Journal articles on the topic 'Mobile commerce security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mobile commerce security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lam, Kwok-Yan, Siu-Leung Chung, Ming Gu, and Jia-Guang Sun. "Lightweight security for mobile commerce transactions." Computer Communications 26, no. 18 (2003): 2052–60. http://dx.doi.org/10.1016/s0140-3664(03)00188-9.
Full textAbu-Shanab, Emad, and Osamah Ghaleb. "Adoption of Mobile Commerce Technology." International Journal of Technology Diffusion 3, no. 2 (2012): 36–49. http://dx.doi.org/10.4018/jtd.2012040104.
Full textZhang, Tao, Kun Zhao, Ming Yang, Tilei Gao, and Wanyu Xie. "Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov." Wireless Communications and Mobile Computing 2020 (July 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/8888296.
Full textJin, Min Li, Yang Cheng, and Wu Liang Peng. "Security Solution of Mobile E-Commerce Based on WAP." Applied Mechanics and Materials 16-19 (October 2009): 169–73. http://dx.doi.org/10.4028/www.scientific.net/amm.16-19.169.
Full textWang, Qin, and Huifeng Li. "Design and Simulation of Mobile Commerce Identity Authentication Protocol Based on OTP." International Journal of Asian Business and Information Management 6, no. 1 (2015): 51–67. http://dx.doi.org/10.4018/ijabim.2015010104.
Full textAl-Dwairi, Radwan Moh'd, Laith M. K. Al-Shraideh, and Emad A. Abu-Shanab. "Mobile Commerce Adoption From Consumers Perspective." International Journal of Information Systems and Social Change 9, no. 2 (2018): 12–27. http://dx.doi.org/10.4018/ijissc.2018040102.
Full textXu, Hongjiang. "The Effect of Perceived Security on Consumers’ Intent to Use." Journal of Electronic Commerce in Organizations 11, no. 4 (2013): 37–51. http://dx.doi.org/10.4018/jeco.2013100103.
Full textYOON, Eun-Jun, and Kee-Young YOO. "A Robust Security Mechanism for Mobile Commerce Transactions." IEICE Transactions on Information and Systems E93-D, no. 11 (2010): 2898–906. http://dx.doi.org/10.1587/transinf.e93.d.2898.
Full textGururajan, Raj. "New Financial Transaction Security Concerns in Mobile Commerce." Information & Security: An International Journal 8 (2002): 71–86. http://dx.doi.org/10.11610/isij.0803.
Full textWei, June, and Ant Ozok. "Development of a Mobile Commerce Security Analysis Method." Journal of Information Privacy and Security 5, no. 1 (2009): 28–48. http://dx.doi.org/10.1080/15536548.2009.10855856.
Full textHanifurohman, Cholis, and Deanna Durbin Hutagalung. "ANALISIS STATIS MENGGUNAKAN MOBILE SECURITY FRAMEWORK UNTUK PENGUJIAN KEAMANAN APLIKASI MOBILE E-COMMERCE BERBASIS ANDROID." Sebatik 24, no. 1 (2020): 22–28. http://dx.doi.org/10.46984/sebatik.v24i1.920.
Full textKhurana, Kartik, Harpreet Kaur, Ritu Chauhan, Shalu Chauhan, Shaveta Bhatia, and Prasenjit Banerjee. "Security issues in Mobile Computing." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (2018): 13. http://dx.doi.org/10.23956/ijarcsse.v8i4.620.
Full textZhang, Cheng, and Xiao Mei Wei. "The Study of the Trust Mechanism Based on Mobile Agent in the E-Commerce Agricultural Commodity Trade." Advanced Materials Research 1037 (October 2014): 444–46. http://dx.doi.org/10.4028/www.scientific.net/amr.1037.444.
Full textHalaweh, Mohanad. "Users' Perception of Security for Mobile Communication Technology." International Journal of Information Security and Privacy 8, no. 3 (2014): 1–12. http://dx.doi.org/10.4018/ijisp.2014070101.
Full textahmad mahmoud, Mohammad awni, laith Talal khrais, Rasha mohammad alolayan, et al. "Consumers Trust, Privacy and Security Issues on Mobile Commerce Websites." Modern Applied Science 13, no. 12 (2019): 21. http://dx.doi.org/10.5539/mas.v13n12p21.
Full textZhong, Hai Dong, Ping Li, Shao Zhong Zhang, Wen Ting Yuan, Xu Dong Zhao, and Jian Wen Shen. "Study on Location Based Services Driven Mobile E-Commerce System." Advanced Materials Research 734-737 (August 2013): 3214–19. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3214.
Full textPelet, Jean-Eric, and Panagiota Papadopoulou. "Consumer Behavior in the Mobile Environment." International Journal of Technology and Human Interaction 10, no. 4 (2014): 36–48. http://dx.doi.org/10.4018/ijthi.2014100103.
Full textAlfahl, Husam, Luke Houghton, and Louis Sanzogni. "Mobile Commerce Adoption in Saudi Organizations." International Journal of Enterprise Information Systems 13, no. 4 (2017): 31–57. http://dx.doi.org/10.4018/ijeis.2017100103.
Full textJiang, Weijin, Wei Liu, Haolong Xia, Yuhui Xu, Dongbo Cao, and Guo Liang. "Research on Intelligent Mobile Commerce Transaction Security Mechanisms Based on Mobile Agent." Computers, Materials & Continua 65, no. 3 (2020): 2543–55. http://dx.doi.org/10.32604/cmc.2020.011454.
Full textFakunle, David Oluwamayowa. "Software Security and Privacy Risks in Mobile e-Commerce." TEXILA INTERNATIONAL JOURNAL OF ACADEMIC RESEARCH 3, no. 1 (2016): 130–32. http://dx.doi.org/10.21522/tijar.2014.03.01.art016.
Full textSoriano, M., and D. Ponce. "A security and usability proposal for mobile electronic commerce." IEEE Communications Magazine 40, no. 8 (2002): 62–67. http://dx.doi.org/10.1109/mcom.2002.1024416.
Full textGhosh, Anup K., and Tara M. Swaminatha. "Software security and privacy risks in mobile e-commerce." Communications of the ACM 44, no. 2 (2001): 51–57. http://dx.doi.org/10.1145/359205.359227.
Full textHe, Yi-Jun, and Moon-Chuen Lee. "Improving WTLS Security for WAP Based Mobile e-Commerce." Wireless Personal Communications 51, no. 1 (2008): 17–29. http://dx.doi.org/10.1007/s11277-008-9604-0.
Full textIslam, Md Monirul, and Abdul Kadar Muhammad Masum. "Mobile Commerce and Mobile Payment: A Study on Islamic Perspective." IIUC Studies 7 (October 19, 2012): 37–48. http://dx.doi.org/10.3329/iiucs.v7i0.12257.
Full textThammarat, Chalee, and Werasak Kurutach. "A Secure Fair Exchange for SMS-Based Mobile Payment Protocols Based on Symmetric Encryption Algorithms with Formal Verification." Wireless Communications and Mobile Computing 2018 (July 5, 2018): 1–21. http://dx.doi.org/10.1155/2018/6953160.
Full textNida, Desak Rurik Pradnya Paramitha, I. Made Dwi Sumba Wirawan, and I. Made Dwi Harmana. "The Influencing Factors toward Universitas Warmadewa Student Interests in Using Mobile Commerce." Jurnal Ekonomi & Bisnis JAGADITHA 7, no. 2 (2020): 104–13. http://dx.doi.org/10.22225/jj.7.2.2372.104-113.
Full textYang, Jiachen, Longsheng Xu, Qinggang Meng, and Shudong He. "Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/103136.
Full textZhang, Mei, Huan Liu, and Jinghua Wen. "E-Commerce Security Research in Big Data Environment." International Journal of Enterprise Information Systems 14, no. 1 (2018): 63–76. http://dx.doi.org/10.4018/ijeis.2018010104.
Full textZoumpoulidis, Vasilios, Aggelos Zoitsas, Vasilios Ferelis, and Michael Nikolaidis. "The Impact Of Mobile Commerce In Kavala." KnE Social Sciences 1, no. 2 (2017): 400. http://dx.doi.org/10.18502/kss.v1i2.675.
Full textUbaya, Huda. "Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android." Computer Engineering and Applications Journal 1, no. 1 (2012): 1–12. http://dx.doi.org/10.18495/comengapp.v1i1.1.
Full textO'Donnell, Jonathan, Margaret Jackson, Marita Shelly, and Julian Ligertwood. "Australian Case Studies in Mobile Commerce." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 2 (2007): 1–18. http://dx.doi.org/10.3390/jtaer2020010.
Full textLi, Xiao Guang, and Zhan Jun Gao. "Realization of an Intelligent E-Commerce Model Based on Mobile Agent." Applied Mechanics and Materials 543-547 (March 2014): 4198–201. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4198.
Full textPrakash, Krishna, and Balachandra. "Security Issues and Challenges in Mobile Computing and M-Commerce." International Journal of Computer Science & Engineering Survey 6, no. 2 (2015): 29–45. http://dx.doi.org/10.5121/ijcses.2015.6203.
Full textCritchlow, D., and N. Zhang. "Security enhanced accountable anonymous PKI certificates for mobile e-commerce." Computer Networks 45, no. 4 (2004): 483–503. http://dx.doi.org/10.1016/j.comnet.2004.02.010.
Full textXu, Hong Feng, and Gui Xian Zhou. "Study on the Trusted Operating Technology for Mobile E-Commerce System Secure." Applied Mechanics and Materials 519-520 (February 2014): 416–21. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.416.
Full textDong, Wei, Li Xin Ma, and Li Liu. "Design and Implementation of 3G E-Commerce Trading System Based on Data Encryption and Web Service." Applied Mechanics and Materials 241-244 (December 2012): 2669–75. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2669.
Full textDang, Doan Thai, and Tuan Manh Nguyen. "Intention to use Mobile-commerce services: An extension based on Technology Acceptance Model (TAM)." Science & Technology Development Journal - Economics - Law and Management 1, Q4 (2017): 25–33. http://dx.doi.org/10.32508/stdjelm.v1iq4.472.
Full textWei-Jin, Jiang, Xu Yu-Sheng, Guo Hong, and Zhang Lian-Mei. "Research on Transaction Security Mechanism of Mobile Commerce in Mobile Internet based on MAS." International Journal of Security and Its Applications 9, no. 12 (2015): 289–302. http://dx.doi.org/10.14257/ijsia.2015.9.12.27.
Full textWang, Qin, Fen He Zhi, and Jing Hai Ao. "Design and Security Analysis of Mobile Identity Authentication Protocol." Advanced Materials Research 403-408 (November 2011): 2645–49. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2645.
Full textWei, June, Lai C. Liu, and Kai S. Koong. "An onion ring framework for developing and assessing mobile commerce security." International Journal of Mobile Communications 4, no. 2 (2006): 128. http://dx.doi.org/10.1504/ijmc.2006.008605.
Full textGupta, Sonal. "EMCV: Enhancing the Security of the Mobile Commerce using Voice Features." International Journal of Computer Applications 44, no. 16 (2012): 38–41. http://dx.doi.org/10.5120/6350-8702.
Full textXiangsong, Meng, and Han Fengwu. "Design on PKI-based anonymous mobile agent security in E-commerce." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1907–10. http://dx.doi.org/10.1007/bf02831904.
Full textMarinkovic, Veljko, and Zoran Kalinic. "Antecedents of customer satisfaction in mobile commerce." Online Information Review 41, no. 2 (2017): 138–54. http://dx.doi.org/10.1108/oir-11-2015-0364.
Full textChung, Kim Choy. "Mobile (shopping) commerce intention in central Asia." Asia-Pacific Journal of Business Administration 11, no. 3 (2019): 251–66. http://dx.doi.org/10.1108/apjba-11-2018-0215.
Full textChun, Se-Hak. "E-Commerce Liability and Security Breaches in Mobile Payment for e-Business Sustainability." Sustainability 11, no. 3 (2019): 715. http://dx.doi.org/10.3390/su11030715.
Full textLi, Xiaochun, and Dan Huang. "Research on Value Integration Mode of Agricultural E-Commerce Industry Chain Based on Internet of Things and Blockchain Technology." Wireless Communications and Mobile Computing 2020 (December 31, 2020): 1–11. http://dx.doi.org/10.1155/2020/8889148.
Full textShyju. "COMMERCIAL SYSTEM WITH SPECIAL REFERENCE TO E-COMMERCE, ITS PROS & CONS." International Journal of Research -GRANTHAALAYAH 4, no. 5SE (2016): 27–30. http://dx.doi.org/10.29121/granthaalayah.v4.i5se.2016.2719.
Full textRichadinata, Kadek Riyan Putra, and A. A. Ngurah Bagus Aristayudha. "NIAT REMAJA MENGGUNAKAN APLIKASI MOBILE COMMERCE DI KOTA DENPASAR." E-Jurnal Manajemen Universitas Udayana 9, no. 11 (2020): 3600. http://dx.doi.org/10.24843/ejmunud.2020.v09.i11.p09.
Full textTahir, Muhammad, Asim Rafiq, and Danish Hassan. "Designing, Planning & Implementation of IT Infrastructure & Security for A Brokerage House." Sir Syed University Research Journal of Engineering & Technology 8, no. 1 (2018): 6. http://dx.doi.org/10.33317/ssurj.v8i1.32.
Full textHossain, Syed Far Abid, Zhao Xi, Mohammad Nurunnabi, and Khalid Hussain. "Ubiquitous Role of Social Networking in Driving M-Commerce: Evaluating the Use of Mobile Phones for Online Shopping and Payment in the Context of Trust." SAGE Open 10, no. 3 (2020): 215824402093953. http://dx.doi.org/10.1177/2158244020939536.
Full text