Investigating the Identity Theft Prevention Strategies in M-Commerce

Mahmood Shah, Javed Ahmed, Zahoor Soomro

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Downloads (Pure)


    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some limitations in the m-commerce. This paper presents an evaluation of the approaches used in identity theft prevention and suggests guidelines to overcome the weaknesses in m-commerce. A case study approach, with semi-structured interviews was used as the data collection method. Thematic analysis method was adopted for the interpretation of the qualitative data. Themes and codes were created in relation to the processes, methods, approaches, activities and tools used for identity theft prevention. The results show that online organisations are using same approaches of identity theft prevention for all online business transactions, while m-commerce has some unique characteristics for which e-commerce arrangements are not effective. On the other hand, these arrangements are not evaluated for their effectiveness in m-commerce. This study suggests for the assessment of identity theft prevention system for effective functionality in m-commerce and forward guidelines for evaluation of the system in m-commerce. This study makes an important contribution by suggesting strategies for identity theft prevention in m-commerce. [For full proceedings, see ED571459.]
    Original languageEnglish
    Title of host publicationInternational Conferences on Internet Technologies & Society (ITS),
    Number of pages7
    Publication statusPublished - 18 Dec 2016


    Dive into the research topics of 'Investigating the Identity Theft Prevention Strategies in M-Commerce'. Together they form a unique fingerprint.

    Cite this