Data Security in Mobile E commerce
The e-commerce industry is slowly addressing security issues on their internal networks. There are guidelines for securing systems and networks available for the e-commerce systems personnel to read and implement. Educating the consumer on security issues is still in the infancy stage but will prove to be the most critical element of the e-commerce security architecture. Trojan horse programs launched against client systems pose the greatest threat to e-commerce because they can bypass or subvert most of the authentication and authorization mechanisms used in an e-commerce transaction. These programs can be installed on a remote computer by the simplest of means: email attachments. Training programs, orientation programs will become more critical in order to increase the general populace's awareness of security on the Internet. IT and financial control/audit groups within the e-commerce site should form an alliance to overcome the general resistance to implementing security practices at the business level. Industry self-regulation of consumer privacy appears to be ineffective. The FTC privacy survey and its recommendations to Congress may result in the introduction of legislation on privacy issues.
Mobile commerce involves all kind of electronic transactions by the use of mobile phone.
- By the use of mobile commerce enterprises can improve and widen their market reach, cut down on cost and give customers better service .
- Users can benefit from m-commerce by the convenience the m-commerce provide to them and organizing personal data
- Examples of m-commerce are mobile parking meter payments and buying ringtones and games online.
- High value purchases such as land, houses and cars will be more convenient in the future
Hackers and identity thieves cannot steal what you don’t have. Therefore, do not collect or save any private customer data through your e-commerce solution that is not essential to your business. Credit card companies require retailers to test their e-commerce websites to meet certain security standards. But simply meeting these regulations is not enough. Your better bet is to regularly test your e-commerce site to stop hackers from doing any real damage.
Today’s network perimeter is ever-changing. As the recent Target breach clearly identified, sometimes the edge of your network exists within the network of your business partner. Often times, retail sites are not only accessible to hackers from the public Internet; they are also accessible through other companies. Encrypt your communications with business partners, especially with your credit card processor. You might even consider encrypted email. Reason being, you should never send potentially private data in plain text over the Internet.
customers should feel confident in your dedication to online security. They count on you to take their privacy seriously. Otherwise, it could cost you their business, or worse, if hackers have their way. Just ask the major retailers with recent high-profile breaches on how the public responded to their data security disasters. What’s your take? Should online shoppers assume their info is safe? Or does the responsibility fall on those running e-commerce sites?