{"id":4706,"date":"2012-06-12T14:02:00","date_gmt":"2012-06-12T14:02:00","guid":{"rendered":"https:\/\/leap.staging.ribbitt.com\/evs\/mobile-payments-the-good-the-bad-the-security\/"},"modified":"2023-04-12T17:59:51","modified_gmt":"2023-04-12T17:59:51","slug":"mobile-payments-the-good-the-bad-the-security","status":"publish","type":"post","link":"https:\/\/leap.staging.ribbitt.com\/evs\/insights\/mobile-payments-the-good-the-bad-the-security\/","title":{"rendered":"Mobile Payments: The Good, The Bad, The Security"},"content":{"rendered":"<p>The&#13;<br \/>\nterm mobile payments is often used interchangeably for <a href=\"https:\/\/www.electronicverificationsystems.com\/Resources\/Blog\/Rapid-Growth-in-Mobile-Banking-Increases-Security-Risks.aspx\" title=\"mobile banking\">mobile banking<\/a> or used as a general term to describe paying for something on your&#13;<br \/>\nmobile device. What some consumers and even business owners may not understand&#13;<br \/>\nis that <a href=\"https:\/\/www.electronicverificationsystems.com\/Resources\/Blog\/The-Revolution-of-Mobile-Payments.aspx\" title=\"mobile payments\">mobile payments<\/a> can mean one of three things. There are three different type of&#13;<br \/>\nmobile payments: mobile commerce, mobile payments, and mobile wallets. Each one&#13;<br \/>\naccesses and uses personal information in a different way. Security of personal&#13;<br \/>\ninformation has become a major concern to both companies and consumers&#13;<br \/>\nutilizing mobile payments. In an infographic created by SapientNitro, it states&#13;<br \/>\nthat 69% of users polled in the US and Europe worry about privacy when using&#13;<br \/>\nmobile payments. Consumers have also ranked they concerns about their credit&#13;<br \/>\ncard information as the second top reason as to why they dont use mobile&#13;<br \/>\nshopping more.<\/p>\n<\/p>\n<div><img decoding=\"async\" src=\"https:\/\/leap.staging.ribbitt.com\/evs\/wp-content\/uploads\/sites\/6\/Picture-31.png\" alt=\"mobile-attitudes\" title=\"mobile-attitudes\" \/>   <img decoding=\"async\" src=\"https:\/\/leap.staging.ribbitt.com\/evs\/wp-content\/uploads\/sites\/6\/Picture-21.png\" alt=\"mobile-top8\" title=\"mobile-top8\" \/><\/div>\n<\/p>\n<p>One of the largest hurdles that a mobile payment creates is&#13;<br \/>\nthat consumers and businesses have different obstacles and priorities. The&#13;<br \/>\nmajor factor that appeals to consumers is convenience whereas the top priority&#13;<br \/>\nfor companies is security. So is it possible for everyone to win? Absolutely.&#13;<br \/>\nCompanies just need to realize and understand the threat of ID theft associated&#13;<br \/>\nwith each type of mobile payment. As Jim Van Dyke stated in his interview with <a href=\"http:\/\/www.bankinfosecurity.com\/mobile-users-want-more-security-control-a-4838\/p-1\">Bank&#13;<br \/>\nInfo Security<\/a>few banks are utilizing real-time authentication, which is a&#13;<br \/>\nmajor factor that can improve security and support fraud detection. Using&#13;<br \/>\nout-of-brand <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/identifraud\/\">identity&#13;<br \/>\nverification<\/a> and authentication will&#13;<br \/>\nnot only give consumer more control, but piece of mind as well.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/leap.staging.ribbitt.com\/evs\/wp-content\/uploads\/sites\/6\/Picture-11.2.png\" alt=\"Mobile-attributes\" title=\"Mobile-attributes\" \/><\/p>\n<p><\/p>\n<\/p>\n<p align=\"right\"><a href=\"http:\/\/www.mobile-zeitgeist.com\/wp-content\/uploads\/2012\/05\/mobile-commerce-972.jpg\"><span>Infograpic provided by SapientNitro<\/span><\/a><\/p>\n<\/p>\n<p><!--EndFragment--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The term mobile payments is often used interchangeably for mobile banking or used as a general term to describe paying for something on your mobile device. What some consumers and even business owners may not understand is that mobile payments<\/p>\n","protected":false},"author":40,"featured_media":4707,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[33],"tags":[],"class_list":["post-4706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phone-verification"],"acf":[],"_links":{"self":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/comments?post=4706"}],"version-history":[{"count":1,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4706\/revisions"}],"predecessor-version":[{"id":4710,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4706\/revisions\/4710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media\/4707"}],"wp:attachment":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media?parent=4706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/categories?post=4706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/tags?post=4706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}