Do you want a secure e-wallet? Understanding the role of risk and security in e-wallet continuance intention.
Wei-Lee LimUma Thevi MunikrishnanChoi-Meng LeongLee-Chea HiewMei-Wei LeongLiu YangPublished in: Inf. Comput. Secur. (2024)
Keyphrases
- security requirements
- security issues
- security level
- security mechanisms
- security measures
- key management
- security protocols
- information security
- security analysis
- security services
- sensitive data
- access control
- encryption scheme
- security policies
- smart card
- network centrality
- mobile devices
- role based access control
- privacy preserving
- intrusion detection
- continuance intention