International Journal of Information and Communication Technology Research

International Journal of Information and Communication Technology Research>> Call for Papers(CFP)>>Volume 7, Number 9, September 2017

International Journal of Information and Communication Technology Research

Mobile phone based payment authentication system: An intervention for customers’ bank account fraud in Tanzania

Full Text Pdf Pdf
Author(s) Edvin J. Kitindi, Alcardo Alex, Camilius Sanga, Ayubu Shaban, George Kibirige, Joseph Phillip, Julius Oketchi
On Pages 325-337
Volume No. 4
Issue No. 9
Issue Date September, 2014
Publishing Date September, 2014
Keywords Mobile phone, Payment instruments, Bank account security, Customer, Bank account, Signatory, authentication.


Through the rapid development of ICTs in Tanzania, banking industry has experienced rapid change in the ways of service delivery to their customers. The society has experienced a rapid development in communication sector particularly on the use of mobile phones for banking. The commercial banks in Tanzania have also revolved their ways of operating and serving their customers. The central bank of Tanzania (BoT) is responsible in defining all the payment systems in Tanzania and control all the transaction being done by the commercial banks operating in the land of Tanzania. Currently, Tanzania has many payment instruments as defined by the BoT which divided into two main group Cash and Non-Cash payments instruments. The latter includes: payment orders, bills of exchange, promissory notes, cheques and the electronic payment systems. In this paper, the security threats of these payment instruments have been discussed in detail. Some reported cases where organizations have been fleeced of their financial resources through dubious activities in Tanzania have been reviewed to verify the existing of the problem in discussion. In this paper, a Mobile phone based payment authentication system model to reduce the threats associated with non-cash payment implemented in Tanzania is proposed. Using this model, account holders are required to provide a final authentication of transaction through their registered mobile phone. This method if adopted will take care for any non-cash payment instruments. Also, some of the threats being discussed in this paper can be addressed by the proposed model.

    Journal of Information and Communication Technology | Journal of Science and Technology     
© 2014 IRPN Publishers