Wireless transactions set to change the way SA spends

March 2006 Infrastructure

South African spending habits are about to be revolutionised by a combination of changes in banking infrastructure and the ubiquity of the cellphone, says Réan van Niekerk, managing director of Datalinx Technologies. There are products already in development, and due to hit the market within a year or two, that will make low-cost mobile banking available to all - and have the potential to generate a great deal of new economic activity.

Some early cellphone banking applications have already hit the market, but they are just a taste of what is to come. "I expect that very soon cellphones will incorporate smartcard features that will enable them to be used to pay for anything, anywhere and at any time - from petrol to restaurant bills to utility accounts to handing out children's pocket money," says Van Niekerk. "To people without the benefits of access to PCs and the Internet - which have saved untold hours for Internet banking customers - this will offer a previously undreamed-of flexibility and freedom."

One development driving this is the rapid rollout of banking facilities over the past couple of years, due partly to the introduction of the Msanzi account and partly to developments in the use of debit cards. The major banks have become huge issuers of cards, with the result that a massive 87% of all households in the country now have one or more bank cards, compared to just 15% in 1980.

The increase in the number of bank accounts is one part of the story; the other is the amazing success of our cellphone industry in enabling South Africa's communications infrastructure to leapfrog several decades of fixed-line development in just 10 years. There are now 21 million cellphones in the country, nearly one for every two people including children.

South Africans, ever resourceful, have not been slow to take advantage of the implications, as recent initiatives by MTN Banking and cellphone bank Wizzit confirm. A huge shift is under way in South African consumer habits, which will see voice becoming a secondary feature of cellphones compared to their transaction capabilities.

"The key to realising this potential is the creation of a country-wide cloud of wireless, secure communications, which is already well under way. This communications cloud will include GSM, satellite and other wireless technologies, all co-operating smoothly to give users ubiquitous communications at the lowest possible cost," Van Niekerk continues. "By 2007 we expect the convergence of communications technologies to have reached the point where your cellphone will double as a cordless home phone: you will be able to pick up a landline call on your handset, continue talking all the way into your car and onto the highway, and all the way to your weekend bushveld hideaway if necessary, all without noticing the handovers between different technologies and networks."

Security will be provided by point-to-point AES encryption, the symmetric cryptosystem recommended by the US National Institute of Standards and Technology as a successor to the DES and triple-DES standards currently used by the banking industry.

"This security is the key to future banking applications, providing the safety assurances that will encourage consumers - and, crucially, small and informal retailers - to adopt mobile banking technology. The next couple of years should see a slow but steady increase in the number of merchants able and willing to accept cellphone payments, although much of this may be invisible to relatively wealthy urban dwellers who already have access to most of the banking they need. Canny service providers will get into the market early - and when the trend reaches the mainstream, expect it to be huge," Van Niekerk concludes.

For more information contact Réan van Niekerk, Datalinx, 0861 112 655, [email protected]

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Smart mining operations management
Mining (Industry) Infrastructure IoT & Automation
In his presentation at the recent MESA Africa conference, Neels van der Walt, Business Development Manager at Iritron, revealed the all-encompassing concept of SMOM (Smart Mining Operations Management) and why it is inextricably linked to the future of worldwide mining operations.

Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Cyber resilience – protect, defend, recover
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Top bets for backup and business continuity
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Next-gen solar-powered switches
Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.

Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Creating a cybersecurity strategy in a world where threats never sleep
Information Security Infrastructure
[Sponsored Content] The boom of Internet of Things (IoT) technology and the chaos that surrounded the sudden shift to work-from-home models in 2020 kick-started the age of cybercrime. In that period, incidents rose by 600%, affecting every industry and showing no signs of slowing down.