Curbing Mobile Phone Terrorism and Financial Fraud: A Kenyan Perspective

Authors

  • Philip Muriuki Wanjohi Kirinyaga University, Kenya

DOI:

https://doi.org/10.13052/jicts2245-800X.434

Keywords:

Alshabaab, Agent, Biometric, M-pesa, Safaricom, Sim

Abstract

Kenya being a leading mobile phone operator in Africa provides a suitable platform of understanding security weaknesses in relation to terrorism and financial frauds perpetrated through mobile phone technology. According to [5]; origin and use of mobile money transfer make the country a suitable case that can be replicated elsewhere in the world. It is worth noting that growth of mobile money transfer has promoted business alongside creating new employment opportunities in Kenya. However the growth of mobile phone technology has had an equal share of problems; subsequently leading to challenges of financial frauds, and terrorism activities. This paper addresses a mechanism of safe mobile phone technology through enhanced biometrics during financial transactions, SIM registration, and forensic audit trail in case of a crime.

 

Downloads

Download data is not yet available.

Author Biography

Philip Muriuki Wanjohi, Kirinyaga University, Kenya

P. M. Wanjohi is an ICT assistant lecturer at Kirinyaga University in Kenya. He is also a student of Masters of Information System at Kisii University in Kenya. He attended Kampala University in Uganda where he received his B.Sc. in Computer Science and Information Technology in the year 2006. Philip Wanjohi will graduate any time soon at Kisii University. His interests centers on; use of mobile phones in developing countries, application programming, computer networks, data communication and web designing.

References

Adrian, D. (2016). Mobile Phone Banking Usage Experiences in Kenya. Nairobi: Catholic University of Eastern Africa.

Communications Authority of Kenya (2015). Mobile phone ownership Nairobi Kenya. Available at: www.ca.go.ke (accessed March 10, 2017).

Global System Mobile Association (2016). The Mandatory Registration of Prepaid SIM Card Users. London: Global System Mobile Association.

Guizzo, E. (2006). Britain’s identity crisis [biometric ID cards] Spectrum. IEEE, 43:42. doi: 10.1109/MSPEC.2006.1572352.

International Telecommunication Union (2016). Understanding Cybercrime: A Guide for Developing Countries Geneva Switzerland. Geneva: International Telecommunication Union.

Kenya National Assembly (2013). Report of the Joint Committee on Administration and National Security; and Defence and Foreign Relations on the Inquiry into the Westgate Nairobi Terrorist Attack, and other Terror Attacks in Mandera in North-Eastern and Kilifi in the Coastal Region Government Printer. Nairobi: Kenya National Assembly.

Legal notice 163 (2015). The Kenya Information and Communications Act. Nairobi: Government Press.

Guizzo, E. (2006). Loser Britain’s Identity Crisis. Available at: http://spectrum.ieee.org/computing/software/loser-britains-identity-crisis (accessed October 24, 2016).

Ignacio, M., and Dan, R. (2010). Mobile Payments go Viral: M-Pesa in Kenya. Washington, DC: World bank.

Joseck, L. M. (2015). Fraud in Mobile Financial Services. Nairobi: A microsave publication.

William, J. T. (2010). The Economics of M-PESA. Washington, DC: Georgetown Uni2versity.

Downloads

Published

2017-03-25

How to Cite

Wanjohi, P. M. . (2017). Curbing Mobile Phone Terrorism and Financial Fraud: A Kenyan Perspective. Journal of ICT Standardization, 4(3), 237–246. https://doi.org/10.13052/jicts2245-800X.434

Issue

Section

Articles