scholarly journals Consumers Trust, Privacy and Security Issues on Mobile Commerce Websites

2019 ◽  
Vol 13 (12) ◽  
pp. 21
Author(s):  
Mohammad awni ahmad mahmoud ◽  
laith Talal khrais ◽  
Rasha mohammad alolayan ◽  
Asyah muzahim alkaabi ◽  
Sara qasem Al- suwaidi ◽  
...  

The proliferation of mobile devices and the increased adoption of the internet across the globe has led to the rise of m-commerce. reports highlight that in spite of the different advancements in the technology, trust in the platform is still a significant hindrance to its adoption. Consequently, the current study seeks to identify privacy and security issues affecting m-commerce users of three shopping sites: Amazon, Alibaba and eBay. The aim here is to develop recommendations that mitigate these challenges. The expected output of the study is an anticipation for insights regarding user perspectives on trust in m-commerce and as a result, contribute to existent knowledge in the area benefitting regulatory bodies and online vendors.

2016 ◽  
Vol 4 (1) ◽  
pp. 90-103 ◽  
Author(s):  
Michael Adu Kwarteng ◽  
Michal Pilík

Abstract The advent of the Internet continues to open new frontiers in digital marketing. One visible impact of the Internet in marketing has been the growing increase in online transactions which profits marketers and seemingly satisfies customers. However, in developing countries, the potential of online shopping has not been fully explored, and in some cases, are just non-existent. Lack of online infrastructure has often been attributed to the slower growth in online transactions in Africa, however, the customers’ preparedness and inclination to use the service is ignored. .Against this backdrop, this study seeks to analyze consumers’ propensity to engage in online transactions with a focus on demographic attributes such as age, gender and education. Using customers in Ghana as a case study, key reasons as well as the demographics that fancy online transactions are revealed. The results indicate that delivery problems, poor internet connection, privacy and security issues are some of the reasons preventing customers to shop online


Author(s):  
Michael Adu Kwarteng ◽  
Michal Pilik

The advent of the Internet continues to open new frontiers in digital marketing. One visible impact of the Internet in marketing has been the growing increase in online transactions which profits marketers and seemingly satisfies customers.  However,in developing countries, the potential of online shopping has not been fully explored, and in some cases, are just non- existent. Lack of online infrastructure has often been attributed to the slower growth in online transactions in Africa, however, the customers’ preparedness and inclination to use the service is ignored. .Against this backdrop, this study seeks to analyze consumers’ propensity to engage in online transactions with a focus on demographic attributes such as age, gender and education. Using customers in Ghana as a case study, key reasons as well as the demographics that fancy online transactions are revealed. The results indicate that delivery problems, poor internet connection, privacy and security issues are some of the reasons preventing customers to shop online


Author(s):  
Pappu Sowmya ◽  
R Kumar

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.


Author(s):  
Manpreet Kaur Walia ◽  
Malka N. Halgamuge ◽  
Nadeesha D. Hettikankanamage ◽  
Craig Bellamy

Numerous organizations are using aspects of the cloud to store data, but as sensitive data is placed on the cloud, privacy and security become difficult to maintain. When users upload data to the cloud, they may become increasingly vulnerable to account hijacking, unauthorized access, and the data may become unavailable because of various technical reasons. Questions remain about the security of sensitive data in the cloud, and in this chapter, the authors perform an analysis of 36 peer reviewed publications describing 30 observations of cloud computing technology (2010-2017). In the articles, applications of cloud computing include, for instance, business (26%) and the internet of things (IoT; 2%), and the result suggests that some issues are unique to a particular domain (such as business, education, health) and some issues cross all domains. The results suggest that data integrity issues have the highest number of solutions whereas data breaches have the lowest number of solutions.


Author(s):  
Mihhail Matskin ◽  
Amund Tveit

This chapter considers an application of software agents to mobile commerce services provision. With the increasing number of e-commerce services for mobile devices, there are challenges in making these services more personalized and in taking into account the severely constrained bandwidth and restricted user interface these devices currently provide. In this chapter we present an agent-based platform for support of mobile commerce using wireless devices. Agents represent mobile device customers in the network by implementing highly personalized customer profiles. The platform allows customization and adaptation of mobile commerce services as well as pro-active processing and notification of important events. Information to the customers is delivered via both an access to the Internet and SMS messages. Usage of the platform is illustrated by examples of valued customer membership services and subscription services support. We hope that the presented work demonstrates benefits of software agents as assistants in mobile commerce services.


Author(s):  
Kijpokin Kasemsap

This chapter reveals the prospect of mobile commerce (m-commerce); m-commerce and trust; m-commerce, privacy, and security issues; m-commerce adoption and technology acceptance model (TAM); and the significant perspectives on m-commerce. M-commerce is used for business transactions conducted by mobile phones for the promotional and financial activities using the wireless Internet connectivity. M-commerce is the important way to purchase the online items through online services. The main goal of m-commerce is to ensure that customers' shopping experience is well-suited to the smaller screen sizes that they can see on smartphones and tablets. Computer-mediated networks enable these transaction processes through electronic store searches and electronic point-of-sale capabilities. M-commerce brings the new possibility for businesses to sell and promote their products and services toward gaining improved productivity and business growth.


Author(s):  
Kijpokin Kasemsap

This chapter reveals the prospect of mobile commerce (m-commerce); m-commerce and trust; m-commerce, privacy, and security issues; m-commerce adoption and technology acceptance model (TAM); and the significant perspectives on m-commerce. M-commerce is used for business transactions conducted by mobile phones for the promotional and financial activities using the wireless Internet connectivity. M-commerce is the important way to purchase the online items through online services. The main goal of m-commerce is to ensure that customers' shopping experience is well-suited to the smaller screen sizes that they can see on smartphones and tablets. Computer-mediated networks enable these transaction processes through electronic store searches and electronic point-of-sale capabilities. M-commerce brings the new possibility for businesses to sell and promote their products and services toward gaining improved productivity and business growth.


Author(s):  
Kamalendu Pal

The internet of things (IoT) is ushering a new age of technology-driven automation of information systems into the manufacturing industry. One of the main concerns with IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the safety of the data. Many security issues arise because of the centralized architecture of IoT-based information systems. Another concern is the lack of appropriate authentication and access control schemes to moderate the access to information generated by the IoT devices in the manufacturing industry. Hence, the question that arises is how to ensure the identity of the manufacturing machinery or the communication nodes. This chapter presents the advantages of blockchain technology to secure the operation of the modern manufacturing industry in a trustless environment with IoT applications. The chapter reviews the challenges and threats in IoT applications and how integration with blockchain can resolve some of the manufacturing enterprise information systems (EIS).


2018 ◽  
Vol 7 (1.7) ◽  
pp. 186
Author(s):  
R Priyadarshini ◽  
N Malarvizhi

Cloud IaaS, a virtual data center is an instant computing infrastructure provided and managed over the Internet. The provider owns the resource and maintains it in the level specified in the SLA. The user is permitted to use the resources as services like operating systems, security, networking, application developing servers, application deploying tools, databases, etc., on the basis of pay-per-use model. The providers and users both are concerned over integrity, privacy and security issues. This study distinguishes the issues identified with the cloud IaaS layer and strategies to overcome them to maximize the performance.


Sign in / Sign up

Export Citation Format

Share Document