Skip to main content
Log in

A Study on Financing Security for Smartphones Using Text Mining

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the emergence of smartphones, our lives have considerably changed. A smartphone has not only conventional calling, text-messaging, and photo-taking functions, but also performs many other functions by executing apps. In particular, more financial transactions using smartphone have recently become possible. With the global rapid rise in smartphone users and an ever-growing time and frequency of smartphone use, smartphones have become a target of malicious attacks. As a result, the damage caused by personal information leakage, phishing, and pharming has occurred more frequently. In this respect, however, very few studies have previously used crawling and text mining techniques, which have been actively studied quite recently; furthermore, network analysis has rarely been conducted. In this context, the present study collected the data from 2014 to the first half of 2016 on the trends of safe financing via smartphone with the crawling technique and analyzed the collected data with the text mining Technique. Our results suggest that there was a difference in the use of important keywords related to smartphone financial security, on the year-on-year basis. This suggests that an increasing number of financial services provided using smartphones should be accompanied by the elaboration of safe smartphone financial security services. In addition, for the sake smartphone financial security, not only manufacturers, but also banks, i.e. service providers, and users must pay specific attention to security issues.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Park, S. T., Kim, Y. R., Jeong, S. P., Hong, C. I., & Kang, T. G. (2016). A case study on effective technique of distributed data storage for big data processing in the wireless internet environment. Wireless Personal Communications, 86(1), 239–253.

    Article  Google Scholar 

  2. Jin, H., Li, G., Park, S. T., & Zhu, J. (2016). The effects of consumer characteristics on information searching behavior in wireless mobile SNS: Using SEM analysis. Wireless Personal Communications. doi:10.1007/s11277-016-3523-2.

    Google Scholar 

  3. Park, S. T., Park, E. M., Seo, J. H., & Li, G. (2016). Factors affecting the continuous use of cloud service: Focused on security risks. Cluster Computing, 19(1), 485–495.

    Article  Google Scholar 

  4. Park, S. T., Im, H., & Noh, K. S. (2016). A study on factors affecting the adoption of LTE mobile communication service: The case of South Korea. Wireless Personal Communications, 86(1), 217–237.

    Article  Google Scholar 

  5. Bank of Korea. (2016). Korean internet banking service use. http://www.bok.or.kr.

  6. Kwak, Y. A. (2013). A study on smartphone’s phishing cases and security. Journal of KECRA, 14(1), 3–24.

    Google Scholar 

  7. FSA. (2014). Guide to the security of smartphone based electronic financial services. Financial Security Institute. https://www.kif.re.kr.

  8. Kim, J. H., & Kim, T. H. (2013). A study on security system of banking application in open environment on smartphones. Review of KIISC, 23(1), 28–34.

    Google Scholar 

  9. Seo, H. J., & Kim, H. W. (2015). Design and implementation of physical secure card for financial security. Journal of the Korea Institute of Information and Communication Engineering, 19(4), 855–863.

    Article  Google Scholar 

  10. Min, H. Y., Park, J. H., Lee, D. H., & Kim, I. S. (2014). Outlier detection method for mobile banking with user input pattern and E-finance transaction pattern. Journal of Korean Society for Internet Information, 15(1), 157–170.

    Google Scholar 

  11. Kim, D. Y., & Cho, S. M. (2015). A proposal of smart phone app for preventing smishing attack. Journal of Security Engineering, 12(3), 207–220.

    Article  Google Scholar 

  12. Song, J. G., Kim, T. Y., Lee, H. J., & Jang, W. T. (2012). A new password authentication scheme using two-way password in smartphone banking. The Journal of the Institute of Internet, Broadcasting and Communication, 12(3), 195–200.

    Article  Google Scholar 

  13. Noh, K. S. (2016). A study on the authentication and security of financial settlement using the finger vein technology in wireless internet environment. Wireless Personal Communications, 89(3), 761–775.

    Article  MathSciNet  Google Scholar 

  14. Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications. doi:10.1007/s11277-016-3393-7.

    Google Scholar 

  15. Choi, J. S., Kim, T. H., Min, S. S., & Seung, J. M. (2013). Smartphone based banking application protection technology trends for integrity verification. Review of KIISC, 23(1), 54–60.

    Google Scholar 

  16. Choi, S. H., Kim, K. S., Seol, H. K., Yang, D. W., & Lee, D. H. (2010). A study on problem and improvement of legal and policy framework for smartphone electronic finance transaction—Focused on electronic financial transaction act. Journal of The Korea Institute of Information Security and Cryptology, 20(6), 67–81.

    Google Scholar 

  17. Park, E. Y., & Yoon, J. W. (2014). A study of accident prevention effect through anomaly analysis in E-banking. The Journal of Society for e-Business Studies, 19(4), 119–134.

    Article  Google Scholar 

  18. Jeong, D. Y., Lee, K. B., & Park, T. H. (2014). A study on improving the electronic financial fraud prevention service: Focusing on an analysis of electronic financial fraud cases in 2013. Journal of the Korea Institute of Information Security & Cryptology, 24(6), 1243–1261.

    Article  Google Scholar 

  19. Park, K. Y., & Seo, J. H. (2014). Research on information security technology trends smartphone. In Proceedings of symposium of the Korean Institute of communications and information sciences, pp. 305–306.

  20. Park, S. S. (2012). A study on recent trends in security technologies for payments on smartphones. Communications of the Korean Institute of Information Scientists and Engineers, 30(1), 54–59.

    Google Scholar 

  21. Park, D. W. (2015). Analysis of mobile smishing hacking trends and security measures. Journal of the Korea Institute of Information and Communication Engineering, 19(11), 2615–2622.

    Article  Google Scholar 

  22. Sa, J. H., & Lee, S. J. (2012). Real-time phishing site detection method. Journal of the Korea Institute of Information Security & Cryptology, 22(4), 819–825.

    Google Scholar 

  23. Park, K. H., Lee, J. H., & Cho, H. J. (2012). Countermeasure against social technologic attack using privacy input-detection. The Journal of the Korea Contents Association, 12(5), 32–39.

    Article  Google Scholar 

  24. Lee, S. H., Kim, S. H., Kang, J. I., Byun, J. S., Nyang, D. H., & Lee, K. H. (2013). A method of enhancing security of internet banking service using contents: Based CAPTCHA. Journal of the Korea Institute of Information Security & Cryptology, 23(4), 571–583.

    Article  Google Scholar 

  25. Lee, J. H., Park, M. H., & Jung, S. H. (2013). OTP-based transaction verification protocol using PUFs. The Journal of the Korean Institute of Communication Science B, 38(6), 492–500.

    Google Scholar 

  26. Park, E. M., Seo, J. H., & Ko, M. H. (2016). The effects of leadership by types of soccer instruction on big data analysis. Cluster Computing, 19(3), 1647–1658.

    Article  Google Scholar 

  27. DataNet. (2014). Security industry trending. http://www.datanet.co.kr/news/articleView.html?idxno=78351.

  28. TechHolic. (2014). Mobile payments, Apple pat is the structure? http://techholic.co.kr/archives/21830.

  29. ZDNet Korea. (2015). Take over a LoopPay. http://www.zdnet.co.kr/news/news_view.asp?artice_id=20150219082534.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eun-Mi Park.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Seo, JH., Park, EM. A Study on Financing Security for Smartphones Using Text Mining. Wireless Pers Commun 98, 3109–3127 (2018). https://doi.org/10.1007/s11277-017-4121-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4121-7

Keywords

Navigation