Nothing Special   »   [go: up one dir, main page]

Ucash: Information System and Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 23

UCash: Information system and

Security
TITLE PAGE

T OPIC : UCASH : I NFORMATION SYSTEM & S ECURITY


Course Title: Digital Business and E-commerce management
Section: 9
Semester: Spring 2017
Submission Date: 11th April, 2017

Group Members

Name ID

Tawsif Reza 1511135630

Sazzad Hossain Sadman 1421621030

Md. Rafiul Ahasan 1510696030

Jafrin Ahmed 1321426030

Reedi Paramatma 1331299630

Prepared for
Mr. Ashik Imran Khan
Senior Lecturer
Department of Management
&
Founding Faculty Advisor

1|P a g e
AIS NSU Student Chapter
North South University

ACKNOWLEDGEMENT
First and foremost, we would like to express sincere gratitude towards our MIS 205 course
instructor, Mr. Ashik Imran Khan for providing us an opportunity to work on this project. We
are very grateful to you for your constant support, guidance and valuable insight while
constructing this report and dealing with critical issues. The classes were very effective and
helpful in the research purpose and especially helpful for writing of a well-organized report.

Then comes the contribution made by the friends and the family members of us. They were
always besides us for moral support and to provide helpful information about the report.
Without their cooperation, this report would have resulted in very hard to finish.

In the end, it is necessary to mention that, this report is the result of days of hard work by us
and regardless of this report being a success or else, we will always be thankful to the
people who have contributed greatly behind the completion of the report. Without their
help, this report would not have been even completed within the deadline, let alone being a
successful and helpful on.

2|P a g e
TABLE OF CONTENT

Introduction 04

Background Information 04

Role of Information System 05

System process 07

Web Technology & Business consumer 08


model

Business Model 10

Technical Understanding 15

Security Challenges 18

Conclusion 21

References 22

3|P a g e
INTRODUCTION:
In the developing world, mobile financing services are the most promising mobile
application. It is very affordable and accessible way of money transactions. It brings new
opportunities financial providers career and financial system. It can be used for broad range
of money transactions.

UCash is a mobile financial service which was offered by United Commercial Bank Limited
(UCBL). UCash has 165 full service branches across Bangladesh. It also has 500+ merchants
across Bangladesh. Total subscriber of UCash in Bangladesh is more than 1,200,000. And
they have around more than 105,000 agents in Bangladesh. Among them, 40,000 are their
own agents and 65,000 are MobiCash agents. A user can dial *268# from their mobile phone
to access their menu. For customer queries UCash have their own call center.

UCash offers various kinds of valuable services, such as-

 Cash-in, cash-out
 Person to person transfer
 Rail ticket purchases
 Internet bill payments
 Merchant payments
 Cash collection
 Salary disbursements
 DMP ticket payment
 School fee payments

BACKGROUND INFORMATION
UCash is a complete mobile financial service by United Commercial Bank Limited (UCBL).
UCBL received permission to operate and offer Mobile Financial Services (MFS) from
Bangladesh Bank. UCash is the brand name of the mobile financial services offered by UCBL.
It was launched in November 2013. It’s about four years UCash is providing service for all
the customers around Bangladesh.

UCBL strongly believes in the idea of “financial inclusion” and that banking facilities should
be accessible to all. UCash has launched its services all over Bangladesh with the intention
to provide banking facilities to the vast majority of unbanked population of the country.

4|P a g e
UCash intends to familiarize banking facilities to those who previously were not able to
access banking services. UCash will act as a catalyst for economic development of the
unbanked population by providing prompt, fast and safe banking products and services.

Having over 30 years of experience in the banking sector, UCB understands that banking
services are not just limited money transfer services. Savings account, deposit schemes, bill
payment, credit and loan facilities, salary and payroll services are also part of banking
services.

UCash is the first Mobile Financial Service provider to offer daily interest on customer’s
deposit in their account. The key feature of UCash is giving interest on deposits for the first
time through mobile financial service. It would be a special one, as people will get interest
on the money deposited by UCash service from the very first day, officials noted.

If a person is looking for a secure and easy way to make  a payment for something bought
online, or to pay a service online or even to make a deposit online UCash is the online
payment option to use. UCash is also a flexible way to make a payment or a deposit, this is
because it can be split or combined with other vouchers, so as to be able to make a smaller
payment or a bigger one, as one desires. The UCash voucher can also be converted in
multiple other currencies if necessary.

UCash is available for all people of the world, due to it having no age restrictions for their
buyers.

In addition to core mobile financial services like cash-in, cash-out, and person-to-person
transfers, UCash offers various kinds of value added services including rail ticket purchases,
internet bill payments, merchant payments, cash collection, salary disbursements,
international remittances, and school fee payments.

UCash is a complete range of Mobile Financial Services by United Commercial Bank (UCB).

ROLE OF INFORMATION SYSTEM


Mobile banking can be used for many of the same tasks that you would complete at a bank
branch or on your home desktop computer. These include checking account balances,
transferring money from one account to another, finding an ATM, setting up alerts, or
viewing account statements.

In addition to these basic features, mobile banking services may include direct deposit of
checks using your device’s camera, paying bills, sending money to another person,
transferring credit card balances, or even conducting investment transactions.

5|P a g e
BENEFITS OF UCASH FOR CUSTOMERS:
 Mobile Banking Is Convenient: Being able to do most, if not all, of banking on the go
is one of the biggest benefits of UCash. No matter where the customer is, they can
“take care of their business” without interrupting the rest of their lives.
 Time: UCash enables the customers to handle their financial life without having to
drive to a bank during open hours can be a real time- and schedule-saver. Customers
can just do their work in the convenience of their houses or wherever they are.

 UCash can Keep the customers in Control: Because it’s so easy and so convenient,
UCash helps keep the customer in control of their finances. They can monitor their
balances and always know where they’re at financially. With account alerts, they can
know if their account falls below a certain threshold and instantly transfer money
into that account and avoid overdraft fees. They can deposit checks instantly, which
is a big help when they need the cash. They can get reminders when to pay bills so
they never have to pay a late fee. They can even set up recurring bill payments so
they don’t even have to think about when a bill is due. All these features leave them
in control of their money.
 UCash Is Secure: Mobile banking is as secure. All reputable financial institution use
encryption that safeguards and protects the customers’ privacy, identity and their
financial information. Some institutions even offer a security guarantee to make
their use of mobile banking truly worry-free.
 Paperless Statements: With UCash some customers opt for paperless statements.
For the customer, they get the convenience of their updates appearing right in their
email.
 Other features:
o Mini-statement – Viewing details of the last 2-3 transactions on either
selected or all accounts can be maintained.
o Full statement – Requesting a full statement to be delivered or picked up
from the nearest branch or registered address
o Settings – Change password and main operating account
o Airtime top up – Top up not only numbers but also those belonging to friends
and family across all local mobile networks

BENEFITS OF UCASH FOR UCBL:

UCash has been very beneficial for UCBL because after launching UCash the customers

6|P a g e
 Uses more services
 Conducts more debit, credit, ATM and other types of transactions
 Stays with their financial institution longer
 Decreased costs

SYSTEM APPROACH TO UNDERSTAND INFORMATION


SYSTEM OF UCASH
UCash is a complete mobile financial service by United Commercial Bank Limited (UCBL).
UCash M-Pay System to complete their transactions. UCash developed M-Pay system with
the help of a local IT company named Semicon. UCash use SMS service of Satellite Phone
Network around Bangladesh. The Short Message Service—Point to Point (SMS-PP)—was
originally defined in GSM recommendation 03.40, which is now maintained in 3GPP as TS
23.040. GSM 03.41 (now 3GPP TS 23.041) defines the Short Message Service—Cell
Broadcast (SMS-CB), which allows messages (advertising, public information, etc.) to be
broadcast to all mobile users in a specified geographical area.

Users can access UCash’s menu by dialing *268# from their mobile phone. UCash also has a
dedicated call center (16268) to respond to customer queries. When a user dials the
number they get a menu with several options including cash-in, cash-out, and person-to-
person transfers. By selecting an option and re-dialing the number a user can perform a
transaction. If the transaction is succeeded they get a confirmation message after the
transaction.

Like other Information System (IS) M-Pay has three steps through which a money
transaction is performed. It takes input and processing those inputs it gives output.

INPUT OF M-PAY SYSTEM OF UCASH


When the user performs the transaction they use different numerical data as input of the
M-Pay system. After dialing the menu code *268# the user get several options having
unique number each like;

1. Cash-in

2. Cash-out

3. Person-to-person Transfer

4. Others

7|P a g e
User can select any of the option as their need. Let’s assume a user need to transfer money
to other user. In this case he/she need to input 3 in the dial pad and re-dial the number.
Then the system will ask the receiver account number, amount, reference and at the PIN
number that was set before by the user. All these input has to be numerical otherwise the
system will refuse the inputs. The user must have sufficient amount of money in their
account before they can successfully perform a transaction.

When the user performs the transaction through agent they need cash as another input.
They need to give the money to the agent before the agent will do the transaction on the
behalf of the user.

PROCESSING OF M-PAY SYSTEM OF UCASH


In the processing section when the system get any transaction request it verify the user ID
first by matching the given PIN with the previously saved PIN in the system server. If there is
any deviation in the PIN, the system denies the transaction. Any kind of unusual behavior
will block the request. If not it proceed to the next step where it check the transaction
validity. The system check if there is enough money in the user account or not. If everything
goes ok the system allows the transaction. Money is sent to the receiver account number.

OUTPUT OF M-PAY SYSTEM OF UCASH


As output of the system the sent money is deposited in the receiver account. Receiver gets a
SMS that his/her account is deposited with the money. The sender also get a verification
SMS that the transaction succeeded.

If the transaction is performed through Agent the receiver get cash from the Agent of the
other side. User can use reference number to identify their transaction.

WEB TECHNOLOGY:
Customer uses mobile devices to access account information. They withdraw and transfer
funds one account to another. Customer can access to balance information, pay bills,
transfer funds etc.

WEB 2.0
UCash uses web 2.0 technologies. Web 2.0 helps to share information, collaboration and
functionality. It helps to exchange data. There is a changing way of interacting with
customers. Why we need web 2.0 technologies is for transparency, engagement of the

8|P a g e
customers, opportunities of communication and branding, the preference of customer
communication style preferences.

Key features of web 2.0 are:

 Enhanced user experience


 Classification of information
 User as a contributor
 User participation
 Basic trust
 Dispersion

BUSINESS CONSUMER MODEL:


CONSUMER TO CONSUMER:
UCash provides their services mainly for the consumers. The transaction is occurring
between the users of UCash. Market provides innovative way to where customers can
interact with each other. They interact through a third party.

PEER-TO-PEER NETWORKING (P2P):


A peer-to-peer networking is network architecture comprised
of contributors, which doesn’t need a server to monitor the
transfer of information, as it makes its resources available to
other contributors using the same network. User of P2P model
is both supplier and consumer. P2P is a decentralized network
model. So there is no centralized control of monitoring or
sharing resources. Any user can share resources within the
system. P2P is easy to setup and cheap. If one or two node fail,
it doesn’t affect the whole system. The main problem with P2P
is that it’s traffic cannot be administer remotely.

M-COMMERCE:
M-Commerce is the buying and selling of goods and services using wireless handheld devices such as mobiles,
tablets, PDAs etc. The idea of M-commerce is doing e-commerce without the need of plugin your devices.
Technology behind M-Commerce is WAP (Wireless Application Protocol). Now-a-days, almost all the mobile
phones and tables are configured with WAP system. M-Commerce is considered the current generation e-
commerce in developed countries (e.g. Europe, USA, Australia). For developing and developed countries it is
still an emerging trend. M-Commerce is so advanced now that you can pay using your smart phones (e.g.
Apple Pay, Samsung Pay).

9|P a g e
BUSINESS MODEL

ANALYZING BUSINESS ENVIRONMENT

All organizations operate within an environment that influences the way in which they
conduct business. Strategy development should be strongly influenced by considering the
environment the business operates in. To form a mobile banking strategy, the most
significant influences are those of the immediate marketplace of the micro-environment
that is shaped by the needs of customers and how services are provided to them through
competitors and intermediaries and via upstream suppliers. Wider influences are provided
by local and international economic conditions and legislation together with whatever
business practices are acceptable to society. Finally, technological innovations are vital in
providing opportunities to provide superior services to competitors or through changing the
shape of the marketplace. UCash believes its micro and macro environment is vital for its
success.

MICRO-ENVIRONMENT COMPONENTS:
 Customers: UCash targets its customer base as every eligible citizen who is above the
age 18.
 Competitors: The main competitors of UCash are BKash, Rocket, MKash and other 19
mobile financing companies. From all of them, BKash has the most competitive
advantage because of being an early mover.
 Intermediaries: The intermediaries are 105,000+ agents including 40,000+ own
agents and 65,000 are MobiCash agents and the mobile operators GP, Banglalink and
Robi.
 Suppliers: For UCash, the suppliers are mainly customers as this is a C2C business.

MACRO-ENVIRONMENT COMPONENTS:
 Society: At present, our society is moving towards technological movement. UCash is
providing people a solution to their traditional lengthy process of payment. People

10 | P a g e
now-a—days pay their electricity bills using only their mobiles. Thus, UCash is
bringing a revolutionary change in the society.
 Country specific: As a developing country, our economy is facing a massive change in
financial sector and mobile finance industry is playing a huge part in it. Though, the
regulations of Bangladesh Bank is nowhere near which can be called lenient for this
industry, the companies are making huge number of revenues due to their
competitive advantages.
 Technology: Technological advancements like the introduction of 3G have opened a
new door in this sector which will be hugely benefited in the coming years. Also the
availability of mobile phones into the hands of mass people has eased the way to
bring a positive change to this industry.

VALUE CHAIN

Cash in/ Value


Account E-money Deposit
Design cash out Added
opening Issuance Holding
Network Services

Network Channel Management

Account & Transaction Management

Mobile money is a unique industry in that its success depends upon developing cross-
industry partnerships across a well-defined value chain. For the most part, this involves a
single bank (United Commercial Bank) and Mobile Network Operator (GP, Robi, Banglalink)
attempting to manage all components of the value chain, partnering reluctantly when
required by regulation. For UCash, with significant market share, this approach works like,

Value Chain Component Revenue/ Benefit Cost/ Risk


Design Control of Offering Market Risk
 Brand
 Pricing
 Product release
 Partnering strategy
Account Opening Bangladesh Bank regulation
Cash in/ Cash out Transaction fee Liquidity management

11 | P a g e
E- money issuance Agent Commission
Deposit Holding Increased liquidity Interest expense
Value added services Fee based income Service delivery cost
(Bill pay, Train ticket etc)

TRADING LOCATION:

While traditional marketplaces have a physical location, an Internet-based market has no


physical presence – it is a virtual marketplace. Electronic marketplace is a virtual
marketplace such as the Internet in which no direct contact occurs between buyers and
sellers. Being an online system, UCash also have a virtual marketplace where there is no
direct contact between buyer and seller, apart
from intermediaries. UCash can
be paid from a sender to a
receiver with only a mobile
device, without any kind of
contact between the buyer
and seller. Other than that, the
agent plays the role of an intermediary between the buyer and the seller. That’s why Many-
to-many method for trading location.

MULTI CHANNEL MARKETPLACE MODEL

Multi-channel marketing strategy defines how different marketing channels should integrate
and support each other in terms of their proposition development and communications
based on their relative merits for the customer and the company. As consumers follow their
customer journeys as they select products and interact with brands, they do not use the
Internet in isolation – they consume other media such as print, TV, direct mail and outdoor.
These media are still very important for marketers to communicate with customers who still
spend the majority of their waking hours in the real world rather than the virtual world. It
follows that an effective approach to using the Internet is as part of a multi-channel
marketing strategy.

UCash as a mobile banking service needs to integrate and support different marketing
channels for development of their market and communicating effectively with their
potential customer. That’s why UCash chooses mixed-mode journey to reach their
customers with full efficiency.

Awareness of agent
Word of mouth Search engine
12 | P a g e

Search and select


agents
Send money online

Phone/e-mail
Awareness of agent: The potential customers of UCash can get information about the ins
and outs of UCash money transfer system, how it works, how to get an account, what is the
commission pay and security measures by using search engines. Also word of mouth plays a
vital role as rural customers tend to be averse of technology and rely more on known
people.

Select and search agents:


The potential customers of
Negotiation
UCash can find agent
information from the
website of UCash. UCash
has listed their authentic
Viewing feedback
agents’ full details in their
website sorted by different
divisions. From there, any
customer can access
agents’ information and get
the agents assistance.

Negotiation: The
negotiation process of UCash happens online. Negotiation means the place where the
business will commence. In this case, customers send their money online through their
mobile phones sitting at home or going to their nearest agent.

Viewing feedback: UCash ensures complete transparency in their money transaction process
by giving feedback to their customers and ensuring them the best service possible.
Information about transferred money is instantly sent to the sender and receiver for by
UCash.

REVENUE MODEL:
A Business model is an architecture for product, service and information flows, including a description of the
various business actors and their roles; and a description of the potential benefits for the various business
actors; and a description of the sources of revenue. The alternative approach to business model include,

 Marketplace position perspective

 Revenue model perspective

13 | P a g e
 Commercial arrangement perspective

Revenue models specifically describe different techniques for generation of income. For
existing companies, revenue models have mainly been based upon the income from sales of
products or services. This may be either for selling direct from the manufacturer or supplier
of the service or through an intermediary that will take a cut of the selling price. Both of
these revenue models are, of course, still crucial in online trading. UCash falls in the second
quota. Its main job is the collect revenue through an intermediary that will take a cut of the
transferred
Action Type Corporate Limitation End user (P2P) Limitations
Accounts s

Opening an account Free None Free Applicant mustbe above 18


years

Cash In Free None Free  BDT 25000/day


 5 times/day
 BDT150000/month
 10 times/month

Collection 1% to 2% None N/A N/A

Cash out from agent N/A N/A  First two  BDT 25000/day
cash out  5 times/day
per month  BDT150000/month
are free  10 times/month
 From 3rd
cash out
on, the
charge is
1%

Transfer Money Free None BDT 5/transfer  BDT 25000/day


 5 times/day
 BDT150000/month
 10 times/month

Merchant Payment 0.35% to N/A Free None


0.80%

money. Thus UCash follows an intermediary model to collect revenue. Intermediary model
is a platform where the buyers and the sellers meet. This model does not take ownership of
the products or the services that are being advertised online. Nevertheless, they are paid on
a percentage of the total sales done of the product or service. UCash follows just the same.

14 | P a g e
TECHNICAL UNDERSTANDING
UCash use DB2 in their M-Pay information system. DB2 is a database product from IBM. It is a Relational
Database Management System (RDBMS). DB2 is re-designed to store, analyze and retrieve the data of UCash
efficiently.

REPORTS GENERATED BY THE SYSTEM


DB2 Database management System (DBMS) helps UCash generating several reports and queries related to the
money transaction. These repots helps UCash in decision making and forecasting. Let’s presume UCash want
the transactions amount that are more than 5000 and transaction process time that took between 27 to 33
seconds of a particular date. UCash can easily find these data from their DBMS.

15 | P a g e
DATA MINING
Data mining is the process of sorting through large data sets to identify patterns and establish relationships to
solve problems through data analysis. Data mining tools allow enterprises to predict future trends. Let’s
assume UCash want to know how many user are using UCash from Dhaka with GP operator. They can easily
get the answer from their DBMS.

16 | P a g e
ENTITY AND ATTRIBUTES

An attribute is a characteristic of an entity object or view object, implemented as a JavaBean property of the
object class. An attribute can correspond to a database column, or be independent of a column.

Entity:

a) Accounts number
b) User name
c) Transaction Id

Attributes:

a) Area

b) Operator

c) Amount

d) Date

e) Time

Attributes
Entity

SECURITY CHALLENGES FOR UCASH


17 | P a g e
UCash faces many security challenges while operating the program. They are

SILENT BANKER
When the banking Trojan was first reported, the anti-virus company tagged it with a very
low Risk Level 1 classification, and indicated that its capabilities were limited to recording
keystrokes, capturing screen images and stealing confidential financial data.

Recent manifestations of Silentbanker appear to indicate that the Trojan is a more potent
threat than originally thought. The scale and sophistication of this emerging banking Trojan
is worrying, even for someone who sees banking Trojans on a daily basis.

The ability of Silentbanker to perform man-in-the-middle attacks on valid transactions is the


greatest cause for concern. The Trojan can silently change the user-entered destination
bank account details to the attacker's account details in the middle of a transaction.

The user does not notice this change because the Trojan present’s information the user
expects to see, duping the bank customer into entering a second authorization password, in
effect handing the money in the account over to the attackers

The Silentbanker trojan is able to intercept authentication traffic before it is encrypted, so


that even if the transaction takes place over SSL, the attack is still valid. It can authenticate
certificates and cookies, if they are required, as well as user names and passwords. A
particularly sinister example of the trojan's sophistication is its ability to acquire missing
information from unsuspecting bank customers. If the attackers are missing a key piece of
information they need to conduct a transaction, the trojan enables the attackers to add
extra HTML to the authorization page asking the user for that extra information.
Silentbanker also downloads a configuration file that contains the domain names of more
than 400 banks throughout the world.

SOLUTION
Symantec recommends users take several steps to guard themselves against this Trojan,
including disabling system restore before getting rid of the virus, to ensure the system
doesn't inadvertently back up a copy of the Trojan software; making sure all virus definitions
are updated on their antivirus software; running a full virus scan of their machines; and
finally, deleting the value from their registry.

18 | P a g e
PHISHING
Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt
to steal your personal information. They send out e-mails that appear to come from
legitimate websites to UCB bank or UCash clients. The e-mails state that your information
needs to be updated or validated and ask that you enter your username and password, after
clicking a link included in the e-mail. Some e-mails will ask that you enter even more
information, such as your full name, address, phone number, social security number, and
credit card number. However, even if you visit the false website and just enter your
username and password, the phisher may be able to gain access to more information by just
logging in to your account.

SOLUTION

If you receive an e-mail that asks that you update your information and you think it might be
valid, go to the website by typing the URL in your browser's address field instead of clicking
the link in the e-mail. For example, go to "https://www.paypal.com" instead of clicking the
link in an e-mail that appears to come from PayPal. If you are prompted to update your
information after you have manually typed in the Web address and logged in, then the e-
mail was probably legitimate. However, if you are not asked to update any information,
then the e-mail was most likely a spoof sent by a phisher.

Most legitimate e-mails will address you by your full name at the beginning of the message.
If there is any doubt that the e-mail is legitimate, be smart and do not enter your
information. Even if you believe the message is valid, following the guidelines above will
prevent you from giving phishers your personal information.

TROJAN MALWARE
A malicious computer program designed to gain access to confidential information stored or
processed through online banking systems. Banker Trojan is a form of Trojan horse, and can
appear as a legitimate piece of software until it is installed on an electronic device. Once
installed, the Trojan horse can gain access to computer files and systems. This type of
computer program is built with a backdoor, allowing outside parties to gain access to a
computer.

The Trojan horse can execute a number of operations, including running executable files,
downloading and sending files remotely, stealing information from a clipboard, and logging
keystrokes. It collects cookies and passwords, and may remove itself from a computer when
commanded.

SOLUTION

19 | P a g e
By installing effective anti-malware software, you can defend your devices – including PCs,
laptops, Macs, tablets, and smartphones – against Trojans. A rigorous anti-malware solution
– such as Kaspersky Anti-Virus – will detect and prevent Trojan attacks on your PC, while
Kaspersky Mobile Security can deliver world-class virus protection for Android smartphones.

NETWORK ERROR
This is a general collective name for errors that result from a failure of one host in a
computer network to communicate with a server. It could mean that you cannot connect
your application to a web service, download a web page or file, connect to a database or
just communicate with the network in general. The error could result in a hardware failure
(the cable has been disconnected, or some piece of hardware is not powered up), or it could
be that the configuration file, or human has somehow made a mistake in typing in an IP
address or IP host name.

SOLUTION
Network errors can be resolved by trying methods such as turning background services:
through services. MSc; checking the cables: plugging, crimping, connectivity; and contacting
the Internet Service Provider to check for connectivity. Hard resetting the router and the PC
might also resolve the issue in most cases. However, checking security configurations and
firewall settings would aid in arriving at network fixes as well.

BLIND SPOT IN HELP LINE


UCash helpline is open only from 8.00 AM to 10.00 PM. This window creates a blind spot in
UCash network as If anything serious happens between those hours, serious damage can
take place.

SOLUTION
UCash can hire pert time workers at night to ensure proper customer care and avoid any
security risk.

CONCLUSION
In Bangladesh, UCash is the most commonly used services of mobile money transfer. A
mobile money transfer service is useful for those people without access to formal financial
services. Hence, it is mostly helping the unbanked population. The ease of use of the service
is a significant factor for the adoption and use of mobile money transfer service in
Bangladesh. In conclusion, this report found out the role of UCash information system, its
system process, used web technology and business consumer model, business environment,

20 | P a g e
Value chain, Marketplace model, Trading location model, Revenue model, our technical
understanding and the security challenges of UCash mobile banking system. However, the
adoption of UCash is dependent on the consumers’ perception on trust and ease of use. So
the company should keep in mind these points in order to be the leader in mobile banking
system.

REFERENCES

 Phishing. (n.d.). Retrieved April 10, 2017, from


https://techterms.com/definition/phishing

 Silentbanker trojan dupes bank customers into sending money. (2008, January 15).
Retrieved April 10, 2017, from https://www.scmagazine.com/silentbanker-trojan-
dupes-bank-customers-into-sending-money/article/554105/

 Reed, B. (2008, January 14). New Trojan Intercepts Online Banking Information.
Retrieved April 10, 2017, from http://www.pcworld.com/article/141364/article.html

 Kaspersky Lab. (n.d.). Retrieved April 10, 2017, from


https://usa.kaspersky.com/internet-security-center/threats/trojans#.WOpdYNKGPIU

 Imran, K. A. (2015, March) mStar Bangladseh Mobile Money Infosheet UCash. USAID
Retrieved from
https://www.microlinks.org/sites/default/files/resource/files/mMoney_Infosheet_U
Cash_04232015.pdf

21 | P a g e
22 | P a g e

You might also like