1,911 research outputs found

    Design of a secure unified e-payment system in Nigeria: A case study

    Get PDF
    The automatic teller machine (ATM) is the most widely used e-Payment instrument in Nigeria. It is responsible for about 89% (in volume) of all e-Payment instruments since 2006 to 2008. Some customers have at least two ATM cards depending on the number of accounts operated by them and they represent the active users of the ATM cards. Furthermore, identity theft has been identified as one of the most prominent problems hindering the wider adoption of e-Business, particularly e-Banking, hence the need for a more secure platform of operation. Therefore, in this paper we propose a unified (single) smart card-based ATM card with biometric-based cash dispenser for all banking transactions. This is to reduce the number of ATM cards carried by an individual and the biometric facility is to introduce another level of security in addition to the PIN which is currently being used. A set of questionnaire was designed to evaluate the acceptability of this concept among users and the architecture of the proposed system is presented

    Improving security for remote payments

    Get PDF
    Given the growing popularity of e-commerce and m-commerce over the past few years, remote payments have become commonplace. Unfortunately, remote payments fraud has grown in response. On September 26, 2011, the Federal Reserve Bank of Chicago and the Secure Remote Payment Council (SRPc) co-hosted a symposium to discuss strategies that help reduce such forms of fraud.Fraud ; Payment systems

    Strengthening e-banking security using keystroke dynamics

    Get PDF
    This paper investigates keystroke dynamics and its possible use as a tool to prevent or detect fraud in the banking industry. Given that banks are constantly on the lookout for improved methods to address the menace of fraud, the paper sets out to review keystroke dynamics, its advantages, disadvantages and potential for improving the security of e-banking systems. This paper evaluates keystroke dynamics suitability of use for enhancing security in the banking sector. Results from the literature review found that keystroke dynamics can offer impressive accuracy rates for user identification. Low costs of deployment and minimal change to users modus operandi make this technology an attractive investment for banks. The paper goes on to argue that although this behavioural biometric may not be suitable as a primary method of authentication, it can be used as a secondary or tertiary method to complement existing authentication systems

    Biometric m-payment systems: A multi-analytical approach to determining use intention

    Get PDF
    Although mobile payment systems offer countless advantages, they do present certain drawbacks, mainly associated with security and privacy concerns. The inclusion of biometric authentication technologies seeks to minimise such drawbacks. The aim of this article is to examine the effect of key antecedents of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) and perceived risk on the intention to use a mobile payment system featuring biometric identification. A new hybrid analytical approach is taken. A sample of more than 2500 smartphone users was obtained through an online panel-based survey. Two techniques were used: first, structural equation modelling (PLS-SEM) was conducted to determine which variables had a significant influence on the adoption of the mobile payment system, and second, an artificial neural network (ANN) model was used, taking a deep learning approach, to rank the relative influence of significant predictors of use intention obtained via PLS-SEM. The study found that the most significant variables affecting use intention were performance expectancy, effort expectancy, facilitating conditions, hedonic motivation and risk. In contrast, subjective norms, price value and habit were found to be weak predictors of use intention. The results of the ANN analysis confirmed almost all SEM findings but yielded a slightly different order of influence among the least significant predictors. A review of the extant scientific literature revealed a paucity of published studies dealing with the adoption and use of mobile payment systems featuring biometric identification. The conclusions and managerial implications point to new business opportunities that can be exploited by firms through the use of this technology

    Mobile security and smart systems

    Get PDF

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness
    • 

    corecore