{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:35:28Z","timestamp":1773797728804,"version":"3.50.1"},"reference-count":72,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:00:00Z","timestamp":1591574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the usage and acceptance of mobile money has mostly been low due to security issues and challenges associated with the system. As a result, there is a need to carry out a survey to evaluate the key security issues associated with mobile money systems in Uganda. The study employed a descriptive research design, and stratified random sampling technique to group the population. Krejcie and Morgan\u2019s formula was used to determine the sample size for the study. The collection of data was through the administration of structured questionnaires, where 741 were filled by registered mobile money (MM) users, 447 registered MM agents, and 52 mobile network operators\u2019 (MNOs) IT officers of the mobile money service providers (MMSPs) in Uganda. The collected data were analyzed using RStudio software. Statistical techniques like descriptive analysis and Pearson Chi-Square test was used in data analysis and mean (M) &gt; 3.0 and p-value &lt; 0.05 were considered statistically significant. The findings revealed that the key security issues are identity theft, authentication attack, phishing attack, vishing attack, SMiShing attack, personal identification number (PIN) sharing, and agent-driven fraud. Based on these findings, the use of better access controls, customer awareness campaigns, agent training on acceptable practices, strict measures against fraudsters, high-value transaction monitoring by the service providers, developing a comprehensive legal document to run mobile money service, were some of the proposed mitigation measures. This study, therefore, provides a baseline survey to help MNO and the government that would wish to implement secure mobile money systems.<\/jats:p>","DOI":"10.3390\/info11060309","type":"journal-article","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T04:19:39Z","timestamp":1591676379000},"page":"309","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3234-6420","authenticated-orcid":false,"given":"Guma","family":"Ali","sequence":"first","affiliation":[{"name":"Department of Information Technology Development and Management (ITDM), Nelson Mandela African Institution of Science and Technology, 447 Arusha, Tanzania"}]},{"given":"Mussa","family":"Ally Dida","sequence":"additional","affiliation":[{"name":"Department of Information Technology Development and Management (ITDM), Nelson Mandela African Institution of Science and Technology, 447 Arusha, Tanzania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0865-9737","authenticated-orcid":false,"given":"Anael","family":"Elikana Sam","sequence":"additional","affiliation":[{"name":"Department of Communication Science and Engineering (CoSE), Nelson Mandela African Institution of Science and Technology (NM-AIST), 447 Arusha, Tanzania"}]}],"member":"1968","published-online":{"date-parts":[[2020,6,8]]},"reference":[{"key":"ref_1","unstructured":"Bank of Uganda (BoU) (2018). Bank of Uganda Annual Report 2017\/18, Bank of Uganda. Available online: https:\/\/www.bou.or.ug\/bou\/media\/statements\/Bank-of-Uganda-releases-Annual-Report-2017-2018.html."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Talom, F.S.G., and Tengeh, R.K. (2019). The Impact of Mobile Money on the Financial Performance of the SMEs in Douala, Cameroon. Sustainability, 12.","DOI":"10.3390\/su12010183"},{"key":"ref_3","unstructured":"Global System for Mobile Communications (GSMA) (2018, July 20). The Mobile Economy Sub-Saharan Africa 2018. Available online: www.gsma.com\/mobilemoney."},{"key":"ref_4","unstructured":"Thenerve (2019, May 10). Coins.ph, GCash, GrabPay, PayMaya: Who\u2019s Leading the Mobile Payments War in PH?. Available online: https:\/\/www.rappler.com\/brandrap\/data-stories\/225782-mobile-payments-leading-philippines."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/su9122233","article-title":"Examining Trust and Risk in Mobile Money Acceptance in Uganda","volume":"9","author":"Baganzi","year":"2017","journal-title":"Sustainability"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Hove, L.V., and Dubus, A. (2019). M-PESA and Financial Inclusion in Kenya: Of Paying Comes Saving?. Sustainability, 11.","DOI":"10.3390\/su11030568"},{"key":"ref_7","first-page":"9","article-title":"Improving Mobile Money Security with Two-Factor Authentication","volume":"109","author":"Mtaho","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Castle, S., Pervaiz, F., Weld, G., Roesner, F., and Anderson, R. (2016, January 18\u201320). Let\u2019s talk money: Evaluating the security challenges of mobile money in the developing world. Proceedings of the 7th Annual Symposium on Computing for Development (ACM DEV\u201916), New York, NY, USA.","DOI":"10.1145\/3001913.3001919"},{"key":"ref_9","unstructured":"Bosamia, M.P. (2017, January 1\u20132). Mobile Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures. Proceedings of the 2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp-2017), Changa, India."},{"key":"ref_10","unstructured":"Uganda Communications Commission (UCC) (2019). Telecommunications, Broadcasting and Postal Markets Industry Report Q2 (April\u2013June) 2019, UCC."},{"key":"ref_11","unstructured":"Bank of Uganda (BoU) (2019). Bank of Uganda (BoU) Annual Report-2018\/19, Bank of Uganda."},{"key":"ref_12","unstructured":"Okeleke, K. (2019). Uganda: Driving Inclusive Socio-Economic Progress through Mobile-Enabled Digital Transformation, GSMA."},{"key":"ref_13","first-page":"1","article-title":"Securing Mobile money services in Tanzania: A Case of Vodacom M-Pesa","volume":"2","author":"Mtaho","year":"2014","journal-title":"Int. J. Comput. Sci. Netw. Solut."},{"key":"ref_14","unstructured":"United Nations (2012). Mobile Money for Business Development in the East African Community, United Nations."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1177\/0266666918788908","article-title":"A skills perspective on the adoption and use of mobile money services in Uganda","volume":"35","author":"Kiconco","year":"2018","journal-title":"Inf. Dev."},{"key":"ref_16","first-page":"45","article-title":"Mobile Money: M-Pesa in Uganda","volume":"4","author":"Kumar","year":"2016","journal-title":"Intercont. J. Financ. Res. Rev."},{"key":"ref_17","first-page":"1","article-title":"A Pathway to Financial Inclusion: Mobile Money and Individual Savings in Uganda","volume":"127","author":"Lwanga","year":"2016","journal-title":"Econ. Policy Res. Centre EPRC"},{"key":"ref_18","unstructured":"Alliance for Financial Inclusion (AFI) (2019). Uganda\u2019s Journey to Inclusive Finance through Digital Financial Services, Alliance for Financial Inclusion."},{"key":"ref_19","first-page":"2321","article-title":"Challenges Facing Penetration of New Mobile Money Transfer Services in Nairobi","volume":"6","author":"Nyaga","year":"2015","journal-title":"IOSR J. Econ. Financ. IOSR-JEF"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"84","DOI":"10.9790\/487X-1810058494","article-title":"Factors Influencing the Adoption of Mobile Money Transfer Strategy in Telecommunication Industry in Kenya: A Case of Safaricom\u2013Kenya Ltd.","volume":"18","author":"Maitai","year":"2016","journal-title":"IOSR J. Bus. Manag. IOSR-JBM"},{"key":"ref_21","unstructured":"Bank of Uganda (BoU) (2017). State of the Industry Report on Mobile Money. Decade Edition: 2006\u20132016, Bank of Uganda."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"433","DOI":"10.21917\/ijms.2017.0058","article-title":"Examining Determinants of Behavioral Intention in Adoption of Mobile Money Transfer Services in Uganda","volume":"3","author":"Ismail","year":"2017","journal-title":"ICTACT J. Manag. Stud."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Kikulwe, E.M., Fischer, E., and Qaim, M. (2014). Mobile money, smallholder farmers, and household welfare in Kenya. PLoS ONE, 9.","DOI":"10.1371\/journal.pone.0109804"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MITP.2014.38","article-title":"Mobile-Money Benefits and Usage: The Case of M-PESA","volume":"16","author":"Mugambi","year":"2014","journal-title":"IT Prof."},{"key":"ref_25","first-page":"40","article-title":"A Universal Mobile Money Transfer Platform","volume":"175","author":"Mwangi","year":"2017","journal-title":"Int. J. Comput. Appl."},{"key":"ref_26","first-page":"1","article-title":"Social Network Effects on Mobile Money Adoption in Uganda Social Network Effects on Mobile Money Adoption in Uganda","volume":"388","author":"Murendo","year":"2018","journal-title":"J. Dev. Stud."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Saxena, S., Vyas, S., Kumar, B.S., and Gupta, S. (2019, January 4\u20136). Survey on Online Electronic Payments Security. Proceedings of the 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates.","DOI":"10.1109\/AICAI.2019.8701353"},{"key":"ref_28","unstructured":"Nyaga, K.M. (2013). The Impact of Mobile Money Services on the Performance of Small and Medium Enterprises in an Urban Town in Kenya. [Master\u2019s Thesis, KCA University]."},{"key":"ref_29","first-page":"1","article-title":"ICT Infrastructure, Mobile Money Systems and Customer Satisfaction in Uganda","volume":"1","author":"Kyeyune","year":"2012","journal-title":"Int. Sci. Res. J."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"498","DOI":"10.9734\/BJEMT\/2013\/4670","article-title":"An Analysis of the Factors Influencing Consumers\u2019 Adoption of Mobile Money Transfer Services (MMTs) in Masvingo Urban Zimbabwe","volume":"3","author":"Marumbwa","year":"2013","journal-title":"Br. J. Econ. Manag. Trade"},{"key":"ref_31","unstructured":"Dharmapalam, J., Lonergan, N., Price, K., and Pilorge, P. (2009). Mobile Money: An Overview for Global Telecommunication Operators, Ernst & Young Global Ltd."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Jack, W., and Suri, T. (2011). Mobile Money: The Economics of M-PESA, Georgetown University. NBER Working Paper.","DOI":"10.3386\/w16721"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/j.1681-4835.2017.tb00615.x","article-title":"Policies, Regulations and Procedures and Their Effects on Mobile Money Systems in Uganda","volume":"83","author":"Kanobe","year":"2017","journal-title":"Electron. J. Inf. Syst. Dev. Ctries."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Hu, X., Li, W., Hu, Q., and Hu, X. (2008, January 7\u201310). Are Mobile Payment and Banking the Killer Apps for Mobile Commerce?. Proceedings of the 41st Hawaii International Conference on System Sciences, Waikoloa, HI, USA.","DOI":"10.1109\/HICSS.2008.69"},{"key":"ref_35","unstructured":"CISCO (2012). MTN Mobile Money Services, CISCO."},{"key":"ref_36","first-page":"8","article-title":"A comparative study of critical success factors (csfs) in implementation of mobile money transfer services in Kenya","volume":"2","author":"Khaemba","year":"2014","journal-title":"Eur. J. Eng. Technol."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"121","DOI":"10.5296\/bms.v7i2.10069","article-title":"Risks and Barriers Associated with Mobile Money Transactions in Tanzania","volume":"7","author":"Gwahula","year":"2016","journal-title":"Bus. Manag. Strategy"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3092368","article-title":"Mo(bile) money, mo(bile) problems: Analysis of branchless banking applications","volume":"20","author":"Reaves","year":"2017","journal-title":"ACM Trans. Priv. Secur."},{"key":"ref_39","first-page":"300","article-title":"Control of Fraud on Mobile money services in Ghana: An exploratory study","volume":"22","author":"Andoh","year":"2018","journal-title":"J. Money Laund. Control"},{"key":"ref_40","unstructured":"Trulioo (2019, May 23). Emerging Fraud Risk in the Mobile Wallet Ecosystem. Available online: https:\/\/www.trulioo.com\/blog\/emerging-fraud-risk-in-the-mobile-wallet-ecosystem\/."},{"key":"ref_41","unstructured":"Buku, M., and Mazer, R. (2019, December 18). Fraud in Mobile Financial Services: Protecting Consumers, Providers, and the System. Available online: http:\/\/www.cgap.org\/publications\/fraud-mobile-financial-services."},{"key":"ref_42","unstructured":"Mudiri, L.J. (2019, April 18). Fraud in Mobile Financial Services. Available online: http:\/\/www.microsave.net\/files\/pdf\/RP151_Fraud_in_Mobile_Financial_Services_JMudiri.pdf."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"243","DOI":"10.19101\/IJATEE.2018.544003","article-title":"Assessment of vulnerabilities of the biometric template protection mechanism","volume":"5","author":"Taban","year":"2018","journal-title":"Int. J. Adv. Technol. Eng. Explor."},{"key":"ref_44","unstructured":"Gilman, L., and Joyce, M. (2020, January 18). Managing the Risk of Fraud in Mobile Money. Available online: http:\/\/www.gsma.com\/mmu."},{"key":"ref_45","unstructured":"Lonie, S. (2019, October 25). Fraud Risk Management for Mobile Money: An Overview. Available online: https:\/\/www.chyp.com\/wp-content\/uploads\/2018\/06\/Fraud-Risk-Management-for-MM-31.07.2017.pdf."},{"key":"ref_46","first-page":"4","article-title":"Enhanced Security Model for Mobile Banking Systems in Tanzania","volume":"1","author":"Nyamtiga","year":"2013","journal-title":"Int. J. Technol. Enhanc. Emerg. Eng. Res."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Phipps, R., Mare, S., Ney, P., Webster, J., and Heimerl, K. (2018, January 20\u201322). ThinSIM-based Attacks on Mobile Money Systems. Proceedings of the COMPASS \u201918: ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), New York, NY, USA.","DOI":"10.1145\/3209811.3209817"},{"key":"ref_48","first-page":"73","article-title":"Vishing Attacks on Mobile Platform in Nairobi County Kenya","volume":"5","author":"Maseno","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci. Technol."},{"key":"ref_49","unstructured":"Kigen, P.M., Kimani, C., Mwangi, M., Shiyayo, B., Ndegwa, D., Kaimba, B., and Shitanda, S. (2015). Kenya Cyber Security Report 2015, Serianu Ltd."},{"key":"ref_50","unstructured":"Kisekka, J.I. (2019, June 10). MTN Uganda Issues a Statement on Mobile Money Fraudulent Withdrawals. Available online: https:\/\/www.dignited.com\/45203\/mtn-statement-mobile-money-fraud-withdrawals\/."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"58","DOI":"10.3390\/data4020058","article-title":"Evaluation of Users\u2019 Knowledge and Concerns of Biometric Passport Systems","volume":"4","author":"Taban","year":"2019","journal-title":"Data"},{"key":"ref_52","unstructured":"Mahajan, R., Saran, J., and Rajagopalan, A. (2015). Mitigating Emerging Fraud Risks in the Mobile Money Industry, Deloitte."},{"key":"ref_53","first-page":"1205","article-title":"Study of Cybercrime in Banking and Financial Sectors","volume":"3","author":"Balasubramanian","year":"2018","journal-title":"Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol."},{"key":"ref_54","unstructured":"Alhassan, N.S., Yusuf, M.O., Karmanje, A.R., and Alam, M. (2018, January 14\u201316). Salami Attacks and their Mitigation\u2014An Overview. Proceedings of the 2018 5th International Conference on Computing for Sustainable Global Development, New Delhi, India."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Paik, M. (2010, January 22\u201323). Stragglers of the herd get eaten: Security concerns for GSM mobile banking applications. Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, New York, NY, USA.","DOI":"10.1145\/1734583.1734597"},{"key":"ref_56","unstructured":"Musuva-Kigen, P., Ekpeke, M., Inkoom, E., Inkoom, B., Masesa, D., Kaimba, B., and Mbae, K. (2016). Kenya Cyber Security Report 2016, Serianu Ltd."},{"key":"ref_57","unstructured":"Morawczynski, O. (2019, June 10). Fraud in Uganda: How Millions Were Lost to Internal Collusion. Available online: https:\/\/www.cgap.org\/blog\/fraud-uganda-how-millions-were-lost-internal-collusion."},{"key":"ref_58","unstructured":"McKee, K., Kaffenberger, M., and Zimmerman, J. (2020, January 10). Doing Digital Finance Right: The Case for Stronger Mitigation of Customer Risks. Available online: https:\/\/www.cgap.org\/sites\/default\/files\/researches\/documents\/Focus-Note-Doing-Digital-Finance-Right-Jun-2015.pdf."},{"key":"ref_59","unstructured":"Mudiri, J.L. (2012). Fraud in Mobile Financial Services, MicroSave."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Lake, A.J. (2013). Risk Management in Mobile Money: Observed Risks and Proposed Mitigants for Mobile Money Operators, World Bank.","DOI":"10.1596\/28420"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Chen, K., Wang, X., Chen, Y., Wang, P., Lee, Y., Wang, X., Ma, B., Wang, A., Zhang, Y., and Zou, W. (2016, January 22\u201326). Following Devil\u2019s Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS. Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2016.29"},{"key":"ref_62","first-page":"246","article-title":"Privacy and Security Concerns Associated with Mobile Money Applications in Africa","volume":"8","author":"Harris","year":"2013","journal-title":"Wash. J. Law Technol. Arts"},{"key":"ref_63","unstructured":"Amin, M.E. (2005). Social Science Research: Conception, Methodology and Analysis, Makerere University Printery."},{"key":"ref_64","unstructured":"Kothari, C.R. (2004). Research Methodology: Methods and Techniques, New Age International Publishers. [2nd ed.]."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1177\/001316447003000308","article-title":"Determining Sample Size for Research Activities","volume":"30","author":"Krejcie","year":"1970","journal-title":"Educ. Psychol. Meas."},{"key":"ref_66","unstructured":"Sekaran, U., and Bougie, R. (2009). Research Methods for Business: A Skill-Building Approach, John Wiley and Sons Inc.. [5th ed.]."},{"key":"ref_67","unstructured":"Shadish, W.R., Cook, T., and Campbell, D.T. (2002). Experimental and Quasi-Experimental Designs for Generalized Causal Inference, Houghton Mifflin."},{"key":"ref_68","unstructured":"Polit, D.F., and Beck, C.T. (2003). Nursing Research: Principles and Methods, Lippincott Williams & Wilkins. [7th ed.]."},{"key":"ref_69","unstructured":"Leedy, P., and Ormrod, J. (2001). Practical Research: Planning and Design, Prentice-Hall, Inc."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/BF02310555","article-title":"Coefficient alpha and the internal structure of tests","volume":"16","author":"Cronbach","year":"1951","journal-title":"Psychometrika"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Morgan, G.A., Leech, N.L., Gloeckner, G.W., and Barrett, K.C. (2013). IBM SPSS for Introductory Statistics: Use and Interpretation, Routledge. [5th ed.].","DOI":"10.4324\/9780203127315"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Landau, S., and Everitt, B.S. (2004). A Handbook of Statistical Analyses Using SPSS, Chapman & Hall\/CRC Press LLC.","DOI":"10.1201\/9780203009765"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/11\/6\/309\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:36:50Z","timestamp":1760175410000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/11\/6\/309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,8]]},"references-count":72,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2020,6]]}},"alternative-id":["info11060309"],"URL":"https:\/\/doi.org\/10.3390\/info11060309","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,8]]}}}