Issues and security measures of mobile banking apps
Mobile apps is a used to designate the act or process by which application software is developed for handheld devices, such as personal digital assistants or mobile phones. These applications can be pre-installed on phones during manufacturing platforms, or delivered as web applications using server...
| Main Authors: | Hayikader, Sameer, Abd Hadi, Farah Nurafiqah Hanis, Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/53522/ http://irep.iium.edu.my/53522/1/2016-Issues%20and%20Security%20Measures%20of%20Mobile%20Banking%20Apps-ijsrp-p4908.pdf |
Similar Items
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
Mobility issues in hierarchical mobile IP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
Scrutinising internet banking security solutions
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Mobility based surveillance model to facilitate security of individuals’ properties
by: Hameed, Shihab A.
Published: (2013)
by: Hameed, Shihab A.
Published: (2013)
Critical socio-technical issues surrounding mobile computing
by: Mohamed, Norshidah, et al.
Published: (2016)
by: Mohamed, Norshidah, et al.
Published: (2016)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
System architecture for applying Malik Bennabi’s ruler on intellectual property of Islamic finance and banking
by: Othman, Roslina, et al.
Published: (2016)
by: Othman, Roslina, et al.
Published: (2016)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Banking on ICT: The relevance of online dispute resolution in the islamic banking industry in Malaysia
by: Oseni, Umar Aimhanosi
Published: (2015)
by: Oseni, Umar Aimhanosi
Published: (2015)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
Prevalence of mobile usage among university students: a case study of International Islamic University Malaysia
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
Issues in location based marketing: a review of literature
by: Jaradat, Ahmad, et al.
Published: (2015)
by: Jaradat, Ahmad, et al.
Published: (2015)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018)
by: Imtiaz Ali, Najma, et al.
Published: (2018)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
Evaluation of nested network mobility approaches
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
Social media usage and awareness of cyber security issues among youths
by: Ahmad, F., et al.
Published: (2020)
by: Ahmad, F., et al.
Published: (2020)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Performance study of intra-domain mobility management
by: Rusli, Nazreen, et al.
Published: (2005)
by: Rusli, Nazreen, et al.
Published: (2005)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Similar Items
-
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015) -
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014) -
Mobility issues in hierarchical mobile IP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005) -
Scrutinising internet banking security solutions
by: Khan, Burhan ul Islam, et al.
Published: (2020) -
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)