SlideShare a Scribd company logo
13th November 2012


“Trust and security are critical elements of mobile
money operations”
Exclusive interview with Nick Essame, the Payment SME, at IBM                                      Nick Essame
                                                                                                  Payment SME
                                                                                                           IBM
1.    What is the relationship between investment, uptake and critical mass
      in driving mass-market adoption of a mobile money service in a cash-based society?

There is obviously a relationship among these three factors, but investment alone will not drive mass
adoption of mobile money. It will require multiple industry players to come together and collaborate in
developing a service that is interoperable, open, secure and provides real value that is easily understood by
consumers.

There is increasing demand for, as well as significant business, economic and societal benefits to be
gained from, mobile payments services. Strategic partnerships, global best practices and modern solutions
such as cloud based computing – and not just depth of pocket – will be key determinants in the creation of
successful, widely adopted systems.

2.     How do you build consumer trust in both your product and your distribution channels?

Trust and security are critical elements of mobile money operations. Mobile network operators (MNOs)
have already built huge brands and have a significant footprint on the ground via their pre-paid airtime
resellers and their mobile phone support infrastructure, such as SIM card and handset sales outlets

The banks also have broad market recognition. However, in the developing countries, banks may not have
existing relationships with consumers on one end of the spectrum, due to lack of access and financial
inclusion.

Building trust and credibility requires MNOs and banks to collaborate on ensuring the security of the mobile
payments system and to work with government and regulatory agencies on striking the right balance of
regulations that provide consumer protections.

Consumer education is key, in developing markets where consumers may have minimal experience
engaging in financial transactions, as well as mature markets, where security and the fear of hackers
remain an impediment to broad consumer adoption.

3.   Considering that financial inclusion is the end-game of many remittance services, how do you
convince customers to migrate their remittance accounts into e-savings?

There is often a natural evolution in this direction, but it is one that takes time. Once the basic trust is
established then the move to e-savings will be driven by several factors:

o    Value proposition to the consumer – is it interest earnings, ease of use for related purchases, safety for
     the funds (versus under the mattress), or even a status-related instrument (such as an associated
     premier withdrawal card)
o    Advocacy – funeral societies, Stokvels, MFI’s etc promoting e-savings

4.   How effective is an agent network at turning the fixed costs of implementing a nationwide
banking infrastructure to the variable costs of cash in/cash out transactions?

The fixed costs of implementing a nationwide banking infrastructure in the developing markets are typically
prohibitive, and may be further hampered by regulation. The coverage possible is severely constrained by
bricks and mortar costs, staff costs and availability, where opening hours, for instance, is often at odds with
community needs.

There are good examples of both new agency networks being implemented (in Brazil for example) and the
piggybacking of the cash in/cash out functionality onto existing agency networks ( M-Pesa on the back of
the Safaricom pre-paid airtime agents).

The piggy backing model may be easier and faster to implement as it is already established and cash flush
(note liquidity issues the further spread the agent network is) and helps because the fees/margins that an
agent receives for supporting cash in/cash out transactions tend to be lower than the discount received for
selling tangible (sodas) and intangible (pre-paid airtime) products. This is a direct result of having to price
the service to the end users at price points that encourage service uptake and effectively competes with
other options available to the consumers.

5.   Will as usage-based revenue model really drive mass-market adoption of financial services?
What are the risks on the back-end?

In the developing world, this is an easier model for the end users to embrace. The concept of payment for a
useful service is well understood, as the majority of the market is very value conscious. If the service is
useful, has value associated with it and is trusted then extensive market adoption can be achieved.

Other models have not been as successful. Charges may be hidden, poorly communicated to the
consumer, and in some cases, perceived as theft.

One risk on the back-end is the inability to achieve the necessary scale. Other risks may be more
operational, such as security compromises, lack of resources or leakage of funds and fraud. The political
risk are related to regulation and nationalisation concerns.

6.   How will the expansion of financial possibilities for the unbanked population be realised by
mobile banking services?

Historically, the unbanked population has lacked the funds, literacy requirements and access to financial
institutions. These barriers are now being overcome with the significant penetration of mobile phones into
the unbanked population.

Mobile payments are the entry point into the unbanked population – through remittances, bill payments etc.
Over time, the mobile payments market will evolve into light banking (pre-paid, no-frill accounts and e-
savings) with incremental increases in banking functionality..

7.   What are the major barriers to scaling mobile money services now that we are past the pilot
stage?

Lack of interoperability remains a key constraint, as the closed loop solutions – even with big MNO
foundations – doesn’t allow for ubiquity to be achieved. Conflicting interests among the ecosystem players,
as well as conflicting standards, must also be overcome.


For further information contact : Jo Down, JODOWN@uk.ibm.com +971 562 162 772 or Nick Essame,
NICKESSA@za.ibm.com + 27-082 893 4701

More Related Content

More from Casey Lucas

IBM Total Economic Impact Study - Cost Savings and Business Benefits
IBM Total Economic Impact Study - Cost Savings and Business BenefitsIBM Total Economic Impact Study - Cost Savings and Business Benefits
IBM Total Economic Impact Study - Cost Savings and Business Benefits
Casey Lucas
 
The Total Economic Impact of IBM Connections
The Total Economic Impact of IBM ConnectionsThe Total Economic Impact of IBM Connections
The Total Economic Impact of IBM Connections
Casey Lucas
 
Amplifying Employee Voice: Better Connect to the Pulse of your Workforce
Amplifying Employee Voice: Better Connect to the Pulse of your WorkforceAmplifying Employee Voice: Better Connect to the Pulse of your Workforce
Amplifying Employee Voice: Better Connect to the Pulse of your Workforce
Casey Lucas
 
IBM Analytics: Thought Leadership White Paper
IBM Analytics: Thought Leadership White PaperIBM Analytics: Thought Leadership White Paper
IBM Analytics: Thought Leadership White Paper
Casey Lucas
 
Customer Experience with IBM z Systems
Customer Experience with IBM z SystemsCustomer Experience with IBM z Systems
Customer Experience with IBM z Systems
Casey Lucas
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
Casey Lucas
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
Casey Lucas
 
Healthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperHealthcare Industry Security Whitepaper
Healthcare Industry Security Whitepaper
Casey Lucas
 
CIO Insights from the Global C-suite Study
CIO Insights from the Global C-suite StudyCIO Insights from the Global C-suite Study
CIO Insights from the Global C-suite Study
Casey Lucas
 
Global transformation from the inside out - Optimizing the entire ecosystem
Global transformation from the inside out - Optimizing the entire ecosystemGlobal transformation from the inside out - Optimizing the entire ecosystem
Global transformation from the inside out - Optimizing the entire ecosystem
Casey Lucas
 
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
Casey Lucas
 
IBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary AgendaIBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
Casey Lucas
 
IBM Enterprise 2014 - Technical University Abstract Guide
IBM Enterprise 2014 - Technical University Abstract GuideIBM Enterprise 2014 - Technical University Abstract Guide
IBM Enterprise 2014 - Technical University Abstract Guide
Casey Lucas
 
15 Lessons In Social Business Strategy from the Biggest Brands in the World
15 Lessons In Social Business Strategy from the Biggest Brands in the World15 Lessons In Social Business Strategy from the Biggest Brands in the World
15 Lessons In Social Business Strategy from the Biggest Brands in the World
Casey Lucas
 
The Truth About Application Release and Deployment - Top 10 Myths Exposed
The Truth About Application Release and Deployment - Top 10 Myths ExposedThe Truth About Application Release and Deployment - Top 10 Myths Exposed
The Truth About Application Release and Deployment - Top 10 Myths Exposed
Casey Lucas
 
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
Casey Lucas
 
5 Reasons Why MSPs Should Adopt IBM PureSystems
5 Reasons Why MSPs Should Adopt IBM PureSystems5 Reasons Why MSPs Should Adopt IBM PureSystems
5 Reasons Why MSPs Should Adopt IBM PureSystems
Casey Lucas
 
Webinar Invitation: How Social drives value into your existing web properties
Webinar Invitation: How Social drives value into your existing web propertiesWebinar Invitation: How Social drives value into your existing web properties
Webinar Invitation: How Social drives value into your existing web properties
Casey Lucas
 
Jun 25 webcast maximizing insight with big data analytics
Jun 25 webcast   maximizing insight with big data analyticsJun 25 webcast   maximizing insight with big data analytics
Jun 25 webcast maximizing insight with big data analytics
Casey Lucas
 
Vision 2013 - Conference Guide
Vision 2013 - Conference GuideVision 2013 - Conference Guide
Vision 2013 - Conference Guide
Casey Lucas
 

More from Casey Lucas (20)

IBM Total Economic Impact Study - Cost Savings and Business Benefits
IBM Total Economic Impact Study - Cost Savings and Business BenefitsIBM Total Economic Impact Study - Cost Savings and Business Benefits
IBM Total Economic Impact Study - Cost Savings and Business Benefits
 
The Total Economic Impact of IBM Connections
The Total Economic Impact of IBM ConnectionsThe Total Economic Impact of IBM Connections
The Total Economic Impact of IBM Connections
 
Amplifying Employee Voice: Better Connect to the Pulse of your Workforce
Amplifying Employee Voice: Better Connect to the Pulse of your WorkforceAmplifying Employee Voice: Better Connect to the Pulse of your Workforce
Amplifying Employee Voice: Better Connect to the Pulse of your Workforce
 
IBM Analytics: Thought Leadership White Paper
IBM Analytics: Thought Leadership White PaperIBM Analytics: Thought Leadership White Paper
IBM Analytics: Thought Leadership White Paper
 
Customer Experience with IBM z Systems
Customer Experience with IBM z SystemsCustomer Experience with IBM z Systems
Customer Experience with IBM z Systems
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Healthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperHealthcare Industry Security Whitepaper
Healthcare Industry Security Whitepaper
 
CIO Insights from the Global C-suite Study
CIO Insights from the Global C-suite StudyCIO Insights from the Global C-suite Study
CIO Insights from the Global C-suite Study
 
Global transformation from the inside out - Optimizing the entire ecosystem
Global transformation from the inside out - Optimizing the entire ecosystemGlobal transformation from the inside out - Optimizing the entire ecosystem
Global transformation from the inside out - Optimizing the entire ecosystem
 
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
 
IBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary AgendaIBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
 
IBM Enterprise 2014 - Technical University Abstract Guide
IBM Enterprise 2014 - Technical University Abstract GuideIBM Enterprise 2014 - Technical University Abstract Guide
IBM Enterprise 2014 - Technical University Abstract Guide
 
15 Lessons In Social Business Strategy from the Biggest Brands in the World
15 Lessons In Social Business Strategy from the Biggest Brands in the World15 Lessons In Social Business Strategy from the Biggest Brands in the World
15 Lessons In Social Business Strategy from the Biggest Brands in the World
 
The Truth About Application Release and Deployment - Top 10 Myths Exposed
The Truth About Application Release and Deployment - Top 10 Myths ExposedThe Truth About Application Release and Deployment - Top 10 Myths Exposed
The Truth About Application Release and Deployment - Top 10 Myths Exposed
 
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
 
5 Reasons Why MSPs Should Adopt IBM PureSystems
5 Reasons Why MSPs Should Adopt IBM PureSystems5 Reasons Why MSPs Should Adopt IBM PureSystems
5 Reasons Why MSPs Should Adopt IBM PureSystems
 
Webinar Invitation: How Social drives value into your existing web properties
Webinar Invitation: How Social drives value into your existing web propertiesWebinar Invitation: How Social drives value into your existing web properties
Webinar Invitation: How Social drives value into your existing web properties
 
Jun 25 webcast maximizing insight with big data analytics
Jun 25 webcast   maximizing insight with big data analyticsJun 25 webcast   maximizing insight with big data analytics
Jun 25 webcast maximizing insight with big data analytics
 
Vision 2013 - Conference Guide
Vision 2013 - Conference GuideVision 2013 - Conference Guide
Vision 2013 - Conference Guide
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Trust and security are critical elements of mobile money operations - Q&A interview

  • 1. 13th November 2012 “Trust and security are critical elements of mobile money operations” Exclusive interview with Nick Essame, the Payment SME, at IBM Nick Essame Payment SME IBM 1. What is the relationship between investment, uptake and critical mass in driving mass-market adoption of a mobile money service in a cash-based society? There is obviously a relationship among these three factors, but investment alone will not drive mass adoption of mobile money. It will require multiple industry players to come together and collaborate in developing a service that is interoperable, open, secure and provides real value that is easily understood by consumers. There is increasing demand for, as well as significant business, economic and societal benefits to be gained from, mobile payments services. Strategic partnerships, global best practices and modern solutions such as cloud based computing – and not just depth of pocket – will be key determinants in the creation of successful, widely adopted systems. 2. How do you build consumer trust in both your product and your distribution channels? Trust and security are critical elements of mobile money operations. Mobile network operators (MNOs) have already built huge brands and have a significant footprint on the ground via their pre-paid airtime resellers and their mobile phone support infrastructure, such as SIM card and handset sales outlets The banks also have broad market recognition. However, in the developing countries, banks may not have existing relationships with consumers on one end of the spectrum, due to lack of access and financial inclusion. Building trust and credibility requires MNOs and banks to collaborate on ensuring the security of the mobile payments system and to work with government and regulatory agencies on striking the right balance of regulations that provide consumer protections. Consumer education is key, in developing markets where consumers may have minimal experience engaging in financial transactions, as well as mature markets, where security and the fear of hackers remain an impediment to broad consumer adoption. 3. Considering that financial inclusion is the end-game of many remittance services, how do you convince customers to migrate their remittance accounts into e-savings? There is often a natural evolution in this direction, but it is one that takes time. Once the basic trust is established then the move to e-savings will be driven by several factors: o Value proposition to the consumer – is it interest earnings, ease of use for related purchases, safety for the funds (versus under the mattress), or even a status-related instrument (such as an associated premier withdrawal card) o Advocacy – funeral societies, Stokvels, MFI’s etc promoting e-savings 4. How effective is an agent network at turning the fixed costs of implementing a nationwide banking infrastructure to the variable costs of cash in/cash out transactions? The fixed costs of implementing a nationwide banking infrastructure in the developing markets are typically prohibitive, and may be further hampered by regulation. The coverage possible is severely constrained by bricks and mortar costs, staff costs and availability, where opening hours, for instance, is often at odds with community needs. There are good examples of both new agency networks being implemented (in Brazil for example) and the
  • 2. piggybacking of the cash in/cash out functionality onto existing agency networks ( M-Pesa on the back of the Safaricom pre-paid airtime agents). The piggy backing model may be easier and faster to implement as it is already established and cash flush (note liquidity issues the further spread the agent network is) and helps because the fees/margins that an agent receives for supporting cash in/cash out transactions tend to be lower than the discount received for selling tangible (sodas) and intangible (pre-paid airtime) products. This is a direct result of having to price the service to the end users at price points that encourage service uptake and effectively competes with other options available to the consumers. 5. Will as usage-based revenue model really drive mass-market adoption of financial services? What are the risks on the back-end? In the developing world, this is an easier model for the end users to embrace. The concept of payment for a useful service is well understood, as the majority of the market is very value conscious. If the service is useful, has value associated with it and is trusted then extensive market adoption can be achieved. Other models have not been as successful. Charges may be hidden, poorly communicated to the consumer, and in some cases, perceived as theft. One risk on the back-end is the inability to achieve the necessary scale. Other risks may be more operational, such as security compromises, lack of resources or leakage of funds and fraud. The political risk are related to regulation and nationalisation concerns. 6. How will the expansion of financial possibilities for the unbanked population be realised by mobile banking services? Historically, the unbanked population has lacked the funds, literacy requirements and access to financial institutions. These barriers are now being overcome with the significant penetration of mobile phones into the unbanked population. Mobile payments are the entry point into the unbanked population – through remittances, bill payments etc. Over time, the mobile payments market will evolve into light banking (pre-paid, no-frill accounts and e- savings) with incremental increases in banking functionality.. 7. What are the major barriers to scaling mobile money services now that we are past the pilot stage? Lack of interoperability remains a key constraint, as the closed loop solutions – even with big MNO foundations – doesn’t allow for ubiquity to be achieved. Conflicting interests among the ecosystem players, as well as conflicting standards, must also be overcome. For further information contact : Jo Down, JODOWN@uk.ibm.com +971 562 162 772 or Nick Essame, NICKESSA@za.ibm.com + 27-082 893 4701