عنوان انگلیسی مقاله:

 An onion ring framework for developing and assessing mobile commerce security

ترجمه عنوان مقاله: چارچوب حلقه پیازی برای توسعه و ارزیابی امنیت تجارت تلفن همراه

رشته: سیستم اطلاعات مدیریت

سال انتشار: 2006

تعداد صفحات مقاله انگلیسی: 15 صفحه

منبع: کنفرانس بین المللی

نوع فایل: pdf

http://modir123.com/photo%20site/D-modir123.com%20_2_.png دانلود اصل مقاله

 

Abstract

Abstract An onion ring framework for developing and assessing mobile commerce security

A five-layer ‘onion ring’ framework for analysing mobile commerce security requirements and for improving system security performance is presented in this research. Two quantifiable approaches, based on weighted scores applied to either a spider diagram or a decision solution matrix, are used to demonstrate how the security level can actually be objectively measured and evaluated in addition to the technical discussions on the framework’s architecture.

Keywords: mobile commerce security, evaluation matrix, spider and relative weighted methods.

Introduction

Most people can now easily afford to own one, if not more, of the many varieties of available mobile devices. In addition to the traditional audio, text, and video features, many of the latest mobile devices can facilitate real-time business transactions around the globe.

It is now common to see individuals, be they at an airport or on a ship in the open seas, engaged in communicative as well as collaborative activities with customers, suppliers, and partners with portable hand-held mobile devices. Given the popularity and technological advancements in these types of mobile devices, their future contributions and roles in the proliferation of intern et commerce are expected to be critical.

However, just as mobile devices can be used to help businesses to facilitate commercial activities, they can also be used by perpetrators and criminals to victimise the same businesses. Such possibilities and threats are inherent in the basic characteristics of mobile commerce (m-commerce) because of its utilisation of any wireless device and some data connection to exchange information, services, or goods (Abuelyaman and Wen, 2004; Andreou et al., 2002).

Model

مدل حلقه پیازی

http://modir3-3.ir/article-english/article5.PNG

منبع (وی، 2006: 131)

http://modir3-3.ir/images/drtrans.png