SlideShare uma empresa Scribd logo
1 de 28
MOBILE COMMERCEMOBILE COMMERCE
SECURITYSECURITY
BEHZAD BAGHAEE
Outline
 M-Commerce Overview
 Advantage & disadvantage of M-Commerce
 M-Commerce Applications
 Mobile commerce framework
 Security in M-Commerce
 conclusion
2
What is mobile commerce ?
3
Mobile Commerce Overview
 Mobile commerce (m-commerce,
m-business) , any e-commerce done in a wireless
environment, especially via the Internet
Can be done via the Internet, private
communication lines, smart cards, etc.
Creates opportunity to deliver new services to
existing customers and to attract new ones
4
Mobile commerce from the
Customer‘s point of view
 The customer wants to access information,
goods and services any time and in any
place on his mobile device.
 He can use his mobile device to purchase
tickets for events or public transport, pay
for parking, download content and even
order books and CDs.
5
Mobile commerce from the
Provider‘s point of view
 The future development of the mobile
telecommunication sector is heading more and more
towards value-added services. Analysts forecast that
soon half of mobile operators‘ revenue will be earned
through mobile commerce.
6
Provider view
Consequently operators as well as third party providers
will focus on value-added-services. To enable mobile
services, providers with expertise on different sectors will
have to cooperate.
Innovative service scenarios will be needed that meet
the customer‘s expectations and business models that
satisfy all partners involved.
7
Outline
 M-Commerce Overview
 Advantage & disadvantage of M-Commerce
 M-Commerce Applications
 Mobile commerce framework
 Security in M-Commerce
 conclusion
8
The advantages of
M-Commerce
Mobility—users carry cell phones or other mobile
devices
Broad reach—people can be reached at any time
Ubiquity—easier information access in real-time
Convenience—devices that store data and have
Internet, intranet, extranet connections
9
Advantage
Instant connectivity—easy and quick connection
to Internet, intranets, other mobile devices,
databases
Personalization—preparation of information for
individual consumers
Localization of products and services—knowing
where the user is located at any given time and
match service to them
10
The main disadvantages of
M-Commerce
 Mobile devices offer limited capabilities
 The heterogeneity of devices
 Mobile device are more prone to theft and
destruction
 Communication
11
Outline
 M-Commerce Overview
 Advantage & disadvantage of M-Commerce
 M-Commerce Applications
 Mobile commerce framework
 Security in M-Commerce
 conclusion
12
Mobile Service Scenarios
 Financial Services.
 Entertainment.
 Shopping.
 Information Services.
 Payment.
 Advertising.
 And more ...
13
Details of service scenario.
M- commerce
Entertainment
• Music
• Games
• Graphics
• Video
Communications
• Short Messaging
• Multimedia Messaging
• Unified Messaging
• e-mail
• Chatrooms
• Video - conferencing
Transactions
• Banking
• Broking
• Shopping
• Auctions
• Betting
• Booking & reservations
• Mobile wallet
• Mobile purse
Information
• News
• City guides
• Directory Services
• Maps
• Traffic and weather
• Corporate information
• Market data
14
Classes of M-Commerce Applications
15
outline 16
 M-Commerce Overview
 Advantage & disadvantage of M-Commerce
 M-Commerce Applications
 Mobile commerce framework
 Security in M-Commerce
 conclusion
Mobil commerce framework 17
framework 18
 Application : many new application are becoming
possible , and many existing e-commerce application
can be modified for a mobile environment.
 User infrastructure : the design of new mobile
commerce application should consider the
capabilities of the user infrastructure the mobile
device.
framework 19
 Wireless middleware : with its ability to hide the
underlying networks details from application while
providing a uniform and easy to use interface ,
middleware is extremely important for developing
new mobile commerce application
 Networks infrastructure : in mobile commerce ,
service quality primarily depends on network
resources and capabilities
framework 20
 The framework also provides a developer
provider plane , which addresses the different
needs and views of application developers ,
content providers , and service provider
Outline
 M-Commerce Overview
 Advantage & disadvantage of M-Commerce
 M-Commerce Applications
 Mobile commerce framework
 Mobile application security
 conclusion
21
Mobile application security
 Nowadays smartphone and other mobile devices
have become incredibly important in every aspect of
our life
 Therefore , security is
Considered as an important
Factor in wireless communication technologies
particularly in a wireless ad-hoc network and
mobile operation system
22
Mobile application security
 Three fundamental categories of security goals and
objectives of information in an organization :
Confidentiality , Integrity , Availability
 More to say , security can measured through :
Confidentiality , Integrity , Authentication ,
Authorization
23
Three classified section of
threat model
 Each mobile platform introduced and
implemented their model or approaches to
enforcing application security
 Attack goals
 Attack vector
 Mobile malware
24
Three classified section of
threat model
25
outline
 M-Commerce Overview
 Advantage & disadvantage of M-Commerce
 M-Commerce Applications
 Mobile commerce framework
 Mobile application security
 conclusion
26
conclusion
 There will no mobile commerce without
security of the underlying technologies
27
28

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Industry framework of e commerce
Industry framework of e commerceIndustry framework of e commerce
Industry framework of e commerce
 
Introduction to Mobile Commerce
Introduction to Mobile CommerceIntroduction to Mobile Commerce
Introduction to Mobile Commerce
 
E - Marketing
E - Marketing E - Marketing
E - Marketing
 
E.commerce & Digital marketing
E.commerce & Digital marketingE.commerce & Digital marketing
E.commerce & Digital marketing
 
E business & e-commerce
E business & e-commerceE business & e-commerce
E business & e-commerce
 
E commerce business model
E commerce business modelE commerce business model
E commerce business model
 
3. crm & e crm
3. crm & e crm3. crm & e crm
3. crm & e crm
 
E commerce presentation
E commerce presentationE commerce presentation
E commerce presentation
 
E business
E businessE business
E business
 
E-commerce Business Models
E-commerce Business ModelsE-commerce Business Models
E-commerce Business Models
 
Introduction to electronic commerce full
Introduction to electronic commerce full Introduction to electronic commerce full
Introduction to electronic commerce full
 
PPT on mobile marketing
PPT on mobile marketingPPT on mobile marketing
PPT on mobile marketing
 
Frame work of e commerce
Frame work of e commerceFrame work of e commerce
Frame work of e commerce
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 
7 features of e commerce
7 features of e commerce7 features of e commerce
7 features of e commerce
 
E business fundamentals
E  business fundamentalsE  business fundamentals
E business fundamentals
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
 
E commerce
E commerceE commerce
E commerce
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
 
M Commerce- Future of Mobile Commerce AIMK
M Commerce- Future of Mobile Commerce AIMKM Commerce- Future of Mobile Commerce AIMK
M Commerce- Future of Mobile Commerce AIMK
 

Semelhante a Mobile commerce

Real time mobile Commerce
Real time mobile CommerceReal time mobile Commerce
Real time mobile CommerceRobbySahoo
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-BusinessEyad Almasri
 
Mcommerecefinal1 150928204507-lva1-app6891
Mcommerecefinal1 150928204507-lva1-app6891Mcommerecefinal1 150928204507-lva1-app6891
Mcommerecefinal1 150928204507-lva1-app6891Quang Nguyen
 
Computer's project
Computer's projectComputer's project
Computer's projectAbdullah555
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationMarc Vael
 
Future of m commerce
Future of m commerceFuture of m commerce
Future of m commerceAlok Gupta
 
E-Commerce Chapter 6.ppt
E-Commerce Chapter 6.pptE-Commerce Chapter 6.ppt
E-Commerce Chapter 6.pptMarwanTamer2
 
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...CSCJournals
 

Semelhante a Mobile commerce (20)

Mobile Commerce
Mobile CommerceMobile Commerce
Mobile Commerce
 
MIS 11 M-Commerce
MIS 11 M-CommerceMIS 11 M-Commerce
MIS 11 M-Commerce
 
Cmsc666 Mc
Cmsc666 McCmsc666 Mc
Cmsc666 Mc
 
Real time mobile Commerce
Real time mobile CommerceReal time mobile Commerce
Real time mobile Commerce
 
M commerce
M commerceM commerce
M commerce
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
 
Mcommerecefinal1 150928204507-lva1-app6891
Mcommerecefinal1 150928204507-lva1-app6891Mcommerecefinal1 150928204507-lva1-app6891
Mcommerecefinal1 150928204507-lva1-app6891
 
Mobile commerce 2
Mobile commerce 2Mobile commerce 2
Mobile commerce 2
 
m-commerce-seminar-report
 m-commerce-seminar-report m-commerce-seminar-report
m-commerce-seminar-report
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
Mobile Payments
Mobile PaymentsMobile Payments
Mobile Payments
 
Computer's project
Computer's projectComputer's project
Computer's project
 
M Commerce
M CommerceM Commerce
M Commerce
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
WK9.pptx
WK9.pptxWK9.pptx
WK9.pptx
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
E-Mobile
E-Mobile E-Mobile
E-Mobile
 
Future of m commerce
Future of m commerceFuture of m commerce
Future of m commerce
 
E-Commerce Chapter 6.ppt
E-Commerce Chapter 6.pptE-Commerce Chapter 6.ppt
E-Commerce Chapter 6.ppt
 
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
 

Último

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Mobile commerce

  • 2. Outline  M-Commerce Overview  Advantage & disadvantage of M-Commerce  M-Commerce Applications  Mobile commerce framework  Security in M-Commerce  conclusion 2
  • 3. What is mobile commerce ? 3
  • 4. Mobile Commerce Overview  Mobile commerce (m-commerce, m-business) , any e-commerce done in a wireless environment, especially via the Internet Can be done via the Internet, private communication lines, smart cards, etc. Creates opportunity to deliver new services to existing customers and to attract new ones 4
  • 5. Mobile commerce from the Customer‘s point of view  The customer wants to access information, goods and services any time and in any place on his mobile device.  He can use his mobile device to purchase tickets for events or public transport, pay for parking, download content and even order books and CDs. 5
  • 6. Mobile commerce from the Provider‘s point of view  The future development of the mobile telecommunication sector is heading more and more towards value-added services. Analysts forecast that soon half of mobile operators‘ revenue will be earned through mobile commerce. 6
  • 7. Provider view Consequently operators as well as third party providers will focus on value-added-services. To enable mobile services, providers with expertise on different sectors will have to cooperate. Innovative service scenarios will be needed that meet the customer‘s expectations and business models that satisfy all partners involved. 7
  • 8. Outline  M-Commerce Overview  Advantage & disadvantage of M-Commerce  M-Commerce Applications  Mobile commerce framework  Security in M-Commerce  conclusion 8
  • 9. The advantages of M-Commerce Mobility—users carry cell phones or other mobile devices Broad reach—people can be reached at any time Ubiquity—easier information access in real-time Convenience—devices that store data and have Internet, intranet, extranet connections 9
  • 10. Advantage Instant connectivity—easy and quick connection to Internet, intranets, other mobile devices, databases Personalization—preparation of information for individual consumers Localization of products and services—knowing where the user is located at any given time and match service to them 10
  • 11. The main disadvantages of M-Commerce  Mobile devices offer limited capabilities  The heterogeneity of devices  Mobile device are more prone to theft and destruction  Communication 11
  • 12. Outline  M-Commerce Overview  Advantage & disadvantage of M-Commerce  M-Commerce Applications  Mobile commerce framework  Security in M-Commerce  conclusion 12
  • 13. Mobile Service Scenarios  Financial Services.  Entertainment.  Shopping.  Information Services.  Payment.  Advertising.  And more ... 13
  • 14. Details of service scenario. M- commerce Entertainment • Music • Games • Graphics • Video Communications • Short Messaging • Multimedia Messaging • Unified Messaging • e-mail • Chatrooms • Video - conferencing Transactions • Banking • Broking • Shopping • Auctions • Betting • Booking & reservations • Mobile wallet • Mobile purse Information • News • City guides • Directory Services • Maps • Traffic and weather • Corporate information • Market data 14
  • 15. Classes of M-Commerce Applications 15
  • 16. outline 16  M-Commerce Overview  Advantage & disadvantage of M-Commerce  M-Commerce Applications  Mobile commerce framework  Security in M-Commerce  conclusion
  • 18. framework 18  Application : many new application are becoming possible , and many existing e-commerce application can be modified for a mobile environment.  User infrastructure : the design of new mobile commerce application should consider the capabilities of the user infrastructure the mobile device.
  • 19. framework 19  Wireless middleware : with its ability to hide the underlying networks details from application while providing a uniform and easy to use interface , middleware is extremely important for developing new mobile commerce application  Networks infrastructure : in mobile commerce , service quality primarily depends on network resources and capabilities
  • 20. framework 20  The framework also provides a developer provider plane , which addresses the different needs and views of application developers , content providers , and service provider
  • 21. Outline  M-Commerce Overview  Advantage & disadvantage of M-Commerce  M-Commerce Applications  Mobile commerce framework  Mobile application security  conclusion 21
  • 22. Mobile application security  Nowadays smartphone and other mobile devices have become incredibly important in every aspect of our life  Therefore , security is Considered as an important Factor in wireless communication technologies particularly in a wireless ad-hoc network and mobile operation system 22
  • 23. Mobile application security  Three fundamental categories of security goals and objectives of information in an organization : Confidentiality , Integrity , Availability  More to say , security can measured through : Confidentiality , Integrity , Authentication , Authorization 23
  • 24. Three classified section of threat model  Each mobile platform introduced and implemented their model or approaches to enforcing application security  Attack goals  Attack vector  Mobile malware 24
  • 25. Three classified section of threat model 25
  • 26. outline  M-Commerce Overview  Advantage & disadvantage of M-Commerce  M-Commerce Applications  Mobile commerce framework  Mobile application security  conclusion 26
  • 27. conclusion  There will no mobile commerce without security of the underlying technologies 27
  • 28. 28