The Security and Privacy of Mobile Banking in Qatar: A Case Highlighting Current Challenges and Future Recommendations
DOI:
https://doi.org/10.54536/ajmri.v5i1.3162Keywords:
Cybersecurity, Mobile Banking, Qatar, Regulatory Frameworks, Security, Privacy, Technological Vulnerabilities, User BehaviorAbstract
This study explores the multidimensional security and privacy issues in mobile banking within Qatar through semi-structured interviews with seven key industry participants, including representatives from the Qatari Central Bank, cybersecurity specialists, bankers, a mobile banking technology provider, and an academic expert in digital security. Using thematic analysis based on Braun and Clarke's framework, the study identifies key themes: regulatory challenges, technological vulnerabilities, user behavior and education, and future trends in mobile banking security. The findings reveal the necessity for continuously enhancing regulatory frameworks, adopting advanced technological solutions, comprehensive user education programs, and a balanced approach to security and user experience. The study provides valuable insights into the current landscape and future directions for mobile banking security in Qatar, highlighting the importance of a proactive, collaborative approach to safeguarding against cyber threats.
Downloads
References
Abdul-Wahab, A.-H., & Haron, R. (2017). Efficiency of Qatari banking industry: an empirical investigation. International Journal of Bank Marketing, 35(2), 298-318.
Abu-Taieh, E. M., AlHadid, I., Abu-Tayeh, S., Masa’deh, R. e., Alkhawaldeh, R. S., Khwaldeh, S., & Alrowwad, A. a. (2022). Continued intention to use of M-Banking in Jordan by integrating UTAUT, TPB, TAM and service quality with ML. Journal of Open Innovation: Technology, Market, and Complexity, 8(3), 120.
Akpakwu, G. A., Silva, B. J., Hancke, G. P., & Abu-Mahfouz, A. M. (2017). A survey on 5G networks for the Internet of Things: Communication technologies and challenges. Ieee Access, 6, 3619-3647.
Al-Delayel, S. A. (2022). Security Analysis of Mobile Banking Application in Qatar. arXiv preprint arXiv:2202.00582.
AL-Dosari, K., Fetais, N., & Kucukvar, M. (2024). Artificial intelligence and cyber defense system for banking industry: A qualitative study of AI applications and challenges. Cybernetics and systems, 55(2), 302-330.
Al-Hababi, A., & Tokgoz, S. C. (2020). Man-in-the-middle attacks to detect and identify services in encrypted network flows using machine learning. 2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet),
Al-Khalaf, E., & Choe, P. (2020). Increasing customer trust towards mobile commerce in a multicultural society: A case of Qatar. Journal of Internet Commerce, 19(1), 32-61.
Al-Mhiqani, M. N., Ahmad, R., Yassin, W., Hassan, A., Abidin, Z. Z., Ali, N. S., & Abdulkareem, K. H. (2018). Cyber-security incidents: a review cases in cyber-physical systems. International Journal of Advanced Computer Science and Applications, 9(1).
Al-Naimi, L., & Abu-Shanab, E. A. (2024). Factors influencing the intention to use mobile banking. International Journal of Electronic Banking, 4(2), 120-137.
Al-Naimi, L. N. N. (2022). Factors Influencing The Intention To Use Mobile Banking In QataR
Albinali, A. A. (2023). Three Essays on Banking in Qatar Hamad Bin Khalifa University (Qatar)].
Alnoaimi, S. (2016). Determinants of Success Usage of Information Systems In Public Sector In The State of Qatar.
Alsalem, A., & Abu-Shanab, E. A. (2022). Challenges and Factors Influencing the Adoption of Internet Banking in Qatar. International Journal of Web Portals (IJWP), 14(1), 1-20.
Alsayed, A., & Bilgrami, A. (2017). E-banking security: Internet hacking, phishing attacks, analysis and prevention of fraudulent activities. International Journal of Emerging Technology and advanced engineering, 7(1), 109-115.
Apaua, R., & Lallie, H. S. (2022). Measuring user perceived security of mobile banking applications. arXiv preprint arXiv:2201.03052.
Asif, M., Khan, M. A., Alhumoudi, H., & Wasiq, M. (2023). Examining the Role of Self-Reliance, Social Domination, Perceived Surveillance, and Customer Support with Respect to the Adoption of Mobile Banking. International journal of environmental research and public health, 20(5), 3854.
Au, Y. A., & Kauffman, R. J. (2008). The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application. Electronic Commerce Research and Applications, 7(2), 141-164.
Badran, A. (2023). Developing smart cities: Regulatory and policy implications for the State of Qatar. International Journal of Public Administration, 46(7), 519-532.
Bassolé, D., Koala, G., Traoré, Y., & Sié, O. (2020). Vulnerability analysis in mobile banking and payment applications on android in African Countries. Innovations and Interdisciplinary Solutions for Underserved Areas: 4th EAI International Conference, InterSol 2020, Nairobi, Kenya, March 8-9, 2020, Proceedings 4,
Braun, V., Clarke, V., & Hayfield, N. (2022). 'A starting point for your journey, not a map': Nikki Hayfield in conversation with Virginia Braun and Victoria Clarke about thematic analysis. Qualitative research in psychology, 19(2), 424-445.
Council, F. F. I. E. (2005). Authentication in an internet banking environment. Retrieved June, 28, 2006.
Das, S., & Ganguly, D. (2024). Protecting Your Assets: Effective Use of Cybersecurity Measures in Banking Industries. In Next-Generation Cybersecurity: AI, ML, and Blockchain (pp. 265-286). Springer.
Diamantopoulou, V., Tsohou, A., & Karyda, M. (2020). From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls. Information & Computer Security, 28(4), 645-662.
Downs, J. S., Holbrook, M. B., & Cranor, L. F. (2006, July). Decision strategies and susceptibility to phishing. In Proceedings of the second symposium on Usable privacy and security (pp. 79-90).
Javed, Y., Al Qahtani, E., & Shehab, M. (2021). Privacy policy analysis of banks and mobile money services in the middle east. Future Internet, 13(1), 10.
Khan, H., Talib, F., & Faisal, M. N. (2015). An analysis of the barriers to the proliferation of M-Commerce in Qatar: A relationship modeling approach. Journal of Systems and Information Technology, 17(1), 54-81.
Khan, H. U., Malik, M. Z., Nazir, S., & Khan, F. (2023). Utilising bio metric system for enhancing cyber security in banking sector: a systematic analysis. Ieee Access.
Kruse, L., Wunderlich, N., & Beck, R. (2019). Artificial intelligence for the financial services industry: What challenges organizations to succeed.
Luo, X., Li, H., Zhang, J., & Shim, J. P. (2010). Examining multidimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services. Decision support systems, 49(2), 222-234.
Merhi, M., Hone, K., Tarhini, A., & Ameen, N. (2021). An empirical examination of the moderating role of age and gender in consumer mobile banking use: a cross-national, quantitative study. Journal of Enterprise Information Management, 34(4), 1144-1168.
Millett, L. I., & Pato, J. N. (2010). Biometric recognition: Challenges and opportunities.
Musa, A., Khan, H. U., & AlShare, K. A. (2015). Factors influence consumers' adoption of mobile payment devices in Qatar. International journal of mobile communications, 13(6), 670-689.
Najafi, B., Amra, M., & Najafi, A. (2024). Exploring Global Fintech Advancement and Application: Case of Saudi Arabia, Turkey, and Qatar. In Exploring Global FinTech Advancement and Applications (pp. 158-211). IGI Global.
Nasser, A. (2020). Cybercrime: theoretical determinants, criminal policies, prevention & control mechanisms. International Journal of Technology and Systems, 5(1), 34-63.
Olabanji, S. O., Olaniyi, O. O., Adigwe, C. S., Okunleye, O. J., & Oladoyinbo, T. O. (2024). AI for Identity and Access Management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorisation, and access control within cloud-based systems. Authorisation, and Access Control within Cloud-Based Systems (January 25, 2024).
Omeleze, S., & Venter, H. S. (2013, August). Testing the harmonised digital forensic investigation process model-using an Android mobile phone. In 2013 Information Security for South Africa (pp. 1-8). IEEE.
Pearce, M., Zeadally, S., & Hunt, R. (2013). Virtualisation: Issues, security threats, and solutions. ACM computing surveys (CSUR), 45(2), 1-39.
Rojas, J. (2021). Inconsistencies in Data Privacy Regulation: Financial Institution and Individual Customer Risks [Utica College].
Rombe, E., Zahara, Z., Santi, I., & Rahadhini, M. (2021). Exploring e-mobile banking implementation barriers on Indonesian millennial generation consumers. International Journal of Data and Network Science, 5(4), 579-586.
Sangwan, Y. S., Lal, S., Bhambri, P., Kumar, A., & Dhanoa, I. S. (2021). Advancements in social data security and encryption: a review.
Sharma, A., Singh, S. K., Kumar, S., Chhabra, A., & Gupta, S. (2021, September). Security of android banking mobile apps: Challenges and opportunities. In International conference on cyber security, privacy and networking (pp. 406-416). Cham: Springer International Publishing.
Sharma, M., Banerjee, S., & Paul, J. (2022). Role of social media on mobile banking adoption among consumers. Technological Forecasting and Social Change, 180, 121720.
Sun, G. (2020). Banking institutions and banking regulations. The handbook of China's financial system, 9-37.
Team, C. (2014). Unintentional insider threats: A review of phishing and malware incidents by economic sector.
Tsobdjou, L. D., Pierre, S., & Quintero, A. (2024). A framework for security assessment of android mobile banking applications. Computer Networks and Communications, 53-67.
Weichbroth, P., & Łysik, Ł. (2020). Mobile security: Threats and best practices. Mobile Information Systems, 2020, 1-15.
Wheeb, H. F. (2023). The Legal System of Banking Inspection Legal Study. Russian Law Journal, 11(11S), 368-380.
Yeng, P. K., Fauzi, M. A., Yang, B., & Nimbe, P. (2022). Investigation into phishing risk behaviour among healthcare staff. Information, 13(8), 392.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Amira Omar Mahgoub Mohamed Ali

This work is licensed under a Creative Commons Attribution 4.0 International License.



