Popescul, Daniela (2007): The confidentiality – integrity – accessibility triad into the mobile Commerce and business. Published in: Information Management in the Networked Economy. Issues & Solutions, The Proceedings of The 8th IBIMA Conference, Dublin, Ireland (22 July 2007): pp. 527-533.
Preview |
PDF
MPRA_paper_51745.pdf Download (268kB) | Preview |
Abstract
The necessity of considering the three main faces of informational security mentioned in the title of the paper derives from the accumulation of the importance of the data circulating in the mobile environment for organizations, with the existence of numerous dangers and threats that target these data. After a general presentation of the dangers that can affect mobile business and commerce, structured on three main categories, the article surveys the B2C mobile commerce services and the main types of mobile applications used within organizations, re-dealing with the need for confidentiality, integrity and accessibility of the information turned mobile. The paper is mainly addressed to the managers interested in the use of mobile devices in the activity of the organizations they lead, warning them about the sensitive points of the mobile activities, with the dangers associated with them and suggesting them that the traditional security mechanisms have to be expanded and sometimes improved in mobile services.
Item Type: | MPRA Paper |
---|---|
Original Title: | The confidentiality – integrity – accessibility triad into the mobile Commerce and business |
English Title: | The confidentiality – integrity – accessibility triad into the mobile Commerce and business |
Language: | English |
Keywords: | mobile commerce, mobile commerce security, mobile Internet, mobile business |
Subjects: | M - Business Administration and Business Economics ; Marketing ; Accounting ; Personnel Economics > M1 - Business Administration > M15 - IT Management |
Item ID: | 51745 |
Depositing User: | Daniela Popescul |
Date Deposited: | 28 Nov 2013 07:47 |
Last Modified: | 28 Sep 2019 11:04 |
References: | [1] Kalakota, R., Robinson, M. mBusiness (The Race to Mobility), McGraw Hill, New York, 2001, p. 5 [2] ADCOS software company definition, Retrieved June 15 2005, from: http://www.adcos.ro/v6/index.php?lang=ro&id_page=m-comm_what [3] Barnes, S. J. m-Business: The Strategic Implications of Wireless Technologies, Elsevier Butterworth Heinemann, New York, 2003, p. 2 [4] May, P. Mobile Commerce (Opportunities, Applications, and Technologies of Wireless Business), Cambridge University Press, UK, 2001, pp. 227-233 [5] Sadeh, N. M-Commerce. Technologies, Services, and Business Models, Wiley Computer Publishing, John Wiley & Sons, Inc., 2002, pp. 131-156 [6] Mallat, N., Rossi, M., Tuunainen, V. K. „Mobile Banking Services”, Communications of the ACM, May 2004, Volume 47, Number 5 [7] Butiri, A., Niţchi, Ş. “Mobile Banking”, The Proceedings of the International Symposium Specialization, Development and Integration, Cluj-Napoca, Romania, 14-15 November 2003, S.C. Roprint S.R.L., Cluj Napoca [8] Caprita, D. A. „Mobile Commerce”, „Information & Knowledge Age” (The Proceedings of Seventh International Conference on Informatics in Economy), Ed. Economică, Inforec Printing House, Bucureşti, 2005 [9] Hinds, D. “Micropayments: A Technology with a Promising but Uncertain Future”, Communications of the ACM, May 2004, Volume 47, Number 5, p. 44 [10] Kharif, O. “Cell Phones vs. Credit Cards: The Battle Begins”, Business Week, June 28 2005 [11] Czerwinski, M., Gage, D. W., Gemmel, J., Marshall, C. C., Perez-Quinonesis, M. A., Skeels, M., Catarci, T. „Digital Memories in an Era of Ubiquitos Computing and Abundant Storage”, Communications of the ACM, January 2006, Vol. 49, No. 1, pp. 45-50 [12] Oprea, D. Protecţia şi securitatea sistemelor informaţionale (Information Systems Protection and Security), Polirom Publishing House, Iaşi, România, 2003, p. 201 [13]***, Skulls Mobile Phone Malware On the Loose, Retrieved August 2005, from: http://www.wormblog.com/2004/11/skulls_mobile_p.html [14] www.bluetooth.com/help/security.asp [15]*** “Change is in the Air”, The Economist Technology Quarterly, March 12th 2005, pp. 16 – 18 [16]Balaban, D. In a Multimedia World ... Whither the SIM Card?, Card Technology, February 2004, p. 38 [17]Paavilainen, J. Mobile Business Strategies (Understanding the Technologies & Opportunities), Wireless Press (Addison Wesley & IT Press), London, 2001 [18] Rusu, D., The (In)security of Mobile Commerce, Proceedings of InfoBUSINESS’2005 - „Innovative Applications of Information Technologies in Business and Management”, October 14-15, 2005, Iaşi, România, PIM Publishing House, Iaşi, 2005 [19]Vos, I., De Klein, P. The Essential Guide to Mobile Business, Upper Saddle River, Prentice Hall, New Jersey, 2002 |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/51745 |