Background of the Study
Mobile and web applications are essential for fintech firms, providing customers with easy access to financial services such as transactions, account management, and payments. However, these applications are increasingly targeted by cybercriminals due to the sensitive nature of the data they handle. Security vulnerabilities in these applications can lead to data breaches, financial losses, and reputational damage (Adeyemi & John, 2024).
While web applications have been around longer, mobile apps are rapidly becoming the preferred platform for users due to their portability and ease of use. However, mobile apps present unique security challenges, such as device theft, insecure data storage, and vulnerabilities in mobile operating systems. This study compares the security vulnerabilities between mobile and web applications used by fintech firms in Taraba State, focusing on the types of threats, preventive measures, and their effectiveness.
Statement of the Problem
Although both mobile and web applications face security threats, fintech firms in Taraba State may be underprepared for the distinct vulnerabilities associated with each platform. There is a need to assess how these security risks impact the operations of fintech firms and the measures they implement to secure their applications. This study aims to compare the security vulnerabilities in mobile and web applications used by fintech firms in Taraba State and evaluate the effectiveness of current security practices.
Objectives of the Study
Research Questions
Research Hypotheses
Scope and Limitations of the Study
This study focuses on fintech firms in Taraba State, comparing the security vulnerabilities and measures of mobile and web applications from 2023 to 2025. Limitations include the availability of data on security breaches and proprietary information on security measures.
Definitions of Terms
Mobile Applications: Software applications designed for use on mobile devices such as smartphones and tablets.
Web Applications: Software applications accessed through a web browser over the internet, typically running on a server.
Security Vulnerabilities: Weaknesses in an application that could be exploited by cybercriminals to gain unauthorized access or cause harm to the system.
Background of the Study
In urban markets, branch network expansion plays a critical role in increasing a bank’s marke...
Background of the Study
Video streaming is an essential component of online learning platforms, providing students with acc...
Background of the Study
Cancer treatment often leads to long-term physical and psychological effects, necessitating structured post-treat...
Abstract
The aim of this study was to investigate Audience perception of federal government removal of...
Background of the Study
Febrile convulsions are common in pediatric patients, typically occurring betwe...
Chapter One: Introduction
1.1 Background of the Study...
Abstract
The main aim of the research is to determine if the difference in belief is the major cause of church division...
Background of the Study
Asset management is a key driver of investment performance in the banking sector. Keystone Bank has implemented s...
Background of the Study
Network security remains a major concern for educational institutions worldwide...