Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Increase in Absolute Leaf Water Content Tends to Keep Pace with That of Leaf Dry Mass—Evidence from Bamboo Plants
Previous Article in Journal
Large Deflection Analysis of Axially Symmetric Deformation of Prestressed Circular Membranes under Uniform Lateral Loads
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Review on Electronic Payments Security

by
Md Arif Hassan
,
Zarina Shukur
,
Mohammad Kamrul Hasan
* and
Ahmed Salih Al-Khaleefa
Center for Cyber Security, Faculty of Information Science and Technology, National University Malaysia (UKM), 43600 UKM, Bangi Selangor, Malaysia
*
Author to whom correspondence should be addressed.
Symmetry 2020, 12(8), 1344; https://doi.org/10.3390/sym12081344
Submission received: 12 May 2020 / Revised: 25 May 2020 / Accepted: 30 May 2020 / Published: 12 August 2020

Abstract

:
Modern technology is turning into an essential element in the financial trade. We focus the emphasis of this review on the research on the E-wallet and online payment, which is an element of an electric payment system, to get the pattern of using this service. This research presents a review of 131 research articles published on electronic payment between 2010 and 2020 that uses a qualitative method of answering the research questions (RQ): RQ1: “What are the major security issues regarding using electronic payments”? and RQ2: “What security properties need to comply for secure electronic payments?” With the systematic literature review approach, the results show that interest in E-wallet and online payment has grown significantly during this period, and it was found that for the increasing uses of electronic payments, researchers are more focused on security issues. The results show that, to conquer the key gaps, electronic payment must have some protection properties, namely, availability, authorization, integrity, non-repudiation, authentication, and confidentiality. Nowadays, security problems in electronic payment are usually more demanding than the present security problems on the web. These findings can enable electric transaction providers to strengthen their security methods by boosting their security gaps, as required for relevant services.

1. Introduction

The electronic payment system has continued to grow more and more over the last years because of the increasing spread of internet-based banking and shopping. Electronic transfers are money transactions that take place electronically between consumers and retailers. Millions of users around the world regularly make various payments via the Internet. These exchange materials are a kind of electronic monetary instrument. Electronic payment systems have gained tremendous interest over the last two decades because of the vital role they play in contemporary electronic commerce. According to the Statista Fintech report, in 2019, the total amount of transactions in the digital payment segment was estimated at 3,670,864 million euros, and by 2023, it is estimated to increase to 5,921,831 million euros [1]. An electronic payment system is a means of paying through an e-network [2], where an individual may pay for products and services online [2,3]. There are quite a few e-payment systems that have been established in the payment sector around the world, and in References [2,4,5], the authors classified electronic payment systems into various categories, namely e-cash, e-wallet, online payment, card-based, etc. In this study, we dedicate the focus of the research to the e-wallet and online payment system that is part of an electronic payment method in order to understand the trend of using this system. E-wallet is a tool that has actually additionally been acknowledged as a digital wallet [3]. E-wallet is a program for computer banking [6] that can collect your identity and digital credentials and offers an electronic or online service that allows an individual to purchase electronically [7,8]. Payment with an e-wallet is considered as one of the most famous transaction approaches at present because a digital purchase utilizing an e-wallet has the advantages of simplicity and adaptability, as well as protection [4,5].
On the other hand, the online transaction system is an internet-based technique of processing monetary transactions that are accepted day by day. Online payment is an electronic way of exchanging payment that enables a customer to pay an online dealer or service provider [6]. Security issues in electronic payments are more challenging today than the other current security issues on the Internet. In electronic payments, customers must deliver credit card and payment account details [9] and personal information [10], and this Internet transfer is a tool that can be used to steal money [11]. In recent years, several studies have contributed to the multiple protection issues in the area of electronic payments [7,8,9,10], where, because of electronic payment, customers need to feel protected regarding their personal privacy concerns [11,12]. The aim of this analysis is to research the literature on e-wallet and online payment systems. We investigate different studies providing different backgrounds for study and their relationships. The following research questions (RQ) are specified: RQ1: “What are the major issues regarding using electronic payments”? and RQ2: “What security properties need to comply for secure electronic payments?”
This paper provides a selection of fascinating queries regarding interlocking in between different threats of online and e-wallet transactions, looking at potential security measures. This paper is structured as follows. Section 2 outlines the study methodology, Section 3 presents the reviewed papers based on research results, and Section 4 presents a discussion of the findings and the conclusions.

2. Materials and Methods

This research relies on a systematic review technique, which is a dignified procedure to test and understand available research that is associated with a specific research question. There are three key phases of systematic review: preparation of the review, leading the review, and reporting the review. The core of the plan is to design research questions and improve a review protocol, with the most significant part of the systematic review being the review protocol.

2.1. Review Protocol

The review protocol sets out the techniques to be used in the review. This research developed a review protocol in the preparation phase. We specified the background and the research question in the Introduction Section. We have taken only full papers from journals and conferences released between 2010 and 2020 in English into consideration. Studies that are not connected to the e-wallet and online payment system were excluded. When many duplicated reports have been shown to be accessible in original formats, we only used the fullest edition of the report. The principal components of the review protocol include data sources, collection strategy, study selection strategy, data extraction method, and the synthesis of results.

2.1.1. Data Sources

Research papers that were associated with the subject were selected to help answer the research questions. We rejected irrelevant research papers that could not answer or even support the research questions. We made use of the following libraries as our primary resources, looking for research publications in:

2.1.2. Search Process

According to the research method, to find any queries that are focused on e-wallet and online payment systems, we searched using a keyword pattern. Boolean operators were used to clarify the data on keywords and they were also a priority in searching the database for each research publication. We used symbols and Boolean operators such as “OR”, “AND” to check for the following keywords:
  • (electronic payment OR (E-payment) OR (electronic AND transaction) OR (digital AND wallet)) AND (study OR Adoption) AND ((framework AND payment) OR (digital AND payment))
  • ((online AND payments) OR (internet AND payment)) AND (security OR issue) AND (e-banking OR online banking) AND ((mobile payments AND transaction) OR (internet AND payment))
  • ((e-commerce AND payments) OR (mobile-transaction AND m-banking)) AND (security OR concern)

2.2. Data Selection

Data selection is the most important thing for a systematic review of any existing research review, and a number of items were unrelated to our research questions. After getting the results of the keywords used, we completed three filter procedures to include the criteria for the search. The criteria are identified in the first phase of the filter. We categorized all research findings from these keywords into research publications. Then, the next step to be completed is a second filter that looks at the title and reads the abstract as it relates to the research question. The third or final filter is to read any material of a study paper taken from the candidate studies, and the last group of research papers to be used is named “Selected studies”. The data selection criteria were as follows:
  • Was the research article published between the years 2010 and 2020?
  • Is the research article reported in any of the referred data sources?
  • Is the research article mentioning or discussing e-wallet or online payment systems?
  • Is the research article discussing any security, study or adoption regarding e-wallet, mobile payment, and online payment system?

2.3. Data Extraction

We analyzed each preliminary study to identify the Electronic Payment System (EPS), e-wallet, and research related to online banking. We documented all identified studies in a spreadsheet based on their name, description, and reasoning. We performed the search process in April 2020, at which time we identified 316 publications. By following the selection and refusal criterion, relevant research articles were carefully extracted as per the search process shown in Figure 1. Finally, 131 studies were identified as preliminary studies. Table 1 below displays the data extraction and synthesis of the chosen study articles to find the answers to the research questions and the 131 studies’ classification. We rejected insignificant research articles which did not address our research questions or endorse them. The articles were rejected because the main topics did not concern E-wallet and online payment systems. Most of them disscued other electronic payment systems, such as credit/debit cards or smart cards, and were also unable to answer the research questions.

3. Result and Discussion

3.1. List of Paper Publications

This study contains two publishing formats, namely J: journal and C: proceeding/conference. From the 131 research articles, 103 research articles were from a journal, and 27 research articles were from a proceeding/conference. The details of the publication, paper title, year, and journal name are shown in Appendix A.

3.2. Number of Papers Based on Country

From the 131 research articles, there are 39 countries contributing to electronic payment system research. We found that the country contributing the most papers among those we found for this area of study was India, with 33 papers. The second highest number of papers was from Malaysia, with 20 papers. China was third highest with 8 papers, and fourth was Nigeria, with 6 papers. The number of papers based on country is shown in Figure 2. India has seen an extraordinary rise of E-wallet users. The country is gradually moving towards becoming a cashless economy, and as is recognized, after demonetization, there is a remarkable rise in the number of e-payments. After analyzing the pros and cons of demonetization, and also focusing on awareness of the general public, numerous businesses have introduced E-wallets, with various terms and conditions to gain competitive advantages. In the year after demonetization, digital transactions evolved considerably. In particular, Malaysia and Nigeria have also taken the development of cashless societies seriously.

3.3. Number of Standard Institutions

The importance of information security is at the forefront of electronic payment systems. Unfortunately, there is no single source that can guarantee 100% data protection in information technology. In relation to electronic payment, security is the most important factor that can influence a consumer to use the system. This section discusses three standard institutions (European Telecommunications Standards Institute (ETSI), Payment Card Industry Data Security Standard (PCI-DSS), and European Network and Information Security Agency (Enisa)) who work for secure electronic transactions, and enables us to provide an answer to RQ2. Standards have become the crucial enabler of market-driven innovation. It plays an important part in minimizing the danger regarding payment transactions, and in the development of private and public businesses if it is able to offer protected electronic payment services. Since data protection plays a crucial part in supporting the economic organization operations, we want a standard, or benchmark, which governs the shelter of information security. It can be said that for security electronic payment, this is a multidisciplinary idea between standard and nonstandard institution.

3.4. The Top Research Publication Sources

From 131 publication research sources about electronic payment system, the most dynamic sources for using electronic payment research, specifically Google Scholar, collected 55 papers from 30 countries, including the journal and conference papers.

3.5. Year of Publication

From 131 publication research sources about electronic payment system, the most active years in security of electronic payment research were, 2017, from which we collected 24 papers, which was the top year, from 2018 we collected 20 papers, 2016 had a total of 16 papers, and 2019 was in the fourth position, with total of 16 papers. From 2014, 2015, and 2020, we collected 10, 11, and 11 papers, respectively. From 2013, we collected 8 papers, and from 2012, we collected 7. 2011 and 2010 were the lowest ranked for paper collections, with 5 papers collected from 2011, 2 from the web sources and 4 papers collected from 2010.

3.6. Discipline of Journals

The five maximum of the journal’s discipline proficiency come from MDPI with 8 papers, “International Journal of Advanced Research in Computer Science and Software Engineering” with 3 papers, “International Journal of Computer Applications” with 3 papers, “International Journal of Advanced Research in Computer Science” with 2 papers, and “Indian Journal of Science and Technology” with 2 papers.

3.7. Industrial Research

A cashless evolution is underway in Asia. This change was fostered by the way of a technologies’ revolution. Consumer payments in Asia are going through huge change as markets add electronic payments to minimize the dependency on cash to invest, while concurrently improving economic access. Because of the cashless revelation of Asia, there have likewise been increased risks for internet fraud. Based on a clear Commerce survey, the best twelve overseas bases for online fraud are Ukraine, Malaysia, Pakistan, Russia, Turkey, Bulgaria, Romania, Egypt, Lithuania, Yugoslavia, Indonesia, and Israel. Precisely, the same study has also shown that the twelve countries with probably the lowest fraud are Austria, France, the UK, Hong Kong, South Africa, Switzerland, Japan, Spain, Norway, Taiwan, New Zealand, and Australia [13]. From the papers that have been selected for study, 64 articles discuss online payments from the banking industry. Among those 64 studies, 12 discuss online banking secure authentication and the rest of the security issues. The countries with the most discussion about digital payment from the banking sector are India, Malaysia, Nigeria, Bangladesh, China, India, and Indonesia. On other hand, there are 24 articles about e-wallet security issues, 19 articles about design and requirements, and 23 articles regarding study and adoption of e-wallet, for which the countries are the same as those on the banking industry, namely India, Malaysia, Nigeria, Bangladesh, China, India, and Indonesia. We can conclude that, in the electronic payments system, “e-wallet and online banking” are still the most talked about banking and financial services industry. For information on the industrial studies, the countries are listed in Table 2.

3.8. Answering the Research Questions

In this section, we will discuss the proposed research questions. To answer the research questions, this section will be divided into two subsections, which are described below.

3.8.1. Major Issues Regarding Electronic Payments

Digital payment is a good way of making payments online. A tremendous alteration of web-based transactions has occurred with an equal rise in security strikes against electronic payments [7]. Protection in changing the business environment is not readily acknowledged. Electronic payment on the web is a simple target for stealing personal information and money. There are many reasons security vulnerabilities show up in electronic payments. Clients offer charge cards and payment account details along with other private information online. These data are sometimes transmitted insecurely [9]. Electronic payments demand the improvement of information technologies. The disappointment of the electronic payment depends upon why it ignores the market and the user. In this section, we examine what the chief problems in electronic payments are, which also answers research question 1, and look at what areas researchers are concentrating on and just how well the information disclosed at the time of the transaction is protected. To answer RQ1, Table 3 summarizes the distribution of studies and the number of studies from a specific source type.
Table 3 shows the frequency of studies about electronic payment. Among the 131 selected research articles, about 73 (55.038%) of them are focused on electronic payment system security. The next group of studies, which related to enhance authentications (16, 12.40%), were also related to electronic payment security. On the other hand, we found 23 (17.829%) study/adoption/impact-related studies. Finally, we found 19 (14.728%) design and requirement-related research papers. Figure 3 shows the study frequency.
After examining this analysis, we discovered that today, researchers are much more centered on guarding electronic payments. Namely, the e-wallet and online payments element were the biggest services, which supports this study, and electronic payments studies showed that 73 papers were deal with in security-related study, while 16 papers also discussed secure authentication.

3.8.2. Security Properties of Electronic Payments

Protection may be the major issue with electronic payment methods because without safe industrial information exchange and secure electronic monetary transactions through networks, no one will believe it is safe to use. Users require confidentiality, authentication, data integrity, as well as non-repudiation as essential needs for making safe and secure settlements over the internet [14,15,16]. The electronic payment systems need to have all the above protection attributes, as users will certainly not rely on an e-payment system, which is not secured. As well as this, trust is exceptionally essential to guarantee approval from the clients. This area will provide the greatest security qualities to prevent electric payments fraud along with a survey on electric payment transactions and security engaged at the same time. The security properties of electronic payments adapted from Reference are shown in Figure 4 [3].

Authorization

Electronic payment should be available only for authorized customers, and additionally, the details exchanged for the payment have to only cover the authorized topics. The system must verify that it allows the user to make the requested transaction. The assets involved must be able to verify that everyone involved in the transaction may make the transaction. If authorization on information is not suitably offered to payment system, hackers can conveniently intercept the payment information of customers without mutual verification and additionally, they can control the information [17].

Confidentiality

Confidentiality is extremely essential in the e-commerce world due to the possibility that hackers might get people’s sensitive details. In electronic payment, a client ought to be allowed to use the electronic banking account after effective verification. The information entered by the customer is not easily accessible to other customers using electronic banking. Confidentiality is an assurance that information is shared solely among authorized individuals or companies. Only an authorized receiver should be able to acquire the encrypted message so that others cannot view its contents [18]. It must protect confidential information from any unauthorized person, process, or device.

Integrity

To prevent malfunction or physical harm, an electronic payment network needs accurate details. Integrity is connected to the believability of information resources. It is utilized to make sure that the information is precise enough for its needs. The information must be complete and authentic, making sure that information will not be replaced or maybe harmed during the transaction time or perhaps transmission time [19]. Data integrity will keep all the specifics confidential during the electric transaction. The information and devices have not been changed and corrupted by external parties. Valid user credentials will usually be acknowledged.

Authentication and Non-Repudiation

Authentication is the procedure of confirming the identity of a procedure or maybe device, usually as a precondition for enabling use of materials on a product. The primary problem, which must be looked after for an electric payment device, is authentication that identifies the customer and ensures that the individual is who he/she promises to be. A selection of authentication techniques was created to ensure the defense of electronic purchases. The process of authentication is important for enabling individuals to go into their credentials, and if they match with the existing one, then the individual is a validated user and is permitted to login to the system, otherwise, they are not. In general, there are three main approaches utilized to verify entities, as follows: One method is something you have on you, for example, a device, token, or card. The second method is to use points you know, such as passwords, pins, etc. The third approach is to make use of something that is biometric [20]. Authentication methods, like individual IDs and passwords that identify individuals, can help to reach the objective of confidentiality [21].
However, it was identified that authentication with just one aspect is not reputable to supply enough safety and security due to an option of safety risks [18]. Because of the increase in online transactions, single authentication is not enough for doing expensive transactions online. For that reason, there is a need for an even more strong and secure system according to the Multi Factor Authentication (MFA) to look at the validity of individuals. MFA involves various points such as, for instance, biometrics, the sensible mobile device, token device, together with the smart card. This authentication program improves the safety degree as well as additionally making use of identification, confirmation, and verification for guaranteeing customer authority. On the other hand, non-repudiation is a mechanism to ensure that the user can be sure that they are connecting with the authentic server, such that neither of the communicating parties can later on incorrectly refute that the purchase happened. Pertaining to electronic security of monetary transactions, the application of non-repudiation supposes a solution that provides evidence of the stability as well as origin of information, and a verification tool that with high guarantee can be insisted to be genuine. It maintains logs of purchases as well as being frequently upgraded by banks, and records a variety of information comprising the nature, time, and date of transactions that have been participated in by consumers. These records make it possible for the verification of many completed transactions as well as provide the proof required for any concern, which may arise.

Robustness and Efficiency

As the electronic payments are transforming, there is a need to change and develop. In competing situations, time-to-market robustness is crucial for measuring the success of a system. Security measures for electronic payment solutions must be tested under the supervision of the danger monitoring function to ensure their robustness and effectiveness. The rise in Fintech has grown rapidly in the banking sector worldwide. To stay affordable, banks are introducing internet banking with the motive to achieve greater productivity as well as efficiency [22]. Efficiency is one of the favorable characteristics of the electronic payment system [9]. Electronic payment is gaining appeal among significant retailers because of the safety, efficiency, and added energy it offers to the end-user, which enhances their satisfaction of their overall purchase. By giving high efficiency in making transactions, consumers are extra likely to adopt E-wallet, making deals in their daily life [23]. Effectiveness can be substantially improved by decreasing transaction expenses, enabling trade on items, and services with much reduced values. The performance of the online payment can be even more improved based on the following referrals: Effort needs to be made to verify the input information to ensure the integrity of the system.

Supporting Transaction

Support cash transaction is the one of basic attributes of customer satisfaction with electronic payment [20]. The application for payment should support a mechanism allowing money to be exchanged over the Internet [24], and the merchant or provider is liable for the payment-method application (app) to disable it [25]. The app does not conflict with other mobile systems or non-payment functions. In electronic payments, the principal problem is to be more secure for payment systems and disputation between online merchants and customers. Electronic payment systems are not successful without the acceptance of users [13]. Problems are not readily recognized due to a lack of protection in the growing market ecosystem. A 2G/3G/4G/5G wireless network or Wi-Fi network is needed to support the communication between user devices and mobile payment systems [26]. The need to have a reliable network to help e-banking is crucial, because badly performed Internet banking programs will harm the credibility of a bank or otherwise alienate clients and the public. Payments issuers need to collect and analyze more information from customer behavior, or from the transaction [27]. There are many applications from the payment service providers that were developed for supporting mobile payments including: issuer, card network, and mobile company. One-time password (OTP) and biometric features like fingerprint, voice, or facial recognition must be used if the mobile banking app supports them to authenticate the identity [28]. In order to help capture illegal acts, the user can see where the sale takes place along with the name and number of the dealer [29,30,31,32,33]

Availability

In electronic payment, the service must have the availability, which pleases both security needs of subjects taking part in purchases and customer comfort. It requires having the accessibility, in which it can complete the purchase whenever the user demands [34,35]. Availability defines the access of information sources, ensuring a started transaction can be timely and completely executed. In order for an electronic payment service to be securely provided, it must have confidentiality, authentication, authorization, integrity, non-repudiation, robustness, efficiency, supporting transaction, and availability, as mentioned above.
Table 4 shows that most researchers have suggested that, in an electronic transaction, the system must have the listed security properties. E-commerce has altered the method individuals utilize to do business. The online transfer is not just limited to ecommerce, it also offers the opportunity to gain movie or plane tickets, download music, buy a publication, or look at the global markets for desired products at any time in any location. Security factors to consider are a fundamental part of electronic transactions. To allow large-scale transfer approaches all around the world, payment approach necessitates following an effective safety procedure that can absolutely ensure safety and security for internet transactions.
In this modern world, the digital payment solutions provided in this paper would have ideal mechanisms to satisfy the safety and security properties detailed in RQ2. However, providing security is a task that needs exhaustive evaluation and even more initiative than just using cryptographic mechanisms. After completing the security analysis, we found that to overcome security challenges, the system must implement the security properties outlined as below:
  • Confidentiality
  • Integrity
  • Authentication
  • non repudation
  • Robustness
  • efficiency
  • Availability

4. Conclusions

This study reviewed 131 papers published from 2010 to 2020 on an electronic payment system, namely e-wallet and an online payment system. After examining these papers, we classified the studies into two groups: e-wallet and online payment studies. While e-wallet studies examined that e-wallets are gaining more attention in electronic payment, the focus of online payment system research was more focused on online payment security. The analysis of the selected studies shows several challenges and topics for future research, including those specifically related to using electronic payment systems to improve security and interoperability of e-wallets and online payment systems.

Author Contributions

Conceptualization, M.A.H.; Data curation, M.A.H. and M.K.H.; Formal analysis, M.A.H. and Z.S.; Funding acquisition, Z.S. and M.K.H.; Investigation, M.A.H.; Methodology, M.A.H.; Resources, M.A.H.; Software, M.A.H. and M.K.H.; Supervision, Z.S. and M.K.H.; Validation, M.A.H. and Z.S.; Writing—review M.A.H., Z.S., M.K.H.; and editing Z.S., M.K.H. and A.S.A.-K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Malaysia Ministry of Education (FRGS/1/2019/ICT01/UKM/01/2) and Universiti Kebangsaan Malaysia-Yayasan Tun Ismail (EP-2018-012).

Conflicts of Interest

The authors declare no conflict of interest regarding this paper.

Appendix A

Table A1. List of References that were used to analyses the data.
Table A1. List of References that were used to analyses the data.
SourcesPaper TitleYearTypeCountryReferenceJ/C Name
MDPIThe Impact of …2020JSouth Africa[2]Sustainability
Research gateThe impact…2020JMalaysia[3]Journal of Advanced Research in Dynamical and Control Systems
Google scholarFactors Influencing …2020JMalaysia[4]Journal of International Business and Management
Research gateE-Wallet Transactional…2020JMalaysia[5]International Journal of Management Science and Business Administration
MDPISustainable online…2019JChina[6]Sustainability
MDPIE-commerce liability…2019JKorea[7]Sustainability
MDPIThe role of …2019JChina[8]Sustainability
Growing ScienceThe effect of…2020JIndonesia[9]Management Science Letters
ACM libraryThe Impact of…2020CDubai,[10]IC4E 2020
MDPIPurchase intention …2020JKorea[11]Sustainability
MDPIMobile personalized…2020JChina[12]Sustainability
Google ScholarThe Study of …2016JIndia[13]International Journal of Advanced Research in Computer Science and Software Engineering
Google ScholarThe Future of …2016JMacedonia[14]European Journal of Business and Management
Google ScholarElectronic Cash …2017JIndia[15]International Journal of Advanced Research in Computer Science
IEEESecure mobile …2014JVenezuela[16]Journal of Enterprise Information Management
SpringerMobile payment …2018JSouth Korea[17]Human-centric Computing and Information Sciences
Google ScholarReview of …2015JMalaysia[18]Asian Journal of Information Technology
Google ScholarComputer Security…2016CMalaysia[19]IOP Conference Series: Materials Science and Engineering
Research gateElectronic banking …2016JCzech Republic[20]Journal of Security and Sustainability Issues
Research gateSecurity And Privacy…2014JKenya[21]International Journal of Computer Science Issues. All
Google ScholarImpact of Online…2019JBangladesh[22]European Journal of Business and Management Research
Google scholarE-wallet…2020JMalaysia[23]International Journal of Research in Commerce, It & Management
SpringerA secure …2015JUnited states[24]Electronic Commerce Research
Google ScholarPCI Mobile …2013JUnited States[25]PCI Security Standards Council
MDPIIdentity authentication…2020JChina [26]Journal of Global Information Management
Google ScholarMulti-faceted…2017JUSA[27]MPIW
IEEEA research…2019JTurkey[28]International Symposium on Digital Forensics and Security
Google ScholarOnline Banking …2013JIndia[29]International Journal of Advanced Research in Computer Science and Software Engineering
Google ScholarA comparative …2011CAustralia[30]International Cyber Resilience Conference
Research gateConsiderations Regarding….2010JRomania[31]Amfiteatru Economic
AcademiaSecurity and Fraud …2015JJordan[32]International Journal of Computer Networks and Applications
Google ScholarThe Impact…2019JMalaysia[33]Global Business and Management Research: An International Journal
Research gateA Review …2018CSudan, Canada[34]
Research gateHighlighting the…2015JPoland[35]The Journal of Internet Banking and Commerce
IEEEAcceptance of Website…2019CMalaysia[36]IEEE 10th Control and System Graduate Research Colloquium,
Research gateSecurity Risk…2019JNigeria[37]International Journal of Education and Management Engineering
IEEESecure mobile …2014jVenezuela[38]IT Professional
Google ScholarTransaction Security …2012JIndia[39]International Journal of Electronics and Computer Science Engineering
Research gateEnhancing user …2018JIndia[40]Journal of Advanced Research in Dynamical and Control Systems
IEEEBank vs telecommunication…2018CIndonesia[41]International Conference on Information Management and Technology
Research gateA New …2017JBangladesh[42]International Journal of Computer Applications
Google ScholarDesign and Implementation...2019JMyanmar[43]International Journal of Trend in Scientific Research and Development
IEEEBISC authentication …2017CIndia[44]International Conference on Green Engineering and Technologies
IEEEReview of …2019CMalaysia[45]2019 International Conference on Cybersecurity, ICoCSec 2019,
SpringerA Cryptographic…2013JGermany[46]Advances in Computing & Inf. Technology
Science DirectA Comparative …2012JThailand[47]Procedia Engineering
Google scholarCustomer value …2019JMalaysia[48]International Journal of Advanced Computer Science and Applications
SpringerSecurity Assessment…2014JTurkey[49]A MasterCard Company
Google ScholarThe Effects of …2017JBahrain[50]International Journal of e-Education, e-Business, e-Management and e-Learning
Taylor & FrancisThe issues…2018JSouth Africa[51]Association for Computing Machinery
Google ScholarSecurity Aspects …2017JIndia[52]International Journal on Recent and Innovation Trends in Computing and Communication
Google ScholarA Compendious …2017JMalaysia[53]International Journal of Advanced Computer Science and Applications
Research gateE-Wallet System …2018JNigeria[54]International Journal of Advanced Research in Computer Science and Software Engineering
Google ScholarSecurity in Electronic…2015JBangladesh[55]International Journal of Scientific & Engineering Research
IEEEEnhancing Online …2017CIndia[56]IEEE International Conference on Computational Intelligence and Communication Technology
SpringerEmbedding a Digital …2019J UAE[57] Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Google ScholarDesign and Security …2016JMalaysia[58]Interdisciplinary Information Sciences
Science DirectTowards a web …2015JSpain[59]Electronic Commerce Research and Applications
Research gateSecurity of E-Banking …2016JBangladesh[60]Journal of Finance and Accounting
Research gateA Survey on …2017JMalaysia[61]Indian Journal of Science and Technology
Research gateDevelopment of …2018JIndia[62]International Journal for Scientific Research & Development
IEEESBLWT: A secure …2018JChina[63]IEEE Access
IEEEAn efficient of …2016CThailand[64]International Conference on Advanced Information Networking and Applications
Google ScholarInternet Banking, …2015JIndia[65]International Journal of Research in Management & Business Studies
Google ScholarSecurity Issues …2015JNigeria[66]International Journal of Computer Science and Telecommunications
Google ScholarE-Banking Security: …2017JSaudi Arabia[67]International Journal of Emerging Technology and Advanced Engineering
IEEESurvey on…2019CIndia[68]Amity International Conference on Artificial Intelligence, AICAI 2019
Research gateA robust …2018JSouth Africa[69]International Journal of Scientific and Technology Research
Google ScholarBiometric Authentication …2018JIran[70]Journal of Advances in Computer Research
IEEEA robust …2016CIndia[71]International Conference on Green Engineering and Technologies
MDPIKnowledge preserving…2019JMalaysia[72]Sensors
Atlantis PressResearch on Internet …2017CChina[73]International Conference on Education, Management, Computer and Medicine
IEEECam-Wallet: Fingerprint…2017CMauritius[74]IEEE International Conference on Environment and Electrical Engineering
Google ScholarAuthentication for …2017JIndia[75]Imperial Journal of Interdisciplinary Research
Google ScholarEnhancing Security…2018JIndia[76]Journal of Computer Engineering
Google ScholarA Case Study…2015JIndia[77]International Journal of Computer Applications Technology and Research
Science DirectEnhancement of …2020JIndia[78]Computer Communications
Research gateAdoption of e-payment…2015CMalaysia[79]International Conference on E-Commerce
IEEEAnalyzing the security…2017CIndonesia[80]International Conference on Informatics and Computing.
SpringerA peer…2018JTaiwan[81]Electronic Commerce Research
IEEEE-wallet Properties….2011CDenmark[82]International Conference on Mobile Business e-wallet
SpringerExperimental Case …2010JEngland[83]Cognitive Computation
Science DirectSecurity analysis…2019JChina[84]Journal of Information Security and Applications
Google ScholarMobile based ….2010JIran[85]International Journal of UbiComp
Google ScholarAnalysis of Security…2014JNigeria[86]International Journal of Computer Applications
Google ScholarQR-Code …2014JIndia[87]International Journal of Advanced Research in Computer Science
Google ScholarMobile Commerce…2010JFrance[88]The European Telecommunications Standards Institute
Research gateTowards a cashless …2011JDenmark[89]Research gate
Research gateA formal …2011JBrazil[90]International Journal of Computer Science and Information Technology
AcademiaElectronic banking fraud…2011JMalaysia[91]International Journal in Advances in Information Sciences and Service Sciences
Google ScholarAnalysis Tracking…2012JIndonesia[92]International Journal of Scientific & Technology Research
Research gateInternet Banking…2012JGhana[93]Journal of Management and Strategy
Science DirectLocking down…2012JEngland[94]Computer Fraud and Security
ACM libraryDesigning Digital…2012CDenmark[95]International Conference on Electronic Commerce
Google ScholarIssues and Challenges…2013JIndia[96]International Journal for Research in Management and Pharmacy(IJRMP)
AcademiaInternet banking-benefits…2013JIndia[97]International journal of research in business management
SpringerAnalysis of Internet…2013JSouth Korea[98]Future Information Communication Technology and Applications
Google ScholarStudy of Online…2013JIndia[99]IOSR Journal of Computer Engineering
Google ScholarE-Wallet …2014JBangladesh[100]International Journal of Modeling and Optimization
Google ScholarOnline Banking Security…2014JChina[101]International Journal of Security and its Applications
IEEEOnline Payment …2014CIndia[102]Conference on Electrical, Electronics and Computer Science
Research gateSecurity in Online…2014JIndia[103]International Journal of Innovative Research in Science, Engineering and Technology
Google ScholarA Review on … 2015COman[104]International Conference on Information Technology
Google ScholarAn Evaluative …2016JIndia[105]Amity Journal of Management Research
Taylor & FrancisImpact of Perceived …2016JIran[106]Journal of Internet Commerce
Google ScholarAcceptance of e-wallet …2016JIndia[107]International Journal of Innovative Research in Management Studies (IJIRMS)
Google ScholarSecurity of Mobile …2016JGreece[108]European Union Agency For Network and Information Security
Google ScholarDevelopment of e-wallet…2016JNigeria[109]Computer Sciences and Telecommunications
Google ScholarA Study on…2016JIndia[110]International Journal of Advanced Research in Management and Social Sciences
Google ScholarAre digital …2016JIndia[111]Apeejay Journal of Management and Technology
Research gateEducating Consumers…2016JIndia[112]International Journal of Research Available
Google ScholarPerceived Security …2017JMalaysia[113]Journal of the Asian Academy of Applied Business
SpringerA model for …2017JSaudi Arabia[114]Computing
Google ScholarE-Banking Adoption…2017JIndia[115]International journal of technology and computing
Google ScholarFintech, the …2017JHungary[116]Budapest management review
Google ScholarFuture of e-Wallets…2017JIndia[117]International Journals of Advanced Research in Computer Science and Software Engineering
IEEESecurity Requirement …2017CJapan[118]International Conference on Software Quality, Reliability and Security
Google ScholarOffline Transactions …2017JIndia[119]Indian Journal of Science and Technology
Research gateBio Wallet: …2017CTurkey[120]International Conference on Systems
Google ScholarE-Banking …2018JIndia[121]Commerce Spectrum
Google ScholarIssues and challenges…2018JNigeria[122]International Journal of Information Research and Review
Google ScholarThe impact…2018JMalaysia[123]International Journal of Industrial Management
IEEESecure and …2018CIndia[124]IEEE Smart World Ubiquitous Intelligence and Computing,
IEEESecurity testing…2018CPortugal[125]International Conference on Computational Intelligence and Communication Networks
Google scholarFactors affecting…2018JMalaysia[126]International Journal of Engineering and Technology(UAE)
Google ScholarThe Adoption of…2018JSouth Korea[127]International Journal of Applied Engineering Research
IEEEA systematic…2018CPakistan[128]International Conference on Frontiers of Information Technology, FIT 2018
Google scholarEffect of e …2019JMalaysia[129]International Journal of Advanced Computer Science and Applications
SpringerA New …2019CIndia[130]International Conference on Communications and Cyber Physical Engineering
Science DirectTechnological factors…2019CIndonesia[131]Procedia Computer Science

References

  1. Handelsblatt Statista FinTech Report 2019—Digital Payments. 2019. Available online: https://work.euroforum.de/data/pdf/P1200762pc.pdf (accessed on 2 June 2020).
  2. Talom, F.S.G.; Tengeh, R.K. The Impact of Mobile Money on the Financial Performance of the SMEs in Douala, Cameroon. Sustainability 2020, 12, 183. [Google Scholar] [CrossRef] [Green Version]
  3. Subaramaniam, K.; Garding, J.M.; Kolandaisamy, R.; Jalil, A.B. The impact of E-Wallets for current generation. J. Adv. Res. Dyn. Control Syst. 2020, 12, 751–759. [Google Scholar] [CrossRef]
  4. Karim, M.W.; Haque, A.; Ulfy, M.A.; Hossain, M.A.; Anis, M.Z. Factors Influencing the Use of E-wallet as a Payment Method among Malaysian Young Adults. J. Int. Bus. Manag. 2020, 3, 1–11. [Google Scholar] [CrossRef]
  5. Abu Bakar, N.; Rosbi, S.; Uzaki, K. E-Wallet Transactional Framework for Digital Economy: A Perspective from Islamic Financial Engineering. Int. J. Manag. Sci. Bus. Adm. 2020, 6, 50–57. [Google Scholar] [CrossRef]
  6. Choi, D.; Chung, C.Y.; Young, J. Sustainable online shopping logistics for customer satisfaction and repeat purchasing behavior: Evidence from China. Sustainability 2019, 11. [Google Scholar] [CrossRef] [Green Version]
  7. Chun, S.H. E-commerce liability and security breaches in mobile payment for e-business sustainability. Sustainability 2019, 11. [Google Scholar] [CrossRef] [Green Version]
  8. Zhang, J.; Luximon, Y.; Song, Y. The role of consumers’ perceived security, perceived control, interface design features, and conscientiousness in continuous use of mobile payment services. Sustainability 2019, 11. [Google Scholar] [CrossRef] [Green Version]
  9. Noor Ardiansah, M.; Chariri, A.; Rahardja, S. Udin The effect of electronic payments security on e-commerce consumer perception: An extended model of technology acceptance. Manag. Sci. Lett. 2020, 10, 1473–1480. [Google Scholar] [CrossRef]
  10. Argimbayeva, G.; Menasria, I.; Elshareif, E.; Lewis, A. The Impact of E- Wallet on ADNOC’s Customer Satisfaction. In Proceedings of the 2020 the 11th International Conference on E-Education, E-Business, E-Management and E-Learning (IC4E 2020)—EI & Scopus, Osaka, Japan, 10–12 January 2020; pp. 364–368. [Google Scholar]
  11. Kim, S.S. Purchase intention in the online open market: Do concerns for E-commerce really matter? Sustainability 2020, 12. [Google Scholar] [CrossRef] [Green Version]
  12. Xiao, L.; Lu, Q.; Guo, F. Mobile personalized recommendation model based on privacy concerns and context analysis for the sustainable development of M-commerce. Sustainability 2020, 12. [Google Scholar] [CrossRef] [Green Version]
  13. Mamta, H.; Tyagi, A.S. The Study of Electronic Payment Systems. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2016, 6, 2277. [Google Scholar]
  14. Bezhovski, Z. The Future of the Mobile Payment as Electronic Payment System. Eur. J. Bus. Manag. 2016, 8, 2222–2839. [Google Scholar]
  15. Sharma, M.K. Electronic Cash over the Internet and Security Solutions. Int. J. Adv. Res. Comput. Sci. 2017, 8, 229. [Google Scholar]
  16. Jesús Téllez Isaac, S.Z. Secure Mobile Payment Systems. J. Enterp. Inf. Manag. 2014, 22, 317–345. [Google Scholar] [CrossRef]
  17. Kang, J. Mobile payment in Fintech environment: Trends, security challenges, and services. Human-Centric Comput. Inf. Sci. 2018, 8, 32. [Google Scholar] [CrossRef] [Green Version]
  18. Karim, N.A.; Shukur, Z. Review of user authentication methods in online examination. Asian J. Inf. Technol. 2015, 14, 166–175. [Google Scholar] [CrossRef]
  19. Mahmadi, F.N.; Zaaba, Z.F.; Osman, A. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security. IOP Conf. Ser. Mater. Sci. Eng. 2016, 160. [Google Scholar] [CrossRef] [Green Version]
  20. Belás, J.; Korauš, M.; Kombo, F.; Korauš, A. Electronic banking security and customer satisfaction in commercial banks. J. Secur. Sustain. Issues 2016, 5, 411–422. [Google Scholar] [CrossRef] [Green Version]
  21. Omariba, Z.B.; Masese, N.B. Security and Privacy of Electronic Banking. Kidney Int. Suppl. 2013, 3, 262. [Google Scholar] [CrossRef]
  22. Alam, S.S.; Ali, M.H.; Omar, N.A.; Hussain, W.M.H.W. Customer satisfaction in online shopping in growing markets: An empirical study. Int. J. Asian Bus. Inf. Manag. 2020, 11, 78–91. [Google Scholar] [CrossRef]
  23. Teoh Teng Tenk, M.; Yew, H.C.; Heang, L.T. E-Wallet Adoption: A Case in Malaysia. Int. J. Res. Commer. Manag. 2020, 2, 135–138. [Google Scholar]
  24. Chaudhry, S.A.; Farash, M.S.; Naqvi, H.; Sher, M. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 2016, 16, 113–139. [Google Scholar] [CrossRef]
  25. PCI Security Standards Council LLC. PCI Mobile Payment Acceptance Security Guidelines for developers. PCI DSS Inf. Suppl. 2013, 1–27. Available online: https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Merchants_v1.pdf (accessed on 2 June 2020).
  26. Wang, F.; Shan, G.B.; Chen, Y.; Zheng, X.; Wang, H.; Mingwei, S.; Haihua, L. Identity authentication security management in mobile payment systems. J. Glob. Inf. Manag. 2020, 28, 189–203. [Google Scholar] [CrossRef]
  27. August, M.; Summary, M. Multi-Faceted Evolution of Mobile Payment Strategy, Authentication, and Technology. 2017. Available online: https://www.bostonfed.org/publications/mobile-payments-industry-workgroup/multi-faceted-evolution-of-mobile-payment-strategy-authentication-and-technology.aspx (accessed on 18 June 2020).
  28. Yildirim, N.; Varol, A. A Research on Security Vulnerabilities in Online and Mobile Banking Systems. In Proceedings of the 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Barcelos, Portugal, 10–12 June 2019; pp. 1–5. [Google Scholar] [CrossRef]
  29. Jassal, K.R.; Sehgal, R.K. Online Banking Security Flaws: A Study. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2013, 3, 1016–1021. [Google Scholar]
  30. Subsorn, P.; Limwiriyakul, S. A Comparative analysis of internet banking security in Australia: A customer perspective. Proc. Eng. 2012, 32, 260–272. [Google Scholar] [CrossRef] [Green Version]
  31. Vrancianu, M.; Popa, L. Considerations Regarding the Security and Protection of E-Banking Services. Amfiteatru Econ. J. 2010, 12, 388–403. [Google Scholar]
  32. Webb, H.; Liu, S.; Yan, M.R. Evaluation of M-payment technology and sectoral system innovation—A comparative study of UK and indian models. Electron 2019, 8. [Google Scholar] [CrossRef] [Green Version]
  33. Normalini, M.K. The Impact of Security Factors towards Internet Banking Usage Intention among Malaysians. Glob. Bus. Manag. Res. An Int. J. 2019, 11, 241–252. [Google Scholar]
  34. Ibrahim, R.M. A Review on Online-Banking Security Models, Successes, and Failures. In Proceedings of the 2nd Interantional Conference on Inventive Systems and Control (ICISC—2018), At Coimbatore, India, 19–20 January 2018. [Google Scholar]
  35. Khrais, L.T. Highlighting the Vulnerabilities of Online Banking System. J. Internet Bank. Commer. 2015, 20. [Google Scholar] [CrossRef] [Green Version]
  36. Ataya, M.A.M.; Ali, M.A.M. Acceptance of Website Security on E-banking. A-Review. In Proceedings of the 2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia, 2–3 August 2019; pp. 201–206. [Google Scholar] [CrossRef]
  37. Ojeniyi, J.A.; Edward, E.; Abdulhamid, S.M. Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case Study. Int. J. Educ. Manag. Eng. 2019, 9, 1–14. [Google Scholar] [CrossRef]
  38. Isaac, J.T.; Zeadally, S. Secure mobile payment systems. IT Prof. 2014, 16, 36–43. [Google Scholar] [CrossRef]
  39. Rane, P.B.; Meshram, B.B. Transaction Security for E-commerce Application. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2012, 5, 1720–1726. [Google Scholar]
  40. Susanna, A.; David, S.; Kathrine, J.W.; Esther, A.G. Enhancing user authentication for mobile wallet using cryptographic algorithm. J. Adv. Res. Dyn. Control Syst. 2018, 10, 891–897. [Google Scholar]
  41. Chandra, Y.U. Bank vs telecommunication E-Wallet: System analysis, purchase, and payment method of GO-mobile CIMB Niaga and T-Cash Telkomsel. In Proceedings of the 2017 International Conference on Information Management and Technology (ICIMTech), Yogyakarta, Indonesia, 15–17 November 2017; pp. 165–170. [Google Scholar] [CrossRef]
  42. Mridha, M.F.; Nur, K.; Kumar, A.; Akhtaruzzaman, M. A New Approach to Enhance Internet Banking Security. Int. J. Comput. Appl. 2017, 160, 35–39. [Google Scholar] [CrossRef]
  43. Oo, K.Z. Design and Implementation of Electronic Payment Gateway for Secure Online Payment System. Int. J. Trend Sci. Res. Dev. 2019, 3, 1329–1334. [Google Scholar] [CrossRef]
  44. Shaju, S.; Panchami, V. BISC Authentication Algorithm: An Efficient New Authentication Algorithm Using Three Factor Authentication for Mobile Banking. In Proceedings of the 2016 Online International Conference on Green Engineering and Technologies (IC-GET), Coimbatore, India, 19 November 2016; pp. 1–5. [Google Scholar] [CrossRef]
  45. Hassan, M.A.; Shukur, Z. Review of Digital Wallet Requirements. In Proceedings of the 2019 International Conference on Cybersecurity (ICoCSec), Negeri Sembilan, Malaysia, 25–26 September 2019; pp. 43–48. [Google Scholar] [CrossRef]
  46. Dwivedi, A.; Dwivedi, A.; Kumar, S.; Pandey, S.K.; Dabra, P. A Cryptographic Algorithm Analysis for Security Threats of Semantic E-Commerce Web (SECW) for Electronic Payment Transaction System. In Proceedings of the Second International Conference on Advances in computing and information Technology, Chennai, India, 13–15 July 2012; Volume 3, pp. 367–379. [Google Scholar]
  47. Loke, S.P.; Noor, N.M.; Khalid, K. Customer satisfaction towards internet banking services: Case analysis on a Malaysian bank. In Proceedings of the 2012 IEEE Colloquium on Humanities, Science and Engineering (CHUSER), Kota Kinabalu, Malaysia, 3–4 December 2012; pp. 159–163. [Google Scholar]
  48. Satar, N.S.M.; Dastane, O.; Ma’arif, M.Y. Customer value proposition for E-Commerce: A case study approach. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 454–458. [Google Scholar] [CrossRef] [Green Version]
  49. Bahtiyar, Ş.; Gür, G.; Altay, L. Security Assessment of Payment Systems under PCI DSS Incompatibilities. In ICT Systems Security and Privacy Protection; Springer International Publishing: New York, NY, USA, 2014; pp. 395–402. [Google Scholar] [CrossRef] [Green Version]
  50. Hasan, M.K.; Ismail, A.F.; Islam, S.; Hashim, W.; Pandey, B. Dynamic spectrum allocation scheme for heterogeneous network. Wirel. Pers. Commun. 2017, 95, 299–315. [Google Scholar] [CrossRef]
  51. Poeng, K.P.; Chukwuere, J.E.; Agu, N.T. The issues affecting employees’ adoption of online banking in mahikeng. In Proceedings of the 2nd International Conference on Information System and Data Mining, Lakeland, FL, USA, 9–11 April 2018; pp. 70–75. [Google Scholar] [CrossRef]
  52. Kanimozhi, G. Security Aspects of Mobile Based E Wallet. Int. J. Recent Innov. Trends Comput. Commun. 2017, 5, 1223–1228. [Google Scholar]
  53. Khan, B.U.I.; Olanrewaju, R.F.; Baba, A.M.; Langoo, A.A.; Assad, S. A Compendious Study of Online Payment Systems: Past Developments, Present Impact, and Future Considerations. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 256–271. [Google Scholar] [CrossRef] [Green Version]
  54. Akpan, A.G.; Mmeah, S.; Polytechnic, K.S.; Baah, B. E-Wallet System Implementation: Impact on Small Scale Business in Nigeria. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2018, 8, 35–43. [Google Scholar]
  55. Mazumder, F.K.; Jahan, I.; Das, U.K. Security in Electronic Payment Transaction. Int. J. Sci. Eng. Res. 2015, 6, 955–960. [Google Scholar]
  56. Sharma, N.; Bohra, B. Enhancing Online Banking Authentication using Hybrid Cryptographic method Security Issues in Online Banking Application. In Proceedings of the 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 9–10 February 2017; pp. 1–8. [Google Scholar] [CrossRef]
  57. Houngbo, P.J.; Hounsou, J.T.; Damiani, E.; Asal, R.; Cimato, S.; Frati, F.; Yeun, C.Y. Embedding a Digital Wallet to Pay-with-aSelfie, from Functional Requirements to Prototype; Springer International Publishing: New York, NY, USA, 2019; Volume 206, ISBN 978-3-319-67836-8. [Google Scholar]
  58. LAI, P.C. Design and Security impact on consumers’ intention to use single platform E-payment. Interdiscip. Inf. Sci. 2016, 22, 111–122. [Google Scholar] [CrossRef] [Green Version]
  59. Ruiz-Martínez, A. Towards a web payment framework: State-of-the-art and challenges. Electron. Commer. Res. Appl. 2015, 14, 345–350. [Google Scholar] [CrossRef]
  60. Shamsus Sadekin, M. Security of E-Banking in Bangladesh. J. Financ. Account. 2016, 4, 1. [Google Scholar] [CrossRef] [Green Version]
  61. Masihuddin, M.; Islam Khan, B.U.; Islam Mattoo, M.M.U.; Olanrewaju, R.F. A Survey on E-Payment Systems: Elements, Adoption, Architecture, Challenges and Security Concepts. Indian J. Sci. Technol. 2017, 10, 1–19. [Google Scholar] [CrossRef]
  62. Sohail, A.; Shobhit, A.; Saurabh, S.; Akhilesh, V.; Varma, C.P. Development of Advance Digital Mobile Wallet. Int. J. Sci. Res. Dev. 2018, 3, 13. [Google Scholar]
  63. Dai, W.; Deng, J.; Wang, Q.; Cui, C.; Zou, D.; Jin, H. SBLWT: A secure blockchain lightweight wallet based on trustzone. IEEE Access 2018, 6, 40638–40648. [Google Scholar] [CrossRef]
  64. Pukkasenunk, P.; Sukkasem, S. An Efficient of Secure Mobile Phone Application for Multiple Bill Payments. In Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Crans-Montana, Switzerland, 23–25 March 2016; pp. 487–492. [Google Scholar] [CrossRef]
  65. Sheikh, B.A.; Rajmohan, P. Internet Banking, Security Models and Weakness. Int. J. Res. Manag. Bus. Stud. 2015, 2, 17–22. [Google Scholar]
  66. Nwogu, E.; Odoh, M. Security Issues Analysis on Online Banking Implementations in Nigeria. Int. J. Comput. Sci. Telecommun. 2015, 6, 20–28. [Google Scholar]
  67. Alsayed, A.O.; Bilgrami, A.L. E-Banking Security: Internet Hacking, Phishing Attacks, Analysis and Prevention of Fraudulent Activities. Int. J. Emerg. Technol. Adv. Eng. 2017, 7, 109–115. [Google Scholar]
  68. Saxena, S.; Vyas, S.; Suresh Kumar, B.; Gupta, S. Survey on Online Electronic Paymentss Security. In Proceedings of the 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 4–6 February 2019; pp. 746–751. [Google Scholar] [CrossRef]
  69. Elliot, M.; Talent, K. A robust and scalable four factor authentication architecture to enhance security for mobile online transaction. Int. J. Sci. Technol. Res. 2018, 7, 139–143. [Google Scholar]
  70. Alibabaee, A.; Broumandnia, A. Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm. J. Adv. Comput. Res. 2018, 9, 1–17. [Google Scholar]
  71. Venugopal, H.; Viswanath, N. A robust and Secure Authentication Mechanism in Online Banking. In Proceedings of the 2016 Online International Conference on Green Engineering and Technologies (IC-GET), Coimbatore, India, 19 November 2016. [Google Scholar] [CrossRef]
  72. AL-Khaleefa, A.S.; Ahmad, M.R.; Isa, A.A.M.; Esa, M.R.M.; Aljeroudi, Y.; Jubair, M.A.; Malik, R.F. Knowledge Preserving OSELM Model for Wi-Fi-Based Indoor Localization. Sensors 2019, 19, 2397. [Google Scholar] [CrossRef] [Green Version]
  73. Wang, J.; He, Q.; Han, Q. Research on Internet Payment Security Based on the Strong Authentication of the Timeliness and Multi-factors. In Proceedings of the 2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016), Shenyang, China, 29–31 December 2016; pp. 19–23, 59. [Google Scholar]
  74. Okpara, O.S.; Bekaroo, G. Cam-Wallet: Fingerprint-based authentication in M-wallets using embedded cameras. IEEE Int. Conf. Environ. Electr. Eng. 2017. [Google Scholar] [CrossRef]
  75. Gode, P.; Nakhate, S.T.; Mane, S.S. Authentication for Mobile Banking by using Android based Smart Phones. Imp. J. Interdiscip. Res. 2017, 3, 1314–1318. [Google Scholar]
  76. Khachane, D.; Sant, Y.; Sachan, Y.; Ghodeswar, A. Enhancing Security of Internet Banking Using Biometrics. J. Comput. Eng. 2018, 20, 22–25. [Google Scholar] [CrossRef]
  77. Kaur, H. A Case Study upon Non-functional Requirements of Online Banking System. Int. J. Comput. Appl. Technol. Res. 2015, 4, 220–225. Available online: https://ijcat.com/archives/volume4/issue4/ijcatr04041002.pdf (accessed on 18 June 2020). [CrossRef]
  78. Dijesh, P.; Babu, S.S.; Vijayalakshmi, Y. Enhancement of e-commerce security through asymmetric key algorithm. Comput. Commun. 2020, 153, 125–134. [Google Scholar] [CrossRef]
  79. Kabir, M.A.; Saidin, S.Z.; Ahmi, A. Adoption of e-Payment Systems: A Review of Literature. In Proceedings of the International Conference E-Commerce, Seoul, Korea, August 2015; pp. 112–120. [Google Scholar]
  80. Tabet, N.E.; Ayu, M.A. Analysing the Security of NFC Based Payment Systems. In Proceedings of the 2016 International Conference on Informatics and Computing (ICIC), Mataram, Indonesia, 28–29 October 2016; pp. 169–174. [Google Scholar] [CrossRef]
  81. Lee, W.H.; Miou, C.S.; Kuan, Y.F.; Hsieh, T.L.; Chou, C.M. A peer-to-peer transaction authentication platform for mobile commerce with semi-offline architecture. Electron. Commer. Res. 2018, 18, 413–431. [Google Scholar] [CrossRef]
  82. Olsen, M.; Hedman, J.; Vatrapu, R. E-wallet properties. In Proceedings of the 2011 10th International Conference on Mobile Business, Como, Italy, 20–21 June 2011; pp. 158–165. [Google Scholar] [CrossRef]
  83. Aburrous, M.; Hossain, M.A.; Dahal, K.; Thabtah, F. Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies. Cognit. Comput. 2010, 2, 242–253. [Google Scholar] [CrossRef] [Green Version]
  84. Yang, W.; Li, J.; Zhang, Y.; Gu, D. Security analysis of third-party in-app payment in mobile applications. J. Inf. Secur. Appl. 2019, 48, 102358. [Google Scholar] [CrossRef]
  85. Narwal, B. Security Analysis and Verification of Authenticated Mobile Payment Protocols. In Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 21–22 November 2019; pp. 202–207. [Google Scholar] [CrossRef]
  86. Aigbe, P.; Akpojaro, J. Analysis of Security Issues in Electronic Payment Systems. Int. J. Comput. Appl. 2014, 108, 10–14. [Google Scholar] [CrossRef]
  87. Shetty, S.; Shetty, T.; Amale, R. QR-Code based Digital Wallet. Int. J. Adv. Res. Comput. Sci. 2014, 5, 105–110. [Google Scholar] [CrossRef]
  88. ETSI Mobile Commerce (M-COMM). Requirements for Payment Methods for Mobile Commerce. 2010. Available online: https://www.etsi.org/deliver/etsi_tr/102000_102099/102071/01.02.01_60/tr_102071v010201p.pdf (accessed on 18 June 2020).
  89. Olsen, M. Towards a Cashless Society: A Design Science Research on Mobile Wallets. 2011. Available online: https://www.researchgate.net/profile/Jonas_Hedman/publication/268380810_Towards_a_cashless_society_A_design_science_research_on_mobile_wallets/links/54b98a590cf2d11571a4b568.pdf (accessed on 18 June 2020).
  90. Peotta, L.; Holtz, M.D.; David, B.M.; Deus, F.G.; Timoteo de Sousa, R. A Formal Classification of Internet Banking Attacks and Vulnerabilities. Int. J. Comput. Sci. Inf. Technol. 2011, 3, 186–197. [Google Scholar] [CrossRef]
  91. Yazdanifard, R.; Wanyusoff, W.F.; Behora, A.C. Electronic Banking Fraud; the Need to Enhance Security and Customer Trust in Online Banking. Adv. Inf. Sci. Serv. Sci. 2011, 3, 505–509. [Google Scholar]
  92. Purnama, B.E. Analysis Tracking Online Payment System. Int. J. Sci. Technol. Res. 2012, 1, 55–60. [Google Scholar]
  93. Twum, F.; Ahenkora, K. Internet Banking Security Strategy: Securing Customer Trust. J. Manag. Strateg. 2012, 3. [Google Scholar] [CrossRef] [Green Version]
  94. Caldwell, T. Locking down the e-wallet. Comput. Fraud Secur. 2012, 2012, 5–8. [Google Scholar] [CrossRef]
  95. Olsen, M.; Hedman, J.; Vatrapu, R. Designing Digital Payment Artifacts. In Proceedings of the 14th Annual International Conference on Electronic Commerce, Singapore, 7 August 2012; pp. 161–168. [Google Scholar] [CrossRef] [Green Version]
  96. Vasudha Singh, T.; Supriya, N.; Joshna, M.S.P. Issues and Challenges of Electronic Payment Systems. Int. J. Res. Manag. Pharmacy 2013, 2, 25–30. [Google Scholar]
  97. Chavan, J. Internet Banking-Benefits and Challenges in an Emerging Economy. Int. J. Res. Bus. Manag. 2013, 1, 19–26. [Google Scholar]
  98. Que, Z.; Lee, J.; Cheng, W.; Han, S.; Jung, H.; Euh, K. Analysis of Internet Banking Security Crack Through Messenger Hacking. Lect. Notes Electr. Eng. 2013, 235, 219–228. [Google Scholar] [CrossRef]
  99. Jassal, R. Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example. IOSR J. Comput. Eng. 2013, 13, 114–121. [Google Scholar] [CrossRef]
  100. Salah Uddin, M.; Yesmin Akhi, A. E-Wallet System for Bangladesh an Electronic Payment System. Int. J. Model. Optim. 2014, 4, 216–219. [Google Scholar] [CrossRef]
  101. Xin, T.; Ban, X. Online banking security analysis based on STRIDE threat model. Int. J. Secur. Appl. 2014, 8, 271–282. [Google Scholar] [CrossRef]
  102. Roy, S.; Venkateswaran, P. Online Payment System Using Steganography and Visual Cryptography. In Proceedings of the 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science, Bhopal, India, 1–2 March 2014; pp. 1–5. [Google Scholar] [CrossRef]
  103. Pakojwar, S.; Uke, N.J. Security in Online Banking Services—A Comparative Study. Int. J. Innov. Res. Sci. Eng. Technol. 2014, 3, 16850–16857. [Google Scholar] [CrossRef]
  104. Musaev, E.; Yousoof, M. A Review on Internet Banking Security and Privacy Issues in Oman. In Proceedings of the 2015 IEEE International Conference on Industrial Technology, Seville, Spain, 17–19 March 2015; pp. 365–369. [Google Scholar] [CrossRef]
  105. Xiao, L.; Guo, F.; Yu, F.; Liu, S. The effects of online shopping context cues on consumers’ purchase intention for cross-border E-Commerce sustainability. Sustainability 2019, 11, 2777. [Google Scholar] [CrossRef] [Green Version]
  106. Damghanian, H.; Zarei, A.; Siahsarani Kojuri, M.A. Impact of Perceived Security on Trust, Perceived Risk, and Acceptance of Online Banking in Iran. J. Internet Commer. 2016, 15, 214–238. [Google Scholar] [CrossRef]
  107. Hope, R.; Ca, B. Acceptance of e-wallet services: A study of consumer behavior. Int. J. Innov. Res. Manag. Stud. 2016, 1, 1–10. [Google Scholar]
  108. ENISA. Security of Mobile Payments and Digital Wallets. 2016. Available online: https://www.enisa.europa.eu/publications/mobile-payments-security (accessed on 18 June 2020).
  109. UZOKA, F. Development of E-Wallet System for Tertiary Institution in a Developing Country. Comput. Sci. Telecommun. 2016, 3, 18–29. [Google Scholar]
  110. Manikandan, M.; Chandramohan, S. A Study on Awareness Level of Mobile Wallets Servives among Management Students. Int. J. Adv. Res. Manag. Soc. Sci. 2016, 5, 10–19. [Google Scholar]
  111. Batra, R.; Kalra, N. Are Digital Wallets the New Currency? Apeejay J. Manag. Technol. 2016, 11, 1–12. [Google Scholar]
  112. Nair, A.; Dahiya, M.; Gupta, N. Educating Consumers about Digital Wallets. Int. J. Res. 2016, 03, 743–750. [Google Scholar]
  113. Alam, S.S.; Islam, M.R.; Mokhbul, Z.K.M.; Makmor, N.B. Factors affecting intention to use online dating sites in Malaysia. Int. J. Eng. Technol. 2018, 7, 192–198. [Google Scholar] [CrossRef]
  114. Alarifi, A.; Alsaleh, M.; Alomar, N. A model for evaluating the security and usability of e-banking platforms. Computing 2017, 99, 519–535. [Google Scholar] [CrossRef]
  115. Kaur, J.; Singh, H. E-Banking Adoption: A Study of Privacy and Trust. Int. J. Technol. Comput. 2017, 3, 314–318. [Google Scholar]
  116. Varga, D. Fintech, the new era of financial services. Budapest Manag. Rev. 2017. [Google Scholar] [CrossRef] [Green Version]
  117. Madhu Chauhan, I.S. Future of e-Wallets: A Perspective From Under Graduates’. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2017. [Google Scholar] [CrossRef]
  118. Emeka, B.O.; Liu, S. Security Requirement Engineering Using Structured Object-Oriented Formal Language for m-Banking Applications. In Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Prague, Czech Republic, 25–29 July 2017; pp. 176–183. [Google Scholar] [CrossRef]
  119. Singh, J. Offline Transactions Functionality in eWallets. Indian J. Sci. Technol. 2017, 10, 1–4. [Google Scholar] [CrossRef]
  120. Benli, E.; Engin, I.; Giousouf, C.; Ulak, M.A.; Bahtiyar, S. BioWallet: A Biometric Digital Wallet. In Proceedings of the Twelfth International Conference on Systems, At Venice, Italy, 23–27 April 2017; pp. 38–41. [Google Scholar]
  121. George, D.T.; Joseph, R. E-Banking Usage and E-Banking Security Awareness among Customers of Public and Private Sector Banks. Commer. Spectr. 2018, 6, 13–18. [Google Scholar]
  122. Ogini, N.O. Issues and challenges of online banking. Int. J. Inf. Res. Rev. 2018, 5, 5430–5435. [Google Scholar]
  123. Al-sharafi, M.A.; Arshah, R.A.; Herzallah, F.A.T.; Abu-Shanab, E.A. The Impact of Customer Trust and Perception of Security and Privacy on the Acceptance of Online Banking Services: Structural Equation Modeling Approach. Int. J. Ind. Manag. 2018, 4, 1–14. [Google Scholar]
  124. Rajendran, B.; Pandey, A.K.; Bindhumadhava, B.S. Secure and Privacy Preserving Digital Payment. In Proceedings of the 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), San Francisco, CA, USA, 4–8 August 2017; pp. 1–5. [Google Scholar] [CrossRef]
  125. Santos, J.; Antunes, M.; Mangana, J.; Monteiro, D.; Santos, P.; Casal, J. Security Testing Framework for a Novel Mobile Wallet ecosystem. In Proceedings of the 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN), Girne, Cyprus, 16–17 September 2017; pp. 153–160. [Google Scholar] [CrossRef]
  126. Herzallah, A.T.; Mukhtar, M. E-Commerce Adoption Factors among Palestinian SMEs: A Descriptive Study. J. Islam. Hum. Adv. Res. 2016, 6, 1–7. [Google Scholar]
  127. Kim, Y.H.; Park, Y.; Choi, J. The Adoption of Mobile Payment Services for “Fintech”. Int. J. Appl. Eng. Res. 2016, 11, 1058–1061. [Google Scholar] [CrossRef]
  128. Ometov, A.; Bezzateev, S.; Mäkitalo, N.; Andreev, S.; Mikkonen, T.; Koucheryavy, Y. Multi-Factor Authentication: A Survey. Cryptography 2018, 2, 1. [Google Scholar] [CrossRef] [Green Version]
  129. Yusoff, H.; Alomari, M.A.; Latiff, N.A.A.; Alomari, M.S. Effect of e-commerce platforms towards increasing merchant’s income in Malaysia. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 466–470. [Google Scholar] [CrossRef]
  130. Harish, M.; Karthick, R.; Rajan, R.M.; Vetriselvi, V. A New Approach to Securing Online Transactions—The Smart Wallet; Springer: Singapore, 2019; Volume 500, ISBN 978-981-13-0211-4. [Google Scholar]
  131. Karsen, M.; Chandra, Y.U.; Juwitasary, H. Technological factors of mobile payment: A systematic literature review. Procedia Comput. Sci. 2019, 157, 489–498. [Google Scholar] [CrossRef]
Figure 1. Search process.
Figure 1. Search process.
Symmetry 12 01344 g001
Figure 2. Number of research papers used in this review based on country.
Figure 2. Number of research papers used in this review based on country.
Symmetry 12 01344 g002
Figure 3. Frequency of the study materials.
Figure 3. Frequency of the study materials.
Symmetry 12 01344 g003
Figure 4. The security properties of electronic payments adapted from Reference.
Figure 4. The security properties of electronic payments adapted from Reference.
Symmetry 12 01344 g004
Table 1. Papers extracted for the selected primary study.
Table 1. Papers extracted for the selected primary study.
SourcesFoundCandidateElected
IEEE Xplore603520
ACM Digital Library20142
Springer Link191210
Taylor & Francis982
Academia1493
Google schoolar967055
Research Gate472422
Science Direct976
Atlantis Press531
MDPI19158
GrowingScience841
Internet Sources1071
Total316208131
Table 2. Researched industries and countries.
Table 2. Researched industries and countries.
IndustryCountryNumber of Articles
E-wallet Design and requirementIndia, Malaysia, Nigeria, South Korea, China, India, and Indonesia19
Study/adoption/impactIndia, Malaysia, United States Nigeria, Bangladesh, China, India, Indonesia, and Korea23
E-wallet securityIndia, Malaysia, Iran, Nigeria, Bangladesh, China, India, Indonesia, and Israel25
Online banking securityIndia, Malaysia, Denmark, Nigeria, Bangladesh, China, India, Indonesia, Saudi Arabia, Jordan, Kenya, Romania, Saudi Arabia, Sudan, Canada, Thailand, Turkey, and Oman64
Table 3. Classification of included studies.
Table 3. Classification of included studies.
FactorsFrequencyPercent (%)Valid Percent (%)Cumulative Percent (%)
Security7355.03855.03855.038
Study/adoption/impact2317.82917.82972.868
Authentication1612.4012.4085.271
Design requirement1914.72814.728100.0
Total131100.0100.0
Table 4. Security properties of electronic payments.
Table 4. Security properties of electronic payments.
Security TechniquesReferencesTotal Studies
Confidentiality[15,21,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45].18 papers
Integrity[17,24,30,31,33,36,40,42,43,44,46,47,48,49,50,51,52,53,54,55,56].22 papers
Non-repudiation[14,24,33,42,55,56,57,58,59,60,61,62]. 14 papers
Authorization[34,42,58,63,64,65,66,67,68,69,70].12 papers
Authentication [14,21,24,26,33,35,40,42,44,56,68,70,71,72,73,74,75,76,77].19 papers
Availability[14,17,21,37,53,61,78,79].8 papers
Robustness and Efficiency[7,20,22,31,45,65,80,81,82,83,84,85,86].13 papers
Supporting transaction[9,13,14,17,20,25,26,31,38,52,65,87,88].13 papers

Share and Cite

MDPI and ACS Style

Hassan, M.A.; Shukur, Z.; Hasan, M.K.; Al-Khaleefa, A.S. A Review on Electronic Payments Security. Symmetry 2020, 12, 1344. https://doi.org/10.3390/sym12081344

AMA Style

Hassan MA, Shukur Z, Hasan MK, Al-Khaleefa AS. A Review on Electronic Payments Security. Symmetry. 2020; 12(8):1344. https://doi.org/10.3390/sym12081344

Chicago/Turabian Style

Hassan, Md Arif, Zarina Shukur, Mohammad Kamrul Hasan, and Ahmed Salih Al-Khaleefa. 2020. "A Review on Electronic Payments Security" Symmetry 12, no. 8: 1344. https://doi.org/10.3390/sym12081344

APA Style

Hassan, M. A., Shukur, Z., Hasan, M. K., & Al-Khaleefa, A. S. (2020). A Review on Electronic Payments Security. Symmetry, 12(8), 1344. https://doi.org/10.3390/sym12081344

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop