOVA statistical tools, it has been concluded that the majority of banks in Turkey have shared information on their web sites adequately with respect to their total index score. Although there is a positive correlation between various types of information on banks’ web sites, there is no uniformity among them. Also, no significant difference between various types of information disclosure and bank types has been observed. Compared with the total index score averages of the five largest banks in Turkey, there are some banks that need to improve the content of their web sites.

Keywords: internet banking, websites evaluation, customer adoption, Turkey

Procedia PDF Downloads 371
1831 APP-Based Language Teaching Using Mobile Response System in the Classroom

Authors: Martha Wilson

Abstract:

With the peak of Computer-Assisted Language Learning slowly coming to pass and Mobile-Assisted Language Learning, at times, a bit lacking in the communicative department, we are now faced with a challenging question: How can we engage the interest of our digital native students and, most importantly, sustain it? As previously mentioned, our classrooms are now experiencing an influx of “digital natives” – people who have grown up using and having unlimited access to technology. While modernizing our curriculum and digitalizing our classrooms are necessary in order to accommodate this new learning style, it is a huge financial burden and a massive undertaking for language institutes. Instead, opting for a more compact, simple, yet multidimensional pedagogical tool may be the solution to the issue at hand. This paper aims to give a brief overview into an existing device referred to as Student Response Systems (SRS) and to expand on this notion to include a new prototype of response system that will be designed as a mobile application to eliminate the need for costly hardware and software. Additionally, an analysis into recent attempts by other institutes to develop the Mobile Response System (MRS) and customer reviews of the existing MRSs will be provided, as well as the lessons learned from those projects. Finally, while the new model of MRS is still in its infancy stage, this paper will discuss the implications of incorporating such an application as a tool to support and to enrich traditional techniques and also offer practical classroom applications with the existing response systems that are immediately available on the market.

Keywords: app, clickers, mobile app, mobile response system, student response system

Procedia PDF Downloads 353
1830 The Effect of Gender Role Socialization on Marketing of Gendered Products: The Case of Cultural Ghana

Authors: Priscilla Adoley Moffat

Abstract:

One common element of African cultures is gender role socialization. This is a significant component of African cultures because gender roles are considered in these cultures, to define males and females and distinguish males from females. Various studies have established the impact of gender role socialization on individuals, on activities of individuals, including business activities, and on society, in general. This study further examined the effect of gender role socialization on the marketing of gendered products. The study sought to establish whether gender role socialization affects marketing, particularly word-of-mouth marketing, of gender-specific products. For a comprehensive examination of the influence of gender role socialization on word-of-mouth marketing of gendered products, 2150 respondents (1075 males and 1075 females), comprising 550 students of Marketing from various Ghanaian universities/colleges and 1600 other individuals (100 from each of the 16 regions of Ghana, representing the various cultures) were randomly sampled and interviewed. The study found that females are more willing to market male products than males when tasked to market female products. Also, females are more efficient in marketing male products than males in marketing female products. Again, most female audiences feel uncomfortable or embarrassed and are less receptive when approached by a male marketer of female products. Then, the study found that the fear of stigmatization is a major influencer of males’ negative attitude towards marketing of female products and that female marketers of male products, however, suffer less or no stigma. Aside from its addition to the literature on the impact of gender role socialization on marketing and, for that matter, the influence of socialization on marketing, the findings of the study are useful to multinational companies, which become better informed in their strategy when assigning marketing roles, especially in Africa.

Keywords: gender, socialization, marketing, gendered, role, Ghana

Procedia PDF Downloads 43
1829 Factors Influencing the Continuance Usage of Online Mobile Payment Apps: A Case Study of WECHAT Users in China

Authors: Isaac Kofi Mensah, Jianing Mi, Feng Cheng

Abstract:

This research paper seeks to investigate the factors determining the continuance usage of online mobile payment applications among WECHAT users in China. Technology Acceptance Model (TAM) and the Diffusion of Innovation (DOI) theory would both be applied as the theoretical foundation for this study. A developed instrument would be administered to the targeted sample of 1000 WECHAT Users in the City of Harbin, China, through an online questionnaire administration platform. Factors such as perceived usefulness, perceived ease of use, perceived service quality, social influence, trust in the internet, internet self-efficacy, relative advantage, compatibility, and complexity would be explored to determine its significant impact on the continuance intention to use mobile payment apps. This study is at the development and implementation stage. The successful completion of this research article would not only provide an insightful understanding of the factors influencing the decision of WECHAT users in China to use mobile payment applications but also enrich the e-commerce adoption literature.

Keywords: diffusion of innovation (DOI), e-commerce, mobile payment, technology acceptance model (TAM), WECHAT

Procedia PDF Downloads 164
1828 Effect of Management Compensation and Auditor Reputation on Tax Management in the Listed Banking Companies in Indonesia

Authors: Fahreza, Yudhi Herliansyah, Harnovinsah

Abstract:

This study aims to examine how management compensation and auditor reputation effect on corporate tax management in banking using a sample banking companies listed in Indonesia Stock Exchange. At first, this study examines how the influence of management compensation on the implementation of tax management that may be made by management in order to improve the performance of the company. Second, this study also examines the effect of auditor reputation conducting audit on the implementation of the tax management. The population used in this study is the banking companies listed in Indonesia Stock Exchange. The method used was purposive sampling because the samples of this study have certain criteria that are tailored to the purpose of the study. Based on purposive sampling method, the number of samples in this study is 28 samples. Hypothesis tested using multiple regression analysis. The results of this study indicate that on the 5 % significance level, management compensation significantly influenced tax management as measured using the proxy book tax gap. Other result is management compensation does not significantly affect the tax management that measured using a proxy GAAP effective tax rate. In addition the auditor's reputation does significantly influence tax management as measured using the proxy book tax gap and GAAP effective tax rate.

Keywords: tax management, management compensation, auditor reputation, corporate characteristic

Procedia PDF Downloads 283
1827 Communication and Devices: Face to Face Communication versus Communication with Mobile Technologies

Authors: Nuran Öze

Abstract:

With the rapid changes occurring in the last twenty five years, mobile phone technology has influenced every aspect of life. Technological developments within the Internet and mobile phone areas have not only changed communication practices; it has also changed the everyday life practices of individuals. This article has focused on understanding how people’s communication practices and everyday life practices have changed with the smartphone usage. The study was conducted by using in-depth interview method and the research was conducted on twenty Turkish Cypriots who live in Northern Cyprus. According to the research results, communicating via Internet has rapidly replaced face to face communication in recent years. However, results have changed according to generations. Younger generations can easily adapt themselves to technological changes because they are already gaining everyday life practices right now. However, the older generations practices are already present in their everyday life.

Keywords: face to face communication, internet, mobile technologies, north Cyprus

Procedia PDF Downloads 372
1826 Towards Reliable Mobile Cloud Computing

Authors: Khaled Darwish, Islam El Madahh, Hoda Mohamed, Hadia El Hennawy

Abstract:

Cloud computing has been one of the fastest growing parts in IT industry mainly in the context of the future of the web where computing, communication, and storage services are main services provided for Internet users. Mobile Cloud Computing (MCC) is gaining stream which can be used to extend cloud computing functions, services and results to the world of future mobile applications and enables delivery of a large variety of cloud application to billions of smartphones and wearable devices. This paper describes reliability for MCC by determining the ability of a system or component to function correctly under stated conditions for a specified period of time to be able to deal with the estimation and management of high levels of lifetime engineering uncertainty and risks of failure. The assessment procedures consists of determine Mean Time between Failures (MTBF), Mean Time to Failure (MTTF), and availability percentages for main components in both cloud computing and MCC structures applied on single node OpenStack installation to analyze its performance with different settings governing the behavior of participants. Additionally, we presented several factors have a significant impact on rates of change overall cloud system reliability should be taken into account in order to deliver highly available cloud computing services for mobile consumers.

Keywords: cloud computing, mobile cloud computing, reliability, availability, OpenStack

Procedia PDF Downloads 378
1825 Wired Network Services in Mobile Phones

Authors: Subhash Reddy

Abstract:

Mobile communication in today’s world means a lot to the human kind, through this many deals are made and others are broken, within seconds. That is because of our sophisticated methods of transporting the data at very high speeds and to very long distances, within no time. That is also because we kept on changing the method of serving the connections as the no of connections kept on increasing, that has led to many methods like TDMA, CDMA, and FDMA, etc. in wireless communications. And also the areas, where the connections are provided are also divided into CELLS, which are the basic blocks for cellular communications. Along with the wireless network, providing a wired network in mobile phones would serve as a very good alternative and would divert the extra traffic of a cell, so that a CELL which is providing wireless network can operate more efficiently.

Keywords: CDMA, FDMA, TDMA, CELL

Procedia PDF Downloads 466
1824 The Performance of Saudi Banking Industry 2000 -2011: Have the Banks Distinguished Themselves from One Another?

Authors: Bukhari M. S. Sillah, Imran Khokhar, Muhammad Nauman Khan

Abstract:

This paper studies the technical efficiency of Saudi banking sector using stochastic frontier model. A sample of 12 banks over the period 2000-2011 is selected to investigate their technical efficiencies in mobilizing deposits, producing investment and generating income. The banks are categorized as Saudi-owned banks, Saudi-foreign-owned banks and Islamic banks. The findings show some consistent pattern of these bank types; and there exist significant disparities among the banks in term of technical efficiency. The Banque Saudi Fransi stands out as a benchmark bank for the industry, and it is a Saudi-foreign owned bank type. The Saudi owned bank types have shown fluctuating performance during the period; and the Islamic bank types are no significantly different from Saudi-owned bank types.

Keywords: technical efficiency, production frontier model, Islamic banking

Procedia PDF Downloads 460