-
Design and Evaluation of Privacy-Preserving Protocols for Agent-Facilitated Mobile Money Services in Kenya
Authors:
Karen Sowon,
Collins W. Munyendo,
Lily Klucinec,
Eunice Maingi,
Gerald Suleh,
Lorrie Faith Cranor,
Giulia Fanti,
Conrad Tucker,
Assane Gueye
Abstract:
Mobile Money (MoMo), a technology that allows users to complete digital financial transactions using a mobile phone without requiring a bank account, has become a common method for processing financial transactions in Africa and other developing regions. Operationally, users can deposit (exchange cash for mobile money tokens) and withdraw with the help of human agents who facilitate a near end-to-…
▽ More
Mobile Money (MoMo), a technology that allows users to complete digital financial transactions using a mobile phone without requiring a bank account, has become a common method for processing financial transactions in Africa and other developing regions. Operationally, users can deposit (exchange cash for mobile money tokens) and withdraw with the help of human agents who facilitate a near end-to-end process from customer onboarding to authentication and recourse. During deposit and withdraw operations, know-your-customer (KYC) processes require agents to access and verify customer information such as name and ID number, which can introduce privacy and security risks. In this work, we design alternative protocols for mobile money deposits and withdrawals that protect users' privacy while enabling KYC checks. These workflows redirect the flow of sensitive information from the agent to the MoMo provider, thus allowing the agent to facilitate transactions without accessing a customer's personal information. We evaluate the usability and efficiency of our proposed protocols in a role play and semi-structured interview study with 32 users and 15 agents in Kenya. We find that users and agents both generally appear to prefer the new protocols, due in part to convenient and efficient verification using biometrics, better data privacy and access control, as well as better security mechanisms for delegated transactions. Our results also highlight some challenges and limitations that suggest the need for more work to build deployable solutions.
△ Less
Submitted 24 December, 2024;
originally announced December 2024.
-
Cattle Identification Using Muzzle Images and Deep Learning Techniques
Authors:
G. N. Kimani,
P. Oluwadara,
P. Fashingabo,
M. Busogi,
E. Luhanga,
K. Sowon,
L. Chacha
Abstract:
Traditional animal identification methods such as ear-tagging, ear notching, and branding have been effective but pose risks to the animal and have scalability issues. Electrical methods offer better tracking and monitoring but require specialized equipment and are susceptible to attacks. Biometric identification using time-immutable dermatoglyphic features such as muzzle prints and iris patterns…
▽ More
Traditional animal identification methods such as ear-tagging, ear notching, and branding have been effective but pose risks to the animal and have scalability issues. Electrical methods offer better tracking and monitoring but require specialized equipment and are susceptible to attacks. Biometric identification using time-immutable dermatoglyphic features such as muzzle prints and iris patterns is a promising solution. This project explores cattle identification using 4923 muzzle images collected from 268 beef cattle. Two deep learning classification models are implemented - wide ResNet50 and VGG16\_BN and image compression is done to lower the image quality and adapt the models to work for the African context. From the experiments run, a maximum accuracy of 99.5\% is achieved while using the wide ResNet50 model with a compression retaining 25\% of the original image. From the study, it is noted that the time required by the models to train and converge as well as recognition time are dependent on the machine used to run the model.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
User Experiences with Third-Party SIM Cards and ID Registration in Kenya and Tanzania
Authors:
Edith Luhanga,
Karen Sowon,
Lorrie Faith Cranor,
Giulia Fanti,
Conrad Tucker,
Assane Gueye
Abstract:
Mobile money services in Sub-Saharan Africa (SSA) have increased access to financial services. To ensure proper identification of users, countries have put in place Know-Your-Customer (KYC) measures such as SIM registration using an official identification. However, half of the 850 million people without IDs globally live in SSA, and the use of SIM cards registered in another person's name (third-…
▽ More
Mobile money services in Sub-Saharan Africa (SSA) have increased access to financial services. To ensure proper identification of users, countries have put in place Know-Your-Customer (KYC) measures such as SIM registration using an official identification. However, half of the 850 million people without IDs globally live in SSA, and the use of SIM cards registered in another person's name (third-party SIM) is prevalent. In this study, we explore challenges that contribute to and arise from the use of third-party SIM cards. We interviewed 36 participants in Kenya and Tanzania. Our results highlight great strides in ID accessibility, but also highlight numerous institutional and social factors that contribute to the use of third-party SIM cards. While privacy concerns contribute to the use of third-party SIM cards, third-party SIM card users are exposed to significant security and privacy risks, including scams, financial loss, and wrongful arrest.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania
Authors:
Karen Sowon,
Edith Luhanga,
Lorrie Faith Cranor,
Giulia Fanti,
Conrad Tucker,
Assane Gueye
Abstract:
Digital financial services have catalyzed financial inclusion in Africa. Commonly implemented as a mobile wallet service referred to as mobile money (MoMo), the technology provides enormous benefits to its users, some of whom have long been unbanked. While the benefits of mobile money services have largely been documented, the challenges that arise -- especially in the interactions between human s…
▽ More
Digital financial services have catalyzed financial inclusion in Africa. Commonly implemented as a mobile wallet service referred to as mobile money (MoMo), the technology provides enormous benefits to its users, some of whom have long been unbanked. While the benefits of mobile money services have largely been documented, the challenges that arise -- especially in the interactions between human stakeholders -- remain relatively unexplored. In this study, we investigate the practices of mobile money users in their interactions with mobile money agents. We conduct 72 structured interviews in Kenya and Tanzania (n=36 per country). The results show that users and agents design workarounds in response to limitations and challenges that users face within the ecosystem. These include advances or loans from agents, relying on the user-agent relationships in place of legal identification requirements, and altering the intended transaction execution to improve convenience. Overall, the workarounds modify one or more of what we see as the core components of mobile money: the user, the agent, and the transaction itself. The workarounds pose new risks and challenges for users and the overall ecosystem. The results suggest a need for rethinking privacy and security of various components of the ecosystem, as well as policy and regulatory controls to safeguard interactions while ensuring the usability of mobile money.
△ Less
Submitted 31 August, 2023;
originally announced September 2023.
-
Conceptualising Healthcare-Seeking as an Activity to Explain Technology Use: A Case of M-health
Authors:
Karen Sowon,
Wallace Chigona
Abstract:
The purpose of this paper is to engage with the Information Systems' contexts of use as a means to explain nuanced human-technology interaction. In this paper, we specifically propose the conceptualisation of healthcare-seeking as an activity to offer a richer explanation of technology utilisation. This is an interpretivist study drawing on Activity Theory to conceptualise healthcare-seeking as th…
▽ More
The purpose of this paper is to engage with the Information Systems' contexts of use as a means to explain nuanced human-technology interaction. In this paper, we specifically propose the conceptualisation of healthcare-seeking as an activity to offer a richer explanation of technology utilisation. This is an interpretivist study drawing on Activity Theory to conceptualise healthcare-seeking as the minimum context needed to explicate use. A framework of the core aspects of AT is used to analyse one empirical mHealth case from a Kenyan context thus illustrating how AT can be applied to study technology use. The paper explicates technology use by explaining various utilisation behaviour that may emerge in a complex human-technology interaction context; ranging from a complex adoption process to mechanisms to determine continuance that differentiate trust in the intervention from trust in the information, and potential technology coping strategies. The paper is a novel attempt to operationalise AT to study technology use. It thus offers a broader explication of use while providing insights for design and implementation made possible by the conceptualisation of healthcare-seeking as an activity. Such insights may be useful in the design of patient-centred systems.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.