M-COMMERCE: SECURITY CHALLENGES ISSUES AND RECOMMENDED SECURE PAYMENT METHOD
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 8
Abstract
As mobile technologies and services are in stable development, many wonder on whether or not mobile payments will be a destroyer function for mobile commerce. To have an improved considerate of the market, presently there is a require to inspect not only the technology but also the different players that are implicated. This paper investigates the use of mobile payment systems, technologies and security issues, challenges. We are discussing the methodologies, number of network providers and payment technologies provided by the Mobile networks. And also focuses on the mobile security topics and solutions relating to mobile accesses. It discusses mobile security concepts, problems, challenges and needs, and reviews the state-of-the-art mobile security emerging technologies and solutions. The focuses are on two emerging areas of mobile security: key-based security solutions for mobile devices and best payment method. Even though mobile electronic commerce has many advantages over traditional commerce, there are also drawbacks or disadvantages that need to be addressed as well. One of the drawbacks is the mobile device itself. Even though there are still concerns about using mobile electronic commerce, there are several industries that have gone ahead with their plans and have started using this form of commerce. Paypal is one of the best payment method.
Authors and Affiliations
Niranjanamurthy M, Kavyashree N, Mr S. Jagannath and Dr. Ruchira Bhargava
“RECENNT PROSPERITY OF E-COMMERCE IN INDIA” (IT’S IMPACT ON ECONOMICAL DEVELOPMENT)
Electronic trading is buying and selling securities through Internet or other electronic means such as touch-tone telephones, wireless access and other new technologies. Transaction shave traditionally been handled man...
slugTHE PROBLEM OF HIGH DIMENSIONALITY WITH LOW DENSITY IN CLUSTERING
In many real-world applications, there are a number of dimensions having large variations in a dataset. The dimensions of the large variations scatter the cluster and confuse the distance between two samples in a datas...
A Review on Different Methods Of ”VIDEO SHOT BOUNDARY DETECTION”
Many algorithms have been proposed for detecting video shot boundaries and classifying shot and shot transition types. Here we are using four different methods for comparison, using GIST, Segmentation, Color Histogram...
Reuse of Hospital Plastic Waste in Concrete as a Partial Replacement of Coarse Aggregate: A Research Paper
Concrete is a most common material for human being to use in construction. In this study, the behavior of the hospital plastic as aggregate in concrete has been investigated on compressive strength weight reduction an...
slugSTRATEGIC GREEN MARKETING NEED OF THE HOUR
Now-a-days Corporate Houses are becoming more concern about their social responsibilities. They have taken social responsibilities as a good strategic move to build up an image in the heart of consumers. Now marketers...