A Review of Mobile Security Technologies: Current Technologies, Loopholes, associated Risks and Countermeasures

Daniel W. K. TSE*

*Corresponding author for this work

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

Abstract

Mobile commerce has been booming rapidly partly due to advancement and sophistication of mobile technologies in recent years. Because of the highly vulnerability nature existing in wireless data communication, this further exacerbates the security problems inherited from electronic commerce. This paper gives a critical review of most common mobile security technologies with respect to possible loopholes and associated risks. Finally, some countermeasures are derived from the discussion of the above issues.
Original languageEnglish
Pages (from-to)14-24
Journal電腦稽核
Issue number28
Publication statusPublished - Jul 2013

Research Keywords

  • mobile commerce
  • electronic commerce
  • wireless data communication
  • security
  • loophole
  • risks
  • countermeasures
  • SETA

Fingerprint

Dive into the research topics of 'A Review of Mobile Security Technologies: Current Technologies, Loopholes, associated Risks and Countermeasures'. Together they form a unique fingerprint.

Cite this