Está en la página 1de 6

Mobile commerce and related mobile security and privacy issues

Rashad Yazdanifard, Faculty of


management, Multimedia University, Mohamed Sayed Abdelgadir Elkhabir
Cyberjaya, Malaysia, Limkokwing University of Creative
rashadyazdanifard@yahoo.com Technology,
moelkhabir@gmail.com

Abstract -This article will discuss how out between businesses and in the other
m-commerce conducts transactions case it is carried out between business
between the mobile device and the and end consumers.
Internet and how these technologies The Internet and all kind of
developed throughout the years. It will telecommunications have been gradually
also look at how safe and secure could more common in many daily life aspects
been when we transfer money we since the 1990s. In 2005, there were
spend by using m-commerce whether about 964 million Internet users and
it is on shopping or bank transfer. 2,168 million mobile phone users
There will be solutions on how m- globally (Internet Telecommunication
commerce corruption is avoided by Union (2007) [1], [2], [3].
using technology.
The expansion of the Internet and related
Key words – M-commerce, security technologies moved us to a range of new
and privacy issues opportunities for business, providing
businesses with new ways to conduct
I. Introduction trade and exchange and communicate
information through the progress and
The term e-commerce signifies business expansion of the e-commerce market
processes on the Internet, such as the (OECD, 2001)[1], [3]. Therefore, a new
buying and selling of goods and services. type of communication service using
There is a distinction between B2B Internet before our eyes by mobile
(business-to-business) and B2C device, and that lead to the emerging of
(business-to-consumers) markets. In the new opportunities and to carry out
first case, the business process is carried different digital contents or services,
called mobile commerce (m-commerce) D. Examples of m-commerce are
(SERI, 2003). Belonging only to a mobile parking meter payments
specific individual, a mobile device let and buying ringtones and games
users to access service more compactly online. Those kind of services are
as well as to have more modified recognized as Micropayments:
services than those of the wired Internet. any transaction cost lower than
However, many features such as cell $10
phone ring tone download, music
streaming or download, photo and video E. High value purchases such as
file transfer and download, mobile game land, houses and cars will be
download, e-mail service, search service, more convenient in the future.
video streaming, and GPS service, were
introduced not long before mobile III. Issues that concern M-
phones were created according to the commerce in terms of security
frequency of uses. The most frequently and privacy.
used services are mostly related to make
The most important element when we
download or location-based service
are dealing with m-commerce is security
easer. The article will also cover some of
issues and how we can make it safe for
the benefits of m-commerce and how we
customers to feel comfortable when
can improve it [8], [11], [12].
using mobile phones, so in order to
attract as many customers we need to
II. Benefits of mobile commerce
insure the quality of the security level
[6].
provided [3].
However, it’s absolutely crucial to insure
A. Mobile commerce involves all
the safety of all kind of m-commerce
kind of electronic transactions by
transaction special those that involve
the use of mobile phone.
money transactions, therefore there are
three main arias that this article will
cover and elaborate [2].
B. By the use of mobile commerce
enterprises can improve and
1. Security issues related to the
widen their market reach, cut
network technologies [8].
down on cost and give customers
This article will first look at, the
better service
challenges that face the security network
technologies issues [5].
C. Users can benefit from m-
GSM stand for Global System Mobile
commerce by the convenience
commerce, GSM’s are the most used and
the m-commerce provide to them
the most common in the world especially
and organizing personal data
in Europe, they are also considered to be
the most important element of mobile
commerce now a days. GSM’s where B. Integrity protection to MAC
first produced in the 1990s starting with frames.
a small market and very limited because C. Confidentiality to MAC frames.
it was not very handy back then, and also
because it was very slow and above all 2. Layer Security Transport
that the device would not run without a In this part the article will look at
computer which made it very end-to-end security issues that
inconvenient for customers to use it concern mobile devices. Layer
everywhere [3], [10], [16], [20]. security transport gives more
security to the wirel Logic, by this
As technology developed GSM and cell technology SMS and Packet data
phones became more and more popular service were improved [2], [15],
and more services were provided, such [20].
as SMS, wireless application protocols,
HSCSD, and GPRS [3]. IV. Solutions solved the main
GSM is responsible for the security of issues of mobile commerce.
the mobile station when linked to a
network, examples [10], [20]: A. Security transaction over the web
A. IMSI confidentiality. browser: when a customer is
B. IMSI data confidentiality on using mobile transaction though
physical connections. a web browser the customer is
C. Connectionless user data protected by inactivity lock out,
confidentiality. this technology loges out the user
D. Signalling information element automatically when the
confidentiality. connection is lost [9], [14], [17].

The Wireless Local Area Network, B. USSD: this technology will make
which is known as (WLAN), operates in sure that all kind of transaction
the unlicensed 2.4GHz, and most mobile been made does not fall on the
phones have this function and it is also wrong hands and it is very
becoming very popular [20]. However powerful [9] [14], [17].
during the default mode WLAN is not
secured which makes the device easy to
corrupt, so a cretin level of security was
needed and that is why the IEEE
invented WEP (Wired Equivalent
Privacy in order to solve the following V. Dissection
problems: [2], [13], [19]. Mobile commerce information
A. Authentication to protect the security and privacy issues are a
association to an AP. very important fact, which
needed to be considered by
mobile, m-commerce and other
electronic commerce developers
(Miyazaki and Fernandez, 2001;
Earp and Anton, 2004) [2].
Consumers are very aware of
those issues; therefore it will
directly have an influence the
services provided by business
such as money transactions and
other services (Malhotra et al,
2004; Brown and Muchira, 2004;
Sah and Han, 2003) [2].
Technology has significantly
evaluated from ‘E-decade’ to ‘M-
decade’ (Wagner, 2005)

VI. Conclusion
In conclusion, the article has looked at
some of the most sensitive arias of the
new mobile commerce such as, bank
transaction systems because it engages
with large amounts of money every day .
Therefore the system used for
transactions has to absolutely secure and
to be free of corruption as mentioned
earlier in the article; business will lose
customers if the mobile security system
is not secure enough [6]. On the other
hand the article also discussed the varies
of ways of how our mobile commerce
works and how it is been improved
through the years.

It also showed the kind of protocols that References


have been developed in order to make
our mobile commerce safe and secure 1. An Investigation of Consumer's Security and
Privacy Perceptions in Mobile Commerce
HuaDai University of North Carolina at
Greensboro Lakshmi Iyer The University of
North Carolina at Greensboro Rahul Singh Church, VA 22043 {snambiar, ctlu}@vt.edu
University of North Carolina, Greensboro Lily R. Liang Dept. of Computer Science
12-31-2007 University of the District of Columbia
Washington, DC 20008 lliang@udc.edu
2. Review chapter for the New Economy
Handbook (Jones, ed.), in press Privacy and 9. Security and Privacy in Mobile Commerce
Security Issues in E-Commerce Mark S. Stefan Weiss Deloitte & Touche GmbH
Ackerman and Donald T. Davis, Jr. Johann Wolfgang Goethe Universität
Security Services Grou Mobile Commerce &
Multilateral Security 30. Mai 2006
3. Future Trends in Mobile Commerce: Service Universität Hannover, Institut für
Offerings, Technological Advances and Wirtschaftsinformatik
Security Challenges Ali Grami and
Bernadette H. Schell Faculty of Business
and Information Technology University of 10. Mobile Banking & M–Commerce and
Ontario Institute of Technology Related Issues By Sanjeev Banzal
ali.grami@uoit.ca and sbanzal@gmail.com
bernadette.schell@uoit.ca
11. MOBILE COMMERCE APPLICATIONS
4. ISSUES IN MOBILE E-COMMERCE Peter AND SERVICES: A DESIGN AND
Tarasewich College of Computer Science DEVELOPMENT APPROACH A. S.
Northeastern University Andreou, C. Chrysostomou, C. Leonidou, S.
tarase@ccs.neu.edu Mavromoustakos, A. Pitsillides, G.
Robert C. Nickerson College of Business Samaras, C. Schizas Department of
San Francisco State University Computer Science*, University of Cyprus,
Merrill Warkentin 75 Kallipoleos Street, P.O. Box 20537, 1678
College of Business & Industry Mississippi Nicosia, Cyprus, Phone: +357 22 892230,
State University Communications of the Fax: +357 22 339062, e-mail: { aandreou,
Association for cchrys, leonidou, cspgms1,
Information Systems (Volume 8, 2002) 41- andreas.pitsillides , cssamara,
64 schizas}@ucy.ac.cy

5. M-Commerce Technologies, Services, and 12. NEW PERSPECTIVES ON M-COMMERCE


Business Models Norman Sadeh John Wiley RESEARCH Okazaki : New Perspectives on
& Sons, Inc. 2002. M-Commerce Research Shintaro Okazaki
College of Economics and Business
Administration Autonomous University of
6. M-Commerce-Issues and Challenges Ravi Madrid, Spain obarquitec@coac.net
Tandon , Swarup Mandal and Debashis
Saha 13. OECD Policy Guidance for Addressing
Emerging Consumer Protection and
7. Security Measures in Mobile Commerce: Empowerment Issues in Mobile Commerce,
Problems and Solutions Sanwar ALI Seoul, Korea, 17-18 June 2008
Indiana University of Pennsylvania
Department of Computer Science Indiana, 14. Secure M-commerce, Scarlet Schwilderski-
PA 15705, USA Email: sanwar@iup.edu Grosche, Heiko Knospe. Information
Fax: 724-357-2724 Waleed FARAG Security Group, Royal Holloway University
Zagazig University Department of of London, Egham TW20 0EX, UK Email:
Computer and Systems Engineering scarlet.schwiderski-grosche@rhul.ac.uk
Zagazig, Egypt Email: farag@iup.edu Fax:
+20-55-2304987 Mohammad A. ROB
Management Information Systems 15. Security Issues in M–Commerce: A Usage
University of Houston- Clear Lake Houston, Based Taxonomy. Electrical and
TX 77058, USA Email: rob@cl.uh.edu Fax: Computing Engineering, Univ. of Maryland,
281-283-3951. College Park MD 20742
leandros@isr.umd.edu Suresh Chari1,
Parviz Kermani1, Sean Smith2, and
8. Analysis of Payment Transaction Security in Leandros Tassiulas3 IBM T.J. Watson
Mobile Commerce Seema Nambiar, Chang- Research Center, Yorktown Heights NY
Tien Lu Department of Computer Science 10598-0704 {schari,parviz}@us.ibm.com
Virginia Polytechnic Institute and State Department of Computer Science,
University 7054 Haycock Road, Falls Dartmouth College, Hanover NH 03755-
3510 sws@cs.dartmouth.edu

16. 15th Bled Electronic Commerce Conference


eReality: Constructing the eEconomy Bled,
Slovenia, June 17 - 19, 2002 Security Issues
in Mobile Commerce Using WAP Niels
Christian Juul Roskilde University,
Department of Computer Science, Denmark
NCJuul@acm.org Niels Jørgensen Roskilde
University, Department of Computer
Science, Denmark Nielsj@ruc.dk

17. Security Issues in Mobile Payment from the


Customer Viewpoint Linck, K., Pousttchi,
Key and Wiedemann, Dietmar Georg
University of Augsburg 2006.

18. M-Commerce and its Security Issues By


SAMEER YADAV.

19. Journal of Theoretical and Applied


Electronic Commerce Research ISSN 0718–
1876 Electronic Version VOL 2 / ISSUE 2 /
AUGUST 2007 / I - II © 2007 Universidad
de Talca – Chile. Editorial Special Issue on
M-Commerce.

20.
21. mCommerce Security White Paper Key
Security Techniques. www.sybase.com/365

También podría gustarte