Literature Review on Security of Personal Information in Electronic Payments

被引:1
作者
Guan, Yuqing [1 ]
Tick, Andrea [2 ]
机构
[1] Obuda Univ, Doctoral Sch Safety & Secur Sci, Budapest, Hungary
[2] Obuda Univ, Keleti Karoly Fac Business & Management, Budapest, Hungary
来源
18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024 | 2024年
关键词
personal information; electronic payment; security; TECHNOLOGY; ACCEPTANCE;
D O I
10.1109/SACI60582.2024.10619864
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the recent development of e-commerce in recent years, electronic payments, as an emerging payment method, are becoming increasingly prevalent in people's lives. Due to the open nature of the internet, the security of personal information in electronic payments inevitably faces significant challenges within this open network environment. Therefore, the focus of this review is on the research of personal information security in electronic payments, aiming to understand security issues related to individual users in the context of electronic payments. This is a general literature review conducted using the PRISMA systematic literature review method. Through hierarchical screening using the keywords "security" and "information" and "payment", a total of 76 articles related to personal information security in electronic payments were selected. The examination of these 76 papers revealed threats to personal information in electronic payments, including phishing, malicious software, and data breaches. To address these security issues, electronic payment platforms need to implement multi-factor authentication, and biometric technology, and enhance the use of encryption technologies for payment information. As internet technology continues to improve and evolve, an increasing number of users are adopting electronic commerce network payment technologies. In this context, a time-series analysis of the number of electronic payment applications and services or the number of users should be conducted using methods such as Google searches, database searches, and time-series analysis. The study concludes that electronic payments are gradually altering traditional payment methods, making the protection of personal information crucial for users engaging in electronic payment processes.
引用
收藏
页码:533 / 540
页数:8
相关论文
共 50 条
[31]   Intelligent personal assistants: A systematic literature review [J].
Silva, Allan de Barcelos ;
Gomes, Marcio Miguel ;
da Costa, Cristiano Andre ;
Righi, Rodrigo da Rosa ;
Victoria Barbosa, Jorge Luis ;
Pessin, Gustavo ;
De Doncker, Geert ;
Federizzi, Gustavo .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 147
[32]   Narrative review: Social media use by employees and the risk to institutional and personal information security compliance in South Africa [J].
Murire, Obrain T. ;
Flowerday, Stephen ;
Strydom, Kariena ;
Fourie, Christoffel J. S. .
TD-THE JOURNAL FOR TRANSDISCIPLINARY RESEARCH IN SOUTHERN AFRICA, 2021, 17 (01)
[33]   mHealth Application Security and Privacy Concerns a Comprehensive Review of Past Literature [J].
Abu-Seman, Sharidatul-Akma ;
Ramayah, T. .
ADVANCED SCIENCE LETTERS, 2017, 23 (09) :8957-8960
[34]   Security as an emerging dimension of Digital Literacy for education: a systematic literature review [J].
Rocha Estrada, Francisco Javier ;
Enrique George-Reyes, Carlos ;
David Glasserman-Morales, Leonardo .
JOURNAL OF E-LEARNING AND KNOWLEDGE SOCIETY, 2022, 18 (02) :22-33
[35]   Electronic signatures: A brief review of the literature [J].
Srivastava, Aashish .
2006 ICEC: Eighth International Conference on Electronic Commerce, Proceedings: THE NEW E-COMMERCE: INNOVATIONS FOR CONQUERING CURRENT BARRIERS, OBSTACLES AND LIMITATIONS TO CONDUCTING SUCCESSFUL BUSINESS ON THE INTERNET, 2006, :605-609
[36]   Exploring the meaning of usable security - a literature review [J].
Lennartsson, Markus ;
Kavrestad, Joakim ;
Nohlberg, Marcus .
INFORMATION AND COMPUTER SECURITY, 2021, 29 (04) :647-663
[37]   Security in Smart Toys: A Systematic Review of Literature [J].
Pontes, Lara ;
Coutinho, Gustavo ;
Hung, Patrick C. K. ;
Yankson, Benjamin .
DISTRIBUTED, AMBIENT AND PERVASIVE INTERACTIONS, 2019, 11587 :28-38
[38]   Blockchain and Security in the IoT Environments: Literature Review [J].
Arslan, Halil ;
Aslan, Hilal ;
Karki, H. Dogan ;
Yuksel, A. Gurkan .
2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, :254-257
[39]   Bibliometric Analysis of Scientific Literature in Security and Electronic Health Records [J].
Moumouh, Chaimae ;
Yassin Chkouri, Mohamed ;
Fernandez Aleman, Jose Luis .
ADVANCED INTELLIGENT SYSTEMS FOR SUSTAINABLE DEVELOPMENT (AI2SD'2020), VOL 1, 2022, 1417 :442-453
[40]   Information Security Principles for Electronic Medical Record (EMR) Systems [J].
Rahman, Mohammed Sajedur ;
Kreider, Christopher .
AMCIS 2012 PROCEEDINGS, 2012,