This review will analyse the article ‘Software Security and Privacy Risk in Mobile E-commerce’ in the online journal of Communications of the ACM. This review will first summarise the article. Secondly, it will look at the effectiveness of the article’s structure, the arrangement of the information and reader ease of access.Thirdly, the review will critique the article, authority, accuracy, currency, objectivity and its relevance. The review will analyse the strategy presented by the author. The article was useful, clear and important
[1.] Arehart, C. and et al. Professional WAP. 1st
edition, Wrox Press, 2000.
[2.] Balfanz, D. and Felten, E. Handheld computers can be
better smartcards. In Proceedings of the Eighth USENIX Security Symposium,USENIX
Association. (Aug. 1999, Washington, DC).
[3.] Cowan, C. et al. Buffer overflows: Attacks and defences
for the vulnerability of the decade. In Proceedings of the DARPA Information
[4.] Conference and Exposition (DISCEX 2000),
(Jan. 2000, HiltonHead, SC), IEEE Computer Society, Los Alamitos, CA.
[5.] Cranor, L. F. Internet privacy: A public concern. netWorker
2, 3(June/July 1998), 13–18; www.acm.org/pubs/citations/journals/networker/1998-2-3/p13-cranor/.
[6.] Ghosh, A. K. Security and Privacy for E-Business.
Wiley, NY (Jan. 2001).
[7.] Haskin, D. Analysts: Smart phones to lead e-commerce
explosion. all-Net Devices(Nov. 3, 1999);
[8.] Lewis, T. Ubinet: The ubiquitous Internet will be
wireless. IEEE Computer32, 10 (Oct. 1999).
[9.] Strategy Analytics. Strategy Analytics forecasts
$200 billion mobilecommerce market by 2004. Wow.com, January 10, 2000; www.wowcom.com/newsline/press_release.cfm?press_id=862.
[10.] WAP Forum. Technical Reports WAP-193-WMLScript,
WAP-170-WTAI, WAP-169-WTA. June–July 2000; www.wapforum.org.
[11.] Zhang, Y. and Lee, W. Intrusion detection in
wireless ad-hoc networks.In Proceedings of the ACM/IEEE MobiCom, (Aug.