ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Maintaining Network Security in M-Commerce

Verified

Added on  2019/12/03

|11
|2763
|255
Report
AI Summary
The assignment content discusses the importance of network security in the context of mobile commerce (M-commerce). It highlights two major concerns: message origination and integrity, which ensure that messages are not tampered with or modified during transmission. The study also emphasizes the need for authentication, confidentiality, and authorization to maintain the security of M-commerce transactions. Furthermore, it recommends the use of various security tools, such as encryption techniques and inactivity logout, to protect customers' personal information. The study concludes that a truly global wireless communication infrastructure with sufficient speed is necessary to ensure the success of M-commerce.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
INFORMATION TECHNOLOGY

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
INTRODUCTION......................................................................................................................1
CONCEPTS OF M-COMMERCE............................................................................................1
COMPONENTS OF M-COMMERCE......................................................................................2
WIRELESS TECHNOLOGY USED........................................................................................2
MARKET SHARE.....................................................................................................................4
SECURITY ISSUES..................................................................................................................5
RECOMMENDATIONS...........................................................................................................6
CONCLUSION..........................................................................................................................6
REFERENCES...........................................................................................................................8
Document Page
LIST OF FIGURES
Figure 1 UK retail M-commerce sales.......................................................................................4
Figure 2mCommerce Sales 2013-2019......................................................................................5
Document Page
INTRODUCTION
With the technological advancements and increase in the number of mobile phone
users, m-commerce (mobile commerce) came into existence. It is a field of e-commerce in
which buying and selling of products and service are conducted with the help of wireless
devices i.e. Smartphone, tablets and related. The trend of m-commerce is increasing due to
numerous benefits associated to it (Sharma and Gutiérrez, 2010). Considering this, present
report has been developed that majorly focuses on impact of m-commerce on the changing
face of business. Under this, security issues to this practice are also discussed along with its
market share in total e-commerce business.
CONCEPTS OF M-COMMERCE
M-commerce is a practice of buying and selling goods from mobile phones by using
internet. It is a wireless mode of buying and selling things that been increasing rapidly. It is
an alternative and economic form of e-commerce that helps business firm in gaining attention
from variety of customers at once. Smartphone’s are used in two manner i.e. message
receiver and another for accessing internet (Zainudeen, Samarajiva and Sivapragasam, 2011).
Companies now a day sent SMS to customers regarding sales and offers on the mobile phone
so that awareness can be increased. Further, Smartphone supports high speed internet, unlike
in initial days, from which buying and selling activity is done faster as compared to other
forms of commerce. In addition to it, payment is even done through mobile phones and all
these factors of m-commerce offers high amount of convenient to the customers. This is one
of the key modes of e-commerce that helping companies and buyers in accomplishing their
motive with ease.
Prominent e-commerce companies like Amazon, Argos, Play, Tesco, Mark and
Spencer and other related have developed mobile phone applications so that they can offer
great buying experiences to their customers, these companies developed cross platform
application that worked on varied mobile OS namely android, iOS, Windows and Blackberry
(Alqatan, Singh and Ahmad, 2011).
1 | P a g e

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
COMPONENTS OF M-COMMERCE
Basically there are two components of m-commerce upon which whole truncation are
being carried out. In this, first component is the ability to use wireless technology for the
purpose of making payment over the internet. This offers shopping option to customer on the
tip of figure that certainly makes this experience rich. Another component of this practice is
offering of required information that facilitates transaction (Chong, 2013). This information
includes location of users, conduct of mobile market campaign, text promotions and other
related. Mobile phones possess capabilities of tracking the location of the customers from
GPS from which companies like Amazon and Tesco displays appropriate option of goods and
services. With this, customers are able to complete the shopping activity faster as compared
to web. Through this, nearby pizza stores, food court, ATM, theatre and other landmarks are
displayed that offers convenience to internet users. This certainly aids in meeting with the
diverse needs of customers through satisfaction level are reached. This also aids in gaining
loyalty from the customers those results in long term business to companies.
Further, varied m-commerce companies also displays products based on the past
buying or viewing history of the customers so that they can buy the same with ease.
Additionally, tracking of goods in transit is another set of component that been provided by
company in order to interact with customers (Sripalawat, Thongmak and Ngramyarn, 2011).
Hence, based on this discussion, it can be state that m-commerce offers high amount of
convenience to companies in identifying their target customers through which overall
business revenue gets increased. Also, it offers benefits to customers in terms of instant
shopping, quick receiving of information and fast payment.
WIRELESS TECHNOLOGY USED
Wireless technologies for mobile commerce can be categorized into mobile client
devices for interactivity as well as communication infrastructure. Under M-commerce buying
and selling of goods and services through wireless devices can be made (Shaw and et.al.,
2 | P a g e
Document Page
2012). It allows users to directly use the internet without needing to find a place to plug in. It
is the most common way through which information can be transferred among different
users. There are different wireless technologies used for maintaining financial services of
company as well as other most common information services. Wireless devices are continued
to change rapidly and there is a need to ensure that devices can function with one another. It
is the only way through which needs of wireless and m-commerce applications can be satisfy.
However, in a emerging markets where Smartphone’s are rapidly increasing their presence
different wireless technologies which must be used (Khan, Talib and Faisal, 2015). With the
help of different technologies mobile technology works best for the app and users.
Mobile client device technologies and issues: These devices currently most important
to wireless e-commerce are mobile telephones, laptops etc. usability will becoming more
critical with handheld devices as they are different from computers as well as desktops. They
mainly differ in screen size as well as memory. There are various devices which do not
consist any type of traditional keyboards (Sharma and Gutiérrez, 2010). One of the most
important tasks of any organization is to determine that how people can best use the
application and access information through different devices. In this way, developers need to
carefully revisit the both operating system as well as application software in variety of
platforms. It is the most effective way to check the functioning of the software. There are
different software’s used for handheld devices. In these devices wireless services can be used
by customers. Mobile client technology and device is one of the most common tool through
which appropriate functionality can be increased (Kourouthanassis and Giaglis, 2012).
WAP: It is the most effective and most common wireless technology used by different
companies. It can be describe as a wireless application protocol which enables wireless
devices such as I-Pad, Mobile phones to access internet. This is the most effective technique
which will become a globally accepted standard. For the most featured phones WAP 2.0 has
been available. It uses XHTML which is a variation of HTML. There are various
Smartphone’s which supports the use of HTML accept i-phone. In addition to this, it has been
founded that this is the most effective technique which provides a mobile experience much
closer to desktop (Ming-Tsang and et.al, 2015). This protocol is used for the wireless
technique under which most of the users can easily access the internet. Further, it has been
available for most feature phones.
USSD: It is another most effective technique which is available only for external
services in a limited number of markets. It establishes real time connection that allows a true
session based communication. It is the best tool used by most of the companies for their
3 | P a g e
Document Page
better customer service (Li and Yeh, 2010). It transmits the push notification as well as
answer queries from the users. It can also be virtually accessible from any mobile phone and
using it is quite easy. In addition to this, it also incorporates a secure password or mobile PIN
protection.
Telecommunication technology: There are basically 2G digital wireless telephone
technologies which allows for the appropriate mode of communication (Maity and Dass,
2014).
MARKET SHARE
M-commerce is growing rapidly within this globalized as well as technological
advanced world. As per the findings by independent market research e Marketer it has been
founded that M-commerce is expected to grow over 40% by the end of 2019.
Figure 1 UK retail M-commerce sales
(Source: eMarketer.com, 2015)
The increase in m-commerce is being driven by tech-savvy 18-34 years old with 59% of them
reportedly having a use of mobile commerce (Kourouthanassis and Giaglis, 2012). It has
made their purchase double by providing high convenience.
4 | P a g e

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 2mCommerce Sales 2013-2019
(Source: eMarketer.com, 2015)
SECURITY ISSUES
At the time of using M-commerce and wireless technologies there are various security
issues which might occur. It can range from eavesdropping into other’s message in order to
steal her/his personal data. In addition to this, another major problem associated with m-
commerce is in relation with the transferring information over the network. This is the major
problem which consist of two components i.e. identification integrity as well as message
integrity (Li, Dong and Chen, 2012). In this, the identification integrity refers to the signature
element found in the messages. It is the best way through which whole path can be set and
established that where the message is originating. The other component determines the
message integrity in which details kept secure about the message sent by third party. It cannot
be open or modify in any case. Further, these two are the major concerns which appear to
cause a lot of concern for both sender and receiver as well. Sender might face several security
issues related to the misuse of their personal information such as bank details etc. It can be
stolen by the third party if they do not have tight security software’s installed in their phones.
Network security is becoming one of the most important concerns nowadays as
people get connected with each other most of the times (Zainudeen, Samarajiva and
Sivapragasam, 2011). Moreover, some of most common factors which must be cover such as:
5 | P a g e
Document Page
Authentication: It is essential to maintain the security by verifying the identity of
users.
Integrity: It must be maintained as it states that data which is being sent is as same as
arrives. Further, integrity of data as well as information must be maintained.
Confidentiality: It is another most important concern which must be maintained.
Under this, sensitive information should not be visible to eavesdropper use. Encryption
technique must be followed so that information can be kept secure (Ming-Tsang and et.al,
2015).
Authorization: At the time of using M-commerce one of the major issues faced by
most of the companies is related to the wrong access of account. The information can be
stolen to any other user. For this, it is necessary to assign the access rights to users so that
security can be maintained.
Further, it has been identified that there are various securities issues faced by most of
the users of Mobile commerce (Li, Dong and Chen, 2012). There is a huge development
within this area of field and it is necessary to go maintain the dynamic market needs that
favour innovation and a diversity of stakeholders.
RECOMMENDATIONS
All those companies developing M-commerce applications need to use various
security as well as protection tools through which they can easily maintain the level of
integrity. They can easily resolve the main issues of m-commerce by secure transactions over
the web browsers. Under this, they can protect the customers by using inactivity loc out. At
this time when user goes through the mobile transaction on web browser he automatically
logs out at the time of any type of connection lost. Another most effective recommendation to
expand the use of m-commerce is to develop fast applications by which users can easily
communicate with each other. There are various strong protocols need to be made in order to
keep m-commerce safe and secure from fraud. In addition to this, payment method and return
process of products can also be made within a faster way.
CONCLUSION
This study was highly focused with the M-commerce as well as its use in today’s
globalized world. From the whole study it has been articulated that there has been huge
expansion within the technological industry. M-commerce has proven to be one of the fastest
growing sectors which mainly use two components in order to make their existence
6 | P a g e
Document Page
successful. These components are the capability to use wireless technology in order to make
making payment over the internet. On the other hand, major component is belongs to all
those practices under which offering of required information is covered that facilitates
transaction. Further, it has been identified that there are several security threats exists in the
sector of wireless technique m-commerce such as theft of private data as well as information,
authorization problems etc. In this way it has been concluded that there must be a truly global
wireless communication infrastructure with appropriate as well as sufficient speed.
7 | P a g e

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Alqatan, S., Singh, D. and Ahmad, K., 2011.A theoretic discussion of tourism M-
commerce.Journal of Convergence Information Technology. 6(12).pp.100-106.
Chong, A. Y. L., 2013. Predicting m-commerce adoption determinants: A neural network
approach. Expert Systems with Applications. 40(2).pp.523-530.
Khan, H., Talib, F. and Faisal, N., 2015.An analysis of the barriers to the proliferation of M-
commerce in Qatar: A relationship modeling approach. Journal of Systems and
Information Technology. 17(1).pp.54 – 81.
Kourouthanassis, P. E. And Giaglis, G. M., 2012. Introduction to the special issue mobile
commerce: the past, present, and future of mobile commerce research. International
Journal of Electronic Commerce. 16(4).pp. 5-18.
Li, M., Dong, Z. Y. and Chen, X., 2012. Factors influencing consumption experience of
mobile commerce: a study from experiential view. Internet Research. 22(2).pp. 120-
141.
Li, Y. M. And Yeh, Y. S., 2010. Increasing trust in mobile commerce through design
aesthetics.Computers in Human Behavior. 26(4). pp. 673-684.
Maity, M. and Dass, M., 2014. Consumer decision-making across modern and traditional
channels: E-commerce, m-commerce, in-store. Decision Support Systems. 61.pp. 34-
46.
Ming-Tsang, L. and et.al., 2015. Evaluating the implementation of business-to-business m-
commerce by SMEs based on a new hybrid MADM model. Management
Decision.53(2).pp.290 – 317.
Sharma, S. and Gutiérrez, J. A., 2010. An evaluation framework for viable business models
for m-commerce in the information technology sector. Electronic Markets. 20(1).pp.
33-52.
Shaw, M. and et.al., 2012. Handbook on electronic commerce.Springer Science & Business
Media.
Sripalawat, J., Thongmak, M. and Ngramyarn, A., 2011.M-banking in metropolitan Bangkok
and a comparison with other countries.The Journal of Computer Information Systems.
51(3).pp. 67.
Zainudeen, A., Samarajiva, R. and Sivapragasam, N., 2011. CellBazaar: Enabling m-
commerce in Bangladesh. Information Technologies & International Development.
7(3).pp. pp-61.
Online
UK mobile commerce to hit almost £20 billion this year, 2015. [Online]. Available through:
< http://www.businessofapps.com/uk-mobile-commerce-to-hit-almost-20-billion-this-
year/>. [Accessed on 31st October 2015].
8 | P a g e
1 out of 11
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]