Research Paper On Mobile Security

Page 26 of 50 - About 500 Essays
  • Premium Essay

    Micropayment System in Electronic Commerce

    the Internet. Products are purchased through the Internet by electronic payment system. People can purchase products by using credit or debit card. However, for several small value products such as, a song in iTunes music store only cost 0.99$ or a mobile game only cost 3.99$, it could be hard to using credit or debit cards to purchase those products because of the fixed minimum transaction could be cost too expensive for small transactions (Turban, King, Lee & Liang, 2010). Therefore, a micro

    Words: 2224 - Pages: 9

  • Premium Essay

    Project

    banking is revolutionizing the banking industry, others see it as simply complementing the physical banking branches; irrespective of its own merits there are diverse challenges and problems associated with this form of banking in Nigeria. The main research instruments used are questionnaires and personal interview for staff and customers of various banks, primary and secondary method of data collection were used. The simple frequency percentage was adopted as the statistical measure and hypothesis

    Words: 7954 - Pages: 32

  • Free Essay

    Use of Ipsec in Mobile Ip

    of Electrical and Computer Engineering ELEG 777 Internet Engineering ( TERM PAPER ) Use of IPSec in Mobile IP DONE BY: SALEM ITANI SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21, 2001 ID #: 20011003 INTRODUCTION As mobile computing has become a reality, new technologies and protocols have been developed to provide to mobile users the services that already exist for non-mobile users. Mobile IP, one of these technologies, enables a node to change its point of attachment

    Words: 9748 - Pages: 39

  • Premium Essay

    Computer Security

    Computer Security Victoria M. Deardorff Brevard Community College April 10, 2012 This paper is written as a basic overview of computer security for the non-technical user. This paper is meant to educate the reader on practical steps that can be implemented to secure their home-based computers. Additionally, the reader will be informed of industry and government needs for and methods of computer security. With this information, the reader should gain a better understanding of why agencies

    Words: 1938 - Pages: 8

  • Premium Essay

    Anti-Theft System

    Reauthorized in 1998, MTI was selected by the U.S. Department of Transportation through a competitive process in 2002 as a national “Center of Excellence.” The Institute is funded by Congress through the United States Department of Transportation’s Research and Innovative Technology Administration, the California Legislature through the Department of Transportation (Caltrans), and by private grants and donations. The Institute receives oversight from an internationally respected Board of Trustees whose

    Words: 21989 - Pages: 88

  • Premium Essay

    Threats to Computer Networks

    the requirement of the paper I will explain the types of fraud may face by the organisation computer networks. Along with I will discuss two cases of such fraud in UAE and finally I will discuss possible precautions to mitigate the risk of such frauds. In recent year the computer network threats become technically more advanced, sophisticated, more organised and at the same time difficult to detect. It is important to mention that these attacks not only damage network security for financial frauds

    Words: 1014 - Pages: 5

  • Premium Essay

    E-Commerce

    KENYATTA UNIVERSITY MOMBASA CAMPUS Management Science Department BMS 501: MANAGEMENT INFORMATION SYSTEMS ELECTRONIC-COMMERCE AND MOBILE-COMMERCE PRESENTED BY: LEONIDA CHEPKORIR SOI D53/MSA/PT/25210/2012 PRESENTED TO: Athman Fadhili Lecturer, Management Science Department Kenyatta University, Mombasa Campus. 9th OCTOBER 2013 1 TABLE OF CONTENTS CHAPTER ONE INTRODUCTION……………………………………………………….……………….3 CHAPTER TWO 2.1 DEFINITION OF COMMERCE……………………………………….……………5 2.2 DEFINITION

    Words: 4756 - Pages: 20

  • Free Essay

    The Need for a Strategic Approach to Enterprise Mobility

    radically altering the means by which enterprises need to do business, the move to a mobile-enabled world is creating tremendous opportunities for enterprises to leverage mobility as a means of driving high performance and ensuring competitive advantage. Some of the key factors that are driving enterprises to develop mobile strategies are as follows:  Rapidly expanding use of mobile devices. The rapid adoption of "smart" mobile devices by both consumers and employees, coupled with the increase in bring your

    Words: 6837 - Pages: 28

  • Premium Essay

    Growth of Agency Bank

    THE GROWTH OF AGENCY BANKING IN KENYA BY JOEL WANJOHI D63/73163/2012 A RESEARCH PROPOSAL SUBMITTED AS ASSIGNMENT FOR DFI 513: MASTER OF SCIENCE IN FINANCE, UNIVERSITY OF NAIROBI NOVEMBER 2012 DECLARATION I hereby declare that this proposal is entirely my own composition. It has not been presented in any University or college for examination purposes. All references made to works of other persons have been duly acknowledged. Permission from the author or examining

    Words: 9078 - Pages: 37

  • Premium Essay

    Fin501 Module 5 Slp 5

    Merger for Synergies with Dell Computers Courtney Ternullo TUI Introduction and Purpose of this Paper Though Dell is one of the largest computer companies in the world, the recent past has been very tough for the company which can be seen in its stagnant revenues, declining margins and subpar performance compared with industry peers such as Apple and HP. There are multiple reasons for this performance such as Dell operating at the standards based commodity end of the business, with limited

    Words: 1299 - Pages: 6

Page   1 23 24 25 26 27 28 29 30 50