M-Commerce Location-Based Services

Author(s):  
Archana Sharma

Truthful authentication with secure communication is necessary in location-based services to protect from various risks. The purpose of this research is to identify security risks in mobile transactions especially in location-based services like mobile banking. The factors need to be identified the reasons of customer distrust in mobile banking. In addition, the security issues with mobile banking systems and mobile devices are highlighted. The chapter finds which approach is more suitable and secure for mobile banking transaction between customer and bank. The research predominantly focuses upon customer trust, security issues, and transaction costs owing to different technology standards of mobile commerce. The first phase highlights the various location-based services in m-commerce, various technology standards, customer trust, and perceived risk, and further, at next level, it highlights the various problems associated mobile database and a comparative study of various replication protocols, transaction security issues, and LBS security challenges.

Author(s):  
Fitria Styarini ◽  
Sulis Riptiono

Tujuan penelitian ini adalah untuk mengetahui pengaruh customer trust terhadap keputusan menggunakan mobile banking melalui perceived risk dan perceived usefulness sebagai variabel intervening pada pengguna aplikasi mobile banking Bank BRI di Kantor Cabang Kebumen. Populasi pada penelitian ini adalah seluruh nasabah pengguna rekening debet pada Bank BRI Kantor Cabang Kebumen yang menggunakan aplikasi mobile banking BRI. Penelitian ini menggunakan metode purposive sampling dengan sampel sebanyak 100 responden. Berdasarkan metode statistika dilakukan uji validitas, uji reliabilitas, uji asumsi klasik (uji multikolonieritas, uji heteroskedastisitas, dan uji normalitas), uji parsial, uji koefisien determinasi, dan analisis jalur. Hasil penelitian ini menunjukkan bahwa berdasarkan uji validitas dan reliabilitas semua variabel dinyatakan valid dan reliabel. Berdasarkan hasil uji t sub struktur I variabel customer trust berpengaruh positif dan signifikan terhadap perceived risk. Hasil uji t sub struktur II variabel customer trust berpengaruh positif dan signifikan terhadap perceived usefulness, perceived risk tidak berpengaruh signifikan terhadap perceived usefulness. Kemudian untuk sub struktur III variabel customer trust berpengaruh positif dan signifikan terhadap keputusan menggunakan, perceived risk tidak berpengaruh signifikan terhadap keputusan menggunakan, perceived usefulness berpengaruh positif dan signifikan terhadap keputusan menggunakan.


10.29007/v4j1 ◽  
2019 ◽  
Author(s):  
Philile Thusi ◽  
Daniel K. Maduku

Banking transactions carried out in the uncertain conditions of mobile commerce involve highlevels of perceived risk and require substantial levels of trust. Therefore, gaining customer trust and reducing the influence of risk is imperative to developing and nurturing long-lasting and strong relationship between customers and retail banks. However, limited research is currently investigating the effects of overall perceived risk and trust on retail banking customers use of mobile commerce, particularly from the perspective of emerging African economies. This study investigates the effects of perceived risk and institution-based trust on the use of mobile banking apps among South African retail bank customers. The model was tested using responses obtained from 352 users of the mobile banking services of the five major retail banks (ABSA, Capitec, FNB, Nedbank, and Standard Bank) in South Africa. The findings of this study suggest that institution- based trust has a significant positive influence on use behaviour of mobile banking apps. Furthermore, perceived risk has a significant negative influence on use behaviour; and, lastly, institution-based trust is found to have a significant negative influence on perceived risk.


2021 ◽  
Vol 14 (4) ◽  
pp. 448-461
Author(s):  
Mohammad Mehrtak ◽  
◽  
SeyedAhmad SeyedAlinaghi ◽  
Mehrzad MohsseniPour ◽  
Tayebeh Noori ◽  
...  

Cloud computing is among the most beneficial solutions to digital problems. Security is one of the focal issues in cloud computing technology, and this study aims at investigating security issues of cloud computing and their probable solutions. A systematic review was performed using Scopus, Pubmed, Science Direct, and Web of Science databases. Once the title and abstract were evaluated, the quality of studies was assessed in order to choose the most relevant according to exclusion and inclusion criteria. Then, the full texts of studies selected were read thoroughly to extract the necessary results. According to the review, data security, availability, and integrity, as well as information confidentiality and network security, were the major challenges in cloud security. Further, data encryption, authentication, and classification, besides application programming interfaces (API), were security solutions to cloud infrastructure. Data encryption could be applied to store and retrieve data from the cloud in order to provide secure communication. Besides, several central challenges, which make the cloud security engineering process problematic, have been considered in this study.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 341
Author(s):  
Dr E. Suresh Babu ◽  
V Bhargav Raj ◽  
M Manogna Devi ◽  
K Kirthana

This papers reviews and surveys the security issues, mechanism of internet of things (IoT) proposed in the literature. As IoT is a computing concept that describes the idea of everyday physical objects being connected to the internet and being able to identify themselves to other devices. The main advantages of IoT improve the resource utilization ratio and relationship between human and nature. In addition, it possesses various characteristics like sensing, heterogeneity, connectivity, dynamic nature and intelligence. However, it possesses several challenges like connectivity, compatibility, longevity, privacy and security. Specifically, Security and privacy are the crucial issues that need to be solved for successful deployment of IoT. Moreover, some of the data collected from the IoT are very sensitive and should not be revealed to third parties. Such data needs to be protected by some provided legislations. We reviewed some of the security challenges of IoT like secure communication, data privacy and integrity, authorizing and authenticating the devices.  


Author(s):  
Muragesh Y. Pattanshetti ◽  
Sachin S. Kamble ◽  
Sudheer M. Dhume ◽  
Shradha Gawankar

Mobile phones have undeniably brought a paradigm shift, affecting both the lives of people and the business environment. Today, mobile phone has permeated the lives of billions of people around the world, becoming for many an indispensable device. Moreover, adoption of mobile banking has significant impact on reducing costs and enabling change in retail banking. Factors influencing the intention to use or adopt mobile banking are very important and will play a vital role for mobile banking service providers. The proposed study focuses on a comprehensive set of potential factors that influence the adoption of mobile banking. The research model identifies appropriate factors and captures dependency relationships among these factors in the form of a number of hypotheses to be tested in this research. This paper aims to design a scale with a high degree of reliability, validity, and dimensionality which helps to determine the appropriate technology adoption model based on the identified constructs, viz. Optimism (OPTI), Innovativeness (INNO), Insecurity (INSC), Discomfort (DISC), Perceived Usefulness (PU), Perceived Ease of Use (PEU), Perceived Risk (PR), Subjective Norms (SN), Attitude (ATTI), Behavioural Control (BC) and Behavioural Intention (BI). The data were collected through questionnaire survey from 201 respondents comprising software engineers, bank employees, professors, entrepreneurs. Confirmatory factor analysis was used to test the validity of the proposed measurement scale for all the identified constructs. This instrument helps bankers to determine and design there applications which will contribute to the knowledge of predicting customer intention.


2015 ◽  
Vol 5 (3) ◽  
pp. 95-112
Author(s):  
Miroslava Kovaříková

This article deals with the issue of security management and its following application in education. The article focuses on the topic of armed attacks at schools. Based on a research probe aimed at teachers which focused on perception of security risks, there are chosen areas to which Central emergency system services should react. Further, knowledge of technical and organizational measures of emergency plans in the organization and the level of attention paid to this issue by the school management were investigated. In the text there are also international models of solutions of this issue introduced. The contribution also brings outline of how is the issue solved in the European Union countries, in particular in the Kingdom of Spain. Experience with the solution of security issues of schools in Latin America are also mentioned. In the conclusion the summary of measures for improvement of security at schools is presented.


2020 ◽  
pp. 1-26
Author(s):  
Qinwen Hu ◽  
Muhammad Rizwan Asghar ◽  
Nevil Brownlee

HTTPS refers to an application-specific implementation that runs HyperText Transfer Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS). HTTPS is used to provide encrypted communication and secure identification of web servers and clients, for different purposes such as online banking and e-commerce. However, many HTTPS vulnerabilities have been disclosed in recent years. Although many studies have pointed out that these vulnerabilities can lead to serious consequences, domain administrators seem to ignore them. In this study, we evaluate the HTTPS security level of Alexa’s top 1 million domains from two perspectives. First, we explore which popular sites are still affected by those well-known security issues. Our results show that less than 0.1% of HTTPS-enabled servers in the measured domains are still vulnerable to known attacks including Rivest Cipher 4 (RC4), Compression Ratio Info-Leak Mass Exploitation (CRIME), Padding Oracle On Downgraded Legacy Encryption (POODLE), Factoring RSA Export Keys (FREAK), Logjam, and Decrypting Rivest–Shamir–Adleman (RSA) using Obsolete and Weakened eNcryption (DROWN). Second, we assess the security level of the digital certificates used by each measured HTTPS domain. Our results highlight that less than 0.52% domains use the expired certificate, 0.42% HTTPS certificates contain different hostnames, and 2.59% HTTPS domains use a self-signed certificate. The domains we investigate in our study cover 5 regions (including ARIN, RIPE NCC, APNIC, LACNIC, and AFRINIC) and 61 different categories such as online shopping websites, banking websites, educational websites, and government websites. Although our results show that the problem still exists, we find that changes have been taking place when HTTPS vulnerabilities were discovered. Through this three-year study, we found that more attention has been paid to the use and configuration of HTTPS. For example, more and more domains begin to enable the HTTPS protocol to ensure a secure communication channel between users and websites. From the first measurement, we observed that many domains are still using TLS 1.0 and 1.1, SSL 2.0, and SSL 3.0 protocols to support user clients that use outdated systems. As the previous studies revealed security risks of using these protocols, in the subsequent studies, we found that the majority of domains updated their TLS protocol on time. Our 2020 results suggest that most HTTPS domains use the TLS 1.2 protocol and show that some HTTPS domains are still vulnerable to the existing known attacks. As academics and industry professionals continue to disclose attacks against HTTPS and recommend the secure configuration of HTTPS, we found that the number of vulnerable domain is gradually decreasing every year.


2007 ◽  
Vol 40 (2) ◽  
pp. 191-208 ◽  
Author(s):  
Douglas L. Tookey

Environmental challenges, resulting from either a scarcity of natural resources or environmental degradation, may contribute to security risks in Central Asia. An encouraging sign is the recent attention of the governments of Central Asia, civil society groups and international organizations to these environmental security issues. Their efforts indicate that by working together to prevent conflicts caused by environmental problems, cooperation among the countries of Central Asia may expand. Both short and long-term obstacles must be overcome if these groups are to ensure that environmental stresses do not lead to security concerns.


2021 ◽  
Vol 3 (2) ◽  
pp. 46-53
Author(s):  
Young B. Choi ◽  
Matthew E. Bunn

With the introduction of the 5th generation of wireless systems and communications (5G) comes new risks and challenges. This paper explores the potential security challenges of 5G communication compared with legacy cellular networks and prior generations of communication standards. This paper defines what 5G is and how it affects our lives on a daily basis. It further discusses the new security features involving different technologies applied to 5G, such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software-defined networks, and the internet of things, including autonomous cars, healthcare, automated manufacturing, and more.


2021 ◽  
Vol 13 (2) ◽  
pp. 60-72
Author(s):  
Phan Dai Thich

This study aims to examine the factors influencing consumers' behavior intention to adopt mobile banking apps. The research uses the TAM model with additional variables such as social influence and perceived risk to evaluate how these factors impact the behavior intention of young customers toward adopting mobile banking services. PLS-SEM was used as the main research method. The findings from this paper reaffirmed that perceived usefulness and social influence are the most influential factor in behavior intention, but perceived ease of use and perceived risk showed insignificant impacts on young consumers' behavior intention in Vietnam. This paper also found that perceived ease of use had no direct impact on behavior intention but an indirect impact through facilitating perceived usefulness. This subject makes a practical and academic contribution in the context of a developing country where is lacking research in mobile banking apps.


Sign in / Sign up

Export Citation Format

Share Document