CFP last date
01 January 2025
Reseach Article

A Critical Analysis on the Evolution in the E-Payment System, Secuiry Risk, Threats and Vulnerability

by Jerrin Yomas, Chitra Kiran N
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 23
Year of Publication: 2018
Authors: Jerrin Yomas, Chitra Kiran N
10.5120/cae2018652800

Jerrin Yomas, Chitra Kiran N . A Critical Analysis on the Evolution in the E-Payment System, Secuiry Risk, Threats and Vulnerability. Communications on Applied Electronics. 7, 23 ( Dec 2018), 21-29. DOI=10.5120/cae2018652800

@article{ 10.5120/cae2018652800,
author = { Jerrin Yomas, Chitra Kiran N },
title = { A Critical Analysis on the Evolution in the E-Payment System, Secuiry Risk, Threats and Vulnerability },
journal = { Communications on Applied Electronics },
issue_date = { Dec 2018 },
volume = { 7 },
number = { 23 },
month = { Dec },
year = { 2018 },
issn = { 2394-4714 },
pages = { 21-29 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume7/number23/838-2018652800/ },
doi = { 10.5120/cae2018652800 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T20:03:48.643114+05:30
%A Jerrin Yomas
%A Chitra Kiran N
%T A Critical Analysis on the Evolution in the E-Payment System, Secuiry Risk, Threats and Vulnerability
%J Communications on Applied Electronics
%@ 2394-4714
%V 7
%N 23
%P 21-29
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

At present, payment system through the internet has been trending at the furious pace. There are different ways and varieties of e-payment systems are existing to facilitate ease of transaction at the most active security level. However, parallelly the cyber-attacks strategies are growing at the advanced level as security protocols. In this research study, have analyzing the evolution of e-payment system and its terminology followed by different conventional e-payment mechanisms. Also demonstrates lack of security provisions and solution strategies. The main contribution of the present survey study is providing the landscape of digital e-payment system and its opportunities for future e-commerce systems. In the last, have briefly discussing and analyzing the fraudulent transaction rates which will become the benchmark for the development of secure e-payment system.

References
  1. Heindl, Dr Eduard. "Online Payment Process." 2008
  2. Lerner, Thomas. Mobile payment. Springer, 2013.
  3. Haque A, Ismail AZH, Daraz AH (2009) Issues of e-banking transaction: an empirical investigation on malaysian customers perception. J Appl Sci 9(10):1870–1879
  4. Flavia´n C, Guinalı´u M (2006) Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Ind Manag Data Syst 106(5):601–620
  5. comScore Inc. (2012) 1 in 4 Internet Users Access Banking Sites Globally, in: comScore Data Mine, comScore, Inc. https://www.comscore.com/Insights/Data-Mine/1-in-4-Internet-Users-Access-Banking-Sites-Globally
  6. Montazemi AR, Qahri-Saremi H (2015) Factors affecting adoption of online banking: a meta-analytic structural equation modeling study. Inf Manag 52(2):210–226
  7. ARCOTEL. (2015, September 29) Estad´ısticas 2015. [Online]. Available: http://www.arcotel.gob.ec/estadisticas/estadisticas/
  8. Superintendencia de Bancos del Ecuador. (2015, September 29) Compoatamiento del sistema financiero ecuatoriano. [Online]. Available: http://www.sbs.gob.ec/medios/PORTALDOCS/downloads/ articulos financieros/Estudios%20Tecnicos/2014/AT7 2014.pdf
  9. Wang Y, Lin H, Tang T (2003) Determinants of user acceptance of internet banking: an empirical study. Int J Serv Ind Manag 14(5):501–19.
  10. Harris H, Guru BK, Avvari MV (2011) Evidence of firms’ perceptions toward electronic payment systems (EPS) in Malaysia. Int J Bus Inf 6(2):226–245
  11. https://www.ey.com/Publication/vwLUAssets/EY-the-case-for-mobile-payments-in-india/$FILE/EY-the-case-for-mobile-payments-in-india.PDF
  12. L. Fuchs, G. Pernul, R. Sandhu, “Roles in information security e A survey and classification of the research area”, ScienceDirect, Elsevier, 2011
  13. Barnes SJ, Corbitt B (2003) Mobile banking: concept and potential. Int J Mob Commun. 1(3):273–288
  14. “PayPal”, https://www.paypal.com/us/cgi-bin/webscr?cmd=_payflow-gatewayoverview- outside (accessed June 12, 2008)
  15. “PayPal”, http://checkout.google.com/support/sell/bin/topic.py?topic=8664 (accessed June 13, 2008)
  16. “What we Are”, http://www.authorize.net/company/whatwedo/ (accessed June 15, 2008).
  17. “Electronic Payment and Security Systems”, http://shodhganga.inflibnet.ac.in/bitstream/10603/113273/14/14_chapter%203.pdf, (accessed June 13, 2008)
  18. “Purpose”, https://purposefultechie.com/, (accessed June 13, 2008)
  19. Laudon, C. Kenneth and Traver, Carol (2002), E-Commerce, New Delhi: Pearson Education.
  20. Black NJ, Lockett A, Ennew C, Winklhofer H, McKechnie S (2002) Modelling consumer choice of distribution channels: an illustration from financial services. Int J Bank Mark 20(4):161–173
  21. Barnes SJ, Corbitt B (2003) Mobile banking: concept and potential. Int J Mob Commun. 1(3):273–288 Bentler PM (1989) EQS, structural equations, program manual, program version 30. BMDP Statistical Software, Los Angeles
  22. Hoehle H, Scornavacca E, Huff S (2012) Three decades of research on consumer adoption and utilization of electronic banking channels: a literature analysis. Decis Support Syst 54(1):122–132
  23. Eastlick MA, Lotz SL, Warrington P (2006) An integrated model of privacy concerns, trust and commitment. J Bus Res 59(8):870–880
  24. Cao, Chenglong, and Xiaoling Zhu. "Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services." Security and Communication Networks 2018 (2018).
  25. S. Abughazalah, K. Markantonakis, and K. Mayes, “Secure mobile payment on NFC-enabled mobile phones formally analysed using CasperFDR,” in Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom ’14), pp. 422–431, IEEE, Beijing, China, September 2014.
  26. Z. Qin, J. Sun, A. Wahaballa, W. Zheng, H. Xiong, and Z. Qin, “Asecure and privacy-preservingmobilewalletwith outsourced verification in cloud computing,” Computer Standards & Interfaces, vol. 54, pp. 55–60, 2017.
  27. Barkhordari, Maryam, Zahra Nourollah, Hoda Mashayekhi, Yoosof Mashayekhi, and Mohammad S. Ahangar. "Factors influencing adoption of e-payment systems: an empirical study on Iranian customers." Information Systems and e-Business Management 15, no. 1 (2017): 89-116.
  28. Karimi Anche F, Hozouri S, Mehdizadeh A (2014) An exploration investigation on important factors influencing e-marketing: Evidence from banking industry. Uncertain Supply Chain Manag 2(1):49–54
  29. Braeken, An. "An Improved E-Payment System and Its Extension to a Payment System for Visually Impaired and Blind People with User Anonymity." Wireless Personal Communications 96, no. 1 (2017): 563-581.
  30. Yang, J.-H., Chang, Y.-F., & Chen, Y.-H. (2013). An efficient authenticated encryption scheme based on ECC and its application for electronic payment. Information Technology and Control, 42(4), 315–324.
  31. Chaudhry, S. A., Farash, M. S., Naqvi, H., & Sher, M. (2015). A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electronic Commerce Research, 16(1), 113–139.
  32. D. A. Ortiz-Yepes, “Areviewof technical approaches to realizing near-field communicationmobile payments,” IEEE Security and Privacy, vol. 14, no. 4, pp. 54–62, 2016.
  33. P. Subpratatsavee and P. Kuacharoen, “Internet banking transaction authentication using mobile one-time password and QR code,” Advanced Science Letters, vol. 21, no. 10, pp. 3189–3193, 2015.
  34. B. Zhang, K. Ren, G. Xing, X. Fu, andC.Wang, “SBVLC: secure barcode-based visible light communication for smartphones,” in Proceedings of the 33rd IEEE Conference on Computer Communications (IEEE INFOCOM ’14), pp. 2661–2669, Toronto, Canada, May 2014.
  35. H. Suryotrisongko, Sugiharsono, and B. Setiawan, “A novel mobile payment scheme based on secure quick response payment with minimal infrastructure for cooperative enterprise in developing countries,” Procedia—Social and Behavioral Sciences, vol. 65, pp. 906–912, 2012.
  36. P. De and J. Eliasson, “An assessment of QR code as a user interface enabler for mobile payment apps on smartphones,” in Proceedings of the 7th International Conference on HCI (IndiaHCI ’15), pp. 81–84, Guwahati, India, December 2015.
  37. Terán, Luis, Celine Horst, B. Fausto Valencia, and Priscila Rodriguez. "Public electronic payments: A case study of the electronic cash system in Ecuador." In eDemocracy & eGovernment (ICEDEG), 2016 Third International Conference on, pp. 65-70. IEEE, 2016.
  38. ChitraKiran, N., Bhuvan Teja, Suchira Suresh, B. Krishna, S. M. Akarsh, and Jerrin Yomas. "A biometric based payment system by using payee and payer module." In Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2017 2nd IEEE International Conference on, pp. 2252-2256. IEEE, 2017.
  39. J. Kang; D. Nyang, "A Privacy-Preserving Mobile Payment System for Mass Transit," in IEEE Transactions on Intelligent Transportation Systems , Vol.PP, No.99, pp.1-14, 2017
  40. J.-H. Yang and P.-Y. Lin, “A mobile payment mechanism with anonymity for cloud computing,” J. Syst. Softw., vol. 116, pp. 69–74, Jun. 2016.
  41. Kang, Baoyuan, and Danhui Xu. "Secure electronic cash scheme with anonymity revocation." Mobile Information Systems 2016 (2016).
  42. Fan, Chun-I., Wei-Zhe Sun, and Hoi-Tung Hau. "Date attachable offline electronic cash scheme." The Scientific World Journal 2014 (2014).
  43. Kiran, Chitra N., and G. Narendra Kumar. "Implication of secure micropayment system using process oriented structural design by hash chaining in mobile network." International Journal of Computer Science Issues (IJCSI) 9, no. 1 (2012): 329.
  44. Kiran, N. Chitra, and G. Narendra Kumar. "Reliable OSPM schema for secure transaction using mobile agent in micropayment system." In Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on, pp. 1-6. IEEE, 2013.
  45. http://shodhganga.inflibnet.ac.in/bitstream/10603/113273/14/14_chapter%203.pdf
  46. Various studies (Norton, 2003; Computer Crime Report, India, 2002) indicate that most of the time theses people are from inside the organization or the people who deals with the electronic payment system in any organization.
  47. Solat, Siamak. "Security of electronic payment systems: A comprehensive survey." arXiv preprint arXiv:1701.04556 (2017).
  48. Raina, Vibha Kaw. "Overview of mobile payment: technologies and security." In Electronic payment systems for competitive advantage in e-commerce, pp. 186-222. IGI Global, 2014.
  49. “The Mobile Payments Landscape and its Opportunities”, https://www.accenture.com/t20160708T043705__w__/us-en/_acnmedia/PDF-25/Accenture-Acquires-Mobgen-Expand-European-Mobile-Payment-UK.pdf, (accessed June 15, 2008).
  50. “Security”, http://www.securitymagazine.com/articles/86878-holiday-season-e-commerce-fraud-rates-rise, (accessed June 15, 2008).
  51. “Experian”,https://www.experian.com/assets/decision-analytics/white-apers/juniper-research-online-payment-fraud-wp-2016.pdf,(accessed June 15, 2008).
Index Terms

Computer Science
Information Sciences

Keywords

Debit/Credit card Electronic Payement System E-Cash Transcation Mobile-Payement Security Secure E-Transaction (SET) QR code.