{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:11:03Z","timestamp":1725865863396},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811027406"},{"type":"electronic","value":"9789811027413"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-2741-3_13","type":"book-chapter","created":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T03:27:31Z","timestamp":1474860451000},"page":"154-162","source":"Crossref","is-referenced-by-count":0,"title":["Mobile Money in the Australasian Region - A Technical Security Perspective"],"prefix":"10.1007","author":[{"given":"Swathi","family":"Parasa","sequence":"first","affiliation":[]},{"given":"Lynn Margaret","family":"Batten","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,27]]},"reference":[{"key":"13_CR1","unstructured":"Dharmapalan, J., Lonergan, N., Price, K., Pilorge, P.: Mobile Money: An Overview for Global Telecommunications Operators, 44 pages. Ernst & Young Global Ltd. (2009)"},{"key":"13_CR2","unstructured":"Coere, B., Walliser, J.: Payment aspects of financial inclusion. Consultative Report by the Committee on Payments and Market Infrastructures, World Bank Group. Published by the Bank for International Settlements and World Bank Group (2015)"},{"key":"13_CR3","unstructured":"Pascual, A., Moeser, M., Marchini, K.: Mobile Authentication in Small Business Banking, November 2015. https:\/\/www.javelinstrategy.com\/coverage-area\/mobile-authentication-small-business-banking"},{"key":"13_CR4","unstructured":"Rajan, M.S.S.: Replication of Financial Inclusion: Opportunities and Challenges \u2013 Indian Bank Experience. Publication of the Bank of India, 7 pages (2007)"},{"issue":"2","key":"13_CR5","first-page":"26","volume":"4","author":"A Niyogi","year":"2012","unstructured":"Niyogi, A., Niyogi, S.: Mobile Money for Unbanked in India. Int. J. Finan. Policy Anal. 4(2), 26\u201335 (2012)","journal-title":"Int. J. Finan. Policy Anal."},{"key":"13_CR6","unstructured":"Bankable Frontier Associates (2010). Mobile Money Regulation in the Philippines, Paper presented to\u00a0Seminar on Regulating Branchless Banking, Windsor, pp. 1\u201315. http:\/\/www.afiglobal.org\/sites\/default\/files\/mobile%20money%20regulation%20in%20the%20philippines.pdf . Retrieved July 2016"},{"key":"13_CR7","unstructured":"Flores-Roux, E., Mariscal, J.: The development of mobile money systems. Centro de Investigaci\u00f3n y Docencia Econ\u00f3micas, Divisi\u00f3n de Administraci\u00f3n P\u00fablica (Centre for Economic Research and Teaching, Division of Public Administration), Number 256, 38 pages (2011)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Chatain, P.: Integrity in mobile phone financial services: measures for mitigating risks from money laundering and terrorist financing. No. 146. World Bank Publications (2008)","DOI":"10.1596\/978-0-8213-7556-3"},{"issue":"2","key":"13_CR9","first-page":"43","volume":"13","author":"N Miura","year":"2011","unstructured":"Miura, N., Hoshino, J., Hirose, J., Fukuzono, T.: Credit Services for the Osaifu-Keitai Mobile Payment System On Open OS Terminals. NTT DOCOMO Tech. J. 13(2), 43\u201348 (2011)","journal-title":"NTT DOCOMO Tech. J."},{"key":"13_CR10","first-page":"24","volume":"V1","author":"DLK Chuen","year":"2015","unstructured":"Chuen, D.L.K., Teo, E.G.: Emergence of FinTech and the LASIC principles. In \u2018Who will disrupt the disruptors?\u2019. J. Finan. Perspect. V1, 24\u201336 (2015)","journal-title":"J. Finan. Perspect."},{"key":"13_CR11","unstructured":"FocusTaiwan: Electronic payment usage remains low in Taiwan: Visa Taiwan (update), June 2014. http:\/\/focustaiwan.tw\/search\/201406300017.aspx?q=cash%20payments%20"},{"key":"13_CR12","unstructured":"Mohammad, A.: The Development of E-Payments and Challenges in Malaysia. In the Development of E-payments and Challenges for Central Banks in the SEACEN Countries edited by Seng, V., Chap. 5, pp. 123\u2013157. The SEACEN Centre (2008)"},{"key":"13_CR13","unstructured":"Lucese, B.: Connected Society: Consumer Barriers to mobile Internet adoption in Asia. Report produced by Global Mobile Communications Asia, 24 pages. http:\/\/www.gsma.com\/mobilefordevelopment\/wp-content\/uploads\/2016\/06\/Consumer-Barriers-to-Mobile-Internet-Adoption-in-Asia.pdf"},{"key":"13_CR14","unstructured":"Reaves, B., Scaife, N., Bates, N., Traynor, P., Butler, K.: Mo(Bile) money, Mo(Bile) problems: analysis of branchless banking applications in the developing world. In: Proceedings of the 24th USENIX Security Symposium, Washington, DC, pp. 17\u201332. USENIX, August 2015"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Moonsamy, V., Batten, L., Shore, M.: Can smartphone users turn off tracking service settings? In: Proceedings of International Conference on Advances in Mobile Computing & Multimedia, 9 pages. ACM (2013)","DOI":"10.1145\/2536853.2536864"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1007\/978-3-319-08344-5_29","volume-title":"Information Security and Privacy","author":"Y Rahulamathavan","year":"2014","unstructured":"Rahulamathavan, Y., Moonsamy, V., Batten, L., Shunliang, S., Rajarajan, M.: An analysis of tracking settings in blackberry 10 and windows phone 8 smartphones. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 430\u2013437. Springer, Heidelberg (2014)"},{"key":"13_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/978-981-10-0251-9_2","volume-title":"Computational Intelligence, Cyber Security and Computational Models","author":"LM Batten","year":"2016","unstructured":"Batten, L.M., Moonsamy, V., Alazab, M.: Smartphone applications, malware and data theft. In: Senthilkumar, M., et al. (eds.) Computational Intelligence, Cyber Security and Computational Models. AISC, vol. 412, pp. 15\u201324. Springer, Singapore (2016)"},{"key":"13_CR18","unstructured":"Singh, M.: Raspberry Pi Mini Computers Vulnerable to Attacks, Company Acknowledges, December 2015. http:\/\/gadgets.ndtv.com\/laptops\/news\/raspberry-pi-mini-computers-vulnerable-to-attacks-company-acknowledges-772661 . Retrieved July 2016"},{"key":"13_CR19","unstructured":"Goodin, D.: Just-released Raspberry Pi 2 can be DoSed by bright flashes of light (2015). http:\/\/arstechnica.com\/security\/2015\/02\/just-released-raspberry-pi-2-can-be-dosed-by-bright-flashes-of-light\/ . Retrieved July 2016"},{"key":"13_CR20","unstructured":"Tung, L.: Hackers can bank on NFC (2012). http:\/\/www.smh.com.au\/it-pro\/security-it\/hackers-can-bank-on-nfc-20120808-23tdt.html . Retrieved July 2016"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Lake, A.J.: Risk management in Mobile Money: Observed risks and proposed mitigants for mobile money operators. Report of the International Finance Corporation, World Bank Group, 22 pages (2013)","DOI":"10.1596\/28420"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Chatain, P., Zerzan, A., Noor, W., Dannaoui, N., de Koker, L.: Protecting Mobile Money against Financial Crimes. Publication of the World Bank, vol. 1(1), pp. 1\u2013195 (2011). http:\/\/www.globalinitiative.net\/download\/financial-crime\/global\/World%20Bank%20-%20Protecting%20Mobile%20Money%20against%20Financial%20Crimes.pdf . Retrieved July 2016","DOI":"10.1596\/978-0-8213-8669-9"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2741-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T00:28:17Z","timestamp":1568420897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2741-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811027406","9789811027413"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2741-3_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}