Secure Mobile Money Withdraw Framework – SeMWiF
Downloads
Financial and Data loss from Weak withdrawer Authentication in Mobile Money is a heavy burden to individuals, organizations and governments. To reduce this burden, an easy to use and acceptable secure mobile money withdraw framework should be designed that can detect, prevent and assist in recovery of fraudulent mobile money withdraws. To achieve this, the study had three study contributions; Studying different Mobile Payment withdraw frameworks; Designing a secure Mobile Money withdraw framework and; Evaluating the usability and usefulness of the designed secure Mobile Money withdraw framework. This paper presents the Secure Mobile Money Withdraw Framework (SeMWiF), a new software construction, that detects, prevents and assist in recovery of fraudulent mobile money withdraws. Evaluation results show that, SeMWiF enhances Detection, Prevention and Recovery, with an Ease of Learning rating at 51%, Ease of Use rating at 71% and Perception of Acceptance at 71 % as well. Should the Secure Mobile Money Withdraw Framework-SeMWiF guidelines be implemented, Mobile Money stakeholders will experience greater use from enhanced security and less financial loss.
Adedoyin, A. (2018). Predicting fraud in mobile money transfer (Doctoral dissertation, University of Brighton).
Africa’s mobile money industry is infiltrated by crime. (n.d.). Cash Essentials.
https://cashessentials.org/africas-mobile-money-industry-is-infiltrated-by-crime/
Aheebwa, J. (2022, June 28). How Ugandans lose millions in mobile money fraud. Monitor. https://www.monitor.co.ug/uganda/business/prosper/how-ugandans-lose-millions-in-mobile-money-fraud-3862312
Ahmad, A., Maynard, S. B., & Shanks, G. (2015). A case analysis of information systems and security incident responses. International Journal of Information Management, 35(6), 717-723.
Ali, Guma, Ally Dida, M., & Elikana Sam, A. (2020). Two-factor authentication scheme for mobile money: A review of threat models and countermeasures. Future Internet, 12(10), 160.
Arinda, C. (2023, May 19). TRICKS USED BY MOBILE MONEY FRAUDSTERS IN UGANDA. Nexus Media. https://nexusmedia.ug/tricks-used-by-mobile-money-fraudsters-in-uganda/
Bopape, R. K. (2015). Towards a Unified Fraud Management and Digital Forensic Framework for Mobile Applications (Doctoral dissertation, University of South Africa).
Bouchet, M., Cook, B., Cutler, B., Druzkina, A., Gacek, A., Hadarean, L., ... & Warfield, A. (2020, November). Block public access: trust safety verification of access control policies. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 281-291).
Chaudhry, S. A., Farash, M. S., Naqvi, H., & Sher, M. (2016). A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electronic Commerce Research, 16(1), 113-139.
Chebii, P. J. (2021). Securing Mobile Money Payment and Transfer Applications Against Smishing and Vishing Social Engineering Attacks (Doctoral dissertation, University of Nairobi).
Chetalam, L. J. (2018). Enhancing Security of Mpesa Transactions by Use of Voice Biometrics (Doctoral dissertation, United States International University-Africa).
Cochran, W. G. (2007). Sampling techniques. John Wiley & Sons.
eSentire Inc. (2023, October 28). Cybersecurity Ventures report on cybercrime. eSentire. https://www.esentire.com/cybersecurity-fundamentals-defined/glossary/cybersecurity-ventures-report-on cybercrime#:~:text=The%202023%20Cybersecurity%20Ventures%20Cybercrime%20Report%20predicts%20a%20rapid%20increase,%243%20trillion%20recorded%20in%202015.
Finextra. (2012, May 28). Ugandan telco says employees stole $3.5m in mobile money fraud. Finextra Research. https://www.finextra.com/newsarticle/23759/ugandan-telco-says-employees-stole-35m-in-mobile-money-fraud
Guillaume Lepecq (2020). Africa’s Mobile Money Industry is Infiltrated by Crime. From
https://cashessentials.org/africas-mobile-money-industry-is-infiltrated-by-crime/ on 16 May 2022 at 8:19am
Guma, A. (2022). Development of a secure multi-factor authentication algorithm for mobile money applications (Doctoral dissertation, NM-AIST).
Independent. (2017, January 15). Inside MTN mobile money saga. The Independent Uganda:
https://www.independent.co.ug/inside-mtn-mobile-money-saga/
INTERPOL, Project ENACT: Mobile money and organized crime in Africa, June 2020. This analytical report was compiled in the framework of the European Union (EU) funded Project ENACT (Enhancing Africa’s response to transnational organized crime). The contents of this INTERPOL report can in no way be taken to reflect the views of the EU or the ENACT partnership.
Isaac, J. T., & Sherali, Z. (2014). Secure mobile payment systems. IT Professional, 16(3), 36-43.
Islam, I., Munim, K. M., Islam, M. N., & Karim, M. M. (2019, December). A proposed secure mobile money transfer system for SME in Bangladesh: An industry 4.0 perspective. In 2019 International Conference on Sustainable Technologies for Industry 4.0 (STI) (pp. 1-6). IEEE.
Junior, A. P., Díez, L. E., Bahillo, A., & Eyobu, O. S. (2023). Remote Pedestrian Localization Systems for Resource-Constrained Environments: A Systematic Review. IEEE Access.
Kafeero, S. (2022, July 21). Uganda’s banks have been plunged into chaos by a mobile money fraud hack. Quartz. https://qz.com/africa/1915884/uganda-banks-mtn-airtel-hacked-by-mobile-money-fraudsters
Kemp, S. (2023, February 14). Digital 2023: Uganda — DataReportal – Global Digital Insights. DataReportal – Global Digital Insights. https://datareportal.com/reports/digital-2023-uganda#:~:text=Data%20from%20GSMA%20Intelligence%20shows,total%20population%20in%20January%202023.
Lampson, B., Abadi, M., Burrows, M., & Wobber, E. (1991). Authentication in distributed systems: Theory and practice. ACM SIGOPS Operating Systems Review, 25(5), 165-182.
Mega, B. (2020). Framework for improved security on usage of mobile money application based on iris biometric authentication method in Tanzania (Master's Dissertation). The University of Dodoma, Dodoma. http://hdl.handle.net/20.500.12661/2675 Downloaded from UDOM Institutional Repository at The University of Dodoma, an open access institutional repository.
Mirembe, D. P. (2015). The threat nets approach to information system security risk analysis. Rijksuniversiteit Groningen.
Mirembe, D.P, Lubega, T.J and Kibukamusoke, M. (2019). Leveraging Social Media in Higher Education: A Case of Universities in Uganda. European Journal of Open, Distance and E-learning.
Monitor., (2021, January 2). Mobile money shutdown hits businesses hard. Monitor.
https://www.monitor.co.ug/uganda/business/finance/mobile-money-shutdown-hits-businesses-hard-1641168
Mousal, F. G. (2015, September 22). MTN denies UGX 21 billion mobile money dupery allegations. Techjaja. https://techjaja.com/mtn-denies-ugx-21-billion-mobile-money-dupery-allegations/
Mtaho, A. B. (2015). Improving mobile money security with two-factor authentication. International Journal of Computer Applications, 109(7).
MTN staff, cleaner and mobile money agent get 9 years for fraud. (2021b, January 19). Monitor.
Namatovu, H. K. (2018). Enhancing antenatal care decisions among expectant mothers in Uganda (No. 164). PhD Thesis, University of Groningen, Netherlands. Available: https://www. rug. nl/research/portal/files/56325553/Complete_thesis. pdf Total Number/Percent of Mothers.
Nixon Kanali (2021). Africa’s mobile fraud losses set to peak in 2021. From
https://africabusinesscommunities.com/tech/tech-news/africa%E2%80%99s-mobile-fraud-losses-set-to-peak-in-2021/ on 16 May 2021 at 8:11am
Nzayinambaho, E. (2021). A Multifactor Authentication Security Model for Mobile Banking Transactions: The Case of A Mobile Banking System.
Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). Multi-factor authentication: A survey. Cryptography, 2(1), 1.
Otiato Guguyu (2021). Survey finds half of mobile users lose cash to fraudsters. From
https://www.businessdailyafrica.com/bd/economy/survey-finds-half-mobile-users-lose-cash-fraudsters-3654490#:~:text=The%20FinAccess%20survey%20found%20that,withdrew%20and%20refused%20to%20refund. On 16 May 2022 at 8:53 am
Parker, M. (2023, August 2). How can Africa guard against cybercrime? African Business. https://african.business/2023/08/african-banker/how-can-africa-guard-against-cybercrime
Paula Gilbert, (2021). Kenya, SA worst hit by mobile payment fraud. From
https://www.connectingafrica.com/author.asp?section_id=761&doc_id=769857#:~:text=%22In%20the%20Middle%20Eastern%20and,%2C%22%20Lotfi%20told%20Connecting%20Africa. On 16 May 2022 at 7:44am
Pukkasenung, P., & Chokngamwong, R. (2016). Review and comparison of mobile payment protocol. In Advances in parallel and distributed computing and ubiquitous services (pp. 11-20). Springer, Singapore.
Ranyali, N. (2019). Conceptual Framework for Multi-Factor Authentication for Mobile Money Systems in Lesotho (Doctoral dissertation, Botho University).
Sanni, M. L., Akinyemi, B. O., Akinwuyi, D., Olajubu, E. A., & Aderounmu, G. A. (2023). A Predictive Cyber Threat Model for Mobile Money Services. Annals of Emerging Technologies in Computing (AETiC), 7(1), 40-60.
Sara Jerving (02 February 2023). Two types of drugs kill nearly 500,000 in sub-Saharan Africa each year. From https://www.devex.com/news/two-types-of-drugs-kill-nearly-500-000-in-sub-saharan-africa-each-year-104895#:~:text=Global%20Health-,Two%20types%20of%20drugs%20kill%20nearly,sub%2DSaharan%20Africa%20each%20year&text=Nearly%20half%20a%20million%20people,Office%20on%20Drugs%20and%20Crime. On 23 October 2023 at 9:02 PM
Serugo, G. (2023, April 12). BOU to banks: stop hiding cash thefts. The Observer - Uganda.
https://www.observer.ug/news/headlines/77444-bou-to-banks-stop-hiding-cash-thefts
Srinivas, J., Das, A. K., & Kumar, N. (2019). Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 92, 178-188.
Telecoms, bank hacked, over sh1b stolen. (n.d.-b). New Vision.
https://www.newvision.co.ug/news/1528751/telecoms-bank-hacked-sh1b-stolen
Tumwebaze, R. P. (2016). Decision Enhancement for Poultry Farmers in East Africa. Rijksuniversiteit Groningen.
Understanding cybercrime in Uganda. (2024, April 5). Monitor. https://www.monitor.co.ug/uganda/brand-book/understanding-cybercrime-in-uganda-4548288
UNODC report. (2023, February 1). Fake medicines kill almost 500,000 sub-Saharan Africans a year: UN News. https://news.un.org/en/story/2023/02/1133062
Zhaomiao Xu,Tao Zhang,Yujun Zeng, Jia Wan, Wuyang Wu (2015). A Secure Mobile Payment Framework Based On Face Authentication. Proceedings of the International MultiConference of Engineers and Computer Scientists 2015 Vol I, IMECS 2015, March 18 - 20, 2015, Hong Kong.
Zhou, Y., Wu, N., Hu, B., Zhang, Y., Qiu, J., & Cai, W. (2022). Implementation and Performance of Face Recognition Payment System Securely Encrypted by SM4 Algorithm. Information, 13(7), 316.
Copyright (c) 2024 Job Matovu, Drake Patrick Mirembe, Odongo Steven Eyobu
This work is licensed under a Creative Commons Attribution 4.0 International License.
All Content should be original and unpublished.