The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the key to both offline and online business, consumers' trust to retailers always influences their purchase decision. In recent years, based on the traditional business, more and more click and mortar companies spring up. But could consumers' trust transfer from offline to online channel? And how? Extant researches lack deep exploration for these questions. In this study, introducing perceived...
The personalization is one of the main success factor in Mobile Commerce. This paper presents the main characteristic for Mobile Commerce and describes factors of personalization in Mobile Commerce, it also shows how these factors affects user satisfaction positively or negatively. The mechanism for personalization and recommendation system used in personalized Mobile Commerce are described. Many...
In this paper, we describe the need, requirements and challenges for implementing a global information grid. The grid connects all participating elements in a military mission and provides them with all mission-relevant information in a timely and secure manner, independent of the used command and control information systems (C2IS), the available communication technologies, the degree of mobility,...
The project titled “ONLINE FLOWER MARKETING SYSTEM USING MOBILE APPS” is a comprehensive system which co-ordinates various operations in flower shop by using the mobile application through the online. This includes a variety of collections of flowers and flower made products such as flower arrangements, flower bouquets, retails and etc. This project deals with the booking of various flower products...
Cloud computing allows developers of mobile apps to overcome limited computing, storage, and power resources of modern smartphones. Besides these huge advantages, the hidden utilization of cloud services by mobile apps leads to severe privacy concerns. To overcome these concerns and allow users and companies to properly assess the risks of hidden cloud usage, it is necessary to provide transparency...
In this paper, we can find the defects of the security mechanism through the analysis of the security mechanism of iOS system. And in accordance with known vulnerabilities, we achieve to exploit the loopholes, and then complete the breaking out of sandbox, Obtaining arbitrary code executio, root privilege, patching kernel. Finally we achieve to jailbreak the iOS system.
Mobile users are unlikely to guard against information security risks that do not come to mind in typical situations. As more people conduct sensitive transactions through mobile devices, what risks do they perceive? To inform the design of mobile applications we present a user study of perceived risk for information technology workers accessing company data, consumers using mobile personal banking,...
The paper considers Machine to Machine (M2M) different access methods are analyses to determine their security aspects. Financial billing system structure consists of architecture, protocol stacks, and communication mechanism. M2M/IoT is widely used in vary industrials energy, transport, industrial communication control, public/private services management, e-health, water, oil and other industries...
Using the social media services is becoming more and more popular nowadays. For companies and their employees, they communicate with customers and colleagues with the new ways of social media. More and more people tend to use mobile social media service at any time and any place but mobile virus and malware are dramatically increasing in frequency. The mobile social media has become a very popular...
Contemporary mobile devices have become universal and versatile tools that increasingly are used in sensitive application scenarios. They inevitably carry confidential information such as passwords, encryption keys, mission-critical company data, or location information in combat areas. In order to meet sophisticated security requirements, recent technology focuses on policy-oriented approaches that...
The introduction of bring your own device (BYOD) policy in the corporate world creates benefits for companies as well as job satisfaction for the employee. However, it also creates challenges in terms of security as new vulnerabilities arise. In particular, these challenges include space isolation, data confidentiality, and policy compliance as well as handling the resource constraints of mobile devices...
In recent years, the sustainable development of China's B2B E-commerce has promoted the trade of steel, coal and other commodities, and brought new opportunities and a comprehensive upgrade for the industrial chain where both upstream enterprises and downstream enterprises in, and also attracted a large number of enterprises to join in. Among them, due to their own advantage, the large enterprises...
Mobile service innovation has become a critical issue in the financial sectors. Currently, many banks in Taiwan have developed various mobile services for their customers. However, mobile services in financial sectors are different from Internet services because of the mobility. First, mobile services enable mobile extensions of existing electronic services and new services that are valuable to users...
The Mobile Offices services based on Bring Your Own Device (BYOD) are getting more popular as the use of smart phone grows rapidly. As the free wireless services are being spread, malicious codes can be spread easily. Therefore, how we will provide security in an environment of free wireless has become an issue. This paper suggests security architecture for the better mobile office security and presents...
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user prefers...
The large-scale access to content resources, the current change in the audience expectations, together with an underuse of the potentialities offered by mobile technology calls for a rethinking of the role of mobile interpretation within private and public business manager. Right in the in the area of intersection between business innovation and technology moves the paper, which deals, with the role...
Recently, potential mobile security incidents will be severe due to the rapid growth of mobile device users. The data leakage threat is a common security threats in mobile environment. To efficiently secure and monitor mobile devices from the threat of data leakage, there are some detection methods and mitigations solutions such as MDM (Mobile Device Management) and MAM (Mobile Application Management)...
The dramatic growth of cloud computing services and mobility trends, in terms of 3/4G availability and smart devices, is creating a new phenomenon called "Consumerization" that affects the consumers habits in all facets of the their life. Also during the working time people prefer to stay in their consumer environment because that's their comfort zone. A collateral phenomenon is called BYOD...
This paper analyzes the impact of the fast-growing BYOD (Bring Your Own Device) trend in the corporate mobile market, which blurs lines between business and personal usage. To enable selective funding and resource optimization for BYOD, we propose that the enterprise determines its own service delivery policy, using an enterprise Business Context (eBC) Policy tool. The enterprise is best placed to...
Measurement data collected from hardware systems using a mobile application needs to be protected from falling into malicious hands. To circumvent security concerns, many sensitive ATE systems are simply isolated from networks and run in stand-alone environments. Using mobile connections with ATE equipment introduces a whole new level of security issues which can be a large concern for many companies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.