Security Issues in M-Commerce: A Usage-Based Taxonomy
نویسندگان
چکیده
M–commerce is a new area arising from the marriage of electronic commerce with emerging mobile and pervasive computing technology. The newness of this area—and the rapidness with which it is emerging—makes it difficult to analyze the technological problems that m–commerce introduces—and, in particular, the security and privacy issues. This situation is not good, since history has shown that security is very difficult to retro–fit into deployed technology, and pervasive m– commerce promises (threatens?) to permeate and transform even more aspects of life than e–commerce and the Internet has. In this paper, we try to begin to rectify this situation: we offer a preliminary taxonomy that unifies many proposed m–commerce usage scenarios into a single framework, and then use this framework to analyze security issues.
منابع مشابه
Evaluating security tools towards usable security
The main success of the internet is its openness. To guarantee security in the internet for example to protect the user’s privacy or the security of online transactions the use of security tools is essential. Because today’s internet users cover almost all educational levels and professional groups, we assume that they will be mostly security novices. Unfortunately, the usage of today’s securit...
متن کاملSecure Multicast for Mobile Commerce Applications: Issues and Challenges
AbSTRACT With the rapid growth in mobile commerce (m-commerce) applications, the need for providing suitable infrastructure to support these applications has become critical. Secure multicast is a key element of this infrastructure, in particular, to support group m-commerce applications such as mobile auctions, product recommendation systems , and financial services. Despite considerable atten...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملApplication of Web usage mining and product taxonomy to collaborative recommendations in e-commerce
The rapid growth of e-commerce has caused product overload where customers on the Web are no longer able to effectively choose the products they are exposed to. To overcome the product overload of online shoppers, a variety of recommendation methods have been developed. Collaborative filtering (CF) is the most successful recommendation method, but its widespread use has exposed some well-known ...
متن کاملA State of the Art Security Taxonomy of Internet Security: Threats and Countermeasures
The main objectives of the different security services and mechanisms today are to provide privacy of information to ensure that the tools used to establish a proper environment to the user are reliable and trusted. With the dramatic increase of the use of the Internet and its applications that require high level of security services, such as e-commerce transactions and on-line banking, it is q...
متن کامل