Skip to main content
Erschienen in: Wireless Personal Communications 4/2018

07.04.2017

A Study on Financing Security for Smartphones Using Text Mining

verfasst von: Joung-Hae Seo, Eun-Mi Park

Erschienen in: Wireless Personal Communications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the emergence of smartphones, our lives have considerably changed. A smartphone has not only conventional calling, text-messaging, and photo-taking functions, but also performs many other functions by executing apps. In particular, more financial transactions using smartphone have recently become possible. With the global rapid rise in smartphone users and an ever-growing time and frequency of smartphone use, smartphones have become a target of malicious attacks. As a result, the damage caused by personal information leakage, phishing, and pharming has occurred more frequently. In this respect, however, very few studies have previously used crawling and text mining techniques, which have been actively studied quite recently; furthermore, network analysis has rarely been conducted. In this context, the present study collected the data from 2014 to the first half of 2016 on the trends of safe financing via smartphone with the crawling technique and analyzed the collected data with the text mining Technique. Our results suggest that there was a difference in the use of important keywords related to smartphone financial security, on the year-on-year basis. This suggests that an increasing number of financial services provided using smartphones should be accompanied by the elaboration of safe smartphone financial security services. In addition, for the sake smartphone financial security, not only manufacturers, but also banks, i.e. service providers, and users must pay specific attention to security issues.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Park, S. T., Kim, Y. R., Jeong, S. P., Hong, C. I., & Kang, T. G. (2016). A case study on effective technique of distributed data storage for big data processing in the wireless internet environment. Wireless Personal Communications, 86(1), 239–253.CrossRef Park, S. T., Kim, Y. R., Jeong, S. P., Hong, C. I., & Kang, T. G. (2016). A case study on effective technique of distributed data storage for big data processing in the wireless internet environment. Wireless Personal Communications, 86(1), 239–253.CrossRef
2.
Zurück zum Zitat Jin, H., Li, G., Park, S. T., & Zhu, J. (2016). The effects of consumer characteristics on information searching behavior in wireless mobile SNS: Using SEM analysis. Wireless Personal Communications. doi:10.1007/s11277-016-3523-2. Jin, H., Li, G., Park, S. T., & Zhu, J. (2016). The effects of consumer characteristics on information searching behavior in wireless mobile SNS: Using SEM analysis. Wireless Personal Communications. doi:10.​1007/​s11277-016-3523-2.
3.
Zurück zum Zitat Park, S. T., Park, E. M., Seo, J. H., & Li, G. (2016). Factors affecting the continuous use of cloud service: Focused on security risks. Cluster Computing, 19(1), 485–495.CrossRef Park, S. T., Park, E. M., Seo, J. H., & Li, G. (2016). Factors affecting the continuous use of cloud service: Focused on security risks. Cluster Computing, 19(1), 485–495.CrossRef
4.
Zurück zum Zitat Park, S. T., Im, H., & Noh, K. S. (2016). A study on factors affecting the adoption of LTE mobile communication service: The case of South Korea. Wireless Personal Communications, 86(1), 217–237.CrossRef Park, S. T., Im, H., & Noh, K. S. (2016). A study on factors affecting the adoption of LTE mobile communication service: The case of South Korea. Wireless Personal Communications, 86(1), 217–237.CrossRef
6.
Zurück zum Zitat Kwak, Y. A. (2013). A study on smartphone’s phishing cases and security. Journal of KECRA, 14(1), 3–24. Kwak, Y. A. (2013). A study on smartphone’s phishing cases and security. Journal of KECRA, 14(1), 3–24.
8.
Zurück zum Zitat Kim, J. H., & Kim, T. H. (2013). A study on security system of banking application in open environment on smartphones. Review of KIISC, 23(1), 28–34. Kim, J. H., & Kim, T. H. (2013). A study on security system of banking application in open environment on smartphones. Review of KIISC, 23(1), 28–34.
9.
Zurück zum Zitat Seo, H. J., & Kim, H. W. (2015). Design and implementation of physical secure card for financial security. Journal of the Korea Institute of Information and Communication Engineering, 19(4), 855–863.CrossRef Seo, H. J., & Kim, H. W. (2015). Design and implementation of physical secure card for financial security. Journal of the Korea Institute of Information and Communication Engineering, 19(4), 855–863.CrossRef
10.
Zurück zum Zitat Min, H. Y., Park, J. H., Lee, D. H., & Kim, I. S. (2014). Outlier detection method for mobile banking with user input pattern and E-finance transaction pattern. Journal of Korean Society for Internet Information, 15(1), 157–170. Min, H. Y., Park, J. H., Lee, D. H., & Kim, I. S. (2014). Outlier detection method for mobile banking with user input pattern and E-finance transaction pattern. Journal of Korean Society for Internet Information, 15(1), 157–170.
11.
Zurück zum Zitat Kim, D. Y., & Cho, S. M. (2015). A proposal of smart phone app for preventing smishing attack. Journal of Security Engineering, 12(3), 207–220.CrossRef Kim, D. Y., & Cho, S. M. (2015). A proposal of smart phone app for preventing smishing attack. Journal of Security Engineering, 12(3), 207–220.CrossRef
12.
Zurück zum Zitat Song, J. G., Kim, T. Y., Lee, H. J., & Jang, W. T. (2012). A new password authentication scheme using two-way password in smartphone banking. The Journal of the Institute of Internet, Broadcasting and Communication, 12(3), 195–200.CrossRef Song, J. G., Kim, T. Y., Lee, H. J., & Jang, W. T. (2012). A new password authentication scheme using two-way password in smartphone banking. The Journal of the Institute of Internet, Broadcasting and Communication, 12(3), 195–200.CrossRef
13.
Zurück zum Zitat Noh, K. S. (2016). A study on the authentication and security of financial settlement using the finger vein technology in wireless internet environment. Wireless Personal Communications, 89(3), 761–775.MathSciNetCrossRef Noh, K. S. (2016). A study on the authentication and security of financial settlement using the finger vein technology in wireless internet environment. Wireless Personal Communications, 89(3), 761–775.MathSciNetCrossRef
14.
Zurück zum Zitat Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications. doi:10.1007/s11277-016-3393-7. Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications. doi:10.​1007/​s11277-016-3393-7.
15.
Zurück zum Zitat Choi, J. S., Kim, T. H., Min, S. S., & Seung, J. M. (2013). Smartphone based banking application protection technology trends for integrity verification. Review of KIISC, 23(1), 54–60. Choi, J. S., Kim, T. H., Min, S. S., & Seung, J. M. (2013). Smartphone based banking application protection technology trends for integrity verification. Review of KIISC, 23(1), 54–60.
16.
Zurück zum Zitat Choi, S. H., Kim, K. S., Seol, H. K., Yang, D. W., & Lee, D. H. (2010). A study on problem and improvement of legal and policy framework for smartphone electronic finance transaction—Focused on electronic financial transaction act. Journal of The Korea Institute of Information Security and Cryptology, 20(6), 67–81. Choi, S. H., Kim, K. S., Seol, H. K., Yang, D. W., & Lee, D. H. (2010). A study on problem and improvement of legal and policy framework for smartphone electronic finance transaction—Focused on electronic financial transaction act. Journal of The Korea Institute of Information Security and Cryptology, 20(6), 67–81.
17.
Zurück zum Zitat Park, E. Y., & Yoon, J. W. (2014). A study of accident prevention effect through anomaly analysis in E-banking. The Journal of Society for e-Business Studies, 19(4), 119–134.CrossRef Park, E. Y., & Yoon, J. W. (2014). A study of accident prevention effect through anomaly analysis in E-banking. The Journal of Society for e-Business Studies, 19(4), 119–134.CrossRef
18.
Zurück zum Zitat Jeong, D. Y., Lee, K. B., & Park, T. H. (2014). A study on improving the electronic financial fraud prevention service: Focusing on an analysis of electronic financial fraud cases in 2013. Journal of the Korea Institute of Information Security & Cryptology, 24(6), 1243–1261.CrossRef Jeong, D. Y., Lee, K. B., & Park, T. H. (2014). A study on improving the electronic financial fraud prevention service: Focusing on an analysis of electronic financial fraud cases in 2013. Journal of the Korea Institute of Information Security & Cryptology, 24(6), 1243–1261.CrossRef
19.
Zurück zum Zitat Park, K. Y., & Seo, J. H. (2014). Research on information security technology trends smartphone. In Proceedings of symposium of the Korean Institute of communications and information sciences, pp. 305–306. Park, K. Y., & Seo, J. H. (2014). Research on information security technology trends smartphone. In Proceedings of symposium of the Korean Institute of communications and information sciences, pp. 305–306.
20.
Zurück zum Zitat Park, S. S. (2012). A study on recent trends in security technologies for payments on smartphones. Communications of the Korean Institute of Information Scientists and Engineers, 30(1), 54–59. Park, S. S. (2012). A study on recent trends in security technologies for payments on smartphones. Communications of the Korean Institute of Information Scientists and Engineers, 30(1), 54–59.
21.
Zurück zum Zitat Park, D. W. (2015). Analysis of mobile smishing hacking trends and security measures. Journal of the Korea Institute of Information and Communication Engineering, 19(11), 2615–2622.CrossRef Park, D. W. (2015). Analysis of mobile smishing hacking trends and security measures. Journal of the Korea Institute of Information and Communication Engineering, 19(11), 2615–2622.CrossRef
22.
Zurück zum Zitat Sa, J. H., & Lee, S. J. (2012). Real-time phishing site detection method. Journal of the Korea Institute of Information Security & Cryptology, 22(4), 819–825. Sa, J. H., & Lee, S. J. (2012). Real-time phishing site detection method. Journal of the Korea Institute of Information Security & Cryptology, 22(4), 819–825.
23.
Zurück zum Zitat Park, K. H., Lee, J. H., & Cho, H. J. (2012). Countermeasure against social technologic attack using privacy input-detection. The Journal of the Korea Contents Association, 12(5), 32–39.CrossRef Park, K. H., Lee, J. H., & Cho, H. J. (2012). Countermeasure against social technologic attack using privacy input-detection. The Journal of the Korea Contents Association, 12(5), 32–39.CrossRef
24.
Zurück zum Zitat Lee, S. H., Kim, S. H., Kang, J. I., Byun, J. S., Nyang, D. H., & Lee, K. H. (2013). A method of enhancing security of internet banking service using contents: Based CAPTCHA. Journal of the Korea Institute of Information Security & Cryptology, 23(4), 571–583.CrossRef Lee, S. H., Kim, S. H., Kang, J. I., Byun, J. S., Nyang, D. H., & Lee, K. H. (2013). A method of enhancing security of internet banking service using contents: Based CAPTCHA. Journal of the Korea Institute of Information Security & Cryptology, 23(4), 571–583.CrossRef
25.
Zurück zum Zitat Lee, J. H., Park, M. H., & Jung, S. H. (2013). OTP-based transaction verification protocol using PUFs. The Journal of the Korean Institute of Communication Science B, 38(6), 492–500. Lee, J. H., Park, M. H., & Jung, S. H. (2013). OTP-based transaction verification protocol using PUFs. The Journal of the Korean Institute of Communication Science B, 38(6), 492–500.
26.
Zurück zum Zitat Park, E. M., Seo, J. H., & Ko, M. H. (2016). The effects of leadership by types of soccer instruction on big data analysis. Cluster Computing, 19(3), 1647–1658.CrossRef Park, E. M., Seo, J. H., & Ko, M. H. (2016). The effects of leadership by types of soccer instruction on big data analysis. Cluster Computing, 19(3), 1647–1658.CrossRef
Metadaten
Titel
A Study on Financing Security for Smartphones Using Text Mining
verfasst von
Joung-Hae Seo
Eun-Mi Park
Publikationsdatum
07.04.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4121-7

Weitere Artikel der Ausgabe 4/2018

Wireless Personal Communications 4/2018 Zur Ausgabe

Neuer Inhalt