Fig. 2From: Role of authentication factors in Fin-tech mobile transaction securityResearch steps for data extractionBack to article page