Вы находитесь на странице: 1из 2

6.

1 Challenges: Current Status in Business

The main challenge associated with the mobile device security is the awareness

problem among the users. This mainly arises due to problem knowledge about the technology

through which the entire mobile system operates. It has been seen that not all the individual

or user have a proper idea about the possible threats M- Commerce can have on the

information stored in the mobile.

A research work was conducted in the year 2005 by Ponitsec reflected that nearly

56% of the professionals in the IT department store the valuable corporate information on

their mobile phones. Out of this 56% professionals, only 22% of them make use of the

encryption tools in the mobile to ensure the confidentiality of the data (Allen, 2005). This

reflects that individual including the IT professionals pay more importance to the features and

the technology system of the mobile and pay less of the attention on protecting the

information stored on the device.

Most of the individuals are unaware of the fact that the information or the detail that

we provide during any transaction from the mobile stays within the system fir a long

duration. This is caused because the mobile device is created in a way so that the information

can be readily be provided the next time the user makes use of the same information. This

reflects a higher the risk the user carries to themselves and to the company for which it is

working (Fuller, 2009).

Another finding which was being conducted in the year 2006 by Quocirca the data so

collected reflected that most of the users are mainly concerned with the fact that their data

might be used by some unauthorized users in the mobile network device but no one has

shown concern regarding the other types of data breach like malicious virus attack in the

mobile system (Kumar, 2006). Almost all the users are concerned with the physical damage

or outside damage to the mobile system. Other survey reports have stated that two thousands
of people are leaving their mobile devices at the back of the car every week. This reflects that

due to the size of the device people are losing it at a rapid rate and causing a risk to the data

stored in the device.

Fig. 6 Vulnerabilities of Mobile Payment

Вам также может понравиться