To see the other types of publications on this topic, follow the link: Mobile commerce security.

Journal articles on the topic 'Mobile commerce security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mobile commerce security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lam, Kwok-Yan, Siu-Leung Chung, Ming Gu, and Jia-Guang Sun. "Lightweight security for mobile commerce transactions." Computer Communications 26, no. 18 (2003): 2052–60. http://dx.doi.org/10.1016/s0140-3664(03)00188-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abu-Shanab, Emad, and Osamah Ghaleb. "Adoption of Mobile Commerce Technology." International Journal of Technology Diffusion 3, no. 2 (2012): 36–49. http://dx.doi.org/10.4018/jtd.2012040104.

Full text
Abstract:
This research extended the Technology Acceptance Model (TAM) with perceived trust and perceived risks (security and privacy concerns) constructs to identify the impact of these factors on Jordanian users’ intentions to adopt mobile commerce (m-commerce). An empirical test was used utilizing 132 responses from students in two public universities in Jordan. Results indicated that perceived trust, perceived usefulness, and perceived ease of use are major influencers of mobile commerce adoption. On the other hand, perceived risk factors (security and privacy concerns) were not significant in this
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Tao, Kun Zhao, Ming Yang, Tilei Gao, and Wanyu Xie. "Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov." Wireless Communications and Mobile Computing 2020 (July 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/8888296.

Full text
Abstract:
To obtain precise personalized services in mobile commerce, the users have to disclose their personal information to the operator, which constitutes a potential threat to their privacy security. In this paper, a mobile commerce privacy security risk assessment model is established based on information entropy and Markov chain, and effective security risk measurement, and assessment method is put forward. Our method can provide accurate and quantitative results in assessing privacy disclosure risk to guide the users’ selection of safe mobile commerce applications and protect their privacy secur
APA, Harvard, Vancouver, ISO, and other styles
4

Jin, Min Li, Yang Cheng, and Wu Liang Peng. "Security Solution of Mobile E-Commerce Based on WAP." Applied Mechanics and Materials 16-19 (October 2009): 169–73. http://dx.doi.org/10.4028/www.scientific.net/amm.16-19.169.

Full text
Abstract:
This paper making good study and use of the advanced mobile e-commerce technology adopted by foreign advance countries, and technically analyzing the safety risk of the existing application model of WAP, and putting forward a new end-to-end security solution based on WAP, this solution needs two important processes which to improve end-to-end data transmission security by the create process of session key for security and the data transmission process by using of digital signature. With the popularization of the Internet and the rapid development of mobile communication technology, mobile e-co
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Qin, and Huifeng Li. "Design and Simulation of Mobile Commerce Identity Authentication Protocol Based on OTP." International Journal of Asian Business and Information Management 6, no. 1 (2015): 51–67. http://dx.doi.org/10.4018/ijabim.2015010104.

Full text
Abstract:
With popularization and development of mobile commerce, the security of mobile commerce has drawn more and more attentions. Identity authentication is the first safety barrier, as communication security almost starts from its handshake process. Authentication protocol based on ciper technology is the safest method to realize identity authentication, and therefore identity authentication protocol is necessary to ensure communication security in mobile commerce. Combined One-time password (OTP) with Elliptic Curve Cryptosystem (ECC), a mobile commerce identity authentication (MCIA) protocol is p
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Dwairi, Radwan Moh'd, Laith M. K. Al-Shraideh, and Emad A. Abu-Shanab. "Mobile Commerce Adoption From Consumers Perspective." International Journal of Information Systems and Social Change 9, no. 2 (2018): 12–27. http://dx.doi.org/10.4018/ijissc.2018040102.

Full text
Abstract:
In response, to little research focused on how Jordanians perceive and respond to m-commerce and the main factors that govern its adoption and use, this article proposes a conceptual model that extends the technology acceptance model (TAM) with important factors related to consumers and companies like perceived trust, perceived security, subjective norms and service quality. The proposed model was validated and then tested utilizing a sample of 200 students. Results indicate that a perceived ease of use, a perceived usefulness and service quality are the major drivers of m-commerce adoption am
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Hongjiang. "The Effect of Perceived Security on Consumers’ Intent to Use." Journal of Electronic Commerce in Organizations 11, no. 4 (2013): 37–51. http://dx.doi.org/10.4018/jeco.2013100103.

Full text
Abstract:
M-commerce as a special form of e-commerce has grown rapidly both in developed and developing countries. New advancements in its underlying technology have increased the functionality of m-commerce. However, they also present potential security risks. Security issues have been a top concern for m-commerce management. In spite of the benefits m-commerce could bring, new security and privacy risks, in particular to the wireless medium and devices, abound in m-commerce applications. With the largest mobile market, China has seen the most rapid growth in the development of mobile communications in
APA, Harvard, Vancouver, ISO, and other styles
8

YOON, Eun-Jun, and Kee-Young YOO. "A Robust Security Mechanism for Mobile Commerce Transactions." IEICE Transactions on Information and Systems E93-D, no. 11 (2010): 2898–906. http://dx.doi.org/10.1587/transinf.e93.d.2898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gururajan, Raj. "New Financial Transaction Security Concerns in Mobile Commerce." Information & Security: An International Journal 8 (2002): 71–86. http://dx.doi.org/10.11610/isij.0803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wei, June, and Ant Ozok. "Development of a Mobile Commerce Security Analysis Method." Journal of Information Privacy and Security 5, no. 1 (2009): 28–48. http://dx.doi.org/10.1080/15536548.2009.10855856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hanifurohman, Cholis, and Deanna Durbin Hutagalung. "ANALISIS STATIS MENGGUNAKAN MOBILE SECURITY FRAMEWORK UNTUK PENGUJIAN KEAMANAN APLIKASI MOBILE E-COMMERCE BERBASIS ANDROID." Sebatik 24, no. 1 (2020): 22–28. http://dx.doi.org/10.46984/sebatik.v24i1.920.

Full text
Abstract:
Pengguna internet di Indonesia setiap tahunnya mengalami peningkatan yang terus naik. Peningkatan yang pesat ini diiukuti juga dengan penggunaan internat menggunakan perangkat mobile. Hal ini memberikan dampak positif ke beberapa sektor bisnis seperti jual beli online dan juga memicu munculnya beragam aplikasi mobile khususnya pada platform android. Oleh karena itu perlu dilakukan analisis keamanan terhadap aplikasi dengan melakukan pengujian/pengukuran terhadap tingkat keamanan aplikasi. Tujuan dari penelitian ini adalah untuk meningkatkan pemahaman kepada pengguna aplikasi mobile e-commerce
APA, Harvard, Vancouver, ISO, and other styles
12

Khurana, Kartik, Harpreet Kaur, Ritu Chauhan, Shalu Chauhan, Shaveta Bhatia, and Prasenjit Banerjee. "Security issues in Mobile Computing." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (2018): 13. http://dx.doi.org/10.23956/ijarcsse.v8i4.620.

Full text
Abstract:
Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for succes
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Cheng, and Xiao Mei Wei. "The Study of the Trust Mechanism Based on Mobile Agent in the E-Commerce Agricultural Commodity Trade." Advanced Materials Research 1037 (October 2014): 444–46. http://dx.doi.org/10.4028/www.scientific.net/amr.1037.444.

Full text
Abstract:
This paper has proposed a trust-based security mechanism that aims at the security threat facing the host during the transmission of the mobile agent in agricultural commodity trade. Mobile agent is a program that can autonomously migrate between heterogeneous network hosts. Mobile agent has the characteristics of mobility, autonomy, intelligence, flexibility and other characteristics, making it have wide prospects of application in electronic commerce. Because of the characteristics of mobile agent, its security issues have never been solved well. With the continuous development of mobile age
APA, Harvard, Vancouver, ISO, and other styles
14

Halaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." International Journal of Information Security and Privacy 8, no. 3 (2014): 1–12. http://dx.doi.org/10.4018/ijisp.2014070101.

Full text
Abstract:
Security perception has been investigated by much research within the e-commerce and e-banking context. However, very little research has investigated this issue within the general mobile context without limiting this to particular applications such as payment, marketing, banking and commerce. Therefore, this paper aims to explore the users' perception of security towards mobile phones from a wide perspective. An interpretive-qualitative research was adopted to investigate the users' perceptions. The research results provided evidence for extending the meaning of the security perception concep
APA, Harvard, Vancouver, ISO, and other styles
15

ahmad mahmoud, Mohammad awni, laith Talal khrais, Rasha mohammad alolayan, et al. "Consumers Trust, Privacy and Security Issues on Mobile Commerce Websites." Modern Applied Science 13, no. 12 (2019): 21. http://dx.doi.org/10.5539/mas.v13n12p21.

Full text
Abstract:
The proliferation of mobile devices and the increased adoption of the internet across the globe has led to the rise of m-commerce. reports highlight that in spite of the different advancements in the technology, trust in the platform is still a significant hindrance to its adoption. Consequently, the current study seeks to identify privacy and security issues affecting m-commerce users of three shopping sites: Amazon, Alibaba and eBay. The aim here is to develop recommendations that mitigate these challenges. The expected output of the study is an anticipation for insights regarding user persp
APA, Harvard, Vancouver, ISO, and other styles
16

Zhong, Hai Dong, Ping Li, Shao Zhong Zhang, Wen Ting Yuan, Xu Dong Zhao, and Jian Wen Shen. "Study on Location Based Services Driven Mobile E-Commerce System." Advanced Materials Research 734-737 (August 2013): 3214–19. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3214.

Full text
Abstract:
With the tremendous advances in mobile computing and communication capabilities, rapid proliferation of mobile devices, increasing powerful functions, and decreasing device costs, we are seeing a explosively growth in mobile e-commerce in various consumer and business markets. On the basis of analyzing demands of both buyers and seller in mobile e-commerce, the paper put forward a novel concept and technological framework of Location Based Services (LBS) driven mobile e-commerce. Some LBS related functions, in mobile device terminal, of the prototype system based on the architecture put forwar
APA, Harvard, Vancouver, ISO, and other styles
17

Pelet, Jean-Eric, and Panagiota Papadopoulou. "Consumer Behavior in the Mobile Environment." International Journal of Technology and Human Interaction 10, no. 4 (2014): 36–48. http://dx.doi.org/10.4018/ijthi.2014100103.

Full text
Abstract:
Consumer behavior in the omnipresent mobile environment constitutes a challenge for m-commerce vendors, as they seek to understand factors that affect it, positively and negatively, and to integrate social media in their mobile strategy. This paper presents an exploratory qualitative study about the use of smartphones and social media, in the context of m-commerce. The authors' objective is to facilitate the understanding of consumers' perceptions and behavior in m-commerce and social media and explore the potential of social media for m-commerce purposes. The results of their qualitative anal
APA, Harvard, Vancouver, ISO, and other styles
18

Alfahl, Husam, Luke Houghton, and Louis Sanzogni. "Mobile Commerce Adoption in Saudi Organizations." International Journal of Enterprise Information Systems 13, no. 4 (2017): 31–57. http://dx.doi.org/10.4018/ijeis.2017100103.

Full text
Abstract:
Mobile commerce is an emerging trend with the potential to generate new streams of revenue for many established organizations. The paper invokes an exploratory qualitative study into mobile commerce adoption practice in Saudi banks and telecoms with a view to pave the way to the eventual generalization of the finding across Saudi organizations. Organizations in both sectors were approached and interviews carried out with key individuals in order to establish emergent themes believed to be related to the adoption of mobile commerce. The findings revealed that themes related to policy and legal
APA, Harvard, Vancouver, ISO, and other styles
19

Jiang, Weijin, Wei Liu, Haolong Xia, Yuhui Xu, Dongbo Cao, and Guo Liang. "Research on Intelligent Mobile Commerce Transaction Security Mechanisms Based on Mobile Agent." Computers, Materials & Continua 65, no. 3 (2020): 2543–55. http://dx.doi.org/10.32604/cmc.2020.011454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Fakunle, David Oluwamayowa. "Software Security and Privacy Risks in Mobile e-Commerce." TEXILA INTERNATIONAL JOURNAL OF ACADEMIC RESEARCH 3, no. 1 (2016): 130–32. http://dx.doi.org/10.21522/tijar.2014.03.01.art016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Soriano, M., and D. Ponce. "A security and usability proposal for mobile electronic commerce." IEEE Communications Magazine 40, no. 8 (2002): 62–67. http://dx.doi.org/10.1109/mcom.2002.1024416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ghosh, Anup K., and Tara M. Swaminatha. "Software security and privacy risks in mobile e-commerce." Communications of the ACM 44, no. 2 (2001): 51–57. http://dx.doi.org/10.1145/359205.359227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

He, Yi-Jun, and Moon-Chuen Lee. "Improving WTLS Security for WAP Based Mobile e-Commerce." Wireless Personal Communications 51, no. 1 (2008): 17–29. http://dx.doi.org/10.1007/s11277-008-9604-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Islam, Md Monirul, and Abdul Kadar Muhammad Masum. "Mobile Commerce and Mobile Payment: A Study on Islamic Perspective." IIUC Studies 7 (October 19, 2012): 37–48. http://dx.doi.org/10.3329/iiucs.v7i0.12257.

Full text
Abstract:
Electronic commerce, very important part of Information and Communication Technologies (ICT), is one of the most common business terms in use in 21st century. Developed countries are more popular because of their rapid growth of ICT, e-commerce and online transaction. But in developing or under develop countries the scenario is different. Technical laggings, dearth of infrastructure, infeasibility of the existing frameworks and people apathy are the main reasons behind this. There are several alternative ways of e-commerce and online transaction. Mobile payment, a way of online transaction, ma
APA, Harvard, Vancouver, ISO, and other styles
25

Thammarat, Chalee, and Werasak Kurutach. "A Secure Fair Exchange for SMS-Based Mobile Payment Protocols Based on Symmetric Encryption Algorithms with Formal Verification." Wireless Communications and Mobile Computing 2018 (July 5, 2018): 1–21. http://dx.doi.org/10.1155/2018/6953160.

Full text
Abstract:
Information security and fair exchange are essential to creating trust among all the parties participating in any sale transaction. However, implementing them in any mobile commerce is challenging due to the limitation of resources on mobile devices. Numerous m-commerce protocols that have been proposed so far still lack those two important aspects. In this paper, we propose mobile payment (m-payment) protocols, a crucial part of m-commerce, that incorporate both information security and fair exchange while retaining their own lightweight property. To allow convenience of use, the proposed pro
APA, Harvard, Vancouver, ISO, and other styles
26

Nida, Desak Rurik Pradnya Paramitha, I. Made Dwi Sumba Wirawan, and I. Made Dwi Harmana. "The Influencing Factors toward Universitas Warmadewa Student Interests in Using Mobile Commerce." Jurnal Ekonomi & Bisnis JAGADITHA 7, no. 2 (2020): 104–13. http://dx.doi.org/10.22225/jj.7.2.2372.104-113.

Full text
Abstract:
Mobile commerce provides an overview of the development of electronic commerce. The rapid growth of the mobile phone population has accompanied the emergence and development of wireless technology which has made mobile commerce an important part of existing business strategies. The purposes of this study are to treasure the empirical evidence on the factors that influence the interest of mobile commerce users as input for e-commerce providers and users as well as to describe the reflection of the development and needs conditions of the business world, especially in the mobile commerce sector.
APA, Harvard, Vancouver, ISO, and other styles
27

Yang, Jiachen, Longsheng Xu, Qinggang Meng, and Shudong He. "Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/103136.

Full text
Abstract:
In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC) and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysi
APA, Harvard, Vancouver, ISO, and other styles
28

Zhang, Mei, Huan Liu, and Jinghua Wen. "E-Commerce Security Research in Big Data Environment." International Journal of Enterprise Information Systems 14, no. 1 (2018): 63–76. http://dx.doi.org/10.4018/ijeis.2018010104.

Full text
Abstract:
Rapid development of e-commerce and mobile communication opens a new era of big data. In this article, the authors put big data and e-commerce security together. They construct electronic commerce security system from these aspects: the creation of database, the security of information storage, the mining of information based on big data environment thoroughly. The second-generation product distributed platform- Apache Hadoop which is more popular and instant has been brought in. what's more, this article expounds the structure and working process. On the base of this platform, this article an
APA, Harvard, Vancouver, ISO, and other styles
29

Zoumpoulidis, Vasilios, Aggelos Zoitsas, Vasilios Ferelis, and Michael Nikolaidis. "The Impact Of Mobile Commerce In Kavala." KnE Social Sciences 1, no. 2 (2017): 400. http://dx.doi.org/10.18502/kss.v1i2.675.

Full text
Abstract:
<p class="AbstractText">The mobile commerce, as an integral and often dominant part of a broader technological, economic and social system, is closely linked to environmental conditions that affect; this affects their decisions and strategy implemented. Undoubtedly, in the current era, the competition is increased and dominant in the market, pushing their bodies and citizens to abandon traditional and time-consuming methods of business functions, practices and yet purchases.</p><p class="AbstractText">The purpose of this study, it is the presentation and the penetration of mo
APA, Harvard, Vancouver, ISO, and other styles
30

Ubaya, Huda. "Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android." Computer Engineering and Applications Journal 1, no. 1 (2012): 1–12. http://dx.doi.org/10.18495/comengapp.v1i1.1.

Full text
Abstract:
Since the late 1990s, people have enjoyed a comfortable lifestyle. Mobile devices supported by the development of wireless networks have spread throughout the world. People can get information, order tickets, download songs and perform commercial transactions, called mobile commerce. Mobile commerce applications become the most popular application for mobile device users who want to do business and financial transactions easily and securely, anytime and anywhere they are. Today the use of physical cash is experiencing a decline in popularity in the business world, because it is being replaced
APA, Harvard, Vancouver, ISO, and other styles
31

O'Donnell, Jonathan, Margaret Jackson, Marita Shelly, and Julian Ligertwood. "Australian Case Studies in Mobile Commerce." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 2 (2007): 1–18. http://dx.doi.org/10.3390/jtaer2020010.

Full text
Abstract:
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical mass and acceptance of a new service; training and technical issues, as well as staff acceptance issues; that privacy and security issues arise through the potential to track the location of people and through the amounts of personal data collected; difficulties in integrating with existing back-end systems; projects being affected by changes to legislation, or requiring changes to the law; and that while there is pote
APA, Harvard, Vancouver, ISO, and other styles
32

Li, Xiao Guang, and Zhan Jun Gao. "Realization of an Intelligent E-Commerce Model Based on Mobile Agent." Applied Mechanics and Materials 543-547 (March 2014): 4198–201. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4198.

Full text
Abstract:
Mobile agent is one of the most prominent technologies believed to be playing an important role in future e-commerce. After presented an intelligent e-commerce model based on OBI ( open buying on the internet) , we developed a modified approach for the security of mobile agents and e-commerce, and designed an intelligent shopping algorithm based on variable time negotiation function. The presented model has been evaluated by simulation experiment. It has been found that the presented model is efficient.
APA, Harvard, Vancouver, ISO, and other styles
33

Prakash, Krishna, and Balachandra. "Security Issues and Challenges in Mobile Computing and M-Commerce." International Journal of Computer Science & Engineering Survey 6, no. 2 (2015): 29–45. http://dx.doi.org/10.5121/ijcses.2015.6203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Critchlow, D., and N. Zhang. "Security enhanced accountable anonymous PKI certificates for mobile e-commerce." Computer Networks 45, no. 4 (2004): 483–503. http://dx.doi.org/10.1016/j.comnet.2004.02.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Xu, Hong Feng, and Gui Xian Zhou. "Study on the Trusted Operating Technology for Mobile E-Commerce System Secure." Applied Mechanics and Materials 519-520 (February 2014): 416–21. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.416.

Full text
Abstract:
Mobile e-commerce systems are the big trend of international economy and social development now days, and also the key process of industry upgrade, industrialization and modernization in our country. Mobile e-commerce systems are considered as the backbone of the manufacturing industry in China, Vulnerabilities in web applications continue to be the most frequently discovered security problem. This article illustrates a trusted operating systems how to provide a flexible solution to the problem of application for e-commerce. With the help of Chinese Wall, web services are becoming popular in W
APA, Harvard, Vancouver, ISO, and other styles
36

Dong, Wei, Li Xin Ma, and Li Liu. "Design and Implementation of 3G E-Commerce Trading System Based on Data Encryption and Web Service." Applied Mechanics and Materials 241-244 (December 2012): 2669–75. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2669.

Full text
Abstract:
The development of 3G has made E-commerce become conveniently and fast. A system is proposed in this paper that is a 3G mobile e-commerce transaction system based on Web Service. And the double data encryption algorithm is also applied. It can be paid online to realize the enterprise mobile users in the 3G network, shopping needs, and ensures the security.
APA, Harvard, Vancouver, ISO, and other styles
37

Dang, Doan Thai, and Tuan Manh Nguyen. "Intention to use Mobile-commerce services: An extension based on Technology Acceptance Model (TAM)." Science & Technology Development Journal - Economics - Law and Management 1, Q4 (2017): 25–33. http://dx.doi.org/10.32508/stdjelm.v1iq4.472.

Full text
Abstract:
Electronic Commerce (E-Commerce) with outstanding advantages has been changing the traditional shopping way of customers all over the world. Recently, Mobile Electronic Commerce (M - Commerce) trend with the flexibility and integration of M-Commerce based on mobile applications are opening up a further outlook in the field of online shopping. However, there are still some new barriers to persuading customers to participate in the use of M-Commerce services. The objective of this study is to propose a model that can verify the factors that influence the intent to use the M-Commerce service in t
APA, Harvard, Vancouver, ISO, and other styles
38

Wei-Jin, Jiang, Xu Yu-Sheng, Guo Hong, and Zhang Lian-Mei. "Research on Transaction Security Mechanism of Mobile Commerce in Mobile Internet based on MAS." International Journal of Security and Its Applications 9, no. 12 (2015): 289–302. http://dx.doi.org/10.14257/ijsia.2015.9.12.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Qin, Fen He Zhi, and Jing Hai Ao. "Design and Security Analysis of Mobile Identity Authentication Protocol." Advanced Materials Research 403-408 (November 2011): 2645–49. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2645.

Full text
Abstract:
One Time Password (OTP) authentication mechanism has higher security by one time padding. It is implemented simply, cost less and needed no third-party notarization, and so it is more suitable for limited environment in mobile commerce. But OTP has some securities, which it couldn’t resist decimal attack and realize bidirectional identity authentication. Combined with Elliptic curve cryptosystem (ECC), it is presented a mobile identity authentication protocol (MIAP). Through formalized analysis method based on strand space, it is validated to have higher security.
APA, Harvard, Vancouver, ISO, and other styles
40

Wei, June, Lai C. Liu, and Kai S. Koong. "An onion ring framework for developing and assessing mobile commerce security." International Journal of Mobile Communications 4, no. 2 (2006): 128. http://dx.doi.org/10.1504/ijmc.2006.008605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gupta, Sonal. "EMCV: Enhancing the Security of the Mobile Commerce using Voice Features." International Journal of Computer Applications 44, no. 16 (2012): 38–41. http://dx.doi.org/10.5120/6350-8702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Xiangsong, Meng, and Han Fengwu. "Design on PKI-based anonymous mobile agent security in E-commerce." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1907–10. http://dx.doi.org/10.1007/bf02831904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Marinkovic, Veljko, and Zoran Kalinic. "Antecedents of customer satisfaction in mobile commerce." Online Information Review 41, no. 2 (2017): 138–54. http://dx.doi.org/10.1108/oir-11-2015-0364.

Full text
Abstract:
Purpose The purpose of this paper is to determine statistically significant drivers of customer satisfaction in mobile commerce and to test the moderating effects of customization on the relationships between customer satisfaction and its predictors. Design/methodology/approach The sample comprised 224 respondents. Confirmatory factor analysis was used to test the validity of the model, and moderated regression analysis was applied to determine main and interaction effects. Findings Trust, perceived usefulness, mobility, and perceived enjoyment were found to be significant drivers of customer
APA, Harvard, Vancouver, ISO, and other styles
44

Chung, Kim Choy. "Mobile (shopping) commerce intention in central Asia." Asia-Pacific Journal of Business Administration 11, no. 3 (2019): 251–66. http://dx.doi.org/10.1108/apjba-11-2018-0215.

Full text
Abstract:
Purpose Although East Asia and South East Asia have seen growth in mobile commerce activities, the uptake of such activities in Central Asia has been relatively low. For insight, the purpose of this paper is to investigate the impact of culture, innovation characteristics and concerns about order fulfillment on mobile commerce (shopping) intention in Central Asia. Design/methodology/approach In total, 779 questionnaires were collected (via mall-intercept method) from cities in Kazakhstan, Kyrgyzstan and Uzbekistan. The data were then subjected to two-step structural equation modeling procedure
APA, Harvard, Vancouver, ISO, and other styles
45

Chun, Se-Hak. "E-Commerce Liability and Security Breaches in Mobile Payment for e-Business Sustainability." Sustainability 11, no. 3 (2019): 715. http://dx.doi.org/10.3390/su11030715.

Full text
Abstract:
This study investigates liability issues in electronic transactions when security or privacy breaches occur. As data is transferred using various devices, such as PCs, mobile phones, tablets, sensors, smart meters, and cars, and various architecture, such as the cloud, IoT, as well as in well-defined network structures in electronic commerce, privacy and security breaches happen. These have become a major hindrance to the development and use of commercial activities on the Internet. There have been many security breach cases, such as those of Target Corporation’s security and payment system (2
APA, Harvard, Vancouver, ISO, and other styles
46

Li, Xiaochun, and Dan Huang. "Research on Value Integration Mode of Agricultural E-Commerce Industry Chain Based on Internet of Things and Blockchain Technology." Wireless Communications and Mobile Computing 2020 (December 31, 2020): 1–11. http://dx.doi.org/10.1155/2020/8889148.

Full text
Abstract:
With the development of Internet technology, especially the application of mobile Internet technology in people’s daily lives, people’s lifestyles and production methods have changed, and they have brought huge economic benefits to society. In order to improve the development quality of agricultural e-commerce and expand the integration model of e-commerce, the paper analyzes the development and changes of Internet technology in the agricultural industry chain from the source to operation, production, service, security, and sales and studies the production experience model iterative upgrade. A
APA, Harvard, Vancouver, ISO, and other styles
47

Shyju. "COMMERCIAL SYSTEM WITH SPECIAL REFERENCE TO E-COMMERCE, ITS PROS & CONS." International Journal of Research -GRANTHAALAYAH 4, no. 5SE (2016): 27–30. http://dx.doi.org/10.29121/granthaalayah.v4.i5se.2016.2719.

Full text
Abstract:
E-commerce or Electronic commerce is a methodology of modern business, which addresses the requirements of business organizations. It can be broadly defined as the process of buying or selling of goods or services using an Electronic Medium such as the Internet. A person sitting on his chair in front of a computer can access all the facilities of the internet to buy or sell the products. Traditional commerce that is carried out physically with effort of a person to go and get products. E-commerce has made it easier for human to reduce physical work and to save a lot of time. Even though it giv
APA, Harvard, Vancouver, ISO, and other styles
48

Richadinata, Kadek Riyan Putra, and A. A. Ngurah Bagus Aristayudha. "NIAT REMAJA MENGGUNAKAN APLIKASI MOBILE COMMERCE DI KOTA DENPASAR." E-Jurnal Manajemen Universitas Udayana 9, no. 11 (2020): 3600. http://dx.doi.org/10.24843/ejmunud.2020.v09.i11.p09.

Full text
Abstract:
Readiness in using technology and the risk of credibility becomes an influence in youth intentions using m-commerce applications. This study aims to determine the intentions of adolescents using m-commerce applications in the city of Denpasar. The model used in this study is a causality model is a study that aims to determine the relationship of a causal cause between exogenous variables and endogenous variables. Dependent variable in this research is Readiness in Pengadobsian and Risk credibility, and independent variable in this research is intention to use m- commerce. Data analysis techniq
APA, Harvard, Vancouver, ISO, and other styles
49

Tahir, Muhammad, Asim Rafiq, and Danish Hassan. "Designing, Planning & Implementation of IT Infrastructure & Security for A Brokerage House." Sir Syed University Research Journal of Engineering & Technology 8, no. 1 (2018): 6. http://dx.doi.org/10.33317/ssurj.v8i1.32.

Full text
Abstract:
M-Commerce is widely known as wireless networktechnology, use as the essential means of communication forbusiness transactions. Mobile commerce is seen as anaugmentation of E-commerce empowered by cell phones.Transactions either indirectly or directly carried out orsupported through mobile phones. ABC Brokerage House is thepioneer in Online Trading Services. In online trade, customerscan trade using the online trade software and website. Beforeswitching users, from traditional trading system to mobiletrading system, the weaknesses of infrastructure, securitybreaches, and risk factors should be
APA, Harvard, Vancouver, ISO, and other styles
50

Hossain, Syed Far Abid, Zhao Xi, Mohammad Nurunnabi, and Khalid Hussain. "Ubiquitous Role of Social Networking in Driving M-Commerce: Evaluating the Use of Mobile Phones for Online Shopping and Payment in the Context of Trust." SAGE Open 10, no. 3 (2020): 215824402093953. http://dx.doi.org/10.1177/2158244020939536.

Full text
Abstract:
The article analyzes the role of driving m-commerce with social networking and therefore provides insight into how the application of mobile apps influences customers’ perceptions on purchasing products online and on the mode of payment. The consumers are engaged in social interactions through the internet by the new opportunities provided by social media. These interactions provide and generate certain values for both businesses and consumers. An upsurge in the application of social media on mobile phones by users is evident, giving optimism and the ability to view the role of the integration
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!