<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Conference Proceedings</title>
<link href="http://41.59.91.195:9090/handle/123456789/117" rel="alternate"/>
<subtitle/>
<id>http://41.59.91.195:9090/handle/123456789/117</id>
<updated>2026-05-08T13:28:44Z</updated>
<dc:date>2026-05-08T13:28:44Z</dc:date>
<entry>
<title>Factors for the adoption of mobile banking solution on electronic payment in Dar es Salaam, Tanzania.</title>
<link href="http://41.59.91.195:9090/handle/123456789/170" rel="alternate"/>
<author>
<name>Mlelwa, Kenneth</name>
</author>
<id>http://41.59.91.195:9090/handle/123456789/170</id>
<updated>2023-08-09T16:09:20Z</updated>
<published>2023-01-01T00:00:00Z</published>
<summary type="text">Factors for the adoption of mobile banking solution on electronic payment in Dar es Salaam, Tanzania.
Mlelwa, Kenneth
This study aimed to examine the factors influencing the adoption of mobile &#13;
banking solutions for electronic payments in Dar es Salaam. The research adopted &#13;
a convergent parallel design and collected data from 96 respondents, including &#13;
bank and mobile money customers, bank officials, and mobile money service &#13;
providers. The findings revealed that the ease of use of banking services had a &#13;
positive impact on the adoption of electronic payments. Customers found mobile &#13;
banking to be a convenient alternative to traditional branch banking. It was also &#13;
observed that mobile banking solutions promoted efficiency and instilled &#13;
confidence in the financial system, thereby gaining public confidence. However, &#13;
the study identified security issues as a significant concern for respondents. They &#13;
expressed worries about the confidentiality of personal information, such as &#13;
contact details, as certain mobile banking service providers did not encrypt this &#13;
data. This raised concerns about potential fraudulent activities and identity theft. &#13;
To address these concerns, it is recommended that mobile banking service &#13;
providers enhance security measures, including encryption of sensitive &#13;
information, to ensure customer privacy and trust in the mobile banking system.
Conference Proceedings
</summary>
<dc:date>2023-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Investigate trojans, wireless concepts and their attacks</title>
<link href="http://41.59.91.195:9090/handle/123456789/169" rel="alternate"/>
<author>
<name>Mlelwa, Kenneth</name>
</author>
<id>http://41.59.91.195:9090/handle/123456789/169</id>
<updated>2023-08-09T16:09:12Z</updated>
<published>2023-01-01T00:00:00Z</published>
<summary type="text">Investigate trojans, wireless concepts and their attacks
Mlelwa, Kenneth
The World is becoming increasingly more mobile over the past few years. The &#13;
conventional methods of networking, which rely on physical cables, have proved &#13;
insufficient to address the challenges posed by our current collective lifestyle. As &#13;
individuals and businesses require constant connectivity and the ability to move &#13;
freely, wireless networking has emerged as a crucial solution. Wireless networks &#13;
use technologies such as 802.11 (Wi-Fi) to provide internet access without the &#13;
constraints of physical cables. Devices can remain connected to the network while &#13;
roaming, allowing for greater mobility. Access points are used to enhance Wi-Fi &#13;
signals, ensuring that devices can connect to the network even when they are far &#13;
from the router. This has made wireless networks immensely popular in various &#13;
settings, including public places like restaurants and cafes. However, wireless &#13;
networks are not without their security challenges. They are vulnerable to both &#13;
passive and active attacks. A passive attack involves an attacker capturing the &#13;
wireless signal without sending any signals themselves. These attacks can be &#13;
easily carried out using wireless antennas and are often undetectable. It is &#13;
important to assume that attackers can see everything on a wireless network as &#13;
part of a comprehensive security procedure. To secure a wireless network, &#13;
administrators need to be aware of the vulnerabilities that exist and the types of &#13;
attacks that can exploit them. Malicious software, or malware, poses a significant &#13;
threat to wireless LANs as they have become more common. These programs can &#13;
disguise themselves as legitimate code or programs and once inside the network, &#13;
attackers can perform a range of unauthorized actions such as transferring files, &#13;
modifying data, or deleting files. Another security concern is the presence of &#13;
backdoors, which refer to methods that allow authorized and unauthorized users &#13;
to bypass normal security measures and gain high-level access to a computer &#13;
system, network, or software application. These backdoors can be exploited by &#13;
attackers to gain unauthorized access to sensitive information or control over the &#13;
network. A denial-of-service (DoS) attack is a common threat to wireless networks &#13;
as well. It involves disrupting the efficient use of network resources and essential &#13;
services, rendering the network unavailable to legitimate users. This can disrupt &#13;
operations and cause significant inconvenience or financial loss. Session hijacking &#13;
attacks occur when an attacker takes over a user's wireless session. This can &#13;
happen while the user is performing activities such as checking their credit card &#13;
balance, paying bills, or shopping online. The hijacker typically targets the user's &#13;
browser or web application programs, allowing them to gain unauthorized access &#13;
to sensitive information or perform fraudulent actions. Thereof, while wireless &#13;
networks provide immense convenience and mobility, they also present security &#13;
risks. It is crucial for network administrators to be aware of these vulnerabilities &#13;
and implement appropriate security measures to protect against passive and active &#13;
attacks, malware, backdoors, DoS attacks, and session hijacking. This will help &#13;
ensure the integrity and privacy of the network and its users.
Conference Proceedings
</summary>
<dc:date>2023-01-01T00:00:00Z</dc:date>
</entry>
</feed>
