Economic Bulletin of the National Mining University

 

IssuesSectionsAuthorsKeywords

Article

Issue:2022 №1 (77)
Section:Finances
UDK:030
DOI:https://doi.org/10.33271/ebdut/77.134
Article language:English
Pages:134-139
Title:Security issues in next generation mobile payment systems
Author:Mshvidobadze T. I., Gori State University
Annotation:Methods. In the security process system the following methods are used: analysis method (generalization of the problem, elaboration of the measures to improve security procedures), comparison (to identify of the assessment of M-Payment systems), formalization (to set the problem of the mathematical modelling). Results. The different payment schemes and their use, technology and security have been generalized. Most pay methods are account-based payment systems and their core. The focus is on security, privacy and authentication. Models of mobile payment system (MPS) have been proposed, as well as their technologies and payment methods, various security mechanisms embedded in MPS, encryption technologies and authentication methods. Mobile payment system security mechanism is proposed in response to modern demands. It has been demonstrated that keeping in check the confidentiality, integrity and availability triad, each payment should be made with authentication and encryption because the future of MPS depends on its security features. Novelty. Scientific novelty of the research is in the outlining of strategic prospects of the encryption technologies, authentication methods, and firewall in MPS, to provide different security aspects. Practical value. The potential impact of digitalization on mobile payment systems makes it more difficult than just the result of modular reorganization. The practical value of the paper is to fix the dynamics that can not be found in developed countries. Findings can be applied to other mobile payment systems in developing economies. 
Keywords:Electronic commerce, Business Models, Transactions, Mobile Payment Method, Online System, Payment system, Mobile Commerce, Authentication, Firewall, Cyberattacks
File of the article:EV20221_134-139.pdf
Literature:
  • 1. Pitoura, E., & Samaras, G. (1998). Data Management for Mobile Computing. Kluwer Academic Publishers, 1998, p. 123-127.
  • 2. Cimato, S. (2001). Design of an authentication protocol for gsm javacards. Proceedings from MIIM ’01: International Conference on Information Security and Cryptology, (pp. 355-368). Springer.
  • 3. Wang, Y., Hahn, C., & Sutrave, K. (2016). Mobile payment security, threats, and challenges. Proceedings from MIIM ’16: Second international conference on mobile and secure services (MobiSecServ), (pp. 1-5), IEEE.
  • 4. Baza, M., Lasla, M, Mahmoud, M., Srivastava, G., & Abdallah, M. (2019). Bride: Ride sharing with privacy-preservation, trust and fair payment atop public blockchain. IEEE Transactions on Network Science and Engineering, pp. 247-250. doi.org/10.1109/wcnc.2019.8885769
  • 5. Securing the future of payments together. (2020).
  • 6. Kumar, A., & Shanbhaug, J. (2012). Addressing Security and Privacy Risks Mobile applications. IEEE Computer society. pp. 78-83.
  • 7. Saxena, S., Vyas, S., Kumar, B., & Gupta, S. (2019). Survey on online electronic paymentss security. Proceedings from MIIM ’19: Amity International Conference on Artificial Intelligence (AICAI), (pp. 756-751), IEEE.
  • 8. Thangamuthu, A. (2020). A survey on various online payment and billing techniques. Humanities, vol. 7, no. 3, (pp. 86-91).
  • 9. Saranya, A., & Naresh, R. (2021). Efficient mobile security for e-health care application in cloud for secure payment using key distribution. Neural Processing Letters, pp. 1-12.
  • 10. Téllez, J., & Zeadally, S. (2017). Mobile Payment Systems. Springer, pp.27-30.
  • 11. Tian, F., et al. (2009). Application and Research of Mobile E-commerce security based on WPKI. Proceedings from MIIM ’09: IEEE Internatioal Conference on Information Assurance and Security, (pp. 3-7).
  • 12. Sun, J., & Zhang, N. (2019). The mobile payment based on public-key security technology. Journal of Physics: Conference Series, p. 201, IOP Publishing.
  • 13. Lakshmi, K., Gupta, H., & Ranjan, J. (2017). Ussd-architecture analysis, security threats, issues and enhancements. Proceedings from MIIM ’17: International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), (pp. 798-802), IEEE.
  • 14. Tamazirt, P., Alilat. F., & Agoulmine, N. (2017). Nfc-based ubiquitous monitoring system for e-industry. Proceedings from MIIM ’17: Third International Conference on Mobile and Secure Services (MobiSecServ), pp. 1-4, IEEE.
  • 15. Bhatta, A., & Mishra, A. (2017). Gsm-based commsense system to measure and estimate environmental changes. IEEE Aerospace and Electronic Systems Magazine, vol. 32, no. 2, pp. 54-67.
  • 16. Tsao Y., Zhang Q., & Zeng, Q. (2016). Supply chain network design considering rfid adoption. IEEE Transactions on Automation Science and Engineering, vol. 14, no. 2, pp. 977-983.
  • 17. Dix, S., Phau, I., Jamieson, K., & Shimu, A. (2017). Investigating the drivers of consumer acceptance and response of sms advertising. Journal of Promotion Management, vol. 23, no. 1, pp. 62-79.
  • 18. Deng, L., Huang, H., & Qu, Y. (2017). Identity based proxy signature from rsa without pairings. IJ Net-work Security, vol. 19, no. 2, pp. 229-235.
  • 19. Kizza, J. (2017). Security in wireless networks and devices. Proceedings from Guide to Computer Net-work Security, pp. 397-427, Springer.
  • 20. Shahzad, F., Iqbal, W., & Bokhari, F. (2015). On the use of cryptdb for securing electronic health data in the cloud: A performance study. Proceedings from MIIM ’15: 17th International Conference on E-health Net-working, Application Services (HealthCom), pp. (120-125).
  • 21. Chen, W., Hancke, G., Mayes, K., Lien, Y., & Chiu, J-H. (2010). Nfc mobile transactions and authentication based on gsm network. Proceedings from MIIM ’10: Second International Workshop on Near Field Communication, (pp. 83-89), IEEE.
  • 22. Singh, B., & Jasmine, K. (2012). Comparative study on various methods and types of mobile payment system. Proceedings from MIIM ’12: International Con- ference on Advances in Mobile Network, Communication and Its Applications, (pp. 143-148), IEEE.
nike lunar forever 2 mens cheap shoes sale store
  • Economic theory (current issues of modern economic theory, economic history and history of economic thought);
  • International economic relations (theory and practice of international economic relations, globalization problems, specifics of socioeconomic and sustainable development of the countries of the world)
  • Entrepreneurship and economics of enterprise (theoretical and practical issues of development of branches of national economy)
  • Finances (laws and mechanisms of financial market operation, financial support of enterprises)
  • Accounting and audit (research of methodology, methods and organization of accounting, analysis, audit and audit of financial and economic activities of enterprises and the tax system)
  • Environmental management (issues of raising utilization efficiency of environmental management, resources saving issues, problems of search and feasibility study of raw material sources, directions and efficiency of the state economic policy in resource saving and environmental protection)
  • Management (theoretical and practical issues of management in economic activities)
  • Econometrics in management decision making (scientific substantiation of efficient management decision making methods in branch and enterprise economy)
  • Мarketing (theoretical and practical issues of marketing approach to branch and enterprise development)
  • Public administration (the study of state system of economy regulation, functions, management structures of different levels, the issues of organizational and economic mechanism of state support of entrepreneurship, activation of local communities’ activities)
NIKE AIR HUARACHE

Please, note the following instructions to submit your full papers to the journal: the journal will consider previously unpublished papers in Ukrainian or English languages that should relate to the theoretical and practical profile and follow the guidelines:

1. The paper limit is 8–12 pages (single-spaced type), to be submitted electronically via e-mail.

2. For authors with no Dr. Sc. degree in Economics the paper will be submitted with a review by a Dr. Sc. in Economics to justify its novelty and practical value.

3. Each paper must accompany a completed corresponding author form which includes author’s Surname, Name and Patronymic, scientific degree, academic title, work place, position, business and home postal addresses, phone and fax number, e-mail address. Also include the office of Nova Poshta, for the copy of the Bulletin issue with the author’s publication to be sent to.

4. In case the author (authors) wish to get additional copies of the issue, this should be noted separately in the author form.

Article layout

The article starts with UDC index (left aligned, no indentation)

Next line (no line skip) is the title of the article (in capital letters, full page format).

After a line skip are the author’s initials and surname, scientific degree, academic title, place of work or study, address (comma separated). Full page format.

After a line skip is the abstract (1800 characters) in the language of the article. Abstract contains information about specific scientific results obtained in the course of the study, the level of their novelty, propositions concerning their solutions and practical value of the obtained results. In the next line (no indentation) are keywords (10-12 words) in full page format.

After a line skip is the main text (two columns format) which includes the following parts:

problem statement in general and its correlation with important scientific or practical tasks;

analysis of recent papers containing the solution of the above problem for the authors to ground their research (references are required), determination of previously unsolved parts of a general problem discussed in the article;

aim of the article (statement of purpose);

materials and methods of the research with full justification of the received scientific results;

conclusions of the research and perspectives for further scientific development in the sphere.

After a line skip is References (two column format). Bibliographic description is done according to GOST DSTU 7.1:2006 “The system of standards on information, library and publishing service. Bibliographic entry. Bibliographic description. General requirements and rules of composition” (State Commission for Academic Degrees and Titles of Ukraine Bulletin, #3, 2008).

After a line skip are abstracts (1800 characters each) in English languages with keywords in the appropriate language (6-10 words), full page format. Abstracts start with the title of the article (full page format, capitalized), author’s initials and surname, scientific degree, academic title, place of work or study in italics, full page format.

Guidelines:

  • title: Times New Roman – 12 pt, bold, capitalized;
  • subheading: Times New Roman – 12 pt, bold;
  • author’s initials and surname, degree, title, place of work or study, E-mail – 12 pt, italics;
  • main text, UDC – 12 pt;
  • abstracts, keywords – 12 pt;
  • references – 10 pt.

2.5 сm upper and lower margin, 2.0 сm left and right margin, two column format for the main text and references, 0.7 cm between columns. Paragraph indentation – 1.0 cm, single spacing.

Style and format

Formulas are printed in Equation Editor (MathType v. 4–5). Figures in the paper must be included as Microsoft Word object, grouped in a separate window created as “text box” or “Word picture”. Figures must be gray shade or pattern fill. Graphs are accepted in Microsoft Excel or standard graphics editors (Corel Draw, Adobe Illustrator) inserted in the text as objects. If graphic editors are used, the figure can be submitted as separate files linked to the text. Raster graphic objects must be submitted in uncompressed TIFF format with resolution 300 dpi or higher. Images must not be compressed into JPEG or GIF format, as quality loss is inevitable. Schemes with text can be done in the above graphic editors or Microsoft Word, in the latter case every window must be done as text box connected with other boxes by lines or arrows and then grouped. Font size in figures must be 10pt or bigger. Captions should be grouped with figures, font size – 12 pt.

The Bulletin has publication fees of 900 UAH regardless of the number of pages in the article. Additionally, 100 UAH is charged for DOI prefix..

The article is reviewed within two weeks.

The journal is published on: January 30th, March 30th, June 30th, September 30th.

『アディダス』に分類された記事一覧

Address:

Department of Economic Theory and International Economic Relations, NTU "Dnipro Polytechnic", Yavornitsky Avenue, 19, Dnipro, Ukraine, 49005.

 

Telephones: +380 (56) 47-15-66, 380 (97) 115-75-45 - Senior Editor Nina Cherchenko Albertivna.

 

 E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

30 Winter Outfit Ideas to Kill It in 2020 - Fashion Inspiration and Discovery

More Articles...