Friday, March 29, 2019
Literary Components Of M Commerce Information Technology Essay
Literary Comp unriv whollyednts Of M Commerce discipline Technology EssayThe present appellative on Secure planetary Transactions m-commerce, aims to present a comprehensive view of exclusively the expert and hostage smells that influence and g everywheren monetary legal proceeding do on radio set net go bads. This paper refers to any(prenominal) basic concepts associate to m-commerce and then product to discuss miscellaneous purely technical issues snarled in m-commerce. This work identifies at once available technologies that facilitate m-commerce and gives explanation about each of much(prenominal) applied science. only, the assignment focuses on the aegis ch onlyenges problematical in nomadic effects and conglomerate aspects of runny remunerations. Finally, the paper gives a brief list of m-commerce solutions shortly available.Table of Contents1. Introduction restless commerce or app bently m-commerce relates to commercial message line of business o perations and transactions cable carried out on radio set telecom networks with the infrastructural assistance of hold wandering(a) electronic devices. E-commerce is the commercial business processes done on net income and the m-commerce is making all monetary transactions on vigorous devices ( tuner electronic commerce). The technology of m-commerce offers m some(prenominal) works and facilities that shake off commercial dealings simplified and reduce cartridge clip consumed in those transactions. however the exploiters and service providers have to be cautious of possible treats of tuner plow operations. Security of randomness, privacy to personal details and protection to the silver involved atomic number 18 the real touch stones of strength of m-commerce.2. Literary components of m-CommerceThe concept of supple commerce came into existence in the last decade of the 20th century. What has started as a facility to understand hires to a soft drink hawking mac hine, has instanter effectively subsumed nearly every aspect of electronic commerce. Today, m-commerce has emerged as a viable extension to e-commerce. Now the customers of any service or product provoke make their payments everyplace erratic phones staying anywhere or even on move. profound difference between e-commerce and m-commerce is that, in electronic commerce business dealings and transactions be made on internet, but the officious commerce work heap be apply with the help of simple and inexpensive SMS and IVR systems (Rediff.com, 2010). Statistics inform that, the perceptivity of personal computers is let off limited and the mobile penetration is nearly ten times more than that of PCs. go on, the wide internet access is still a distant intake with the exception of big cities and conurbations. Thus with the presently available user treat and the further spread in early would certainly point mobile commerce as a viable and popular option to make swift and take prisoner monetary transactions. Further, people with basic literacy can in addition make use of various operate of mobile commerce impertinent the electronic commerce, which requires the users to have good command on PC association and its operational procedures.The central point of mobile commerce is making payments on mobile phones. It is a point of sale payment made over a mobile gadget uniform cellphone phone, PDA (Personal digital Assistant) ,a smart phone, gadgets of personal ara networks and other newly coming radio receiver equipment (Krueger, 2001). Here, not only the merchandise transactions made through cell phones but the monetary payments made to utility vending machines, cab services, car wash machines etc excessively constitute acts of mobile commerce (Paavalainen, 2001). The core bringing close together is the convenience. This convenience should not turn into a nightmare because of lack of security measures of the data transformd in these commerci al transactions over radio set networks.Important services offered by m-commerce are,Making reservations of tickets of journeysBooking various pastime show ticketsMaking payments of civic utility billsTransferring gift vouchersBooking hotel roomsBooking cab servicesMake money donations to social service foundationsMaking stock market tradingTo avail all these facilities, mobile users can make use of SMS, BREW, GPRS and IVR services. Key issues of mobile transactions are the questions of authentication and security. The service providers have to follow robust security stock(a)s that are in vogue world wide. Some of the presently accepted standards are PCI DSS ( stipend Card Industry Data Security Standard).Advantages of m-commerce areReduction of time consumed in serving merchandise ordersReduction in the cost of precaution of commercial transactionsGives extensively broad reachHelps in effectively coordinating all the business processes involvedGives competitive advantage in ma tters of product pricingProvides noble speed access to modern cellular applications (Answers Corporation, 2010).Disadvantages of mobile transactionsCost of establishing and managing radio receiver telecom infrastructureConcerns over safety of information and data exchanged over mobile gadgetsMobile devices come with down(p) screens and this limited display can limit the types of data and files that can be exchanged and accessedAdvanced mobile technologies are now largely confined to big citiesTechnical limitations of mobile telecom equipments (Answers Corporation, 2010). disposed(p) the comparative merits and demerits of mobile commerce, one can be perfectly certain(predicate) that, the ongoing technological researches would certainly find viable answers to problems of this new effigy in receiving set commerce.3. How m-commerce differs from e-commerce?The level of wide availability of wireless telecommunication networks to use m-commerce applications practically from any loca tion. The convenience in handling these weakened and low weighed devices is unique when compared to equipment required for carrying out electronic commerce transactions. Further these mobile devices are purely personal electronic gadgets and this guarantees maximum personalization remote the PCs with Internet which are dealed for e-commerce actions that are often shared among quadruplex users. Localized positioning of users can be done on all mobile commerce transactions. As the users carry their mobile phones with them, they can put on their preferred personalized settings with which they can transact. This personalization is not available in electronic commerce transactions and dealings.4. Technical areas associate to secure m-commerceThere are various aspects on the technical front that are closely related to safe money transactions done on wireless telecommunication networks with the help of mobile handheld devices. They are4.1. Need for secure m-commerce match to Yeun (20 01), there are more cell phones which are connected to internet than the number of net connected Personal Computers. Though the PC penetration is also gaining pace, the spread of mobile phones and related gadgets has already surpassed all the future projections. The comfort given by mobile merchandise transactions is refueling the further expansion of m-commerce. As more and more people are resorting to the m-commerce utilities, the service providers have to take every care to ensure that all the transactions done, payments made, business deals concluded and the information exchanged over wireless networks is best guarded and strongly saved. Already the electronic commerce has seen any worst cases of security breaches and fraudulent infringements in high value commercial transactions done on electronic media through PCs connected to internet. This shows the terrific need to research, design, invent and implement robust security standards for every mild monetary transaction done ov er mobiles. Propensity of menace should be reduced and the vulnerability of confirmatory wireless networks should be reduced to sub-terrestrial depths to equilibrate the growing demand for m-commerce.4.2. Security Challenges in m-commerceAs the wireless telecommunication networks are spreading fast and becoming a ubiquitous resource, the user base of m-commerce is fast expanding. But to ensure the continuity of this boom, high security of mobile transactions is in dire need. Important data and transaction security problems that pervade over m-commerce transactions are analyzed by Grosche Knospe (n.d.).As the mobile gadgets are purely personal devices, they are constrain to carry some important private and confidential information which demand protection from unauthorized intruder access. To answer this threat these, smart and huffy gadgets must(prenominal) employ user authentication mechanisms like passwords and PIN. Further, these cell phones must come with good data backup and crash recovery tools pre-installed in them, to cater to any unforeseen data loss and authentication breach. The operating(a) systems utilise in the wireless gadgets must have tested ne plus ultra in defending owners data security needs. While the owner of the mobile phone intends to transmit some data over wireless telecommunication network for any commercial dealing, the wireless interface that guides this information exchange must be strong enough to maintain high levels of confidentiality, heart integrity and more particularly user authenticity. Eavesdropping is a big threat which the wireless networks have to confront seriously. Data security mechanisms vary from one mobile technology to another. The end user access networks need to be strongly protected from data theft within and out expression these network loops. And the network operator concerned must ensure that the money transactions made are concluded to the maximum satisfaction of both parties.Money payment acti ons done on wireless networks should have cognizant secrecy and protection to the money involved. This task should cover all the stages startle from the payment or committing to make a payment up to the decisiveness of the deal and authentication systems have to guard the entire transaction departure no chance to intruder attack.4.2. Technologies involved in m-commerce securityWith the change magnitude widening of mobile penetration, and all other similar wireless handheld devices, the services offered by mobile commerce have assured future. The technologies involved in the mobile commerce mainly deal with impartationring of data and information over the available wireless telecom networks. Presently, widely used supportive network technologies are min generation (2G), 3rd generation (3G) etc (Grosche Knospe n.d.).2nd generation wireless telephone technologies include, GSM (TDMA base), CDMA One etc. 2G telecommunication technologies are also known as PCS (Personal Communicat ions Service) in USA. Advanced edition of 2G services is 2.5G. This new one offers data transfer at high speed. These services gave way to 3G services. This 3G technology comes with wireless telecom services like CDMA2000, UMTS, GSM EDGE, WiMAX, DECT etc. These new mobile standards support data transfers up to 14Mbits per second while downloading. The security of data transfers is higher in 3G when compared to earlier 2G technology. 3G services come with user authentication facilities while connecting to any network. This guarantees high security to all the transactions done of that specific telecom network (Grosche Knospe n.d.)..GSM is the about used media for carrying out mobile commerce transactions. The data transfer and overlap services offered on GSM networks are, SMS (Short Messaging Service) for sending short messages having maximum one hundred sixty characters on the network media, WAP (Wireless Application Protocol) to access internet APIs knowing in WML (Wireless Mark-up Language), HSCSD (High Speed Circuit Switched Data) tool of channel clustering for high data transfer rates and GPRS (General Packet Radio Service) actually, this is an extension of GSM services. Fundamental architecture of GSM network generally contains GPRS, Intelligent Network(IN) and SMS services.UTMS (Universal Mobile Telecommunication System) is a modern telecommunication system offered by 3G services. This is largely an extension of brisk GSM. It has WCDMA (Wireband Code Division Multiple Access) radio channel signaling technology (Grosche Knospe n.d.).WLAN (Wireless LAN) works in 2.4 GHz 5 GHz spectrum. commonly WLANs are low in data security. IEEE stipulated WEP (Wired Equivalent Privacy) to provide some security to transactions done on WLANs.5. Security at various levels of mobile transactions5.1. Safety in data transport impartThe technologies like GSM, GPRS, WLAN, UTMS provide considerable security to all deals transacted on wireless networks. But they cann ot handle the safety constraints, when the commercial transactions involve eight-fold access networks. To ensure end to end security in such cases that communicate over Internet Protocol, SSL/TLS is widely used. SSL works with TCP (Transmission go over Protocol). Another transport layer security protocol designed and used for this purpose is WTLS with WAP services (Grosche Knospe n.d.).5.2. Safety of network servicesTo make m-commerce transactions more secure, Intelligent Network (IN) concept in GSM networks is introduced. This GSM framework contains IN logic i.e. CAMEL (Cuatomized Application for Mobile Enhanced network Logic). IN handles all the m-commerce conversations. These services can also be used with SMS systems. Other technologies for secure services are, Parlay / OSA (Open Service Access) and USSD (Unstructured Supplementary Service Data) (Grosche Knospe n.d.).6. Security models presently in useGSM (Global System for Mobile Communication) is the widely used mobile sec urity standard in European countries. According to Zobol (2001), Europe has the highest mobile penetration and the European Commission is presently implementing 15 new projects that act mobile telecommunication networks. These projects are using WAP, GPRS, UTMS technologies. For ensuring high security of mobile transactions, they are using NESSIE encryption and E-PASTA environment. Further, 4G an ultra speed broadband is also under implementation.7. m-PaymentsThe commercial transactions concluded on mobile wireless networks do involve money payment. The concept of m-payments related to payment of charges for services or the price of goods sold or purchased over mobile wireless telecommunication networks. Significant advantageous aspects of m-payments are, less time consumed, no need to carry physical money and remote operability of accounts safely. There are varied variants of m-payment systems like, pre paid payment systems, pay now payment systems and post payment systems.There are various agreed limits of money transactions that can be done on mobile networks. In Europe micro, small and macro payments are in vogue form 1euro to more than 10 euros. In India the monetary transactions up to Rs.50000 can be done (Rediff.com, 2010).The level of safety such mobile transactions need varies based on the money involved and the items that are traded in that transaction. But in each of such case anonymity of customer has to be protected safely. Mandatory and common requirements of mobile transactions are authenticity, reliability, confidentiality, authorization and integrity. Further the response time has to be reduced to minimum. And, conformity to ACID (Atomicity, Consistency, closing off and Durability) principle for all deals involving monetary payment. Depending on the sources of money from where customers make payment over mobile networks, various m-payment systems presently available are computer software electronic coins, Hardware electronic coins, Backgro und amount (Grosche Knospe n.d.).8. Examples of m-commerce security solutions disregardless of the mode of payments made on mobile phones, there are various standardization bodies that deal with mobile commerce transactions. Some of them are, MoSign, Mobile Payment Forum, mSign etc. Another famous data security standard related to m-commerce is PCI DSS (Payment Card Industry Data Security Standard) (TechTarget, 2010). Visa International has latterly developed Mobile 3D. It is a global security specification standard system that makes money transactions made by mobile phones and on internet more secure and safe (CellularOnline, n.d.). Finacle m-commerce solution developed by Infosys has many good security features like, generation of One time password (OTP), USSD application, strong inclusivity framework and ability to register multiple bank accounts to a single mobile (Infosys, 2010).9. ConclusionSecurity of transactions concluded on mobile telecommunication networks is of fundam ental necessity for the very concept of m-commerce. This assignment attempted to through light on every important aspect related to mobile commerce. The technologies discussed in this paper do need further improvement to cope up with the increasing threats to data and money transfer over internet and on wireless networks. Growing fraudulent intrusions on mobile information systems and individual gadgets make up a glowering need to continuously refine existing solutions and design new ones that can better resist attacks on transaction security over wireless media.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.