{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T15:51:59Z","timestamp":1778860319937,"version":"3.51.4"},"reference-count":76,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T00:00:00Z","timestamp":1716422400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T00:00:00Z","timestamp":1716422400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,23]]},"DOI":"10.1109\/saci60582.2024.10619864","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:24:26Z","timestamp":1723483466000},"page":"000533-000540","source":"Crossref","is-referenced-by-count":4,"title":["Literature Review on Security of Personal Information in Electronic Payments"],"prefix":"10.1109","author":[{"given":"Yuqing","family":"Guan","sequence":"first","affiliation":[{"name":"Doctoral School of Safety and Security Sciences, &#x00D3;buda University,Budapest,Hungary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrea","family":"Tick","sequence":"additional","affiliation":[{"name":"&#x00D3;buda University,Keleti K&#x00E1;roly Faculty of Business and Management,Budapest,Hungary"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.12700\/aph.21.7.2024.7.9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/sisy60376.2023.10417743"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/sisy60376.2023.10417897"},{"issue":"10","key":"ref4","first-page":"133","article-title":"Research on the Problems and Countermeasures of Online Payment","author":"Ren","year":"2018","journal-title":"Res. Mod. State-Own. Enterp."},{"key":"ref5","year":"30","journal-title":"EDI-based e-commerce stage"},{"key":"ref6","article-title":"The evolution of the mobile payment | TechCrunch","author":"Rampton"},{"key":"ref7","article-title":"A Brief History of Payments: Understanding the Payments Industrys Forty Years of Development in One Article","year":"30, 2023"},{"key":"ref8","article-title":"Payment Gateway Integration Guide","year":"03, 2024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24193\/ojmne.2022.39.08"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ahici.2009.5340318"},{"issue":"01","key":"ref11","first-page":"172","article-title":"Security Issues and Solutions in E-Payment Systems","author":"Urs","year":"2015","journal-title":"Fiat Iustitia"},{"issue":"10","key":"ref12","first-page":"124","article-title":"Impact of electronic payments on monetary policy","author":"Zhang","year":"2023","journal-title":"Mod. Businesses"},{"key":"ref13","journal-title":"Global Payment Industry In-depth Research Report: Combining Tradition and Technology to Reshape the Financial Ecology"},{"issue":"4","key":"ref14","first-page":"205","article-title":"Financial Informatization, Electronic Payment and Internet Banking","author":"Gong","year":"2018","journal-title":"J. Soc. Sci."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2902905"},{"issue":"5","key":"ref16","first-page":"43-45+49","article-title":"Research on the financial risk of modern mobile payment\u2013Alipay as an example","author":"Chen","year":"2019","journal-title":"Jiangsu Sci. Technol. Inf."},{"issue":"2","key":"ref17","first-page":"142","article-title":"A study on the acceptance behavior of proximity mobile payment users:based on consumer perspective","author":"Yang","year":"2012","journal-title":"Libr. Intell. Work"},{"key":"ref18","article-title":"Electronic Payment: What is it, Types and How does it Works?","author":"Gowtham","year":"2024"},{"issue":"85","key":"ref19","first-page":"73","article-title":"A Brief Introduction to E-Commerce","author":"Long","year":"2000","journal-title":"Mod. Comput. First Half Mon."},{"key":"ref20","first-page":"1","article-title":"Journal of Internet Banking and Commerce E-payments: Problems and Prospects","volume":"13","author":"Raja","year":"2008","journal-title":"J. Internet Bank. Commer."},{"key":"ref21","article-title":"Electronic payment","year":"05, 2024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23956\/ijarcsse\/sv7i5\/0250"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5120\/18946-9993"},{"issue":"1","key":"ref24","article-title":"Adoption of point of sale terminals in Nigeria: assessment of consumers\u2019 level of satisfaction","author":"Adeoti","year":"2012","journal-title":"Res. J. Finance Account."},{"issue":"08","key":"ref25","first-page":"127","article-title":"The Future of the Mobile Payment as Electronic Payment System","volume":"08","author":"Bezhovski","year":"2016","journal-title":"Eur. J. Bus. Manag."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.9.1329-1336"},{"key":"ref27","author":"Carr","year":"2007","journal-title":"Mobile Payment Systems and Services: An Introduction"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/sisy60376.2023.10417741"},{"key":"ref29","article-title":"What is a Mobile Wallet, Origin and History in Financial technology?","author":"Scott-Briggs"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1108\/ijbm-06-2021-0258"},{"key":"ref31","article-title":"The history of digital wallets","author":"Sacco","year":"05, 2024"},{"key":"ref32","article-title":"The Future Of Electronic Checks In Online Payments","year":"2024"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-7908-1652-3_2"},{"issue":"3","key":"ref34","first-page":"110","article-title":"Deconstruction of legal issues of QR code scanning payment","author":"Li","year":"2018","journal-title":"Chin. Law"},{"issue":"02","key":"ref35","volume":"9","author":"Chellapalli","year":"2020","journal-title":"Role Of Customer Perceptions In The Usage Of Electronic Payment Systems"},{"issue":"8","key":"ref36","first-page":"21","article-title":"Evaluation of security disturbance risks in electronic financial payment systems","volume":"2","author":"Dzemydien\u0117","year":"2010","journal-title":"Intelekt. Ekon. Intellect. Econ. Sci. Res. J."},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/s1353-4858(20)30021-0"},{"key":"ref38","article-title":"Identity Theft in Cyberspace: Issues and Solutions","volume":"11","author":"Chawki","year":"2006","journal-title":"Lex Electron"},{"issue":"1","key":"ref39","first-page":"162","article-title":"Internet fraud and transnational organized crime","volume":"10","author":"Shulzhenko","year":"2020","journal-title":"Juridical Trib"},{"key":"ref40","first-page":"480","article-title":"Digital Communication, Personal Values and The Z Generation","volume-title":"Int. May Conf. Strateg. Manag. - IMCSM23","author":"De\u00e1k","year":"2023"},{"key":"ref41","article-title":"Mobile Malware Evolution: An Overview, Part 1","author":"Gostev","year":"2023"},{"key":"ref42","article-title":"What is a Trojan Horse? Definition from","author":"Clark","year":"2024"},{"key":"ref43","article-title":"The dangers of downloading pirated games","author":"Grustniy","year":"2024"},{"key":"ref44","article-title":"The 16 Major Types of Malware \u2013 Defined","author":"Bond","year":"2024"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2018.62003"},{"issue":"14","key":"ref46","first-page":"70","article-title":"How to do a good job in the prevention and control of corporate financial risks in the context of Internet +","author":"Gui","year":"2023","journal-title":"Chin. Agric. Account."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78440-3_35"},{"key":"ref48","article-title":"Potential drawbacks and pitfalls in electronic network payments, Potential drawbacks and pitfalls in electronic network payments","year":"2023"},{"issue":"3","key":"ref49","first-page":"107","article-title":"Research on the Risks and Controls of Instant Money Transfer on Third-Party Payment Platforms","volume":"29","author":"Hu","year":"2018","journal-title":"J. Tongji Univ. Soc. Sci. Ed."},{"issue":"9","key":"ref50","first-page":"89","article-title":"Research on e-commerce secure payment system based on mobile communication network","author":"Lu","year":"2023","journal-title":"Yangtze River Inf. Commun."},{"key":"ref51","author":"Mansoor","year":"2019","journal-title":"An Analysis of Security Systems for Electronic Information for Establishing Secure Internet"},{"issue":"10","key":"ref52","first-page":"133","article-title":"Research on Corporate Financial Risk Control in the \u201cInternet+\u201d Era","author":"Deng","year":"2021","journal-title":"J. Todays Fortune - China Intellect. Prop."},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1108\/09576050210447046"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1080\/1331677x.2017.1305791"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.12700\/aph.21.6.2024.6.6"},{"key":"ref56","article-title":"Third-party payment information security issues and solutions","author":"Huiyouzhifu","year":"2023"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.11.001"},{"issue":"4","key":"ref58","first-page":"20","article-title":"Application analysis of the crime of stealing QR code replacement in the context of electronic payment","author":"Zhu","year":"2023","journal-title":"J. Anhui Police Vocat. Coll."},{"issue":"4","key":"ref59","first-page":"481","article-title":"Current status and outlook of blockchain technology development","volume":"42","author":"Yuan","year":"2016","journal-title":"J. Autom."},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.5195\/ledger.2016.62"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.31585\/jbba-7-1-(1)2024"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-08618-6"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/cinti-macro57952.2022.10029471"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/sisy60376.2023.10417888"},{"issue":"2","key":"ref65","first-page":"151","article-title":"Development and Prospect of Blockchain Technology Application in Financial Direction","volume":"37","author":"Li","year":"2019","journal-title":"J. Appl. Sci."},{"key":"ref66","article-title":"What is blockchain technology?","year":"2024"},{"key":"ref67","article-title":"Bitcoin is an innovative payment network and a new kind of money","year":"2023"},{"key":"ref68","volume-title":"The bitcoin standard: the decentralized alternative to central banking","author":"Ammous","year":"2018"},{"key":"ref69","article-title":"New Trends in Digital Payments: The Widespread Use of Blockchain Technology in the Payments Industry","year":"2023"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/3-7908-1707-4_3"},{"issue":"12","key":"ref71","first-page":"3","article-title":"Exploring the development of third-party payment in the post-licensing era","volume":"356","author":"Hu","year":"2011","journal-title":"J. Int. Financ. Res."},{"issue":"11","key":"ref72","article-title":"The Evolution of Currency and the Development of Electronic Currency - The Promotion and Application of Digital RMB APP","author":"Ren","year":"2023","journal-title":"Bus. Glob."},{"issue":"12","key":"ref73","first-page":"3","article-title":"Monetary Supply Creation Mechanism and Scale of Electronic Currency - Based on the Replacement of Paper Currency in Circulation by Chinese Electronic Currency","author":"Yin","year":"2016","journal-title":"J. Int. Financ. Res."},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-014-0348-1"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.5267\/j.msl.2019.12.020"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"}],"event":{"name":"2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI)","location":"Timisoara, Romania","start":{"date-parts":[[2024,5,23]]},"end":{"date-parts":[[2024,5,25]]}},"container-title":["2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10619709\/10619059\/10619864.pdf?arnumber=10619864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:16:37Z","timestamp":1723526197000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10619864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,23]]},"references-count":76,"URL":"https:\/\/doi.org\/10.1109\/saci60582.2024.10619864","relation":{},"subject":[],"published":{"date-parts":[[2024,5,23]]}}}