Ø M-Commerce is the integration of Handheld Device accessed through wireless
network.
network.
Ø Mobile Commerce Provided Advantages: Flexibility And Ubiquity.
Ø Application of M-Commerce- Marketing And Selling, Ticketing, Auctions, Entertainment, Purchase, Financial Services, Information Services, Location And Search Service.
Ø Limitation of M-Commerce: Handheld device Limited screen size, limit of file and data transfer,Less convenient when compared to personal computer, limited computing power- memory and storage, Less secured wireless network, Limited band width, High cost establishing mobile and wireless infrastructure.
Ø Mobile Information Services: News Service, Stock Market Data, Sports News, Financial records, Traffic Information
Ø GPS system are generated by group of satellite that orbits around the earth. Mobile device will utilize three satellite to create intersecting points. Its locate within 500 meters.
Ø Location Based Applications: 1.Information Or Directory Service, 2.Tracking Services, 3.Emergency Service, 4.Adverting Promotion, 5.Mapping, 6.Navigation
· Information Or Directory Services: Dynamically Yellow pages automatically inform the user.
· Tracking Services: Tracking Asset, Geographical Location, Tracking Stolen Car etc.
Ø M-Commerce/E-Commerce Security must meet four aspects:1.Confidatiality, 2.Intigrity,3.Autharization, 4.Non-repudiation
Ø Internet Security Threats: Malicious Code, Sniffing, Denial of service attack, Cyber Vandalism, Spoofing.
· Malicious code is one that causes damage to a computer or system.
· A sniffer is a program that uses internet to record information.
· A Denial of service attack is an attack used to shut down a machine or network ,making it inaccessible to its intended users.
· Cyber vandalism is the electronic defacing of an existing website page.
· Spoofing and masquerading is pretending to be some one you are not, or representing a website as authentic when it is actually a fake.
Ø Security Measures: Antivirus, Firewall, Digital Certificate, Cryptography, Secure Socket Layer (SSL)
Ø Securing Intellectual Property: Copyright, Trademark, Domain Name Disputes
Ø Domain name disputes: Domain name sold to concerned company at a very high price. This is known as cyber squatting.
Ø Protecting Intellectual Property: Steganography, Digital Water Marking (Visible Watermarking -using GIMP software)
Ø Steganography: Steganography is the process of hiding information within other information
Ø Payments Card: Credit , Debit And Smart Card (Its plastic cards)
Ø A credit card issued to the customers by the banks known as issuing bank.
Ø For accepting payments on websites through credit card, merchant needs to open a merchant account with the banks known as acquiring Bank.
Ø Smart Cards Popular in (Information Store encrypted form)U.S., Europe, Japan, Some Parts of Asia.Smart card it can store 100 time more information than normal card Storing Data, Digital Cash And patient’s medical records.(Data read using Card reader)
RuPay card used for domestically. Launched By NPCI. The term Rupay is coined from two terms Rupee And Payment.
The unauthorised use of trademark in domain name is known as is a form of intellectual property that sets apart your products or services from those of your rivals. It uses a phrase, symbol, label, alphanumeric character, design, or a combination of all of these to symbolise your brand and set you apart from competing businesses. The company's IPRs serve to safeguard its intellectual property rights.
ReplyDelete