WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

E-commerce capabilities assessment: -security of e-payment systems- case of the democratic republic of congo

( Télécharger le fichier original )
par Espérant Ngongo Mbuli
University of Walles - Master in Advanced information technology and Business Management 2013
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

II.8.5 Security of M-payment

Mobile phone with integrated sim card which load encrypted information, offers security and privacy, but for its use in the e-commerce other security concerns have to be considered.

The lack of standards and disparity of the existing systems are the main concerns for the use development of this payment system in online transaction despite the fact that identification, security and authorization of the transaction are already implemented in the m-payment systems.

To effectively use m-payment in e-commerce development, strong partnership between banks, mobile operators and businesses must be developed for the integration of their information systems to provide dynamic and secured mobile payment system (P. Candance Deans, 2005, p 84).

This integration will raise issue of security of Information systems that has been described in this work to ensure security of the online transaction.

The nature of the mobile phone which can be stolen any time or broken, the malfunction of mobile network because of technical issues will surely raise issues such as fraud, repudiation of the transaction and availability of service.

That's why, on top of all security measures which can be implemented, this emerging system needs to have law and regulation in place.

Page | 33

II.9 Conclusion on the literature review

The literature review gives a broad view and understanding of e-commerce concepts and Information technology capabilities.

Capabilities in e-commerce link together Information technology capabilities with organizational processes to respond to the highly changing nature of the e-commerce because of the dynamic changes involved in its development.

The diversity of the payment systems studied in this research and the challenge of their security is the fundamental element which will be used in this research to assess the e-commerce capabilities in the Democratic republic of Congo (DRC).

A particular attention will be given to the mobile payment systems which appear as an emerging innovation in the country with the development of the mobile networks.

The study will analyze the security of the existing e-payment systems such as credit/debit card and other online payment offered by local banks and their organizational processes to assess their readiness to the emergence of e-commerce in DRC.

Security according to the CIA concept (Confidentiality, integrity and availability) as described in the ISO 27001/2 framework and other sources cited in the section II.7.2 of this work will be the driver for the assessment which will be used in this study.

The objective of this research is to assess the status of e-commerce capabilities in DRC with a specific focus on online payment systems security in order to better understand how such capabilities can be better leveraged for an effective development of e-commerce in DRC.

Page | 34

Chapter 3: Research Methodology

III.1 Introduction

This chapter discusses the methodology used to collect information and the overall research design and justification. It also defines the sampling; population used for data collection and the questionnaire design.

The security of the payment system is the main concern which must be addressed in order to bring confidence for the user. In their books according to electronic payment systems for e-commerce the Laudon's (K. Laudon and J Laundon, 2008) and G. Shneider (2011) presented the concept of CIA (Confidentiality, integrity and availability) as a quality to which a payment system must conform. So this research will use this concept to assess security of online payment systems in DRC

The concept of the security of the information system as provided by the ISO 27001/2 standards as described in the previous chapter of this study highlights the important place taken by the CIA concept in terms of the security of the online transaction used for the e-commerce in general and particularly for e-payment systems. Of course the other elements of the security focusing on human, physical infrastructure, etc are most likely to be easy to set up and should exist in most of the bank IT infrastructure in the country.

So CIA remains a challenge because as it is well known, all other security elements regarding e-payment systems have as prime objective to ensure confidentiality, integrity and availability of the system.

III.2 Research design and justification III.2.1 Introduction

The research design or methodology describes the process and actions taken to collect responses or data and the way these responses have been analyzed to give an answer the research question.

For this research, the literature review didn't provide relevant information to the research question for this study; therefore it is difficult to use secondary data collection method.

In fact, because of the specificity of the subject and the use of component elements of a framework to assess the security of e-payment systems in the specified country, the primary data collection method is the best one for this research. Data (responses) will be collected directly from participants to the survey which will use questionnaire built from checklists.

Page | 35

E-commerce is on its inception phase in the country, therefore it is not already perceived as part of the economical live. For this reason, the research will also use interviews as to get some responses in a face-to-face interaction with stakeholders in the e-payment and e-commerce planet.

Prior to justify which methodology is better for this research, it is better to give an overview of the two methodologies used for data collection; qualitative and quantitative.

Qualitative research methodology

Jackson (2010, p 101) defines qualitative research as a research method that «focuses on phenomena that occur in natural settings, and the data are analyzed without the use of statistics.

«Qualitative research generates text which is often interpreted in a subjective way (although it is possible in certain circumstances to convert textual information to numbers)» (Gabriel J., 2012).

These two definitions indicate clearly that qualitative research is based on observation of specific field or area of research without statistical analysis in the mind.

For qualitative research data or response is collected by the mean of questionnaire or interviews.

Quantitative research methodology

It has been stated by professor G. Jacobs (2012) that «quantitative research generates measurable information that can be converted into numbers and analyzed statistically. Data is often gathered in questionnaire surveys».

In quantitative research, even though data can be collected some time using interview like for the qualitative methodology, the focus is to simplify, objectify or quantify the observation so that data collected can be easily interpreted using statistical tools.

The difference between the two methodologies is given in the table below provided by Malhotra (2004, cited by Mirza et al. (2011, p 53-54)) based on objective, sample data collection and analysis and the outcome basis.

Page | 36

Table 1: Qualitative vs quantitative research methodologies
Source: Mirza et al. (2011, p53-54)

Basis

Qualitative

Quantitative

Objective

To gain the qualitative

understanding of the underlying reasons and motivation

To quantify the data and generalize the results from the sample to the population of interest

Sample

Small number of non representative cases

Large number of representative cases

Data collection

unstructured

structured

Data analysis

Non statistical

statistical

Outcome

Developed an initial understanding

Recommend a final course of action

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Des chercheurs qui cherchent on en trouve, des chercheurs qui trouvent, on en cherche !"   Charles de Gaulle