Impact of M-Commerce in Mobile Transaction's Security
Author Affiliations
- 1 Career Degree College, Lucknow, UP, INDIA
Res. J. Management Sci., Volume 2, Issue (7), Pages 33-37, July,6 (2013)
Abstract
Really the modern world is so advance in technologies since portable network accessible devices and techniques. In the era of wireless technologies which are available in mobile, PDA, Laptop as well as in any PC (personal computer), anyone can get access anywhere- anytime. So we can say it wireless communication which may be called as anywhere- anytime communication. Due to this type of communication, it is very easy to access as well as transfer the information from anywhere-anytime. Today Information technology has connected the whole world on a one land which is called as electronic network land. This land has enabled two types of commerce: i. E-commerce, ii. M-commerce. The M-commerce has enriched the global market and advanced the whole business scenario. The business suddenly moved from regional land to global land because of access and reach of E-commerce and M-commerce. M-commerce is one of the derived technology from E-commerce. E-commerce is the mother of M-commerce. But the question comes up to the enterprise that whether enterprise architectures and designs are able to secure our e-business? Concerning the issues related to the above question I have found one key solution for it which would be capable of handling the issues of security of data assets beyond the enterprise boundaries. Now the concept as well as the approach for the security issue is E-security. But How? So we will find out also the solution for this question. Strategy and the solution need to be addressed in a more fundamental way than firewalls, SSL or PKI.
References
- Santosh K. Misra, Nilmini Wickamasinghe Security of a Mobile Transaction: A Trust Model ISSN: 1389-5753 (Print) 1572 9362 (Online)/ Volume 4, Number 4 / October, 2004 accessed on (2012)
- Peikari C. and Fogie S., "Maximum Wireless security", 1st Edition ed: Sams Publishing, (2002)
- He L.S. and Zhang N., "A new signature scheme: joint-signature," presented at Proceedings of the 2004 ACM symposium on Applied computing, Nicosia, Cyprus, 2004 accessed on (2012)
- Vacca, John R., Identity Theft, Prentice Hall PTR, (2003)
- “Establish Trust to Protect and Grow Your Online Business,” © 2003 VeriSign, Inc, 2003 accessed on (2011)
- Vacca, John R., i-mode Crash Course, McGraw-Hill Professional, (2001)
- Special Issue of IEEE Communication Magazine on E-Commerce, September, (1999)
- Towards Digital e-Quality, US Govt. Working Group on Electronic Commerce, (1998)
- Denial Amor and Addison Wesley, The E-business Revolution, (1996)
- Greenstein and Feinmann, E-Commerce, Tata McGraw Hills, (1996)
- Goel Ritendra, E-Commerce, New Age International Publishers, (1995)
- Benjamin R.I. and Wigand R.T. , Electronic Commerce: Effects on Electronic, (1995)
- Markets, Journal of Computer-Mediated Communication, (1994)
- http://www.scottish-enterprise.com/ebusiness (2012)
- http://www.researchandmarkets.com/reports/314548(2012)
- http://www.phone.com/pub/Security WP.pdf (2012)
- http://www.wmrc.com/businessbriefing/pdf/mcommerce2001/book/byrne.pdf (2012)
- http://www.s2.chalmers.se/iths/pdf/Digital%20signature%20tutorial.pdf (2011)
- http://www.tdap.co.uk/uk/archive/billing/bill(fml0012) htm (2011)
- http://eai.ebizq.net/web integration/olden 1.html (2011)
- http://www.iol.co.za/index.php?art_id=vn20080112083836189C511499IOL:"Victim's SIM swap fraud nightmare" (2011)
- http://computer.org/internet (2011)
- http://www.misq.org/discovery/MISQD_isworld (2011)