1 / 4

Key Lessons from 2011 What Have We Learnt?

Key Lessons from 2011 What Have We Learnt?. Different Development Philosophies Banks Focus on Security and Interoperability Lots of documentation, Minimal Change Restricts innovation ? Mobile Application Developers Fast to market, regular addition of new features

hide
Download Presentation

Key Lessons from 2011 What Have We Learnt?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Key Lessons from 2011 What Have We Learnt? • Different Development Philosophies Banks • Focus on Security and Interoperability • Lots of documentation, Minimal Change • Restricts innovation ? Mobile Application Developers • Fast to market, regular addition of new features • “Rapid Development” (minimal documentation) • Opportunity for errors? We will fix them in later releases Please Copy and Distribute

  2. Key Lessons from 2011 Risk – Products are Insecure What a card looks like to a Square credit card reader Please Copy and Distribute

  3. Key Lessons from 2011 Perceived Value of Data on Phone • What is the Value of the Data on Your Smartphone • iPhone sales in Lagos • Same Connector used to Charge and Back Up Data • Juice Jacking (DefCon 2011) • Mobile charging point that doesn’t just charge your mobile device but instead takes advantage of automatic sync capabilities Please Copy and Distribute

  4. Key Lessons from 2011 Malicious Applications • Mobile Malware • Applications that seek to retrieve credentials or fake transactions • Principally Key-Loggers or Trojans • QR Codes have been used to spread Malware • Increase MNO’s Customer Service Costs • Smart Tags Deliver the Same Functionality • Sales of Mobile Anti- Virus Software is Minimal Please Copy and Distribute

More Related