Start Date
12-13-2015
Description
This paper provides a review of the security aspect of mobile banking applications. We employed blog mining as a research method to analyze blog discussion on security of mobile banking applications. Furthermore, we used the workflow technology to simulate real-life scenarios related to attacks on mobile banking applications. Insights are summarized to help banks and consumers mitigate the security risks of mobile banking applications.
Recommended Citation
He, Wu; Tian, Xin; Shen, Jiancheng; and Li, Yaohang, "Understanding Mobile Banking Applications’ Security risks through Blog Mining and the Workflow Technology" (2015). ICIS 2015 Proceedings. 1.
https://aisel.aisnet.org/icis2015/proceedings/SecurityIS/1
Understanding Mobile Banking Applications’ Security risks through Blog Mining and the Workflow Technology
This paper provides a review of the security aspect of mobile banking applications. We employed blog mining as a research method to analyze blog discussion on security of mobile banking applications. Furthermore, we used the workflow technology to simulate real-life scenarios related to attacks on mobile banking applications. Insights are summarized to help banks and consumers mitigate the security risks of mobile banking applications.