Misalignment challenges when integrating security requirements into mobile banking application development

نویسنده

  • Memory Machiridza
چکیده

This study identifies and explores the core challenge faced when integrating security requirements into the mobile application software development life cycle. Studies on key issues in Information Systems (IS) have been on-going in the past decades, with security moving up the ranks of top issues in IS. Security requirements can be added into mobile application development processes by practising secure coding or by adding a third party security tool. This study gathered data from a single case study and employs grounded theory methodology to reveal misalignment as the core challenge to integrating security requirements into mobile banking application development. Identified forms of misalignment include that between security requirements and (1) external entities, (2) roles, (3) skills and (4) system requirements. Some of the findings indicate the need for further research. Research indicates that mobile application development follows agile methods for development. Agile methods have been compared with Complex Adaptive Systems (CAS). For this reason, research in IS could benefit from studies that focus on CAS as a theory to provide a better explanation on the misalignment issues in mobile application development. From the current study, the research also identified the need to address misalignment issues before embarking on a project involving integrating of security requirements.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Systematic Literature Review: Security Challenges of Mobile Banking and Payments System

Mobile banking is more easily and fast banking today, but its challenges to payments security system. Many organization or financial institutions are now incorporating mobile banking and financial services as a key component of their growth strategy, and use of the mobile phone to conduct banking and financial services tasks continues to rise among early adopters. Large number of security chall...

متن کامل

Integrated Framework for Information Security in Mobile Banking Service Based on Smart Phone

Since Apple launched the iPhone service in November 2009 in Korea, smartphone banking users are increasing dramatically, forcing lenders to develop new products to deal with such demand. The bank of korea took the lead in jointing together to create a mobile banking application that each bank can adapt for its own use. In providing smartphone services, it is of critical importance to take the p...

متن کامل

Automated Security Testing for Applications Integrating Third-Party Services

Modern applications have become increasingly complex in both function and construction. Commerce websites use inferred user preferences to show relevant merchandise, banking websites implement complex transaction protocols, social networks need to safeguard sensitive user information, and mobile applications incorporate authentication, sharing, and payment mechanisms. Third-party services have ...

متن کامل

Security Architecture for Federated Mobile Cloud Computing

Mobile cloud computing systems are getting increasingly popular because they can facilitate many new applications, such as opportunistic social computing by smartphone users who happen to be at a scene of importance (e.g., disaster rescue), while possibly uploading compute-heavy tasks to the resource-rich clouds. Federated mobile cloud computing further allows to coordinate and optimize the ser...

متن کامل

Towards an Open Ecosystem for Embedded Tamper Resistant Hardware in Mobile Devices

Copyright is held by the author/owner(s). UbiComp ’13 Adjunct, Sept 8-12, 2013, Zurich, Switzerland. ACM 978-1-4503-2139-6/13/09...$15.00. Abstract Insu cient security and privacy level on mobile devices, have made it di cult to utilize sensitive systems like mobile banking, mobile credit cards, mobile ticketing or mobile passports. Solving these challenges in security and privacy, could provid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016