LD Based Framework to Mitigate Threats in Mobile Based Payment System

Author(s):  
Jitendra Singh

Smartphones have deeply penetrated in modern lifestyle. Accordingly, usage has grown manifold in the area of social media, collaboration, and mobile-based payment. The security of smartphones is increasingly critical at the user end as well as at service provider's end due to the involvement of monetary payments and personal information. Despite using a smartphone for mobile payments, strong security measures have not been put into place by a majority of users, particularly those involved with electronic payments. This article is an attempt to identify threats applicable to smartphones and classify them based on a broader category of threats. Existing vulnerabilities have been explored. In the light of the digital India campaign, security preparedness among Indian users has been assessed by carrying out a survey that reveals a poor level of preparedness among mobile users. Finally, the authors have proposed a lotus diagram (LD)-based framework to mitigate threats that can negatively impact mobile-based payment. The proposed method will greatly help in strengthening security and mitigating the threats for the user.

2019 ◽  
Vol 10 (4) ◽  
pp. 1-17
Author(s):  
Jitendra Singh

Smartphones have deeply penetrated in modern lifestyle. Accordingly, usage has grown manifold in the area of social media, collaboration, and mobile-based payment. The security of smartphones is increasingly critical at the user end as well as at service provider's end due to the involvement of monetary payments and personal information. Despite using a smartphone for mobile payments, strong security measures have not been put into place by a majority of users, particularly those involved with electronic payments. This article is an attempt to identify threats applicable to smartphones and classify them based on a broader category of threats. Existing vulnerabilities have been explored. In the light of the digital India campaign, security preparedness among Indian users has been assessed by carrying out a survey that reveals a poor level of preparedness among mobile users. Finally, the authors have proposed a lotus diagram (LD)-based framework to mitigate threats that can negatively impact mobile-based payment. The proposed method will greatly help in strengthening security and mitigating the threats for the user.


VUZF Review ◽  
2021 ◽  
Vol 6 (2) ◽  
pp. 146-152
Author(s):  
Liudmyla Polovenko ◽  
Svitlana Merinova ◽  
Kateryna Kopniak

The paper is devoted to the study of innovations in the market of modern payment systems. The pandemic and quarantine restrictions have accelerated the expansion of the payment infrastructure in Ukraine, which in turn raises the issue of security of electronic payment systems. Ukrainians are more actively switching to electronic payments. At the same time, the trend of growing popularity of contactless payment instruments and settlements with them continues. A comparative analysis of the security of payment systems using electronic technologies in the implementation of money transfer services in Ukraine has been performed. The components of the payment system, information security measures in the electronic payment system have been also considered. The schema of electronic payments and the block diagram of the information protection subsystem of electronic payment system have been constructed. The criteria for assessing the security of the electronic payment system have been determined. A total of fifteen safety criteria have been identified, they are divided into six groups according to the degree of safety. Six electronic system payments were used for the study and the research results have been presented in this paper. The tendencies of development of electronic payment systems in modern conditions and ways of improvement of their activity taking into account the newest information technologies have been outlined.


2020 ◽  
Vol 26 (1) ◽  
pp. 151-156
Author(s):  
Andrei Șandor

AbstractSince the emergence of Internet and social media, new Intelligence branches have flourished, like CYBERINT (Cyber Intelligence), OSINT (Open Source Intelligence) or SOCMINT (Social Media Intelligence), with the aim to exploit different dimensions of the virtual world. These Intelligence-related disciplines may inquire personal information, statements and conversations posted voluntarily on websites or social platforms in order to profile people, identify social networks and organizational structures, and uncover vulnerabilities and threats/risks that can jeopardize the security of individuals or organizations. In this respect, the Internet - as environment - can provide valuable information from both technical and social side. This is why the World Wide Web is and will remain an important place to search for data and information that can be processed into Intelligence, and represents the reason why people working in sensitive domains (e.g. Intelligence) should be aware of their vulnerabilities and the risks and threats posed by this environment.DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Heather J. Parker ◽  
Stephen Flowerday

Purpose Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Design/methodology/approach Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online. Findings Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Originality/value This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.


2012 ◽  
Vol 9 (4) ◽  
pp. 378-393 ◽  
Author(s):  
Alice Marwick

People create profiles on social network sites and Twitter accounts against the background of an audience. This paper argues that closely examining content created by others and looking at one’s own content through other people’s eyes, a common part of social media use, should be framed as social surveillance. While social surveillance is distinguished from traditional surveillance along three axes (power, hierarchy, and reciprocity), its effects and behavior modification is common to traditional surveillance. Drawing on ethnographic studies of United States populations, I look at social surveillance, how it is practiced, and its impact on people who engage in it. I use Foucault’s concept of capillaries of power to demonstrate that social surveillance assumes the power differentials evident in everyday interactions rather than the hierarchical power relationships assumed in much of the surveillance literature. Social media involves a collapse of social contexts and social roles, complicating boundary work but facilitating social surveillance. Individuals strategically reveal, disclose and conceal personal information to create connections with others and tend social boundaries. These processes are normal parts of day-to-day life in communities that are highly connected through social media.


2015 ◽  
Vol 44 (1) ◽  
pp. 12-21 ◽  
Author(s):  
Andrea Copeland

Abstract This article explores the possibility that public libraries can be repositories for digital community archives. The overarching goal is to establish a case for public libraries’ developing digital community archives that are participatory and which emphasize born-digital items rather than digitized physical items. This discussion follows my own research and experience in this area to include personal information management, social media and the personal archive, and the accidental community archive, and demonstrates that public libraries can focus on communities’ current events and people rather than solely on those from the past.


Koneksi ◽  
2020 ◽  
Vol 3 (2) ◽  
pp. 328
Author(s):  
Jovita Clarissa ◽  
H.H. Daniel Tamburian

Humans are social beings who need other individuals to group. In interacting with others, individuals will convey information and usually begin with an introduction relates to self disclosure, which is the type of individual communication disclosing information about himself is commonly concealed. Social media is a medium on the Internet that allows users to represent themselves, share, communicate with others and create virtual social ties. This research was intended to examine Instagram and Self Disclosure in an interpersonal communication perspective on the Santo Kristoforus II high school students to find out the activities of students on Instagram social media. Research based on Self-Disclosure theory, communication theory in the Digital Era, social media, and Instagram. Research uses a qualitative approach with case study methods. The results is that the self disclosure conducted by the informant is about daily activities, and the self disclosure is on Instagram involving several Self-Disclosure processes. In the process of Self-Disclosure, informants usually provide personal information such as feelings, thoughts and experiences, and they are also careful enough in uploading information to social mediaManusia disebut makhluk yang memerlukan seseorang untuk saling berhubungan timbal balik. Dalam berinteraksi dengan orang lain, individu akan menyampaikan berbagai informasi dan biasanya diawali dengan perkenalan mengenai dirinya, hal tersebut berkaitan dengan self disclosure, yakni jenis komunikasi individu mengungkapkan informasi tentang dirinya sendiri yang biasa disembunyikan. Media sosial saat ini digunakan penggunanya untuk berkomunikasi, membentuk relasi dengan orang lain secara virtual. Sehingga penelitian ini dimaksudkan untuk meneliti Instagram dan Self Disclosure dalam Perspektif Komunikasi Antarpribadi terhadap Siswa-Siswi SMA Santo Kristoforus II untuk mengetahui aktivitas siswa-siswi di media sosial Instagram. Penelitian berlandaskan teori Self-Disclosure, Teori Komunikasi di Era Digital, Media Sosial, dan Instagram. Penelitian menggunakan pendekatan kualitatif dengan metode studi kasus. Hasil penelitian menunjukkan bahwa pengungkapan diri yang dilakukan oleh informan berisi tentang aktivitas sehari-hari yang dilakukan, dan pengungkapan diri tersebut dilakukan dalam media sosial Instagram yang melibatkan beberapa proses pengungkapan diri. Dalam proses pengungkapan diri, informan biasanya memberikan informasi pribadi seperti perasaan, pikiran dan pengalaman. Dengan banyaknya informasi yang diberikan, tidak menutup kemungkinan mereka juga cukup berhati-hati dalam mengunggah informasi ke media sosial


Sign in / Sign up

Export Citation Format

Share Document