Académique Documents
Professionnel Documents
Culture Documents
TOPIC SUMMARY
Mobile Commerce
Nowadays, wired telephone devices are now common and basic provisions of homes, and in
the urban areas. It is widely used in the business now because of its convenient features such as
ubiquity, accessibility, convenience, instant connectivity, personalization, and time sensitivity. It also
offers the benefit and advantage of mobility that makes conducting conducting business or making
purchases via the internet and anywhere as well as anytime with the use of mobile gadgets. Moreover,
it allows mobile computing wherein the user will able to do a usual work on a stand alone use of
aspect which a company invest so much money in. most of the organization developed eSecurity to
prevent illegal or inappropriate use their data. The term eSecurity refers to protecting a site and its
data against malicious or accidental damage and loss. Schneider (2004) considered it as protection if
Another aspects of categorizing computer security according to Schneider are secrecy, integrity
and necessity. These aspects provide eSecurity more feature in protecting the data of the company.
Moreover, the eBusiness Security concern on how on how secure is the server software and how
secure the communications. Therefore, the use of passwords or codes is the most common and basic
In the digital world, business goes with the trend. People who entered business make use of
their mobile gadgets and internet to sell their products. This new marketing strategy is what we refer
to mobile commerce. It is also about the explosion of applications that are becoming accessible from
internet- enabled mobile devices. e-Commerce involves new technologies and quite different from the
traditional e-Commerce. It is your business inside your purse which always be with you and will follow
wherever you go, making it possible to look for a nearby restaurant and pay for items at a store.
Electronic security is designed to use by the corporate to protect its data and assets. This
also to prevent any unauthorized data modification and data enclosure and ensuring the authenticity
of the data source. It uses tangible and resources in protecting the data.