In the present times, the mobile security is a serious issue. With the advent of e-commerce, the organizations and the individuals are using mobile phones for the e-commerce transactions and saving their private information. As the mobile phones are used for the internet transactions, it is important to enhance the security of the mobile transactions so that privacy and security of a person is not compromised. In this regard, a number of scholars have conducted research on how to increase the security of the computer systems. In this regard, the present essay will critically examine the current research on the security issues in mobile commerce and corporate data security. The essay will evaluate the two current research articles, namely, Mobile Commerce and Related Mobile Security Issues published by Wadhaval, Mehta and Gawade (2013) and Mobile Devices and Corporate Data Security by Markelj and Bernik (2012). The critical evaluation of the research articles will examine whether the research paper has been able to address its research questions. The research methodology is a significant factor in the success of the research. The selection of research methods is significant factor in examining the relevant information related to the research. In this regard, the present essay will critically reflect on the alignment of the philosophical framework, methodology, data collection methods and the evidence provided by the researcher to support their claims.
The first research article selected for the research is Mobile Commerce and Related Mobile Security Issues published by Wadhaval, Mehta and Gawade (2013). The major research questions of the research article are how m-commerce transactions are performed through internet and how the associated technologies have developed over the years. Moreover, the article also aims to examine the security and the privacy issues in the e-commerce and security issues in the mobile commerce. Another aim of the article is to examine the solutions to m-commerce issues and how they can be addressed by the technology. It can be examined that the research paper has conducted a literature review to explore relevant information (Wadhaval, Mehta & Gawade, 2013). The literature review refers to a scholarly paper which includes the current knowledge about a specific topic. It encompasses all the relevant and recent research on the topic. In addition to it, it includes the theoretical and the methodological information on a specific topic. The literature reviews are considered as a secondary resource as they contain the information or knowledge in the previous research. It is a crucial research method which is used to synthesize information on the relevant topic. The literature reviews are the basis in research as with the literature review, the researcher can find gaps in the current research and other loopholes wherein the new research can be directed (Machi, 2016). In research projects, the literature review provides the context to the reader regarding the current information on the research topic and advances him towards the current research area. The literature review is the best method to collect information on a particular subject in a limited time and with little expenditure (Crowther & Lancaster, 2012).
It is considered as a secondary research method as the information presented in it is collected from previous sources. The secondary research method involves the summary and synthesis of existing research. It is contrary to the primary research wherein the data is collected in the research from primary data collection methods such as interview or survey.
The authenticity and the reliability of the secondary research are dependent upon the sources selected for the research study. Therefore, it is important that the researcher takes crucial step in the selection of the sources. Although the secondary resources are invaluable for the sociologist research, they should be used cautiously as the reliability and the validity of these resources is questionable. In order to select reliable secondary resources, the researcher must select peer-reviewed and consistent articles for the research purpose (Reis & Judd, 2014).
It can be critiqued from the research paper that the selection of the secondary resources was not appropriate. The authors have selected Wikipedia which is not a reliable resource for the research purpose.
The article contains relevant information about the security issues in m-commerce and mobile phones. The research article has also included information on how to address the security issues related to m-commerce. The research paper has also raised several issues related to the security and privacy of the users such as authentication, integrity, confidentiality, encryption and non-repudiation in the use of m-commerce. The research paper has also made recommendation regarding how to solve these security issues in the m-commerce websites (Smith, 2010). It has been suggested that the government all across the globe should implement a ubiquitous payment model so that proper research can be made to increase the security features of the website. Other than that the research article has also included several security protocols which can be used to increase the security in the use of the mobile phones.
It can be critiqued that the research paper has been successful in achieving its primary objectives. The research was focused on identifying the relevant issues in security of the mobile phone usage and providing the solutions for it. It can be examined that as the research was only focused on identifying the current issues and addressing them, the philosophical approach of using secondary research is appropriate. The methodology of literature review has been used for examining the contemporary issues; therefore, the research methods were appropriate and in accordance to the research questions (Bernard, 2006). The research findings were also supported by evidence. The authors have provided list of references which can are used to arrive at the findings of the research. Therefore, it can be stated that the research findings were supported by evidence (Hennink, Hutter, & Bailey, 2010). However, it can be critiqued that the research problems were not explicitly presented in the research. The research problems were only mentioned in the abstract of the paper and there was no mention of the research aims and objectives in the later part of the paper. It was a significant issue in the research paper, as the readers regarding the aim of paper in the absence of mention of research questions.
Although the study is conducted ethically, there are issues related to the authenticity of the research project. It can be reviewed that the use of websites such as Wikipedia and online sources has reduced the credibility of the research paper.
The second research paper selected for the essay is Mobile Devices and Corporate Security written by Markelj and Bernik (2012). The research article is published in the International Journal of Education and Information Technologies and examines the issue of data security in the corporate organizations with the advent of the mobile technologies and payment platforms. The paper has conducted an extensive literature review regarding the contemporary issues in the use of mobile devices to access the corporate information. It is a review paper which has examined several pieces of literature in the mobile security. The literature has discussed that the mobile devices such as laptops, PDAs and smartphones have become the integral part in the lives of the people. Moreover, they offer several benefits such as they are easy to carry and powerful in their storage and computational capabilities. Today, most of the devices offer internet connection and thus the users are easily able to access the corporate information from these devices. These business organizations have open ports so that the employees can work in virtual environment. It is also kept open so that people can access the information about the organization in an unauthorized manner. However, keeping the port open can increase the security threats to the organization (Markelji & Bernik, 2012). The review paper has explained in detail various security threats which can occur due to the mobile devices. The aim of the research paper is to explore the security threats in due to the open ports. It can be critiqued upon the evaluation of the research paper that the paper has focused on is aim and presented entirely the information regarding the security breaches in open ports. The information presented in the review paper has been presented in a scholarly manner. It can be analyzed that the research methodology used in the research paper is literature review. As discussed previously, the literature review is the technique to analyze and examine the contemporary research on a single topic. The literature review is the secondary research methodology which examines the information in the currently published journal articles and books and synthesizes them. The primary objective of the literature review is to collect all the recent research on a single topic (Ridley, 2012). It is used to examine the loopholes and gaps in literature. With literature review, the researcher can also conduct research for the validation of the previous research findings.
It is the best approach to find the information related to a singular topic. In the present case, the research methodology of literature review is taken to find the information associated with the research question. The review paper has also examined different solutions which can combat the issues related to the security of the mobile phones. The foremost step that the organizations can take to implement security is to obtain the ISO 27001 certificate which can boost the system security. The literature has also discussed the use of encryption software for the protection of the organization database (Breakwell, Hammond, Fife-schaw & Smith, 2006). The corporations can use encryption software to encrypt the whole organization data, or the data stored on a mobile device or the data transferred through the internet or the information system. However, it is important for the technology development it is important that the organization should focus that the encryption software should not impact on the operations of the organization. Moreover, the literature has developed the background for the need of the security software by highlighting the cases of malware attacks on the recent computer systems in various organizations. It has been discussed that as long as the users remain in the protected environment and access information through public platforms, the corporate information of the company is safe. However, the security issues arise when someone having passwords access the information through public networks, insecure protocols and software.
It can be critiqued that the literature review has provided the basis for the research paper and discussed all the relevant topics related to the research topic. It can be critiqued that the research paper has been successful in addressing its aims and objectives. The primary aim of the research is to examine the issues related to the security in thee mobile systems. The literature has discussed all the relevant issues related to the subject. In addition to it, another aim of the research paper is to provide solutions and recommendations to address the security issues (Tracey, 2012).
In the review paper, several recommendations are made to address the contemporary issues in the security system. Today, the security solutions are rapidly evolving to address the security risks increasing due to the frequent use of the mobile phones. It has been highlighted in the review paper that the major challenge in the security of the organization is that the organizations cannot monitor the security issues which cannot be identified. It refers to the several threats which arise with the rapidly evolving mobile devices and information technology. The literature has discussed the issue of the hardware devices which can check the potential dangers in the internet traffic. In the recent year, a large number of equipment has been made which can prevent invasion in the information system. Along with it, the literature has also discussed regarding several software and internet protocols which can be used to control the security issues in the m-commerce (Patton, 2014).
The researchers have conducted vast research in the field of security issues in the mobile technology which can be perceived by the information presented in the research. The researchers have used interpretivism research philosophy which states that the research findings are based on the interpretation of the researcher. The interpretivism researcher philosophy indicates that the findings of the research are based on the interpretation and the bias of the researcher. According to this philosophy, the knowledge is formulated in the mind of the researcher (Brennen, 2012).
Qualitative research methods such as interview or literature review are based on this research philosophy. The literature review is the most common method for the data collection in a cost-effective manner. In the present case, the researcher has used the research methodology of the literature review as it is aligns with the research objectives and aims. It can be critiqued that the research aims to examine the contemporary issues and provides solution for it. It can be achieved by the use of literature review as synthesizes and presents all the relevant information to the reader (Wilis, 2008). Therefore, the employment of the literature review is as per the aims and objectives of the research paper.
In addition to it, it can be critiqued that the research study is conducted in an ethical manner and the data is collected through professional manner. It can be reviewed the persona bias and prejudice is avoided in the research as the researcher has presented different viewpoints while taking a neutral stance. The research is supported with a large number of evidence and reference. It can be reviewed from the evaluation of the reference list that the research paper has collected the information from the contemporary resources which are authentic like journal articles and books. Therefore, it be critiqued that the researchers have focused on maintaining the validity and the authenticity of the research (Fischer, 2011).
Upon the evaluation of the research articles, it can be evaluated that the research methodology is an integral part of the research process. It is important to select appropriate research methods for the completion of the research study. Moreover, the selection of the research methods should be dependent upon the aims and the objectives of the research project. It can be concluded that if the research methods are not selected according to the research aims and objectives, it can impact adversely on the research outcomes. In the first review paper, the research aims and objectives have not been expressed explicitly which can bring confusion to the researcher. Moreover, the first review paper has selected the method of literature review which aligns with the objectives of the research. However, the sources used in the research are not adequate and unauthentic sources such as Wikipedia and online articles. It can be reviewed that the use of these resources can diminish the authenticity of the research articles.
In the second research article, the literature review method is employed to attain the research objectives. The primary research objective of the article is to examine the security issues in the open port systems. During the assessment of the article, it can be reviewed that the research has focused entirely on the research subject. The literature review has selected a large number of sources for identifying the security issues and addressing the challenges. It is examined in the research article that the sources used for the research are authentic and the researcher has made efforts to reduce the bias in the research.
Wadhaval, A., Mehta, R., & Gawade, A. (2013). Mobile Commerce and Related Mobile Security Issues. International Journal of Engineering Trends and Technology (IJETT) 4(4), pp. 668-671.
Markelji, B., & Bernik, I. (2012). Mobile Devices and Corporate Data Security. International Journal Of Education And Information Technologies 6(1), pp. 97-104.
Ridley, D. (2012). The Literature Review: A Step-by-Step Guide for Students. SAGE.
Machi, L.A. (2016). The Literature Review: Six Steps to Success. Corwin Press.
Crowther, D., & Lancaster, G. (2012). Research Methods. Routledge.
Reis, H.T., & Judd, C.M. (2014). Handbook of Research Methods in Social and Personality Psychology. Cambridge University Press.
Hennink, M., Hutter, I., & Bailey, A. (2010). Qualitative Research Methods. SAGE.
Tracey, S.J. (2012). Qualitative Research Methods: Collecting Evidence, Crafting Analysis, Communicating Impact. John Wiley & Sons.
Patton, M.Q. (2014).Qualitative Research & Evaluation Methods: Integrating Theory and Practice. SAGE Publications.
Brennen, B.S. (2012). Qualitative Research Methods for Media Studies. Routledge.
Wilis, J. (2008). Qualitative Research Methods in Education and Educational Technology. IAP.
Fischer, C.T. (2011). Qualitative Research Methods for Psychologists: Introduction through Empirical Studies. Academic Press.
Smith, M.F. (2010). Research Methods in Sport. SAGE.
Breakwell, G.M., Hammond, S., Fife-schaw, C., & Smith, J.A. (2006). Research Methods in Psychology. SAGE.
Bernard, H.R. (2006). Research Methods in Anthropology: Qualitative and Quantitative Approaches. Rowman Altamira.