Software Security and Privacy Risks in Mobile e-Commerce

Download Article

DOI: 10.21522/TIJAR.2014.03.01.Art016

Authors : David Oluwamayowa Fakunle


This review will analyse the article ‘Software Security and Privacy Risk in Mobile E-commerce’ in the online journal of Communications of the ACM. This review will first summarise the article. Secondly, it will look at the effectiveness of the article’s structure, the arrangement of the information and reader ease of access.Thirdly, the review will critique the article, authority, accuracy, currency, objectivity and its relevance. The review will analyse the strategy presented by the author. The article was useful, clear and important


[1.] Arehart, C. and et al. Professional WAP. 1st edition, Wrox Press, 2000.

[2.] Balfanz, D. and Felten, E. Handheld computers can be better smartcards. In Proceedings of the Eighth USENIX Security Symposium,USENIX Association. (Aug. 1999, Washington, DC).

[3.] Cowan, C. et al. Buffer overflows: Attacks and defences for the vulnerability of the decade. In Proceedings of the DARPA Information Survivability

[4.] Conference and Exposition (DISCEX 2000), (Jan. 2000, HiltonHead, SC), IEEE Computer Society, Los Alamitos, CA.

[5.] Cranor, L. F. Internet privacy: A public concern. netWorker 2, 3(June/July 1998), 13–18;

[6.] Ghosh, A. K. Security and Privacy for E-Business. Wiley, NY (Jan. 2001).

[7.] Haskin, D. Analysts: Smart phones to lead e-commerce explosion. all-Net Devices(Nov. 3, 1999); 991103ecomm.html.

[8.] Lewis, T. Ubinet: The ubiquitous Internet will be wireless. IEEE Computer32, 10 (Oct. 1999).

[9.] Strategy Analytics. Strategy Analytics forecasts $200 billion mobilecommerce market by 2004., January 10, 2000;

[10.] WAP Forum. Technical Reports WAP-193-WMLScript, WAP-170-WTAI, WAP-169-WTA. June–July 2000;

[11.] Zhang, Y. and Lee, W. Intrusion detection in wireless ad-hoc networks.In Proceedings of the ACM/IEEE MobiCom, (Aug. 2000).