CFP last date
20 May 2024
Reseach Article

Security Effect on B2B and B2C Operations using 3G M-Commerce

by Avdhesh Gupta, Pankaj Madan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 43 - Number 4
Year of Publication: 2012
Authors: Avdhesh Gupta, Pankaj Madan
10.5120/6088-8259

Avdhesh Gupta, Pankaj Madan . Security Effect on B2B and B2C Operations using 3G M-Commerce. International Journal of Computer Applications. 43, 4 ( April 2012), 1-5. DOI=10.5120/6088-8259

@article{ 10.5120/6088-8259,
author = { Avdhesh Gupta, Pankaj Madan },
title = { Security Effect on B2B and B2C Operations using 3G M-Commerce },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 43 },
number = { 4 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume43/number4/6088-8259/ },
doi = { 10.5120/6088-8259 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:32:29.680610+05:30
%A Avdhesh Gupta
%A Pankaj Madan
%T Security Effect on B2B and B2C Operations using 3G M-Commerce
%J International Journal of Computer Applications
%@ 0975-8887
%V 43
%N 4
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The full scope of how mobile technologies will affect individuals' lives in the areas of business, education and other sectors has yet to be appreciated. Innovative mobile technologies are causing disruptive, tectonic changes that will shape inalterably the way the next generation will live, work, play and interact with the rest of the world. Indian business leaders, government, policy makers, leading academics and other experts are required to discuss government and business approaches to mobile commerce, mobile banking, mobile governance and security related issues in M-Commerce that will have a positive effect on India's economic and social development. This paper shows the influences of security on B2B and B2C operations of 3G based M-Commerce.

References
  1. Shahidul Islam, 2006 Mobile Commerce, A Master Thesis for Lulea University of Technology
  2. P. Venkataram, 2003 Mobile Commerce – Vision and Challenges, at ITPC, Nepal, IISc Bangalore INDIA
  3. http://www. thesspa. com/sspanews/102010/article2. asp (Oct. 2011)
  4. Aftab and Iqbal, 2006 3-G Mobile Communication Services Perspective, A Master Thesis for Lulea University of Technology
  5. http://www. smarte-commerce. com/emerging-M-Commerce/ (July 2011)
  6. http://www. endeca. com/en/resource-center/whitepapers/b2b-ecommerce-trends-2011. html accessed (Feb. 2012)
  7. http://www. india-reports. com/summary/ ecommerce_in_india. aspx (Nov. 2011)
  8. Ghosh, K. A. , and Swaminatha, T. M. , Software security and privacy risks in mobile ecommerce, Communications of the ACM, Volume 44 (2), Feb 2001, pp 51-57
  9. James Messham, 2000, M-Commerce Security, International Clearing House Ltd.
  10. Scarlet, Knospe 2011, Security in M-Commerce, (Aug. 2011)
  11. Mike Fuller, M-Commerce and Security, A Project http://theory. stanford. edu/~iliano/courses/06S-GMU-ISA767/project/papers/fuller. pdf (Oct. 2011)
  12. Mynttinen J, 2001 End to End security of mobile data in GSM, Helsinki University of Technology, Helsinki, Finland
  13. Hage D. ,2001 Secure E-Commerce: WAP security in M-Commerce, University of South Australia
  14. Vyas, A,, O'Grady, P. , 2001 Areview of M-Commerce technologies, Internet lab technical report, Unversity of IOWA.
  15. Sudhir Dixit, Yile Guo, and Zoe Antoniou(Feb-2001, Resource Management and Quality of Service in Third-Generation Wireless Networks, IEEE Communications Magazine, PP 125-133.
  16. Leo A. Goodman, August 2011 Sociological Methodology, Volume 41, Issue 1, pages 34–353.
  17. Mark S. Handcock, Krista J. Gile Aug 2011 arXiv:1108. 0301v1 [stat. AP]
Index Terms

Computer Science
Information Sciences

Keywords

Third Generation M-commerce Security B2b B2c