13,309 research outputs found

    Security Issues in Mobile Payment from the Customer Viewpoint

    Get PDF
    The perception of mobile payment procedures’ security by the customer is one major factor for the market breakthrough of the according systems. In this paper we examine security issues in mobile payment from the viewpoint of customers. Based on theoretical research we analyze empirical data from the MP2 mobile payment study with 8295 respondents in order to develop a set of dimensions, categories and aspects. The results do have a scientific as well as a practical impact: They provide a basis for the selection of appropriate indicators for further empirical studies. Furthermore they can serve as a guideline for mobile payment service providers in order to prevent security concerns through appropriate design and communication of payment procedures and to convince customers of the security of their mobile procedures by meeting concerns in informative advertising.

    ELECTRONIC COMMERCE SECURITY IN THE CONTEXT OF THE MEANS OF PAYMENT DEMATERIALIZATION

    Get PDF
    Some items regarding electronic commerce, electronic vulnerabilities, electronic means of payment, digital money and electronic micropayments are presented below. Then is presented a method of assessing the quality of applications and e-commerce Web sites. This method is then adapted from the operational point of view, developed and implemented in the study of the electronic micropayment systems’ security, in the purpose of analyzing and evaluating their security in the context of the means of payment dematerialization.e-commerce, micropayment, security, encryption, digital economy, EWAM

    Secure e-transactions using mobile agents with agent broker

    Get PDF
    This paper presents an e-transactions protocol using mobile agents. However, when mobile agents travel to a number of servers for searching optimal purchase for the underlying customer, the mobile codes should be protected. We integrate a secure signature algorithm with the e-transaction algorithm to maintain the security. In addition, an agent broker is involved in the algorithm that will help to reduce the communications among the mobile agents, the customer, and the servers. We have presented security and privacy analysis for the proposed protocol

    Security issues in mobile payment from the customer viewpoint

    Get PDF
    The perception of mobile payment procedures’ security by the customer is one major factor for the market breakthrough of the according systems. In this paper we examine security issues in mobile payment from the viewpoint of customers. Based on theoretical research we analyze empirical data from the MP2 mobile payment study with 8295 respondents in order to develop a set of dimensions, categories and aspects. The results do have a scientific as well as a practical impact: They provide a basis for the selection of appropriate indicators for further empirical studies. Furthermore they can serve as a guideline for mobile payment service providers in order to prevent security concerns through appropriate design and communication of payment procedures and to convince customers of the security of their mobile procedures by meeting concerns in informative advertising

    Electronic security - risk mitigation in financial transactions : public policy issues

    Get PDF
    This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators
    corecore