dc.contributor.author | Chen, Xingyu | |
dc.date.accessioned | 2024-06-24T04:52:00Z | |
dc.date.available | 2024-06-24T04:52:00Z | |
dc.date.issued | 2024 | - |
dc.identifier.uri | http://www.theseus.fi/handle/10024/865083 | |
dc.description.abstract | The rapid growth in the adoption of third-party payment systems such as Apple Pay necessitates a thorough investigation of the security risks they present to users and how they impact user acceptance of the technology. This study used the qualitative case study methodology, employing document and thematic analysis of secondary sources, to explore the security landscape of Apple Pay through the lens of the Technology Adoption Model (TAM). The study addressed key questions regarding network security risks, vulnerabilities in the security architecture, causes of recent security breaches, and strategies to enhance transaction security. Key findings revealed that phishing, man-in-the-middle attacks, and data breaches are significant risks impacting user trust and acceptance. Vulnerabilities were identified in the tokenization process, biometric authentication methods, and third-party integrations. Recent security incidents were largely attributed to human error, software vulnerabilities, and insider threats. Effective strategies for enhancing security include the implementation of Multi Factor Authentication (MFA), continuous monitoring with AI and machine learning, and comprehensive user education and awareness campaigns. Insights drawn from this study may be helpful in the development of secure and user-friendly third-party payment systems. | - |
dc.language.iso | eng | - |
dc.rights | fi=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|sv=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|en=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.| | - |
dc.title | Network Security Risks Caused by Third-Party Payment : a Case Study of Apple Pay | - |
dc.type.ontasot | fi=AMK-opinnäytetyö|sv=YH-examensarbete|en=Bachelor's thesis| | - |
dc.identifier.urn | URN:NBN:fi:amk-2024062023781 | - |
dc.subject.degreeprogram | fi=Tieto- ja viestintätekniikka|sv=Informations- och kommunikationsteknik|en=Information and Communications Technology| | - |
dc.subject.yso | data security | - |
dc.subject.yso | safety and security | - |
dc.subject.yso | information technology | - |
dc.subject.yso | payment systems | - |
dc.subject.yso | risks | - |
dc.subject.yso | data systems | - |
dc.subject.yso | payments traffic | - |
dc.subject.yso | information and communications technology | - |
dc.subject.yso | encryption | - |
dc.subject.yso | payment methods | - |
dc.subject.discipline | Bachelor of Engineering, Information and Communications Technology | - |
annif.suggestions.links | http://www.yso.fi/onto/yso/p5479|http://www.yso.fi/onto/yso/p7349|http://www.yso.fi/onto/yso/p5462|http://www.yso.fi/onto/yso/p7584|http://www.yso.fi/onto/yso/p11099|http://www.yso.fi/onto/yso/p3927|http://www.yso.fi/onto/yso/p3011|http://www.yso.fi/onto/yso/p20743|http://www.yso.fi/onto/yso/p5475|http://www.yso.fi/onto/yso/p21843 | en |