The Sufficiency of the “Contactless Cards” Security Features in Preventing Fraud-A Malaysian Study

Authors

  • Mansourah Banon Hosany Research Scholar, Asia Pacific University, Jalan Teknologi 5,57000 Wilayah Persekutuan Kuala Lumpur, Malaysia. Author
  • Geetha A. Rubasundram Senior Lecturer, Asia Pacific University, Malaysia, Jalan Teknologi 557000 Wilayah Persekutuan Kuala Lumpur, Malaysia Author

DOI:

https://doi.org/10.61841/3c8m4c67

Keywords:

Contactless cards, Perceived Risk, Relay Attacks, Cloning, Dark Web

Abstract

Contactless Cards are a revolutionary innovation in transaction payments. Little is known; however, about what shapes end users' willingness and perception to use this method. The objective of this study is to compare the end-users and banks perception on the sufficiency of contactless cards. This research will use Fraud Diamond Theory, General Deterrence Theory and Technology Acceptance Model (TAM) to meet the objective of this study. This research aims to provide a more in-depth analysis; hence a mixed method has been used. The quantitative data was collected from 192 users via questionnaires in Malaysia to be able to evaluate the end user perspective of contactless cards. The results were then analyzed via the Statistical Package of the Social Sciences (SPSS). This were then used to gauge the perspective of banks using interviews to analyze key security mechanism for the most popular type of fraud including the relay attacks, electronic pickpocketing, theft and cloning through devices readily available on dark web. The findings of this research suggested that almost 80% of end users of contactless cards were unaware of the types of risks and security features of contactless cards. The interviews reflected that relay attacks are the most prominent risk and that the security measures in place were insufficient. Henceforth, this research recommends that banks need to have more effective awareness programs to educate the users of contactless cards of the risks and security features. 

Downloads

Download data is not yet available.

References

1. Abdullahi, M., 2015. Concomitant Debacle of Fraud Incidences in the Nigeria Public Sector : Understanding

the power of fraud triangle theory. International journal of academic research , 5(5).

2. Abd, Z. E. & Abokabera, E., 2015. Evolution in bank cards security, cardholder verification and its impact on

fraud crimes. The International Arab Forensic Science and Forensic Medicine Conference .

3. Boden, R., 2016. NFO World Plus. [Online] Available

at:https://www.nfcworld.com/2016/07/14/346178/europeans-keen-use-biometric-authentication-paymentssays-visa/

4. Campbell, K., 2018. Police warn WA businesses to reduce ‘tap-and-go’ technology. The West Australian.

5. Caney, R. et al., 2013. Mobile Pickpocketing: Exfiltration of Sensitive Data through NFC-enabled Mobile

Devices. Carnegie Mellon University.

6. Chiou & Shen, 2012. The antecedents of online financial service adoption: the impact of physical banking

services on internet banking acceptance. Behaviour and Information Technology, 31(9), pp. 859-871.

7. Cimpanu, C., 2016. New devices sold on darkweb can clone up to 15 contactless card per second. [Online]

Available at: https://news.softpedia.com/news/new-device-sold-on-the-dark-web-can-clone-up-to-15-

contactless-cards-per-second-505200.shtml

8. Courtois, N., Hulme, D. & Grejak, M., 2013. On Bad Randomness and Cloning of Contactless Payment and

Building Smart Cards. Security and Privacy Workshops.

9. Cristofaro, D., Freudiger, J. & Norcie, G., 2014. Two-Factor or not two factor? A comparative usability study

of two factor authentication. In NDSS Workshop on Usable Security.

10. Cristofaro, E. D., Du, H., Freudiger, J. & Norcie, G., 2014. A Comparative Usability Study of Two-Factor

Authentication. University of College London.

11. Daily Mail, 2018. Daily Mail. [Online]

Available at: https://www.dailymail.co.uk/news/article-5507769/Contactless-boom-fuels-51-surge-tapfraud.html

12. Deloitte, 2008. Contactless Payment Technology- Catching the new wave, United Kingdom: Deloitte Touch

Tohmatsu.

13. Dorfleitner, G., 2017. Fintech in Germany. Germany: Springer International Publishing.

14. Duke, C., 2012. An examination of the barriers Irish businesses face in the adoption of Near Field

Communication technology. Research Gate.

15. Eccles, L., 2016. The Daily Mail. [Online] Available at: https://www.thisismoney.co.uk/money/news/article-

3983972/Police-alert-electronic-pickpocketing-contactless-card-scammers.html

16. Emms, M., Arief, B., Little, N. & Moorsel, A. V., 2013. Risks of Offline Verify Pin on contactless cards.

Financial Cryptography and Data Security.

17. Erenhouse, R., 2018. Dispelling the Myths: The Reality about Contactless Security. Mastercard, 17 January.

18. Eyoboglu, K. & Sevim, U., 2017. Determinants of contactless credit cards acceptance in Turkey.

International Journal of Management Economics and Business, 13(2), pp. 331-346.

19. Fiedler, M., Keppler, T. & Öztüren, A., 2013. Contactless Payment, a RFID domain and its acceptance by its

cardholders. Cyprus International University, Faculty of Economics and Administrative.

20. Fiedler, M., Keppler, T. & Öztüren, A., 2014. Contactless Payment, a RFID domain and its acceptance by

cardholders. Cyprus International University, Faculty of Economics and Administrative.

21. Focus Malaysia, 2018. Mastercard: Contactless payment continue to grow. [Online]

Available at: http://www.focusmalaysia.my/Snippets/mastercard-contactless-payments-continue-to-grow

22. Francis T.Cullen, 2009. Taking stock : the status of criminology theory. UK: s.n.

23. Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2005. Practical Relay Attack on Contactless

Transactions by using NFC mobile phones. Information Security Group, Smart Card Centre.

24. Garg, R. & Jain, S., 2015. Requirement Analysis on Paywave. International conference on advances in

computing and communication engineering.

25. Gautam, I. & Ignico, M., 2010. The Early Experience with Branchless Banking. CGAP Focus Note, Issue 46.

26. Gemelto, 2018. [Online] Available at: The benefits of EMV security with the added convenience of

contactless technology

27. Hamspire, C., 2016. A mixed methods empirical exploration of UK consumer perceptions of trust, risk and

usefulness of mobile payments. International Journal of Bank Marketing, 35(3).

28. Harper, A., 2014. Case study of the impact on businesses and society by mobile contactless card technology.

North central University Graduate Faculty of the School of Business and Technology Management.

29. Hermanson, W. &., 2004. The Fraud Diamond: Considering the Four Elements of Fraud. The CPA Journal.

30. Jannati, H., 2015. Analysis of relay,terrorist fraud and distance frauds attacks. International journal of critical

insfrastructure protection.

31. Juniper Research, 2017. Juniper Research. [Online] Available at:

https://www.juniperresearch.com/researchstore/fintech-payments/contactless-payments

32. Karoubi, B., Chenavaz, R. & Paraschiv, C., 2016. Consumer perceived risk and hold of use of payment

instruments. Journal of Applied Economics, 48(4), pp. 1317-1329.

33. Kelly, K., 2015. UK Fast. [Online] Available at: https://www.ukfast.co.uk/blog/2015/07/28/why-two-factorauthentication-is-more-important-than-ever/

34. Killer, C., Tsiaras, C. & Stiller, B., 2015. An Off-the-shelf Relay Attack in a Contactless Payment Solution.

University of Zürich, Communication Systems Group.

35. Kim, C., Tao, W., Shin, N. & Kim, K.-S., 2010. An Empirical Study of customers perceptions of security and

trust in e-payments system. Electronic Commerce Research and Applications.

36. Kranacheret, 2011. The Evolution of fraud theory. American Accounting Association Journal.

37. Krol, K. et al., 2016. An Exploratory Study of User Perceptions of Payment Methods in the UK and the US.

University Paper College London.

38. Lee, I. & Souza, S. d., 2018. The Future of Payments: Contactless Payments. [Online]

Available at: https://www.imoney.my/articles/contactless-cards

39. Liébana-Cabanillas, F., Luna, I. R. d. & Montoro, F., 2017. Intention to use new mobile payment systems: a

comparative analysis of SMS and NFC payments. Economic Research , 30(1), pp. 892-910.

40. Macbean, N., 2014. ABC News. [Online]

Available at: https://www.abc.net.au/news/2014-05-30/electronic-pickpocketing-looms-as-next-credit-cardfraud-threat/5486806

41. Mackevicius, J. &. G. L., 2013. Transformational Research of the Fraud Triangle. EKONOMICA, 92(4).

42. McMillan, J., 2018. Examining the Perceived Risks of contactless card acceptance in the New Zealand

Market. Department of Management, Marketing and Entrepreneurship.

43. Nandikotkur, G., 2018. Bank Info Security. [Online]

Available at: https://www.bankinfosecurity.asia/interviews/securing-contactless-card-payment-transactions-i-

4077

44. Narasimhan, H. & Padmanaban, T., 2013. 2CAuth: A New Two Factor Authentication Scheme Using QRCode. International journal of Engineering and Technology, 5(2), pp. 1087-1094.

45. Nigel, P., 2016. The Truth about contactless payment, Australia: Central for Internet Safety.

46. Olusola, M., Oludele, A., Chibueze, O. & Samuel, O., 2013. CASHLESS SOCIETY: DRIVE’S AND

CHALLENGES IN NIGERIA. International Journal of Information Sciences and Techniques.

47. Paul, C. L. et al., 2011. A field study of user behavior and perceptions in smartcard authentication. HCI.

48. Pillai, D. S. & S.Sathyalakshmi, 2014. Prevention of Relay Attack Using NFC. International Journal of

Innovative Research in Computer and Communication Engineering.

49. Pratt, B. D., 2006. The empirical status of deterence theory: A meta analysis.

50. Quibria, N., 2008. The Contactless Wave: A Case Study in Transit Payments. Federal Reserve Bank of

Boston.

51. Raza, S., 2016. The Henry Fund Investment Thesis On Visa Inc.. VW.

52. Rogers, 2003. Diffusion of Innovation. 5th ed. New York: Free Press.

53. Roland, M. & Langer, J., 2013. Cloning credit cards: a combined pre-play and downgrade attack on EMV

contactless. Proceeding of the 7th Usenix Conference on Offensive Technologies.

54. Sakharova, I. & Kha, L., 2011. Payment Card Fraud: Challenges and Solutions. The University of Texas at

Dallas, Volume 5.

55. Sara, S., 2018. Contactless card fraud overtakes cheque scams for first time. The Telegraph.

56. Shin & Lee, 2014. The effects of technology readiness and technology acceptance on NFC mobile payment

services in Korea.. The Journal of Applied Business Research, 30(6), pp. 1615-1626.

57. Simpson, J., 2016. The Times. [Online] Available at: https://www.thetimes.co.uk/article/gangs-use-the-darkweb-to-trade-contactless-card-data-dzqppsx6k

58. Smith, S. L., 2007. Gone in a Blink: The Overlooked Privacy Problems caused by contactless payment

systems. Smith Articile, 11(1).

59. Storm, D., 2013. ComputerWorld. [Online] Available at:

https://www.computerworld.com/article/2474677/security0/texas-cops-report-victims-of-electronicpickpocketing-suffer-credit-card-losses.html

[Accessed 5 January 2019].

60. Subramayen, R., 2008. Quality of internal control procedures : Antecedents and Moderating effect on

organisational justice and employee fraud. Managerial Auditing Journal.

61. Sullivan, R. J., 2010. The Changing Nature of U.S. Card Payment Fraud: Industry and Public Policy Options.

Federal Reserve Bank of Kansas City.

62. Swartz, D. D. G., 2006. The Move Toward a Cashless Society: Calculating the Costs and Benefits. Review of

Network Economics.

63. Symon, J., 2018. Detecting relay attacks against Bluetooth communication in Android. Research Commons at

the University of Waikato.

64. Trutsch, T., 2017. The Impact of Contactless Payment on Cash Usage. University of St. Gallen.

65. Vejačka, M., 2015. Consumer Acceptance of Contactless Payments in Slovakia. Journal of Applied Economic

Sciences, Issue 35, pp. 760-765.

66. Vogues, D., 2017. A study of the NFC market in Germany in cooperation with Fidesmo AB.. KTH Royal

Institute of Technology School of Insustrial Engineering and Management.

67. Wang, T., 2008. Determinants affecting consumer adoption of contactless credit card: An empirical study.

Cyber Psychology & Behavior, 11(6), pp. 687-689.

68. Wang, Y.-M. & Lin, W.-C., 2019. Understanding consumer intention to pay by contactess credit cards in

Taiwan. International Journal of Mobile Communications,, 17(1), pp. 1-23.

69. Weiber & Pohl, 1996. Leapfrogging-Behavior and adoption of the contactless cards. Journal of business

economics, 66(10), pp. 1203-1222.

70. Widjaja & Ooi, E. P., 2015. Non-Cash Payment Options in Malaysia. Journal of Southeast Asian Economies.

71. Yan Chen, K.-W. W., 2015. Organizations' Information Security Policy Compliance : Stick or Carrot

Approach. Journal of Management Information System.

72. Yilmazer, K., 2006. Adoption of internet banking and consumers payment choices. Working Paper of Purdue

university.

73. Zaharudin, R. Z. A. R., Rashid, U. K. & Nasuredin, J., 2018. Usage Behavior among Paywave Card Users in

Kuala Lumpur. International Journal of Research.

74. Zheng, M, F. & Coat, H. P., 2013. Chinese consumer perceived risk and risk relievers in e-shopping for

clothing. Journal of Electronic Commerce Research, 3(13), pp. 255-274.

Downloads

Published

30.04.2020

How to Cite

Banon Hosany, M., & A. Rubasundram, G. (2020). The Sufficiency of the “Contactless Cards” Security Features in Preventing Fraud-A Malaysian Study. International Journal of Psychosocial Rehabilitation, 24(2), 1101-1117. https://doi.org/10.61841/3c8m4c67