Skip to main content

Table 7 The research question-based objectives and identification

From: Role of authentication factors in Fin-tech mobile transaction security

Category

References

q1

q2

q3

q4

q5

Total

C1

[13,14,15,16,17,18,19,20,21,22,23,24,25, 27,28,29, 31,32,33,34,35,36,37, 39, 42, 43, 68, 70, 75, 91, 93, 94]

1

1

1

1

0

4

C2

[54]

1

0

1

1

0

3

C3

[89, 101]

1

1

0

1

0

3

C4

[12, 67, 88]

0

1

1

1

0

3

C5

[26, 30, 38, 40, 45,46,47,48, 51, 52, 55,56,57,58,59,60, 62,63,64, 66, 69, 71, 74, 76, 77, 82, 86, 90, 96, 97, 100, 104]

1

0

0

1

0

2

C6

[41, 50, 53, 61, 65, 72, 73, 76, 78, 80, 83,84,85, 87, 92, 95, 99]

1

0

0

0

0

1

C7

[44, 79]

0

0

0

1

0

1

C8

[81, 98]

0

0

0

1

1

2