Recent orders

MBA_8A1_Yin Hui_BUS7AO_A1

Table of Contents

TOC o “1-3” h z u 1. Introduction PAGEREF _Toc86414272 h 22. Occurrence of Risks in Relation to Economic and Legal Implications PAGEREF _Toc86414273 h 22.1 Definition of Risk PAGEREF _Toc86414274 h 22.2 Difference between Risk and Uncertainties PAGEREF _Toc86414275 h 22.3 Origins and Nature of Risks PAGEREF _Toc86414276 h 22.5 Identification of Risks in the Context of Economic and Legal Implications PAGEREF _Toc86414277 h 32.5.1 Compliance Risk PAGEREF _Toc86414278 h 32.5.2 Hazard Risks PAGEREF _Toc86414279 h 42.5.3 Control Risk PAGEREF _Toc86414280 h 42.5.4 Opportunity Risk PAGEREF _Toc86414281 h 53. Risk Management Plan PAGEREF _Toc86414282 h 53.1 Control Measures PAGEREF _Toc86414283 h 63.2 Corrective Measures PAGEREF _Toc86414284 h 73.3 Record Keeping and Review Frequencies PAGEREF _Toc86414285 h 84. Conclusion PAGEREF _Toc86414286 h 8References PAGEREF _Toc86414287 h 9

1. IntroductionChina Communications Construction Company Limited (CCCC)principally engaged in the design and construction of transportation infrastructure, dredging and heavy machinery manufacturing business. The company operates in China,a fairly stable economy that uses a mixed controlled and open approach to regulation. This is a report covering a deep insight of the China Communication and Construction Company to uncover the major and minor risks that are associated with the company in its operations within China.

2. Occurrence of Risks in Relation to Economic and Legal Implications2.1 Definition of RiskRisk refers to the likelihood that someone or something will suffer harm or loss from a particular event or occurrence (Kuznetsova, 2019). It may also come out as the probability that a certain situation will lead to damage. According to Shad et al. (2019), a risk can is bound by measurable probabilities that are used in speculation or basic calculation and determination the possible likelihood of the event occurring and the amount of harm or loss that can be expected in case it happened.

2.2 Difference between Risk and UncertaintiesThe major and distinctive difference between a risk and uncertainty is within their possible outcomes and the possible occurrence of these outcomes. A risk represents a situation in which both the outcomes to the situation and the possibility of these occurrences are known to the investigator and they can be measured to ensure effective decision making (Kundzewicz et al., 2018). Whereas for the uncertainty, both the outcomes of the situation and their possibility of occurrence are not known and cannot be obtained by the investigator.

2.3 Origins and Nature of RisksThe nature of risk is interpreted according to the expected harm from the risks (Adeleke et al., 2018). Pascal well illustrates the nature of risk, he offers a positive expected value, laid the foundation of modern risk management, refer to traffic construction companies in China compared with the research on risk, the risk in the following aspects: the nature of market, legal aspects, material and financial aspects. Hopkin (2017) put these four aspects into four major categories to represent the whole nature of risks. These categories include; compliance risks, control risks, opportunity risks and hazard risks.

2.4 Business and Societal Setting

The China Communication and Construction Company is a multinational publicly traded company with its headquarters situated in Beijing, China. The company has the majority owner as the State to which the company anchors. The company is set in the Engineering and Construction industry offering major design and construction services all over the world. Standing at an approximate revenue of 70 billion dollars (China Communications Construction Company n.d.), the company possesses the capacity to offer construction activities such as Highways and Bridges design and construction, Port Construction, Airports design and construction, Railway construction, Oil mining platforms design and construction among many other developmental and high end infrastructural design and construction (Huang et al., 2020).

The multinational basis of the China Communication and Construction Company makes the company interact and impact a number of societies with different diversified composition of people. The basic society associated with the company is Chinese with a majority of the population consisting of the Chinese ethnicity however this changes when the company is contracted to work in other nations. With different nations the company interacts with different population of people with different languages and different practices. China Communication and Construction Company is exposed to as many cultural backgrounds and societal belief as the number of nation the world due to its worldwide operation nature.

2.5 Identification of Risks in the Context of Economic and Legal ImplicationsAccording to Polinkevych et al. (2021), four major aspects within which the nature of risk could be analyzed are brought out. This happens to be the major aspects within which the risk concept can be linked with the economic and the legal perspective. The China Communications and Construction Company also fall within these analytical suggestions of risk impact to the company and the link of the risk aspects to the economic and the legal parameters.2.5.1 Compliance RiskAt present, CCCC has carried out substantial business in 135 countries and regions (CCCCLTD, 2021). Different political, economic and cultural environments in different countries make CCCC face various compliance risks.

A Chinese enterprise once completed 90% of an overseas construction project with both quality and quantity guaranteed, but was identified by the World Bank as having violated the rules and terminated the project process, resulting in a loss of hundreds of millions of yuan, and was unable to participate in any Projects funded by the World Bank for eight years (Gong Lefan,2021). As a result, those who violate the rules may face not only huge fines but also be blacklisted and restricted from overseas operations. According to the World Bank’s statistics on sanctions cases from 2007 to 2017, fraud was the most common at 81%, followed by corruption at 20%, conspiracy at 10%, obstruction of investigation at 5%, and coercion at 1% (Nan Jinlin&Yuan Wenqi,2020). Due to the lack of understanding of the local political and economic system, the operation results in violations, and may be identified as fraud.

2.5.2 Hazard RisksAs a large infrastructure company, CCCC faces risks of earthquake, flood and other hazards.

On July 20, 2021, Zhengzhou, China, suffered a rare heavy rain. The construction enterprise Jianye Group suffered heavy losses in a large number of projects under construction, resulting in direct economic losses of 550 million yuan (Xu Qian, 2021). This risk category is related to the loss of physical property (Aziz, 2020). It is said that the risk of flooding in China will increase within a decade, The final increase range was determined to be from 4.04% to 12.34%, indicating that the higher chance of flooding in China means that the company will slightly predict the occurrence of floods often not only because of the percentage increase in the probability of occurrence but also because of the expected increase in flood cases over several decades (Schulte & Hallstedt, 2018). The expected impact is high because the hazard risk affects structural damage to working equipment and projects, resulting in financial losses.

2.5.3 Control RiskConstruction of infrastructure projects requires a lot of manpower and mechanical equipment. Negligence or improper operation will bring serious consequences. The control risk of CCCC is safety accidents.

In 2017, tower cranes collapsed at the construction site of guangzhou Headquarters Base B Project, causing 7 deaths, 2 serious injuries and a direct economic loss of 8.47 million yuan. The company was ordered to suspend operations for 90 days and not undertake new projects during the period. (Li Ying,2020). Control risk is generally related to management, which brings serious economic losses and negative image to enterprises. This risk requires organizations and companies, like internal governments, to adjust to changes in the external environment.

2.5.4 Opportunity RiskOpportunity risk is the failure rate attached to an organization in case it takes upon a new venture. This may be in terms of branching to other areas or diversification of the business to introduce a new product of or service (Sum & Abdul, 2020). The size of the China Communication and Construction Company served as the cushion or mitigation measure for the occurrences attached to this risk. The size of the organization offers more resources to conduct research and investigation for relevant market data so that any decision or step there henceforth is statistical to avoid guesses and avoidable risk ventures (Panjehfouladgaran & Lim, 2020). The probability of the opportunity risk occurring is low however the impact of the same is high which may cost the company an entire branch or financial losses on initial investment costs on new product or services.

3. Risk Management PlanIn the preceding sections, China Communication and Construction Company has been investigated on the risks that are in direct and indirect effect to the company and the impacts these risks may carry. The section has shown that a risk is associated with a number of outcomes whose individual magnitude can be measured. The risks have been investigated with their relation to the economy surrounding China Communication and Construction Company both inland (within Chinese borders), and overseas in other branches of the company located in different countries and different economies subsequently. The section has also shown that in the case of an uncertainty situation the investigator can never have a specific strategy in dealing with the situation rather anything can be expected that no one is ready and prepared to tackle. The risks occurrences are also investigated in their compliance to the legal setting of the company’s locations. Having identified the major risks that are linked to the China Communication and Construction Company, this section presents the available mitigation strategies that are available useful in curbing the risks to protect the company from suffering the impact of occurrences from the risks noted.

3.1 Control MeasuresFrom the risks discussed above, it can be noted from the context that some of the occurrences have the power of impacting the company to cause a major loss of survival-threatening damage. To ensure thriving of the business, there has to be measures to be taken in ensuring the position of the company is protected from the environmental, legal, social and Economical perspective.

The principle framework of a risk control initiative include: identification of the possibility of risk in the organization; identification of the most likely employees or groups of employees to be impacted; educating employees on the probability of risks; train employees on what to do in the event of emergencies, reporting the incidence, and making decisions; perform periodic evaluations of the workplace including the knowledge of employees on risk and risk control expectations and measures; and to reprimand employees and procedures that are not aligned to the risk control measures.

Specifically, China Communication and Construction Company is required to ensure effective risk control measures. These include: performing good and best-practice housekeeping actions and responses in the workplace including work evaluation in every major area for risk issues; establishing a stable structure to handle legal risk issues; auditing; redesigning tasks that have high probability and risk; and implement policies for people to follow in order to reduce risk.

For example, the legal department of the company ensures that the operations within and around the company are in the total compliance with the respective laws. This is by ensuring that the products and services offered by the company are in accordance with the standardization regulation for customer protection and the environmental protection. For protection of the companies and the general public, the company, which is publicly traded, is expected to act under compliance of the company Law, The Law of Enterprise Income Tax, Basic Rules for the Enterprise Internal Control, Anti-Unfair Competition Law, Labor Contract Law and the Interim Regulations on Prohibition of Commercial Bribery. These laws are incorporated to serve the regulation purpose and enhance general compliance. For the China Communication and Construction Company, the possibility of the occurrence is generally low from the strict observation from the management and the legal department set to ensure compliance (CCCCLTD,2021). The company is also publicly traded and most of the ownership left to the state which ensures the compliance of the whole organization is at per for the interests of the government and the public at large.

The pricing of the products and services should all go hand in hand with the pricing act of the law (Gokmenoglu et al., 2019). And the general sustainability of the acquisition process and should be systematic in a way it ensures sustainability in the entire process. The Human Resource department should ensure compliance with the labor law as stated in the company law of the country. For every contract assigned, the labor acquisition should be checked in way that it respects and adheres to the labor law of the country. The company interaction in the market should be controlled to ensure protection of the company from Anti-Fair competition in tender winning and other multi-company involvement activities. The legal team should also study and understand the relevant laws of other countries in which the company works with or is starting to work with to avoid inconveniences when the company’s operations unintentionally assumes some regulations.

Project managers within the company should ensure that the safety measures are put in place I every project to avoid injuries and subsequent disasters from mistakes in safety measures ignorance. Proper fire-fighting equipment should be installed within the buildings of the company and other related buildings including the project sites. The company employees should also undergo necessary fire drills and other training first aid and other short medical care procedure in case of disaster. Projects in foreign countries should be thoroughly planned to accommodate any disaster expectation in the foreign land for example the case of tornadoes in The American Countries. This fore investigation ensures earlier preparations for the expected disasters which would help avoid injuries and at most save lives.

The marketing department and the data handling department together with the management should be in constant check of the statistics within the company operations and compare the current statistics with the previous ones to know and understand the position of the company against that of the prevailing economic climate. These should also use the data obtained for future planning to cope with the constantly changing market. This strategy ensures that the steps of the company are informed for thriving and progress and most of all adaptation to the prevailing market flow to maintain the current market share and even expand under right conditions. The management team and the data handling department should take proper steps in the investigation and projection of any major step in the company’s operations such as expansion or diversification to prevent unnecessary blunders

3.2 Corrective MeasuresThe management should always ensure harmonious working of the different departments to ensure effective information passage in the moments of updates and sensitive changes (Vekasi, 2019). The legal department should ensure they are always updated on the latest updates on the relevant laws and pass the information effectively to the relevant departments and personnel. This includes foreign laws, in countries that are in constant operations with the company and those starting their operation with company. Innovation within the design team should always be high to ensure the company maintains its market share for quality in the services offered (Han et al., 2018). Structural changes should also be undertaken within the working environment to accommodate relevant drills and ensure the health acts is strictly followed. Structural changes are also necessary when trying to curb any disaster such as fire outbreaks in working environment. Previous mistakes within the company should be noted and studied to help avoid the same mistake in future or any related mistake henceforth. The management should also consider foreign assessment or auditing from known companies to ensure the company is in the same position and direction as the internal auditing states.

3.3 Record Keeping and Review FrequenciesFor efficiency, the company must ensure proper record keeping which means the system and mode of keeping records should be such that the retrieval and access of the stored information is not interrupted and should not lose information (Chang et al., 2018). For China Communication and Construction Company, all incidents on law infringement within the company operation should be recorded in proper details and the number of occurrences to be used in decision making and for addressing the entire company personnel together with the public during the annual meetings.

One of the most effective ways to respond to risk is through proper record keeping. Record keeping enables Risk managers to act based on available knowledge and information. Record keeping entails the information collected from: business expenses, tax documents, accounts payables and receivables, employee information, sales records, vendors, and customer lists. This information is necessary in informing the direction of management in regard to policy formulation and decision making.

Records are an essential element to the management of risk. For China Communication and Construction Company, records are used as proof of compliance and aids in the avoidance of legal issues including fees and penalties. The company also uses proper records to make decisions. Risks in the organization are related to management decision making. For example, failure to properly record employee information on an important management matter such as diversity could lead to poor decision making at an organization level. To ensure that proper and useful information is recorded, China Communication and Construction Company also conducts frequent reviews on a monthly, quarterly, and annually basis to ensure that the position of the company on various elements are kept at par with organizational and management goals. Such methods also aid in the management of risk.

4. ConclusionThe China Communication and Construction Company being a very large organisation, should invest effectively on the risk study and mitigation. The organization with its size and value may be highly prone to assume proper running and production efficiency since it is difficult to identify any problem embedded in the large sections and department. Therefore to curb disaster the company should ensure proper check and study of various sectors in the internal and external environment both macro and micro to uncover risks and mitigate them for survival and thriving.

ReferencesAdeleke, A. Q., Bahaudin, A. Y., Kamaruddeen, A. M., Bamgbade, J. A., Salimon, M. G., Khan,

M. W. A., & Sorooshian, S. 2018. The influence of organizational external factors on construction risk management among Nigerian construction companies. Safety and health at work, vol.9, no.1, pp. 115-124.

Aziz, N. A. A., & Manab, N. A. 2020. Meeting the stakeholder needs and sustaining business

through sustainability risk management practices: a case study of malaysian environmentally sensitive companies. In Sustaining our Environment for Better Future (pp. 195-208). Springer, Singapore.

CCCLTD, (2021), The global layout, Available from: https://www.ccccltd.cn/swfw/zjzqq/ [Electronically accessed 28th, Oct,2021]

Chang, T., Hwang, B. G., Deng, X., & Zhao, X. 2018. Identifying political risk management

strategies in international construction projects. Advances in Civil Engineering, 2018.

CCCLTD, (2021), Introduction and About Us. Available from:

http://en.ccccltd.cn/aboutcompany/introduction/ [Electronically accessed 28th, Oct,2021]

da Silva Etges, A. P. B., & Cortimiglia, M. N. 2019. A systematic review of risk management

in innovation-oriented firms. Journal of Risk Research, vol. 22, no.3, pp. 364-381. 

Gokmenoglu, K., Kirikkaleli, D., & Eren, B. M. 2019. Time and frequency domain causality

testing: The causal linkage between FDI and economic risk for the case of Turkey. The Journal of International Trade & Economic Development, vol. 28, no. 6, pp. 649-667. 

Han, X., Liu, X., Gao, L., & Ghauri, P. 2018. Chinese multinational enterprises in Europe and

Africa: How do they perceive political risk?. Management International Review, vol. 58, no. 1, pp. 121-146.

Huang, C. M., Yang, W., & Zeng, R. Q. 2020. Analysis on the Efficiency of Risk Management

in the Chinese Listed Companies. Mathematics, vol. 8, no. 10, pp.1831.

Kundzewicz, Z. W., Hegger, D. L. T., Matczak, P., & Driessen, P. P. J. 2018. Opinion: Flood-

risk reduction: Structural measures and diverse strategies. Proceedings of the National Academy of Sciences, vol. 115, no. 49, pp. 12321-12325.

Kuznetsova, M. O. 2020. Risk management implementation practices in Russian industrial

companies: results of an empirical study. Strategic decisions and risk management, vol. 10, No. 4, pp.410-423.

Li Ying, (2020), CCCC fourth Navigation Engineering Bureau was found to have participated in the bidding and won the bid illegally during the suspension of operations, Available from: http://www.315online.com/survey/404634.html [Electronically accessed 28th, Oct,2021]

Nan j.&Yuan,w(2020),‘Analysis of compliance risk in international engineering projects’,International Engineering and Labor,Vol.387 ,No.3,pp.20-23.

Panjehfouladgaran, H., & Lim, S. F. W. 2020. Reverse logistics risk management:

identification, clustering and risk mitigation strategies. Management Decision. Vol. 58 ,No. 7, pp. 1449-1474. 

Polinkevych, O., Khovrak, I., Trynchuk, V., Klapkiv, Y., & Volynets, I. 2021. Business risk

management in times of crises and pandemics. Montenegrin Journal of Economics, vol. 17, no. 3, pp. 99-110.

Schulte, J., & Hallstedt, S. I. 2018. Company risk management in light of the sustainability

transition. Sustainability, vol. 10, no. 11, pp. 4137.

Shad, M. K., Lai, F. W., Fatt, C. L., Klemeš, J. J., & Bokhari, A. 2019. Integrating

sustainability reporting into enterprise risk management and its relationship with business performance: A conceptual framework. Journal of Cleaner production, vol. 208, pp.415-425.

Sum, R. M., & Khalik, Z. A. 2020. The Influence of Corporate Governance on Enterprise Risk

Management Implementation: A Study on Non-Financial Public Listed Companies in Malaysia. Journal of Technology Management and Business, vol. 7, no. 1, pp.50-64.

Vekasi, K. 2019. Risk management strategies of Japanese companies in China: Political crisis

and multinational firms. Routledge.

Xia, N., Zou, P. X., Griffin, M. A., Wang, X., & Zhong, R. 2018. Towards integrating

construction risk management and stakeholder management: A systematic literature review and future research agendas. International Journal of Project Management, vol. 36, no. 5, pp.701-715.

Xu Qian, (2021), Behind jianye’s “help for Help” : the flood caused direct losses of more than 500 million yuan, and cultural and tourism projects were the hardest hit, Available from: https://www.bjnews.com.cn/detail/163119853714957.html [Electronically accessed 28th, Oct,2021]

Literature review SECURING MOBILE MONEY TRANSFER SERVICES

GERALD MUNDERU MIGWI

KCA/05/14640

KCA UNIVERSITY

MSC. DATA COMMUNICATIONS

LITERATURE REVIEW

SECURING MOBILE MONEY TRANSFER SERVICES

INTRODUCTION

Definition:

Mobile Money: Electronic money – being essentially digital – has attributes related to mobility and portability. It can be differentiated from other means of electronic payment (such as credit cards, debit cards, smart cards, etc.) because of its ability to replicate the essential attributes of traditional money, such as: liquidity, acceptability and anonymity. Mobile money may be related to mobile wallet, which refers to a digital repository of electronic money developed and implemented on mobile devices, allowing peer-to-peer transactions (P2P) between mobile devices (M2M) from users of the same service. It is similar to a normal physical wallet and is able to store money and credit and debit cards (Eduardo 2011).

Mobile money transfer services are expected to become one of the most important applications in mobile commerce (Varshney & Vetter 2002). Since companies are not going to invest in the development of innovative mobile applications or services unless they can be charged for appropriately, the existence of standardized and widely accepted mobile payment (MP) procedures is crucial for the development of mobile commerce (Pousttchi & Selk & Turowski 2002, Dahlberg & Mallat & Öörni 2003).

Whereas in electronic commerce we still see an important role of traditional payment systems (Krueger & Leibold & Smasal 2006), a payment system for mobile commerce will be typically not adequate until it shares fundamental characteristics of the mobile offer it is to bill for, in particular its ubiquity (Pousttchi & Selk & Turowski 2002, Coursaris & Hassanein 2002, Mallat 2004). As a result a Mobile money transfer service is crucial for, but not limited to the mobile commerce scenario. Pousttchi and Wiedemann (2005) show how customers benefit from Mobile money transfer services procedure: The most important relative advantages over conventional payment systems are ubiquity (the accessibility of a procedure and the reachability of payees at any time from any location), the ability to handle micropayments (smaller than 10 EUR /USD), the avoidance of cash at vending machines, and faster conduction of payments.

Mobile phones should have firm establishments as payment terminals in the most diverse fields. However, whereas merchants and Mobile Payment Service Providers (MPSP) made a multitude of attempts to offer respective services, absence of wide customer acceptance of the offered procedures prevented a market breakthrough in most markets up to now. In addition to the lack of standardization and universality of the procedures, security concerns of customers are one of the main inhibitors (Pousttchi 2005, Ketterer & Stroborn 2002, Ehrhardt 2002, Zieschang 2002).

Definitions of related terms:

Mobile Transactions: This refers to transactions carried out through mobile technologies and devices. In addition to mobile payments, it includes every kind of mobile transaction offered by technology, whether it involves financial values or not.

Mobile payments : Mobile payments include payments made or enabled through digital mobility technologies, via handheld devices, with or without the use of mobile telecommunications networks. These payments are digital financial transactions, although not necessarily linked to financial institutions or banks. There are several models of mobile payments that are currently employed worldwide.

Mobile banking: Mobile banking can be understood as a set of mobile banking services, involving the use of portable devices connected to telecommunications networks that provide users with access to mobile payments, transactions and other banking and financial services linked to customer accounts, with or without the direct participation of traditional banking institutions. This concept can also be regarded as the banking channel through which the digital mobile services are provided by the institutions to their clients, i.e. by integrating the concepts of service and channel.

Analysis Of Securing Mobile Money Transfer Services

Although the issue of security has emerged as a major inhibitor of mobile payment acceptance especially from the viewpoint of customers.

Improving positive security and privacy perceptions are most important for sustained activity in Mobile money transfer services. Security issues in electronic payment procedure have already had a significant amount of discussion in the literature (e.g. Ketterer & Stroborn 2002, Strube 2002, Zieschang 2002). In order to evaluate possible risks related with electronic payment procedures, Reichenbach (2001) uses criteria of multilateral security (Rannenberg 1989) and refines them. Also Jakubowicz, Hanssens and Henriksen (2003) develop a framework for analyzing the risks involved in electronic payments. They include the scenarios in which there may be a loss of money or privacy, the probability of these scenarios and the major possible negative consequences. Both approaches are based on the individual and therefore subjective viewpoints of the researchers. This entails the risk that relevant issues are not included and might lead to a loss of information, or that irrelevant issues are taken into account without any information gain.

Chari et al (2000) argue that mobile commerce solutions differ from electronic commerce solutions because the underlying technology has basic differences which create a range of new security exposures. For instance, the portability of mobile devices makes theft, loss, and damage of client devices much more likely. Therefore they assume that also the perception of security in mobile commerce may differ from that one in electronic commerce.

Examining barriers to adoption of MP, Khodawandi, Pousttchi and Wiedemann (2003) indicate that the lack of perceived security (later defined as subjective security) is the most frequently called reason for a refusal. Rogger and Celia (2004) found similar results.

Finally, Users are usually asked to provide their personal information to a third party service provider in order for them to be able to register and get the service. Therefore they are asked to place immediate trust of their money and personal data on a previously unknown party (Stamatis et al 2004).

Technologies supporting mobile payment transfers

There are two primary technical protocols for conducting mobile money transfers, including short messaging service (SMS) and wireless application protocol (WAP), a basic form of Internet web-browsing similar to PC-based online banking. Recently, new downloadable applications for smart phones have been introduced for mobile (Person to person) P2P transfers, which may leverage SMS or WAP technologies, to facilitate consumer payments. While both protocols have been used in various pilots, SMS is emerging as the most common method for small-value P2P transfers because of its simplicity and compatibility for usage in a variety of mobile phones, including low-end handsets (Cynthia 2010).

Existing approaches in mobile payment procedures have done little to fully address these three requirements. Most MP procedures today use SMS or IVR (interactive voice response) as a method to verify user’s identity, methods that have been proven to be insecure (Stamatis et al 2004).

While the use of SMS is on the rise, it may not be widely adopted for retail payments (Crowe et al. 2010) because of security limitations due to the fact that messages travel and are stored on the handset in plain text without encryption (Mahmoud et al. 2009).

The device manufacturers continue to bring on the market mobile phone models that have advanced capabilities (we are heading towards smartphone domination) and host their own execution environment. It is a matter of time for cryptographic services to be integrated in the devices that will make possible secure communication on voice and data. Furthermore the privacy is at high risk, since interception of data can be done from distance and without physical access (Stamatis et al 2004).

BACKGROUND

Mobile Money Transfer Services

Mobile Money transfer services have differentiated two basic functions of: payments inside and outside mobile commerce (Pousttchi 2005). Inside mobile commerce Mobile money transfer services is used for payments of mobile offers and is ideally system inherent. In the area of charging mobile services we distinguish two basic terms: mobile billing and mobile payment. We refer to mobile billing as billing of telecommunication services by a mobile network operator or a mobile virtual network operator within an existing billing relationship (Turowski & Pousttchi 2004). We define mobile payment as that type of payment transaction processing in the course of which – within an electronic procedure – (at least) the payer employs mobile communication techniques in conjunction with mobile devices for initiation, authorization or realization of a payment (Pousttchi 2003). Outside mobile commerce, Mobile money transfer services procedure can be understood as a mobile commerce application to complete payments in different situations.

Mobile money risk environment

Money Laundering

All activities to disguise or conceal the nature, source of, or entitlement to money or property, or rights to either, when the money or property or rights are acquired from serious crime, as well as all activities to disguise or conceal money or property that is intended to be used in committing or facilitating the commission of serious crime (George 2003).

Challenges in combating Money laundering:

As telecom firms engage in financial services across shared networks in cross-border jurisdictions, the benefits of mobile payments, ubiquity, and rapid settlement may also increase the risk of money laundering in mobile transfer services (Cynthia 2010).

With potential gaps in regulatory oversight, rogue actors may find it possible to evade detection by dividing a large transfer of funds into small ones using multiple mobile phones and accounts. This new landscape may require a service-based risk analysis by regulators to determine new approaches to the oversight of money laundering risk (Chatain, Hernandez, Borowik, and Zerzan 2008).

Since mobile technology-enabled payments do not require the face-to-face interaction that takes place with traditional banking, a more opaque and anonymous experience is created that may permit the opportunity for criminal activity. This is increasingly important as mobile retail payments can occur rapidly and in cross-border environments (Cynthia 2010).

In some countries, anti-money laundering efforts have focused traditionally on high-value transfers, but in this brave new world, criminals may use mobile technology to evade detection by sending multiple small transfers, using multiple phones and accounts (GSMA 2009).

The use of cellular phones makes it possible for the proceeds of crime or terrorist financing to be transmitted over airwaves (INL 2008). These opaque mobile transfers may move rapidly around the world in a digital format, immune to traditional regulatory oversight. Since there is limited expertise in identifying electronic payments crime in the communication systems, the potential for abuse should be considered.

Solution:

Money-laundering and terrorism-financing mitigation programs require service providers to institute a meaningful KYC process that is trusted by all parties to the mobile payment transaction.

Reporting of suspicious transaction through risk controls.

Another issue is the implementation of money laundering risk controls and suspicious transaction reporting for telecom firms. Compliance with these anti-crime laws is a challenging proposition for telecoms because it represents unfamiliar territory to the telecom industry (GSMA 2008c). Similarly, because telecom regulatory oversight has not included financial services, knowledge of suspicious activity reporting may be limited. Compliance can be complicated further by the fact that in many countries nonbanks may not conduct customer due diligence and “know your customer” procedures because of regulatory restrictions (GSMA 2008d). In the United States, many mobile payment service providers are classified as money transmitters or money service businesses, requiring registration in

individual states where they do business, as well as with the Financial Crimes Enforcement Network (FinCEN);

Privacy and security

The concerns for securing the mobile channel mirror the risks seen in the online environment, including authenticating the consumer’s identity and protecting transmission of data from interception enabled by viruses, malware, and phishing attacks. Anecdotally, the mobile environment to date has been relatively secure compared to the online channel where privacy and security of personal and business data is frequently compromised through the use of malicious computer viruses, identity theft, and phishing schemes (Cynthia 2010).

The diversity of platforms and wide range of operating systems make mobile phones less vulnerable to attack than personal computers (GSMA 2010).

Challenges:

The recent surge in smart phone applications may introduce vulnerabilities to malware attacks, which may increase payments risk going forward as bad actors gain access to personal information stored in the handset or accessed through a phone application (Linck et al. 2006).

The growing use of SMS as a common technology for sending a payments message may demand further examination of the need to strengthen data encryption technology (Pousttchi 2005).

Solution:

Creating transparency is a key consideration in addressing security issues—when consumers have the ready ability to view transaction histories on their handsets, the risk of account fraud and other risks can be avoided or mitigated (Cynthia 2010).

Consumer protections

Telecom-specific consumer protections in most countries,were not created with the need for financial services regulation in mind.

Challenge:

The limitations of traditional financial regulation for emerging mobile commerce may result in gaps in legal governance and ambiguity with respect to the responsibilities and liability among parties involved in the payment service.

The mobile commerce environment will demand that financial regulations be adapted to provide oversight for the proliferation of new services, business models, and nonbank service providers.

New regulatory policy will require a comprehensive understanding of the new risks that mobile transactions introduce to consumers, including lost payments through faulty transmissions, fraudulent transactions, identity theft, or criminal activity on the part of the mobile operator, agent, or other payment service provider. In the United States, for example, the applicability of payment law to mobile payments is unclear since MNOs may not be required to provide consumer protections equivalent to those of the banking industry.

For example, Regulation E governing electronic fund transfers includes any entity that holds consumer accounts or issues a payment access device and provides electronic fund transfer services. While mobile money service providers in the United States typically comply voluntarily with Regulation E and other consumer protection laws, actual enforcement authority is fragmented, according to the state authorities where they are licensed. In the absence of Regulation E protections, it is unclear who will assume responsibility or liability for dispute resolution for billing errors, misdirected payment messages, fraudulent charges stemming from identity theft, or compromised mobile accounts resulting from lost handsets when authentication controls are intercepted. Some of these issues may fall within the scope of the Federal Communications Commission’s Truth in Billing Requirements, but enforcement at this nascent stage will lag product and service deployment.

The GSMA provides general guidance for establishing regulatory environments for MMT that underscores the need to coordinate the consumer protection efforts of both the telecom and financial services industry. The cellular telecommunications trade association has also published best practices for telecoms in financial services as a proactive measure, in order to guide the offering of safe and trusted mobile payments and maintain public confidence.

Roaming fraud

Recent successes in global-standards setting to promote interoperability among carriers have simplified the ability for mobile users to roam across geographic markets. The roaming agreements used by international operators to facilitate voice transfers can now be used to send data in the form of cross-border payments. However, wireless data transmissions may be vulnerable to access by unauthorized parties who identify some means to intercept the communication between mobile devices. The growth in wireless telecom services has led to an increasing number of roaming agreements between telecommunications companies in different countries, enabling the transmission of international remittances via mobile phones. Roaming fraud represents a potential threat to the security of cross-border mobile payments. GSMA has recommended that near-real-time roaming data exchange technology be implemented for all GSMA members in order to reduce the occurrence of roaming fraud. The technology involves faster roaming-activity reporting and requires operators to send roaming data to partners within a prescribed time limit. The data includes key call information that can be analyzed if it is received quickly, in sufficient time to detect and mitigate roaming fraud.

Credit risk

Credit risk may emerge in a postpaid scheme whereby the transaction is applied to the user’s phone bill to be paid later. Possibly because of their lack of experience in managing credit risk associated with financial services, telecoms in global markets have largely focused on providing prepaid services in order to manage liquidity and mitigate risk, particularly in telecom-led models that do not rely on a bank partnership. In most countries, nonbank payment service providers are prohibited from accepting consumer deposits or using funds in financing payment activities, which serves to protect the consumer and limits financial system risk (GSMA 2009). For example, Safaricom’s M-PESA mitigates credit risk by collecting prepaid funds from agents. Safaricom deposits into a trust account managed by a leading Kenyan commercial bank, which provides the legal protection for consumers.

In the United States, new P2P services typically involve an established payment vehicle such as a depository account at a financial institution or a credit card to fund the mobile payment. Programs in which the carrier posts charges to the consumer’s phone bill to be postpaid have been largely limited to micropayments for charitable donations, as in the Haiti relief effort discussed earlier, and for small purchases for ring tones and virtual goods in online games. There is no current evidence to suggest that carriers have an appetite for managing credit risk in MMT.

Mitigating risk in mobile money transfer systems

The risk of anonymity in mobile payments may require new authentication technologies such as voice recognition and fingerprinting to verify identification and to employ appropriate know-your-customer programs, particularly at vulnerable points of a transaction when cash withdrawals may be conducted. The use of more sophisticated control systems to flag unusual account activity, based on a customer’s user profile, will be needed to detect increasingly complex money laundering schemes (Cynthia2010).

Since mobile financial transactions occur rapidly, with funds being sent and received in fractions of a second, payment service providers may not detect suspicious activity in time to suspend a transaction (Pousttchi 2005).

The diversity of platforms and wide range of operating systems make mobile phones less vulnerable to attack than personal computers. The recent surge in smart phone applications may introduce vulnerabilities to malware attacks, which may increase payments risk going forward as bad actors gain access to personal information stored in the handset or accessed through a phone application. Finally, the growing use of SMS as a common technology for sending a payments message may demand further examination of the need to strengthen data encryption technology (Cynthia 2010).

Since the success of any payment system is predicated on ubiquity, convenience, and trust, it is necessary to address emerging risk issues in order to maintain public confidence in mobile money. The risk of anonymity in mobile payments may require new authentication technologies such as voice recognition and fingerprinting to verify identification and to employ appropriate know-your-customer programs, particularly at vulnerable points of a transaction when cash withdrawals may be conducted. The use of more sophisticated control systems to flag unusual account activity, based on a customer’s user profile, will be needed to detect increasingly complex money laundering schemes. Since mobile financial transactions occur rapidly, with funds being sent and received in fractions of a second, payment service providers may not detect suspicious activity in time to suspend a transaction. As mobile commerce advances, it will be necessary for mobile payment service providers to establish integrated systems of internal controls that respond quickly to suspicious activity.

The risk of inadequate regulatory oversight stemming from a lack of understanding about the risk exposure inherent in new mobile payment innovations- results in payment system vulnerabilities. Education and collaboration across organizational jurisdictions and the telecom and financial services industries will be necessary to detect and mitigate criminal activity, fraud, and other payment system risks.

Certain aspects of mobile handset technology may be leveraged to provide more secure transactions—by using identification tools to authenticate the user, for example, thereby reducing the risk associated with anonymous transactions. Digital wallets contained in the mobile handset that are provisioned with a secure element and empowered with multifactor authentication may also provide a more secure payment environment in the future. Location-based services available in smart phone applications may also help payment service providers to authenticate the credentials of mobile users engaging in payments transactions. Finally, transaction limits imposed by carriers and financial institutions based on the customer profile and historical usage can mitigate the risk of unauthorized payments.

23

The security issues in m-payments are confidentiality, authentication, integrity, authorization, and

non-repudiation.

• Confidentiality: In m-payments no-one-else should find out what was purchased and how it was paid.

• Authentication: Merchants and mobile customers must be able to trust the identity claimed.

• Integrity: the value of transactions should not be modified by others, knowingly or unknowingly.

• Authorization: parties involved must be able to verify if everyone involved in a transactions is allowed to make payments.

• Non-repudiation: No one should be able to claim that the financial transaction on his/her behalf was made without their knowledge.

Other, non-security issues include accessibility, convenience, speed, ease-of-use, and standardization.

In addition to security and privacy risks, new vulnerabilities arise in mobile financial applications

because wireless devices are used. These transactions may involve multiple wireless networks

with different levels of security. These networks could lead to possible change/deletion of

information, and denial of service. In such an environment, tracing hackers is a difficult job as

devices move in and out of multiple wireless networks and many United States wireless networks

do not authenticate a particular user to a particular device.

Some support for security is provided by mobile middleware. For example, WAP provides security

using Wireless Transport Security Layer (WTSL), but it does not result in the end-to-end security

(only between device and the WAP gateway). The translation between Secure Sockets Layer

(SSL) and WTSL occurs at the WAP gateway. These gateways are vulnerable to Denial of

Service (DoS) attacks because malicious WML Script may run on a device, thereby making other

existing security techniques (signing, authentication and encryption) less effective. Several United

States-based financial companies and associated vendors in the Financial Services Technology

Corporation (FSTC)2 are working on implementing end-to-end transaction support for financial

applications involving mobile devices, wireless networks, and financial institutions. One of the

major hurdles at present is that end-to-end encryption that is not widely available; however, such

encryption will become possible with widespread deployment and use of WAP 2.0.

It is possible to add some security features for financial services. GSM supports both user (PIN)

and device authentication (SSL). Finnish wireless provider Sonera is offering PKI on a SIM card.

Another possibility is wireless PKI, a system to manage keys and certificates and requires the

user to enter 2 PINs (authentication and digital signature). The WPKI is used in WTSL to support

2-way authentication (anonymous: class 1, server: class 2, user: class 3).

Financial services are supported in I-appli service for iMode phones using a version of Java

designed for small devices. I-appli service provided by DoCoMO in Japan using iMode phones

supports few financial services. To provide security for these services, Secure Socket Layer

(SSL) protocol is used at either 40 or 128 bit versions.

Security will dominate any discussions of m-payments, especially, macro payments. Certainly

more work is needed in addressing specific security requirements of m-payments and new ways

to support m-payment security. It is also possible to introduce location as a constraint in deciding

the limit on the monetary value of m-payments, in addition to other traditional constraints such as

type of user, past history of payments, and credit availability. The wireless network that is

currently being used to make m-payment could also be a factor in limiting the amount of money

that can be transferred by its permanently registered users and roaming users.

2 The Financial Services Technology Consortium (FSTC) is a consortium of North American-based financial

institutions, technology vendors, independent research organizations, and government agencies. Its aim is

to bring forward interoperable, open-standard technologies that provide critical infrastructures for the

financial services industry.

Sub security Definition Enabling Concept/technique

Confidentiality

Property that ensures that transaction

information cannot be viewed by

unauthorized persons. Encryption

Authentication

Property that the transaction information actually originates from the presumed transaction partner. Possession (e.g. of a mobile phone),

knowledge (e.g. of a PIN) und property

(e.g. biometric property)

Integrity

Property that the transaction Information remains intact during transmission and cannot be altered. Digital signatures

Authorization

Property that parties involved must be able to verify if everyone involved in a

transaction is allowed to make the transaction. Digital certificates

Non-repudiation

Property that no one should be able to claim that the transaction on his/her behalf was made without their knowledge.

Digital signatures

Table 1. Sub-goals of objective security according to Merz (2002)

ADDIN ZOTERO_BIBL {“custom”:[]} CSL_BIBLIOGRAPHY

ADDIN ZOTERO_BIBL {“custom”:[]} CSL_BIBLIOGRAPHY

A Poem on the Properties of Water

Name:

Professor:

Course:

Date

A Poem on the Properties of Water

Water exists in more than one state;

And is also a special compound

That acts as a universal solvent,

Found in the oceans, glaciers, and the ground.

Water has some special properties.

Uneven distribution of electron density

That results in polarity

Allowing for covalence and strong cohesion forces.

However, water acts anomalously.

By expanding from degrees four to zero.

This unusual act should be taken seriously

As it protects life; Water’s a hero.

We cannot undermine the benefits of Aitch. Two. Oh.

It sustains every form of life on Mother Earth.

But Pollution has affected water’s natural flow.

We are only waiting on the dreadful aftermath.