Kohlton White

ITS 380

Chapter 5


1.       What are the three types of mobile payments and how do they differ?

The 3 types of mobile payments are proximity payments, branded proximity payments and p2p payments.

Proximity payments – are payment methods that are universally accepted. Like with Samsung Pay, you can use it at just about every store that accepts payment by card.

Branded proximity payments – are POS payment methods that are fairly limited to certain retailers. Not all retailers

P2P payment – is peer to peer payment, where people can transfer money from their account to another users account. Venmo and PayPal are the more common versions of this.

 This is a payment system that focuses on sending payment to users of the same payment app. A very popular example of this is Venmo. On Venmo people can send payments for various reasons such as paying someone back for dinner or sending their portion of the rent check over.

2.       Who are the largest adopters of mobile payments? Why?

Millennials are by far the largest group to adopt mobile payments. Mainly because they’re more use to using technology like mobile devices for making payments.

3.       Why are digital wallets provided by Apple, Google, and Samsung not growing as fast as expected?

I think the main reason why the growth is slower in countries like the US, is because the infrastructure isn’t there. Retailers are more hesitant to investing into new forms of infrastructure that isn’t universally used. This is also why contactless cards are struggling to gain ground in the US.

4.       What is Zelle and why did it grow so fast in the last few years?


Zelle, the P2P payment method, is very popular because it offers users a faster (almost instantaneous) way to transfer money at competitive rates. The biggest downside to Zelle is that it doesn’t use the proxy payment method.  



1. Imagine you are the owner of an e-commerce website. What are some of the signs that your site has been hacked?

Weird activities from admins or executive accounts. Unusual network activities. Ransomware notices. These are all signs of getting hacked.


2. Given the shift toward m-commerce, do a search on m-commerce (or mobile commerce) crime. Identify and discuss the security threats this type of technology creates.

The biggest thing to worry about is using public Wi-Fi when purchasing on mobile. Mobile devices are becoming like Macs 10 years ago. There wasn’t much hacking and malware going on at the time because there wasn’t much to gain from it. But now that m-commerce is huge, it’s definitely something to worry about now.