| Foreword | p. xiii |
| Acknowledgments | p. xv |
| Introduction | p. xvii |
| mCommerce Overview | p. 1 |
| Scope and Definition of mCommerce | p. 5 |
| Opportunities | p. 6 |
| Categories | p. 6 |
| Sources of mCommerce Revenue | p. 9 |
| The Battle for Customer Ownership? | p. 10 |
| The Emerging mCommerce Lifestyle | p. 12 |
| The Fundamental Functional Platform of mCommerce Applications | p. 16 |
| Messaging Services | p. 17 |
| Web Access Services | p. 18 |
| Voice Activated Services | p. 19 |
| Location-Based Services | p. 20 |
| Digital Content Services | p. 22 |
| What's Next? | p. 25 |
| mCommerce Applications and Services Landscape | p. 27 |
| The Value Chain Supporting mCommerce Transactions | p. 28 |
| Key Challenges Facing the mCommerce World | p. 30 |
| Building Blocks for mCommerce Applications | p. 32 |
| Services and Applications in Horizontal and Vertical Markets | p. 34 |
| Personal Organizers | p. 36 |
| E-commerce Applications | p. 37 |
| Location-Based Services and Applications | p. 38 |
| mCommerce Portals | p. 40 |
| Communications and Messaging | p. 44 |
| mCommerce Data Synchronization | p. 46 |
| mCommerce Voice Portals | p. 46 |
| Digital Secretaries | p. 47 |
| Travel | p. 47 |
| Financial | p. 48 |
| Retail | p. 49 |
| Education | p. 50 |
| Defense and Military | p. 53 |
| Automotive | p. 54 |
| mCommerce Gaming Services | p. 54 |
| Distribution | p. 57 |
| Public Sector | p. 58 |
| Agriculture | p. 60 |
| Manufacturing and Mining | p. 60 |
| Utilities | p. 60 |
| Healthcare | p. 61 |
| Electronic News Communication | p. 62 |
| Hospitality Industry | p. 63 |
| What's Next? | p. 63 |
| Mobile Security Overview | p. 65 |
| What Is Public Key Infrastructure (PKI)? | p. 68 |
| How PKI Eases Consumers' Fears | p. 72 |
| Strategies in Wireless Internet Security | p. 73 |
| WAP Specifications and Security | p. 74 |
| Wireless Transport Layer Security (WTLS) | p. 74 |
| Wireless Markup Language (WML) Script Sign Text | p. 75 |
| Wireless Gateways | p. 76 |
| Security Issues in WTLS | p. 78 |
| Weak Crypto Ciphers | p. 79 |
| Null Cipher Acceptance | p. 79 |
| Sequence Number Weaknesses | p. 79 |
| False Alert Messages | p. 80 |
| WTLS Fixes | p. 80 |
| WAP Versus SIM Toolkit | p. 81 |
| Components of Wireless PKI | p. 81 |
| Challenges to Wireless Internet PKI | p. 83 |
| Control of Revocation of Certificates | p. 83 |
| The Hand-off Between SSL and WTLS | p. 84 |
| Message for the IT Manager | p. 86 |
| Implementation Issues | p. 86 |
| Security Issues | p. 87 |
| Mobile Versus Wired Security | p. 89 |
| Mobile Device Constraints | p. 91 |
| Memory | p. 91 |
| Computational Processing | p. 92 |
| Form Factor | p. 93 |
| Bandwidth | p. 93 |
| Security Model | p. 95 |
| Client | p. 96 |
| Client Network | p. 100 |
| Internet | p. 103 |
| Merchant Network | p. 108 |
| Server | p. 110 |
| Privacy Issues | p. 115 |
| Location-Based Technology Overview | p. 116 |
| Risks of Location-Based Service | p. 117 |
| Policy Control | p. 118 |
| Building on the Fundamentals | p. 124 |
| Message for the IT Manager | p. 124 |
| Overview of Wireless Networks | p. 127 |
| How Does a Mobile System Work? | p. 128 |
| Evolution and Migration of Mobile Networks | p. 131 |
| Mobile Packet Data Standards | p. 133 |
| General Packet Radio Services (GPRS) | p. 133 |
| Cellular Digital Packet Data (CDPD) | p. 144 |
| Mobitex | p. 148 |
| DataTAC | p. 150 |
| I-Mode | p. 151 |
| 3G Wireless Standards | p. 153 |
| Highlights of 3G | p. 154 |
| Applications for 3G | p. 156 |
| Short-range Mobile Networks | p. 158 |
| Bluetooth | p. 158 |
| Wireless LANs | p. 160 |
| Preferred Wireless System for Mobile Applications | p. 161 |
| The Horizontals Part 1: Mobile Security in Commerce Applications | p. 165 |
| Mobile and Wireless Advertising | p. 166 |
| Wireless Affiliate Advertising Network | p. 168 |
| Mobile and Wireless Banking | p. 169 |
| Security Implications for Mobile Banking | p. 172 |
| Mobile and Wireless Trading | p. 173 |
| The Security Behind Popular Mobile Trading Software Platforms | p. 175 |
| Mobile eWallets | p. 178 |
| meWallet Security | p. 179 |
| Secure Mobile Payment Transaction Processing and Credit Card Authentication | p. 180 |
| Customer Security in a Mobile Payment Processing System | p. 183 |
| Merchant Security in a Mobile Payment Processing System | p. 185 |
| Ticketing | p. 187 |
| Message for the IT Manager | p. 189 |
| The Horizontals, Part 2: Mobile Security in Information Applications | p. 195 |
| The Basics | p. 196 |
| Integrity | p. 197 |
| Authentication | p. 197 |
| Liability | p. 197 |
| Security of Wireless Information Delivery Models | p. 198 |
| Types of Models | p. 199 |
| Mobile Servers Security Flaws | p. 203 |
| Administrator Weaknesses | p. 203 |
| Database Access | p. 204 |
| Applications | p. 205 |
| Stock Quotes | p. 205 |
| Security Implications | p. 208 |
| News Headlines | p. 210 |
| Navigation and Traffic Updates | p. 212 |
| Supporting Technology Overview | p. 215 |
| Security Implications for Location-Based Technologies | p. 215 |
| The Horizontals, Part 3: Mobile Security in Communications Applications | p. 229 |
| Mobile Customer Relationship Management (mCRM) | p. 230 |
| Mobile CRM Security Techniques | p. 231 |
| Best Practices | p. 234 |
| Mobile Sales Force Automation (SFA) | p. 238 |
| Mobile SFA Application Service Providers (ASP) | p. 242 |
| Messaging | p. 244 |
| Instant Messaging (IM) Security | p. 244 |
| Wireless Short Messaging Service (SMS) | p. 247 |
| Information Services | p. 251 |
| Other Messaging Issues | p. 254 |
| Message for the IT Manager | p. 257 |
| The Verticals, Part 1: mCommerce Security in the Service Sector | p. 259 |
| Retail | p. 261 |
| Players and Examples | p. 266 |
| Banking and Finance | p. 267 |
| Travel | p. 278 |
| Manufacturing | p. 280 |
| Distribution | p. 283 |
| Message for the IT Manager | p. 285 |
| The Verticals, Part 2: mCommerce Security in Healthcare, Public Services, and Hospitality | p. 295 |
| Healthcare | p. 296 |
| HIPAA | p. 297 |
| Biometrics | p. 299 |
| Equipment and Personnel Tracking | p. 305 |
| Patient Data Access and Maintenance | p. 308 |
| Alerts and Notification | p. 309 |
| Wireless Voice Access to the Phone Network | p. 312 |
| Public Services | p. 314 |
| Hospitality | p. 322 |
| Message for the IT Manager | p. 330 |
| Healthcare | p. 330 |
| Public Sector | p. 330 |
| Hospitality Industry | p. 331 |
| The Verticals, Part 3: mCommerce Security in Entertainment and the Military | p. 333 |
| Entertainment | p. 334 |
| Privacy Rights | p. 335 |
| Convergent Gaming | p. 337 |
| Embedded Gaming | p. 338 |
| Code Breaker | p. 338 |
| Defense and Military | p. 343 |
| Mobile Hawks | p. 344 |
| Yes, They Are Listening | p. 346 |
| Soldier-to-Soldier Messaging | p. 348 |
| Secure Group Computing | p. 349 |
| Scotty, Beam Me My Orders! | p. 352 |
| Message for the IT Manager | p. 357 |
| Entertaining Lessons | p. 357 |
| Corporal Corporate | p. 357 |
| Security Considerations in Other mCommerce Applications | p. 359 |
| 802.11b Wireless Applications and Security | p. 360 |
| Wi-Fi Architecture Overview | p. 361 |
| Wi-Fi Issues | p. 363 |
| Environmental Monitoring and Energy Management | p. 369 |
| Agriculture | p. 370 |
| Energy Meter Reading | p. 372 |
| Energy Management in the Hotel Industry | p. 374 |
| Vending | p. 375 |
| Payments for Vending Machines | p. 377 |
| Remote Device Control Architecture | p. 378 |
| Message for the IT Manager | p. 384 |
| Bluetooth | p. 387 |
| Architecture Overview | p. 390 |
| Bluetooth Core Components | p. 390 |
| Network Topology | p. 394 |
| Security Overview | p. 395 |
| Link Keys | p. 396 |
| Security Modes | p. 397 |
| Security Manager | p. 401 |
| WAP in Bluetooth | p. 404 |
| Discovery of Services | p. 406 |
| Connection Methods | p. 406 |
| Wireless Datagram Protocol (WDP) Stack Implementation | p. 406 |
| Security Weaknesses | p. 407 |
| PIN Weakness | p. 407 |
| Impersonation | p. 407 |
| Replay Attacks | p. 408 |
| Man in the Middle | p. 408 |
| Hopping | p. 408 |
| Location Attack | p. 408 |
| Denial of Service | p. 409 |
| Bluetooth Compatibility | p. 410 |
| Bluetooth vs. Wi-Fi | p. 410 |
| Alternatives to Bluetooth | p. 411 |
| 3G vs. Bluetooth | p. 412 |
| The Tooth Fairy | p. 413 |
| Message for the IT Manager | p. 415 |
| Tomorrow and Beyond | p. 417 |
| 3G/4G Networks | p. 418 |
| Always on Means Always Paranoid | p. 418 |
| 4G Networks | p. 423 |
| Wearable Computing | p. 425 |
| Wireless Local Area Networks (WLANs) | p. 426 |
| WASPs | p. 430 |
| Biometrics | p. 431 |
| Public Key Infrastructure (PKI) | p. 436 |
| Mobile Transactions | p. 440 |
| Payment Strategies | p. 440 |
| Smartcard Roles in the Future | p. 441 |
| Barcode Transactions | p. 441 |
| Mini-servers | p. 442 |
| IDS | p. 443 |
| Renting Software | p. 445 |
| Message for the IT Manager | p. 446 |
| 3G/4G Networks | p. 447 |
| Biometrics | p. 447 |
| WLANs | p. 447 |
| Wearable Computers | p. 448 |
| WASPs | p. 448 |
| PKI | p. 448 |
| Meta-Glossary of Terms | p. 449 |
| Index | p. 453 |
| Table of Contents provided by Syndetics. All Rights Reserved. |