A Review on Electronic Payments Security
<p>Search process.</p> "> Figure 2
<p>Number of research papers used in this review based on country.</p> "> Figure 3
<p>Frequency of the study materials.</p> "> Figure 4
<p>The security properties of electronic payments adapted from Reference.</p> ">
Abstract
:1. Introduction
2. Materials and Methods
2.1. Review Protocol
2.1.1. Data Sources
- Science Direct (www.sciencedirect.com)
- Institute of Electrical and Electronics Engineers (IEEE) Xplore Digital Library (ieeexplore.ieee.org)
- Association for Computing Machinery (ACM) Digital Library (dl.acm.org)
- Springer Link (link.springer.com)
- Taylor and Francis (www.taylorandfrancisgroup.com)
- MDPI (www.mdpi.com)
- GrowingScience (www.GrowingScience.com/msl)
- Academia (https://www.academia.edu)
- Google schoolar (www.scholar.google.com)
- Atlantis Press (www. https://www.atlantis-press.com)
2.1.2. Search Process
- (electronic payment OR (E-payment) OR (electronic AND transaction) OR (digital AND wallet)) AND (study OR Adoption) AND ((framework AND payment) OR (digital AND payment))
- ((online AND payments) OR (internet AND payment)) AND (security OR issue) AND (e-banking OR online banking) AND ((mobile payments AND transaction) OR (internet AND payment))
- ((e-commerce AND payments) OR (mobile-transaction AND m-banking)) AND (security OR concern)
2.2. Data Selection
- Was the research article published between the years 2010 and 2020?
- Is the research article reported in any of the referred data sources?
- Is the research article mentioning or discussing e-wallet or online payment systems?
- Is the research article discussing any security, study or adoption regarding e-wallet, mobile payment, and online payment system?
2.3. Data Extraction
3. Result and Discussion
3.1. List of Paper Publications
3.2. Number of Papers Based on Country
3.3. Number of Standard Institutions
3.4. The Top Research Publication Sources
3.5. Year of Publication
3.6. Discipline of Journals
3.7. Industrial Research
3.8. Answering the Research Questions
3.8.1. Major Issues Regarding Electronic Payments
3.8.2. Security Properties of Electronic Payments
Authorization
Confidentiality
Integrity
Authentication and Non-Repudiation
Robustness and Efficiency
Supporting Transaction
Availability
- Confidentiality
- Integrity
- Authentication
- non repudation
- Robustness
- efficiency
- Availability
4. Conclusions
Author Contributions
Funding
Conflicts of Interest
Appendix A
Sources | Paper Title | Year | Type | Country | Reference | J/C Name |
---|---|---|---|---|---|---|
MDPI | The Impact of … | 2020 | J | South Africa | [2] | Sustainability |
Research gate | The impact… | 2020 | J | Malaysia | [3] | Journal of Advanced Research in Dynamical and Control Systems |
Google scholar | Factors Influencing … | 2020 | J | Malaysia | [4] | Journal of International Business and Management |
Research gate | E-Wallet Transactional… | 2020 | J | Malaysia | [5] | International Journal of Management Science and Business Administration |
MDPI | Sustainable online… | 2019 | J | China | [6] | Sustainability |
MDPI | E-commerce liability… | 2019 | J | Korea | [7] | Sustainability |
MDPI | The role of … | 2019 | J | China | [8] | Sustainability |
Growing Science | The effect of… | 2020 | J | Indonesia | [9] | Management Science Letters |
ACM library | The Impact of… | 2020 | C | Dubai, | [10] | IC4E 2020 |
MDPI | Purchase intention … | 2020 | J | Korea | [11] | Sustainability |
MDPI | Mobile personalized… | 2020 | J | China | [12] | Sustainability |
Google Scholar | The Study of … | 2016 | J | India | [13] | International Journal of Advanced Research in Computer Science and Software Engineering |
Google Scholar | The Future of … | 2016 | J | Macedonia | [14] | European Journal of Business and Management |
Google Scholar | Electronic Cash … | 2017 | J | India | [15] | International Journal of Advanced Research in Computer Science |
IEEE | Secure mobile … | 2014 | J | Venezuela | [16] | Journal of Enterprise Information Management |
Springer | Mobile payment … | 2018 | J | South Korea | [17] | Human-centric Computing and Information Sciences |
Google Scholar | Review of … | 2015 | J | Malaysia | [18] | Asian Journal of Information Technology |
Google Scholar | Computer Security… | 2016 | C | Malaysia | [19] | IOP Conference Series: Materials Science and Engineering |
Research gate | Electronic banking … | 2016 | J | Czech Republic | [20] | Journal of Security and Sustainability Issues |
Research gate | Security And Privacy… | 2014 | J | Kenya | [21] | International Journal of Computer Science Issues. All |
Google Scholar | Impact of Online… | 2019 | J | Bangladesh | [22] | European Journal of Business and Management Research |
Google scholar | E-wallet… | 2020 | J | Malaysia | [23] | International Journal of Research in Commerce, It & Management |
Springer | A secure … | 2015 | J | United states | [24] | Electronic Commerce Research |
Google Scholar | PCI Mobile … | 2013 | J | United States | [25] | PCI Security Standards Council |
MDPI | Identity authentication… | 2020 | J | China | [26] | Journal of Global Information Management |
Google Scholar | Multi-faceted… | 2017 | J | USA | [27] | MPIW |
IEEE | A research… | 2019 | J | Turkey | [28] | International Symposium on Digital Forensics and Security |
Google Scholar | Online Banking … | 2013 | J | India | [29] | International Journal of Advanced Research in Computer Science and Software Engineering |
Google Scholar | A comparative … | 2011 | C | Australia | [30] | International Cyber Resilience Conference |
Research gate | Considerations Regarding…. | 2010 | J | Romania | [31] | Amfiteatru Economic |
Academia | Security and Fraud … | 2015 | J | Jordan | [32] | International Journal of Computer Networks and Applications |
Google Scholar | The Impact… | 2019 | J | Malaysia | [33] | Global Business and Management Research: An International Journal |
Research gate | A Review … | 2018 | C | Sudan, Canada | [34] | |
Research gate | Highlighting the… | 2015 | J | Poland | [35] | The Journal of Internet Banking and Commerce |
IEEE | Acceptance of Website… | 2019 | C | Malaysia | [36] | IEEE 10th Control and System Graduate Research Colloquium, |
Research gate | Security Risk… | 2019 | J | Nigeria | [37] | International Journal of Education and Management Engineering |
IEEE | Secure mobile … | 2014 | j | Venezuela | [38] | IT Professional |
Google Scholar | Transaction Security … | 2012 | J | India | [39] | International Journal of Electronics and Computer Science Engineering |
Research gate | Enhancing user … | 2018 | J | India | [40] | Journal of Advanced Research in Dynamical and Control Systems |
IEEE | Bank vs telecommunication… | 2018 | C | Indonesia | [41] | International Conference on Information Management and Technology |
Research gate | A New … | 2017 | J | Bangladesh | [42] | International Journal of Computer Applications |
Google Scholar | Design and Implementation... | 2019 | J | Myanmar | [43] | International Journal of Trend in Scientific Research and Development |
IEEE | BISC authentication … | 2017 | C | India | [44] | International Conference on Green Engineering and Technologies |
IEEE | Review of … | 2019 | C | Malaysia | [45] | 2019 International Conference on Cybersecurity, ICoCSec 2019, |
Springer | A Cryptographic… | 2013 | J | Germany | [46] | Advances in Computing & Inf. Technology |
Science Direct | A Comparative … | 2012 | J | Thailand | [47] | Procedia Engineering |
Google scholar | Customer value … | 2019 | J | Malaysia | [48] | International Journal of Advanced Computer Science and Applications |
Springer | Security Assessment… | 2014 | J | Turkey | [49] | A MasterCard Company |
Google Scholar | The Effects of … | 2017 | J | Bahrain | [50] | International Journal of e-Education, e-Business, e-Management and e-Learning |
Taylor & Francis | The issues… | 2018 | J | South Africa | [51] | Association for Computing Machinery |
Google Scholar | Security Aspects … | 2017 | J | India | [52] | International Journal on Recent and Innovation Trends in Computing and Communication |
Google Scholar | A Compendious … | 2017 | J | Malaysia | [53] | International Journal of Advanced Computer Science and Applications |
Research gate | E-Wallet System … | 2018 | J | Nigeria | [54] | International Journal of Advanced Research in Computer Science and Software Engineering |
Google Scholar | Security in Electronic… | 2015 | J | Bangladesh | [55] | International Journal of Scientific & Engineering Research |
IEEE | Enhancing Online … | 2017 | C | India | [56] | IEEE International Conference on Computational Intelligence and Communication Technology |
Springer | Embedding a Digital … | 2019 | J | UAE | [57] | Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Google Scholar | Design and Security … | 2016 | J | Malaysia | [58] | Interdisciplinary Information Sciences |
Science Direct | Towards a web … | 2015 | J | Spain | [59] | Electronic Commerce Research and Applications |
Research gate | Security of E-Banking … | 2016 | J | Bangladesh | [60] | Journal of Finance and Accounting |
Research gate | A Survey on … | 2017 | J | Malaysia | [61] | Indian Journal of Science and Technology |
Research gate | Development of … | 2018 | J | India | [62] | International Journal for Scientific Research & Development |
IEEE | SBLWT: A secure … | 2018 | J | China | [63] | IEEE Access |
IEEE | An efficient of … | 2016 | C | Thailand | [64] | International Conference on Advanced Information Networking and Applications |
Google Scholar | Internet Banking, … | 2015 | J | India | [65] | International Journal of Research in Management & Business Studies |
Google Scholar | Security Issues … | 2015 | J | Nigeria | [66] | International Journal of Computer Science and Telecommunications |
Google Scholar | E-Banking Security: … | 2017 | J | Saudi Arabia | [67] | International Journal of Emerging Technology and Advanced Engineering |
IEEE | Survey on… | 2019 | C | India | [68] | Amity International Conference on Artificial Intelligence, AICAI 2019 |
Research gate | A robust … | 2018 | J | South Africa | [69] | International Journal of Scientific and Technology Research |
Google Scholar | Biometric Authentication … | 2018 | J | Iran | [70] | Journal of Advances in Computer Research |
IEEE | A robust … | 2016 | C | India | [71] | International Conference on Green Engineering and Technologies |
MDPI | Knowledge preserving… | 2019 | J | Malaysia | [72] | Sensors |
Atlantis Press | Research on Internet … | 2017 | C | China | [73] | International Conference on Education, Management, Computer and Medicine |
IEEE | Cam-Wallet: Fingerprint… | 2017 | C | Mauritius | [74] | IEEE International Conference on Environment and Electrical Engineering |
Google Scholar | Authentication for … | 2017 | J | India | [75] | Imperial Journal of Interdisciplinary Research |
Google Scholar | Enhancing Security… | 2018 | J | India | [76] | Journal of Computer Engineering |
Google Scholar | A Case Study… | 2015 | J | India | [77] | International Journal of Computer Applications Technology and Research |
Science Direct | Enhancement of … | 2020 | J | India | [78] | Computer Communications |
Research gate | Adoption of e-payment… | 2015 | C | Malaysia | [79] | International Conference on E-Commerce |
IEEE | Analyzing the security… | 2017 | C | Indonesia | [80] | International Conference on Informatics and Computing. |
Springer | A peer… | 2018 | J | Taiwan | [81] | Electronic Commerce Research |
IEEE | E-wallet Properties…. | 2011 | C | Denmark | [82] | International Conference on Mobile Business e-wallet |
Springer | Experimental Case … | 2010 | J | England | [83] | Cognitive Computation |
Science Direct | Security analysis… | 2019 | J | China | [84] | Journal of Information Security and Applications |
Google Scholar | Mobile based …. | 2010 | J | Iran | [85] | International Journal of UbiComp |
Google Scholar | Analysis of Security… | 2014 | J | Nigeria | [86] | International Journal of Computer Applications |
Google Scholar | QR-Code … | 2014 | J | India | [87] | International Journal of Advanced Research in Computer Science |
Google Scholar | Mobile Commerce… | 2010 | J | France | [88] | The European Telecommunications Standards Institute |
Research gate | Towards a cashless … | 2011 | J | Denmark | [89] | Research gate |
Research gate | A formal … | 2011 | J | Brazil | [90] | International Journal of Computer Science and Information Technology |
Academia | Electronic banking fraud… | 2011 | J | Malaysia | [91] | International Journal in Advances in Information Sciences and Service Sciences |
Google Scholar | Analysis Tracking… | 2012 | J | Indonesia | [92] | International Journal of Scientific & Technology Research |
Research gate | Internet Banking… | 2012 | J | Ghana | [93] | Journal of Management and Strategy |
Science Direct | Locking down… | 2012 | J | England | [94] | Computer Fraud and Security |
ACM library | Designing Digital… | 2012 | C | Denmark | [95] | International Conference on Electronic Commerce |
Google Scholar | Issues and Challenges… | 2013 | J | India | [96] | International Journal for Research in Management and Pharmacy(IJRMP) |
Academia | Internet banking-benefits… | 2013 | J | India | [97] | International journal of research in business management |
Springer | Analysis of Internet… | 2013 | J | South Korea | [98] | Future Information Communication Technology and Applications |
Google Scholar | Study of Online… | 2013 | J | India | [99] | IOSR Journal of Computer Engineering |
Google Scholar | E-Wallet … | 2014 | J | Bangladesh | [100] | International Journal of Modeling and Optimization |
Google Scholar | Online Banking Security… | 2014 | J | China | [101] | International Journal of Security and its Applications |
IEEE | Online Payment … | 2014 | C | India | [102] | Conference on Electrical, Electronics and Computer Science |
Research gate | Security in Online… | 2014 | J | India | [103] | International Journal of Innovative Research in Science, Engineering and Technology |
Google Scholar | A Review on … | 2015 | C | Oman | [104] | International Conference on Information Technology |
Google Scholar | An Evaluative … | 2016 | J | India | [105] | Amity Journal of Management Research |
Taylor & Francis | Impact of Perceived … | 2016 | J | Iran | [106] | Journal of Internet Commerce |
Google Scholar | Acceptance of e-wallet … | 2016 | J | India | [107] | International Journal of Innovative Research in Management Studies (IJIRMS) |
Google Scholar | Security of Mobile … | 2016 | J | Greece | [108] | European Union Agency For Network and Information Security |
Google Scholar | Development of e-wallet… | 2016 | J | Nigeria | [109] | Computer Sciences and Telecommunications |
Google Scholar | A Study on… | 2016 | J | India | [110] | International Journal of Advanced Research in Management and Social Sciences |
Google Scholar | Are digital … | 2016 | J | India | [111] | Apeejay Journal of Management and Technology |
Research gate | Educating Consumers… | 2016 | J | India | [112] | International Journal of Research Available |
Google Scholar | Perceived Security … | 2017 | J | Malaysia | [113] | Journal of the Asian Academy of Applied Business |
Springer | A model for … | 2017 | J | Saudi Arabia | [114] | Computing |
Google Scholar | E-Banking Adoption… | 2017 | J | India | [115] | International journal of technology and computing |
Google Scholar | Fintech, the … | 2017 | J | Hungary | [116] | Budapest management review |
Google Scholar | Future of e-Wallets… | 2017 | J | India | [117] | International Journals of Advanced Research in Computer Science and Software Engineering |
IEEE | Security Requirement … | 2017 | C | Japan | [118] | International Conference on Software Quality, Reliability and Security |
Google Scholar | Offline Transactions … | 2017 | J | India | [119] | Indian Journal of Science and Technology |
Research gate | Bio Wallet: … | 2017 | C | Turkey | [120] | International Conference on Systems |
Google Scholar | E-Banking … | 2018 | J | India | [121] | Commerce Spectrum |
Google Scholar | Issues and challenges… | 2018 | J | Nigeria | [122] | International Journal of Information Research and Review |
Google Scholar | The impact… | 2018 | J | Malaysia | [123] | International Journal of Industrial Management |
IEEE | Secure and … | 2018 | C | India | [124] | IEEE Smart World Ubiquitous Intelligence and Computing, |
IEEE | Security testing… | 2018 | C | Portugal | [125] | International Conference on Computational Intelligence and Communication Networks |
Google scholar | Factors affecting… | 2018 | J | Malaysia | [126] | International Journal of Engineering and Technology(UAE) |
Google Scholar | The Adoption of… | 2018 | J | South Korea | [127] | International Journal of Applied Engineering Research |
IEEE | A systematic… | 2018 | C | Pakistan | [128] | International Conference on Frontiers of Information Technology, FIT 2018 |
Google scholar | Effect of e … | 2019 | J | Malaysia | [129] | International Journal of Advanced Computer Science and Applications |
Springer | A New … | 2019 | C | India | [130] | International Conference on Communications and Cyber Physical Engineering |
Science Direct | Technological factors… | 2019 | C | Indonesia | [131] | Procedia Computer Science |
References
- Handelsblatt Statista FinTech Report 2019—Digital Payments. 2019. Available online: https://work.euroforum.de/data/pdf/P1200762pc.pdf (accessed on 2 June 2020).
- Talom, F.S.G.; Tengeh, R.K. The Impact of Mobile Money on the Financial Performance of the SMEs in Douala, Cameroon. Sustainability 2020, 12, 183. [Google Scholar] [CrossRef] [Green Version]
- Subaramaniam, K.; Garding, J.M.; Kolandaisamy, R.; Jalil, A.B. The impact of E-Wallets for current generation. J. Adv. Res. Dyn. Control Syst. 2020, 12, 751–759. [Google Scholar] [CrossRef]
- Karim, M.W.; Haque, A.; Ulfy, M.A.; Hossain, M.A.; Anis, M.Z. Factors Influencing the Use of E-wallet as a Payment Method among Malaysian Young Adults. J. Int. Bus. Manag. 2020, 3, 1–11. [Google Scholar] [CrossRef]
- Abu Bakar, N.; Rosbi, S.; Uzaki, K. E-Wallet Transactional Framework for Digital Economy: A Perspective from Islamic Financial Engineering. Int. J. Manag. Sci. Bus. Adm. 2020, 6, 50–57. [Google Scholar] [CrossRef]
- Choi, D.; Chung, C.Y.; Young, J. Sustainable online shopping logistics for customer satisfaction and repeat purchasing behavior: Evidence from China. Sustainability 2019, 11. [Google Scholar] [CrossRef] [Green Version]
- Chun, S.H. E-commerce liability and security breaches in mobile payment for e-business sustainability. Sustainability 2019, 11. [Google Scholar] [CrossRef] [Green Version]
- Zhang, J.; Luximon, Y.; Song, Y. The role of consumers’ perceived security, perceived control, interface design features, and conscientiousness in continuous use of mobile payment services. Sustainability 2019, 11. [Google Scholar] [CrossRef] [Green Version]
- Noor Ardiansah, M.; Chariri, A.; Rahardja, S. Udin The effect of electronic payments security on e-commerce consumer perception: An extended model of technology acceptance. Manag. Sci. Lett. 2020, 10, 1473–1480. [Google Scholar] [CrossRef]
- Argimbayeva, G.; Menasria, I.; Elshareif, E.; Lewis, A. The Impact of E- Wallet on ADNOC’s Customer Satisfaction. In Proceedings of the 2020 the 11th International Conference on E-Education, E-Business, E-Management and E-Learning (IC4E 2020)—EI & Scopus, Osaka, Japan, 10–12 January 2020; pp. 364–368. [Google Scholar]
- Kim, S.S. Purchase intention in the online open market: Do concerns for E-commerce really matter? Sustainability 2020, 12. [Google Scholar] [CrossRef] [Green Version]
- Xiao, L.; Lu, Q.; Guo, F. Mobile personalized recommendation model based on privacy concerns and context analysis for the sustainable development of M-commerce. Sustainability 2020, 12. [Google Scholar] [CrossRef] [Green Version]
- Mamta, H.; Tyagi, A.S. The Study of Electronic Payment Systems. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2016, 6, 2277. [Google Scholar]
- Bezhovski, Z. The Future of the Mobile Payment as Electronic Payment System. Eur. J. Bus. Manag. 2016, 8, 2222–2839. [Google Scholar]
- Sharma, M.K. Electronic Cash over the Internet and Security Solutions. Int. J. Adv. Res. Comput. Sci. 2017, 8, 229. [Google Scholar]
- Jesús Téllez Isaac, S.Z. Secure Mobile Payment Systems. J. Enterp. Inf. Manag. 2014, 22, 317–345. [Google Scholar] [CrossRef]
- Kang, J. Mobile payment in Fintech environment: Trends, security challenges, and services. Human-Centric Comput. Inf. Sci. 2018, 8, 32. [Google Scholar] [CrossRef] [Green Version]
- Karim, N.A.; Shukur, Z. Review of user authentication methods in online examination. Asian J. Inf. Technol. 2015, 14, 166–175. [Google Scholar] [CrossRef]
- Mahmadi, F.N.; Zaaba, Z.F.; Osman, A. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security. IOP Conf. Ser. Mater. Sci. Eng. 2016, 160. [Google Scholar] [CrossRef] [Green Version]
- Belás, J.; Korauš, M.; Kombo, F.; Korauš, A. Electronic banking security and customer satisfaction in commercial banks. J. Secur. Sustain. Issues 2016, 5, 411–422. [Google Scholar] [CrossRef] [Green Version]
- Omariba, Z.B.; Masese, N.B. Security and Privacy of Electronic Banking. Kidney Int. Suppl. 2013, 3, 262. [Google Scholar] [CrossRef]
- Alam, S.S.; Ali, M.H.; Omar, N.A.; Hussain, W.M.H.W. Customer satisfaction in online shopping in growing markets: An empirical study. Int. J. Asian Bus. Inf. Manag. 2020, 11, 78–91. [Google Scholar] [CrossRef]
- Teoh Teng Tenk, M.; Yew, H.C.; Heang, L.T. E-Wallet Adoption: A Case in Malaysia. Int. J. Res. Commer. Manag. 2020, 2, 135–138. [Google Scholar]
- Chaudhry, S.A.; Farash, M.S.; Naqvi, H.; Sher, M. A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 2016, 16, 113–139. [Google Scholar] [CrossRef]
- PCI Security Standards Council LLC. PCI Mobile Payment Acceptance Security Guidelines for developers. PCI DSS Inf. Suppl. 2013, 1–27. Available online: https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Merchants_v1.pdf (accessed on 2 June 2020).
- Wang, F.; Shan, G.B.; Chen, Y.; Zheng, X.; Wang, H.; Mingwei, S.; Haihua, L. Identity authentication security management in mobile payment systems. J. Glob. Inf. Manag. 2020, 28, 189–203. [Google Scholar] [CrossRef]
- August, M.; Summary, M. Multi-Faceted Evolution of Mobile Payment Strategy, Authentication, and Technology. 2017. Available online: https://www.bostonfed.org/publications/mobile-payments-industry-workgroup/multi-faceted-evolution-of-mobile-payment-strategy-authentication-and-technology.aspx (accessed on 18 June 2020).
- Yildirim, N.; Varol, A. A Research on Security Vulnerabilities in Online and Mobile Banking Systems. In Proceedings of the 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Barcelos, Portugal, 10–12 June 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Jassal, K.R.; Sehgal, R.K. Online Banking Security Flaws: A Study. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2013, 3, 1016–1021. [Google Scholar]
- Subsorn, P.; Limwiriyakul, S. A Comparative analysis of internet banking security in Australia: A customer perspective. Proc. Eng. 2012, 32, 260–272. [Google Scholar] [CrossRef] [Green Version]
- Vrancianu, M.; Popa, L. Considerations Regarding the Security and Protection of E-Banking Services. Amfiteatru Econ. J. 2010, 12, 388–403. [Google Scholar]
- Webb, H.; Liu, S.; Yan, M.R. Evaluation of M-payment technology and sectoral system innovation—A comparative study of UK and indian models. Electron 2019, 8. [Google Scholar] [CrossRef] [Green Version]
- Normalini, M.K. The Impact of Security Factors towards Internet Banking Usage Intention among Malaysians. Glob. Bus. Manag. Res. An Int. J. 2019, 11, 241–252. [Google Scholar]
- Ibrahim, R.M. A Review on Online-Banking Security Models, Successes, and Failures. In Proceedings of the 2nd Interantional Conference on Inventive Systems and Control (ICISC—2018), At Coimbatore, India, 19–20 January 2018. [Google Scholar]
- Khrais, L.T. Highlighting the Vulnerabilities of Online Banking System. J. Internet Bank. Commer. 2015, 20. [Google Scholar] [CrossRef] [Green Version]
- Ataya, M.A.M.; Ali, M.A.M. Acceptance of Website Security on E-banking. A-Review. In Proceedings of the 2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia, 2–3 August 2019; pp. 201–206. [Google Scholar] [CrossRef]
- Ojeniyi, J.A.; Edward, E.; Abdulhamid, S.M. Security Risk Analysis in Online Banking Transactions: Using Diamond Bank as a Case Study. Int. J. Educ. Manag. Eng. 2019, 9, 1–14. [Google Scholar] [CrossRef]
- Isaac, J.T.; Zeadally, S. Secure mobile payment systems. IT Prof. 2014, 16, 36–43. [Google Scholar] [CrossRef]
- Rane, P.B.; Meshram, B.B. Transaction Security for E-commerce Application. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2012, 5, 1720–1726. [Google Scholar]
- Susanna, A.; David, S.; Kathrine, J.W.; Esther, A.G. Enhancing user authentication for mobile wallet using cryptographic algorithm. J. Adv. Res. Dyn. Control Syst. 2018, 10, 891–897. [Google Scholar]
- Chandra, Y.U. Bank vs telecommunication E-Wallet: System analysis, purchase, and payment method of GO-mobile CIMB Niaga and T-Cash Telkomsel. In Proceedings of the 2017 International Conference on Information Management and Technology (ICIMTech), Yogyakarta, Indonesia, 15–17 November 2017; pp. 165–170. [Google Scholar] [CrossRef]
- Mridha, M.F.; Nur, K.; Kumar, A.; Akhtaruzzaman, M. A New Approach to Enhance Internet Banking Security. Int. J. Comput. Appl. 2017, 160, 35–39. [Google Scholar] [CrossRef]
- Oo, K.Z. Design and Implementation of Electronic Payment Gateway for Secure Online Payment System. Int. J. Trend Sci. Res. Dev. 2019, 3, 1329–1334. [Google Scholar] [CrossRef]
- Shaju, S.; Panchami, V. BISC Authentication Algorithm: An Efficient New Authentication Algorithm Using Three Factor Authentication for Mobile Banking. In Proceedings of the 2016 Online International Conference on Green Engineering and Technologies (IC-GET), Coimbatore, India, 19 November 2016; pp. 1–5. [Google Scholar] [CrossRef]
- Hassan, M.A.; Shukur, Z. Review of Digital Wallet Requirements. In Proceedings of the 2019 International Conference on Cybersecurity (ICoCSec), Negeri Sembilan, Malaysia, 25–26 September 2019; pp. 43–48. [Google Scholar] [CrossRef]
- Dwivedi, A.; Dwivedi, A.; Kumar, S.; Pandey, S.K.; Dabra, P. A Cryptographic Algorithm Analysis for Security Threats of Semantic E-Commerce Web (SECW) for Electronic Payment Transaction System. In Proceedings of the Second International Conference on Advances in computing and information Technology, Chennai, India, 13–15 July 2012; Volume 3, pp. 367–379. [Google Scholar]
- Loke, S.P.; Noor, N.M.; Khalid, K. Customer satisfaction towards internet banking services: Case analysis on a Malaysian bank. In Proceedings of the 2012 IEEE Colloquium on Humanities, Science and Engineering (CHUSER), Kota Kinabalu, Malaysia, 3–4 December 2012; pp. 159–163. [Google Scholar]
- Satar, N.S.M.; Dastane, O.; Ma’arif, M.Y. Customer value proposition for E-Commerce: A case study approach. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 454–458. [Google Scholar] [CrossRef] [Green Version]
- Bahtiyar, Ş.; Gür, G.; Altay, L. Security Assessment of Payment Systems under PCI DSS Incompatibilities. In ICT Systems Security and Privacy Protection; Springer International Publishing: New York, NY, USA, 2014; pp. 395–402. [Google Scholar] [CrossRef] [Green Version]
- Hasan, M.K.; Ismail, A.F.; Islam, S.; Hashim, W.; Pandey, B. Dynamic spectrum allocation scheme for heterogeneous network. Wirel. Pers. Commun. 2017, 95, 299–315. [Google Scholar] [CrossRef]
- Poeng, K.P.; Chukwuere, J.E.; Agu, N.T. The issues affecting employees’ adoption of online banking in mahikeng. In Proceedings of the 2nd International Conference on Information System and Data Mining, Lakeland, FL, USA, 9–11 April 2018; pp. 70–75. [Google Scholar] [CrossRef]
- Kanimozhi, G. Security Aspects of Mobile Based E Wallet. Int. J. Recent Innov. Trends Comput. Commun. 2017, 5, 1223–1228. [Google Scholar]
- Khan, B.U.I.; Olanrewaju, R.F.; Baba, A.M.; Langoo, A.A.; Assad, S. A Compendious Study of Online Payment Systems: Past Developments, Present Impact, and Future Considerations. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 256–271. [Google Scholar] [CrossRef] [Green Version]
- Akpan, A.G.; Mmeah, S.; Polytechnic, K.S.; Baah, B. E-Wallet System Implementation: Impact on Small Scale Business in Nigeria. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2018, 8, 35–43. [Google Scholar]
- Mazumder, F.K.; Jahan, I.; Das, U.K. Security in Electronic Payment Transaction. Int. J. Sci. Eng. Res. 2015, 6, 955–960. [Google Scholar]
- Sharma, N.; Bohra, B. Enhancing Online Banking Authentication using Hybrid Cryptographic method Security Issues in Online Banking Application. In Proceedings of the 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 9–10 February 2017; pp. 1–8. [Google Scholar] [CrossRef]
- Houngbo, P.J.; Hounsou, J.T.; Damiani, E.; Asal, R.; Cimato, S.; Frati, F.; Yeun, C.Y. Embedding a Digital Wallet to Pay-with-aSelfie, from Functional Requirements to Prototype; Springer International Publishing: New York, NY, USA, 2019; Volume 206, ISBN 978-3-319-67836-8. [Google Scholar]
- LAI, P.C. Design and Security impact on consumers’ intention to use single platform E-payment. Interdiscip. Inf. Sci. 2016, 22, 111–122. [Google Scholar] [CrossRef] [Green Version]
- Ruiz-Martínez, A. Towards a web payment framework: State-of-the-art and challenges. Electron. Commer. Res. Appl. 2015, 14, 345–350. [Google Scholar] [CrossRef]
- Shamsus Sadekin, M. Security of E-Banking in Bangladesh. J. Financ. Account. 2016, 4, 1. [Google Scholar] [CrossRef] [Green Version]
- Masihuddin, M.; Islam Khan, B.U.; Islam Mattoo, M.M.U.; Olanrewaju, R.F. A Survey on E-Payment Systems: Elements, Adoption, Architecture, Challenges and Security Concepts. Indian J. Sci. Technol. 2017, 10, 1–19. [Google Scholar] [CrossRef]
- Sohail, A.; Shobhit, A.; Saurabh, S.; Akhilesh, V.; Varma, C.P. Development of Advance Digital Mobile Wallet. Int. J. Sci. Res. Dev. 2018, 3, 13. [Google Scholar]
- Dai, W.; Deng, J.; Wang, Q.; Cui, C.; Zou, D.; Jin, H. SBLWT: A secure blockchain lightweight wallet based on trustzone. IEEE Access 2018, 6, 40638–40648. [Google Scholar] [CrossRef]
- Pukkasenunk, P.; Sukkasem, S. An Efficient of Secure Mobile Phone Application for Multiple Bill Payments. In Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Crans-Montana, Switzerland, 23–25 March 2016; pp. 487–492. [Google Scholar] [CrossRef]
- Sheikh, B.A.; Rajmohan, P. Internet Banking, Security Models and Weakness. Int. J. Res. Manag. Bus. Stud. 2015, 2, 17–22. [Google Scholar]
- Nwogu, E.; Odoh, M. Security Issues Analysis on Online Banking Implementations in Nigeria. Int. J. Comput. Sci. Telecommun. 2015, 6, 20–28. [Google Scholar]
- Alsayed, A.O.; Bilgrami, A.L. E-Banking Security: Internet Hacking, Phishing Attacks, Analysis and Prevention of Fraudulent Activities. Int. J. Emerg. Technol. Adv. Eng. 2017, 7, 109–115. [Google Scholar]
- Saxena, S.; Vyas, S.; Suresh Kumar, B.; Gupta, S. Survey on Online Electronic Paymentss Security. In Proceedings of the 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 4–6 February 2019; pp. 746–751. [Google Scholar] [CrossRef]
- Elliot, M.; Talent, K. A robust and scalable four factor authentication architecture to enhance security for mobile online transaction. Int. J. Sci. Technol. Res. 2018, 7, 139–143. [Google Scholar]
- Alibabaee, A.; Broumandnia, A. Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm. J. Adv. Comput. Res. 2018, 9, 1–17. [Google Scholar]
- Venugopal, H.; Viswanath, N. A robust and Secure Authentication Mechanism in Online Banking. In Proceedings of the 2016 Online International Conference on Green Engineering and Technologies (IC-GET), Coimbatore, India, 19 November 2016. [Google Scholar] [CrossRef]
- AL-Khaleefa, A.S.; Ahmad, M.R.; Isa, A.A.M.; Esa, M.R.M.; Aljeroudi, Y.; Jubair, M.A.; Malik, R.F. Knowledge Preserving OSELM Model for Wi-Fi-Based Indoor Localization. Sensors 2019, 19, 2397. [Google Scholar] [CrossRef] [Green Version]
- Wang, J.; He, Q.; Han, Q. Research on Internet Payment Security Based on the Strong Authentication of the Timeliness and Multi-factors. In Proceedings of the 2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016), Shenyang, China, 29–31 December 2016; pp. 19–23, 59. [Google Scholar]
- Okpara, O.S.; Bekaroo, G. Cam-Wallet: Fingerprint-based authentication in M-wallets using embedded cameras. IEEE Int. Conf. Environ. Electr. Eng. 2017. [Google Scholar] [CrossRef]
- Gode, P.; Nakhate, S.T.; Mane, S.S. Authentication for Mobile Banking by using Android based Smart Phones. Imp. J. Interdiscip. Res. 2017, 3, 1314–1318. [Google Scholar]
- Khachane, D.; Sant, Y.; Sachan, Y.; Ghodeswar, A. Enhancing Security of Internet Banking Using Biometrics. J. Comput. Eng. 2018, 20, 22–25. [Google Scholar] [CrossRef]
- Kaur, H. A Case Study upon Non-functional Requirements of Online Banking System. Int. J. Comput. Appl. Technol. Res. 2015, 4, 220–225. Available online: https://ijcat.com/archives/volume4/issue4/ijcatr04041002.pdf (accessed on 18 June 2020). [CrossRef]
- Dijesh, P.; Babu, S.S.; Vijayalakshmi, Y. Enhancement of e-commerce security through asymmetric key algorithm. Comput. Commun. 2020, 153, 125–134. [Google Scholar] [CrossRef]
- Kabir, M.A.; Saidin, S.Z.; Ahmi, A. Adoption of e-Payment Systems: A Review of Literature. In Proceedings of the International Conference E-Commerce, Seoul, Korea, August 2015; pp. 112–120. [Google Scholar]
- Tabet, N.E.; Ayu, M.A. Analysing the Security of NFC Based Payment Systems. In Proceedings of the 2016 International Conference on Informatics and Computing (ICIC), Mataram, Indonesia, 28–29 October 2016; pp. 169–174. [Google Scholar] [CrossRef]
- Lee, W.H.; Miou, C.S.; Kuan, Y.F.; Hsieh, T.L.; Chou, C.M. A peer-to-peer transaction authentication platform for mobile commerce with semi-offline architecture. Electron. Commer. Res. 2018, 18, 413–431. [Google Scholar] [CrossRef]
- Olsen, M.; Hedman, J.; Vatrapu, R. E-wallet properties. In Proceedings of the 2011 10th International Conference on Mobile Business, Como, Italy, 20–21 June 2011; pp. 158–165. [Google Scholar] [CrossRef]
- Aburrous, M.; Hossain, M.A.; Dahal, K.; Thabtah, F. Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies. Cognit. Comput. 2010, 2, 242–253. [Google Scholar] [CrossRef] [Green Version]
- Yang, W.; Li, J.; Zhang, Y.; Gu, D. Security analysis of third-party in-app payment in mobile applications. J. Inf. Secur. Appl. 2019, 48, 102358. [Google Scholar] [CrossRef]
- Narwal, B. Security Analysis and Verification of Authenticated Mobile Payment Protocols. In Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 21–22 November 2019; pp. 202–207. [Google Scholar] [CrossRef]
- Aigbe, P.; Akpojaro, J. Analysis of Security Issues in Electronic Payment Systems. Int. J. Comput. Appl. 2014, 108, 10–14. [Google Scholar] [CrossRef]
- Shetty, S.; Shetty, T.; Amale, R. QR-Code based Digital Wallet. Int. J. Adv. Res. Comput. Sci. 2014, 5, 105–110. [Google Scholar] [CrossRef]
- ETSI Mobile Commerce (M-COMM). Requirements for Payment Methods for Mobile Commerce. 2010. Available online: https://www.etsi.org/deliver/etsi_tr/102000_102099/102071/01.02.01_60/tr_102071v010201p.pdf (accessed on 18 June 2020).
- Olsen, M. Towards a Cashless Society: A Design Science Research on Mobile Wallets. 2011. Available online: https://www.researchgate.net/profile/Jonas_Hedman/publication/268380810_Towards_a_cashless_society_A_design_science_research_on_mobile_wallets/links/54b98a590cf2d11571a4b568.pdf (accessed on 18 June 2020).
- Peotta, L.; Holtz, M.D.; David, B.M.; Deus, F.G.; Timoteo de Sousa, R. A Formal Classification of Internet Banking Attacks and Vulnerabilities. Int. J. Comput. Sci. Inf. Technol. 2011, 3, 186–197. [Google Scholar] [CrossRef]
- Yazdanifard, R.; Wanyusoff, W.F.; Behora, A.C. Electronic Banking Fraud; the Need to Enhance Security and Customer Trust in Online Banking. Adv. Inf. Sci. Serv. Sci. 2011, 3, 505–509. [Google Scholar]
- Purnama, B.E. Analysis Tracking Online Payment System. Int. J. Sci. Technol. Res. 2012, 1, 55–60. [Google Scholar]
- Twum, F.; Ahenkora, K. Internet Banking Security Strategy: Securing Customer Trust. J. Manag. Strateg. 2012, 3. [Google Scholar] [CrossRef] [Green Version]
- Caldwell, T. Locking down the e-wallet. Comput. Fraud Secur. 2012, 2012, 5–8. [Google Scholar] [CrossRef]
- Olsen, M.; Hedman, J.; Vatrapu, R. Designing Digital Payment Artifacts. In Proceedings of the 14th Annual International Conference on Electronic Commerce, Singapore, 7 August 2012; pp. 161–168. [Google Scholar] [CrossRef] [Green Version]
- Vasudha Singh, T.; Supriya, N.; Joshna, M.S.P. Issues and Challenges of Electronic Payment Systems. Int. J. Res. Manag. Pharmacy 2013, 2, 25–30. [Google Scholar]
- Chavan, J. Internet Banking-Benefits and Challenges in an Emerging Economy. Int. J. Res. Bus. Manag. 2013, 1, 19–26. [Google Scholar]
- Que, Z.; Lee, J.; Cheng, W.; Han, S.; Jung, H.; Euh, K. Analysis of Internet Banking Security Crack Through Messenger Hacking. Lect. Notes Electr. Eng. 2013, 235, 219–228. [Google Scholar] [CrossRef]
- Jassal, R. Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example. IOSR J. Comput. Eng. 2013, 13, 114–121. [Google Scholar] [CrossRef]
- Salah Uddin, M.; Yesmin Akhi, A. E-Wallet System for Bangladesh an Electronic Payment System. Int. J. Model. Optim. 2014, 4, 216–219. [Google Scholar] [CrossRef]
- Xin, T.; Ban, X. Online banking security analysis based on STRIDE threat model. Int. J. Secur. Appl. 2014, 8, 271–282. [Google Scholar] [CrossRef]
- Roy, S.; Venkateswaran, P. Online Payment System Using Steganography and Visual Cryptography. In Proceedings of the 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science, Bhopal, India, 1–2 March 2014; pp. 1–5. [Google Scholar] [CrossRef]
- Pakojwar, S.; Uke, N.J. Security in Online Banking Services—A Comparative Study. Int. J. Innov. Res. Sci. Eng. Technol. 2014, 3, 16850–16857. [Google Scholar] [CrossRef]
- Musaev, E.; Yousoof, M. A Review on Internet Banking Security and Privacy Issues in Oman. In Proceedings of the 2015 IEEE International Conference on Industrial Technology, Seville, Spain, 17–19 March 2015; pp. 365–369. [Google Scholar] [CrossRef]
- Xiao, L.; Guo, F.; Yu, F.; Liu, S. The effects of online shopping context cues on consumers’ purchase intention for cross-border E-Commerce sustainability. Sustainability 2019, 11, 2777. [Google Scholar] [CrossRef] [Green Version]
- Damghanian, H.; Zarei, A.; Siahsarani Kojuri, M.A. Impact of Perceived Security on Trust, Perceived Risk, and Acceptance of Online Banking in Iran. J. Internet Commer. 2016, 15, 214–238. [Google Scholar] [CrossRef]
- Hope, R.; Ca, B. Acceptance of e-wallet services: A study of consumer behavior. Int. J. Innov. Res. Manag. Stud. 2016, 1, 1–10. [Google Scholar]
- ENISA. Security of Mobile Payments and Digital Wallets. 2016. Available online: https://www.enisa.europa.eu/publications/mobile-payments-security (accessed on 18 June 2020).
- UZOKA, F. Development of E-Wallet System for Tertiary Institution in a Developing Country. Comput. Sci. Telecommun. 2016, 3, 18–29. [Google Scholar]
- Manikandan, M.; Chandramohan, S. A Study on Awareness Level of Mobile Wallets Servives among Management Students. Int. J. Adv. Res. Manag. Soc. Sci. 2016, 5, 10–19. [Google Scholar]
- Batra, R.; Kalra, N. Are Digital Wallets the New Currency? Apeejay J. Manag. Technol. 2016, 11, 1–12. [Google Scholar]
- Nair, A.; Dahiya, M.; Gupta, N. Educating Consumers about Digital Wallets. Int. J. Res. 2016, 03, 743–750. [Google Scholar]
- Alam, S.S.; Islam, M.R.; Mokhbul, Z.K.M.; Makmor, N.B. Factors affecting intention to use online dating sites in Malaysia. Int. J. Eng. Technol. 2018, 7, 192–198. [Google Scholar] [CrossRef]
- Alarifi, A.; Alsaleh, M.; Alomar, N. A model for evaluating the security and usability of e-banking platforms. Computing 2017, 99, 519–535. [Google Scholar] [CrossRef]
- Kaur, J.; Singh, H. E-Banking Adoption: A Study of Privacy and Trust. Int. J. Technol. Comput. 2017, 3, 314–318. [Google Scholar]
- Varga, D. Fintech, the new era of financial services. Budapest Manag. Rev. 2017. [Google Scholar] [CrossRef] [Green Version]
- Madhu Chauhan, I.S. Future of e-Wallets: A Perspective From Under Graduates’. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2017. [Google Scholar] [CrossRef]
- Emeka, B.O.; Liu, S. Security Requirement Engineering Using Structured Object-Oriented Formal Language for m-Banking Applications. In Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Prague, Czech Republic, 25–29 July 2017; pp. 176–183. [Google Scholar] [CrossRef]
- Singh, J. Offline Transactions Functionality in eWallets. Indian J. Sci. Technol. 2017, 10, 1–4. [Google Scholar] [CrossRef]
- Benli, E.; Engin, I.; Giousouf, C.; Ulak, M.A.; Bahtiyar, S. BioWallet: A Biometric Digital Wallet. In Proceedings of the Twelfth International Conference on Systems, At Venice, Italy, 23–27 April 2017; pp. 38–41. [Google Scholar]
- George, D.T.; Joseph, R. E-Banking Usage and E-Banking Security Awareness among Customers of Public and Private Sector Banks. Commer. Spectr. 2018, 6, 13–18. [Google Scholar]
- Ogini, N.O. Issues and challenges of online banking. Int. J. Inf. Res. Rev. 2018, 5, 5430–5435. [Google Scholar]
- Al-sharafi, M.A.; Arshah, R.A.; Herzallah, F.A.T.; Abu-Shanab, E.A. The Impact of Customer Trust and Perception of Security and Privacy on the Acceptance of Online Banking Services: Structural Equation Modeling Approach. Int. J. Ind. Manag. 2018, 4, 1–14. [Google Scholar]
- Rajendran, B.; Pandey, A.K.; Bindhumadhava, B.S. Secure and Privacy Preserving Digital Payment. In Proceedings of the 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), San Francisco, CA, USA, 4–8 August 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Santos, J.; Antunes, M.; Mangana, J.; Monteiro, D.; Santos, P.; Casal, J. Security Testing Framework for a Novel Mobile Wallet ecosystem. In Proceedings of the 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN), Girne, Cyprus, 16–17 September 2017; pp. 153–160. [Google Scholar] [CrossRef]
- Herzallah, A.T.; Mukhtar, M. E-Commerce Adoption Factors among Palestinian SMEs: A Descriptive Study. J. Islam. Hum. Adv. Res. 2016, 6, 1–7. [Google Scholar]
- Kim, Y.H.; Park, Y.; Choi, J. The Adoption of Mobile Payment Services for “Fintech”. Int. J. Appl. Eng. Res. 2016, 11, 1058–1061. [Google Scholar] [CrossRef]
- Ometov, A.; Bezzateev, S.; Mäkitalo, N.; Andreev, S.; Mikkonen, T.; Koucheryavy, Y. Multi-Factor Authentication: A Survey. Cryptography 2018, 2, 1. [Google Scholar] [CrossRef] [Green Version]
- Yusoff, H.; Alomari, M.A.; Latiff, N.A.A.; Alomari, M.S. Effect of e-commerce platforms towards increasing merchant’s income in Malaysia. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 466–470. [Google Scholar] [CrossRef]
- Harish, M.; Karthick, R.; Rajan, R.M.; Vetriselvi, V. A New Approach to Securing Online Transactions—The Smart Wallet; Springer: Singapore, 2019; Volume 500, ISBN 978-981-13-0211-4. [Google Scholar]
- Karsen, M.; Chandra, Y.U.; Juwitasary, H. Technological factors of mobile payment: A systematic literature review. Procedia Comput. Sci. 2019, 157, 489–498. [Google Scholar] [CrossRef]
Sources | Found | Candidate | Elected |
---|---|---|---|
IEEE Xplore | 60 | 35 | 20 |
ACM Digital Library | 20 | 14 | 2 |
Springer Link | 19 | 12 | 10 |
Taylor & Francis | 9 | 8 | 2 |
Academia | 14 | 9 | 3 |
Google schoolar | 96 | 70 | 55 |
Research Gate | 47 | 24 | 22 |
Science Direct | 9 | 7 | 6 |
Atlantis Press | 5 | 3 | 1 |
MDPI | 19 | 15 | 8 |
GrowingScience | 8 | 4 | 1 |
Internet Sources | 10 | 7 | 1 |
Total | 316 | 208 | 131 |
Industry | Country | Number of Articles |
---|---|---|
E-wallet Design and requirement | India, Malaysia, Nigeria, South Korea, China, India, and Indonesia | 19 |
Study/adoption/impact | India, Malaysia, United States Nigeria, Bangladesh, China, India, Indonesia, and Korea | 23 |
E-wallet security | India, Malaysia, Iran, Nigeria, Bangladesh, China, India, Indonesia, and Israel | 25 |
Online banking security | India, Malaysia, Denmark, Nigeria, Bangladesh, China, India, Indonesia, Saudi Arabia, Jordan, Kenya, Romania, Saudi Arabia, Sudan, Canada, Thailand, Turkey, and Oman | 64 |
Factors | Frequency | Percent (%) | Valid Percent (%) | Cumulative Percent (%) |
---|---|---|---|---|
Security | 73 | 55.038 | 55.038 | 55.038 |
Study/adoption/impact | 23 | 17.829 | 17.829 | 72.868 |
Authentication | 16 | 12.40 | 12.40 | 85.271 |
Design requirement | 19 | 14.728 | 14.728 | 100.0 |
Total | 131 | 100.0 | 100.0 |
Security Techniques | References | Total Studies |
---|---|---|
Confidentiality | [15,21,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45]. | 18 papers |
Integrity | [17,24,30,31,33,36,40,42,43,44,46,47,48,49,50,51,52,53,54,55,56]. | 22 papers |
Non-repudiation | [14,24,33,42,55,56,57,58,59,60,61,62]. | 14 papers |
Authorization | [34,42,58,63,64,65,66,67,68,69,70]. | 12 papers |
Authentication | [14,21,24,26,33,35,40,42,44,56,68,70,71,72,73,74,75,76,77]. | 19 papers |
Availability | [14,17,21,37,53,61,78,79]. | 8 papers |
Robustness and Efficiency | [7,20,22,31,45,65,80,81,82,83,84,85,86]. | 13 papers |
Supporting transaction | [9,13,14,17,20,25,26,31,38,52,65,87,88]. | 13 papers |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hassan, M.A.; Shukur, Z.; Hasan, M.K.; Al-Khaleefa, A.S. A Review on Electronic Payments Security. Symmetry 2020, 12, 1344. https://doi.org/10.3390/sym12081344
Hassan MA, Shukur Z, Hasan MK, Al-Khaleefa AS. A Review on Electronic Payments Security. Symmetry. 2020; 12(8):1344. https://doi.org/10.3390/sym12081344
Chicago/Turabian StyleHassan, Md Arif, Zarina Shukur, Mohammad Kamrul Hasan, and Ahmed Salih Al-Khaleefa. 2020. "A Review on Electronic Payments Security" Symmetry 12, no. 8: 1344. https://doi.org/10.3390/sym12081344
APA StyleHassan, M. A., Shukur, Z., Hasan, M. K., & Al-Khaleefa, A. S. (2020). A Review on Electronic Payments Security. Symmetry, 12(8), 1344. https://doi.org/10.3390/sym12081344