Professional Documents
Culture Documents
Cloud
Cloud
Cloud
Impersonation occurs when a fraudster steals information and then poses as a genuine
user to do a transaction using the stolen e-wallet details and password.
Acts as a Proxy
Unlike credit cards, a secure e-wallet service will help conceal a consumer’s banking and
private information. E-wallets only access the funds that a consumer makes available. This
means that when a transaction is made, e-wallets do not access a consumer’s wider banking
information to make payment and will not log metadata that can be captured by a third party.
By acting as a proxy, e-wallets provide better mobile wallet security by preventing third
parties from accessing information that can be used to commit fraud or identity theft.
Accountability
Instant Payments
E-wallets allow quick and efficient transactions compared to bank accounts and credit cards
that have to pass through additional databases and processing systems before the transaction
is completed. It can take up to 2-3 days before a credit card or debit transaction appears on a
consumer’s bank account, causing confusion about available balances.
Limited Risk
Let’s say someone loses their phone. It is unlocked or doesn’t have a password, and someone
with less than positive intentions locates it. Whoever gets a hold of that phone will only have
access to the funds placed in the e-wallet account instead of to an entire bank account through
the loss of a physical wallet. The shortfall of funds would hurt but it would be minimal and
short-lived since the majority of people who use secure e-wallets only put in a few days or
weeks’ worth of pay.