scholarly journals Security Issues of Electronic and Mobile Banking

Author(s):  
Wojciech Wodo ◽  
Damian Stygar ◽  
Przemysław Błaśkiewicz

When designing a security protocol, it is important firstly to define its security goals. These goals are generally referred to as security services. It is also important to identify the mechanisms which can provide each security service. In this chapter, therefore, we first defined the security services of relevance to this chapter and after that the security mechanisms, which can be used to provide the security services are then examined. In next chapter gives the brief details about Attacks and Authentication for Mobile Banking.


It is important that any new product or service is based on user needs and requirements rather than being driven by technology. This is an important issue to consider with SMS and mobile banking. Research related to the usability design issues surrounding online banking are relevant to SMS banking. Concepts related to authentication, online banking processes, and other relevant information security issues are discussed further. Literature relevant to these factors is also considered throughout this process of reflection. This chapter discussed the concepts related to authentication, online banking processes and other relevant information security issues are discussed further. Literature relevant to these factors is also considered throughout this process of reflection. In next chapter discusses about Web based electronic money for online banking.


Author(s):  
Ravi Gupta ◽  
R. Praveen Kumar ◽  
Anuj Bharadwaj

2021 ◽  
Author(s):  
Wojciech Wodo ◽  
Damian Stygar ◽  
Przemysław Błaśkiewicz

Author(s):  
Azamjon Abdullaev ◽  
Mohammed Abdulhakim Al-Absi ◽  
Ahmed Abdulhakim Al-Absi ◽  
Mangal Sain ◽  
Hoon Jae Lee

2020 ◽  
Vol 2 (2) ◽  
pp. p47
Author(s):  
Md. Habibur Rahman ◽  
Md. Al-Amin ◽  
Nusrat Sharmin Lipy

This research examines the information security of adopting mobile banking and suggests maximizing information security in mobile banking in different ways. Security issues pose a threat to mobile banking adoption and diffusion. Therefore, reliable security measures and improved trust improvement are suggested to address information security in adopting mobile banking for financial services. A questionnaire survey is conducted with users of mobile banking technology. Random sampling is adopted in the study. 650 questionnaires were sent to respondents, and 303 responses were recorded. A confirmatory factor analysis with varimax rotation was conducted following correlation and multiple regression analysis to test the hypothesis of the study. The research finds that (1) perceived security and trust affect mobile banking self-efficacy and performance (SEP) of adopting mobile banking for financial services; (2) Reliable security measure and perceive trust improvement positively influence (SEP) of adopting mobile banking for financial services. This study shows the significance of user perceptions of security by inspecting the content of the security rules of mobile banking for clients’ levels. It includes the adoption of technology in financial services. Therefore, the study links the technology acceptance model (TAM) with the literature on perceived security and trust of adopting mobile banking for financial services. The research has applied to the banking industry to develop and expand its banking market by developing reliable security measures and improving the perceived trust of customers to conduct banking transactions using mobile banking technology.


Author(s):  
Krishna Prasad K. ◽  
P. Ushadevi

Adopting new technology in the banking sector is very useful for the growth of banks in India. The bank is the main financial institution that provides the digital technology-enabled services to the customers in an effective manner. Because of competition today each and every bank is providing modern and innovative services to attract a number of customers. Mobile banking (also known as M-banking) is latest technology or novel technology, user-friendly, and widely used concept in Electronic banking that is used to accomplish cashless financial transactions, fund transfer, credit applications and payment of bills, taxes etc. remotely through mobile devices like smartphones, PDAs, and tablets. The uncommon increment in the utilization of mobile phones in both urban and rural areas provides exciting opportunities for the development of cell phone based banking. But in India, a developing country, mobile banking is limited to only some fields such as SMS due to lack of facilities, security issues, poorly performing internet connections and because of high priced. In this paper, we present a comparative study on Mobile Banking transaction of major banks in India. In this paper, we analyzed and discussed portable banking money/financial transactions, using ABCD analysis and based on the analysis we made a few proposals/recommendations to cell-phone enabled banking service contributor. This will encourage the scientist/researcher to find the gap between the traditional and digital method of financial transactions in India.


Author(s):  
Archana Sharma

Truthful authentication with secure communication is necessary in location-based services to protect from various risks. The purpose of this research is to identify security risks in mobile transactions especially in location-based services like mobile banking. The factors need to be identified the reasons of customer distrust in mobile banking. In addition, the security issues with mobile banking systems and mobile devices are highlighted. The chapter finds which approach is more suitable and secure for mobile banking transaction between customer and bank. The research predominantly focuses upon customer trust, security issues, and transaction costs owing to different technology standards of mobile commerce. The first phase highlights the various location-based services in m-commerce, various technology standards, customer trust, and perceived risk, and further, at next level, it highlights the various problems associated mobile database and a comparative study of various replication protocols, transaction security issues, and LBS security challenges.


Sign in / Sign up

Export Citation Format

Share Document