M-commerce: Security Challenges Issues and Recommended Secure Payment Method

نویسنده

  • Ruchira Bhargava
چکیده

As mobile technologies and services are in stable development, many wonder on whether or not mobile payments will be a destroyer function for mobile commerce. To have an improved considerate of the market, presently there is a require to inspect not only the technology but also the different players that are implicated. This paper investigates the use of mobile payment systems, technologies and security issues, challenges. We are discussing the methodologies, number of network providers and payment technologies provided by the Mobile networks. And also focuses on the mobile security topics and solutions relating to mobile accesses. It discusses mobile security concepts, problems, challenges and needs, and reviews the state-of-the-art mobile security emerging technologies and solutions. The focuses are on two emerging areas of mobile security: key-based security solutions for mobile devices and best payment method. Even though mobile electronic commerce has many advantages over traditional commerce, there are also drawbacks or disadvantages that need to be addressed as well. One of the drawbacks is the mobile device itself. Even though there are still concerns about using mobile electronic commerce, there are several industries that have gone ahead with their plans and have started using this form of commerce. Paypal is one of the best payment method.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Payment Protocol 3D by Using Cloud Messaging

The popularity of mobile platforms makes them a good candidate for electronic payment. However, there are challenges in this field such as privacy protection, security, the bandwidth limitations of mobile networks, and the limited capabilities of mobile devices. Traditional e-commerce payment protocols were designed to keep track of traditional flows of data, are vulnerable to attacks and are n...

متن کامل

Design Limitations Characteristicsand Analysis of Secure Mobile Transaction and Protocols

Today, new technologies that allow cellular (mobile) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. What must be done to secure financial transactions via mobile commerce? Due to the advent of the Internet, electronic business transactions have exploded around the globe. Gener...

متن کامل

A Secure Electronic Payment Protocol Design and Implementation

Electronic payment is the very important step of the electronic business system, and its security must be ensured. SSL/TLS and SET are two widely discussed means of securing online credit card payments. Because of implementation issues, SET has not really been adopted by e-commerce participants, whereas, despite the fact that it does not address all security issues, SSL/TLS is commonly used for...

متن کامل

Electronic Payment Systems

As business is moving from face-to-face trading, mail order, and telephone order to electronic commerce over open networks such as the Internet, crucial security issues are being raised. Whereas Electronic Funds Transfer over financial networks is reasonably secure, securing payments over open networks connecting commercial servers and consumer workstations poses challenges of a new dimension. ...

متن کامل

Improving System Security and User Privacy in Secure Electronic Transaction (SET) with X.509 v3 Certificate

With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of onli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012