Most major banks, credit card payment processors/issuers and large businesses have come to adopt mobile pay- ment applications for smartphones. A ica, Asia, South America and other developing countries are no exceptions. e rate of growth of developing countries’ smartphone market penetration and usage have increased tremendously in recent years. Based on previous research ndings (Cavallari et al., 2015; 2016), the present study regards mobile payments as one of the new architectures at the heart of “social commerce”. e paper discusses research into the tech- nological aspects that pertain to security issues of smartphones. e novelty of present work resides in the authors’ tailor-made approach. e empirical results highlight the extent of the information that can be passively accessed within the endpoint (smartphone) and the most vulnerable areas to consider. is study is especially pertaining to developing countries where smartphones models and versions of Operating Systems are particularly old or outdated. We conclude that the most critical risk carriers are linked to an abundance of devices with obsolete operating systems and that are no longer supported by the supplier. is has shown to be particularly true about A ica, Latin America and other developing countries, (Duncombe 2014; Han 2012; Asongu 2013). e research concludes that whilst the payment clearing companies are incapable of protecting endpoints, their development and deployment of payment solutions based on HCE architectures will increase the risk of criminal transactions. So the foreseen scenario will see aud schemes that will migrate to the virtual payment environments found in the endpoint, instead of exploiting the weaknesses in the physical POS and/or credit card payment system. Practical research ndings illustrate the most vulnerable areas of mOS in order to prevent attacks and tampering.

Vulnerabilities of Smartphones Payment Apps: The Relevance in Developing Countries

Cavallari, Maurizio
Writing – Review & Editing
;
2017-01-01

Abstract

Most major banks, credit card payment processors/issuers and large businesses have come to adopt mobile pay- ment applications for smartphones. A ica, Asia, South America and other developing countries are no exceptions. e rate of growth of developing countries’ smartphone market penetration and usage have increased tremendously in recent years. Based on previous research ndings (Cavallari et al., 2015; 2016), the present study regards mobile payments as one of the new architectures at the heart of “social commerce”. e paper discusses research into the tech- nological aspects that pertain to security issues of smartphones. e novelty of present work resides in the authors’ tailor-made approach. e empirical results highlight the extent of the information that can be passively accessed within the endpoint (smartphone) and the most vulnerable areas to consider. is study is especially pertaining to developing countries where smartphones models and versions of Operating Systems are particularly old or outdated. We conclude that the most critical risk carriers are linked to an abundance of devices with obsolete operating systems and that are no longer supported by the supplier. is has shown to be particularly true about A ica, Latin America and other developing countries, (Duncombe 2014; Han 2012; Asongu 2013). e research concludes that whilst the payment clearing companies are incapable of protecting endpoints, their development and deployment of payment solutions based on HCE architectures will increase the risk of criminal transactions. So the foreseen scenario will see aud schemes that will migrate to the virtual payment environments found in the endpoint, instead of exploiting the weaknesses in the physical POS and/or credit card payment system. Practical research ndings illustrate the most vulnerable areas of mOS in order to prevent attacks and tampering.
2017
Developing Countries
Endpoint Security
Mobile Payments
Smartphones
Commerce
Web Marketing
Vulnerabilities
Apps
Payment
File in questo prodotto:
File Dimensione Formato  
IJABW-Spring-2017.pdf

accesso aperto

Licenza: Dominio pubblico
Dimensione 1.62 MB
Formato Adobe PDF
1.62 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14086/2493
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
social impact