Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Jen-Sheng Wang"'
Autor:
Jen-Sheng Wang, Yen-Tzu Chen
Publikováno v:
Egyptian Informatics Journal, Vol 26, Iss , Pp 100483- (2024)
Regulatory technology (RegTech) is a significant technology in the financial technology (FinTech) field that can assist FinTech and innovations to solve issues of complying with laws and regulations. However, RegTech is mainly composed of the finance
Externí odkaz:
https://doaj.org/article/ae6c5283aa9743ebb1ae8b691122e898
Autor:
Jen-Sheng Wang
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 9, Pp 101738- (2023)
With the rise of FinTech, Open API (application programming interface) is essential in advancing FinTech applications in the future, but its customer satisfaction is a concern. Therefore, this study uses the technology acceptance model (TAM) to recon
Externí odkaz:
https://doaj.org/article/a60a6edfc6a5422cabd93916488a9339
Autor:
Jen Sheng Wang
Publikováno v:
Financial Innovation, Vol 7, Iss 1, Pp 1-24 (2021)
Abstract In recent years, biometric technologies have been widely embedded in mobile devices; these technologies were originally employed to enhance the security of mobile devices. With the rise of financial technology (FinTech), which uses mobile de
Externí odkaz:
https://doaj.org/article/8a1459530e0f4287be38b2d126a18339
Publikováno v:
Environmental Technology & Innovation. 28:102862
Autor:
Lin, Grace T. R.1 gtrl@faculty.nctu.edu.tw, Jen-Sheng Wang2 vincent.mt98g@nctu.edu.tw, Po-Hsin Hsieh3, Shyu, Joseph Z.1 josephshyu@faculty.nctu.edu.tw
Publikováno v:
Commerce & Management Quarterly. Jun2015, Vol. 16 Issue 2, p269-289. 21p.
Autor:
Jen Sheng Wang
Publikováno v:
Social Science Computer Review. :089443932110583
FinTech, which primarily uses mobile devices and applications as promotional platforms, is on the rise, and verification techniques play an important role. This study aims to compare verification techniques for the development of FinTech. Based on th
Publikováno v:
Journal of Knowledge Management. 21:213-230
Purpose The purpose of this paper is to demonstrate the applications of big data in personal knowledge management (PKM). Design/methodology/approach Five conventional knowledge management dimensions, namely, the value of data, data collection, data s
Publikováno v:
Security and Communication Networks. 8:727-739
Since Apple merged with AuthenTec, a leading fingerprint recognition company, in 2012, biometrics has widely been considered to strengthen security and privacy in the network security field. Although biometrics has been applied in specific areas for
Publikováno v:
Technology Analysis & Strategic Management. 25:1067-1083
Biometrics has been vigorously promoted around the world as a means to strengthen security and privacy in the IT world. Biometrics has been applied in specific areas for decades and proliferated in customer and resident electronic products to enhance
Publikováno v:
Advanced Materials Research. :3139-3153
In recent years, Energy Service Company (ESCO) has been vigorously promoted around the world to engage the challenges of energy efficiency and security, as well as the intensification of the sustainable environment management. Since ESCO were launche