WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/10000404,
	  title     = {Secure Mobile E-Business Applications},
	  author    = {Hala A. Alrumaih},
	  country	= {},
	  institution	= {},
	  abstract     = {It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.
},
	    journal   = {International Journal of Computer and Information Engineering},
	  volume    = {9},
	  number    = {2},
	  year      = {2015},
	  pages     = {389 - 395},
	  ee        = {https://publications.waset.org/pdf/10000404},
	  url   	= {https://publications.waset.org/vol/98},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 98, 2015},
	}