Ranking secure technologies in security provision financial transactions mobile commerce

  • Authors:
  • Fatemeh Saghafi;Fatemeh NasserEslami;Maryam Esmaili

  • Affiliations:
  • Iran Telecommunication Research Center, Tehran, Iran;Iran Telecommunication Research Center, Tehran, Iran;Alzahra University, Tehran, Iran

  • Venue:
  • Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The high level of mobile phone penetration in comparison with fixed Internet is one of the main reasons why most developing countries propel to provide mobile commerce services. One of the most important challenges in the mobile commerce area is the security issue. Different papers have discussed various aspects of secured networks. But, heretofore a comprehensive ranking approach has not been presented to overcome the security issues. In this paper, it's been tried to analyze the security technologies from financial transactions perspective. Attention to the importance of security in financial transactions is significant, mobile technologies had been discussed and studied for their usage in financial transactions. To become specified purpose of providing security one type of specified services, which security technologies and how much are needed, from 5-Scale Likert questionnaire has been developed and distributed among experts. Actually, this work has been done using the expert's opinions and analysis of the results through the multi-index decision making and Friedman ranking test methods. The results show that in this method, digital signature, cryptography and Steganography, have the same values using two methods and they are in good interaction and the value of the Cronbach's Alpha was equal to 0.951 in this paper.