Mobile commerce for financial services---killer applications or dead end?

2001 ◽  
Vol 22 (1) ◽  
pp. 22-25 ◽  
Author(s):  
Michael Semrau ◽  
Achim Kraiss
2020 ◽  
pp. 102452942097460
Author(s):  
Gordon L. Clark

At the heart of UK pension fund regulation are quasi-compulsory codes of practices and tests of pension fund trustees’ competence. This regime of ‘soft’ regulation focuses upon the ‘performance’ of governance and is intrusive in terms of expected behaviour and board decision-making. Framed by defined benefit pension obligations in the private sector, it lacks rigorous standards of value when applied to defined contribution pensions. As such, pension ‘adequacy’ is discounted by the premium placed on performing governance in the market for financial services. The UK pension regime has hit a dead-end being neither fit-for-purpose in a world of technological disruption and financial turmoil nor capable of empowering those funds willing and able to innovate in the best interests of participants.


Author(s):  
Pravin Agarwal

Cross-border boundaries have changed the way business is being conducted. From time-consuming strenuous manual transactions, consumers have walked a long way to instant e-commerce transactions pushed across by ease and digitization of financial services. Thus rules and regulations are required for setting-up web sites, conducting of business, providing of financial services, digitizing of all commerce-related activities and services, protection of IPR, protecting against all risks and losses, all legal aspects including terms and conditions/conduct of trade/provision of after-sales service/security/entry and exit of start-ups/protection of consumer rights/crypto currency/virtual banks/legally acceptable unsigned documents/mobile commerce, and all other related aspects. These laws cannot be country specific but have to be framed with global outlook since transaction can happen from any place to any other place worldwide.


Author(s):  
Mohamed Eltoweissy ◽  
Sushil Jajodia ◽  
Ravi Mukkamala

With the rapid growth in mobile commerce (m-commerce) applications, the need for providing suitable infrastructure to support these applications has become critical. Secure multicast is a key element of this infrastructure, in particular, to support group m-commerce applications such as mobile auctions, product recommendation systems, and financial services. Despite considerable attention to m-commerce security, most existing security solutions focus on unicast communications. On the other hand, numerous solutions for secure multicast exist that are not specifically designed with m-commerce as a target environment. Clearly, to address secure multicast in m-commerce, we must start by forming a comprehensive picture of the different facets of the problem and its solutions. In this chapter, we identify system parameters and subsequent security requirements for secure multicast in m-commerce. Attacks on m-commerce environments may undermine satisfying these security requirements resulting, at most times, in major losses. We present a taxonomy of common attacks and identify core services needed to mitigate these attacks and provide efficient solutions for secure multicast in m-commerce. Among these services, authentication and key management play a major role. Given the varying requirements of m-commerce applications and the large number of current key management schemes, we provide a taxonomy and a set of performance metrics to aid m-commerce system designers in the evaluation and selection of key management schemes.


2018 ◽  
Vol 20 (1) ◽  
Author(s):  
Malcolm Cullen ◽  
Salah K. Kabanda

Background: Many studies have examined the mobile commerce phenomenon and most of these have focused on understanding the organisational and environmental factors that affect its adoption. Few have examined how an individual’s characteristics and their perceived motivational appetite affect their mobile commerce usage and specifically the activities they engage in. Objectives: This study examines the role of demographics (individuals’ characteristics) and motivational factors on mobile commerce usage activities from the South African perspective. Method: An objective approach and a positivistic stance were followed. The research model and instrument from earlier studies by Chong (2013a) were contextualised to suit this study. Data collection was done through an online questionnaire, 88 responses were received and 81 used for data analysis. Results: The findings show that age is significantly related to mobile commerce transactions, and one’s education status influences the following mobile commerce usage activities: transactions and location-based services. One’s gender influences how one uses mobile commerce. A significant relationship between all three motivational variables and mobile commerce usage activities is evident. Conclusion: The findings provide the financial services industry and providers of mobile commerce offerings with a better understanding of the relationships between customer demographics and the mobile commerce activities they engage in. An additional variable of customer income has been identified for future studies to better understand the relationship.


2011 ◽  
pp. 930-951 ◽  
Author(s):  
Mohamed Eltoweissy ◽  
Sushil Jajodia ◽  
Ravi Mukkamala

With the rapid growth in mobile commerce (m-commerce) applications, the need for providing suitable infrastructure to support these applications has become critical. Secure multicast is a key element of this infrastructure, in particular, to support group m-commerce applications such as mobile auctions, product recommendation systems, and financial services. Despite considerable attention to m-commerce security, most existing security solutions focus on unicast communications. On the other hand, numerous solutions for secure multicast exist that are not specifically designed with m-commerce as a target environment. Clearly, to address secure multicast in m-commerce, we must start by forming a comprehensive picture of the different facets of the problem and its solutions. In this chapter, we identify system parameters and subsequent security requirements for secure multicast in m-commerce. Attacks on m-commerce environments may undermine satisfying these security requirements resulting, at most times, in major losses. We present a taxonomy of common attacks and identify core services needed to mitigate these attacks and provide efficient solutions for secure multicast in m-commerce. Among these services, authentication and key management play a major role. Given the varying requirements of m-commerce applications and the large number of current key management schemes, we provide a taxonomy and a set of performance metrics to aid m-commerce system designers in the evaluation and selection of key management schemes.


2020 ◽  
Vol 25 (06) ◽  
pp. 44-44
Author(s):  
Kai-Otto Landwehr

Der globale Anstieg von chronischen Erkrankungen setzt Krankenhäuser unter Druck. Die digitale Transformation trägt zur Entlastung bei, denn sie schafft ‚smarte‘, also intelligente Krankenhäuser. Es gibt sie jedoch nicht umsonst. Woher das Geld dafür nehmen und nicht stehlen? Kai-Otto Landwehr, Leiter des Commercial-Finance-Geschäfts von Siemens Financial Services (SFS), weiß Rat.


Sign in / Sign up

Export Citation Format

Share Document