Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services

We address inhibiting factors of mobile real-time services. Since research provides evidence that perceived risk is one major inhibiting factor for the adoption of mobile services, we explore current approaches that should safeguard existing security requirements. First, we develop a classification scheme of mobile real-time applications. We then empirically explore practical and security requirements for the different service classes. Our analysis indicates that current implementation concepts do not meet existent service requirements. Therefore, we present an alternative approach on the basis of SIM-based security tokens. The additional functionalities provided by these tokens can overcome functional or security constraints of existing implementations.

[1]  Steven Furnell,et al.  Advanced user authentication for mobile devices , 2007, Comput. Secur..

[2]  Lucas Hc The evolution of an information system: from key-man to every person. , 1978 .

[3]  A. Stinchcombe Constructing Social Theories , 1970 .

[4]  Minna Mattila Factors Affecting The Adoption Of Mobile Banking Services , 2003 .

[5]  K. Bailey Typologies and taxonomies: An introduction to classification techniques. , 1994 .

[6]  J. Yan,et al.  Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.

[7]  Ronja Addams-Moring,et al.  Public warning in the networked age , 2007, Commun. ACM.

[8]  B. Faulkner Towards a framework for tourism disaster management , 2001 .

[9]  Heiko Roßnagel,et al.  Mobile qualifizierte elektronische Signaturen , 2009 .

[10]  M. Angela Sasse,et al.  Making Passwords Secure and Usable , 1997, BCS HCI.

[11]  Bartel Van de Walle,et al.  Open source software for disaster management , 2007, Commun. ACM.

[12]  Andreas Pfitzmann Multilateral Security: Enabling Technologies and Their Evaluation , 2006, ETRICS.

[13]  Stuart J. Barnes,et al.  Mobile banking: concept and potential , 2003, Int. J. Mob. Commun..

[14]  Tobias Scherner,et al.  A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil Protection , 2005, ICN.

[15]  Marianne Swanson,et al.  Security Self-Assessment Guide for Information Technology Systems , 2001 .

[16]  Anup K. Ghosh,et al.  Software security and privacy risks in mobile e-commerce , 2001, CACM.

[17]  Stuart J. Barnes,et al.  The mobile commerce value chain: analysis and future developments , 2002, Int. J. Inf. Manag..

[18]  Qi Li,et al.  Proceedings of the International Conference on Electronic Commerce , 2005 .

[19]  Szu-Yuan Sun,et al.  A study of consumer value-added services in mobile commerce: focusing on domestic cellular phone companies in Taiwan, China , 2005, ICEC '05.

[20]  Scott B. Guthery,et al.  Mobile Application Development with SMS and the SIM Toolkit , 2001 .

[21]  Günter Müller Emerging Trends in Information and Communication Security , 2006, Lecture Notes in Computer Science.

[22]  Pauline Ratnasingam,et al.  A knowledge architecture for IT security , 2007, CACM.

[23]  Murray Turoff,et al.  Human-computer interaction , 2007, Commun. ACM.

[24]  Jochen Haller,et al.  Framework and Architecture for Secure Mobile Business Applications , 2003, SEC.

[25]  Helmut Schneider,et al.  The domino effect of password reuse , 2004, CACM.

[26]  Dan S. Wallach,et al.  Web Spoofing: An Internet Con Game , 1997 .

[27]  Jun Sun,et al.  Information requirement elicitation in mobile commerce , 2003, CACM.

[28]  Joos Vandewalle,et al.  On the Security of Today's Online Electronic Banking Systems , 2002, Comput. Secur..

[29]  Angappa Gunasekaran,et al.  A review for mobile commerce research and applications , 2007, Decis. Support Syst..

[30]  Venkataraman Ramesh,et al.  Understanding usability in mobile commerce , 2003, CACM.

[31]  Pin Luarn,et al.  AIS Electronic Library (AISeL) , 2017 .

[32]  E.Eugene Schultz,et al.  Mobile computing: The next Pandora's Box , 2007, Comput. Secur..

[33]  Harold Thimbleby,et al.  Proceedings of HCI on People and Computers XII , 1997 .

[34]  Bart De Decker,et al.  Communications and Multimedia Security , 2011, Lecture Notes in Computer Science.

[35]  Bill Anckar,et al.  Value-added services in mobile commerce: an analytical framework and empirical findings from a national consumer survey , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[36]  Jan Muntermann,et al.  Assessing Customers' Value of Mobile Financial Information Services: Empirical-Based Measures , 2005, ICIS.

[37]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[38]  Günter Karjoth,et al.  Access control with IBM Tivoli access manager , 2003, TSEC.

[39]  Tobias Scherner,et al.  Secure Mobile Notifications of Civilians in Case of a Disaster , 2006, Communications and Multimedia Security.

[40]  B. S. Manoj,et al.  Communication challenges in emergency response , 2007, Commun. ACM.

[41]  Thomas A. Horan,et al.  Time-critical information services , 2007, Commun. ACM.

[42]  M.H.P. Kleijnen,et al.  Consumer adoption of wireless services: Discovering the rules, while playing the game , 2004 .