Abstract
With the emergence of smartphones, our lives have considerably changed. A smartphone has not only conventional calling, text-messaging, and photo-taking functions, but also performs many other functions by executing apps. In particular, more financial transactions using smartphone have recently become possible. With the global rapid rise in smartphone users and an ever-growing time and frequency of smartphone use, smartphones have become a target of malicious attacks. As a result, the damage caused by personal information leakage, phishing, and pharming has occurred more frequently. In this respect, however, very few studies have previously used crawling and text mining techniques, which have been actively studied quite recently; furthermore, network analysis has rarely been conducted. In this context, the present study collected the data from 2014 to the first half of 2016 on the trends of safe financing via smartphone with the crawling technique and analyzed the collected data with the text mining Technique. Our results suggest that there was a difference in the use of important keywords related to smartphone financial security, on the year-on-year basis. This suggests that an increasing number of financial services provided using smartphones should be accompanied by the elaboration of safe smartphone financial security services. In addition, for the sake smartphone financial security, not only manufacturers, but also banks, i.e. service providers, and users must pay specific attention to security issues.
Similar content being viewed by others
References
Park, S. T., Kim, Y. R., Jeong, S. P., Hong, C. I., & Kang, T. G. (2016). A case study on effective technique of distributed data storage for big data processing in the wireless internet environment. Wireless Personal Communications, 86(1), 239–253.
Jin, H., Li, G., Park, S. T., & Zhu, J. (2016). The effects of consumer characteristics on information searching behavior in wireless mobile SNS: Using SEM analysis. Wireless Personal Communications. doi:10.1007/s11277-016-3523-2.
Park, S. T., Park, E. M., Seo, J. H., & Li, G. (2016). Factors affecting the continuous use of cloud service: Focused on security risks. Cluster Computing, 19(1), 485–495.
Park, S. T., Im, H., & Noh, K. S. (2016). A study on factors affecting the adoption of LTE mobile communication service: The case of South Korea. Wireless Personal Communications, 86(1), 217–237.
Bank of Korea. (2016). Korean internet banking service use. http://www.bok.or.kr.
Kwak, Y. A. (2013). A study on smartphone’s phishing cases and security. Journal of KECRA, 14(1), 3–24.
FSA. (2014). Guide to the security of smartphone based electronic financial services. Financial Security Institute. https://www.kif.re.kr.
Kim, J. H., & Kim, T. H. (2013). A study on security system of banking application in open environment on smartphones. Review of KIISC, 23(1), 28–34.
Seo, H. J., & Kim, H. W. (2015). Design and implementation of physical secure card for financial security. Journal of the Korea Institute of Information and Communication Engineering, 19(4), 855–863.
Min, H. Y., Park, J. H., Lee, D. H., & Kim, I. S. (2014). Outlier detection method for mobile banking with user input pattern and E-finance transaction pattern. Journal of Korean Society for Internet Information, 15(1), 157–170.
Kim, D. Y., & Cho, S. M. (2015). A proposal of smart phone app for preventing smishing attack. Journal of Security Engineering, 12(3), 207–220.
Song, J. G., Kim, T. Y., Lee, H. J., & Jang, W. T. (2012). A new password authentication scheme using two-way password in smartphone banking. The Journal of the Institute of Internet, Broadcasting and Communication, 12(3), 195–200.
Noh, K. S. (2016). A study on the authentication and security of financial settlement using the finger vein technology in wireless internet environment. Wireless Personal Communications, 89(3), 761–775.
Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications. doi:10.1007/s11277-016-3393-7.
Choi, J. S., Kim, T. H., Min, S. S., & Seung, J. M. (2013). Smartphone based banking application protection technology trends for integrity verification. Review of KIISC, 23(1), 54–60.
Choi, S. H., Kim, K. S., Seol, H. K., Yang, D. W., & Lee, D. H. (2010). A study on problem and improvement of legal and policy framework for smartphone electronic finance transaction—Focused on electronic financial transaction act. Journal of The Korea Institute of Information Security and Cryptology, 20(6), 67–81.
Park, E. Y., & Yoon, J. W. (2014). A study of accident prevention effect through anomaly analysis in E-banking. The Journal of Society for e-Business Studies, 19(4), 119–134.
Jeong, D. Y., Lee, K. B., & Park, T. H. (2014). A study on improving the electronic financial fraud prevention service: Focusing on an analysis of electronic financial fraud cases in 2013. Journal of the Korea Institute of Information Security & Cryptology, 24(6), 1243–1261.
Park, K. Y., & Seo, J. H. (2014). Research on information security technology trends smartphone. In Proceedings of symposium of the Korean Institute of communications and information sciences, pp. 305–306.
Park, S. S. (2012). A study on recent trends in security technologies for payments on smartphones. Communications of the Korean Institute of Information Scientists and Engineers, 30(1), 54–59.
Park, D. W. (2015). Analysis of mobile smishing hacking trends and security measures. Journal of the Korea Institute of Information and Communication Engineering, 19(11), 2615–2622.
Sa, J. H., & Lee, S. J. (2012). Real-time phishing site detection method. Journal of the Korea Institute of Information Security & Cryptology, 22(4), 819–825.
Park, K. H., Lee, J. H., & Cho, H. J. (2012). Countermeasure against social technologic attack using privacy input-detection. The Journal of the Korea Contents Association, 12(5), 32–39.
Lee, S. H., Kim, S. H., Kang, J. I., Byun, J. S., Nyang, D. H., & Lee, K. H. (2013). A method of enhancing security of internet banking service using contents: Based CAPTCHA. Journal of the Korea Institute of Information Security & Cryptology, 23(4), 571–583.
Lee, J. H., Park, M. H., & Jung, S. H. (2013). OTP-based transaction verification protocol using PUFs. The Journal of the Korean Institute of Communication Science B, 38(6), 492–500.
Park, E. M., Seo, J. H., & Ko, M. H. (2016). The effects of leadership by types of soccer instruction on big data analysis. Cluster Computing, 19(3), 1647–1658.
DataNet. (2014). Security industry trending. http://www.datanet.co.kr/news/articleView.html?idxno=78351.
TechHolic. (2014). Mobile payments, Apple pat is the structure? http://techholic.co.kr/archives/21830.
ZDNet Korea. (2015). Take over a LoopPay. http://www.zdnet.co.kr/news/news_view.asp?artice_id=20150219082534.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Seo, JH., Park, EM. A Study on Financing Security for Smartphones Using Text Mining. Wireless Pers Commun 98, 3109–3127 (2018). https://doi.org/10.1007/s11277-017-4121-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4121-7