New User? Start here.
Error goes here
You are to write a scholarly essay that critically evaluates findings from at least two journal publications in one of the following research areas;
In the present times, the mobile security is a serious issue. With the advent of e-commerce, the organizations and the individuals are using mobile phones for the e-commerce transactions and saving their private information. As the mobile phones are used for the internet transactions, it is important to enhance the security of the mobile transactions so that privacy and security of a person is not compromised. In this regard, a number of scholars have conducted research on how to increase the security of the computer systems. In this regard, the present essay will critically examine the current research on the security issues in mobile commerce and corporate data security. The essay will evaluate the two current research articles, namely, Mobile Commerce and Related Mobile Security Issues published by Wadhaval, Mehta and Gawade (2013) and Mobile Devices and Corporate Data Security by Markelj and Bernik (2012). The critical evaluation of the research articles will examine whether the research paper has been able to address its research questions. The research methodology is a significant factor in the success of the research. The selection of research methods is significant factor in examining the relevant information related to the research. In this regard, the present essay will critically reflect on the alignment of the philosophical framework, methodology, data collection methods and the evidence provided by the researcher to support their claims.
The first research article selected for the research is Mobile Commerce and Related Mobile Security Issues published by Wadhaval, Mehta and Gawade (2013). The major research questions of the research article are how m-commerce transactions are performed through internet and how the associated technologies have developed over the years. Moreover, the article also aims to examine the security and the privacy issues in the e-commerce and security issues in the mobile commerce. Another aim of the article is to examine the solutions to m-commerce issues and how they can be addressed by the technology. It can be examined that the research paper has conducted a literature review to explore relevant information (Wadhaval, Mehta & Gawade, 2013). The literature review refers to a scholarly paper which includes the current knowledge about a specific topic. It encompasses all the relevant and recent research on the topic. In addition to it, it includes the theoretical and the methodological information on a specific topic. The literature reviews are considered as a secondary resource as they contain the information or knowledge in the previous research. It is a crucial research method which is used to synthesize information on the relevant topic. The literature reviews are the basis in research as with the literature review, the researcher can find gaps in the current research and other loopholes wherein the new research can be directed (Machi, 2016). In research projects, the literature review provides the context to the reader regarding the current information on the research topic and advances him towards the current research area. The literature review is the best method to collect information on a particular subject in a limited time and with little expenditure (Crowther & Lancaster, 2012).
It is considered as a secondary research method as the information presented in it is collected from previous sources. The secondary research method involves the summary and synthesis of existing research. It is contrary to the primary research wherein the data is collected in the research from primary data collection methods such as interview or survey.
The authenticity and the reliability of the secondary research are dependent upon the sources selected for the research study. Therefore, it is important that the researcher takes crucial step in the selection of the sources. Although the secondary resources are invaluable for the sociologist research, they should be used cautiously as the reliability and the validity of these resources is questionable. In order to select reliable secondary resources, the researcher must select peer-reviewed and consistent articles for the research purpose (Reis & Judd, 2014).
It can be critiqued from the research paper that the selection of the secondary resources was not appropriate. The authors have selected Wikipedia which is not a reliable resource for the research purpose.
The article contains relevant information about the security issues in m-commerce and mobile phones. The research article has also included information on how to address the security issues related to m-commerce. The research paper has also raised several issues related to the security and privacy of the users such as authentication, integrity, confidentiality, encryption and non-repudiation in the use of m-commerce. The research paper has also made recommendation regarding how to solve these security issues in the m-commerce websites (Smith, 2010). It has been suggested that the government all across the globe should implement a ubiquitous payment model so that proper research can be made to increase the security features of the website. Other than that the research article has also included several security protocols which can be used to increase the security in the use of the mobile phones.
It can be critiqued that the research paper has been successful in achieving its primary objectives. The research was focused on identifying the relevant issues in security of the mobile phone usage and providing the solutions for it. It can be examined that as the research was only focused on identifying the current issues and addressing them, the philosophical approach of using secondary research is appropriate. The methodology of literature review has been used for examining the contemporary issues; therefore, the research methods were appropriate and in accordance to the research questions (Bernard, 2006). The research findings were also supported by evidence. The authors have provided list of references which can are used to arrive at the findings of the research. Therefore, it can be stated that the research findings were supported by evidence (Hennink, Hutter, & Bailey, 2010). However, it can be critiqued that the research problems were not explicitly presented in the research. The research problems were only mentioned in the abstract of the paper and there was no mention of the research aims and objectives in the later part of the paper. It was a significant issue in the research paper, as the readers regarding the aim of paper in the absence of mention of research questions.
Although the study is conducted ethically, there are issues related to the authenticity of the research project. It can be reviewed that the use of websites such as Wikipedia and online sources has reduced the credibility of the research paper.
The second research paper selected for the essay is Mobile Devices and Corporate Security written by Markelj and Bernik (2012). The research article is published in the International Journal of Education and Information Technologies and examines the issue of data security in the corporate organizations with the advent of the mobile technologies and payment platforms. The paper has conducted an extensive literature review regarding the contemporary issues in the use of mobile devices to access the corporate information. It is a review paper which has examined several pieces of literature in the mobile security. The literature has discussed that the mobile devices such as laptops, PDAs and smartphones have become the integral part in the lives of the people. Moreover, they offer several benefits such as they are easy to carry and powerful in their storage and computational capabilities. Today, most of the devices offer internet connection and thus the users are easily able to access the corporate information from these devices. These business organizations have open ports so that the employees can work in virtual environment. It is also kept open so that people can access the information about the organization in an unauthorized manner. However, keeping the port open can increase the security threats to the organization (Markelji & Bernik, 2012). The review paper has explained in detail various security threats which can occur due to the mobile devices. The aim of the research paper is to explore the security threats in due to the open ports. It can be critiqued upon the evaluation of the research paper that the paper has focused on is aim and presented entirely the information regarding the security breaches in open ports. The information presented in the review paper has been presented in a scholarly manner. It can be analyzed that the research methodology used in the research paper is literature review. As discussed previously, the literature review is the technique to analyze and examine the contemporary research on a single topic. The literature review is the secondary research methodology which examines the information in the currently published journal articles and books and synthesizes them. The primary objective of the literature review is to collect all the recent research on a single topic (Ridley, 2012). It is used to examine the loopholes and gaps in literature. With literature review, the researcher can also conduct research for the validation of the previous research findings.
It is the best approach to find the information related to a singular topic. In the present case, the research methodology of literature review is taken to find the information associated with the research question. The review paper has also examined different solutions which can combat the issues related to the security of the mobile phones. The foremost step that the organizations can take to implement security is to obtain the ISO 27001 certificate which can boost the system security. The literature has also discussed the use of encryption software for the protection of the organization database (Breakwell, Hammond, Fife-schaw & Smith, 2006). The corporations can use encryption software to encrypt the whole organization data, or the data stored on a mobile device or the data transferred through the internet or the information system. However, it is important for the technology development it is important that the organization should focus that the encryption software should not impact on the operations of the organization. Moreover, the literature has developed the background for the need of the security software by highlighting the cases of malware attacks on the recent computer systems in various organizations. It has been discussed that as long as the users remain in the protected environment and access information through public platforms, the corporate information of the company is safe. However, the security issues arise when someone having passwords access the information through public networks, insecure protocols and software.
It can be critiqued that the literature review has provided the basis for the research paper and discussed all the relevant topics related to the research topic. It can be critiqued that the research paper has been successful in addressing its aims and objectives. The primary aim of the research is to examine the issues related to the security in thee mobile systems. The literature has discussed all the relevant issues related to the subject. In addition to it, another aim of the research paper is to provide solutions and recommendations to address the security issues (Tracey, 2012).
In the review paper, several recommendations are made to address the contemporary issues in the security system. Today, the security solutions are rapidly evolving to address the security risks increasing due to the frequent use of the mobile phones. It has been highlighted in the review paper that the major challenge in the security of the organization is that the organizations cannot monitor the security issues which cannot be identified. It refers to the several threats which arise with the rapidly evolving mobile devices and information technology. The literature has discussed the issue of the hardware devices which can check the potential dangers in the internet traffic. In the recent year, a large number of equipment has been made which can prevent invasion in the information system. Along with it, the literature has also discussed regarding several software and internet protocols which can be used to control the security issues in the m-commerce (Patton, 2014).
The researchers have conducted vast research in the field of security issues in the mobile technology which can be perceived by the information presented in the research. The researchers have used interpretivism research philosophy which states that the research findings are based on the interpretation of the researcher. The interpretivism researcher philosophy indicates that the findings of the research are based on the interpretation and the bias of the researcher. According to this philosophy, the knowledge is formulated in the mind of the researcher (Brennen, 2012).
Qualitative research methods such as interview or literature review are based on this research philosophy. The literature review is the most common method for the data collection in a cost-effective manner. In the present case, the researcher has used the research methodology of the literature review as it is aligns with the research objectives and aims. It can be critiqued that the research aims to examine the contemporary issues and provides solution for it. It can be achieved by the use of literature review as synthesizes and presents all the relevant information to the reader (Wilis, 2008). Therefore, the employment of the literature review is as per the aims and objectives of the research paper.
In addition to it, it can be critiqued that the research study is conducted in an ethical manner and the data is collected through professional manner. It can be reviewed the persona bias and prejudice is avoided in the research as the researcher has presented different viewpoints while taking a neutral stance. The research is supported with a large number of evidence and reference. It can be reviewed from the evaluation of the reference list that the research paper has collected the information from the contemporary resources which are authentic like journal articles and books. Therefore, it be critiqued that the researchers have focused on maintaining the validity and the authenticity of the research (Fischer, 2011).
Upon the evaluation of the research articles, it can be evaluated that the research methodology is an integral part of the research process. It is important to select appropriate research methods for the completion of the research study. Moreover, the selection of the research methods should be dependent upon the aims and the objectives of the research project. It can be concluded that if the research methods are not selected according to the research aims and objectives, it can impact adversely on the research outcomes. In the first review paper, the research aims and objectives have not been expressed explicitly which can bring confusion to the researcher. Moreover, the first review paper has selected the method of literature review which aligns with the objectives of the research. However, the sources used in the research are not adequate and unauthentic sources such as Wikipedia and online articles. It can be reviewed that the use of these resources can diminish the authenticity of the research articles.
In the second research article, the literature review method is employed to attain the research objectives. The primary research objective of the article is to examine the security issues in the open port systems. During the assessment of the article, it can be reviewed that the research has focused entirely on the research subject. The literature review has selected a large number of sources for identifying the security issues and addressing the challenges. It is examined in the research article that the sources used for the research are authentic and the researcher has made efforts to reduce the bias in the research.
Wadhaval, A., Mehta, R., & Gawade, A. (2013). Mobile Commerce and Related Mobile Security Issues. International Journal of Engineering Trends and Technology (IJETT) 4(4), pp. 668-671.
Markelji, B., & Bernik, I. (2012). Mobile Devices and Corporate Data Security. International Journal Of Education And Information Technologies 6(1), pp. 97-104.
Ridley, D. (2012). The Literature Review: A Step-by-Step Guide for Students. SAGE.
Machi, L.A. (2016). The Literature Review: Six Steps to Success. Corwin Press.
Crowther, D., & Lancaster, G. (2012). Research Methods. Routledge.
Reis, H.T., & Judd, C.M. (2014). Handbook of Research Methods in Social and Personality Psychology. Cambridge University Press.
Hennink, M., Hutter, I., & Bailey, A. (2010). Qualitative Research Methods. SAGE.
Tracey, S.J. (2012). Qualitative Research Methods: Collecting Evidence, Crafting Analysis, Communicating Impact. John Wiley & Sons.
Patton, M.Q. (2014).Qualitative Research & Evaluation Methods: Integrating Theory and Practice. SAGE Publications.
Brennen, B.S. (2012). Qualitative Research Methods for Media Studies. Routledge.
Wilis, J. (2008). Qualitative Research Methods in Education and Educational Technology. IAP.
Fischer, C.T. (2011). Qualitative Research Methods for Psychologists: Introduction through Empirical Studies. Academic Press.
Smith, M.F. (2010). Research Methods in Sport. SAGE.
Breakwell, G.M., Hammond, S., Fife-schaw, C., & Smith, J.A. (2006). Research Methods in Psychology. SAGE.
Bernard, H.R. (2006). Research Methods in Anthropology: Qualitative and Quantitative Approaches. Rowman Altamira.
To View this & another 50000+ free samples. Please put
your valid email id.
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
Get Moneyinto Your Wallet
Total 12 pages, 1 USD Per Page
*The content must not be available online or in our existing Database to qualify as
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Mobile Web Apps. Retrieved from https://myassignmenthelp.com/free-samples/coit20269-mobile-web-apps/essay-on-mobile-security.html.
"Mobile Web Apps." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/coit20269-mobile-web-apps/essay-on-mobile-security.html.
My Assignment Help (2021) Mobile Web Apps [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20269-mobile-web-apps/essay-on-mobile-security.html[Accessed 20 September 2021].
My Assignment Help. 'Mobile Web Apps' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/coit20269-mobile-web-apps/essay-on-mobile-security.html> accessed 20 September 2021.
My Assignment Help. Mobile Web Apps [Internet]. My Assignment Help. 2021 [cited 20 September 2021]. Available from: https://myassignmenthelp.com/free-samples/coit20269-mobile-web-apps/essay-on-mobile-security.html.
The respective sample has been mail to your register email id
* $5 to be used on order value more than $50. Valid for
We have sent login details on your registered email.
Leave behind your concerns over submitting flawless academic papers when you approach the assignment help service from MyAssignmnethelp.com. Our writing service are presented with the aim to offer optimum guidance to students in different academic disciplines or subjects. It's our guarantee that you'll receive the best kind of solutions from us every time you seek our help on your papers.
A prototype is the previous approximation of any resulting system or product. The prototyping model has been the SDM or “System Development Method”, where a prototype is created (Karstens et al., 2014).
It has been needed to validate system design of “XYZ car parking system” using the interaction diagrams like sequence diagrams or communication diagrams. It should be done for at least two sub-system of this dev...
Key Design Characteristics for Developing Usable E-Commerce Websites in the Arab World
Part 1: A. The Context of the Paper
Research community: In this section of the paper, discussions would be made on the research article entitled “Key Design Characteristics for Developing Usable E-Commerce Websites in the Arab World”. The paper essentially addresses the Information Technology and Communication...
Accounting software packages are used by the companies to manage the records related to the customers, financial, investment and etc. These software packages facilitate the organization to manage the entire business activities in the context of financial activities with any flaw (Albrecht, etal, 2010). In this context, the research paper describes, the use of accounting software packages in accounting information systems...
The report is presenting description about the migration of web services within the concerned organization named SoftArc Engineering Ltd that operated their business over throughout Australia, Sydney as well as Papua New Guinea.
This report is elaborating important benefits ad issues involved within this migration process with respect to their fictional objectives and goals within their selected target market. The...
1.1 Introduction (System qualities)
Serving as the overall system factors, system qualities are the factors that affect the system design in order to influence user experiences and run-time behaviours. In essence, they will represent the concerns that will provide a wider impact on different application platforms and users. For the project at hand, ‘My Health Record’, the system aims to enhance the efficiency of the health...
Are you confident that you will achieve the grade? Our best Expert will help you improve your grade
ICT700 System Analysis And Design
HI5019 Strategic Information Systems
SMB4201 Systems Analysis And Design
ITECH1001 Communications And Technology
ITC508 Object Modelling
1803ICT Information Systems Foundations
ICT287 Computer Security
ITC571 Project Proposal And Plan
LSTD517 Law Ethics And Cybersecurity
COIT13232 Business Analysis Project
MRKT11029 Marketing Fundamentals
HRMT11010 Organisational Behaviour
HRMT20024 Managing Human Resources
BUSN20017 Effective Business Communications
BUSN20019 Professional Project
HRMT20027 Employment Relations
ECON11026 Principles Of Economics
MRKT20052 Marketing Management And Digital Communications
Just refer 5 friends to earn more than $2000.
After the successfull payment you will be redirected to the detail page where you can see download full answer button over blur text.You can also download from there.
Or you can also download from My Library section once you login.Click on the My Library icon
My Library page open there you can see all your purchased sample and you can download from there.
That's our welcome gift for first time visitors
It is too easy to create or access your own library, just enter your email and make your search
MyAssignmenthelp.com stores a huge
COLLECTION OF QUESTIONS AND SAMPLES, which you can refer to any time you want.
Every time you find something useful, you can save that using the bookmark tool. From the next time,
can access that from your personalized library.
With this feature, you get to create your own collection of documents. You get free
choose and bookmark any document you wish.
Accessing the collection of documents is absolutely easy. Once you bookmark a sample,
access its content with a few clicks on your mouse.
This personalized library allows you to get faster access to the necessary documents.
longer need to spend hours to locate the sample you need.
Finding a sample from a list of thousands is nothing less than spotting a needle in a
Personalizing your own library relieves you from that stress.
On APP - grab it while it lasts!
*Offer eligible for first 3 orders ordered through app!
ONLINE TO HELP YOU 24X7
OR GET MONEY BACK!
OUT OF 33845 REVIEWS
Received my assignment before my deadline request, paper was well written. Highly