2003
DOI: 10.1504/ijmc.2003.003994
|View full text |Cite
|
Sign up to set email alerts
|

M-commerce security: the impact of wireless application protocol (WAP) security services on e-business and e-health solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…and Gyires, 2003). Kumar (2004) has also examined global trends in 21st century mobile communications, whilst Kini and Thanarithiporn (2004) have also examined adoption issues and value space between e-commerce and m-commerce.…”
mentioning
confidence: 99%
“…and Gyires, 2003). Kumar (2004) has also examined global trends in 21st century mobile communications, whilst Kini and Thanarithiporn (2004) have also examined adoption issues and value space between e-commerce and m-commerce.…”
mentioning
confidence: 99%
“…The issue of security in e-manufacturing is rarely addressed in the literature, although Lujiong et al do discuss authentication [19], promoting a role-based access scheme for networked manufacturing systems. In a paper dealing with e-health and e-business for m-commerce, Tan et al [20] put the focus on the same point: the issue of security, privacy, and integrity of information and transactions being exchanged from one point on the network to another is seen as a key barrier to making mobile solutions a reality. An obvious solution to mitigating security risks is to limit the number of entry points.…”
Section: Related Workmentioning
confidence: 99%
“…Indeed, by thinking about the use of one device belonging to one firm, and which is proposed as a service to other ones, we have to allow the connection to people which are not known in the second Information System. In a paper dealing with e-health and e-business for m-commerce, the authors [22], put the focus on the same point : the issue of security, privacy, and integrity of information and transactions being exchanged from one point of the network to another is seen as a key barrier to making mobile solutions a reality.…”
Section: Related Workmentioning
confidence: 99%