<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Integration of Parental Alert System into Students Online Payment System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>A.O. Isah</string-name>
          <email>1ao.isah@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>John K. Alhassan</string-name>
          <email>2jkalhassan@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Victor O.Waziri</string-name>
          <email>3victor.waziri@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>K.H. Lawal</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>A. Essentials of Online Payment</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>17</fpage>
      <lpage>22</lpage>
      <abstract>
        <p>-The introduction of online payment systems for tuition and other fees in institutions across the globe is a great breakthrough of Information and Communication Technology. However, the attendant security risk has become a serious concern to Information Technology experts and the individual institution implementing the system. Of particular concern is the limited knowledge of parents and guardians about the status of their children or wards due to payment issues. This paper seeks to solve this problem by integrating payment transactions alert algorithm into an existing online payment algorithm in order to provide feedback information from the institution authority to parents or guardians by way of a Short Message Service for all payments made or not by their children or wards. By the codified SMS algorithm into the existing payment system, it is able to deliver feedback messages to parents.</p>
      </abstract>
      <kwd-group>
        <kwd>-online payments</kwd>
        <kwd>parent</kwd>
        <kwd>alert system</kwd>
        <kwd>information security</kwd>
        <kwd>institutions</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        Internet technology has rapidly made the world a global
village in videos, pictures and audios communications.
Exchange of ideas, goods and services are done in a matter
of seconds with the application of online systems. The
competitive nature of business transactions has forced any
company or business outfits to embrace online transactions if
a company or an organization wants to continue to be
relevant in today’s Information Technology world. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
      </p>
      <p>
        Thus, Companies and organizations either private or
government engaging in online transactions should be
seriously concerned about the security implications of such
transactions, security implications consist of the efficiency,
confidentiality, reliability, availability. Doing business online
is no longer an oddity, but the norm and companies desiring
to remain competitive have to maintain some form of online
presence. Doing business online is not limited to commercial
businesses only, institutions across the globe today engages
and rely on online systems for almost their activities
including advertisements, application, registrations ,
academic activities and most importantly, all their payment
schedules. The attendant security risk that goes along such
payment has become an evolving problem to many
institutions world over, it is important to ensure security of
payment system in terms of reliability of hardware, software,
internet network, power supplies and personnel [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
Especially, in institution of higher learning where parents
and guardians are wholly responsible for the provision of
school and tuition fees of their children and wards. Feedback
to such parents and guardians is very important in order to
monitor the activities of their children in respect of their
status since payment of prescribed fees is the first
determining factor of studentship. This is the focus of this
paper.
      </p>
      <p>
        There are some essential elements that must be in place
before an online payment system can be established. These
are PCI compliance, A payment gateway, A merchant
account, ACH payments, and A payment processor. The
payment gateway and the merchant account operators must
set their operations be in total compliance with Payment
Card Industry Data Security Standard (PCI DSS). This
PCIDSS was established the Payment Card Industry Security
Standards Council to in order to ensure that security
information of the card holder is not compromise by
cybercriminals. The payment gateway act as the bridge
between the merchant and the payment processor and also
between customer and the merchant, it ensures that the credit
card information is securely passed through. The merchant
account is a particular account maintained by a bank through
which payments are received from a debit or credit card. The
ACH is the Automated Clearing House payments are credit
and debit transfers where customers pays for services from
their bank accounts. Payment Processor is engaged by
merchant to handle all debit and credit transactions on their
behalf [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>B. Parental right to Their Children’s Information</title>
      <p>
        It is the right of every parent or guardian to have
adequate information about their children or wards [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] in
order to have record of their academic and other activities
while in the school
      </p>
      <p>This means that parent should be in possession of their
children information or data recorded in any medium,
including but not limited to handwriting, email, print, etc.
that is directly related to a student and maintained by the
institution. This may be the students’ grades, test scores,
evaluations, courses taken, advising records, disciplinary
actions, courses, exams and financial records and status.
Behavioural attitudes of students as observed by the
institution authority can also form part of the information
due for the parent’s knowledge.</p>
    </sec>
    <sec id="sec-3">
      <title>C. Information security concern</title>
      <p>Imbibing the culture of information Security is very
critical in parent and institution relationship as regards
children and wards in the institution</p>
      <p>
        If there exist some gaps in identifying factors that have
significant influence on information security culture
adoption. Current information security culture existing
literatures have not agreed on principle on what factors needs
to be presented to create such environment that promotes the
creation of security culture. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]
      </p>
      <p>The author identifies top critical factors that are
necessary for information security culture existence. These
factors are: top management support for information
security, establishing an effective information security
policy, information security awareness, information security
training, education, information security risk analysis and
assessment, information security compliance, ethical conduct
policies, and organization culture.</p>
    </sec>
    <sec id="sec-4">
      <title>D. A case study of admission and payment fraud due to lack of parental information</title>
      <p>Knowing the status of students in an institution cannot be
overemphasized. When parents and guardians do not have
adequate information of their children or wards from the
institution’s authority, students would have field day in all
manners of deceitful acts, cheatings, truancy, absenteeism,
examination malpractice and other vices on the campus that
may have made them to be suspended, rusticated or outright
withdrawer from school. Such students may not disclose
their situation to their parents are often involved in.</p>
      <p>Figure 1 shows fake online payment information
generated to defraud a prospective candidate seeking
admission into a University (Anonymous) by some
admission fraudsters. The candidate whose photograph
appeared in figure 1 was assured that his admission was
successful and therefore went ahead to release money to the
fraudsters to pay the school fees. The student’s Identification
number that the fraudsters claimed to be for the victim
belongs to a genuine and bonafide student of the university
whose particulars are shown in figure 2.</p>
      <p>Figure 2 show the admission data of a genuine student of
the anonymous University whose Identification number was
used to defraud an unsuspecting candidate shown in figure 1.</p>
    </sec>
    <sec id="sec-5">
      <title>E. The implication of figure 1 and figure 2</title>
      <p>The victim that was defrauded had thought that he was
already a student and he started attending lectures until when
the semester examination was approaching and he could not
register on the school porter for continuous assessment tests.
The Continuous Assessments (CAs) test in this particular
University is being conducted by Computer Base Test
(CBT). The porter rejected the student’s Identification
number that the victim entered because, he was never
admitted in the first place and so could not be found in the
admission data base.</p>
      <p>A careful look at figure 1 and 2 revealed some
discrepancies in Student ID numbers and other features in
the genuine payment receipt (figure 2) with those in the fake
payment receipt (figure 1). In the end when the guardian
discovered, he was very surprised to know that his ward was
not even admitted in the university; this is largely because
there was no feedback channel from the University to him to
know the true status of his ward.</p>
      <p>This is the motivation for this research and hence the
author wants to solve this problem by codifying the Short
Message Service (SMS) algorithm and integrating into
existing institution online payment system.</p>
      <p>Exchange of goods and services are mainly based and
evaluated in terms of money all over the world today as
civilization advances from the primitive era where trade by
barter and other forms of methods were used in the exchange
of goods and services.</p>
      <p>Payment for goods and services is the only authentication
that ensures that such exchange has occurred. Several
payment methods or systems has been in use such as, Cash
payment, payment through banks, payment through checks,
payments by credit transfer, automated clearing house, wire
transfer services payments cards.</p>
      <p>
        Researchers have been extensively researching on general
e-payment systems [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] observed the rapid Evolution of
payment models, and discovered that there have been
numerous payment systems with both new and variations on
established models. The author also take a look at some
development in this regard, in January of 2012, one of the
leading social media company Facebook launched its own
payment card which is a normal plastic gift card that allows
users to order for small mail delivery to recipients. The card
is in addition to Facebook’s Gifts feature that was launched
in September 2012, the card allows users purchase physical
goods such as chocolate, shirts, or flowers for friends, make
charitable donations, buy subscriptions, purchase gift cards,
and more. this card the author observed, is different from
other prepaid competitors because it can be accepted by
retailers like: Jamba Juice, Target, Sephora, and Olive
Garden, the card can also be integrated with the Facebook
mobile app.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] Noted that most communication channels are no
longer one to one, as other devices in the network also
receives data generated by a device in the same network
through multicast transmission architecture. This is due to
the fast improvement of information and network
technologies. These multicast systems that enhance rapid
delivery of messages in the network also open up loopholes
to snooping attacks in the network. The study submits that
one to one encryption is no longer effective for the security
of data. So, the authors proposed a novel anonymous
multireceiver encryption, in which receiver’s decryption key is
fixed. Furthermore, the model provided anonymity of
receivers, performance analysis and comparisons with other
schemes.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] Present a resource efficient reconfigurable hardware
implementation of Advanced Encryption Standard (AES)
using an object oriented programming language approach on
Field Programmable Gate Array (FPGA) for rapid
development. In order to boost performance, the authors use
Xilinx System Generator that utilizes efficient conventional
blocks, having used primitive level approach and customize
all the operations in the design of the study.
      </p>
      <p>
        The common process to purchase anything online is for
the prospective customer to visit the merchant’s site for the
products of interest and select the product [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ],. When he is
ready to buy those products, he proceeds to provide his
shipping and billing address, his payment information (e.g.,
debit or credit card information) to the merchant. This
payment information is sent to the merchant in an encrypted
or hashed form so that the merchant cannot obtain it. In order
to receive payment for his sale, the merchant forwards the
customer’s payment information to the payment gateway.
      </p>
      <p>The author observed that in these existing payment
systems, information must go through a payment gateway
which makes the system vulnerable to hackers and other
cyber criminals. The authors therefore developed an
approach for online payment which ensures that customer
payment information is provided directly to the payment
gateway instead of routing the financial information through
a merchant. The author discovered some design issues
arising from this approach which was also addressed the use
of a trusted third party called identity provider, IP, and a
commitment scheme called Pedersen commitment. An IP
verifies the identity of a merchant before processing the
payment. This Pedersen commitment helps to validate
transactions.</p>
      <p>
        According to [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], the online payment is an ecosystem
which is mostly being targeted by cybercriminals. Since
online payment system involves the use credit and debit
cards, there will be many stages of interaction for a cycle of
transaction this includes consumers and their payment cards,
merchants and their point-of-sale (POS) payment systems,
the card brands (i.e. Visa, MasterCard, Discover Network,
American Express), issuing banks, and card processors. The
author explains that end-to-end encryption is needed to
maintain the integrity of transactions carried out online,
because highly sensitive information is involve in the
exchange of yearly traction running into billions of dollars
which is very attractive to cybercriminals.
      </p>
      <p>
        The author submit that software are not save just like the
internet that was primarily designed for connection and not
necessarily designed for security, although, the author agreed
that some software based encryption can remedy the security
issue to some extent but cannot give a total guarantee. Like:.
AES (Advanced Encryption Standard) which is presently the
best encryption available. Hardware security and
implementing multi-criterion authentication in mobile
platform is also very important measure to be considered in
the security of online payment system, [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. This is achieved
by introducing a hardware-protected tamper-resistant
security module (TRSM) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], it ensures that data is
protected at the beginning of card transaction before passing
through the merchant system,
      </p>
      <p>While the security measures suggested by the author has
a far reaching effect on online payment systems, the
challenge of feedback information to some stake holders
who sometimes are the financier of the whole transaction is
still posing a lot of challenges that we seek to solve with this
paper. In our case, the stake holders are the parents that are
providing the funds for their children’s school fees.</p>
      <p>
        [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] The authors did extensive work that highlights the
significance of university portal for Nigerian universities, the
paper also discussed the best practices that could be put in
place to avoid redundancies in future system and processes.
Various uses were also highlighted by the authors. Although,
information and inquiries tracking was explained as
important features of University portal system, however,
their paper did not look at payment system which is an
integral part of university portal system and was not able to
deal in details with the security issues involved in the
universities’ portal system. This gap in security issues was
the focus of this very paper.
      </p>
    </sec>
    <sec id="sec-6">
      <title>A. Example of stages and interfaces involved in a typical institution’s online payment system</title>
      <p>Figure 3 is the personal data interface where the student
enters all his or her relevant Biodata. The students are
required to fill in their own name, age, sex, permanent home
address, state and local government of origin and most
importantly, the name and telephone number of his parent or
guardian.</p>
      <p>Figure 4 is the admission data interface containing some
of student’s data again like ; age, sex, state, local government
area, student’s identification number, course of study, level
and department.</p>
      <p>Figure 5 is the interface showing the payment agent
which generate payment voucher containing the amount of
fees required of student to pay. The payment agent for this
particular university is the inter-switch; there are several
other online payment agents.</p>
      <p>Figure 6 is the interface showing payment transactions.
When student initiate payment, transaction details are
shown whether payment is successful or unsuccessful. At
this stage, the transaction details are being sent to the
telephone number of the parent or guardian of the student
automatically as Short Message Service (SMS). This is
where the work of this research comes to function.
III.</p>
      <p>INTEGRATION OF THE PARENTAL ALERT ALGORITHM
INTO THE EXISTING ONLINE PAYMENT SYSTEM</p>
    </sec>
    <sec id="sec-7">
      <title>The model of institution online payment system</title>
      <p>The method used by the authors to solve this problem can
be said to be straight forward and simple, but the complexity
was in the coding and stringing of the parental SMS alert
model into the main existing payment model.</p>
      <p>Figure 7 and 8 shows the existing model and the
implemented model with the parental alert system
respectively.</p>
      <p>In the usual online payment system, the focus of the
authors which is institution online payment portal, candidates
registered on the portal to have students’ Identification
number(ID number), or user name and a passwaord, for a
freash student, while a returning students who already has an
ID or usaul name will have to login with the ID or user
namee to access his or her page on the portal on the student’s
page as were shown earlier by the interfaces of figurs 1 to 6
in the review chapter of this paper, the student then click and
navigate to the payment Data link .the payment data interface
is linked with any of the payment gateway that the
instittution is in collaboration with for the financial
transaction proper which in this case, is the paymayment of
tuition or any other fees payable to the institution by the
concerned student.</p>
      <p>The student gets all transaction details from the payement
gateway via the institution portal.
Figure 8 is the institution online payment system
integrated with the parental alert SMS algorithm. As
proposed by this paper, the processes involved in the
institution payments is the same as figure 7 but the parental
alert system is introduced at the stage of transaction
interactions between the student making the payment , the
institution payment server and the payment gateway
otherwise known as the third party.</p>
    </sec>
    <sec id="sec-8">
      <title>B. Algorithm for institution online payment system</title>
      <sec id="sec-8-1">
        <title>START</title>
      </sec>
      <sec id="sec-8-2">
        <title>SELECT TARGET FILE</title>
        <p>ENTER STUDENT ID AND PASSWORD
GOTO PAYMENT RECORDS
IF FRESH STUDENT/RETUNING STUDENT
CHECK STATUS
GOTO PAYMENT</p>
        <p>IF PAYMENT UNSUCCESSFUL</p>
        <p>SEND UNSUCCESSFUL_
_FEEDBACK TRANSACTION_
_DETAILS</p>
      </sec>
      <sec id="sec-8-3">
        <title>ELSE</title>
        <p>GOTO PAYMENT
ENDIF
IF PAYMENT SUCCESSFUL
SEND SUCCESSFUL FEEDBACK_
_TRANSACTION DETAILS</p>
      </sec>
      <sec id="sec-8-4">
        <title>ENDIF</title>
      </sec>
      <sec id="sec-8-5">
        <title>STOP</title>
      </sec>
      <sec id="sec-8-6">
        <title>ENDIF</title>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>C. Algorithm for institution online payment system with integrated parental alert system</title>
      <sec id="sec-9-1">
        <title>START</title>
        <p>SELECT TARGET FILE
ENTER STUDENT ID AND PASSWORD
GOTO PAYMENT RECORDS
IF FRESH STUDENT/RETUNING STUDENT
CHECK STATUS
GOTO PAYMENT
IF PAYMENT UNSUCCESSFUL</p>
        <p>SEND UNSUCCESSFUL FEEDBACK_
_TRANSACTION DETAILS
SEND UNSUCCESSFUL SMS/EMAIL TO_
_PARENT</p>
      </sec>
      <sec id="sec-9-2">
        <title>ELSE</title>
        <p>GOTO PAYMENT
ENDIF</p>
        <p>IF PAYMENT SUCCESSFUL</p>
        <p>SEND SUCCESSFUL FEEDBACK_
_TRANSACTION DETAILS
SEND SUCCESSFUL SMS/EMAIL TO_
_PARENT</p>
        <p>ENDIF</p>
      </sec>
      <sec id="sec-9-3">
        <title>ENDIF STOP</title>
        <p>DISCUSSION</p>
        <p>In the existing online payment systems, the actors that
are acting on the system are; the candidate (student) making
the payment, the university portal administrator, the
merchant account bank and the payment processor as
explained in figure 7. All transaction details and feedbacks
are only to candidate, the parent is not among the actors
interaction with the system directly. The normal payment
algorithm as shown in (b), does not accommodate external
actor. The integrated alert algorithm (c) has now extended
some aspect of the transaction information to the parent or
guardian in a way that when even the student make an
unsuccessful attempt to pay any fees, the feedback will be
sent to parent(s), when the payment is successful, the parent
is also aware.</p>
        <p>V.</p>
        <p>CONCLUSION AND RECOMMENDATIONS</p>
        <p>In this research, an automated instant alert message
(SMS) into the online payment system was designed and
tested. The payment portal delivers information to parent
and guardians the very moment payments were made by
their children or ward. This allows the parent or guardian to
keep track of the status of their children or wards in the
institution. The SMS alert algorithm that instantly provides
payment information to parents was introduced to existing
system as one of the contributions to the security features of
students’ online payment. This paper utilized the integrated
SMS codes as a metric to compare other reviewed papers
that were not able to integrate parental automated feedback
mechanism in their works</p>
        <p>It is recommended that students’ examination result
could also be sent to the parent or guardian through this
integrated system. Also the institution authority should verify
the data of the parents or guardian entered in the personal
data page on the portal shown in figure 3. There are license
software the institution’s authority can use to verify the
authentic owner of telephone numbers supplied by the
students.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Montague</surname>
          </string-name>
          ,”
          <article-title>Essentials of Online Payment Security</article-title>
          and Fraud Prevention,” John Wiley&amp; Sons, Inc., Hoboken, NewJersey,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Nasashi</given-names>
            <surname>Nakajima</surname>
          </string-name>
          , “
          <article-title>Payment system technologies and functions: innovations and developments</article-title>
          ,” Reitaku University, Japan,
          <year>2011</year>
          , pp.
          <fpage>89</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Meyer</surname>
          </string-name>
          , “
          <volume>10</volume>
          excellent online payment systems” http://sixrevisions.com/tools/online-payment-systems,
          <year>2012</year>
          .retrieved 22.
          <fpage>02</fpage>
          <lpage>2016</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>California</given-names>
            <surname>Department</surname>
          </string-name>
          of Education, “
          <article-title>Information for parents and family members about becoming involved in the education of their children” http://www</article-title>
          .cde.ca.gov/ls/pf/pf/,
          <year>June 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Alnatheer</surname>
          </string-name>
          ,
          <source>Information Security Culture Critical Success Factors 2015 12th International Conference on Information Technology - New Generations King Abdul-Aziz City for Science and Technology (KACST) Riyadh</source>
          , Saudi Arabia
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Ross</surname>
          </string-name>
          , “
          <article-title>Electronic payments industry explodes with new developments in everything from social media-marketed gift cards to city-sponsored debit/ID cards</article-title>
          ,” http://www.mozido.
          <article-title>com/electronicpayments-industry-explodes-with-new-developments-in-everythingfrom-social-media-marketed-gift-cards-to-city-sponsored-debitidcards/ 2013 Retrieved 22</article-title>
          .
          <fpage>07</fpage>
          .2016
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>Harn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.C.</given-names>
            <surname>Chang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L. W.</given-names>
            <surname>Hsiao</surname>
          </string-name>
          , “
          <article-title>An Anonymous MultiReceiver Encryption Based</article-title>
          on RSA”
          <source>International Journal of Network Security</source>
          <volume>15</volume>
          (
          <issue>4</issue>
          )
          <fpage>307</fpage>
          -
          <lpage>312</lpage>
          . www.ijns.femto.com,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Aziz</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Ikram</surname>
          </string-name>
          , “
          <article-title>Hardware Implementation of AES-CCM for Robust Secure Wireless Network” Available online</article-title>
          at http://www.academicjournals.org/JEAPS
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Pant</surname>
          </string-name>
          , “
          <string-name>
            <given-names>A Secure</given-names>
            <surname>Online Payment System</surname>
          </string-name>
          ”, University of Kentucky,
          <year>2011</year>
          , pp
          <volume>13</volume>
          ,
          <fpage>51</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>steven elefant, “secure online payment system requires end-to-end encryption”</article-title>
          , http://searchsecurity.techtarget.com/magazinecontent/secure
          <article-title>-onlinepayment-system-requires-end-to-end-</article-title>
          <source>encryption retrieved july 23</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
            <surname>Smita</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Noumita</surname>
          </string-name>
          , “
          <article-title>Study and Implementation of MultiCriterion Authentication Approach to Secure Mobile Payment System”</article-title>
          ,
          <source>International Journal of Engineering Science and Advanced Technology</source>
          ,
          <source>(IJEAST)</source>
          ,
          <year>2014</year>
          ,
          <volume>3</volume>
          (
          <issue>3</issue>
          ),
          <fpage>117</fpage>
          -
          <lpage>122</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Abdulhamid</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Idris</surname>
          </string-name>
          , “
          <article-title>Design Evaluation of Some Nigerian University Portals: A Programmer's Point of View”</article-title>
          .
          <source>GESJ: Computer Science and Telecommunications</source>
          ,
          <volume>2010 5</volume>
          (
          <issue>28</issue>
          ),
          <fpage>21</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>