This cross-sectional study empirically evaluated a model designed to predict the varied elements influencing the behavioral intents of financial institutions towards the use of mobile peer-to-peer platforms. Combining behavioral and instrument elements from frameworks based on the Net Valence Theory and the Theory of Reasoned Action, this study examined behavioral intention from the standpoint of financial institutions. An online survey of 88 organizations yielded data that was analyzed using PLS-SEM for hypothesis testing. The findings revealed that (1) instrument mobile perceived trust is a good mediator of heterogeneous factors, including economic ones, (2) the perceived risk has no effect when a mobile perceived trust significantly influences the intention, (3) the mobile perceived usefulness plays no role in the new mobile context, and (4) the combination of behavioral (extrinsic) and instrument (intrinsic) factors is vital and significant in mobile financial business models. In addition, the results suggest that practitioners concentrate on perceived mobile trust, perceived convenience, perceived economics, and perceived mobile ease of use as the primary drivers of mobile peer-to-peer platform adoption. These elements considerably increase the rate of mobile peer-to-peer platform adoption. Therefore, FinTech and mobile technology regulators are recommended to establish a regulatory framework that helps financial institutions regard mobile as trustworthy.
The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.
Background: Mobile phones have become part of everyday life with a potential risk for microbial transmission. Makkah is a mass gathering city that may act as hotspots of disease transmission. The contact between public and both visitors and pilgrims to Makkah can't be overlooked, and any small outbreak within the public can be transmitted rapidly to them.
Aim: We aimed to assess knowledge, attitudes, and practices (KAP) of general population towards infection transmission via mobile phones in Makkah and different characteristics relevant to KAP scores.
Methods: A cross-sectional web-based survey was conducted on general population in Makkah city using a snowballing sampling method. Participants answered questions about their KAP towards infection transmission via mobile phone. The overall KAP scores were graded as good, fair, and poor and explored against different population characteristics using suitable statistical methods.
Conclusion: The overall public knowledge and practices towards the role of mobile phones in infection transmission in Makkah was below average though they have positive attitudes. Raising public awareness is important to decrease the possibility of cross-contamination via mobile phones and to develop adequate preventive strategies in a mass gathering setting like Makkah city.
The banking and financial sectors have witnessed a significant development recently due to financial technology (FinTech), and it has become an essential part of the financial system. Many factors helped the development of this sector, including the pandemics such as Covid-19, the considerable increasing market value of the FinTech sector worldwide, and new technologies such as blockchain, artificial intelligence, big data, cloud computing and mobile technology. Moreover, changes in consumer's preferences, especially the Z-generation (digital generation). FinTech shifted the traditional business models to mobile platforms characterized by ease of access and swift transactions. Mobile technology became the main backbone for FinTech innovations and acts as a channel to deliver FinTech services that overcome all geographical and timing barriers, thus enhancing financial inclusion. Mobile perceived Trust (MPT), or the trust in using financial business models via mobile technology, is a crucial factor in the FinTech context that has mediation effects on the intention and adoption of different FinTech business models. Unfortunately, few studies have explored MPT mediations on consumers' intention to adopt FinTech innovations using mobile technology. Typically, many studies examined trust/MPT as an independent and unidirectional variable and investigated its effects on behaviour intention without predicting its mediation effects. This study aimed to develop a systematic literature review on MPT mediation in FinTech, focusing on the period from 2016 and 2021, in journals ranked Q1 and Q2, and known-based theories such as the technology acceptance model, the unified theory of acceptance and use of technology, and the mobile technology acceptance model. This study found that only four articles were published in Q1 and Q2 journals. In these articles, the MPT was used as a mediator, and its effects were measured on the intention and adoption of the behaviour.
I don't get an exception, the VS just highlights the line mentioned above. I believe the problem is that I don't have ZXing.Net.Mobile.WindowsUniversal in the references. but I can't find it in NuGet.
You can click the "Tools" of vs and choose the label "NuGet Package Manager" then select the "Manage NuGet Package for Solution", in the "Browse" label, search for "ZXing.Net.Mobile", if you are working on an Uwp app, choose "ZXing.Net.Mobile", if you are using Xamarin for developing, choose "ZXing.Net.Mobile.Forms", in the right of the window, select your project and click Install.
But if I debug it on the local machine, the same error occurred, this is possible because there is no scanner can be initialized on my computer, so when I test it on mobile emulator, this error won't happen.
This is your newest comment about your problem, when you want to use ZXing in your app, you will need to open your project's manifest file, choose the "Capabilities" label, and in the left, enable "Internet(Client)", "Microphone" and "Webcam" capabilities. Just tested, if you didn't enable this capabilities, the same error will also occurred on mobile emulator. This is also a possible cause of this problem.
The problem of silencing mobile phones in specific areas has been studied only briefly in the literature, including the review provided in [3]. To the best of our knowledge, no practical solutions have been proposed and implemented to date that do not require changes at either the network level or the Mobile Station (MS) level.
To force each MS that passes through the gate entering to the CA to connect to the two vBTSs installed in the CA, a signal that is stronger than the signal the MS is receiving from its current BTS is transmitted by the two antennas. This will attract the MS to connect to the vBTS, which in turn forces the MS to transmit its International Mobile Station Equipment Identity (IMEI) and International Mobile Subscriber Identity (IMSI) information to identify itself and camp on the vBTS. This enables the vBTS to have complete control over the MS. In particular, the vBTS will match the IMEI and IMSI to its data base. If the MS is not in the whitelist, it will hold on to that MS and no service is provided; while if the MS is in the whitelist, the vBTS sends a deny service message to that MS. When the MS receives this message, it will connect to another BTS and get the service from its MNO [8].
Two shortcomings were observed when using the directional antennas in this system architecture. The first is the unpredictable spillage of RF power to areas beyond the CA boundaries. The second is that RF signal transmission from the inner antenna causes signal reflections inside the CA. The first shortcoming leads to undesired control of MSs that happen to be near the CA. The second shortcoming leads to multipath fading, which in turn leads to attenuation of the radio signal power received by MSs in certain locations within the CA. When this phenomenon happens at a certain instant in time and at specific locations, an MS may receive a signal power from the vBTS weaker than the signal received from the MNO BTS. This will cause MS to undesirably camp on the MNO BTS, thus releasing it from the control of our system.
In this paper, we address the above shortcomings by proposing a simplification of the architecture that was presented in [8] and by replacing the two directional antennas with a Distributed Antenna System (DAS) that consists of a number of radiating antennas (which are often called leaky feeders) inside the CA [11]. A leaky feeder is characterized by its near field, and its transmitted signal power falls off quickly with distance, allowing for more localized control over the CA [12].
The remainder of this paper is organized as follows. In Section 2, the proposed system architecture and associated design are presented. In Section 3, the system prototype and performance evaluation are presented. In Section 4, simulation results are shown, while in Section 5 we draw our conclusions.
We propose a modification to the system that was presented in [8] by replacing the directional inner antenna with a set of leaky feeder antennas (i.e., radiating antennas) that are interconnected using a DAS connected to the inner vBTS [11]. The outer vBTS and the associated directional antenna that were described as part of the method of [8] are no longer necessary following the proposed modification.
In the system design, we used a GSM BTS transceiver vBTS from Lyrtech Inc. [18], which is a development system that can be used to develop small-scale, short-range, GSM BTS type of application for homes and small offices. However, any picocell BTS type can be used in the proposed system.
A set of leaky feeder antennas interconnected via a DAS is placed inside the CA to monitor and report on MSs that enter and/or leave the CA, as shown in Figure 1, where the vBTS unit is represented by the vBTS/vBSC (virtual Base Station Controller) entity. The vBTS is set up to clone the GSM (Global System for Mobile Communications) BTS within the MNO and uses controlled RF power. The set of leaky feeder antennas are placed in the CA such that they can detect the identity of an MS when it enters the CA. If an MS is detected by the DAS via a leaky feeder, it is considered to be within the CA. For an MS to be controlled, it must be within the CA and must respond to paging signals from the vBTS via the DAS antenna. If a controlled MS is no longer detected by the DAS/leaky feeder combination, it is released (uncontrolled) from the system. This occurs naturally as the MS moves back under the influence of the MNO BTS signal when it moves away from the CA. The vBTS is hosted in the CA and is connected to the DAS using RF cables [11].
7fc3f7cf58