Academic literature on the topic 'Mobile commerce security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile commerce security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile commerce security"

1

Lam, Kwok-Yan, Siu-Leung Chung, Ming Gu, and Jia-Guang Sun. "Lightweight security for mobile commerce transactions." Computer Communications 26, no. 18 (2003): 2052–60. http://dx.doi.org/10.1016/s0140-3664(03)00188-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abu-Shanab, Emad, and Osamah Ghaleb. "Adoption of Mobile Commerce Technology." International Journal of Technology Diffusion 3, no. 2 (2012): 36–49. http://dx.doi.org/10.4018/jtd.2012040104.

Full text
Abstract:
This research extended the Technology Acceptance Model (TAM) with perceived trust and perceived risks (security and privacy concerns) constructs to identify the impact of these factors on Jordanian users’ intentions to adopt mobile commerce (m-commerce). An empirical test was used utilizing 132 responses from students in two public universities in Jordan. Results indicated that perceived trust, perceived usefulness, and perceived ease of use are major influencers of mobile commerce adoption. On the other hand, perceived risk factors (security and privacy concerns) were not significant in this
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Tao, Kun Zhao, Ming Yang, Tilei Gao, and Wanyu Xie. "Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov." Wireless Communications and Mobile Computing 2020 (July 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/8888296.

Full text
Abstract:
To obtain precise personalized services in mobile commerce, the users have to disclose their personal information to the operator, which constitutes a potential threat to their privacy security. In this paper, a mobile commerce privacy security risk assessment model is established based on information entropy and Markov chain, and effective security risk measurement, and assessment method is put forward. Our method can provide accurate and quantitative results in assessing privacy disclosure risk to guide the users’ selection of safe mobile commerce applications and protect their privacy secur
APA, Harvard, Vancouver, ISO, and other styles
4

Jin, Min Li, Yang Cheng, and Wu Liang Peng. "Security Solution of Mobile E-Commerce Based on WAP." Applied Mechanics and Materials 16-19 (October 2009): 169–73. http://dx.doi.org/10.4028/www.scientific.net/amm.16-19.169.

Full text
Abstract:
This paper making good study and use of the advanced mobile e-commerce technology adopted by foreign advance countries, and technically analyzing the safety risk of the existing application model of WAP, and putting forward a new end-to-end security solution based on WAP, this solution needs two important processes which to improve end-to-end data transmission security by the create process of session key for security and the data transmission process by using of digital signature. With the popularization of the Internet and the rapid development of mobile communication technology, mobile e-co
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Qin, and Huifeng Li. "Design and Simulation of Mobile Commerce Identity Authentication Protocol Based on OTP." International Journal of Asian Business and Information Management 6, no. 1 (2015): 51–67. http://dx.doi.org/10.4018/ijabim.2015010104.

Full text
Abstract:
With popularization and development of mobile commerce, the security of mobile commerce has drawn more and more attentions. Identity authentication is the first safety barrier, as communication security almost starts from its handshake process. Authentication protocol based on ciper technology is the safest method to realize identity authentication, and therefore identity authentication protocol is necessary to ensure communication security in mobile commerce. Combined One-time password (OTP) with Elliptic Curve Cryptosystem (ECC), a mobile commerce identity authentication (MCIA) protocol is p
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Dwairi, Radwan Moh'd, Laith M. K. Al-Shraideh, and Emad A. Abu-Shanab. "Mobile Commerce Adoption From Consumers Perspective." International Journal of Information Systems and Social Change 9, no. 2 (2018): 12–27. http://dx.doi.org/10.4018/ijissc.2018040102.

Full text
Abstract:
In response, to little research focused on how Jordanians perceive and respond to m-commerce and the main factors that govern its adoption and use, this article proposes a conceptual model that extends the technology acceptance model (TAM) with important factors related to consumers and companies like perceived trust, perceived security, subjective norms and service quality. The proposed model was validated and then tested utilizing a sample of 200 students. Results indicate that a perceived ease of use, a perceived usefulness and service quality are the major drivers of m-commerce adoption am
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Hongjiang. "The Effect of Perceived Security on Consumers’ Intent to Use." Journal of Electronic Commerce in Organizations 11, no. 4 (2013): 37–51. http://dx.doi.org/10.4018/jeco.2013100103.

Full text
Abstract:
M-commerce as a special form of e-commerce has grown rapidly both in developed and developing countries. New advancements in its underlying technology have increased the functionality of m-commerce. However, they also present potential security risks. Security issues have been a top concern for m-commerce management. In spite of the benefits m-commerce could bring, new security and privacy risks, in particular to the wireless medium and devices, abound in m-commerce applications. With the largest mobile market, China has seen the most rapid growth in the development of mobile communications in
APA, Harvard, Vancouver, ISO, and other styles
8

YOON, Eun-Jun, and Kee-Young YOO. "A Robust Security Mechanism for Mobile Commerce Transactions." IEICE Transactions on Information and Systems E93-D, no. 11 (2010): 2898–906. http://dx.doi.org/10.1587/transinf.e93.d.2898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gururajan, Raj. "New Financial Transaction Security Concerns in Mobile Commerce." Information & Security: An International Journal 8 (2002): 71–86. http://dx.doi.org/10.11610/isij.0803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wei, June, and Ant Ozok. "Development of a Mobile Commerce Security Analysis Method." Journal of Information Privacy and Security 5, no. 1 (2009): 28–48. http://dx.doi.org/10.1080/15536548.2009.10855856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!