scholarly journals Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications

2014 ◽  
Vol 16 (2) ◽  
pp. 35-42 ◽  
Author(s):  
Anthony Luvanda ◽  
◽  
Dr Stephen Kimani ◽  
Dr Micheal Kimwele
Author(s):  
Latifa Er-Rajy ◽  
M. Ahmed El Kiram

In the past, banking took place only inside bank rooms, which was a task for customers and bankers at the same time. But in our day, thanks to the high-speed development and growth of mobile technology, the mobile phone platform had the power to create great opportunities for customers of the physical bank due to its capabilities and coverage of the population; this can be proved by the number of mobile subscriptions that approximates the world population figures. In order to explore these opportunities, most banks have already launched their mobile apps or have redesigned the mobile version of their websites. Among the advantages of using mobile banking is that users have the ability to make banking transactions, online payments or transfers, anywhere and at any time. In this article, we investigated the danger of the permissions requested by mobile banking applications, their effects on sensitive user data and their relationship with the attack called “Man in the middle” and its different forms. We took Morocco as a case of study.


Author(s):  
Latifa Er-Rajy ◽  
M. Ahmed El Kiram

In the past, banking took place only inside bank rooms, which was a task for customers and bankers at the same time. But in our day, thanks to the high-speed development and growth of mobile technology, the mobile phone platform had the power to create great opportunities for customers of the physical bank due to its capabilities and coverage of the population; this can be proved by the number of mobile subscriptions that approximates the world population figures. In order to explore these opportunities, most banks have already launched their mobile apps or have redesigned the mobile version of their websites. Among the advantages of using mobile banking is that users have the ability to make banking transactions, online payments or transfers, anywhere and at any time. In this article, we investigated the danger of the permissions requested by mobile banking applications, their effects on sensitive user data and their relationship with the attack called “Man in the middle” and its different forms. We took Morocco as a case of study.


Author(s):  
Sultan Y. As-Sultan ◽  
◽  
Ibrahim Ahmed Al-Baltah ◽  
Fua’ad Hassan Abdulrazzak ◽  
◽  
...  

2021 ◽  
Vol 2 (6) ◽  
pp. 417-438
Author(s):  
Moshele Koenaite ◽  
Eugine Maziriri ◽  
Tinashe Chuchu

In today’s post-modern era, the banking industry is becoming a digital rather than a physical system. Digital banking has been synonymous with the fourth industrial revolution making a notable impact on the African continent.  Therefore, the purpose of this research is to empirically investigate consumer attitudes towards mobile banking applications in South Africa. A positivist paradigm underpinned the study, and a descriptive design was employed. To test the proposed hypotheses a unique conceptual model was  developed. Non-probability sampling was adopted in selecting appropriate participants. A total of data was collected from 325 willing participants through an survey. In terms of analysis, SPSS n and AMOS were utilised to generate descriptive statistics and hypotheses testing.  The results established that attitudes towards mobile banking applications and actual use of mobile banking applications was the strongest relationship.  The empirical evidence presented in this study adds value to the existing research on mobile-banking within the 4th industrial revolution, particularly in South Africa, a largely under-researched area.


Sign in / Sign up

Export Citation Format

Share Document