Issues | Sections | Authors | Keywords |
Article
Issue: | 2022 №1 (77) |
Section: | Finances |
UDK: | 030 |
DOI: | https://doi.org/10.33271/ebdut/77.134 |
Article language: | English |
Pages: | 134-139 |
Title: | Security issues in next generation mobile payment systems |
Author: | Mshvidobadze T. I., Gori State University |
Annotation: | Methods. In the security process system the following methods are used: analysis method (generalization of the problem, elaboration of the measures to improve security procedures), comparison (to identify of the assessment of M-Payment systems), formalization (to set the problem of the mathematical modelling). Results. The different payment schemes and their use, technology and security have been generalized. Most pay methods are account-based payment systems and their core. The focus is on security, privacy and authentication. Models of mobile payment system (MPS) have been proposed, as well as their technologies and payment methods, various security mechanisms embedded in MPS, encryption technologies and authentication methods. Mobile payment system security mechanism is proposed in response to modern demands. It has been demonstrated that keeping in check the confidentiality, integrity and availability triad, each payment should be made with authentication and encryption because the future of MPS depends on its security features. Novelty. Scientific novelty of the research is in the outlining of strategic prospects of the encryption technologies, authentication methods, and firewall in MPS, to provide different security aspects. Practical value. The potential impact of digitalization on mobile payment systems makes it more difficult than just the result of modular reorganization. The practical value of the paper is to fix the dynamics that can not be found in developed countries. Findings can be applied to other mobile payment systems in developing economies. |
Keywords: | Electronic commerce, Business Models, Transactions, Mobile Payment Method, Online System, Payment system, Mobile Commerce, Authentication, Firewall, Cyberattacks |
File of the article: | EV20221_134-139.pdf |
Literature: |
|