Monday, June 3, 2019
Literary Components Of M Commerce Information Technology Essay
Literary Components Of M Commerce Information Technology EssayThe present identification on Secure wandering(a) Transactions m- barter, aims to present a comprehensive view of all the technological and security aspects that influence and govern monetary legal proceeding do on radio receiver networks. This paper refers to some basic concepts related to m-commerce and then proceeds to discuss various purely technical issues involved in m-commerce. This work identifies presently available technologies that facilitate m-commerce and gives explanation about each of such(prenominal) technology. Further, the assignment focuses on the security challenges involved in planetary proceedings and various aspects of busy payments. Finally, the paper gives a brief list of m-commerce solutions currently available.Table of Contents1. IntroductionMobile commerce or simply m-commerce relates to mer preservetile business operations and transactions carried out on wireless telecommunicationmunic ation networks with the infrastructural assistance of take hold wandering electronic devices. E-commerce is the commercial business processes done on internet and the m-commerce is qualification all monetary transactions on fluid devices (wireless electronic commerce). The technology of m-commerce offers m all services and facilities that stick commercial dealings modify and reduce time consumed in those transactions. But the drug users and service providers nonplus to be cautious of possible treats of wireless trade operations. warranter of teaching, privacy to individual(prenominal) enlarge and protection to the money involved argon the real touch stones of strength of m-commerce.2. Literary components of m-CommerceThe concept of energetic commerce came into existence in the last decade of the 20th century. What has started as a facility to make payments to a soft drink vending machine, has now effectively subsumed nearly e very(prenominal) aspect of electronic commer ce. Today, m-commerce has emerged as a viable extension to e-commerce. Now the customers of every service or harvest can make their payments over mobile phones staying anywhere or even on move. Fundamental difference between e-commerce and m-commerce is that, in electronic commerce business dealings and transactions ar made on internet, only the mobile commerce services can be used with the help of simple and inexpensive SMS and IVR establishments (Rediff.com, 2010). Statistics inform that, the penetration of personal computers is still limited and the mobile penetration is nearly ten times more than that of PCs. Further, the wide internet access is still a distant dream with the exception of big cities and conurbations. olibanum with the presently available user share and the further spread in future would certainly point mobile commerce as a viable and popular option to make swift and undecomposed monetary transactions. Further, people with basic literacy can also make use of various services of mobile commerce unlike the electronic commerce, which requires the users to have good command on PC knowledge and its operational procedures.The central point of mobile commerce is making payments on mobile phones. It is a point of sale payment made over a mobile gadget like cell phone, PDA ( own(prenominal) digital Assistant) ,a burnished phone, gadgets of personal area networks and other newly coming wireless equipment (Krueger, 2001). Here, not only the switch transactions made through cell phones only the monetary payments made to utility vending machines, cab services, car wash machines and so forthalso constitute acts of mobile commerce (Paavalainen, 2001). The core idea is the convenience. This convenience should not turn into a nightmare because of lack of security of the data channelize in these commercial transactions over wireless networks.Important services offered by m-commerce are,Making reservations of tickets of journeysBooking various ent ertainment show ticketsMaking payments of civic utility billsTransferring gift vouchersBooking hotel roomsBooking cab services get out money donations to social service foundationsMaking stock market tradingTo avail all these facilities, mobile users can make use of SMS, BREW, GPRS and IVR services. Key issues of mobile transactions are the questions of authentication and security. The service providers have to follow robust security standards that are in vogue world wide. Some of the presently certain standards are PCI DSS (Payment Card Industry Data Security Standard).Advantages of m-commerce areReduction of time consumed in serving merchandise ordersReduction in the cost of guidance of commercial transactionsGives extensively broad reachHelps in effectively coordinating all the business processes involvedGives competitive advantage in matters of product pricingProvides exalted speed access to modern cellular applications (Answers Corporation, 2010).Disadvantages of mobile tran sactionsCost of establishing and managing wireless telecommunication infrastructureConcerns over safety of information and data exchanged over mobile gadgetsMobile devices come with small screens and this limited display can limit the types of data and files that can be exchanged and accessedAdvanced mobile technologies are now largely confined to big citiesTechnical limitations of mobile telecommunication equipments (Answers Corporation, 2010).Given the comparative merits and demerits of mobile commerce, one can be perfectly sure that, the ongoing technological researches would certainly find viable answers to problems of this new paradigm in wireless commerce.3. How m-commerce differs from e-commerce?The level of wide availableness of wireless telecommunication networks to use m-commerce applications practically from any location. The convenience in handling these small and low weighed devices is unique when compared to equipment required for carrying out electronic commerce trans actions. Further these mobile devices are purely personal electronic gadgets and this guarantees maximum personalization unlike the PCs with Internet which are assumeed for e-commerce actions that are often shared among dual users. Localized positioning of users can be done on all mobile commerce transactions. As the users carry their mobile phones with them, they can utilize their prefer personalized settings with which they can transact. This personalization is not available in electronic commerce transactions and dealings.4. Technical areas related to secure m-commerceThere are various aspects on the technical front that are closely related to safe money transactions done on wireless telecommunication networks with the help of mobile handheld devices. They are4.1. Need for secure m-commerceAccording to Yeun (2001), there are more cell phones which are connected to internet than the number of net connected Personal Computers. Though the PC penetration is also gaining pace, the spread of mobile phones and related gadgets has already surpassed all the future projections. The comfort given by mobile merchandise transactions is fueling the further expansion of m-commerce. As more and more people are resorting to the m-commerce utilities, the service providers have to take every care to control that all the transactions done, payments made, business deals concluded and the information exchanged over wireless networks is best guarded and strongly protected. Already the electronic commerce has seen any worst cases of security breaches and fraudulent infringements in high value commercial transactions done on electronic media through PCs connected to internet. This shows the dreadful regard to research, design, invent and implement robust security standards for every small monetary transaction done over mobiles. Propensity of threat should be reduced and the photo of supportive wireless networks should be reduced to sub-terrestrial depths to complement the gro wing demand for m-commerce.4.2. Security Challenges in m-commerceAs the wireless telecommunication networks are spreading sporting and becoming a ubiquitous resource, the user base of m-commerce is fast expanding. But to ensure the continuity of this boom, high security of mobile transactions is in dire need. Important data and transaction security problems that pervade over m-commerce transactions are analyzed by Grosche Knospe (n.d.).As the mobile gadgets are purely personal devices, they are bound to carry some important private and confidential information which needs protection from unauthorized intruder access. To answer this threat these, smart and sensitive gadgets mustiness employ user authentication mechanisms like passwords and PIN. Further, these cell phones must come with good data backup and crash recovery tools pre-installed in them, to cater to any unforeseen data loss and authentication breach. The operating systems used in the wireless gadgets must have tested p erfection in defending owners data security needs. While the owner of the mobile phone intends to transmit some data over wireless telecommunication network for any commercial dealing, the wireless interface that guides this information exchange must be strong enough to maintain high levels of confidentiality, content integrity and more especially user authenticity. Eavesdropping is a big threat which the wireless networks have to confront seriously. Data security mechanisms vary from one mobile technology to another. The end user access networks need to be strongly protected from data theft within and out side these network loops. And the network operator concerned must ensure that the money transactions made are concluded to the maximum satisfaction of both parties.Money payment actions done on wireless networks should have assured secrecy and protection to the money involved. This task should cover all the stages starting from the payment or committing to make a payment up to the cultivation of the deal and authentication systems have to guard the entire transaction leaving no chance to intruder attack.4.2. Technologies involved in m-commerce securityWith the increasing increase of mobile penetration, and all other similar wireless handheld devices, the services offered by mobile commerce have assured future. The technologies involved in the mobile commerce mainly deal with transferring of data and information over the available wireless telecom networks. Presently, widely used supportive network technologies are second generation (2G), 3rd generation (3G) etc (Grosche Knospe n.d.).2nd generation wireless telephone technologies include, GSM (TDMA based), CDMA One etc. 2G telecommunication technologies are also known as PCS (Personal communication theory serve) in USA. Advanced version of 2G services is 2.5G. This new one offers data transfer at higher speed. These services gave way to 3G services. This 3G technology comes with wireless telecom services like CDMA2000, UMTS, GSM EDGE, WiMAX, DECT etc. These new mobile standards support data transfers up to 14Mbits per second while downloading. The security of data transfers is higher in 3G when compared to earlier 2G technology. 3G services come with user authentication facilities while connecting to any network. This guarantees high security to all the transactions done of that specific telecom network (Grosche Knospe n.d.)..GSM is the around used media for carrying out mobile commerce transactions. The data transfer and sharing services offered on GSM networks are, SMS (Short Messaging Service) for sending short messages having maximum 160 characters on the network media, WAP (Wireless practical application Protocol) to access internet APIs designed in WML (Wireless Mark-up Language), HSCSD (High Speed Circuit Switched Data) tool of channel clustering for high data transfer rates and GPRS (General Packet Radio Service) actually, this is an extension of GSM services. Fundam ental architecture of GSM network generally contains GPRS, Intelligent Network(IN) and SMS services.UTMS (Universal Mobile Telecommunication System) is a modern telecommunication system offered by 3G services. This is largely an extension of existing GSM. It has WCDMA (Wireband Code Division Multiple Access) radio channel signaling technology (Grosche Knospe n.d.).WLAN (Wireless LAN) works in 2.4 gigacycle per second 5 GHz spectrum. Normally WLANs are low in data security. IEEE stipulated WEP (Wired Equivalent Privacy) to provide some security to transactions done on WLANs.5. Security at various levels of mobile transactions5.1. Safety in data transport channelsThe technologies like GSM, GPRS, WLAN, UTMS provide considerable security to all deals transacted on wireless networks. But they cannot handle the safety constraints, when the commercial transactions involve multiple access networks. To ensure end to end security in such cases that communicate over Internet Protocol, SSL/T LS is widely used. SSL works with TCP (Transmission Control Protocol). Another transport layer security protocol designed and used for this goal is WTLS with WAP services (Grosche Knospe n.d.).5.2. Safety of network servicesTo make m-commerce transactions more secure, Intelligent Network (IN) concept in GSM networks is introduced. This GSM framework contains IN logic i.e. CAMEL (Cuatomized Application for Mobile Enhanced network Logic). IN handles all the m-commerce conversations. These services can also be used with SMS systems. Other technologies for secure services are, Parlay / OSA (Open Service Access) and USSD (Unstructured Supplementary Service Data) (Grosche Knospe n.d.).6. Security models presently in useGSM (Global System for Mobile Communication) is the widely used mobile security standard in European countries. According to Zobol (2001), Europe has the highest mobile penetration and the European Commission is presently implementing 15 new projects that operate mobile telecommunication networks. These projects are using WAP, GPRS, UTMS technologies. For ensuring high security of mobile transactions, they are using NESSIE encryption and E-PASTA environment. Further, 4G an ultra speed broadband is also under implementation.7. m-PaymentsThe commercial transactions concluded on mobile wireless networks do involve money payment. The concept of m-payments related to payment of charges for services or the price of goods sold or purchased over mobile wireless telecommunication networks. Significant advantageous aspects of m-payments are, less time consumed, no need to carry physical money and remote operability of accounts safely. There are different variants of m-payment systems like, pre paying payment systems, pay now payment systems and post payment systems.There are various agreed limits of money transactions that can be done on mobile networks. In Europe micro, small and macro payments are in vogue form 1euro to more than 10 euros. In India the mo netary transactions up to Rs.50000 can be done (Rediff.com, 2010).The level of safety such mobile transactions need varies based on the money involved and the items that are traded in that transaction. But in each of such case anonymity of customer has to be protected safely. Mandatory and common requirements of mobile transactions are authenticity, reliability, confidentiality, authorization and integrity. Further the response time has to be reduced to minimum. And, conformity to ACID (Atomicity, Consistency, Isolation and Durability) principle for all deals involving monetary payment. Depending on the sources of money from where customers make payment over mobile networks, various m-payment systems presently available areSoftware electronic coins, Hardware electronic coins, Background amount (Grosche Knospe n.d.).8. Examples of m-commerce security solutions disregardless of the mode of payments made on mobile phones, there are various standardization bodies that deal with mobile commerce transactions. Some of them are, MoSign, Mobile Payment Forum, mSign etc. Another famous data security standard related to m-commerce is PCI DSS (Payment Card Industry Data Security Standard) (TechTarget, 2010). Visa International has recently developed Mobile 3D. It is a global security specification standard system that makes money transactions made by mobile phones and on internet more secure and safe (CellularOnline, n.d.). Finacle m-commerce solution developed by Infosys has many good security features like, generation of One time Password (OTP), USSD application, strong inclusivity framework and ability to study multiple bank accounts to a single mobile (Infosys, 2010).9. ConclusionSecurity of transactions concluded on mobile telecommunication networks is of fundamental necessity for the very concept of m-commerce. This assignment attempted to through light on every important aspect related to mobile commerce. The technologies discussed in this paper do need further improvement to cope up with the increasing threats to data and money transfer over internet and on wireless networks. Growing fraudulent intrusions on mobile information systems and individual gadgets make up a persistent need to continuously refine existing solutions and design new ones that can damp resist attacks on transaction security over wireless media.