To see the other types of publications on this topic, follow the link: Mobile trading app.

Journal articles on the topic 'Mobile trading app'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile trading app.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

S, Vijaya Kumar R., and Harish Babu S. "Investor’s preference toward mobile stock trading applications." BOHR International Journal of Finance and Market Research 2, no. 1 (2023): 57–60. http://dx.doi.org/10.54646/bijfmr.2023.22.

Full text
Abstract:
In the age of digitization, mobile stock trading has gained popularity quickly. This study sought to determine which mobile trading app was the most popular, why users preferred certain trading apps, and what issues users ran into when trading on their mobile apps. To examine the primary data, this study included factor analysis and the Duncan test. The study consists of 85 convenient sampling of Bangalore city. The findings indicate a significant positive relationship between attitude, perceived behavioral control, trading app, more information, network speedand connectivity, superficial benefits, and intention to select mobile stock trading apps. It finds that faith add senormous descriptive power to perceived behavioral control, mindset, and persuasion in explaining investors’adoption intention of mobile trading apps.
APA, Harvard, Vancouver, ISO, and other styles
2

Imran Ul Amin, Ishfaq Hussain Bhat, Rais Ahmad Itoo, and Anisa Jan. "Behavioural intention to adopt mobile trading apps: an integrated theoretical and digital framework, privacy concerns, and information richness model." Sri Lanka Journal of Social Sciences 47, no. 02 (2025): 123–44. https://doi.org/10.4038/sljss.v47i02.8945.

Full text
Abstract:
This research investigates the transformative impact of mobile trading apps on the Indian financial landscape, particularly in the context of the unprecedented surge in DMAT (dematerialisation) accounts following the COVID-19 pandemic. Due to the advancement of online platforms and fast internet connectivity, stock exchanges across the globe have seen a dramatic inflow of retail investors and brokerage firms. The choice of using a particular mobile trading app draws significant importance because various factors determine the ability and ease of use of a specific app. The study underscores the role of FinTech services, particularly mobile trading apps, in revolutionizing stock trading by offering real-time access, increased trading activity, and enhanced features. Despite the proliferation of research on FinTech apps, a notable gap exists in understanding the adoption dynamics of mobile trading apps, especially in the Indian context. To address this gap, our research applies an adapted and extended version of the Unified Theory of Acceptance and Use of Technology (UTAUT-3) framework to examine the factors influencing investors’ intentions and usage of mobile trading apps. We introduce novel elements such as information richness and privacy concerns, which are crucial in the financial domain. A convenient sample size of 573 actively brokerage app-using respondents was selected to investigate and conclude the consumers’ behavioural intention to use mobile trading apps. The findings highlight the significant impact of practical value, effort expectancy, social influence, hedonic motivation, trust, information richness, privacy concerns, facilitating conditions, and personal innovativeness in IT (Information technology) on investors’ intentions to use trading apps. These factors influence behavioural intentions and mediate the relationship between various constructs, emphasizing their multifaceted roles in shaping user perceptions. Theoretical implications of the research contribute to extending the UTAUT-3 model and providing a comprehensive framework for examining technology adoption in the financial domain. Moreover, practical implications guide developers, financial institutions, and policymakers in creating secure, user-friendly, and information-rich mobile trading systems. While acknowledging sampling and self-reported data limitations, this research lays the groundwork for future longitudinal studies. It encourages the exploration of diverse FinTech services to gain a holistic understanding of adoption dynamics in the evolving financial technology landscape. This study adds empirical knowledge to mobile trading app adoption and catalyzes further research, shaping the trajectory of FinTech studies and practical applications in the ever-evolving financial ecosystem.
APA, Harvard, Vancouver, ISO, and other styles
3

Amudha, Dr R., and Kavin Mugil E. "An Impact of Mobile Trading Apps on Investment Decision of Individual Investors." International Journal of Innovative Research in Engineering and Management 11, no. 2 (2024): 45–49. http://dx.doi.org/10.55524/ijirem.2024.11.2.9.

Full text
Abstract:
In recent years, the investors have increasingly turned to Mobile trading apps for making investments in shares, Bonds and Mutual funds. It is significant to know, whether these Apps affect the investor decision. The study aimed to understand the impact of Mobile trading apps on investment decision of individual investors. This study examined the influence of App recommendations, Ratings, Ease of use, Personalization and Perceived information on investment decision. The Purposive sampling technique is utilized to collect the data from 200 respondents and analysed using Percentage analysis, Chi square analysis, Correlation and Regression analysis. Results indicated that the Mobile trading apps influence the investor decision. The findings will be helpful for prospective investor to use mobile trading apps and assist companies involved in making application to understand the investor preference.
APA, Harvard, Vancouver, ISO, and other styles
4

Kashfia, Sharmeen. "Stock Market Trading through Mobile Application: An Analysis of Reaction to COVID-19." JOURNAL OF ECONOMICS, FINANCE AND MANAGEMENT STUDIES 5, no. 12 (2022): 3931–39. https://doi.org/10.5281/zenodo.7486459.

Full text
Abstract:
This article aims to assess the need for a stock market mobile trading application in a developing country's capital market, such as Bangladesh's, where stock markets have been closed for more than two months during the first stages of the ongoing pandemic. The effect of COVID-19 is tested using an event study to evaluate if it has a statistically significant impact on the adoption rate of the DSE mobile app. A descriptive research approach has been implemented, and a t-statistic has been conducted. According to the statistics, COVID-19 significantly impacts the DSE mobile app adoption rate and the number of buy-sell transactions in Bangladesh's capital market. Compared to the total Beneficiary Owners account holders, only 3.75 percent of investors use the DSE mobile app for transactions. All of this indicates that the stock market in Bangladesh has only partial digitalization, and as a result, it does not provide a suitable platform for coping with negative occurrences. As a result, authorities must encourage the adoption of full-fledged digitizing by involving all stakeholders in the chain to deal with the sudden and long-lasting shock caused by pandemics such as the coronavirus epidemic in 2019.
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Nam Eun, Mi Jin Noh, MuMoungCho Han, and Yang Sok Kim. "A Study of User Responses to Mobile App Updates based on Mobile Trading System Reviews." Academic Society of Global Business Administration 20, no. 6 (2023): 62–81. http://dx.doi.org/10.38115/asgba.2023.20.6.62.

Full text
Abstract:
With the rapid adoption of smart devices inrecent times, the mobile internet-based app market has witnessed significantgrowth across various sectors such as securities, education, and manufacturing.Generally, providers of mobile app services strive to address users' new demandsand challenges by updating their software. Analyzing user responses to updatesis crucial for successful maintenance. In this study, we propose a method toanalyze user reactions using topic modeling techniques applied to user reviews.To achieve this, from the Mobile Trading Systems (MTS) available on the Google Play Store, we selected “Kiwoom Securities Hero Moon S” due to itshighest number of reviews to gather review data. We employed the Latent Dirichlet Allocation (LDA) topic modeling technique to extract topics from thereviews and analyzed the trend of topic changes before and after app updates.The analysis revealed that the topic of connection errors, which dominated post-update reviews, showed a gradually stabilizing trend. However, the user authentication topic indicated an increase in diverse complaints after the app update, highlighting the need to actively address these issues. Additionally,in the case of MTS, the screen layout is very crucial to users, and numerous complaints arose when users' configured screens were reset. Therefore, it is evident that maintaining a consistent user interface is essential for usersatisfaction.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Yaru, Ning Zheng, Ming Xu, et al. "Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App." Sensors 19, no. 14 (2019): 3052. http://dx.doi.org/10.3390/s19143052.

Full text
Abstract:
Mobile payment apps have been widely-adopted, which brings great convenience to people’s lives. However, at the same time, user’s privacy is possibly eavesdropped and maliciously exploited by attackers. In this paper, we consider a possible way for an attacker to monitor people’s privacy on a mobile payment app, where the attacker aims to identify the user’s financial transactions at the trading stage via analyzing the encrypted network traffic. To achieve this goal, a hierarchical identification system is established, which can acquire users’ privacy information in three different manners. First, it identifies the mobile payment app from traffic data, then classifies specific actions on the mobile payment app, and finally, detects the detailed steps within the action. In our proposed system, we extract reliable features from the collected traffic data generated on the mobile payment app, then use a series of well-performing ensemble learning strategies to deal with three identification tasks. Compared with prior works, the experimental results demonstrate that our proposed hierarchical identification system performs better.
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Hyungjoon. "Use of Mobile Grocery Shopping Application: Motivation and Decision-Making Process among South Korean Consumers." Journal of Theoretical and Applied Electronic Commerce Research 16, no. 7 (2021): 2672–93. http://dx.doi.org/10.3390/jtaer16070147.

Full text
Abstract:
With the revitalization of the online grocery trading market, many consumers are using mobile applications to purchase groceries. Although past studies were conducted on online grocery purchases, few measured mobile app users in a conceptual model that combines both motivational needs and behavioral components. Grounded in the uses and gratifications theory and the theory of planned behavior, this study investigated utilitarian motives, hedonic motives, experiential motives, attitudes, subjective norms, perceived behavioral control, purchase intention, and purchase behavior among mobile grocery app users in South Korea. As an additional analysis, a comparison between users and non-users of mobile grocery apps was implemented. The results showed that the utilitarian motives of grocery app users significantly influenced attitudes, attitudes and subjective norms influenced user intention, and user intention influenced grocery purchase behavior. Users showed statistically higher utilitarian motives, hedonic motives, and attitudes than non-users. The results suggest that South Korean consumers hold positive attitudes toward mobile grocery shopping and that the opinions of others may influence the decision to use the services. Mobile groceries in South Korea may have the potential for continued growth if individuals’ perceived control of the service improves. Implications and suggestions for future research are discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

.Sriram, M. "Mobile App for Direct Market Access for Farmers." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47279.

Full text
Abstract:
Abstract— The supply chains that are bifurcated have middlemen constituencies, which take away most of the consumer price margins and give the farmer little to nothing. The Indian agricultural sector is indeed the largest employer in terms of workforce. Primitive rural infrastructure, nontransparency pertaining to pricing in the usually traditional mandis, and very poor technology adoption aggrandize all these factors forcing the farmers to take any price, just there at that moment. That's why 'Mobile App for Direct Market Access' becomes relevant to fill those gaps with a digital platform connecting farmers as well consumers, retailers, and institutional buyers. Farmers acquire here a dashboard through which to showcase their merchandise, check live market data, set their casts, track their sales, get their payday, and analyze their performance. The buyers, on the other hand, are able to search, compare, and order produce traceably, securely paid, and with feedback systems-all through the app. The app also goes offline and incorporates logistics. This is going to create a bigger margin of profit-three for the farmers. Also, a larger share of splashing profits for the farmers along with access to formal financial service against their digital records of transactions becomes possible. For consumers, it means the acquisition of fresh produce at much lesser rates, but with transparency of procurement. Thus, this innovation represents the timely dimension for an inclusive growth revolution in the restructuring of agricultural trading with empowered and engaged stakeholders, meaningfully contributing to adoption of such changes. Keywords— Direct Market Access, Agricultural Supply Chain, AgriMarket App, Direct Farm-to-Buyer Platform, AgriCommerce, Smart AgriCommerce Platform
APA, Harvard, Vancouver, ISO, and other styles
9

Saputra, Ridho, Silvana Rasio Henim, and Anggy Trisnadoli. "Pengembangan Sistem Informasi Akuntansi Kios Ikan Laut berbasis Web dan Mobile." Journal of Applied Computer Science and Technology 3, no. 2 (2022): 186–92. http://dx.doi.org/10.52158/jacost.v3i2.361.

Full text
Abstract:
Buyung Fitri's sea fish stand is a trading business that provides fresh sea fish which it operates in the Senapelan, Pekanbaru. This stand is capable of handling wholesale and retail sales. The absence of financial records that should be required in the trading business is a problem for the stand’s owner. Therefore, a recommendation solution is given to the owner to build a website system. This system can manage transactions that occur in the sea fish business to become financial reports. This system is build based on a website using the PHP CodeIgniter framework and MySQL. In addition, this study also built a mobile app that is used to view financial reports needed by users later. Based on black box testing, it can be concluded that both systems can run well. Then based on performance testing, it can be concluded that the website system built can be accessed quickly. While the android system has low memory usage so it can run well.
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Yong, Xiangzhou Zhang, Bin Feng, Kang Xie, and Mei Liu. "iTrade." International Journal of Data Warehousing and Mining 11, no. 1 (2015): 66–83. http://dx.doi.org/10.4018/ijdwm.2015010104.

Full text
Abstract:
Among all investors in the Chinese stock market, more than 95% are non-professional individual investors. These individual investors are in great need of mobile apps that can provide professional and handy trading analysis and decision support everywhere. However, financial data is challenging to analyze because of its large-scale, non-linear and noisy characteristics in a varying stock environment. This paper develops a Mobile Data-Driven Stock Trading System (iTrade), which is a mobile app system based on Client-Server architecture and various data mining techniques. The iTrade is characterized by 1) a data-driven intelligent learning model, which can provide further insight compared to empirical technical analysis, 2) a concept drift adaptation process, which facilitates the model adaptation to market structure changes, and 3) a rigorous benchmark analysis, including the Buy-and-Hold strategy and the strategies of three world-famous master investors (e.g., Warren E. Buffett). Technologies used in iTrade include the Least Absolute Shrinkage and Selection Operator (Lasso) algorithm, Support Vector Machine (SVM) and risk-adjusted portfolio optimization. An application case of iTrade is presented, which is based on a seven-year (2005-2011) back-testing. Evaluation results indicated that iTrade could gain much higher cumulative return compared to the benchmark (Shanghai Composite Index). To the best of our knowledge, this is the first study and mobile app system that emphasizes and investigates the concept drift phenomenon in stock market, as well as the performance comparison between data-driven intelligent model and strategies of master investors.
APA, Harvard, Vancouver, ISO, and other styles
11

Muneerali Thottoli, Mohammed, Tif Said Suhail Al Mazroui, Duaa Suleiman Amur Al Hoqani, and Maather Mohammed Al-Alawi. "Marketing Potential of Homemade Food: a New Entrepreneurial Endeavour." Multidisciplinary Business Review 16, no. 2 (2023): 53–65. http://dx.doi.org/10.35692/07183992.16.2.5.

Full text
Abstract:
This study aims to examine the marketability of homemade food and to understand the need for an entrepreneurial venture start-up in Oman. In addition, it explores barriers to buying or selling homemade food. The research is based on a qualitative study using purposive sampling techniques by an indepth interview with 83 aspirant buyers and sellers of homemade food. The study’s findings confirm that the marketability of homemade food can be achieved by developing a unique application for trading these products, that will help to avoid barriers to buying or selling. Most respondents preferred eating homemade food rather than restaurant or commercially prepared food. These research findings provide entrepreneurs with some insight in terms of new venture start-ups for marketing homemade food in niche markets. This research comprises a specific approach to the marketability of homemade food and suggests a unique mobile app for trading homemade food. The data was gathered in Nizwa, Oman, however it could be broadened to encompass more geographic regions, particularly urban areas. The research results, achieved using qualitative methodologies, contribute significantly to the body of existing literature. It enhances value in analysing probable barriers among aspirant buyers and sellers of homemade food.
APA, Harvard, Vancouver, ISO, and other styles
12

Chandu, Venkateswarlu, Archi Agarwal, Tummala Likitha, Bindu Sri Datla, and Rubi Shagufta. "Prediction ARIMA Model-based Investor’s Perception on Stock Market Apps." Journal of Sensors, IoT & Health Sciences 2, no. 4 (2024): 56–68. https://doi.org/10.69996/jsihs.2024021.

Full text
Abstract:
The advent of stock trading apps has revolutionized the landscape of stock market participation, particularly among retail investors. This study investigates the impact of stock trading apps on the behaviour of retail investors in the stock market, the impact of social media In growing importance of online trading app and the opportunities for budding investors that the growth of stock market apps has brought with itself. Our findings indicate the changes brought in the economy through mobile trading apps and how it has significantly contributed to FinTech not just economically but also financially. This paper investigates the use of hybrid models combining ARIMA (AutoRegressive Integrated Moving Average) and LSTM (Long Short-Term Memory) for stock price prediction, aiming to improve forecast accuracy in financial markets. The study evaluates the predictive performance of both models individually and in combination across a set of eight stocks: AAPL, TSLA, MSFT, AMZN, NVDA, GOOG, FB, and BABA. The ARIMA model demonstrated varying levels of success, with predicted price changes ranging from +1.5 for GOOG to +10.5 for AAPL. The LSTM model provided stronger predictions, with AAPL seeing a predicted increase of +7.8 and TSLA a predicted increase of +9.4. When combined, the hybrid model generated more reliable predictions, with the combined predicted price for AAPL being 160.5 (up from a current price of 150) and for TSLA 627.25 (up from 620). Automated ranking and classification based on the combined predictions showed that stocks such as AAPL and TSLA were expected to increase by +10.5 and +8.3, respectively, while FB and BABA were predicted to decrease by -1.2 and -2.5.
APA, Harvard, Vancouver, ISO, and other styles
13

Berkovich, Margarita I., and Makar N. Ermolaev. "Socio-economical aspect of retail trade networks in the region (on the example of the Kostroma region)." Social And Political Researches 1, no. 10 (2021): 70–85. http://dx.doi.org/10.20323/2658-428x-2021-1-10-70-85.

Full text
Abstract:
The article examines the state of network retail trade carried out by federal and regional trade enterprises and its role in the economy of a particular region of Kostroma region. The role of this type of economic activity revealed in the socio-economic system. The most important feature is plurality of trading formats. The aggressive nature shown of the activities federal retail networks. It manifested in a significant growth in retail outlets of these structures. The main directions of attraction are a wide range of products, flexible pricing policy, use of modern technologies, expansion of loyalty programs, including the use of mobile app. The specific of the positioning have been determined for Magnit, X5 Retail Group and LENTA. Competitors to federal retail networks are several trading enterprises of Kostroma networks retailers. They continue to develop dynamically by opening shops not only in regional cities, but also in neighboring regions. Moreover, each of them has a certain strategy focused on a specific segment of consumers. The regional trade networks cooperation with local producers. It allows them to compete with federal retail networks. A comparative analysis of retail prices carried out for socially significant food and non-food products, which made it possible to assess the degree of attractiveness of the services of retail trade networks, federal and regional levels. The experience of the introducing modern formats of trade services for buyers has been summarised by federal and local market. The main directions of improving trade has been established by regional players.
APA, Harvard, Vancouver, ISO, and other styles
14

Moody, Jessica. "Decolonizing Memory in Bristol." Radical History Review 2025, no. 152 (2025): 91–110. https://doi.org/10.1215/01636545-11609968.

Full text
Abstract:
Abstract The toppling of enslaver Edward Colston’s statue in the former slave-trading port city of Bristol by Black Lives Matter protesters in June 2020 was a seismic event that sent shock waves around the world. It was one action of many in a city that has grappled for over thirty years with how to understand, acknowledge, and commemorate in public its history of enslavement. Written from a position of engaged memory activism, this article reflects on the collaborative public memory project Decolonising Memory: Digital Bodies in Movement. Working across academic, community, creative, and digital arts sectors and through an African-centered methodology, the project sought to make a meaningful, new intervention in Bristol’s long and contested public memory of transatlantic enslavement after Colston’s fall. The project centered a radical decolonial praxis by using dance, movement, and creativity as a method for researching different kinds of knowledge about past and present. This article considers two major outputs of this work: a new memorial folk dance and an augmented-reality mobile phone app. It argues that the project was radical in its conception as an African-centered anti-monumental act of counter-memory cocreated “from below” through alternative arts and performance-based memorialization.
APA, Harvard, Vancouver, ISO, and other styles
15

Victor, Nicholas, and Moehammad Gafar Yoedtadi. "Iklan Bibit di YouTube Memengaruhi Pemakaian Aplikasi Bibit." Prologia 8, no. 1 (2024): 18–23. http://dx.doi.org/10.24912/pr.v8i1.21551.

Full text
Abstract:
Seeds is a mobile application-based online platform for stock and mutual fund investments. Launched simultaneously in 2019 and mainly used by the millennial generation with OJK permission. The capital market is currently being influenced by developments in advertising information technology. This exchange trading system was originally operated manually. Online securities trading systems, on the other hand, are a recent innovation that has emerged because of the growth of information technology. Therefore, the purpose of this research is to find out how advertisements on YouTube are used to attract interest in using the Seeds application. This study used a quantitative method with primary data obtained by distributing questionnaires to each of the 100 respondents. The Independent Sample T Test is the method of analysis, and an analysis program called SPSS Version 25 is used. Based on the findings of this study, Untar Communication Faculty students have very different levels of interest in utilizing the Seeds application in terms of its service features. Regarding issues that have recently had a negative impact on investment, people's interest in using Seeds varies greatly. Users also experience feelings of insecurity because of this problem. As a result, researchers want to see if there are Seed advertisements on YouTube and whether this Seed application will make users feel safe and comfortable. Currently creating an advertisement for the Seeds app on YouTube to encourage students to use it as a place to invest in the digital age. Bibit adalah platform online berbasis aplikasi mobile untuk investasi saham dan reksadana. Diluncurkan secara bersamaan pada tahun 2019 dan terutama digunakan oleh generasi milenial dengan izin OJK. Pasar modal saat ini sedang dipengaruhi oleh perkembangan teknologi informasi periklanan. Sistem perdagangan bursa ini awalnya dioperasikan secara manual. Sistem perdagangan efek online, di sisi lain, merupakan inovasi baru yang muncul sebagai hasil dari pertumbuhan teknologi informasi. Maka dari itu tujuan dari penelitian ini adalah untuk mengetahui iklan di YouTube digunakan untuk menarik minat menggunakan aplikasi Bibit. Penelitian ini menggunakan metode kuantitatif dengan data primer yang diperoleh dengan membagikan kuesioner kepada masing-masing 100 responden. Uji T Sampel Independen adalah metode analisis, dan program analisis yang disebut SPSS Versi 25 digunakan. Berdasarkan temuan penelitian ini, Mahasiswa Fakultas Ilmu Komunikasi Untar memiliki tingkat ketertarikan yang sangat berbeda dalam memanfaatkan aplikasi Bibit dari segi fitur layanannya. Terkait isu-isu yang akhir-akhir ini berdampak negatif terhadap investasi, minat masyarakat untuk menggunakan Bibit sangat bervariasi. Pengguna juga mengalami perasaan tidak aman sebagai akibat dari masalah ini. Alhasil, peneliti ingin melihat apakah ada iklan Bibit di YouTube dan apakah aplikasi Bibit ini akan membuat pengguna merasa aman dan nyaman. Sedang membuat iklan untuk aplikasi Bibit di YouTube untuk mendorong siswa menggunakannya sebagai tempat berinvestasi di era digital.
APA, Harvard, Vancouver, ISO, and other styles
16

Radavičiūtė, Živilė. "Ar mobiliųjų prekybos finansinėmis priemonėmis programų reglamentavimas užtikrina investuotojų teisių apsaugą?" Law Review 26, no. 2 (2022): 57–83. http://dx.doi.org/10.7220/2029-4239.26.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Tahir, Muhammad, Asim Rafiq, and Danish Hassan. "Designing, Planning & Implementation of IT Infrastructure & Security for A Brokerage House." Sir Syed University Research Journal of Engineering & Technology 8, no. 1 (2018): 6. http://dx.doi.org/10.33317/ssurj.32.

Full text
Abstract:
M-Commerce is widely known as wireless network technology, use as the essential means of communication forbusiness transactions. Mobile commerce is seen as an augmentation of E-commerce empowered by cell phones.Transactions either indirectly or directly carried out or supported through mobile phones. ABC Brokerage House is the pioneer in Online Trading Services. In online trade, customers can trade using the online trade software and website. Before switching users, from traditional trading system to mobile trading system, the weaknesses of infrastructure, security breaches, and risk factors should be considered carefully. The infrastructure solution should be designed with respect to interoperability, security, scalability, non-repudiation of ABC Brokerage House on the behalf of best practices for Mobile Commerce Trading System. The solution has its distributed nature and is a suitable architecture for managing business processes of ABC Stock Brokerage House. The solution is wellplanned, designed and it is in accordance with ISO recommendation. The solution provides more flexibility and alsoprovides redundancy by using clustering of database server. The proposed solution provides more flexibility and also provides redundancy plan and clustering of database server. This solution also switches ABC Brokerage House infrastructure to the real world infrastructure by removing risk factors and implementing the latest technologies.
APA, Harvard, Vancouver, ISO, and other styles
18

Tahir, Muhammad, Asim Rafiq, and Danish Hassan. "Designing, Planning & Implementation of IT Infrastructure & Security for A Brokerage House." Sir Syed University Research Journal of Engineering & Technology 8, no. 1 (2018): 6. http://dx.doi.org/10.33317/ssurj.v8i1.32.

Full text
Abstract:
M-Commerce is widely known as wireless networktechnology, use as the essential means of communication forbusiness transactions. Mobile commerce is seen as anaugmentation of E-commerce empowered by cell phones.Transactions either indirectly or directly carried out orsupported through mobile phones. ABC Brokerage House is thepioneer in Online Trading Services. In online trade, customerscan trade using the online trade software and website. Beforeswitching users, from traditional trading system to mobiletrading system, the weaknesses of infrastructure, securitybreaches, and risk factors should be considered carefully. Theinfrastructure solution should be designed with respect tointeroperability, security, scalability, non-repudiation of ABCBrokerage House on the behalf of best practices for MobileCommerce Trading System. The solution has its distributednature and is a suitable architecture for managing businessprocesses of ABC Stock Brokerage House. The solution is wellplanned, designed and it is in accordance with ISOrecommendation. The solution provides more flexibility and alsoprovides redundancy by using clustering of database server. Theproposed solution provides more flexibility and also providesredundancy plan and clustering of database server. This solutionalso switches ABC Brokerage House infrastructure to the realworld infrastructure by removing risk factors and implementingthe latest technologies.
APA, Harvard, Vancouver, ISO, and other styles
19

Tahir, Muhammad, Asim Rafiq, and Danish Hassan. "2 Designing, Planning & Implementation of IT Infrastructure & Security for A Brokerage House." Sir Syed Research Journal of Engineering & Technology 1, no. 1 (2018): 6. http://dx.doi.org/10.33317/ssurj.v1i1.32.

Full text
Abstract:
M-Commerce is widely known as wireless networktechnology, use as the essential means of communication forbusiness transactions. Mobile commerce is seen as anaugmentation of E-commerce empowered by cell phones.Transactions either indirectly or directly carried out orsupported through mobile phones. ABC Brokerage House is thepioneer in Online Trading Services. In online trade, customerscan trade using the online trade software and website. Beforeswitching users, from traditional trading system to mobiletrading system, the weaknesses of infrastructure, securitybreaches, and risk factors should be considered carefully. Theinfrastructure solution should be designed with respect tointeroperability, security, scalability, non-repudiation of ABCBrokerage House on the behalf of best practices for MobileCommerce Trading System. The solution has its distributednature and is a suitable architecture for managing businessprocesses of ABC Stock Brokerage House. The solution is wellplanned, designed and it is in accordance with ISOrecommendation. The solution provides more flexibility and alsoprovides redundancy by using clustering of database server. Theproposed solution provides more flexibility and also providesredundancy plan and clustering of database server. This solutionalso switches ABC Brokerage House infrastructure to the realworld infrastructure by removing risk factors and implementingthe latest technologies.
APA, Harvard, Vancouver, ISO, and other styles
20

Hasnain, Sayed Izharul, Sanjukta Mohanty, Dr Krishna Kavita Acharya, and Dr Bhagabat Behera. "Role of Fintech in the growth of Indian stock broking industry with special reference to Algo trading & mobile trading." Asian Journal of Management and Commerce 4, no. 2 (2023): 202–8. http://dx.doi.org/10.22271/27084515.2023.v4.i2c.210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Agustina, Duwi. "Extension of Technology Acceptance Model (Etam): Adoption of Cryptocurrency Online Trading Technology." Jurnal Ekonomi 24, no. 2 (2019): 272. http://dx.doi.org/10.24912/je.v24i2.591.

Full text
Abstract:
The main idea of the study was to determine the influence of the antecedents (trialability and compexity) on the existing constructs of Technology Acceptance Model (TAM) and to test measurement invariance on the relationship between the latent constructs used in this extended version of Technology Acceptance Model (ETAM). A survey questionnaire was administered on Cyptocurrency mobile applicantions users and a total of 41 responses were collected. The research model was assessed using SEM-PLS approach. The structural model was then tested in order to establish validity & reliabelity. The invariance test was first performed on the measurement model and then on the structural model using SmartPLS 3.0. The predictor variables in ETAM were able to explain 44,9% of the variance in actual usage of Cryptocurrency mobile applications.
APA, Harvard, Vancouver, ISO, and other styles
22

Ramadhani, Raja Almas, Melani Defina Maharani, Joy Noeliona Ruth, and Ida Farida Adi Prawira. "UTILIZATION OF MOBILE TECHNOLOGY AS MARKETING TOOLS IN THE DIGITAL ERA: APPLICATION & CHALLENGES." JIKA (Jurnal Informatika) 7, no. 4 (2023): 388. http://dx.doi.org/10.31000/jika.v7i4.9707.

Full text
Abstract:
Human life and civilization in the 21st century have increasingly developed based on information technology. The 21st century is a century of openness or globalization; this means that human life today has undergone fundamental changes that have differed from the previous century's life system. These changes cover all aspects of life, including using mobile technology as a marketing tool. The 21st century is a digital era, where the use of digital devices, including mobile technology, is rare and difficult for today's society. This research conducts analysis using a literature review of the extent to which the utilization of mobile technology as a marketing tool is used in terms of application & challenges. This research has reviewed 44 journals from 24 countries in the sectors/industries of Agriculture, Food and drink, Education and services, Retail Business, Tours and travel, Trading Companies, and Others. The results show that mobile application companies, websites, social media, e-mail marketing, and e-commerce have utilized mobile technology as a marketing tool. However, its implementation has several obstacles and challenges; this utilization has had a positive impact and business improvement for the company's business growth.
APA, Harvard, Vancouver, ISO, and other styles
23

Chandan, Madhavarapu, Sanakkayala Sri Venkat Sumanth, Garapati Samhita, and Kathi Priyanka Reddy. "Design & Development of a Home Security System Using IOT." International Journal of Engineering & Technology 7, no. 2.32 (2018): 374. http://dx.doi.org/10.14419/ijet.v7i2.32.15717.

Full text
Abstract:
The present existing frameworks are intended for short range PAN applications that have a few constraints as of, the application is fit in with a short scope territory and the framework ends if as far as possible crosser certain incentive next is the quantity of parameters the framework screens are less and the last one is the framework is just a solitary way or a simplex correspondence framework .i.e., the past frameworks are just ready frameworks and are not controllable. As talked about over the present tasks faces certain difficulties. Henceforth to defeat those impediments this paper proposes certain adjustments to the first framework which tends the framework to enhance its execution and offer fulfilling comes about that makes the general framework simple to deal with, work and reasonable without trading off the security requirements with assist of sensors. A Microcontroller and Global system for mobile communications which is a mobile system integrated with the sensors; All this system sent an SMS for the client for alert. Then User can give instructions as required via mobile.
APA, Harvard, Vancouver, ISO, and other styles
24

Desca Refita Putri, Yesty. "Pembuatan Motion Graphics sebagai Media Sosialisasi & Promosi untuk Aplikasi Mobile Trading Online Mandiri Sekuritas." KOPERTIP : Jurnal Ilmiah Manajemen Informatika dan Komputer 1, no. 2 (2017): 85–92. http://dx.doi.org/10.32485/kopertip.v1i02.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Lei, Wang, Gao Chuncheng, Zhang Qian, and Dai Yong. "The priority classification method of mobile users under direct power transaction." MATEC Web of Conferences 242 (2018): 01013. http://dx.doi.org/10.1051/matecconf/201824201013.

Full text
Abstract:
With the development of mobile internet technology, market-oriented electricity reform forms a new transaction mode that "Internet + power trading", which further promotes the liberalization of retail side market. A large number of mobile power users actively participate in the electricity market transaction. However, the current standards for mobile users who are accessed to the market are qualitative standards, lacking of quantitative analysis. The priority classification method of mobile users under direct power transaction is proposed in the paper. First, the priority evaluation index set of mobile users is established from four dimensions that credit condition, environmental condition, power consumption condition and load importance to achieve evaluation quantitatively. Secondly, Kmeans clustering algorithm based on SOM is used to cluster mobile users. Finally, the paper recognizes the various types of mobile users as a whole and estimates their priorities using the improved AHP(Analytic Hierarchy Process).The method realizes the specific division of mobile users from a point of quantitative view, and solves the problem of only qualitative standard currently, to optimize the development of direct power transaction and promote the marketization of power market.
APA, Harvard, Vancouver, ISO, and other styles
26

Yudha Satria Prawira and Kushariyadi. "ANALISIS KEBUTUHAN MOBIL TANGKI DALAM PROSES DISTRIBUSI BBM PADA SPBU DI INTEGRATED TERMINAL PT. XYZ." Journal of Social and Economics Research 5, no. 2 (2024): 2122–32. http://dx.doi.org/10.54783/jser.v5i2.321.

Full text
Abstract:
BBM memiliki peran penting dalam perekonomian nasional dan permintaannya meningkat seiring dengan pertumbuhan populasi dan sektor industri di Indonesia. PT. ABC sebagai perusahaan energi nasional berkomitmen dalam bisnis minyak, gas, dan energi baru terbarukan. PT.XYZ, sebagai Sub Holding Commercial & Trading, bertanggung jawab dalam pemasaran dan pengendalian BBM. PT.XYZ di Sumatera Barat mengelola penerimaan, penyimpanan, dan distribusi BBM. Stasiun Pengisian Bahan Bakar Umum (SPBU) penting untuk memenuhi kebutuhan masyarakat, ada kekurangan dalam efektivitas dan efisiensi pendistribusian BBM menggunakan armada mobil tangki Integrated Terminal PT.XYZ. Implementasi metode yang digunakan dalam penentuan jumlah kebutuhan unit mobil tangki yaitu menggunakan metode proposional lebih efektif dan efisien daripada metode cluster dalam menentukan jumlah kebutuhan mobil tangki. Evaluasi menunjukkan bahwa metode proposional membutuhkan 154 unit mobil tangki dengan ritase 1,9 rit/hari. Metode ini dapat mengurangi biaya sewa dan perawatan mobil tangki.
APA, Harvard, Vancouver, ISO, and other styles
27

Behera, Ranjan, Sushree Das, Santanu Rath, Sanjay Misra, and Robertas Damasevicius. "Comparative Study of Real Time Machine Learning Models for Stock Prediction through Streaming Data." JUCS - Journal of Universal Computer Science 26, no. (9) (2020): 1128–47. https://doi.org/10.3897/jucs.2020.059.

Full text
Abstract:
Stock prediction is one of the emerging applications in the field of data science which help the companies to make better decision strategy. Machine learning models play a vital role in the field of prediction. In this paper, we have proposed various machine learning models which predicts the stock price from the real-time streaming data. Streaming data has been a potential source for real-time prediction which deals with continuous ow of data having information from various sources like social networking websites, server logs, mobile phone applications, trading oors etc. We have adopted the distributed platform, Spark to analyze the streaming data collected from two different sources as represented in two case studies in this paper. The first case study is based on stock prediction from the historical data collected from Google finance websites through NodeJs and the second one is based on the sentiment analysis of Twitter collected through Twitter API available in Stanford NLP package. Several researches have been made in developing models for stock prediction based on static data. In this work, an effort has been made to develop scalable, fault tolerant models for stock prediction from the real-time streaming data. The Proposed model is based on a distributed architecture known as Lambda architecture. The extensive comparison is made between actual and predicted output for different machine learning models. Support vector regression is found to have better accuracy as compared to other models. The historical data is considered as a ground truth data for validation.
APA, Harvard, Vancouver, ISO, and other styles
28

Candra Eka Prasetiya, Audita Nuvriasari, Azwar, Nurul Putri Ardiani, and Mifta Ul’Ulum. "Development Program on Digital Marketing and Brand Strengthening for Cellular Businesses in Gunungkidul Regency." IMPACTS: International Journal of Empowerment and Community Services 1, no. 1 (2022): 30–36. http://dx.doi.org/10.30738/impacts.v1i1.13065.

Full text
Abstract:
The development of communication technology has boosted the level of business competition, one of which is SMEs selling mobile phones. Msellular & Apple Store is one of the SMEs engaged in mobile phone trading and is located in Wonosari, Gunungkidul, DIY. The business problems faced by Msellular & Apple Store are (1) Social media as an online marketing tool has not been used optimally (2) The identity or brand of the store is not well known by the local community (3) There is no customer database that can be used as a source of marketing programs.
 The solution to solve that problem are: (1) Optimizing the use of social media through improving design and content, (2) Strengthening store branding through collaboration with other parties and (3) Develop a customer database based on information technology.
 The methods used in this program are: (1) counseling, (2) training and (3). Mentoring. The counseling carried out is educating partners about strategies for strengthening brands and expanding cooperation networks. Training activities include: (1). content creation for marketing through social media and (2). create a customer database based on IT. Mentoring is intended to monitor program implementation. The results of this activity are: (1). content on social media is increasingly attractive and used as a marketing tool, (2). the establishment of cooperation with other parties to strengthen the store brand and (3). availability of customer database to support marketing activities.
APA, Harvard, Vancouver, ISO, and other styles
29

Ejeh, Patrick Ogholuwarami, Margaret Dumebi Okpor, Rume Elizabeth Yoro, et al. "Counterfeit Drugs Detection in the Nigeria Pharma-Chain via Enhanced Blockchain-based Mobile Authentication Service." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 25–44. http://dx.doi.org/10.22624/aims/maths/v12n2p3.

Full text
Abstract:
Drugs has since become a major source of livelihood for Nigerians. It also accounts for over 85% of the total food consumed within her borders. The sector has maintained improved productivity and profitability via a concerted effort to address critical issues such as an unorganized regulatory system, lack of food safety data, no standards in agricultural produce, non-adaptation to precision farming, and non-harmony via inventory trace supports. This study proposes blockchain-based tracer-support system in a continued effort to ensure food quality, consumer safety, and trading of food assets. It uses the radio-frequency identification sensors to register and trace drugs manufacture cum administration process and provide a databank to trace the drug records via the shipment to its distribution centers. To ascertain, if the drug is genuine or fake, the user scans the QRcode via the mobile application API, which then generates feedback. Results achieves the following: (a) presents a framework and roadmap for adoption by the National Agency for Food and Drug Administration and Control (NAFDAC) to ensure pharmaceutical blockchain, (b) show ensemble is scalable for up-to 7500users to yield a performance of 1138-transactions per seconds with response time of 88secs for page retrieval and 128secs for queries respectively, and (c) yields slightly longer time for increased number of users via its world-state as stored in the permissionless blockchain hyper-fabric ledger. Thus, the framework can directly query and retrieve data without it traversing the whole ledger. This, in turn, improves the efficiency and effectiveness of the traceability system. Keywords: Nigerian Pharma-Chain, Fake/Counterfeit drugs, Healthcare, CORDA, hyper-ledger fabric, NAFDAC Ejeh, P.O., Okpor, M.D., Yoro, R.E., Ifioko, A.M., Onyemenem, I.S., Odiakaose, C,C., Ojugo, A.A., Ako, R.E., Emordi, F.U., Geteloma, V.O., Counterfeit Drugs Detection in the Nigeria Pharma-Chain via Enhanced Blockchain-based Mobile Authentication Service. Journal of Advances in Mathematical & Computational Science. 2024, Vol. 12, No. 1. Pp 25-44. Available online at www.isteams.net/mathematics-computationaljournal. dx.doi.org/10.22624/AIMS/MATHS/V12N2P3
APA, Harvard, Vancouver, ISO, and other styles
30

Swandewi, Ni Kadek, Mahendra Adi Winatha, I. Gede Made Sukariyanto, Putu Surya Laksana Rahjasa, and Ni Kade Juli Rastitiati. "Optimizing Cultural Events for Destination Branding and Community Empowerment in Tenganan Dauh Tukad." CONSEN: Indonesian Journal of Community Services and Engagement 5, no. 1 (2025): 87–96. https://doi.org/10.57152/consen.v5i1.2045.

Full text
Abstract:
This community service project aims to empower the local community of Tenganan Dauh Tukad by enhancing their capacity to promote cultural tourism through digital platforms. Framed around the theme of Tenganan as The Living Culture Destination, the project was implemented in three phases: documentation, content development, and community training. In the first phase, local youth were involved in capturing high-quality photo and video content during the traditional Perang Pisang event. In the second phase, the materials were edited into Instagram-optimized formats using a custom visual identity that reflects the village’s values—Asli (Authentic), Sakral (Sacred), Teguh Tradisi (Tradition-bound), Edukatif (Educational), and Elegan (Elegant). The third phase focused on training participants in managing Instagram, creating content calendars, and applying preset filters through the Lightroom mobile app. The outcome includes the rebranding of the village’s Instagram account to @tengananexperience and the development of a content strategy based on the pillars: Be Promotional, Be Human, and Be Entertaining. This initiative not only improved the digital skills of the community but also strengthened their cultural pride and established a sustainable model for cultural tourism promotion. Keywords: community service, digital empowerment, cultural tourism, Instagram branding, Tenganan Dauh Tukad, sustainable tourism.
APA, Harvard, Vancouver, ISO, and other styles
31

Protasova, Lyudmila, and Vladimir Nabokov. "State of production and qualities of fruits and vegetables." Agrarian Bulletin of the 228, no. 13 (2023): 70–79. http://dx.doi.org/10.32417/1997-4868-2023-228-13-70-79.

Full text
Abstract:
Abstract. Fruits and vegetables play an important role in the human diet. The purpose of the study is to analyze statistical data on the production of agricultural products and the reasons for low consumer satisfaction with the quality of fruits and vegetables and services of the SberMarket online service and develop corrective actions in the system product quality. Research methods are analysis, observation, consumer surveys and quality management approaches to reduce the number of consumer complaints about the quality of products and services. The dynamics of agricultural production in general and crop production, in particular, in Russia from 2013 to 2020 is analyzed, namely, production volumes in actual prices, the gross harvest of potatoes, vegetables, fruits and berries, as well as the share fruit and vegetable products by produced category of farms . In the context of the coronavirus pandemic, there have been major changes in the fruit and vegetable market, in particular, the sale of goods and fruits and vegetables to certain groups of the population was carried out through online trading services. LLC “Instamart-Servis” (SberMarket) provided customer service through a website and a mobile application in one hundred and thirty-four Russian cities in partnership with the METRO Cash & Carry shopping center chain, as well as with thirty unother stores. The satisfaction of consumers with the quality of products and services of the “SberMarket” online service and with trading enterprises of the city of Ekaterinburg in 2020 and 2021 was studied. Results. The dynamics of economic indicators made it possible to identify trends and opportunities for the development of agricultural production in the country; during the coronavirus pandemic, online trading played an important role in providing consumers with high-quality fruit and vegetable products, however, data from a survey of two hundred and thirty consumers of the “SberMarket” online service made it possible to identify insufficient satisfaction with the quality of products and services, determine the causes of inconsistencies and develop recommendations for improving product quality and services of the “SberMarket” online service. Scientific novelty. The possibilities of increasing the volume of fruit and vegetable production under the conditions of Western sanctions are revealed, both through investment in infrastructure and through the expansion of consumer cooperation to consolidate the fruit and vegetable market with private households, also the necessity of using methodological approaches of quality management to identify the causes of quality inconsistencies and the development of corrective actions in order to increase consumer satisfaction with the quality of products and services of the SberMarket online service, in accordance with the requirements of GOST R ISO 9001-2015, is substantiated.
APA, Harvard, Vancouver, ISO, and other styles
32

Protasova, Lyudmila, and Vladimir Nabokov. "State of production and qualities of fruits and vegetables." Agrarian Bulletin of the 228, no. 13 (2023): 70–79. http://dx.doi.org/10.32417/1997-4868-2022-228-13-70-79.

Full text
Abstract:
Abstract. Fruits and vegetables play an important role in the human diet. The purpose of the study is to analyze statistical data on the production of agricultural products and the reasons for low consumer satisfaction with the quality of fruits and vegetables and services of the SberMarket online service and develop corrective actions in the system product quality. Research methods are analysis, observation, consumer surveys and quality management approaches to reduce the number of consumer complaints about the quality of products and services. The dynamics of agricultural production in general and crop production, in particular, in Russia from 2013 to 2020 is analyzed, namely, production volumes in actual prices, the gross harvest of potatoes, vegetables, fruits and berries, as well as the share fruit and vegetable products by produced category of farms . In the context of the coronavirus pandemic, there have been major changes in the fruit and vegetable market, in particular, the sale of goods and fruits and vegetables to certain groups of the population was carried out through online trading services. LLC “Instamart-Servis” (SberMarket) provided customer service through a website and a mobile application in one hundred and thirty-four Russian cities in partnership with the METRO Cash & Carry shopping center chain, as well as with thirty unother stores. The satisfaction of consumers with the quality of products and services of the “SberMarket” online service and with trading enterprises of the city of Ekaterinburg in 2020 and 2021 was studied. Results. The dynamics of economic indicators made it possible to identify trends and opportunities for the development of agricultural production in the country; during the coronavirus pandemic, online trading played an important role in providing consumers with high-quality fruit and vegetable products, however, data from a survey of two hundred and thirty consumers of the “SberMarket” online service made it possible to identify insufficient satisfaction with the quality of products and services, determine the causes of inconsistencies and develop recommendations for improving product quality and services of the “SberMarket” online service. Scientific novelty. The possibilities of increasing the volume of fruit and vegetable production under the conditions of Western sanctions are revealed, both through investment in infrastructure and through the expansion of consumer cooperation to consolidate the fruit and vegetable market with private households, also the necessity of using methodological approaches of quality management to identify the causes of quality inconsistencies and the development of corrective actions in order to increase consumer satisfaction with the quality of products and services of the SberMarket online service, in accordance with the requirements of GOST R ISO 9001-2015, is substantiated.
APA, Harvard, Vancouver, ISO, and other styles
33

Nimbalkar, Atul Arun, and Nachiket Deodhar. "A Study of E-Services of Bank with Special Reference to Private Banks, Ahmednagar." International Research Journal of Management, IT & Social Sciences 2, no. 11 (2015): 22. http://dx.doi.org/10.21744/irjmis.v2i11.78.

Full text
Abstract:
E-banking means electronic banking which is popularly known as anywhere banking. Electronic banking also known as EFT (electronic Fund Transfer) means transfer amount online from one account to another account rather by using physical cheque. Information technology has taken important place in the future development of financial service, specially banking sector transaction are affected more than any other financial provider groups. Increased use of mobile services and use of internet as a new distribution channel for banking transactions and international trading requires more attention towards e-banking security against fraudulent activities. The development and the increasing progress that is being experienced in the Information and Communication Technology have brought about a lot of changes in almost all facets of life. In the Banking Industry, it has been in the form of online banking, which is now replacing the traditional banking practice. Although it is proving boon to all sectors especially to all types of customers and financial sector but its growing use without awareness has also attracted many crimes and frauds. Through this paper, it is tried tom discuss about growth of E-banking along with growing challenges of risk & Insecurity. Emphasis is given on awareness to be given to E-banking users and establishment of more security measures to avoid chances of misappropriation of funds and cybercrimes. Online banking has a lot of benefits which add value to customers’ satisfaction in terms of better quality of service offerings and at the same time enable the banks gain more competitive advantage over other competitors. This paper discusses some challenges in an emerging economy and benefits of E-banking.
APA, Harvard, Vancouver, ISO, and other styles
34

Jasti, Katyayani, and Chadalavada Varalakshmi. "MEASUREMENT OF USERS ACCEPTANCE OF SELECTED FINANCIAL TECHNOLOGY PRODUCTS AND SERVICES." International Journal of Professional Business Review 8, no. 2 (2023): e01530. http://dx.doi.org/10.26668/businessreview/2023.v8i2.1530.

Full text
Abstract:
Purpose: The goal of this study is to determine the degree to which users accept particular financial technology products and services by taking into account a variety of variables, including frequency of use, level of awareness, satisfaction, motivation for using fintech, satisfaction with that motivation, and behavioural intention to use fintech.
 
 Theoretical Framework: There is relatively little literature now accessible to examine the degree of consumer acceptance of Financial Technology products and services. The field of financial technology still requires a lot of research and education, though.
 
 Design/Methodology/Approach: A comprehensive evaluation of the literature served as the basis for the research design. Data gathering techniques include non-probability sampling (quota sampling). Users of particular Financial Technology products and services are queried using a standardised questionnaire to gather data. The 13 districts of Andhra Pradesh state were used as the source of the samples.
 
 Findings: The data is analysed using techniques such as regression and Anova. The frequency of use, level of satisfaction, level of awareness, the intended use of the Fintech, the satisfaction with the intended use and the user's behavioural intention to use the Fintech all statistically significantly correlate with the user's level of acceptance in using the chosen Financial Technology products and services.
 
 Research, Practical & Social implications: This study determined the degree to which users accepted particular Financial Technology goods and services from diverse angles.
 
 Originality/Value: This study aims to identify and quantify the effects of numerous variables on users' degree of acceptability of Fintech, including frequency of use, awareness and satisfaction levels, as well as the use of Fintech for specific purposes and behavioural intentions. Internet banking, NEFT, RTGS, IMPS, mobile banking, electronic wallets, stock trading applications, peer-to-peer lending applications, crowd funding, cash deposit machines, ATMs, and credit rating applications are the 12 Financial Technology products used in the study.
APA, Harvard, Vancouver, ISO, and other styles
35

Hapidin, Erie Siti Syarah, Yuli Pujianti, and Winda Gunarti. "Instilling Children's Ocean Literacy Through Comic Media: STEAM to R-SLAMET Learning Design for ECE educators." JPUD - Jurnal Pendidikan Usia Dini 16, no. 1 (2022): 01–16. http://dx.doi.org/10.21009/jpud.161.01.

Full text
Abstract:
Ocean literacy is currently at the forefront of the development of the notion of marine environmental sustainability. It is critical to compare ocean literacy ideas in curriculum standards. Comics Convey various messages of maritime insight content on integrated, contextual, and meaningful learning. This study aims to design STEAM (to R-SLAMET; Religion, Science, Literacy, Art, Math, Engineer, and Technology) learning that contains ocean literacy messages in a comic media. Through the qualitative research method with study case type, researchers seek to aid early childhood education (ECE) educators in designing R-SLAMET learning through the media to overcome maritime cultural literacy problems. The participants of this study consisted of three educators and 43 children. The findings show that the natural play experience of early childhood can be a source of inspiration to find ocean literacy through R-SLAMET learning activities. Contextual play by children becomes a reference for designing comic-based R-SLAMET learning. Comic media can integrate R-SLAMET learning in improving children's ocean literacy.
 Keywords: children ocean literacy, comic media, STEAM to R-SLAMET learning design
 References:
 Arthur, J. (1990). Cultural Literacy. College English, 52(3), 281–281. JSTOR. https://doi.org/10.2307/377758
 Campbell, D. T., & Stanley, J. C. (2015). Experimental and Quasi-Experimental Designs for Research. Ravenio Books. https://books.google.co.id/books?id=KCTrCgAAQBAJ
 Castek, E. J., Hagerman, M. S., Woodard, R., Bonine, K., Coiro, J., Graville, C., Jordan, M., Mencher, R., Olivares, M., Smith, B. E., Stornaiuolo, A., Sult, L., Tan, E., Tucker-raymond, E., & Wen, W. (2019). Principles for Equity-centered Design of STEAM Learning-through-Making. 34–35.
 Chang, C.-C., Hirenkumar, T. C., & Wu, C.-K. (2021). The Concept of Ocean Sustainability in Formal Education—Comparative Ocean Literacy Coverage Analysis of the Educational Standards of India and the USA. Sustainability, 13(8), 4314. https://doi.org/10.3390/su13084314
 Chujan, W., Kilenthong, W. T., Patricia, A., Robert, J., Richard, C., Charles, D., John, D., Jere, E., Leslie, A., Jerome, S., Robert, C., Bancroft, K., Lee, J., Carol, S., Lees, N., Mills, R., Haley, S., Eleanor, E., Robert, P., … Erden, F. T. (2019). An early evaluation of a HighScope-based curriculum intervention in rural Thailand. International Journal of Innovation, Creativity and Change, 12(103), 17–25. https://doi.org/10.7822/omuefd.604939
 Creswell, J. W. (2015). Educational research: Planning, conducting, and evaluating quantitative and qualitative research (Fifth edition). Pearson.
 Fortner, R. W., & Mayer, V. J. (1989). Marine and aquatic education – a challenge for science educators. Science Education, 73(2), 135–154. https://doi.org/10.1002/sce.3730730203
 Hapidin, Gunarti, W., Pujianti, Y., & Siti Syarah, E. (2020). STEAM to R-SLAMET Modification: An Integrative Thematic Play Based Learning with R-SLAMETS Content in Early Child-hood Education. JPUD - Jurnal Pendidikan Usia Dini, 14(2), 262–274. https://doi.org/10.21009/jpud.142.05
 Hapidin, Nurjannah, S. H. (Universitas N. J. (2018). Pengembangan Model Pembelajaran Tematik Seribu. Pendidikan Usia Dini, 12(Marine Education), 51–65. https://doi.org/10.21009/JPUD.121
 Hartley, B. L., Thompson, R. C., & Pahl, S. (2015). Marine litter education boosts children’s understanding and self-reported actions. Marine Pollution Bulletin, 90(1), 209–217. https://doi.org/10.1016/j.marpolbul.2014.10.049
 Hawthorne, M., & Alabaster, T. (1999). Citizen 2000: Development of a model of environmental citizenship. Global Environmental Change, 9(1), 25–43. https://doi.org/10.1016/S0959-3780(98)00022-3
 Hermawanti, O., & Susilaningsih, S. (2020). Development of Educational Comic Media Based on PowerPoint Class III Indonesian Language Content. Elementary School Teacher, 4(2), 5. https://doi.org/10.15294/est.v4i2.29027
 Hidayat, S., & Ridwan. (2017). Kebijakan poros maritim dan keamanan nasional indonesia: Tantangan dan harapan. Pertahanan & Bela Negara, 7(3), 107–121.
 Koutníková, M. (2018). The Application of Comics in Science Education. Acta Educationis Generalis, 7(3), 88–98. https://doi.org/10.1515/atd-2017-0026
 Melliou, K., Moutafidou, A., & Bratitsis, T. (2014). Digital Comics Use to Develop Thinking Dispositions in Early Childhood Education. 2014 IEEE 14th International Conference on Advanced Learning Technologies, 502–504. https://doi.org/10.1109/ICALT.2014.148
 Mogias, A., Boubonari, T., Realdon, G., Previati, M., Mokos, M., Koulouri, P., & Cheimonopoulou, M. Th. (2019). Evaluating Ocean Literacy of Elementary School Students: Preliminary Results of a Cross-Cultural Study in the Mediterranean Region. Frontiers in Marine Science, 6, 396. https://doi.org/10.3389/fmars.2019.00396
 Mokos, M., Realdon, G., & Zubak Čižmek, I. (2020). How to Increase Ocean Literacy for Future Ocean Sustainability? The Influence of Non-Formal Marine Science Education. Sustainability, 12(24). https://doi.org/10.3390/su122410647
 Ntobuo, N. E., Arbie, A., & Amali, L. N. (2018). The Development of Gravity Comic Learning Media Based on Gorontalo Culture. Jurnal Pendidikan IPA Indonesia, 7(2), 246–251. https://doi.org/10.15294/jpii.v7i2.14344
 Oliver, K. L. (1998). A Journey into Narrative Analysis: A Methodology for Discovering Meanings. Journal of Teaching in Physical Education, 17(2), 244–259. https://doi.org/10.1123/jtpe.17.2.244
 Pramitasari, M., Yetti, E., & Hapidin, H. (2018). Pengembangan Media Sliding Book Untuk Pengenalan Sains Kehidupan (Life Science) Kelautan Untuk Anak Usia 6-7 Tahun. JPUD - Jurnal Pendidikan Usia Dini, 12(2), 281–290. https://doi.org/10.21009/jpud.122.09
 Puspitorini, R., Prodjosantoso, A. K., Subali, B., & Jumadi, J. (2017). Penggunaan Media Komik Dalam Pembelajaran Ipa Untuk Meningkatkan Motivasi Dan Hasil Belajar Kognitif Dan Afektif. Jurnal Cakrawala Pendidikan, 3(3). https://doi.org/10.21831/cp.v3i3.2385
 Rahmatullah, R., Inanna, I., Rakib, M., Mustari, M., & Rabania, R. (2020). Developing Tematic Economic Comic with Characters for Early Childhood. Journal of Educational Science and Technology (EST), 293–300. https://doi.org/10.26858/est.v6i3.14949
 Rina, N., Suminar, J. R., Damayani, N. A., & Hafiar, H. (2020). Character education based on digital comic media. International Journal of Interactive Mobile Technologies, 14(3), 107–127. https://doi.org/10.3991/ijim.v14i03.12111
 Santoro, F., Santin, S., Gail, S., Fauville, G., & Tuddenham, P. (2017). Ocean Literacy for All; A toolkit. UNESCO United Nations Educational.
 Steel, B. S., Smith, C., Opsommer, L., Curiel, S., & Warner-Steel, R. (2005). Public ocean literacy in the United States. Ocean & Coastal Management, 48(2), 97–114. https://doi.org/10.1016/j.ocecoaman.2005.01.002
 Syarah, E. S., Yetti, E., Fridani, L., Yufiarti, Hapidin, & Pupala, B. (2019). Electronic comics in elementary school science learning for marine conservation. Jurnal Pendidikan IPA Indonesia, 8(4), 500–511. https://doi.org/10.15294/jpii.v8i4.19377
 Tatalovic, M. (2009). Science comics as tools for science education and communication: A brief, exploratory study. Journal of Science Communication, 8(4).
 Tuddenham, P., Schoedinger, S., Cava, F., & Strang, C. (2005). Science Content and Standards for Ocean Literacy: A Report on Ocean Literacy. https://doi.org/10.13140/RG.2.2.12126.84804
 Visbeck, M. (2018). Ocean science research is key for a sustainable future. Nature Communications, 9(1), 690. https://doi.org/10.1038/s41467-018-03158-3
 Yulianti, D., Khanafiyah, S., & Sulistyorini, S. (2016). Inquiry-Based Science Comic Physics Series Integrated with Character Education. 7.
 Yunandar, Y. (2018). Budaya Bahari Dam Tradisi Nelayan di Indonesia. Sabda: Jurnal Kajian Kebudayaan, 1(1), 22. https://doi.org/10.14710/sabda.v1i1.13243
APA, Harvard, Vancouver, ISO, and other styles
36

Chatterjee, Sheshadri, Tomas Kliestik, Zuzana Rowland, and Martin Bugaj. "Immersive collaborative business process and extended reality-driven industrial metaverse technologies for economic value co-creation in 3D digital twin factories." Oeconomia Copernicana 2025, no. 16 (2025): 125–61. https://doi.org/10.24136/oc.3596.

Full text
Abstract:
Research background: Internet of Things devices and sensors, artificial intelligence-based digital asset trading and digital twin-based extended reality technologies, and autonomous robotic and enterprise resource planning systems can be leveraged in 3D semantic scene completion and metaverse-based commercial transactions across Internet of Things-based business environments. Distributed ledger and enterprise business technologies, shop-floor digital twin synthetic data, and 3D simulation and visualization systems configure integrated multi-physics workflows in hyper-realistic immersive industrial environments for artificial intelligence-based business value. Digital twin-based Internet of Robotic Things, robotic swarm and multi-modal machine learning algorithms (with regard to enterprise total factor productivity), and virtual and augmented reality simulation technologies are pivotal in spatial planning processes. Industrial product data and manufacturing value chain management support digital twin-based virtual factory modeling in collaborative immersive 3D visualization environments. Purpose of the article: We show that interconnected business process management and metaverse economic organizational structures, immersive economic and entrepreneurial knowledge image-based modeling (for big data-driven product development processes), and remote autonomous equipment control and monitoring integrate digital twin-enabled 6G Tactile Industrial Internet of Things, deep reinforcement learning and image processing algorithms, and event-driven signal processing for collaborative economic value co-creation. Deep learning-based visual recognition and industrial extended reality technologies, 3D production management modeling, and Internet of Things industrial and mobile sensing networks are pivotal in production operation management, as deep learning-based multi-source data fusion assists autonomous industrial manufacturing processes across interactive 3D immersive business and synthetic manufacturing environments. Collaborative robotic cyber-physical production and generative Artificial Intelligence of Things-based systems (in terms of managerial business value), artificial intelligence-based perceptual and cognitive technologies, and spatial mapping and machine intelligence algorithms enhance manufacturing process visualization, as industrial big data sharing and interoperability are functional in 3D semantic scene completion for sustainable business and economic growth across big data-driven immersive virtual industrial manufacturing environments. Methods: We inspected Tracxn (the Industrial Metaverse section) for the first 100 companies in terms of Tracxn score for X-corn status (i.e., Minicorn, Soonicorn, or none), total equity funding (USD), and company stage (i.e., Seed, Funding Raised, Unfunded, Public, Acquired, Acqui-Hired, and Series A, B, C, D), and identified three main topics for analysis that would lead to tangible business outcomes. We examined the performance management of shop floor virtualization: connected digital twins increase production and logistics process optimization in production environments across the industrial metaverse, facilitating photorealistic production system 3D modelling and simulation. We appraised integrated diagnostic functionalities of real-time simulation implementation for error elimination and machine parameter adjustment in immersive planned production lines by synthetic image data sets and collaborative workflows. We determined digital twin-based data synthesis operational procedures and interconnected use cases across industrial scalable infrastructures for value chain efficiency. Findings & value added: We identified the specific integrated operational simulation functions and production tasks, key performance indicators of shop floor autonomous and value creation systems, and industrial process parameters for predictive quality and fault detection, resulting in production loss reduction by use of industrial metaverse technologies. By use of operational data with regard to the technological management of the selected companies, quantitative analysis determines how immersive collaborative business process and extended reality-driven industrial metaverse technologies lead to economic value co-creation across 3D digital twin factories and cyber-physical manufacturing enterprises. The main value added derived from our research is that cloud-based collaborative 3D visualization and neuromorphic computing systems, 6G sensing and holographic simulation technologies, and machine intelligence and environment awareness algorithms (for business performance and productivity) can be leveraged in machine vision-based defect prediction, detection, diagnosis, and management. Virtual reality space convergence and object connection operate in Internet of Things-based sensing device performance monitoring across Internet of Things-based business environments. Virtual assembly lines and manufacturing enterprises necessitate machine learning-based production forecasting techniques, 3D object detection and tracking, and industrial autonomous and cyber-physical production systems, supporting spatial computing and predictive maintenance algorithms in collaborative immersive virtual environments.
APA, Harvard, Vancouver, ISO, and other styles
37

Riski M, Amilga, Rini H, Muhammad Fithrayudi Triatmaja, and Riswan Riswan. "PENGARUH FINANCIAL TECHNOLOGY, E-COMMERCE, LITERASI KEUANGAN DAN PENGGUNAAN SISTEM INFORMASI AKUNTANSI TERHADAP KINERJA UMKM DI KABUPATEN BATANG DENGAN PENGETAHUAN AKUNTANSI SEBAGAI VARIABEL MODERASI." Neraca 19, no. 2 (2023): 29–47. http://dx.doi.org/10.48144/neraca.v19i2.1684.

Full text
Abstract:
This study aimed to examine and analyze the effects of financial technology, e-commerce, financial literacy, and the use of accounting information systems with accounting knowledge as a moderating variable. This research was a quantitative study with data collection methods using questionnaires and measurements with a Likert scale. The population in this study was Micro, Small, and Medium Enterprises in the Batang trading sector. This study used purposive sampling. The sample used in this study was 86 respondents. The data analysis technique used in this study was multiple regression analysis with SPSS 16. The results showed that, partially, e-commerce and financial literacy had a significant negative effect on the performance of micro, small and medium enterprises. The use of accounting information systems had a significant positive effect on the performance of micro, small and medium enterprises. Meanwhile, financial technology had no significant effect on the performance of micro, small and medium enterprises. Simultaneously, financial technology, e-commerce, financial literacy, and the use of accounting information systems had significant effects on the performance of micro, small and medium enterprises. After being moderated, accounting knowledge could moderate the correlation between financial technology, e-commerce, and the performance of micro, small and medium enterprises. Meanwhile, accounting knowledge could not moderate the correlation between financial literacy, the use of accounting information systems, and the performance of micro, small and medium enterprises. REFERENSI Abdillah, M., Primasari, D., & Widianingsih, R. (2019). Pengaruh Strategi Bisnis, Kemampuan Manajerial dan Pengetahuan Akuntansi Pelaku UMKM Terhadap Kinerja UMKM Bidang Kuliner di Kabupaten Purbalingga. Jurnal OPTIMUM, 9(2), 145–157. Agustina, L., & Kurniawan, F. (2018). Sistem reputasi Penjual dalam Proses Pengambilan Keputusan Pembelian di Platform C2C E-commerce. Jurnal Komunikasi Indonesia, 7(1), 28–43. Alfiah, N. (2019). Pengaruh Literasi Keuangan, Sistem Informasi Akuntansi, Sumber Daya Manusia dan Financial Technology terhadap Kinerja UMKM Batik di Kabupaten Batang. Sekolah Tinggi Ilmu Ekonomi (STIE) Muhammadiyah Pekalongan. Anoraga, P. (2011). Pengantar Bisnis : Pengelolaan Bisnis dalam Era Globalisasi. PT. Rineka Cipta. Arbaini, P., Wahab, Z., & Widiyanti, M. (2020). Pengaruh Consumer Online Rating Dan Review Terhadap Keputusan Pembelian Pada Pengguna Marketplace Tokopedia. Jurnal Bisnis Dan Manajemen, 7(1), 25–33. https://doi.org/10.26905/jbm.v7i1.3897 Badruzzaman, D. W. (2021). Pengaruh Orientasi Usaha, Modal Kerja, Kemampuan Produksi, dan Literasi Keuangan Terhadap Kinerja Keuangan UMKM (Studi Pada UMKM Setra Industri Seni Patung dan Ukir). Universitas Islam Nahdlatul Ulama Jepara. Bank Indonesia. (2018). Mengenal Financial Teknologi. https://www.bi.go.id/id/edukasi/Pages/mengenal-Financial-Teknologi.aspx Bastian, A. A. P. (2020). Pengaruh Financial Technology Terhadap Perkembangan Bisnis UMKM Melalui Variabel Intervening Kepuasan Konsumen. Universitas Islam Negeri Syarif Hidayatullah Jakarta. Batang, A. (2020). Omzet UMKM Turun 50% di Tengah Pandemi, Pemkab Batang Ajari Jualan Online. https://batang.ayoindonesia.com/batang-raya/pr-37453372/Omzet-UMKM-Turun-50-di-Tengah-Pandemi-Pemkab-Batang-Ajari-Jualan-Online Belkaoui, A. R. (2000). Teori Akuntansi. Buku 1 (Edisi Keen). Salemba Empat. Bernardin, H. ., & Russell, J. . (1993). Human Resource Management: An Experiental Approach. McGraw-Hill. Bukalapak. (2022). Tentang Kami - About Us|Bukalapak. https://www.bukalapak.com/about#:~:text=Bukalapak adalah perusahaan teknologi Indonesia,meraih hidup yang lebih baik. Dinkop Jateng, J. (2022). Statistik Ekonomi UMKM Dampak Covid-19. https://dinkop-UMKM.jatengprov.go.id/dampakcovid/ Diskominfo Batang, K. (2019). 53 Tahun, Pemkab Batang Melaunching “Batang Smart Region.” https://kominfo.batangkab.go.id/?p=3&id=40 Ermawati, N., & Arumsari, N. R. (2021). Sistem Informasi Akuntansi Pada Kinerja Usaha Kecil Menengah. Jurnal Bisnis Dan Akuntansi, 23(1), 145–156. https://doi.org/10.34208/jba.v23i1.973 Farida, I., Sunandar, & Aryanto. (2019). Faktor-faktor yang berpengaruh terhadap kinerja UMKM di kota Tegal. Monex, 8(2), 79–82. Fintech.id. (2022). Anggota Fintech Indonesia. https://fintech.id/members Ghozali, I. (2018). Aplikasi Analisis Multivariate dengan Program IBM SPSS 25 (Kesembilan). Penerbit Undip. Gibson, J. L., & Ivancevich, J. M. (1994). Organisasi dan Manajemen (Edisi 4). Erlangga. Hisrich, R. D., & Peters, M. P. (2002). Entrepreneurship (T. Higham (ed.); Kelima). The McGraw-Hill Companies, Inc. Ihram.co.id. (2020). OJK Ajak UMKM Batng Bangun Bisnis Era Digital. https://www.ihram.co.id/berita/qk02pz327/ojk-ajak-UMKM-batang-bangun-bisnis-era-digital Indriantoro, N., & Supomo, B. (2009). Metodologi Penelitian Bisnis Untuk Akuntansi dan Manajemen. BPFE-Yogyakarta. Katadata.co.id. (2020). Digitalisasi UMKM di Tengah Pandemi Covid-19. http://katadata.co.id/UMKM Kemenkeu. (2021). Pemerintah Terus Perkuat UMKM Melalui Berbagai Bentuk Bantuan. https://www.kemenkeu.go.id/publikasi/berita/pemerintah-terus-perkuat-UMKM-melalui-berbagai-bentuk-bantuan/ Khosrow-pour, M. (2006). ENCYCLOPEDIA OF E-commerce, E-Government and Mobile Commerce. Lestari, D. A., Purnamasari, E. D., & Setiawan, B. (2020). Pengaruh Payment Gateway terhadap Kinerja Keuangan UMKM. Jurnal Bisnis, Manajemen, Dan Ekonomi, 1(1), 1–10. https://doi.org/10.47747/jbme.v1i1.20 Lestari, N. A., & Rustiana, S. H. (2019). Pengaruh Persepsi Owner Dan Pengetahuan Akuntansi Dalam Penggunaan Sistem Informasi Akuntansi Terhadap Kinerja Usaha Mikro, Kecil, dan Menengah Di Pamulang. Journal of Business & Entrepreneurship Universitas Muhammadiyah Jakarta, 1(2), 67–80. https://doi.org/10.24853/baskara.1.2.67-80 Lestari, P. A. (2020). Pengaruh Sistem Informasi dan Pemanfaatan E-commerce Terhadap Kinerja Usaha Kecil Menengah (UKM0 di Kota Makassar [Universitas Muhamadiyah Makassar]. In Engineering, Construction and Architectural Management. http://dx.doi.org/10.1016/j.jss.2014.12.010 Linawati, E., Mitha, M. I., & Restuti, D. (2015). Pengetahuan akuntansi pelaku usaha mikro, kecil dan menengah (UMKM) atas penggunaan Informasi Akuntansi. Pengetahuan Akuntansi Pelaku Usaha Mikro, Kecil Dan Menengah (UMKM) Atas Penggunaan Informasi Akuntansi, 2(1), 145–149. Maisur, & Umar, N. (2019). Pengaruh Penerapan Sistem Informasi Akuntansi Terhadap Kinerja Manajerial (Study Kasus pada Usaha Kecil dan Menengah (UKM) di Kabupaten Pidie). JRR, 1(1), 29–37. Mardi, D. (2011). Sistem Informasi Akuntansi (R. Sikumbang (ed.)). Penerbit Ghalia Indonesia. Mouti, D. A. (2020). Pengaruh Persepsi Pemilik Dan Pengetahuan Akuntansi Pelaku Usaha Barbershop Terhadap Penggunaan Informasi Akuntansi. Ningsih, S. E. (2018). Pengaruh Literasi Keuangan terhadap Usaha, Mikro, kecil, dan Menengah di Kabupaten Jember. Digital Repository Universitas Jember, 1(3), 1–56. Nurissalamah, A. M., Maslichah, & Mawardi, M. C. (2021). Pengaruh Penerapan Pengetahuan Bisnis Dan Penggunaan Sistem Informasi Akuntansi Terhadap Kinerja Usaha (Studi Pada UMKM Kota Malang). E-Jra, 10(08), 79–84. Nursanti, H. (2019). Pengaruh Pengetahuan Akuntansi dan Komunitas Usaha Terhadap Penggunaan Informasi Akuntansi oleh Pelaku Usaha Mikro (Studi pada DPD Himpunan Pengusaha Santri Kota Semarang). Universitas Islam Negeri Walisongo Semarang. OJK. (2020). Jenis-Jenis Fintech di Indonesia. https://sikapiuangmu.ojk.go.id/FrontEnd/CMS/Article/10468 OJK. (2021). Strategi Nasional Literasi Keuangan Indonesia (SNLKI) 2021-2025. Pasaribu, L. S. (2019). Pengaruh Perangkat Lunak Akuntansi dan E-commerce Terhadap Kinerja Perusahaan pada Usaha Mikro, Kecil, dan Menengah di Lubuk Pakam. Universitas Sumatera Utara. Pemerintah Indonesia. (2021). Peraturan Pemerintah Republik Indonesia Nomor 07 Tahun 2021 tentang Kemudahan, Pelindungan, dan Pemberdayaan Koperasi dan Usaha Mikro, Kecil, dan Menengah. 086507, 1–121. Portal Berita, P. P. J. T. (2021). “Nglarisi Dodolan”, UMKM Bergiliran Jajakan Produk ke ASN. https://jatengprov.go.id/beritadaerah/nglarisi-dodolan-UMKM-bergiliran-jajakan-produk-ke-asn/ Prasetyo, A. S., & Ambarwati, L. (2021). Pengaruh Sistem Informasi Akuntansi Terhadap Kinerja UMKM Daerah Istimewa Yogyakarta. Jurnal Riset Akuntansi Dan Bisnis Indonesia, 1(1), 73–84. https://doi.org/10.32477/jrabi.v1i1.320 Pratiwi, A. (2020). Pengaruh Pengetahuan Akuntansi dan Kepribadian Wirausaha Terhadap Kinerja Manajerial Pada UMKM di Kota Surabaya. Universitas Bhayangkara Surabaya. Prov Jateng, J. (2020). Bupati Batang Minta Pelaku UMKM Bangun Bisnis Digital. https://jatengprov.go.id/beritadaerah/bupati-batang-minta-pelaku-UMKM-bangun-bisnis-digital/ Purba, M. I., Simanjutak, D. C. Y., Malau, Y. N., Sholihat, W., & Ahmadi, E. A. (2021). Pengaruh Pemasaran Digital dan E-commerce pada Kinerja Keuangan dan Keberlanjutan Bisnis Kemampuan UMKM selama Pandemi COVID-19 di Indonesia. Jurnal Internasional Ilmu Data Dan Jaringan, 5, 275–282. https://doi.org/10.5267/j.ijdns.2021.6.6.006 Purnamasari, E. D. (2020). Pengaruh Payment Gateway dan Peer to Peer Lending (P2P) terhadap Peningkatan Pendapatan di Kota Palembang. Jurnal Ilmiah Ekonomi Global Masa Kini, 11(1), 63. https://doi.org/10.36982/jiegmk.v11i1.1063 Putri, C. A., Diana, N., & Mawardi, M. C. (2021). Pengaruh Pengetahuan Akuntansi dan Kepribadian Wirausaha Terhadap Kinerja Manajerial Pada Perusahaan Dagang di Kota Malang. E-JRA, 10(02), 13–24. Rahardjo, B., Ikhwan, K., & Siharis, A. K. (2019). Pengaruh Financial technology (Fintech) Terhadap Perkembangan UMKM di Kota Magelang. Prosiding Seminar Nasional Dan Call For Papers, Fakultas Ekonomi Universitas Tidar, 347–356. Ratnasari, D. (2020). Pengaruh Literasi Keuangan terhadap Keberlanjutan Usaha UMKM di Kota Makassar. Universitas Muhammadiyah Makassar. Rianto, D., & Hidayatulloh, A. (2020). Penggunaan Informasi Akuntansi dan Umur Usaha Mendorong Keberhasilan UMKM Batik di Kota Yogyakarta. Sains: Jurnal Manajemen Dan Bisnis, 12(2), 299. https://doi.org/10.35448/jmb.v12i2.6945 Romney, M. B., & Steinbart, P. J. (2006). Accounting Information System (J. Shelstad (ed.); 10th ed.). Pearson Education International. Sarwono, J., & Suhayati, E. (2010). Riset Akuntansi Menggunakan SPSS (Pertama). Graha Ilmu. Shopee. (2020). Tentang Shopee - Karir|Shopee Indonesia. https://careers.shopee.co.id/about Siagian, M., Kurniawan, P. H., & Hikmah, H. (2019). Analisis Faktor Eksternal Dan Internal Terhadap Kinerja UMKM Di Kota Batam. Jesya (Jurnal Ekonomi & Ekonomi Syariah), 2(2), 265–271. https://doi.org/10.36778/jesya.v2i2.107 Solopos.com. (2020). Pemkab Batang Lakukan 3 Terobosan Dukung UMKM. https://www.solopos.com/pemkab-batang-lakukan-3-terobosan-dukung-UMKM-1044047 Triandra, N., Hambali, D., Nurasia, & Rosalina, N. (2019). Analisis Pengaruh E-commerce Terhadap Peningkatan Kinerja UMKM (Studi Kasus Pada UMKM Di Kabupaten Sumbawa). Jurnal Ekonomi Dan Bisnis Indonesia, 4(1), 6–10. https://doi.org/10.37673/jebi.v4i1.259 Ummah, H., Rosyafah, S., & Masyhad, M. (2021). Pengaruh Pengetahuan Akuntansi Dan Perilaku Keuangan Terhadap Kinerja Manajerial UMKM Makanan Di Sidoarjo. Akuntansi’45, 38–43. https://univ45sby.ac.id/ejournal/index.php/akuntansi45/article/download/191/118 Utami, N., & Sitanggang, M. L. (2021). The Effect of Fintech Implementation on The Performance of SMEs. Journal of International Conference …, 4(3), 407–417. http://www.ejournal.aibpm.org/index.php/JICP/article/view/1342 Uyanto, S. S. (2009). Pedoman Analisis Data dengan SPSS (Ketiga). Graha Ilmu. Wahyudiati, D. (2017). Pengaruh Aspek Keuangan dan Kompetensi Sumber Daya Manusia (SDM) Terhadap UMKM (UMKM) di Desa Kasongan. 1–136. Wahyuni, S., Nugroho, W. S., Purwantini, A. H., & Khikmah, S. N. (2021). Pengaruh E-commerce , Budaya Organisasi , Penggunaan Sistem UMKM di Kota Magelang. Prosiding Seminar Nasional Fakultas Ekonomi Universitas Tidar, September, 287–300. Wulandari, R. (2019). Pengaruh Literasi Keuangan dan Inklusi Keuangan terhadap Kinerja UMKM (Studi Kasus pada UMKM Provinsi DKI Jakarta). Skripsi Fakultas Ekonomi Dan Bisnis UIN Syarif Hidayatullah, 1–114. Risgiyanti, R., & Hidayah, R. (2020). The role of workplace spirituality in reducing the negative impact of organizational cynicism on job performance. Jurnal Aplikasi Manajemen, 18(4), 692-703. Kholidah, N., & Salma, A. N. (2019). Filantropi kreatif: Pemberdayaan ekonomi umat berbasis zakat produktif pada program 1000 UMKM LAZISMU Kabupaten Pekalongan. Cakrawala: Jurnal Studi Islam, 14(2), 93-101. Hakim, M. R., & Kholidah, N. (2020). Hak Merek Sebagai Jaminan Gadai Untuk Permodalan Umkm Industri Kreatif Kerajinan Batik. Pena Justisia: Media Komunikasi dan Kajian Hukum, 18(2). Lutfiani, A. P., & Hidayah, R. (2022). ESG Performance and Ownership Structure on Cost of Capital and Research & Development Investment. Fokus Bisnis Media Pengkajian Manajemen dan Akuntansi, 21(1), 25-42. Suyono, E., Rusmana, O., & Riswan, R. (2019). The revitalization model through the implementation of accounting information system for village unit cooperative in Banyumas region, Indonesia. Media Ekonomi dan Manajemen, 34(1).
APA, Harvard, Vancouver, ISO, and other styles
38

Sharmeen, Kashfia. "Stock Market Trading through Mobile Application: An Analysis of Reaction to COVID-19." JOURNAL OF ECONOMICS, FINANCE AND MANAGEMENT STUDIES 05, no. 12 (2022). http://dx.doi.org/10.47191/jefms/v5-i12-55.

Full text
Abstract:
This article aims to assess the need for a stock market mobile trading application in a developing country's capital market, such as Bangladesh's, where stock markets have been closed for more than two months during the first stages of the ongoing pandemic. The effect of COVID-19 is tested using an event study to evaluate if it has a statistically significant impact on the adoption rate of the DSE mobile app. A descriptive research approach has been implemented, and a t-statistic has been conducted. According to the statistics, COVID-19 significantly impacts the DSE mobile app adoption rate and the number of buy-sell transactions in Bangladesh's capital market. Compared to the total Beneficiary Owners account holders, only 3.75 percent of investors use the DSE mobile app for transactions. All of this indicates that the stock market in Bangladesh has only partial digitalization, and as a result, it does not provide a suitable platform for coping with negative occurrences. As a result, authorities must encourage the adoption of full-fledged digitizing by involving all stakeholders in the chain to deal with the sudden and long-lasting shock caused by pandemics such as the coronavirus epidemic in 2019.
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Che-Wei, Sunil Mithas, Yang Pan, and J. J. Po-An Hsieh. "Mobile Apps, Trading Behaviors, and Portfolio Performance: Evidence from a Quasi-Experiment in China." Information Systems Research, July 8, 2024. http://dx.doi.org/10.1287/isre.2020.0616.

Full text
Abstract:
Mobile Apps, Trading Behaviors, and Portfolio Performance: Evidence from a Quasi-Experiment in China How do mobile apps influence individual investors’ financial decisions and performance? This study answers this timely and important question by using rare archival data from a large securities company in China using a sample of 20,665 investors. Authors find that mobile app adoption does not affect investors’ portfolio performance when one examines aggregate impacts using a binary indicator of mobile app use. Their additional analyses suggest that adopting mobile apps results in a noticeable decrease in time constraints, a proxy for transaction friction, and a modest increase in trend-chasing bias, reflecting tendencies toward myopic decision making. Because the reduction in time constraints can benefit investors’ performance, the increase in trend chasing can be detrimental to investors’ performance, these findings explain why mobile app adoption has no overall effect on portfolio performance. Further analyses of adopters’ postadoption behaviors provide interesting insights and show that the mobile app usage intensity has an inverted U–shaped relationship with portfolio performance. The results are robust to using different samples or excluding high market volatility periods and by using a variety of methods, such as propensity score matching, dynamic matching, stacked difference-in-differences, or an instrumental variable approach.
APA, Harvard, Vancouver, ISO, and other styles
40

Habib, Sami J., and Paulvanna N. Marimuthu. "Quantification label for mobile apps." Journal of Engineering Research 9, no. 2 (2021). http://dx.doi.org/10.36909/jer.v9i2.9479.

Full text
Abstract:
Nowadays every product we purchase has a tag informing its users how much an automobile or an appliance will cost to run and how much energy a food product will provide on consumption, for example. With the advent of Internet, purchasing Apps becomes habitual, as Apps facilitate easy way of trading and generate money according to App online stores. Currently, Apps provide label that contains a combination of developer info, memory size, category, operating system compatibility, user ratings and reviews, and privacy policy. However, the product label information is asymmetrical and it varies with the developer. It is challenging to develop common standards explicit to users, as their needs are dynamic; moreover, the App undergoes a series of state changes during execution, according to the usage pattern. We propose a quantification label framework to assess the mobile/web App using a set of quantifiers, such as functionality, degree and domain of connectivity, battery consumption, and its vulnerability index for generating a set of standard labels. The corresponding labels in the label frame are: features, popularity, energy consumption and security. Further, we utilized principal component analysis (PCA), a statistical technique to assist the customers in selecting the prominent features from the dataset and to compare related apps, which analyzes the quantifiers in the given datasets and distinguish them according to the variances. The experimental results in quantifying a real time traffic data of an internet based App validated the proposed label by revealing the key features to the users; moreover, PCA carried out on four sets of traffic data enabled the selection of prominent data, and the results also revealed the possible embedding of the framework within an App for dynamic monitoring.
APA, Harvard, Vancouver, ISO, and other styles
41

P MADHURI, C LAVANYA, G SURESH, P DURAIMURUGAN, M SANTHALAKSHMI PRASAD, and A VISHNUVARDHAN REDDY. "Development of a mobile app for the effective dissemination of information on castor." Journal of Oilseeds Research 35, no. 3 (2023). http://dx.doi.org/10.56739/jor.v35i3.137486.

Full text
Abstract:
Castor is an important industrial, non-edible oilseed crop in India. India accounts for 81 per cent of world castorproduction and 59 per cent of global castor area. The crop is being cultivated in different agro-ecological regionsof the country under both irrigated and rainfed conditions. Despite the phenomenal increase witnessed in theproduction and productivity of castor over the last two decades, there still exists wide gap in the per hectare yields of castor across states. A number of improved varieties/hybrids and technologies developed in castor production do not readily reach the famers due to multiple factors including low farmer - extension worker ratio and slow pace of technology transfer. In the recent years, Information Communication Technologies (ICTs) especially the Mobile Apps have emerged as accessible tools to strengthen the extension systemby providing information on crops, market and advisory services. Hence, an android standalone mobile application on "ICARIIOR-Castor" was developed to reach thewider section ofstakeholders through ICTfromICAR-Indian Institute of Oilseeds Research (ICAR-IIOR), Hyderabad. The App supports English language and available on Google play store. Features include offline and online mode and offer valuable information to the extension workers, farmers, castor researchers and other stakeholders, including state-wise preferred varieties and hybrids, crop production and protection technologies for management of insect pest and diseases, intercropping systems recommended for different states, contact details of AICRP (Castor) centres across India and commodity markets and important APMC's trading of castor. The ICT initiative can make latest and improved castor production technologies accessible to farmers and other stakeholders for realizing higher yield of crop.
APA, Harvard, Vancouver, ISO, and other styles
42

Tan, Gordon Kuo Siong. "Democratizing finance with Robinhood: Financial infrastructure, interface design and platform capitalism." Environment and Planning A: Economy and Space, September 13, 2021, 0308518X2110423. http://dx.doi.org/10.1177/0308518x211042378.

Full text
Abstract:
It is widely claimed that financial technology democratizes financial access and promotes financial inclusion. This paper challenges this dominant narrative of financial technology using the popular US-based mobile investing platform Robinhood as a case study. Analyzing press articles on Robinhood and regulatory filings of online brokerages, the concepts of financial infrastructures and platforms are used to unpack the capitalist logics that drive the platform business model. Specifically, this paper shows how digital interface design plays a central role in Robinhood's articulation of investors into the stock markets, through its simple, minimalist app that keeps users engaged by the productive management of ‘frictions’. The ease of investing via platform-based brokerages has seen investors taking on greater amounts of risk. This paper argues that Robinhood's success is driven by the continued expansion of its user base using various interface design techniques. This allows platform capitalism to be enacted by extracting rent through various revenue streams, where higher rents are derived from more frequent and riskier trading behaviors. The narrative of democratizing finance as employed widely in the financial technology sector thus obscures the capitalist logics and predatory practices that underlie financial technology.
APA, Harvard, Vancouver, ISO, and other styles
43

John, Bernadette, Christine McCreary, and Anthony Roberts. "The Risks of Smartphone and Mobile Technology for the Dissemination of Clinical Data by Dental Professionals." Journal of the Irish Dental Association, January 11, 2023. http://dx.doi.org/10.58541/001c.67927.

Full text
Abstract:
##Statement of the problem: Smartphone technologies have changed the landscape of digital communication across society. The Covid-19 pandemic has accelerated the adoption of and requirement for technical solutions to facilitate remote clinical communications. Despite the benefits of smartphones in a clinical communication context, there are risks associated with their use. ##Purpose of the study: The primary purpose of this study was to determine the extent of smartphone use among dental professionals in the Republic of Ireland (ROI). In addition, we sought to determine the perception and knowledge of potential pitfalls, risks, and limitations of these technologies among the same population. A smaller cohort of UK dental professionals was surveyed for comparison. ##Materials and methods: An online quantitative survey was distributed to evaluate dental professionals’ knowledge and understanding of the risks and limitations of smartphone and mobile technology, providing general understanding of the current use of smartphone technology in healthcare in the ROI and the UK. ##Results: A total of 123 responses were received from dental professionals in the ROI (UK: n=77). The majority of dental professionals confirmed that they were aware of the risks associated with smartphone use and perceived that they were adequately skilled in digital professionalism. However, concerning practice regarding the communication of sensitive patient data was identified, with the potential for these data to be stored on insecure devices and cloud servers. Many ROI and UK dental professionals confirmed that they would need support to remove patient-identifying data when trading in their device. ##Conclusions: App, smartphone and mobile device ownership among dental professionals for clinical communications is widespread in the ROI (and UK), with respondents using their devices to send images (photos and radiographs) to one another. However, the risks of such activities are only partly acknowledged, with many having a lack of insight into data security.
APA, Harvard, Vancouver, ISO, and other styles
44

FinoTrader. "FTMO challenge FinoTrader." January 22, 2022. https://doi.org/10.5281/zenodo.5893582.

Full text
Abstract:
<strong>FinoTrader is the best alternative of FTMO</strong> &nbsp; If you searching for FTMO alternative is FinoTrader, it is best funding talents platform. Finotrader.com best alternative FTMO Prop trading is an exciting way for experienced investors to speculate on the financial markets with serious capital and reduced risk. FINOTRADER is one of the leading firms in the forex prop trading space with over 9000 new members joining in 2021. This review covers account types, leverage, FINOTRADER Challenge rules and more. &nbsp; What Is FINOTRADER? FINOTRADER was founded in 2019 with the aim of providing funded accounts to talented traders. &nbsp; The company has a good reputation with highly developed apps to aid trading strategies and top-rated customer support. &nbsp; What is FINOTRADER &nbsp; FINOTRADER offers a variety of trading instruments including forex, commodities, indices, cryptos, stocks and bonds as well as multiple platforms such as MetaTrader 4, MetaTrader 5 and cTrader. Users can begin trading with up to $200,000 and once the verification process has been completed, they can keep up to 80% of profits. FINOTRADER&rsquo;s biggest single payout was over $40,000. &nbsp; How It Works FINOTRADER evaluates the skill and qualification of prospective traders through a two-step evaluation process: the first step is the FINOTRADER Challenge, and the second step is the Verification. &nbsp; Once this process has been successfully completed, users are offered a professional account. Traders can then remotely manage up to 400,000 USD with leverage up to 1:100 and can continue growing the account according to the scaling plan. &nbsp; Users technically trade on a demo account at all stages of the process &ndash; even as a professional trader. The FINOTRADER account is connected to the firm&rsquo;s live trading account with real capital. &nbsp; FINOTRADER prop trading &nbsp; Here&rsquo;s our guide to getting started with FINOTRADER: &nbsp; 1. Choose Your Account Account types are broken down by risk level (normal vs aggressive) and capital level. Once you have decided which plan is best suited to you, choose a currency (USD, EUR, GBP, CZK), sign up and open an account. &nbsp; 2. Choose Your Platform FINOTRADER is available on MT4, MT5 and cTrader. MT4 and MT5 are available to download to desktop devices. cTrader is available to download as a mobile app from the Google Play Store and the Apple App Store. You can also use the prop firm&rsquo;s webtrader, available on desktop with no download needed. &nbsp; 3. Start The FINOTRADER Challenge Before you can start generating profits, you will need to complete the evaluation process. Step 1 is the FINOTRADER Challenge. You will have to pay a fee, which will depend on your chosen risk and capital level. This is a one-off fee which will be reimbursed once you make your first profit. &nbsp; There is also the option of a free trial challenge if you want to try before you buy. This 14-day trial gives you a taste of the Challenge and allows you to refine your skills. &nbsp; 4. Follow Trading Objectives Each account type has its own rules which you will need to follow to continue to the next stage. These objectives include a maximum trading period (30 days), a minimum period (10 days), a maximum daily loss, and a profit target (10% or 20% depending on your chosen risk level). &nbsp; If you reach the profit target before the maximum trading period, you can progress to the next stage. If you miss the profit target but don&rsquo;t break any other rules, like violating the maximum daily loss, you will get a second chance to complete the challenge for free. &nbsp; 5. Verification The second step of the process is known as Verification. This is where you must prove yourself again, but this time it&rsquo;s free. A couple of days after you complete the FINOTRADER Challenge, you will be sent your Verification log in details. Verification follows the same rules as the Challenge, but with a 60-day maximum trading period and half the profit target. &nbsp; Again, if you fail the FINOTRADER Verification by missing the profit target but don&rsquo;t break any other rules, you can repeat the challenge for free. &nbsp; 6. Become A Funded Professional Trader Once you have successfully completed all the requirements in the evaluation process, you will be able to invest professionally with the FINOTRADER proprietary trading firm. You will need to carry out standard KYC checks to get paid. &nbsp; As a professional trader you must follow the same loss rules, but there is no maximum trading period, no profit target, and no minimum trading days. Professional users keep 70% of profits made on their account. &nbsp; Note, your positions are copied onto the proprietary trading firm&rsquo;s live investing account with real capital. &nbsp; 7. Scaling Plan If you&rsquo;re trading profitably, you can use FINOTRADER&rsquo;s growth plan to get a 25% capital increase every four months. To be eligible for an increase, you will need at least 10% in profits over the last four months (that means an average of 2.5% profit a month) with two out of the four months ending positive. &nbsp; The scaling plan has no cap &ndash; in a year and a half of successful trading, you could be managing up to 600k. &nbsp; Fees There is a single fee for signing up which is calculated according to your capital level and risk scheme. This fee is refunded with your first payout and there are no monthly or other recurrent charges. FINOTRADER accepts a variety of payment methods including bank wire transfer, debit/credit card and Skrill. The proprietary trading firm places no limits on user&rsquo;s locations or nationality, so whether you&rsquo;re in Kenya, India or the USA, you can join FINOTRADER. &nbsp; Accounts Account types are broken down into 10k, 25k, 50k, 100k and 200k challenges. Each challenge has a risk level (Normal or Aggressive) except for the 200k challenge which only has the normal risk level. When deciding which level to go for, consider your trading strategies and experience. On the Aggressive account you are allowed bigger losses but have higher profit targets. FINOTRADER prices range from &euro;155 for the 10k Challenge to &euro;1080 for the 200k Challenge. &nbsp; The challenges are denominated in USD but you can attempt them in different currencies &ndash; the 100k challenge could provide you with 100k USD, 80k EUR or 70k GBP, depending on your chosen currency. &nbsp; You can have multiple accounts, but FINOTRADER has a maximum initial capital allocation of $400k (or $200k for Aggressive accounts). This means you could have two 200k accounts or four 100k accounts. Scaling does not count towards the initial capital allocation sum. Note that you will need to pay for and pass the Challenge for each new account. You can merge FINOTRADER accounts if they have the same risk and currency setup by contacting customer support. &nbsp; All accounts offer leverage up to 1:100 and access to over 100 FX pairs including USD/EUR, USD/GBP; cryptos such a Bitcoin (BTC) and Ripple (XRP); stocks; bonds; indices like US30 and commodities such as gold (XAU/USD). &nbsp; All accounts come with unique trading tools and apps such as the Account Metrix, Mentor Application and the Equity Simulator. These tools can help you monitor and improve your performance, and are only available to FINOTRADER traders. &nbsp; FINOTRADER prop trading firmMentor App FINOTRADERs to keep in mind include: &nbsp; There is no limit on lot sizes You can use all common trading tools, like stop losses and candlestick charts You can trade on FINOTRADER using any strategy, including scalping, hedging or EAs Users cannot hold trades over the weekend, or over long market breaks &ndash; this is called the two-hour rule. You can hold your positions overnight if the rollover is less than two hours. Make sure you are aware of the trading hours and the holiday sessions of your chosen market. For example, most cryptocurrencies like Bitcoin have extended trading hours Be careful with trading the news. FINOTRADER has certain restricted events, such as the release of specific macroeconomic reports. Traders cannot open or close positions two minutes before or after these events. Check the firm&rsquo;s economic calendar to know when these are happening, and use a time zone converter if needed. Withdrawals Returns are paid via a monthly profit split. Users must invoice FINOTRADER and the money will be sent to your account via regular bank wire transfer or Skrill. FINOTRADER charges zero commissions for withdrawals. You will receive a withdrawal certificate as proof of payment. &nbsp; You can invoice the prop trading firm as a company or as an individual. Ensure you manage your earnings in line with your country&rsquo;s tax regulations. For example, if you&rsquo;re trading from UK, you will pay tax on earnings above &pound;12,500. Consult a local tax advisor to ensure compliance with the relevant regulations. &nbsp; Pros Benefits of opening an FINOTRADER account include: &nbsp; Free trial challenge You keep 70% of profits Comprehensive customer support You invest with FINOTRADER funds, not your own Tutorials, Q&amp;As, webinars and discounts on partners&rsquo; educational websites Profitable traders can increase their capital by 25% every four months with the scaling plan Cons Downsides of the prop trading firm&rsquo;s offering include: &nbsp; You can only earn when you get to the professional account, unlike competitors such as The5%ers Less initial capital volume available versus competitors such as Fidelcrest Thorough, two-step evaluation process No holding over the weekend Security FINOTRADER is not a broker so it&rsquo;s unregulated. The company has a thorough two-step evaluation process which has a relatively low pass rate. This ensures that only capable traders make it to professional status. New traders can use the free demo account to refine their skills before paying the FINOTRADER joining fee and beginning the Challenge. &nbsp; Customer Support If something goes wrong, such as a payment gets cancelled, FINOTRADER&rsquo;s customer support team has a good reputation and is available in 13 languages. Business hours are 24/7 for email and live chat and 8 am &ndash; 5 pm (CEST) for phone calls Monday &ndash; Friday: &nbsp; Final Word On FINOTRADER Prop trading is an interesting option for investors in 2022 looking to increase their capital, but be sure to compare firms to find the one best suited to your needs. FINOTRADER&rsquo;s unique analysis apps and highly regarded customer support make it one of our top picks for traders looking to take their talent to the next level. &nbsp; FAQs What Is An FINOTRADER Trader? An FINOTRADER trader acts as a contractor and invests through the proprietary trading firm. After completing a two-step evaluation challenge, investors can trade with real capital to earn serious profits. &nbsp; Is FINOTRADER A Hedge Fund? No, FINOTRADER is not a hedge fund. It is a limited company and a proprietary trading firm. Head to the company website to register for an account. &nbsp; What Can You Trade On FINOTRADER? Users can trade CFDs and other derivatives on over 100 pairs, including forex (GBP/USD, EUR/USD, USD/JPY); commodities such as gold (XAU) and silver (XAG); indices such as US30 and UK100; crypto pairs such as BTC/USD, LTC/USD and XRP/USD, plus many more. Note, trading on the NASDAQ100 (NAS100) is not possible with FINOTRADER.
APA, Harvard, Vancouver, ISO, and other styles
45

Tomohara, Akinori. "Fiscal Externalities In The Globally Integrated Market." Journal of Applied Business Research (JABR) 23, no. 1 (2011). http://dx.doi.org/10.19030/jabr.v23i1.1408.

Full text
Abstract:
&lt;p class="MsoBodyText" style="text-justify: inter-ideograph; text-align: justify; line-height: normal; margin: 0in 34.2pt 0pt 0.5in;"&gt;&lt;span style="font-size: 10pt;"&gt;&lt;span style="font-family: Times New Roman;"&gt;While tax competition of mobile capital has been explored in the literature, little attention has been paid to the effects on business incentives for global trading.&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/span&gt;We show that tax competition creates negative fiscal externalities via distorted production decisions of multinational companies, when the markets across countries are interrelated through intra-firm trade.&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/span&gt;Pareto improvement may emerge once the governance of the interrelated markets is coordinated across different governments. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
46

"Innovations & Technology Based Initiatives in Mutual Fund Distribution Intermediation in India." International Journal of Innovative Technology and Exploring Engineering 9, no. 2 (2019): 4747–53. http://dx.doi.org/10.35940/ijitee.b7215.129219.

Full text
Abstract:
The world of financial services is changing in ways that are more dramatic than we would have foreseen even five years ago. Taking a leaf from evolving ecosystem around mobile telephony, many financial institutions are using smart technology to remodel their branches into smarter point of sale. This has given a genesis to a terminology of “emerging distribution intermediaries” in financial services. Mutual funds (MF) being the combiner of various savings instruments are regarded as the ideal investment vehicle for today’s complex and modern financial scenario. But its penetration is poor. One of the major levers to increase penetration is innovations in distributing MF products. Considering this, Indian government &amp; regulator have taken many policies reforms &amp; IT initiatives towards increasing retail participation in Mutual Funds and equity markets in recent past. Through this paper, researcher has attempted to critically analyze these initiatives. Apart from highlighting various innovations in MF distributions, this paper will also highlight the present state of online Mutual Fund trading platforms. Further, the paper attempts to highlight the areas of concern, augmentation and intervention in this space.
APA, Harvard, Vancouver, ISO, and other styles
47

Reddy, D., and Balamanigandan R. "MOBILE U-NET V3 AND BILSTM: PREDICTING STOCK MARKET PRICES BASED ON DEEP LEARNING APPROACHES." Jordanian Journal of Computers and Information Technology, 2023, 1. http://dx.doi.org/10.5455/jjcit.71-1682317264.

Full text
Abstract:
The development of reliable stock market models has enabled investors to make better-informed decisions. Investors may be able to locate companies that offer the highest dividend yields and lower their investment risks by using a trading strategy. The degree to which stock prices are significantly correlated, however, makes stock market analysis more complicated when using batch processing methods. The stock market prediction has entered a time of advanced technology with the rise of technological wonders like global digitalization. The significance of artificial intelligence models has greatly increased as a result of the significantly enhance in market capitalization. Because it builds a strong time-series framework based on Deep Learning (DL) for predicting future stock prices, the proposed study is novel. Deep learning has recently enjoyed considerable success in some domains due to its exceptional capacity for handling data. For instance, it is commonly used in financial disciplines such as trade execution strategies, portfolio optimization, and stock market forecasting. In this research, we propose a structure based on Mobile U-Net V3 and a hybrid of a (Mobile U-Net V3-BiLSTM) with BiLSTM to forecast the closing prices of Apple, Inc. and S&amp;P 500 stock data. The Root Mean Squared Error (RMSE), Mean Squared Error (MSE), Pearson's Correlation (R), and Normalization Root Mean Squared Error (NRMSE) metrics were utilized to calculate the outcomes of the DL stock prediction methods. The Mobile U-Net V3-BiLSTM model outperformed other techniques for forecasting stock market prices.
APA, Harvard, Vancouver, ISO, and other styles
48

M.SUJITHRA1, AND DR G. PADMAVATHI. "BIOMETRIC SYSTEM PENETRATION IN RESOURCE CONSTRAINED MOBILE DEVICE." March 7, 2013. https://doi.org/10.5121/ijbb.2013.3104.

Full text
Abstract:
International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 DOI : 10.5121/ijbb.2013.3104 35 BIOMETRIC SYSTEM PENETRATION IN RESOURCE CONSTRAINED MOBILE DEVICE M.SUJITHRA1 AND DR G. PADMAVATHI 2 1Assistant Professor, Department of Computer Technology &amp; Applications, Coimbatore Institute of Technology, Email: sujisrinithi@gmail.com 2 Professor&amp; Head, Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore, Tamil Nadu, India. ABSTRACT Over the past few years, the usage of mobile devices to access data has becoming more frequent, and the usage of mobile devices in the applications such as web-browsing, email, multimedia, entertainment applications (games, videos, and audios), navigation, trading stocks, electronic purchase, banking and health care are increased, therefore data security is essential and also it becomes a challenge in securing the data in the mobile device. User authentication schemes such as Password or Personal Identification Number (PIN) based authentication in mobile device is a difficult process for providing safe access to precious, private information or personalized services. To address these problems in the mobile devices, biometric system can be developed which are more secure, affordable and memorable authentication scheme based on graphical assistance, images and audio. We believe that biometric authentication is the most secure approach among other authentication mechanism. This paper discusses the various features of biometrics and mobile device security threats. KEYWORDS Biometrics, Mobile Device, Authentication, Threats, Security. 1. INTRODUCTION As mobile devices continue to evolve in terms of the capabilities and services offered, so they introduce additional demands in terms of security. The need for more security on mobile devices is increasing with new functionalities and features made available. To improve the device security we propose biometric authentication as a protection mechanism. The main reason to use biometrics on the mobile device is to protect the data on the device and to provide secure yet convenient access to the device and to the network it may be connected to. Unfortunately, mobile device theft is on the rise and insurance plans are becoming more expensive. It is very common to lose your mobile phone or have it stolen. The use of biometrics protects the data on the device and serves as a theft deterrent since the device is useless to others when it is protected with biometric security. A good biometric solution makes security convenient. New handsets deploying biometric approaches are being announced regularly, with many based upon fingerprint and voice solutions. Other biometrics however is also being introduced some of which are: facial recognition, signature recognition and newer approaches of iris recognition and gait recognition can be used for mobile device authentication. [1] The remainder of this paper is organized as follows: Section II briefly describes the Mobile Device threats, attacks and their vulnerabilities. Section III presents detailed analysis of Biometric characteristics, its system, including performance evaluation and benefits. Section IV discusses the implementation challenges of biometrics security in mobile devices and Finally Section V concludes this paper. International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 36 2. MOBILE DEVICE THREATS, ATTACKS &amp;VULNERABILITIES The usage of the mobile phone over the last few years has made fundamental changes in our daily life. Mobile devices, namely Personal Digital Assistants (PDAs) and smart phones are containing ever more personal information, including address books, schedules as well as payment information. Smart phones or mobile phones with advanced capabilities like those of personal computers (PCs) are appearing in more people&rsquo;s pockets, purses, and briefcases. Smart phones&rsquo; popularity and relatively lack security have made them attractive targets for attackers. According to a report published earlier this year (2012), smart phones recently outsold PCs for the first time and attackers have been exploiting this expanding market by using old techniques along with new ones. One example is this year&rsquo;s Valentine&rsquo;s Day attack, in which attackers distributed a mobile picture-sharing application that secretly sent premium rate text messages from the user&rsquo;s mobile phone. [2] 2.1 SECURITY THREATS FOR MOBILE PLATFORMS Mobile phones are becoming more and more valuable as targets for attack. People are using smart phones for an increasing number of activities and often store sensitive data, such as email, calendars, contact information and password on the devices. Mobile applications for social networking keep a wealth of personal information. 2.1.1 VULNERABLITY A weakness that is inherent in every network and device. This includes routers, switches, desktops, servers, and even security devices themselves. 2.1.2 THREATS People eager, willing, and qualified to take advantage of each security weakness and they continually search for new exploits and weaknesses. 2.1.3 ATTACKS Threats use a variety of tools, scripts, and programs to launch attacks against networks and network devices. Typically the network devices under attack are the endpoints such as servers and desktops.Table 1 shows the various attacks on mobile devices. [3] Table 1: Various Attacks on Mobile Devices Attacks Causes (Features) Attack Type Mobile Security Affects Mobility Lost or theft device Authentication, Confidentiality Limited resources DoS(Denial of Service) Data Integrity, Confidentiality, Availability Strong Connectivity Requirement Viruses or worms (malware) Data Integrity, Confidentiality, and Charging Several major security issues loom over the use of such devices, including &bull; Mobile devices are often stolen or missing, due to their small size. &bull; The contents in the mobile devices are unencrypted or encrypted under a flawed protocol. &bull; Mobile devices are pron to middle-man attack or viruses attack from wireless connection International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 37 &bull; User authentication is weak or disabled or in a common default mode, the authentication mechanism is single static password authentication can be circumvented easily. Figure 1 illustrates the various threats in mobile environment. To overcome the security problems mentioned above, mobile locks or laptop locks are general solution for better guardian of such devices physically. In order to enhance the security in data, biometrics authentication can be used with complicated algorithms are practiced.[4] Figure 1. Various threats in mobile environment 2.2 VARIOUS MOBILE DEVICE PLATFORMS To protect data on mobile devices, it is important to know about mobile device operating systems that power most of today&#39;s smart phone and tablets. Apple&#39;s iOS: Incredibly popular operating system from Apple, running devices such as the iPhone, iPad, iPod Touch, and Apple TV. Google&#39;s Android: Google&#39;s mobile device operating system, powering devices from several device manufacturers. Microsoft&#39;s Windows Phone: A newer operating system from Microsoft that ships on devices from a variety of vendors. Windows Phone 7 represents a complete redesign of Microsoft&#39;s previous operating system, Windows Mobile 6.5. Blackberry: A long-standing favorite in the enterprise due to security and manageability features. The i-OS and Android platforms have increased in popularity in recent years and have become alternatives to Blackberry in many enterprises. Nokia&#39;s Symbian: Open-source operating system managed by Nokia. In 2011, Nokia announced that it would begin building devices based on the Microsoft Windows Phone operating system, rendering the future of Symbian questionable. [5] 3. BIOMETRIC SYSTEM OVERVIEW Biometrics is a method of recognizing a person based on his/her unique identification. Biometric identification is often used in large-scale systems such as computer systems security, secure E-banking, Mobile devices, smart cards, credit cards, secure access to buildings, health and social services. Biometric system refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. It is generally a pattern recognition system that makes a personal identification by establishing the authenticity of an individual. Authentication using biometric characteristics is more convenient because they cannot be forgotten, lost, or stolen which ensures the physical presence of the user while offering a significantly higher security. One individual has three possibilities to prove its identity: a) Something an individual DATA (e.g., a password, Personal ID Number (PIN), the combination to a lock, a set of facts from a person&#39;s background). International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 38 b) Something an individual POSSESSES (e.g., a token or card, a physical key to a lock). c) Something an individual IS (Intermediate System) (e.g., personal characteristics or &quot;biometrics&quot; such as a fingerprint, Iris, voice pattern). Generically biometrics is categorized in two types: physiological and behavioral. Physiological approaches perform authentication based on a physical attribute of a person, such as their fingerprint, face, Iris, Retina, Hand Geometry and Ear. By contrast, behavioral biometrics utilizes distinct features in the behavior of the user to perform the relevant classification, such as their voice, signature, and key stroke. Physiological biometrics tend to be more trustworthy approaches, as the physical features are likely to stay more constant over time and under different conditions, and tend to be more distinct within a large population . For this reason physiological approaches are often used in identification-based systems, whereas behavioral characteristics (which tend not to have such unique characteristics and vary more with time) are therefore mainly used for verification purposes.[6] Figure 2 describes user authentication types. Figure2. User Authentication Mechanism 3.1 CHARACTERISTICS OF A BIOMETRIC SYSTEM As defined by the International Biometric Group (IBG) biometrics is &ldquo;the automated use of physiological or behavioral characteristics to determine or verify identity&rdquo;. As can be seen in the definition, biometrics can be used in two distinct modes: identification to determine identity and verification to verify a claimed identity. Identification: In this mode the biometric system reads a sample from the user and tries to find a match by looking at the entire database of registered users. A 1: N comparison is performed and thus is often more demanding in terms of distinctiveness of the biometric characteristics. Authentication/Verification: In this mode the system tries to verify a claimed identity. The user provides a sample and an identity (e.g. a username). The system retrieves the template that it keeps relative to the claimed identity and checks whether the newly acquired sample matches that template. This is a 1:1 comparison and is in general a much easier procedure to implement as it can be less demanding in both processing and distinctiveness of the features. 3.2 BIOMETRIC SYSTEM METHODOLOGY Regardless of the biometric technique or the comparison mode utilized, the way in which the biometric process takes place is identical. Figure 3 illustrates the generic biometric system where the two key functions of the biometric authentication process are shown enrolment and authentication. International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 39 Figure 3. Biometric System Enrolment represents the procedure where the user provides the biometric information to the system for it to store and generate a reference profile for subsequent authentication. The biometric sample is captured by an appropriate sensor and the reference template is generated through the extraction of features that the system requires to use for authentication. The reference template is then stored to the template database for it to be used in future. Authentication represents the process that takes place when a user requests access to the system. At that time, an identification or verification of his identity must take place in order to be established as a legitimate user. A new sample is acquired from the sensor, which is subsequently compared to the reference template. The result of this comparison goes through the authentication policy of the system which determines whether the sample and template are matched closely enough to recognize the user as legitimate. [7] 3.3 BIOMETRICS PERFORMANCE EVALUATION Biometrics does not operate like passwords, where the correct input of the secret knowledge can assure access to the system with 100% accuracy. With biometrics a legitimate user might provide a sample, but several factors may still cause them to be rejected by the system. These factors might be environmental (e.g. a bad acquisition from a fingerprint sensor due to a cut finger or inadequate lighting for face recognition or too much background noise for voice verification) or related to the underlying uniqueness of the characteristics involved. This might not only lead to rejecting an authorized user but also in accepting an impostor. The quality metrics used to evaluate the performance of the biometric system are as follows: False Acceptance Rate (FAR), which represents the probability of an impostor getting accepted by the system (sometimes referred to as the Impostor Pass Rate). False Rejection Rate (FRR), which represents the probability of falsely rejecting an authorized user (sometimes referred to as the False Alarm Rate). Failure to Enroll Rate (FTE), which refers to situation where the sample is not able to provide enough information to create a template. That can be due to noise from the capture or a lack of features from the user, for example burned fingers. Failure to Acquire Rate (FTA), which refers to the situation where the system is unable to acquire a sample from the user. [8] Capture Authentication Policy Compare Storage Enrolment Authentication    Extract Create Template International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 40 3.4 BIOMETRIC SYSTEM BENEFITS A biometrics security system offers the following benefits: &bull; Guarantees physical location of the user &amp;High-throughput. It can be determined with certainty that the user was that the point when and where the biometric template collected. When there is a need to identify a person from a large population, automatic biometric identification may be the only efficient solution. &bull; Biometric trait is unforgettable, cannot be lost and shared. Unlike the classic passwords that need to be remembered, biometric traits cannot be forgotten because they represent something that the user is: physically or behaviorally. Unlike authentication tokens, ID cards or passwords written on a piece of paper, biometric traits cannot be lost. Due to their nature biometric traits cannot be shared between users. This ensures that the user that logs in the system is the actual user and not a colleague that is trying to help. &bull; It is appealing &amp; cost efficient. Most people find biometric systems appealing because of the ease of use and because it is impressive how a door can be opened by just a swipe of a finger. Sure there will be an upfront cost with the installation of the system and with user&rsquo;s education but in the long run it proves cost efficient due to the benefits listed above. It cannot be shared and it guarantees physical location this way no employee can help-out a colleague that is late by punching-in in the time system on his behalf. And it cannot be lost or forgotten this way costs of reissuing new identification tokens are reduced, the desktop support time is reduced because the need of resetting passwords will be less, if any, and the down-time of the employees because they&rsquo;ve got locked out from the systems is also reduced. &bull; It can provide emergency identification &amp;prevents identity theft. In those cases when a person cannot identify itself, using a biometric system may be the only way to find his identity. In the most cases of identity theft, the impostor used victim&rsquo;s name and personal identification number to create credit card accounts and use those in his behalf. Using biometric security systems makes it practically impossible for impostors to pretend they are somebody else. 4. IMPLEMENTATION CHALLENGES IN MOBILE DEVICE SECURITY In recent years, new mobile device technology has inspired many business mobility initiatives. By providing better information whenever and wherever it&rsquo;s needed, mobility streamlines and accelerates business process, enables businesses to deliver better service, and provides significant competitive advantages. User authentication is the primary line of defense for mobile and handheld devices such as Personal Digital Assistants (PDA). Authentication determines and verifies the identity of the user in the Mobile Device. Because of the limits of mobile devices, implementing mobile security solutions must address the following needs and challenges in building mobile security. [9] &bull; Energy saving security solutions The limited battery life and operation time requires mobile security solutions to be implemented in an energy saving approach. &bull; Limited applications of existing security solutions The limited computing capability and processing power of mobile devices restrict the applications of many existing complex security solutions, which require heavy processors. International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 41 &bull; Restricted size of screen and keyboard It restricts the input and output capabilities of mobile phones, which in turn cause some security related applications, for example, password protection may not be easy for mobile users. Table 2 lists few biometric traits currently available on mobile handsets. Table 2: Biometric Applications on Mobile Handsets Technique Product/vendor Fingerprint NTT DoCoMo Face Omron (Omron), Oki Electric (Biometrics.co.uk) Signature PDALock (PDALock) Iris xVista (Cellular-News) Gait VTT (Young) &bull; Higher portability and inter-operation issues Since mobile devices may be equipped with different mobile platforms and operation environments, mobile security technologies and solutions must be implemented with a higher portability to address interoperation issues. &bull; Mobility &amp; Strong personalization Each device comes with us anywhere we go and therefore, it can be easily stolen or physically tampered, unique owner. &bull; Strong connectivity Smart phone enables a user to send e-mails, to check her online banking account, to access lot of Internet services; in this way, malware can infect the device, either through SMS or MMS or by exploiting the Internet connection. &bull; Technology convergence Single device combines different technologies which may enable an attacker to exploit different routes to perform her attacks. &bull; Reduced capabilities Even if smart phones are like pocket PCs, there are some characteristic features that lack on smart phones, e.g. a fully keyboard. [10] Some examples of future risks associated with smart phones include &bull; Data leakage resulting from device loss or theft. &bull; Unintentional disclosure of data, Attacks on decommissioned devices. &bull; Network spoofing &amp; Surveillance attacks. &bull; Financial malware attacks. &bull; Network congestion. Although biometric technologies provide effective security solutions for mobile accesses, they have some limitations. For example, when thieves cannot get access to secure properties, there is a chance that they will stalk and assault the property owner to gain access [11]. In 2005, Malaysian car thieves cut off the finger of a Mercedes-Benz S-Class owner when attempting to steal the car (see http://en.wikipedia.org/wiki/Biometric).However, we must also consider the above discussed factors when choosing a proper biometric trait for mobile device authentication.[12] International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 42 5. CONCLUSION The growth in the creation and maintenance of secure identities for mobile devices has created challenges for individuals, society and businesses particularly in mobile added value services (mobile banking, mobile check-in, mobile ticket, et. al) and government security services. Although many obstacles remain, the growth in wireless technology, and the improvement of mobile devices will stimulate growth in the mobile biometrics market. Security has been one of the important elements in Mobile environment. The conventional Pin and Password authentication on mobile devices provides lower level security while biometric authentication offers higher level security. Biometric systems are offering a more convenient way to secure private information stored on mobile device. Biometrics systems are also adding security to remote transactions initiated using a mobile device. Due to the strict requirement for security, biometric systems can be used for authentication purpose. It is because biometric systems are the least vulnerable to intrusions. In fact, researches in the field are growing. Therefore, in the future the industry would expect even wider use of biometric systems in the mobile device authentication. 6. REFERENCES [1] Anil K. Jain, Arun Ross and Salil Prabhakar, (2004) &ldquo;An Introduction to Biometric Recognition&rdquo; IEEE Transactions on Circuits and Systems for Video Technologies, vol. 14, no. 1. [2] C.R. Mulliner,(2006) &ldquo;Security of smart phones&rdquo;, Master&rsquo;s thesis submitted to University of California, Santa Barbara. [3] M.Sujithra, Dr. G.Padmavathi, (2012)&rdquo;Mobile Device Security-A survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism&rdquo;, International Journal of Computer Applications (IJCA) Volume 56 - Number 14. [4] Anurag Kumar Jain,DevendraShanbhag(2012) &ldquo;Addressing Security and Risks in Mobile Applications&rdquo;. [5] Roberta Cozza, (2011) &ldquo;Forecast: Mobile Communications Devices by Open Operating System, Worldwide, 2008-2015,&rdquo; Gartner. [6] Mathew Kabatoff John Dougman, BioSocieties, (2008) &ldquo;Pattern Recognition: Biometrics, Identity and State &ndash; An Interview with John Dougman&rdquo;, 3, 81, 86, &copy; London School of Economics and Political Science, London UK [7] KresimirDelac, MislavGregic, (2004) &ldquo;A Survey of Biometric Recognition Methods&rdquo;, 46th International Symposium Electronic in Marine, Zadar, Croatia. [8] M.Sujithra, Dr. G.Padmavathi, (2012) &ldquo;Biometrics for Low Power Mobile Devices&rdquo;, International Conference on Mathematical Modelling and Applied Soft Computing (MMASC 2012) (Towards high performance and knowledge optimization) Volume 2, pp1016-1023. [9] Paul Ruggiero and Jon Foote, (2011) &ldquo;Cyber Threats to Mobile&rdquo;, Produced for US-CERT, a government organization, Carnegie Mellon University-US. [10] Tseng,D; Mudanyali, O;,Oztoprak.C;Isikman,S; Sencan,I;Yaglidere,O&amp;Ozcan , A(2010), Lensfree Microscopy on a cell phone.Lab on a chip, vol .10, No.14,pp.1782-1792,ISSN 1473-0197. [11] Racic, R., Ma, D, Chen, H. Exploiting MMS Vulnerabilities to Stealthily.(2011)http://www.cs.ucdavis.edu/~hchen/paper/securecomm06.pdf [12] Mobile Device Security: Securing the Handheld, Securing the Enterprise. (2011)http://www.good.com/media/pdf/enterprise/mobile_device_security_wp.pdf International Journal on Bioinformatics &amp; Biosciences (IJBB) Vol.3, No.1, March 2013 43 Authors M.Sujithra is the Assistant Professor in the Department of Computer Technology and Applications of Coimbatore Institute of Technology, Coimbatore. She is having teaching experience of 9 years. She is pursing PhD in Avinashilingam University for women, Coimbatore. Her areas of interest include Mobile Device Security, Biometrics, Information and communication Security. Dr.G.Padmavathi is the Professor and Head of computer science of Avinashilingam University for women, Coimbatore. She has 25 years of teaching experience and one year of industrial experience. Her areas of interest include Real Time Communication, Network Security and Cryptography. She has 140 publications in her research area. Presently she is guiding PhD&rsquo;s Scholars and M.Phil Researchers. She has been profiled in various Organizations her academic contributions. She has completed four projects funded by UGC and DRDO. She is life member of many preferred organizations of CSI, ISTE, WSEAS, AACE, and ACRS.
APA, Harvard, Vancouver, ISO, and other styles
49

Dr., Kishori J. Bhagat &. Miss. Tejal Mahajan. "O2O VICIOUS CIRCLE: A SHIFT IN CUSTOMER'S BUYING BEHAVIOUR IN THANE DISTRICT." February 27, 2023. https://doi.org/10.5281/zenodo.7802299.

Full text
Abstract:
O2O ecommerce was the key to growth in 2020. The coronavirus pandemic pushed more consumers online but for those still longing for in-store experiences. Today&rsquo;s customers are starting their shopping experience online. Whether it&rsquo;s seeing an online advertisement or a recommendation from a friend on social media. People are spending more time online now more than ever. In fact, they are spending their time on mobile more than TV. This is what makes the Offline to Online journey so critical for businesses. People are no longer spending their time watching TV advertisement. O2O is Online to Offline, referring to the online business opportunities by using the Internet, the offline business trading in the Physical Store. Since Online E-commerce decided to open offline stores and the offline stores began to build online platform. Brick and Mortar is a type of business model that has both online and offline operations, which typically include a website and a physical store. A Brickand- mortar company can offer customers the benefits of fast online transactions and traditional face-to-face service and is thus potentially more competitive than a traditional &quot;bricks and mortar&quot; type of business, which is offline only. This type of business model is also referred to as Bricks and bricks. Brick-and-mortar shopping gives customers a chance to chat with sales representative, touch and feel, and get the in-store experiences. Combine that In-store customer experience with an online strategy so shoppers can read detailed product descriptions without talking to a sales representative. In order to study Shifts from Online to Offline to Online and Shift from Offline to Online to Offline; this study was conducted on customers who residing in the Thane District. The study consists of primary and secondary data. A structured questionnaire was used for data collection with 7-points Likert scale. Null hypotheses were tested using Mann-Whitney U Test &amp; Kruskal Wallis test. The study in hand would be beneficial to the Marketers, Customers and Society at large.
APA, Harvard, Vancouver, ISO, and other styles
50

Lee, Ashlin. "In the Shadow of Platforms." M/C Journal 24, no. 2 (2021). http://dx.doi.org/10.5204/mcj.2750.

Full text
Abstract:
Introduction This article explores the changing relational quality of “the shadow of hierarchy”, in the context of the merging of platforms with infrastructure as the source of the shadow of hierarchy. In governance and regulatory studies, the shadow of hierarchy (or variations thereof), describes the space of influence that hierarchal organisations and infrastructures have (Héritier and Lehmkuhl; Lance et al.). A shift in who/what casts the shadow of hierarchy will necessarily result in changes to the attendant relational values, logics, and (techno)socialities that constitute the shadow, and a new arrangement of shadow that presents new challenges and opportunities. This article reflects on relevant literature to consider two different ways the shadow of hierarchy has qualitatively changed as platforms, rather than infrastructures, come to cast the shadow of hierarchy – an increase in scalability; and new socio-technical arrangements of (non)participation – and the opportunities and challenges therein. The article concludes that more concerted efforts are needed to design the shadow, given a seemingly directionless desire to enact data-driven solutions. The Shadow of Hierarchy, Infrastructures, and Platforms The shadow of hierarchy refers to how institutional, infrastructural, and organisational hierarchies create a relational zone of influence over a particular space. This commonly refers to executive decisions and legislation created by nation states, which are cast over private and non-governmental actors (Héritier and Lehmkuhl, 2). Lance et al. (252–53) argue that the shadow of hierarchy is a productive and desirable thing. Exploring the shadow of hierarchy in the context of how geospatial data agencies govern their data, Lance et al. find that the shadow of hierarchy enables the networked governance approaches that agencies adopt. This is because operating in the shadow of institutions provides authority, confers bureaucratic legitimacy and top-down power, and offers financial support. The darkness of the shadow is thus less a moral or ethicopolitical statement (such as that suggested by Fisher and Bolter, who use the idea of darkness to unpack the morality of tourism involving death and human suffering), and instead a relationality; an expression of differing values, logics, and (techno)socialities internal and external to those infrastructures and institutions that cast it (Gehl and McKelvey). The shadow of hierarchy might therefore be thought of as a field of relational influences and power that a social body casts over society, by virtue of a privileged position vis-a-vis society. It modulates society’s “light”; the resources (Bourdieu) and power relationships (Foucault) that run through social life, as parsed through a certain institutional and infrastructural worldview (the thing that blocks the light to create the shadow). In this way the shadow of hierarchy is not a field of absolute blackness that obscures, but instead a gradient of light and dark that creates certain effects. The shadow of hierarchy is now, however, also being cast by decentralised, privately held, and non-hierarchal platforms that are replacing or merging with public infrastructure, creating new social effects. Platforms are digital, socio-technical systems that create relationships between different entities. They are most commonly built around a relatively fixed core function (such as a social media service like Facebook), that then interacts with a peripheral set of complementors (advertising companies and app developers in the case of social media; Baldwin and Woodard), to create new relationships, forms of value, and other interactions (van Dijck, The Culture of Connectivity). In creating these relationships, platforms become inherently political (Gillespie), shaping relationships and content on the platform (Suzor) and in embodied life (Ajunwa; Eubanks). While platforms are often associated with optional consumer platforms (such as streaming services like Spotify), they have increasingly come to occupy the place of public infrastructure, and act as a powerful enabler to different socio-technical, economic, and political relationships (van Dijck, Governing Digital Societies). For instance, Plantin et al. argue that platforms have merged with infrastructures, and that once publicly held and funded institutions and essential services now share many characteristics with for-profit, privately held platforms. For example, Australia has had a long history of outsourcing employment services (Webster and Harding), and nearly privatised its entire visa processing data infrastructure (Jenkins). Platforms therefore have a greater role in casting the shadow of hierarchy than before. In doing so, they cast a shadow that is qualitatively different, modulated through a different set of relational values and (techno)socialities. Scalability A key difference and selling point of platforms is their scalability; since they can rapidly and easily up- and down-scale their functionalities in a way that traditional infrastructure cannot (Plantin et al.). The ability to respond “on-demand” to infrastructural requirements has made platforms the go-to service delivery option in the neo-liberalised public infrastructure environment (van Dijck, Governing Digital Societies). For instance, services providers like Amazon Web Services or Microsoft Azure provide on demand computing capacity for many nations’ most valuable services, including their intelligence and security capabilities (Amoore, Cloud Ethics; Konkel). The value of such platforms to government lies in the reduced cost and risk that comes with using rented capabilities, and the enhanced flexibility to increase or decrease their usage as required, without any of the economic sunk costs attached to owning the infrastructure. Scalability is, however, not just about on-demand technical capability, but about how platforms can change the scale of socio-technical relationships and services that are mediated through the platform. This changes the relational quality of the shadow of hierarchy, as activities and services occurring within the shadow are now connected into a larger and rapidly modulating scale. Scalability allows the shadow of hierarchy to extend from those in proximity to institutions to the broader population in general. For example, individual citizens can more easily “reach up” into governmental services and agencies as a part of completing their everyday business through platform such as MyGov in Australia (Services Australia). Using a smartphone application, citizens are afforded a more personalised and adaptive experience of the welfare state, as engaging with welfare services is no-longer tied to specific “brick-and-mortar” locations, but constantly available through a smartphone app and web portal. Multiple government services including healthcare and taxation are also connected to this platform, allowing users to reach across multiple government service domains to complete their personal business, seeking information and services that would have once required separate communications with different branches of government. The individual’s capacities to engage with the state have therefore upscaled with this change in the shadow, retaining a productivity and capacity enhancing quality that is reminiscent of older infrastructures and institutions, as the individual and their lived context is brought closer to the institutions themselves. Scale, however, comes with complications. The fundamental driver for scalability and its adaptive qualities is datafication. This means individuals and organisations are inflecting their operational and relational logics with the logic of datafication: a need to capture all data, at all times (van Dijck, Datafication; Fourcade and Healy). Platforms, especially privately held platforms, benefit significantly from this, as they rely on data to drive and refine their algorithmic tools, and ultimately create actionable intelligence that benefits their operations. Thus, scalability allows platforms to better “reach down” into individual lives and different social domains to fuel their operations. For example, as public transport services become increasingly datafied into mobility-as-a-service (MAAS) systems, ride sharing and on-demand transportation platforms like Uber and Lyft become incorporated into the public transport ecosystem (Lyons et al.). These platforms capture geospatial, behavioural, and reputational data from users and drivers during their interactions with the platform (Rosenblat and Stark; Attoh et al.). This generates additional value, and profits, for the platform itself with limited value returned to the user or the broader public it supports, outside of the transport service. It also places the platform in a position to gain wider access to the population and their data, by virtue of operating as a part of a public service. In this way the shadow of hierarchy may exacerbate inequity. The (dis)benefits of the shadow of hierarchy become unevenly spread amongst actors within its field, a function of an increased scalability that connects individuals into much broader assemblages of datafication. For Eubank, this can entrench existing economic and social inequalities by forcing those in need to engage with digitally mediated welfare systems that rely on distant and opaque computational judgements. Local services are subject to increased digital surveillance, a removal of agency from frontline advocates, and algorithmic judgement at scale. More fortunate citizens are also still at risk, with Nardi and Ekbia arguing that many digitally scaled relationships are examples of “heteromation”, whereby platforms convince actors in the platform to labour for free, such as through providing ratings which establish a platform’s reputational economy. Such labour fuels the operation of the platform through exploiting users, who become both a product/resource (as a source of data for third party advertisers) and a performer of unrewarded digital labour, such as through providing user reviews that help guide a platform’s algorithm(s). Both these examples represent a particularly disconcerting outcome for the shadow of hierarchy, which has its roots in public sector institutions who operate for a common good through shared and publicly held infrastructure. In shifting towards platforms, especially privately held platforms, value is transmitted to private corporations and not the public or the commons, as was the case with traditional infrastructure. The public also comes to own the risks attached to platforms if they become tied to public services, placing a further burden on the public if the platform fails, while reaping none of the profit and value generated through datafication. This is a poor bargain at best. (Non)Participation Scalability forms the basis for a further predicament: a changing socio-technical dynamic of (non)participation between individuals and services. According to Star (118), infrastructures are defined through their relationships to a given context. These relationships, which often exist as boundary objects between different communities, are “loosely structured in common use, and become tightly bound in particular locations” (Star, 118). While platforms are certainly boundary objects and relationally defined, the affordances of cloud computing have enabled a decoupling from physical location, and the operation of platforms across time and space through distributed digital nodes (smartphones, computers, and other localised hardware) and powerful algorithms that sort and process requests for service. This does not mean location is not important for the cloud (see Amoore, Cloud Geographies), but platforms are less likely to have a physically co-located presence in the same way traditional infrastructures had. Without the same institutional and infrastructural footprint, the modality for participating in and with the shadow of hierarchy that platforms cast becomes qualitatively different and predicated on digital intermediaries. Replacing a physical and human footprint with algorithmically supported and decentralised computing power allows scalability and some efficiency improvements, but it also removes taken-for-granted touchpoints for contestation and recourse. For example, ride-sharing platform Uber operates globally, and has expressed interest in operating in complement to (and perhaps in competition with) public transport services in some cities (Hall et al.; Conger). Given that Uber would come to operate as a part of the shadow of hierarchy that transport authorities cast over said cities, it would not be unreasonable to expect Uber to be subject to comparable advocacy, adjudication, transparency, and complaint-handling requirements. Unfortunately, it is unclear if this would be the case, with examples suggesting that Uber would use the scalability of its platform to avoid these mechanisms. This is revealed by ongoing legal action launched by concerned Uber drivers in the United Kingdom, who have sought access to the profiling data that Uber uses to manage and monitor its drivers (Sawers). The challenge has relied on transnational law (the European Union’s General Data Protection Regulation), with UK-based drivers lodging claims in Amsterdam to initiate the challenge. Such costly and complex actions are beyond the means of many, but demonstrate how reasonable participation in socio-technical and governance relationships (like contestations) might become limited, depending on how the shadow of hierarchy changes with the incorporation of platforms. Even if legal challenges for transparency are successful, they may not produce meaningful change. For instance, O’Neil links algorithmic bias to mathematical shortcomings in the variables used to measure the world; in the creation of irritational feedback loops based on incorrect data; and in the use of unsound data analysis techniques. These three factors contribute to inequitable digital metrics like predictive policing algorithms that disproportionately target racial minorities. Large amounts of selective data on minorities create myopic algorithms that direct police to target minorities, creating more selective data that reinforces the spurious model. These biases, however, are persistently inaccessible, and even when visible are often unintelligible to experts (Ananny and Crawford). The visibility of the technical “installed base” that support institutions and public services is therefore not a panacea, especially when the installed base (un)intentionally obfuscates participation in meaningful engagement like complaints handling. A negative outcome is, however, also not an inevitable thing. It is entirely possible to design platforms to allow individual users to scale up and have opportunities for enhanced participation. For instance, eGovernance and mobile governance literature have explored how citizens engage with state services at scale (Thomas and Streib; Foth et al.), and the open government movement has demonstrated the effectiveness of open data in understanding government operations (Barns; Janssen et al.), although these both have their challenges (Chadwick; Dawes). It is not a fantasy to imagine alternative configurations of the shadow of hierarchy that allow more participatory relationships. Open data could facilitate the governance of platforms at scale (Box et al.), where users are enfranchised into a platform by some form of membership right and given access to financial and governance records, in the same way that corporate shareholders are enfranchised, facilitated by the same app that provides a service. This could also be extended to decision making through voting and polling functions. Such a governance form would require radically different legal, business, and institutional structures to create and enforce this arrangement. Delacoix and Lawrence, for instance, suggest that data trusts, where a trustee is assigned legal and fiduciary responsibility to achieve maximum benefit for a specific group’s data, can be used to negotiate legal and governance relationships that meaningfully benefit the users of the trust. Trustees can be instructed to only share data to services whose algorithms are regularly audited for bias and provide datasets that are accurate representations of their users, for instance, avoiding erroneous proxies that disrupt algorithmic models. While these developments are in their infancy, it is not unreasonable to reflect on such endeavours now, as the technologies to achieve these are already in use. Conclusions There is a persistent myth that data will yield better, faster, more complete results in whatever field it is applied (Lee and Cook; Fourcade and Healy; Mayer-Schönberger and Cukier; Kitchin). This myth has led to data-driven assemblages, including artificial intelligence, platforms, surveillance, and other data-technologies, being deployed throughout social life. The public sector is no exception to this, but the deployment of any technological solution within the traditional institutions of the shadow of hierarchy is fraught with challenges, and often results in failure or unintended consequences (Henman). The complexity of these systems combined with time, budgetary, and political pressures can create a contested environment. It is this environment that moulds societies' light and resources to cast the shadow of hierarchy. Relationality within a shadow of hierarchy that reflects the complicated and competing interests of platforms is likely to present a range of unintended social consequences that are inherently emergent because they are entering into a complex system – society – that is extremely hard to model. The relational qualities of the shadow of hierarchy are therefore now more multidimensional and emergent, and experiences relating to socio-technical features like scale, and as a follow-on (non)participation, are evidence of this. Yet by being emergent, they are also directionless, a product of complex systems rather than designed and strategic intent. This is not an inherently bad thing, but given the potential for data-system and platforms to have negative or unintended consequences, it is worth considering whether remaining directionless is the best outcome. There are many examples of data-driven systems in healthcare (Obermeyer et al.), welfare (Eubanks; Henman and Marston), and economics (MacKenzie), having unintended and negative social consequences. Appropriately guiding the design and deployment of theses system also represents a growing body of knowledge and practical endeavour (Jirotka et al.; Stilgoe et al.). Armed with the knowledge of these social implications, constructing an appropriate social architecture (Box and Lemon; Box et al.) around the platforms and data systems that form the shadow of hierarchy should be encouraged. This social architecture should account for the affordances and emergent potentials of a complex social, institutional, economic, political, and technical environment, and should assist in guiding the shadow of hierarchy away from egregious challenges and towards meaningful opportunities. To be directionless is an opportunity to take a new direction. The intersection of platforms with public institutions and infrastructures has moulded society’s light into an evolving and emergent shadow of hierarchy over many domains. With the scale of the shadow changing, and shaping participation, who benefits and who loses out in the shadow of hierarchy is also changing. Equipped with insights into this change, we should not hesitate to shape this change, creating or preserving relationalities that offer the best outcomes. Defining, understanding, and practically implementing what the “best” outcome(s) are would be a valuable next step in this endeavour, and should prompt considerable discussion. If we wish the shadow of hierarchy to continue to be productive, then finding a social architecture to shape the emergence and directionlessness of socio-technical systems like platforms is an important step in the continued evolution of the shadow of hierarchy. References Ajunwa, Ifeoma. “Age Discrimination by Platforms.” Berkeley J. Emp. &amp; Lab. L. 40 (2019): 1-30. Amoore, Louise. Cloud Ethics: Algorithms and the Attributes of Ourselves and Others. Durham: Duke University Press, 2020. ———. “Cloud Geographies: Computing, Data, Sovereignty.” Progress in Human Geography 42.1 (2018): 4-24. Ananny, Mike, and Kate Crawford. “Seeing without Knowing: Limitations of the Transparency Ideal and Its Application to Algorithmic Accountability.” New Media &amp; Society 20.3 (2018): 973–89. Attoh, Kafui, et al. “‘We’re Building Their Data’: Labor, Alienation, and Idiocy in the Smart City.” Environment and Planning D: Society and Space 37.6 (2019): 1007-24. Baldwin, Carliss Y., and C. Jason Woodard. “The Architecture of Platforms: A Unified View.” Platforms, Markets and Innovation. Ed. Annabelle Gawer. Cheltenham: Edward Elgar, 2009. 19–44. Barns, Sarah. “Mine Your Data: Open Data, Digital Strategies and Entrepreneurial Governance by Code.” Urban Geography 37.4 (2016): 554–71. Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Cambridge, MA: Harvard University Press, 1984. Box, Paul, et al. Data Platforms for Smart Cities – A Landscape Scan and Recommendations for Smart City Practice. Canberra: CSIRO, 2020. Box, Paul, and David Lemon. The Role of Social Architecture in Information Infrastructure: A Report for the National Environmental Information Infrastructure (NEII). Canberra: CSIRO, 2015. Chadwick, Andrew. “Explaining the Failure of an Online Citizen Engagement Initiative: The Role of Internal Institutional Variables.” Journal of Information Technology &amp; Politics 8.1 (2011): 21–40. Conger, Kate. “Uber Wants to Sell You Train Tickets. And Be Your Bus Service, Too.” The New York Times, 7 Aug. 2019. 19 Jan. 2021. &lt;https://www.nytimes.com/2019/08/07/technology/uber-train-bus-public-transit.html&gt;. Dawes, Sharon S. “The Evolution and Continuing Challenges of E‐Governance.” Public Administration Review 68 (2008): 86–102. Delacroix, Sylvie, and Neil D. Lawrence. “Bottom-Up Data Trusts: Disturbing the ‘One Size Fits All’ Approach to Data Governance.” International Data Privacy Law 9.4 (2019): 236-252. Eubanks, Virginia. Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. New York: St. Martin’s Press, 2018. Fisher, Joshua A., and Jay David Bolter. “Ethical Considerations for AR Experiences at Dark Tourism Sites”. IEEE Explore 29 April. 2019. 13 Apr. 2021 &lt;https://ieeexplore.ieee.org/document/8699186&gt;. Foth, Marcus, et al. From Social Butterfly to Engaged Citizen: Urban Informatics, Social Media, Ubiquitous Computing, and Mobile Technology to Support Citizen Engagement. Cambridge MA: MIT Press, 2011. Fourcade, Marion, and Kieran Healy. “Seeing like a Market.” Socio-Economic Review, 15.1 (2017): 9–29. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture &amp; Society 41.2 (2019): 219–35. Gillespie, Tarleton. “The Politics of ‘Platforms.’” New Media &amp; Society 12.3 (2010): 347–64. Hall, Jonathan D., et al. “Is Uber a Substitute or Complement for Public Transit?” Journal of Urban Economics 108 (2018): 36–50. Henman, Paul. “Improving Public Services Using Artificial Intelligence: Possibilities, Pitfalls, Governance.” Asia Pacific Journal of Public Administration 42.4 (2020): 209–21. Henman, Paul, and Greg Marston. “The Social Division of Welfare Surveillance.” Journal of Social Policy 37.2 (2008): 187–205. Héritier, Adrienne, and Dirk Lehmkuhl. “Introduction: The Shadow of Hierarchy and New Modes of Governance.” Journal of Public Policy 28.1 (2008): 1–17. Janssen, Marijn, et al. “Benefits, Adoption Barriers and Myths of Open Data and Open Government.” Information Systems Management 29.4 (2012): 258–68. Jenkins, Shannon. “Visa Privatisation Plan Scrapped, with New Approach to Tackle ’Emerging Global Threats’.” The Mandarin. 23 Mar. 2020. 19 Jan. 2021 &lt;https://www.themandarin.com.au/128244-visa-privatisation-plan-scrapped-with-new-approach-to-tackle-emerging-global-threats/&gt;. Jirotka, Marina, et al. “Responsible Research and Innovation in the Digital Age.” Communications of the ACM 60.6 (2016): 62–68. Kitchin, Rob. The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. Thousand Oaks, CA: Sage, 2014. Konkel, Frank. “CIA Awards Secret Multibillion-Dollar Cloud Contract.” Nextgov 20 Nov. 2020. 19 Jan. 2021 &lt;https://www.nextgov.com/it-modernization/2020/11/exclusive-cia-awards-secret-multibillion-dollar-cloud-contract/170227/&gt;. Lance, Kate T., et al. “Cross‐Agency Coordination in the Shadow of Hierarchy: ‘Joining up’Government Geospatial Information Systems.” International Journal of Geographical Information Science, 23.2 (2009): 249–69. Lee, Ashlin J., and Peta S. Cook. “The Myth of the ‘Data‐Driven’ Society: Exploring the Interactions of Data Interfaces, Circulations, and Abstractions.” Sociology Compass 14.1 (2020): 1–14. Lyons, Glenn, et al. “The Importance of User Perspective in the Evolution of MaaS.” Transportation Research Part A: Policy and Practice 121(2019): 22-36. MacKenzie, Donald. “‘Making’, ‘Taking’ and the Material Political Economy of Algorithmic Trading.” Economy and Society 47.4 (2018): 501-23. Mayer-Schönberger, V., and K. Cukier. Big Data: A Revolution That Will Change How We Live, Work and Think. London: John Murray, 2013. Michel Foucault. Discipline and Punish. London: Penguin, 1977. Nardi, Bonnie, and Hamid Ekbia. Heteromation, and Other Stories of Computing and Capitalism. Cambridge, MA: MIT Press, 2017. O’Neil, Cathy. Weapons of Math Destruction – How Big Data Increases Inequality and Threatens Democracy. London: Penguin, 2017. Obermeyer, Ziad, et al. “Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations.” Science 366.6464 (2019): 447-53. Plantin, Jean-Christophe, et al. “Infrastructure Studies Meet Platform Studies in the Age of Google and Facebook.” New Media &amp; Society 20.1 (2018): 293–310. Rosenblat, Alex, and Luke Stark. “Algorithmic Labor and Information Asymmetries: A Case Study of Uber’s Drivers.” International Journal of Communication 10 (2016): 3758–3784. Sawers, Paul. “Uber Drivers Sue for Data on Secret Profiling and Automated Decision-Making.” VentureBeat 20 July. 2020. 19 Jan. 2021 &lt;https://venturebeat.com/2020/07/20/uber-drivers-sue-for-data-on-secret-profiling-and-automated-decision-making/&gt;. Services Australia. About MyGov. Services Australia 19 Jan. 2021. 19 Jan. 2021 &lt;https://www.servicesaustralia.gov.au/individuals/subjects/about-mygov&gt;. Star, Susan Leigh. “Infrastructure and Ethnographic Practice: Working on the Fringes.” Scandinavian Journal of Information Systems 14.2 (2002):107-122. Stilgoe, Jack, et al. “Developing a Framework for Responsible Innovation.” Research Policy 42.9 (2013):1568-80. Suzor, Nicolas. Lawless: The Secret Rules That Govern Our Digital Lives. Cambridge: Cambridge University Press, 2019. Thomas, John Clayton, and Gregory Streib. “The New Face of Government: Citizen‐initiated Contacts in the Era of E‐Government.” Journal of Public Administration Research and Theory 13.1 (2003): 83-102. Van Dijck, José. “Datafication, Dataism and Dataveillance: Big Data between Scientific Paradigm and Ideology.” Surveillance &amp; Society 12.2 (2014): 197–208. ———. “Governing Digital Societies: Private Platforms, Public Values.” Computer Law &amp; Security Review 36 (2020) 13 Apr. 2021 &lt;https://www.sciencedirect.com/science/article/abs/pii/S0267364919303887&gt;. ———. The Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press, 2013. Webster, Elizabeth, and Glenys Harding. “Outsourcing Public Employment Services: The Australian Experience.” Australian Economic Review 34.2 (2001): 231-42.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography