Banking Application

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 21240 Experts worldwide ranked by ideXlab platform

Ó Cinnéide Mel - One of the best experts on this subject based on the ideXlab platform.

  • Improving software security using search-based refactoring
    Springer, 2012
    Co-Authors: Ghaith Shadi, Ó Cinnéide Mel
    Abstract:

    Security metrics have been proposed to assess the security of software Applications based on the principles of “reduce attack surface” and “grant least privilege.” While these metrics can help inform the developer in choosing designs that provide better security, they cannot on their own show exactly how to make an Application more secure. Even if they could, the onerous task of updating the software to improve its security is left to the developer. In this paper we present an approach to automated improvement of software security based on search-based refactoring. We use the search-based refactoring platform, Code-Imp, to refactor the code in a fully-automated fashion. The fitness function used to guide the search is based on a number of software security metrics. The purpose is to improve the security of the software immediately prior to its release and deployment. To test the value of this approach we apply it to an industrial Banking Application that has a strong security dimension, namely Wife. The results show an average improvement of 27.5% in the metrics examined. A more detailed analysis reveals that 15.5% of metric improvement results in real improvement in program security, while the remaining 12% of metric improvement is attributable to hitherto undocumented weaknesses in the security metrics themselves

  • Improving software security using search-based refactoring
    'Springer Science and Business Media LLC', 2012
    Co-Authors: Ghaith Shadi, Ó Cinnéide Mel
    Abstract:

    peer-reviewedSecurity metrics have been proposed to assess the security of software Applications based on the principles of “reduce attack surface” and “grant least privilege.” While these metrics can help inform the developer in choosing designs that provide better security, they cannot on their own show exactly how to make an Application more secure. Even if they could, the onerous task of updating the software to improve its security is left to the developer. In this paper we present an approach to automated improvement of software security based on search-based refactoring. We use the search-based refactoring platform, Code-Imp, to refactor the code in a fully-automated fashion. The fitness function used to guide the search is based on a number of software security metrics. The purpose is to improve the security of the software immediately prior to its release and deployment. To test the value of this approach we apply it to an industrial Banking Application that has a strong security dimension, namely Wife. The results show an average improvement of 27.5% in the metrics examined. A more detailed analysis reveals that 15.5% of metric improvement results in real improvement in program security, while the remaining 12% of metric improvement is attributable to hitherto undocumented weaknesses in the security metrics themselves

Azham Hussain - One of the best experts on this subject based on the ideXlab platform.

  • The challenges of mobile Banking Application on novice users
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY (ICAST’18), 2018
    Co-Authors: Azham Hussain, Aysar Thamer, Adilah Matcharan
    Abstract:

    Banks procedures are one of the most monotonous and long activities, bank users would have to waste time to finish tasks that can be done online, although there is a website designed by Maybank but the use of smartphones are ever growing and led to developing the Maybank mobile Application. Maybank mobile Application is designed to mainly cater for users on the go, but as many emerging technologies adopted by developing enterprises, the usability of the Application should be measured to assess user’s overall satisfaction with the Application. A study conducted in UUM Sintok with 15 participants, they were given four tasks to perform and were given questionnaires to elicit their experience. The findings of this study revealed that participants were generally pleased with the functions provided in the Application.

  • Usability Evaluation Model for Mobile Banking Applications Interface: Model Evaluation Process using Experts' Panel
    Journal of Telecommunication Electronic and Computer Engineering, 2016
    Co-Authors: Hamisu Ibrahim Abubakar, Nor Laily Hashim, Azham Hussain
    Abstract:

    Many of the existing usability evaluation models for mobile Applications have not been evaluated to determine its usefulness, accuracy and applicability in to the real world environment. This may not provide confidence on the side of the evaluator and the results may not be comprehensive and valid. A model for evaluating the usability of mobile Banking Applications interface is developed in response to usability practitioners and mBanking Applications developers’ needs. The experts implemented the model using various m-Banking Application platforms through heuristic evaluation method. A list of predefined validation measures were used by the experts’ in order to determine the accuracy and applicability of the proposed model. The results show that the model is useful, accurate and can be used for evaluating the usability of m-Banking Applications interface. Therefore, this paper will benefit both the research community and the usability practitioners towards better understanding of model validation process.

  • Usability Evaluation of M-Banking Application: A Review of Empirical Studies
    Advanced Science Letters, 2016
    Co-Authors: Hamisu Ibrahim Abubakar, Nor Laily Hashim, Azham Hussain
    Abstract:

    Many usability factors for measuring the overall interactions of mobile Applications have been introduced in the literatures, yet such usability factors are not adequately used in the aspect of m-Banking Application.Literature on usability evaluation of m-Banking Application is very limited in the database and this makes usability evaluation more challenging.A new research agenda on this emerging technology needs to be addressed substantially in order to fill the existing gap. The key point of this paper is to review empirical studies on usability evaluation of m-Banking Application and related area.This study was conducted based on numerous databases to condense the omission of relevant studies.Many journals and conference proceedings from higher ranking publications on usability studies were critically examined and reviewed.The results show that many usability factors used are more of general and not appropriate to m-Banking Application.This reveals that more studies are needed in the aspect of producing appropriate usability factors of m-Banking Application evaluation.

  • Evaluating mobile Banking Application: Usability dimensions and measurements
    Proceedings of the 6th International Conference on Information Technology and Multimedia, 2014
    Co-Authors: Azham Hussain, Hamisu Ibrahim Abubakar, Norlaily Binti Hashim
    Abstract:

    Usability has greatly been considered as one of the significant quality attributes to determine the success of mobile Application. Mobile Banking Application is increasingly recognized as an emergent m-commerce Application which dignified to become the giant killer mobile Application arena. However, prominent usability evaluation models for mobile Applications are too general and do not adequately capture the complexities of interacting with m-Banking Application platform. Similarly, there are no sufficient descriptions concerning the relationship between phases and appropriate usability measures for a specific Application. Some banks do not offer m-Banking Application, while those that offer have inadequate functionalities and this shows that their interfaces are still insufficient and not user friendly. To date, usability and measurements for mBanking Application in particular is very limited or even isolated and this makes usability evaluation of m-Banking more of challenging. Consequently, this report proposes to address this matter by proposing a suitable and an appropriate set of usability dimensions and measurements for m-Banking evaluation. The systematic literature review was employed to review relevant journals and conference proceedings. Seven hundred and eight papers were downloaded but merely forty nine papers have been selected and fully reviewed/analysed. Five usability dimensions and twelve relevant criteria (sub-dimensions) have been created that can be used to evaluate m-Banking Application.

Ghaith Shadi - One of the best experts on this subject based on the ideXlab platform.

  • Improving software security using search-based refactoring
    Springer, 2012
    Co-Authors: Ghaith Shadi, Ó Cinnéide Mel
    Abstract:

    Security metrics have been proposed to assess the security of software Applications based on the principles of “reduce attack surface” and “grant least privilege.” While these metrics can help inform the developer in choosing designs that provide better security, they cannot on their own show exactly how to make an Application more secure. Even if they could, the onerous task of updating the software to improve its security is left to the developer. In this paper we present an approach to automated improvement of software security based on search-based refactoring. We use the search-based refactoring platform, Code-Imp, to refactor the code in a fully-automated fashion. The fitness function used to guide the search is based on a number of software security metrics. The purpose is to improve the security of the software immediately prior to its release and deployment. To test the value of this approach we apply it to an industrial Banking Application that has a strong security dimension, namely Wife. The results show an average improvement of 27.5% in the metrics examined. A more detailed analysis reveals that 15.5% of metric improvement results in real improvement in program security, while the remaining 12% of metric improvement is attributable to hitherto undocumented weaknesses in the security metrics themselves

  • Improving software security using search-based refactoring
    'Springer Science and Business Media LLC', 2012
    Co-Authors: Ghaith Shadi, Ó Cinnéide Mel
    Abstract:

    peer-reviewedSecurity metrics have been proposed to assess the security of software Applications based on the principles of “reduce attack surface” and “grant least privilege.” While these metrics can help inform the developer in choosing designs that provide better security, they cannot on their own show exactly how to make an Application more secure. Even if they could, the onerous task of updating the software to improve its security is left to the developer. In this paper we present an approach to automated improvement of software security based on search-based refactoring. We use the search-based refactoring platform, Code-Imp, to refactor the code in a fully-automated fashion. The fitness function used to guide the search is based on a number of software security metrics. The purpose is to improve the security of the software immediately prior to its release and deployment. To test the value of this approach we apply it to an industrial Banking Application that has a strong security dimension, namely Wife. The results show an average improvement of 27.5% in the metrics examined. A more detailed analysis reveals that 15.5% of metric improvement results in real improvement in program security, while the remaining 12% of metric improvement is attributable to hitherto undocumented weaknesses in the security metrics themselves

Mika Hiltunen - One of the best experts on this subject based on the ideXlab platform.

  • placing links in mobile Banking Application
    Human-Computer Interaction with Mobile Devices and Services, 2005
    Co-Authors: Tuuli Hyvarinen, Anne Kaikkonen, Mika Hiltunen
    Abstract:

    This study compares two alternative ways to organize links as navigation elements in mobile Banking Applications. For the comparison, two alternative Banking Applications were tested. The Applications that were tested had the same content but different ways to navigate with links. One of them provided a system where the user was required to use specific menu pages for navigation and where there were no cross-navigation enabling links on content pages. The other Application had cross-navigation enabling links on content pages. The comparison was done by conducting a usability test with 30 test users. The users' performance and subjective feedback were measured in the test. The Application with links hierarchically beneath each other on menu pages and having no cross-navigating links on content pages was considered better by the test users than the Application with cross-navigation enabling links on content pages. In addition to their academic contribution, the study results can guide the development of current mobile Banking services for the participating bank and the development of mobile Application guidelines for the participating handset manufacturer. We also believe that the study results can be generalized over other mobile internet Applications.

  • Mobile HCI - Placing links in mobile Banking Application
    Proceedings of the 7th international conference on Human computer interaction with mobile devices & services - MobileHCI '05, 2005
    Co-Authors: Tuuli Hyvarinen, Anne Kaikkonen, Mika Hiltunen
    Abstract:

    This study compares two alternative ways to organize links as navigation elements in mobile Banking Applications. For the comparison, two alternative Banking Applications were tested. The Applications that were tested had the same content but different ways to navigate with links. One of them provided a system where the user was required to use specific menu pages for navigation and where there were no cross-navigation enabling links on content pages. The other Application had cross-navigation enabling links on content pages. The comparison was done by conducting a usability test with 30 test users. The users' performance and subjective feedback were measured in the test. The Application with links hierarchically beneath each other on menu pages and having no cross-navigating links on content pages was considered better by the test users than the Application with cross-navigation enabling links on content pages. In addition to their academic contribution, the study results can guide the development of current mobile Banking services for the participating bank and the development of mobile Application guidelines for the participating handset manufacturer. We also believe that the study results can be generalized over other mobile internet Applications.

Sergey Butakov - One of the best experts on this subject based on the ideXlab platform.

  • ISDDC - Analysing Data Security Requirements of Android Mobile Banking Application
    Lecture Notes in Computer Science, 2018
    Co-Authors: Shikhar Bhatnagar, Yasir Malik, Sergey Butakov
    Abstract:

    Mobile Banking Applications are at high risk of cyber attacks due to security vulnerabilities in their Application design and underlying operating systems. The Inter-Process Communication mechanism in Android enables Applications to communicate, share data and reuse functionality between them. However, if used incorrectly, it can become an attack surface, which allows malicious Applications to exploit devices and compromise sensitive financial information. In this research, we focused on addressing the intent vulnerabilities by applying a hybrid fuzzing testing technique to analyze the data security requirements of native Android financial Applications. The system first automatically constructs an Application behavior model and later apply hybrid fuzzing to the model to analyze the data leak vulnerabilities. Testing results help to discover the unknown exploitable entry points in the Applications under test.