PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Analysis of potential risks of SMS-based authentication

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The pervasive use of mobile devices and the omnipresence of the Internet have ushered in a transformative era. Nearly everyone, regardless of age, possesses a mobile phone, bridging generational gaps in digital interaction. Mobile phones have become highly personal, with users guarding them zealously. Service providers recognize this intimate relationship, offering an opportunity to enhance security. Traditional password-based security is vulnerable to data breaches, prompting the adoption of mobile phones as a more robust platform for safeguarding digital assets. This shift has also facilitated the development of digital identification applications, reducing reliance on physical identity documents. Additionally, mobile banking applications are replacing physical payment cards, enabling secure transactions. The ascendancy of mobile payment solutions is diminishing the role of physical cash and wallets. In summary, mobile devices have reshaped security and daily activities, becoming the cornerstone of our digital existence, offering higher levels of security, convenience, and efficiency.
Rocznik
Tom
Strony
13--25
Opis fizyczny
Bibliogr. 15 poz., rys.
Twórcy
  • University of Information Technology and Management, Poland
  • Rzeszow University of Technology, Department of Complex Systems, Poland
Bibliografia
  • [1] Babusabgari., Balakrishna B. (2021). Exposure and use of digital media among under-five children DOI:https://doi.org/10.18203/2349-3291.ijcp20213315
  • [2] Dębskiego M., Bigaj M. (2019). Ogólnopolskie badanie Młodzi Cyfrowi [Polish national survey “MłodziCyfrowi”]. https://dbamomojzasieg.pl/wp-content/uploads/2019/11/Ogolnopolskie-badanie-Mlodzi-Cyfrowi.pdf
  • [3] Sharma, Akash & Singh, Sunil & Kumar, Sudhakar & Chhabra, Anureet & Gupta, Saksham. (2023). Security of Android Banking Mobile Apps: Challenges and Opportunities. 10.1007/978-3-031-22018-0_39.
  • [4] Ruiz-Martínez, A., Sánchez-Martínez, D., Martínez-Montesinos, M., & F. Gómez-Skarmeta, A. (2007). A Survey of Electronic Signature Solutions in Mobile Devices. Journal of Theoretical and Applied Electronic Commerce Research, 2(3), 94–109. MDPI AG. Retrieved from http://dx.doi.org/10.3390/jtaer2030024
  • [5] Katharina Buchholz (2021). The Most Popular Passwords Around the World https://www.statista.com/chart/16922/most-popular-passwords-2017-and-2018/
  • [6] Aleksandra Grendys (2020). Raport: 89% wycieków danych w firmach to przypadki nieumyślne [Report: 89% of data leaks in companies are unintentional]. https://przemyslprzyszlosci.gov.pl/raport-89-wyciekow-danych-w-polskich-firmach-to-przypadki-nieumyslne/
  • [7] Shukla, Anjali & Chavan, Sameer & R, Srivaramangai. (2023). Spear Watch: A Thorough Examination to Identify Spear Phishing Attacks. International Journal of Innovative Technology and Exploring Engineering. 12. 46-51. 10.35940/ijitee.H9680.0712823.
  • [8] Liu, Enze & Rao, Sumanth & Havron, Sam & Ho, Grant & Savage, Stefan & Voelker, Geoffrey & Mccoy, Damon. (2023). No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proceedings on Privacy Enhancing Technologies. 2023. 207-224. 10.56553/popets-2023-0013.
  • [9] Grabowska B., Seń M., Klisowska I. (2021). E-prescription in Poland – a preliminary report. 151-156. doi: 10.15503/emet2020.151.156.
  • [10] Eysymontt, Małgorzata. (2022). The “mObywatel” application as a sign of the increase of informatisation of the Polish society – critical remarks on the practical applicability of the tool. Acta Iuridica Resoviensia. 38. 57-74. 10.15584/actaires.2022.3.4.
  • [11] Albesher AS. Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites. Sustainability. 2023; 15(14):11043. https://doi.org/10.3390/su151411043
  • [12] Natamiharja, Rudi. 2018. “A Case Study on Facebook Data Theft in Indonesia”. Fiat Justisia: Jurnal Ilmu Hukum 12 (3):206-23. https://doi.org/10.25041/fiatjustisia.v12no3.1312.
  • [13] Snehal Manohar Awale | Dr. Praveen Gupta "Awareness of Sim Swap Attack" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4, June 2019, pp.995-997, URL: https://www.ijtsrd.com/papers/ijtsrd23982.pdf
  • [14] Novanema D. (2021). Short Message Services (SMS) Fraud Against Mobile Telephone Provider Consumer Review From Law Number 8 Of 1999 Concerning Consumer Protection. Journal of Law Science. 3. 36-43. 10.35335/jls.v3i1.1654.
  • [15] Reynolds J., Smith T., Reese K., Dickinson L., Ruoti S., Seamons K. (2018). A Tale of Two Studies: The Best and Worst of YubiKey Usability. 872-888. 10.1109/SP.2018.00067.
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-88c5c747-7f40-40fa-8fcc-5ced6704329e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.