A Discussion on Security Risks in Mobile Commerce
نویسنده
چکیده
Recent technological innovations such as mobile computing have enabled new facility of buying and selling using mobile device. While users welcome this, security risks that can emerge due to this new facility raise concerns. This exploratory research discusses the security risks in mobile computing in terms of direct risks and indirect risk.
منابع مشابه
The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملThe Effect of Perceived Security on Consumers' Intent to Use: Satisfaction and Loyalty to M-Commerce in China
M-commerce as a special form of e-commerce has grown rapidly both in developed and developing countries. New advancements in its underlying technology have increased the functionality of m-commerce. However, they also present potential security risks. Security issues have been a top concern for m-commerce management. In spite of the benefits m-commerce could bring, new security and privacy risk...
متن کاملBiometric Security Mechanism
M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants PDA. Today many people never leave home without their mobile phones. As content delivery over wireless devices becomes faster and scalable, there is wide speculation that m-commerce will surpass wireline e-commerce. M-commerce,...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملExamining Security Risks of Mobile Banking Applications through Blog Mining
This paper provides an in-depth review of the security aspect of mobile banking applications. The authors employed blog mining as a research method to analyze blog discussion on security of mobile banking applications. Security risks, protection strategy/best practices and future security trends are summarized to help banks and consumers mitigate the security risks of mobile banking applications.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007