SlideShare a Scribd company logo
1 of 2
Download to read offline
13th November 2012


“Trust and security are critical elements of mobile
money operations”
Exclusive interview with Nick Essame, the Payment SME, at IBM                                      Nick Essame
                                                                                                  Payment SME
                                                                                                           IBM
1.    What is the relationship between investment, uptake and critical mass
      in driving mass-market adoption of a mobile money service in a cash-based society?

There is obviously a relationship among these three factors, but investment alone will not drive mass
adoption of mobile money. It will require multiple industry players to come together and collaborate in
developing a service that is interoperable, open, secure and provides real value that is easily understood by
consumers.

There is increasing demand for, as well as significant business, economic and societal benefits to be
gained from, mobile payments services. Strategic partnerships, global best practices and modern solutions
such as cloud based computing – and not just depth of pocket – will be key determinants in the creation of
successful, widely adopted systems.

2.     How do you build consumer trust in both your product and your distribution channels?

Trust and security are critical elements of mobile money operations. Mobile network operators (MNOs)
have already built huge brands and have a significant footprint on the ground via their pre-paid airtime
resellers and their mobile phone support infrastructure, such as SIM card and handset sales outlets

The banks also have broad market recognition. However, in the developing countries, banks may not have
existing relationships with consumers on one end of the spectrum, due to lack of access and financial
inclusion.

Building trust and credibility requires MNOs and banks to collaborate on ensuring the security of the mobile
payments system and to work with government and regulatory agencies on striking the right balance of
regulations that provide consumer protections.

Consumer education is key, in developing markets where consumers may have minimal experience
engaging in financial transactions, as well as mature markets, where security and the fear of hackers
remain an impediment to broad consumer adoption.

3.   Considering that financial inclusion is the end-game of many remittance services, how do you
convince customers to migrate their remittance accounts into e-savings?

There is often a natural evolution in this direction, but it is one that takes time. Once the basic trust is
established then the move to e-savings will be driven by several factors:

o    Value proposition to the consumer – is it interest earnings, ease of use for related purchases, safety for
     the funds (versus under the mattress), or even a status-related instrument (such as an associated
     premier withdrawal card)
o    Advocacy – funeral societies, Stokvels, MFI’s etc promoting e-savings

4.   How effective is an agent network at turning the fixed costs of implementing a nationwide
banking infrastructure to the variable costs of cash in/cash out transactions?

The fixed costs of implementing a nationwide banking infrastructure in the developing markets are typically
prohibitive, and may be further hampered by regulation. The coverage possible is severely constrained by
bricks and mortar costs, staff costs and availability, where opening hours, for instance, is often at odds with
community needs.

There are good examples of both new agency networks being implemented (in Brazil for example) and the
piggybacking of the cash in/cash out functionality onto existing agency networks ( M-Pesa on the back of
the Safaricom pre-paid airtime agents).

The piggy backing model may be easier and faster to implement as it is already established and cash flush
(note liquidity issues the further spread the agent network is) and helps because the fees/margins that an
agent receives for supporting cash in/cash out transactions tend to be lower than the discount received for
selling tangible (sodas) and intangible (pre-paid airtime) products. This is a direct result of having to price
the service to the end users at price points that encourage service uptake and effectively competes with
other options available to the consumers.

5.   Will as usage-based revenue model really drive mass-market adoption of financial services?
What are the risks on the back-end?

In the developing world, this is an easier model for the end users to embrace. The concept of payment for a
useful service is well understood, as the majority of the market is very value conscious. If the service is
useful, has value associated with it and is trusted then extensive market adoption can be achieved.

Other models have not been as successful. Charges may be hidden, poorly communicated to the
consumer, and in some cases, perceived as theft.

One risk on the back-end is the inability to achieve the necessary scale. Other risks may be more
operational, such as security compromises, lack of resources or leakage of funds and fraud. The political
risk are related to regulation and nationalisation concerns.

6.   How will the expansion of financial possibilities for the unbanked population be realised by
mobile banking services?

Historically, the unbanked population has lacked the funds, literacy requirements and access to financial
institutions. These barriers are now being overcome with the significant penetration of mobile phones into
the unbanked population.

Mobile payments are the entry point into the unbanked population – through remittances, bill payments etc.
Over time, the mobile payments market will evolve into light banking (pre-paid, no-frill accounts and e-
savings) with incremental increases in banking functionality..

7.   What are the major barriers to scaling mobile money services now that we are past the pilot
stage?

Lack of interoperability remains a key constraint, as the closed loop solutions – even with big MNO
foundations – doesn’t allow for ubiquity to be achieved. Conflicting interests among the ecosystem players,
as well as conflicting standards, must also be overcome.


For further information contact : Jo Down, JODOWN@uk.ibm.com +971 562 162 772 or Nick Essame,
NICKESSA@za.ibm.com + 27-082 893 4701

More Related Content

More from Casey Lucas

IBM Total Economic Impact Study - Cost Savings and Business Benefits
IBM Total Economic Impact Study - Cost Savings and Business BenefitsIBM Total Economic Impact Study - Cost Savings and Business Benefits
IBM Total Economic Impact Study - Cost Savings and Business BenefitsCasey Lucas
 
The Total Economic Impact of IBM Connections
The Total Economic Impact of IBM ConnectionsThe Total Economic Impact of IBM Connections
The Total Economic Impact of IBM ConnectionsCasey Lucas
 
Amplifying Employee Voice: Better Connect to the Pulse of your Workforce
Amplifying Employee Voice: Better Connect to the Pulse of your WorkforceAmplifying Employee Voice: Better Connect to the Pulse of your Workforce
Amplifying Employee Voice: Better Connect to the Pulse of your WorkforceCasey Lucas
 
IBM Analytics: Thought Leadership White Paper
IBM Analytics: Thought Leadership White PaperIBM Analytics: Thought Leadership White Paper
IBM Analytics: Thought Leadership White PaperCasey Lucas
 
Customer Experience with IBM z Systems
Customer Experience with IBM z SystemsCustomer Experience with IBM z Systems
Customer Experience with IBM z SystemsCasey Lucas
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Casey Lucas
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Healthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperHealthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperCasey Lucas
 
CIO Insights from the Global C-suite Study
CIO Insights from the Global C-suite StudyCIO Insights from the Global C-suite Study
CIO Insights from the Global C-suite StudyCasey Lucas
 
Global transformation from the inside out - Optimizing the entire ecosystem
Global transformation from the inside out - Optimizing the entire ecosystemGlobal transformation from the inside out - Optimizing the entire ecosystem
Global transformation from the inside out - Optimizing the entire ecosystemCasey Lucas
 
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda Casey Lucas
 
IBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary AgendaIBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary AgendaCasey Lucas
 
IBM Enterprise 2014 - Technical University Abstract Guide
IBM Enterprise 2014 - Technical University Abstract GuideIBM Enterprise 2014 - Technical University Abstract Guide
IBM Enterprise 2014 - Technical University Abstract GuideCasey Lucas
 
15 Lessons In Social Business Strategy from the Biggest Brands in the World
15 Lessons In Social Business Strategy from the Biggest Brands in the World15 Lessons In Social Business Strategy from the Biggest Brands in the World
15 Lessons In Social Business Strategy from the Biggest Brands in the WorldCasey Lucas
 
The Truth About Application Release and Deployment - Top 10 Myths Exposed
The Truth About Application Release and Deployment - Top 10 Myths ExposedThe Truth About Application Release and Deployment - Top 10 Myths Exposed
The Truth About Application Release and Deployment - Top 10 Myths ExposedCasey Lucas
 
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...Casey Lucas
 
5 Reasons Why MSPs Should Adopt IBM PureSystems
5 Reasons Why MSPs Should Adopt IBM PureSystems5 Reasons Why MSPs Should Adopt IBM PureSystems
5 Reasons Why MSPs Should Adopt IBM PureSystemsCasey Lucas
 
Webinar Invitation: How Social drives value into your existing web properties
Webinar Invitation: How Social drives value into your existing web propertiesWebinar Invitation: How Social drives value into your existing web properties
Webinar Invitation: How Social drives value into your existing web propertiesCasey Lucas
 
Jun 25 webcast maximizing insight with big data analytics
Jun 25 webcast   maximizing insight with big data analyticsJun 25 webcast   maximizing insight with big data analytics
Jun 25 webcast maximizing insight with big data analyticsCasey Lucas
 
Vision 2013 - Conference Guide
Vision 2013 - Conference GuideVision 2013 - Conference Guide
Vision 2013 - Conference GuideCasey Lucas
 

More from Casey Lucas (20)

IBM Total Economic Impact Study - Cost Savings and Business Benefits
IBM Total Economic Impact Study - Cost Savings and Business BenefitsIBM Total Economic Impact Study - Cost Savings and Business Benefits
IBM Total Economic Impact Study - Cost Savings and Business Benefits
 
The Total Economic Impact of IBM Connections
The Total Economic Impact of IBM ConnectionsThe Total Economic Impact of IBM Connections
The Total Economic Impact of IBM Connections
 
Amplifying Employee Voice: Better Connect to the Pulse of your Workforce
Amplifying Employee Voice: Better Connect to the Pulse of your WorkforceAmplifying Employee Voice: Better Connect to the Pulse of your Workforce
Amplifying Employee Voice: Better Connect to the Pulse of your Workforce
 
IBM Analytics: Thought Leadership White Paper
IBM Analytics: Thought Leadership White PaperIBM Analytics: Thought Leadership White Paper
IBM Analytics: Thought Leadership White Paper
 
Customer Experience with IBM z Systems
Customer Experience with IBM z SystemsCustomer Experience with IBM z Systems
Customer Experience with IBM z Systems
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Healthcare Industry Security Whitepaper
Healthcare Industry Security WhitepaperHealthcare Industry Security Whitepaper
Healthcare Industry Security Whitepaper
 
CIO Insights from the Global C-suite Study
CIO Insights from the Global C-suite StudyCIO Insights from the Global C-suite Study
CIO Insights from the Global C-suite Study
 
Global transformation from the inside out - Optimizing the entire ecosystem
Global transformation from the inside out - Optimizing the entire ecosystemGlobal transformation from the inside out - Optimizing the entire ecosystem
Global transformation from the inside out - Optimizing the entire ecosystem
 
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
IBM Enterprise 2014 - System z Technical University - Preliminary Agenda
 
IBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary AgendaIBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
IBM Enterprise 2014: Power Systems Technical University - Preliminary Agenda
 
IBM Enterprise 2014 - Technical University Abstract Guide
IBM Enterprise 2014 - Technical University Abstract GuideIBM Enterprise 2014 - Technical University Abstract Guide
IBM Enterprise 2014 - Technical University Abstract Guide
 
15 Lessons In Social Business Strategy from the Biggest Brands in the World
15 Lessons In Social Business Strategy from the Biggest Brands in the World15 Lessons In Social Business Strategy from the Biggest Brands in the World
15 Lessons In Social Business Strategy from the Biggest Brands in the World
 
The Truth About Application Release and Deployment - Top 10 Myths Exposed
The Truth About Application Release and Deployment - Top 10 Myths ExposedThe Truth About Application Release and Deployment - Top 10 Myths Exposed
The Truth About Application Release and Deployment - Top 10 Myths Exposed
 
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
Acquire, grow and retain customers with IBM Big Data & Analytics - Client Exa...
 
5 Reasons Why MSPs Should Adopt IBM PureSystems
5 Reasons Why MSPs Should Adopt IBM PureSystems5 Reasons Why MSPs Should Adopt IBM PureSystems
5 Reasons Why MSPs Should Adopt IBM PureSystems
 
Webinar Invitation: How Social drives value into your existing web properties
Webinar Invitation: How Social drives value into your existing web propertiesWebinar Invitation: How Social drives value into your existing web properties
Webinar Invitation: How Social drives value into your existing web properties
 
Jun 25 webcast maximizing insight with big data analytics
Jun 25 webcast   maximizing insight with big data analyticsJun 25 webcast   maximizing insight with big data analytics
Jun 25 webcast maximizing insight with big data analytics
 
Vision 2013 - Conference Guide
Vision 2013 - Conference GuideVision 2013 - Conference Guide
Vision 2013 - Conference Guide
 

Recently uploaded

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligencePrecisely
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 

Recently uploaded (20)

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Trust and security are critical elements of mobile money operations - Q&A interview

  • 1. 13th November 2012 “Trust and security are critical elements of mobile money operations” Exclusive interview with Nick Essame, the Payment SME, at IBM Nick Essame Payment SME IBM 1. What is the relationship between investment, uptake and critical mass in driving mass-market adoption of a mobile money service in a cash-based society? There is obviously a relationship among these three factors, but investment alone will not drive mass adoption of mobile money. It will require multiple industry players to come together and collaborate in developing a service that is interoperable, open, secure and provides real value that is easily understood by consumers. There is increasing demand for, as well as significant business, economic and societal benefits to be gained from, mobile payments services. Strategic partnerships, global best practices and modern solutions such as cloud based computing – and not just depth of pocket – will be key determinants in the creation of successful, widely adopted systems. 2. How do you build consumer trust in both your product and your distribution channels? Trust and security are critical elements of mobile money operations. Mobile network operators (MNOs) have already built huge brands and have a significant footprint on the ground via their pre-paid airtime resellers and their mobile phone support infrastructure, such as SIM card and handset sales outlets The banks also have broad market recognition. However, in the developing countries, banks may not have existing relationships with consumers on one end of the spectrum, due to lack of access and financial inclusion. Building trust and credibility requires MNOs and banks to collaborate on ensuring the security of the mobile payments system and to work with government and regulatory agencies on striking the right balance of regulations that provide consumer protections. Consumer education is key, in developing markets where consumers may have minimal experience engaging in financial transactions, as well as mature markets, where security and the fear of hackers remain an impediment to broad consumer adoption. 3. Considering that financial inclusion is the end-game of many remittance services, how do you convince customers to migrate their remittance accounts into e-savings? There is often a natural evolution in this direction, but it is one that takes time. Once the basic trust is established then the move to e-savings will be driven by several factors: o Value proposition to the consumer – is it interest earnings, ease of use for related purchases, safety for the funds (versus under the mattress), or even a status-related instrument (such as an associated premier withdrawal card) o Advocacy – funeral societies, Stokvels, MFI’s etc promoting e-savings 4. How effective is an agent network at turning the fixed costs of implementing a nationwide banking infrastructure to the variable costs of cash in/cash out transactions? The fixed costs of implementing a nationwide banking infrastructure in the developing markets are typically prohibitive, and may be further hampered by regulation. The coverage possible is severely constrained by bricks and mortar costs, staff costs and availability, where opening hours, for instance, is often at odds with community needs. There are good examples of both new agency networks being implemented (in Brazil for example) and the
  • 2. piggybacking of the cash in/cash out functionality onto existing agency networks ( M-Pesa on the back of the Safaricom pre-paid airtime agents). The piggy backing model may be easier and faster to implement as it is already established and cash flush (note liquidity issues the further spread the agent network is) and helps because the fees/margins that an agent receives for supporting cash in/cash out transactions tend to be lower than the discount received for selling tangible (sodas) and intangible (pre-paid airtime) products. This is a direct result of having to price the service to the end users at price points that encourage service uptake and effectively competes with other options available to the consumers. 5. Will as usage-based revenue model really drive mass-market adoption of financial services? What are the risks on the back-end? In the developing world, this is an easier model for the end users to embrace. The concept of payment for a useful service is well understood, as the majority of the market is very value conscious. If the service is useful, has value associated with it and is trusted then extensive market adoption can be achieved. Other models have not been as successful. Charges may be hidden, poorly communicated to the consumer, and in some cases, perceived as theft. One risk on the back-end is the inability to achieve the necessary scale. Other risks may be more operational, such as security compromises, lack of resources or leakage of funds and fraud. The political risk are related to regulation and nationalisation concerns. 6. How will the expansion of financial possibilities for the unbanked population be realised by mobile banking services? Historically, the unbanked population has lacked the funds, literacy requirements and access to financial institutions. These barriers are now being overcome with the significant penetration of mobile phones into the unbanked population. Mobile payments are the entry point into the unbanked population – through remittances, bill payments etc. Over time, the mobile payments market will evolve into light banking (pre-paid, no-frill accounts and e- savings) with incremental increases in banking functionality.. 7. What are the major barriers to scaling mobile money services now that we are past the pilot stage? Lack of interoperability remains a key constraint, as the closed loop solutions – even with big MNO foundations – doesn’t allow for ubiquity to be achieved. Conflicting interests among the ecosystem players, as well as conflicting standards, must also be overcome. For further information contact : Jo Down, JODOWN@uk.ibm.com +971 562 162 772 or Nick Essame, NICKESSA@za.ibm.com + 27-082 893 4701