Security Study of Mobile Business Based on WPKI

Author(s):  
Longyi Li ◽  
Lihua Tao
2021 ◽  
Author(s):  
Gustavo Santana ◽  
Marcello Neto ◽  
Fernando Sapata ◽  
Mauricio Muñoz ◽  
Alexandre M. S. P. Moraes ◽  
...  
Keyword(s):  

2021 ◽  
Vol 13 (2) ◽  
pp. 1
Author(s):  
Husam Alfahl

The use of mobile devices and smartphones is increasingly becoming a critical part of many people’s lifestyle. Such usage can vary from playing games to accomplishing work-related tasks. Being able to use organizations’ persuasive technologies via mobile business services or to achieve work-related tasks ubiquitously at any time means that such devices provide a valuable service, especially for employees who are working online. This paper explores the impact of mBusiness on the social life of employees. In the research, structural equation modeling was applied to validate the research model. Employees in Saudi organizations were surveyed to test the research hypotheses. The research results confirmed that there are some negative effects of using mBusiness technologies on the social life of employees. Based on the analysis, the findings revealed that addiction to mBusiness technologies significantly increases the perceived work overload, which also significantly increases work-family conflict. The paper concludes with some implications of this research.


2021 ◽  
Vol 13 (1) ◽  
pp. 20-39
Author(s):  
Ahmed Aloui ◽  
Okba Kazar

In mobile business (m-business), a client sends its exact locations to service providers. This data may involve sensitive and private personal information. As a result, misuse of location information by the third party location servers creating privacy issues for clients. This paper provides an overview of the privacy protection techniques currently applied by location-based mobile business. The authors first identify different system architectures and different protection goals. Second, this article provides an overview of the basic principles and mechanisms that exist to protect these privacy goals. In a third step, the authors provide existing privacy protection measures.


1999 ◽  
Vol 1999 (9) ◽  
pp. 7
Author(s):  
Barbara Gengler
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document