The Rise of Mobile Payment Systems, Digital Wallets: Successes, Security and Challenges (Published)
Mobile payment systems have emerged as transformative technologies within the global financial landscape, fundamentally altering transaction dynamics between individuals and businesses. These digital payment platforms leverage sophisticated technological infrastructures, including Near-Field Communication, QR codes, tokenization, and cloud-based payment gateways to facilitate secure, convenient, and rapid financial exchanges. Integrating advanced security measures such as biometric authentication, artificial intelligence-driven fraud detection, and hardware-based protection mechanisms has enhanced system resilience against evolving cyber threats. Adoption patterns reveal distinctive regional characteristics, with Western markets embracing contactless solutions through existing financial networks, Asian economies pioneering QR-based ecosystems, and emerging markets leveraging mobile payments to expand financial inclusion. Despite remarkable growth trajectories, several challenges impede universal adoption, including regulatory fragmentation across jurisdictions, persistent cybersecurity vulnerabilities, infrastructure limitations in developing regions, digital literacy barriers among certain demographics, and growing privacy concerns regarding data collection practices. Understanding these dynamics provides valuable insights into the continued evolution of payment technologies and their broader implications for global commerce, financial inclusion, and economic development across diverse market contexts.
Keywords: Cybersecurity, Financial Inclusion, digital wallets, financial technology, mobile payments
Enhancing Data Security: Applications and Challenges of Secure Protocols in Key Industries and Public Services (Published)
This article examines the critical role of secure protocols in safeguarding sensitive data across key industries and public services. Transport Layer Security (TLS), Secure Sockets Layer (SSL), Hypertext Transfer Protocol Secure (HTTPS), and Quick UDP Internet Connections (QUIC) provide essential encryption mechanisms that ensure data confidentiality, integrity, and authenticity in increasingly interconnected digital environments. The article analyzes the technical evolution of these protocols, highlighting how TLS 1.3 represents a significant advancement through its streamlined handshake process, reduced cipher suite options, and elimination of known vulnerabilities. Industry-specific implementations reveal unique challenges and benefits across healthcare, finance, e-commerce, telecommunications, and manufacturing sectors, while public services like government tax platforms, healthcare portals, transportation systems, emergency response networks, and educational institutions demonstrate varied approaches to balancing security with operational requirements. The article identifies significant implementation challenges, including legacy system integration, regulatory compliance across jurisdictions, performance optimization, and emerging threats, while emphasizing the importance of centralized infrastructure in accelerating protocol adoption. The findings underscore how proper secure protocol implementation yields substantial societal benefits beyond technical security, including enhanced data privacy, increased public trust, improved service efficiency, and strengthened cybersecurity resilience across global digital ecosystems.
Keywords: Cybersecurity, cryptographic protocols, digital infrastructure, network encryption, transport layer security
Leveraging User Behavior Analytics for Advanced E-Commerce Fraud Detection (Published)
E-commerce platforms face the critical challenge of balancing seamless customer experiences with robust security measures to prevent fraud. Traditional rule-based detection systems have proven increasingly inadequate against sophisticated threats, generating excessive false positives while missing complex fraud attempts. This article explores how behavioral analytics transforms fraud prevention by analyzing digital footprints customers leave while navigating online stores. By leveraging machine learning algorithms to establish behavioral baselines and detect anomalies, merchants can identify fraudulent activity with unprecedented accuracy while reducing false positives. The integration of behavioral indicators—including navigation patterns, transaction timing, historical consistency, and multi-factor behavioral authentication—enables dynamic risk profiling that distinguishes legitimate users from impostors even when credentials are compromised. The implementation architecture, business impacts, privacy considerations, and emerging technologies in behavioral fraud detection are explored, demonstrating how the intricacies of human behavior serve as reliable indicators of authentic user identity in the digital landscape.
Keywords: Authentication, Cybersecurity, E-Commerce, Fraud Prevention, behavioral biometrics
AI vs. AI: The Digital Duel Reshaping Fraud Detection (Published)
In the evolving landscape of financial security, a new battlefront has emerged: synthetic identity fraud powered by Generative Artificial Intelligence (GAI). This paper examines the high-stakes digital duel between fraudsters wielding GAI and the adaptive defense mechanisms of financial institutions. The paper explores how GAI-created synthetic identities challenge traditional fraud detection paradigms with convincing backstories, digital footprints, and AI-generated images. These artificial personas’ unprecedented scale and sophistication threaten to overwhelm existing security infrastructures, potentially compromising the integrity of financial systems and identity verification frameworks. Our analysis reveals large-scale synthetic identity campaigns’ far-reaching economic implications and disruptive potential across multiple sectors. It also investigates cutting-edge countermeasures, including adversarial machine learning, real-time anomaly detection, and multi-modal data analysis techniques. As this technological arms race intensifies, the paper concludes by proposing future research directions and emphasizing the critical need for collaborative initiatives to stay ahead in this ever-evolving digital battlefield.
Keywords: Cybersecurity, Fraud Detection, generative AI, machine learning, synthetic identities
Effects of People’s Mental Models of Cybersecurity on their Security Behaviour (Published)
This research investigates the effects of people’s mental modal of cybersecurity on their security behaviour. Data were collected using survey design and the questions were measured on a Likert five point-scale. The questionnaires were distributed to mainly IT staff, management staff and other staff that uses computers in the discharge of their duties. The data were analysed using percentages, frequencies and statistical methods of regression and ANOVA while Cronbach Alpha reliability coefficient technique was adopted to test the validity of the questions used to collect primary data. The result reveals that people’s prior knowledge of cybersecurity issues has no effect on people’s mental models for improved cybersecurity behaviour, but lack of trained staff (cyber talents), lack of supportive infrastructures, time constraints, exclusion of cybersecurity in non-computing courses, poor knowledge of fundamental computing areas, lack of mentors with hands-on experience, lack of cyber training or challenge programme, and inadequate books on cyber security were admitted by the participants as some of the major factors that inhibit their knowledge and engagement in cybersecurity education. These barriers if not checked could limit the level of cybersecurity awareness among undergraduate students.
Keywords: Cybersecurity, Mental Models., cyberspace, security behaviour
Utilization of Security Techniques for Cyber Warfare: KSA (Published)
Cyber warfare is considered mysterious targets of unknown sources that move through information and communication networks worldwide and use electronic weapons targeting information technology. They are directed against vital installations or invaded by agents of the intelligence services. Cybersecurity is one of the most significant digital technological breakthroughs that the world is now witnessing. It is considered the first weapon specialized in defending computers, electronic systems, and data from malicious attacks, servers, mobile devices, and networks. As a result, the goal of this research is to determine how Saudi Arabia uses security approaches for cyber warfare. The study adopted the descriptive method which addressed several aspects related to the strategies and security techniques for cyber warfare. The results indicate that the focus on cyber that pays importance to the possible countermeasures and preventive techniques that could be used to counter the risks of attackers, and discusses the encryption and watermark measures organizations can protect data against the illegal leak and hacking.
Citation: Ohoud S. Al-Harthi, Osama S. Faragallah, and Jehad F. Al-Amri (2021) Utilization of Security Techniques for Cyber Warfare: KSA, European Journal of Computer Science and Information Technology, Vol.9, No.4, pp.54-72,
Keywords: Cybersecurity, Encryption, cyber warfare, watermark