2016
DOI: 10.5296/bms.v7i2.10069
|View full text |Cite
|
Sign up to set email alerts
|

Risks and Barriers Associated with Mobile Money Transactions in Tanzania

Abstract: The study was about Risks and Barriers Associated with Mobile Money Transactions in Tanzania. The focal point of the study was to spot and reveal risks and barriers experienced by mobile money users in mobile money transactions (MMT) and the frequencies of their incidences. It also assesses the level of users' understanding and how they can avoid themselves from barriers and risks exposing environment. The research was based on primary data which was collected in a survey done in Ilala district through questio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 4 publications
0
12
0
Order By: Relevance
“…Aker et al [4] review various attempts to use agricultural ICTs in Africa and offer sociological and anthropological insight into how these platforms alter the relationship between the provision of information and trust. For rural communities in Tanzania, trust takes different forms [7,51,79]. Our work documents localized ways to confer trust through design that we learned through iterative user testing.…”
Section: Technologies For Agricultural Informationmentioning
confidence: 85%
“…Aker et al [4] review various attempts to use agricultural ICTs in Africa and offer sociological and anthropological insight into how these platforms alter the relationship between the provision of information and trust. For rural communities in Tanzania, trust takes different forms [7,51,79]. Our work documents localized ways to confer trust through design that we learned through iterative user testing.…”
Section: Technologies For Agricultural Informationmentioning
confidence: 85%
“…Ali et al (2020b) (Aloul et al, 2009;Rodrigues et al, 2016;. Brute-force attacks on mobile money are simple and have a high success rate because of the simplicity of the PINs (Mtaho, 2015;Raphael, 2016;Castle et al, 2016;Reaves et al, 2017;Ali et al, 2020a). In addition, mobile money agents and customers who use smartphones to carry out mobile money transactions have a high chance of their mobile money PINs being compromised because their hands leave a greasy residue and scratch on the smartphone's touchscreen that attackers can use to guess their mobile money PINs easily (Kunda & Chishimba, 2018).…”
Section: Attacks Against Authenticationmentioning
confidence: 99%
“…The adversaries can also disguise themselves as legitimate mobile money agents or customers to control and access mobile money systems and their services (Ali et al, 2020a). Mobile money subscribers have the habit of sharing their mobile money PINs among friends and family members, thus, making it easy for attackers to perform illegal transactions and even update the victims' PINs (Mtaho, 2015;Raphael, 2016;Buku & Mazer, 2017;Lonie, 2017;Das et al, 2018;Ali et al, 2020a;Ali et al, 2020b). Attackers use social engineering to lure mobile money agents and customers into revealing their confidential information.…”
Section: (Ii) Impersonation Attacksmentioning
confidence: 99%
See 2 more Smart Citations