Literature Review on Security of Personal Information in Electronic Payments

被引:1
作者
Guan, Yuqing [1 ]
Tick, Andrea [2 ]
机构
[1] Obuda Univ, Doctoral Sch Safety & Secur Sci, Budapest, Hungary
[2] Obuda Univ, Keleti Karoly Fac Business & Management, Budapest, Hungary
来源
18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024 | 2024年
关键词
personal information; electronic payment; security; TECHNOLOGY; ACCEPTANCE;
D O I
10.1109/SACI60582.2024.10619864
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the recent development of e-commerce in recent years, electronic payments, as an emerging payment method, are becoming increasingly prevalent in people's lives. Due to the open nature of the internet, the security of personal information in electronic payments inevitably faces significant challenges within this open network environment. Therefore, the focus of this review is on the research of personal information security in electronic payments, aiming to understand security issues related to individual users in the context of electronic payments. This is a general literature review conducted using the PRISMA systematic literature review method. Through hierarchical screening using the keywords "security" and "information" and "payment", a total of 76 articles related to personal information security in electronic payments were selected. The examination of these 76 papers revealed threats to personal information in electronic payments, including phishing, malicious software, and data breaches. To address these security issues, electronic payment platforms need to implement multi-factor authentication, and biometric technology, and enhance the use of encryption technologies for payment information. As internet technology continues to improve and evolve, an increasing number of users are adopting electronic commerce network payment technologies. In this context, a time-series analysis of the number of electronic payment applications and services or the number of users should be conducted using methods such as Google searches, database searches, and time-series analysis. The study concludes that electronic payments are gradually altering traditional payment methods, making the protection of personal information crucial for users engaging in electronic payment processes.
引用
收藏
页码:533 / 540
页数:8
相关论文
共 50 条
[41]   Privacy of electronic health records: a review of the literature [J].
Gariepy-Saper, Katherine ;
Decarie, Nicholas .
JOURNAL OF THE CANADIAN HEALTH LIBRARIES ASSOCIATION, 2021, 42 (01) :74-84
[42]   Reach on the Personal Information Circulation and Its Legal Protection in Electronic Commerce [J].
Ye, Yajie .
PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ESTIMATION, DETECTION AND INFORMATION FUSION ICEDIF 2015, 2015, :152-156
[43]   The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran [J].
Shahri, Ahmad Bakhtiyari ;
Ismail, Zuraini ;
Mohanna, Shahram .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
[44]   A systematic literature review on the effect of information systems on the performance of government officials [J].
Kasim, Mohamad Kamil Mohamad ;
Awang, Azahan ;
Jaafar, Mokhtar .
INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2024, 11 (03) :46-54
[45]   A Review of the Empirical Literature on Service Robots in Information Systems Literature [J].
Premathilake, Gehan W. ;
Li, Hongxiu ;
Liu, Yong ;
Helander, Nina .
PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS - PACIS 2021, 2021,
[46]   A Human-Security Robot Interaction Literature Review [J].
Ye, Xin ;
Robert, Lionel P. .
ACM TRANSACTIONS ON HUMAN-ROBOT INTERACTION, 2025, 14 (02)
[47]   Security Issues in Fog Environment: A Systematic Literature Review [J].
Jasleen Kaur ;
Alka Agrawal ;
Raees Ahmad Khan .
International Journal of Wireless Information Networks, 2020, 27 :467-483
[48]   Research communities in cyber security: A comprehensive literature review [J].
Katsikeas, Sotirios ;
Johnson, Pontus ;
Ekstedt, Mathias ;
Lagerstrom, Robert .
COMPUTER SCIENCE REVIEW, 2021, 42
[49]   Security Issues in Fog Environment: A Systematic Literature Review [J].
Kaur, Jasleen ;
Agrawal, Alka ;
Khan, Raees Ahmad .
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (03) :467-483
[50]   Security testing for web applications: A Systematic Literature Review [J].
Dominguez-Garcia, Antonio de Jesus ;
Limon, Xavier ;
Ocharan-Hernandez, Jorge Octavio ;
Perez-Arriaga, Juan Carlos .
2023 11TH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION, CONISOFT 2023, 2023, :82-91