A foresight framework for understanding the future of mobile commerce

2002 ◽  
Vol 6 (2) ◽  
pp. 19-40 ◽  
Author(s):  
Shengnan Han ◽  
Ville Harkke ◽  
Par Landor Ruggero ◽  
Rossi de Mio
Keyword(s):  
2019 ◽  
Vol 11 (6) ◽  
pp. 1580 ◽  
Author(s):  
Shan Du ◽  
Hua Li

With the advance of 5G communication technologies and Internet+ strategy, mobile commerce has experienced rapid growth and needs urgent attention from researchers. It is the aim of this article to analyze the literature on mobile commerce to address the following question: With the wide application of artificial intelligence and big data, what are the latest technology, models and problems in the background of the new era that researchers and practitioners need to understand in order to grasp the research frontier in this field quickly? Therefore, to achieve these objectives, this paper reviews 1130 m-commerce articles with 25,502 associated references from the SCI-EXPANDED, SSCI, CPCI-S, CPCI-SSH database and develops a framework of m-commerce value by analyzing the most influential authors, institutions, countries, journals and keywords in m-commerce. We apply three types of knowledge mapping to our study—cluster view, timezone view and timeline view. Frequency statistics, clustering coefficient as well as centrality calculation are employed to analyze by CiteSpace. We use the strength of citation bursts to analyze keywords and put result into the I-Modelwhich provide an important framework for classifying m-commerce activities and theories. In this study, we explore the knowledge structure, development and the future trend of mobile commerce for researchers. We identify the main technology and models to improve customer satisfaction and adoption behavior in the background of the new era which provide decision support for practitioners. Compared with the existing literature reviews of mobile commerce, we make a set of knowledge maps to show the future trend of mobile commerce and analyze visual results based on I-model. It is the first study to present the major clusters to reveal their associated intellectual bases and research fronts.


2000 ◽  
Vol 7 (2) ◽  
pp. 18-24 ◽  
Author(s):  
Dipanjan Chakraborty ◽  
Harry Chen

2011 ◽  
pp. 2047-2063
Author(s):  
Changhua Zhu ◽  
Changxing Pei

Intrusion detection and vulnerability analysis play the same important roles in wireless infrastructure as in wired infrastructure. In this chapter we briefly present the methods and technologies of intrusion detection and vulnerability analysis. Then we give the security issues in various wireless networking technologies, analyze the vulnerability of the enabling technologies for the mobile commerce platform, and propose a distributed wireless intrusion detection & vulnerability analysis (WID&VA) system that can help to address the identified security issues. Finally, we conclude this chapter and discuss the future trends.


Author(s):  
Jukka Heikkilä ◽  
Juha Laine

We address the recent development in European m-commerce related regulation in the light of socially desirable information society. We define the socially desirable m-commerce as follows: the majority of citizens can access services from anywhere at an affordable price. The deployment of regulatory measures in setting the arena of development for m-commerce is highly dependent on the vision of the future. We illustrate that in the mobile communications market, the vision of regulator is to guarantee ensure effective competition between networks and services. Some argue that the effective competition would require a common infrastructure, whereas some others would rely on the competition between proprietary networks. Against this backdrop, we explain the scope of current European legislation relevant to mobile commerce and discuss it in three different scenarios developed in the MobiCom research project. Our analysis emphasizes the importance of competing at the level of services instead of at the level of propriety network infrastructures. This could mean extensive merging of networks and improving the relative position of service developers.


Author(s):  
Changhua Zhu ◽  
Changxing Pei

Intrusion detection and vulnerability analysis play the same important roles in wireless infrastructure as in wired infrastructure. In this chapter we briefly present the methods and technologies of intrusion detection and vulnerability analysis. Then we give the security issues in various wireless networking technologies, analyze the vulnerability of the enabling technologies for the mobile commerce platform, and propose a distributed wireless intrusion detection & vulnerability analysis (WID&VA) system that can help to address the identified security issues. Finally, we conclude this chapter and discuss the future trends.


Author(s):  
Ozcan Saritas ◽  
Leonid Gokhberg ◽  
Pavel Bakhtin ◽  
Ilya Kuzminov

Sign in / Sign up

Export Citation Format

Share Document