The Impact Of Mobile Commerce In Kavala

2017 ◽  
Vol 1 (2) ◽  
pp. 400
Author(s):  
Vasilios Zoumpoulidis ◽  
Aggelos Zoitsas ◽  
Vasilios Ferelis ◽  
Michael Nikolaidis

<p class="AbstractText">The mobile commerce, as an integral and often dominant part of a broader technological, economic and social system, is closely linked to environmental conditions that affect; this affects their decisions and strategy implemented. Undoubtedly, in the current era, the competition is increased and dominant in the market, pushing their bodies and citizens to abandon traditional and time-consuming methods of business functions, practices and yet purchases.</p><p class="AbstractText">The purpose of this study, it is the presentation and the penetration of mobile commerce to the citizens of Kavala. In particular, how they use their mobile devices in making purchases. The survey conducted in 2015 on a random sample of 220 people with criterion that the respondents have a mobile equipment. It was studied the use of wireless technologies in conjunction with the recognition and use of electronic commerce by both consumers and business world.</p><p class="AbstractText">The questionnaire has 47 questions concerning the population distribution, the advanced technology of their mobile devices, the interest for products and services provided by m-commerce and the security they feel. Finally, the respondents were asked for the purchases made by their mobile equipments and whether they were satisfied.</p>For the measurement of the research factors which appear in the conducted study, the method of multiple determinants variables were used. The data analysis was carried out with the use of the statistical program SPSS Statistics 19.0.<br />The conclusions of the survey is that despite the cost of use, the connection speeds, and security and misuse of personal data problems, the mobile commerce is in constant development due to the critical mass of the users who immediately and practically use their mobile devices.

2018 ◽  
pp. 433-449
Author(s):  
Mona Adlakha

Mobile commerce is the next generation of e-commerce, where payments and financial transactions can be carried out with utmost ease using handheld mobile devices. Mobile devices are at a higher security risk due to the large amount of critical financial and personal data available on it. The cause or consequence of these threats could be - malware and spyware attacks; multiple or incorrect m-Commerce payments; breaches due to unauthorized access or disclosure, unauthenticated transactions and risk due to the use of third party networks. This chapter discusses how to manage security risks in m-commerce by first identifying them and then discussing preventive measures for their mitigation. A continuous approach for risk prevention needs to be followed, reviewing the strategy according to the latest challenges. Various risk prevention and mitigation strategies can be adopted. Service providers must follow physical and digital security measures to protect consumer's business information. Independent auditing should ensure compliance with best practice security standards.


PLoS ONE ◽  
2021 ◽  
Vol 16 (3) ◽  
pp. e0248220
Author(s):  
Yibo Xie ◽  
Beibei Guo ◽  
Rui Zhang

Background The current standard of care (SOC) for whole breast radiotherapy (WBRT) in the US is conventional tangential photon fields. Advanced WBRT techniques may provide similar tumor control and better normal tissue sparing, but it is controversial whether the medical benefits of an advanced technology are significant enough to justify its higher cost. Objective To analyze the cost-effectiveness of six advanced WBRT techniques compared with SOC. Methods We developed a Markov model to simulate health states for one cohort of women (65-year-old) with early-stage breast cancer over 15 years after WBRT. The cost effectiveness analyses of field-in-field (FIF), hybrid intensity modulated radiotherapy (IMRT), full IMRT, standard volumetric modulated arc therapy (STD-VMAT), multiple arc VMAT (MA-VMAT), non-coplanar VMAT (NC-VMAT) compared with SOC were performed with both tumor control and radiogenic side effects considered. Transition probabilities and utilities for each health state were obtained from literature. Costs incurred by payers were adopted from literature and Medicare data. Quality-adjusted life years (QALYs) and incremental cost-effectiveness ratio (ICER) were calculated. One-way sensitivity analyses and probabilistic sensitivity analyses (PSA) were performed to evaluate the impact of uncertainties on the final results. Results FIF has the lowest ICER value of 1,511 $/QALY. The one-way analyses show that the cost-effectiveness of advanced WBRT techniques is most sensitive to the probability of developing contralateral breast cancer. PSAs show that SOC is more cost effective than almost all advanced WBRT techniques at a willingness-to-pay (WTP) threshold of 50,000 $/QALY, while FIF, hybrid IMRT and MA-VMAT are more cost-effective than SOC with a probability of 59.2%, 72.3% and 72.6% at a WTP threshold of 100,000 $/QALY, respectively. Conclusions FIF might be the most cost-effective option for WBRT patients at a WTP threshold of 50,000 $/QALY, while hybrid IMRT and MA-VMAT might be the most cost-effective options at a WTP threshold of 100,000 $/QALY.


Author(s):  
Alaa Nabeel Al-Heali ◽  

The study aimed to identify the effect of the use of celebrities in advertisements on the purchasing behavior of consumers, and to achieve the research objectives, a questionnaire consisting of three axes was used. The first includes the personal data of the sample (gender, age, academic achievement, place of residence), while the second axis includes criteria for the use of celebrities in Ads, while the third axis includes the consumer purchasing behavior variable, and the validity of the tool was verified using the validity of the arbitrators, data were analyzed using SAS statistical program. The study concluded that there is a significant correlation between the use of celebrities in advertisements and the purchasing behavior of consumers. There is a significant effect of the independent variable (the use of celebrities in advertisements in terms of (credibility, attractiveness, vector meanings)) on the dependent variable (the purchasing behavior of consumers).The study recommends a set of recommendations, including the need to pay attention to the selection of celebrities who meet the basic criteria in terms of credibility, attractiveness and their ability to convey the necessary information from the product, in addition to pay attention to the content of the advertisement in terms of credibility and compatibility with the culture of consumers in order to push them to trust in the advertising message.


2020 ◽  
Vol 16 (2) ◽  
pp. 145
Author(s):  
Francisca Sestri Goestjahjanti

<p align="center"><strong><em>ABSTRACT</em></strong></p><p><em>The growth of large-scale and medium-scale manufacturing industries in Indonesia today is not yet encouraging and tends to slow down year on year in the first quarter of 2019 and in the 2018 quarter, become down 0.80 percent, due to political temperatures heating up ahead of the presidential election. The rejection of the Omnibus Law made the Company to recalculate the determination of employee benefits which would affect company profits. This study aims to analyze the magnitude of the impact between employee benefits and the cost of good manufacture to the gross profit of PT. Unilever Indonesia, Tbk.. Hypothesis test of this study becomes a reference in establishing the research method. By measuring the dependency between the influencing variables on the affected variable described the mind frame of the model. The analysis technique uses linear regression with the SPSS statistical program. The results of the study are: There is a significant impact between employee benefits on gross profit of 84.90 percent. There is a significant impact between cost of good manufacture on gross profit of 98.70 percent. And simultaneously there is a very significant impact of 99.10 percent between employee benefits and the cost of good manufacture to the gross profit of PT. Unilever Indonesia, Tbk.</em><em></em></p><p><strong><em>Keywords: </em></strong><em> </em><em>Employee Benefits, Cost of Good Manufacture, and Gross Profit</em><em></em></p>


JMIR Diabetes ◽  
10.2196/10324 ◽  
2019 ◽  
Vol 4 (3) ◽  
pp. e10324 ◽  
Author(s):  
Sally Jane Burford ◽  
Sora Park ◽  
Paresh Dawda

Background As digital healthcare expands to include the use of mobile devices, there are opportunities to integrate these technologies into the self-management of chronic disease. Purpose built apps for diabetes self-management are plentiful and vary in functionality; they offer capability for individuals to record, manage, display, and interpret their own data. The optimal incorporation of mobile tablets into diabetes self-care is little explored in research, and guidelines for use are scant. Objective The purpose of this study was to examine an individual’s use of mobile devices and apps in the self-management of type 2 diabetes to establish the potential and value of this ubiquitous technology for chronic healthcare. Methods In a 9-month intervention, 28 patients at a large multidisciplinary healthcare center were gifted internet connected Apple iPads with preinstalled apps and given digital support to use them. They were invited to take up predefined activities, which included recording their own biometrics, monitoring their diet, and traditional online information seeking. Four online surveys captured the participants’ perceptions and health outcomes throughout the study. This article reports on the qualitative analysis of the open-ended responses in all four surveys. Results Using apps, participants self-curated small data sets that included their blood glucose level, blood pressure, weight, and dietary intake. The dynamic visualizations of the data in the form of charts and diagrams were created using apps and participants were able to interpret the impact of their choices and behaviors from the diagrammatic form of their small personal data sets. Findings are presented in four themes: (1) recording personal data; (2) modelling and visualizing the data; (3) interpreting the data; and (4) empowering and improving health. Conclusions The modelling capability of apps using small personal data sets, collected and curated by individuals, and the resultant graphical information that can be displayed on tablet screens proves a valuable asset for diabetes self-care. Informed by their own data, individuals are well-positioned to make changes in their daily lives that will improve their health.


Author(s):  
Mona Adlakha

Mobile commerce is the next generation of e-commerce, where payments and financial transactions can be carried out with utmost ease using handheld mobile devices. Mobile devices are at a higher security risk due to the large amount of critical financial and personal data available on it. The cause or consequence of these threats could be - malware and spyware attacks ; multiple or incorrect m-Commerce payments; breaches due to unauthorized access or disclosure, unauthenticated transactions and risk due to the use of third party networks. This chapter discusses how to manage security risks in m-commerce by first identifying them and then discussing preventive measures for their mitigation. A continuous approach for risk prevention needs to be followed, reviewing the strategy according to the latest challenges. Various risk prevention and mitigation strategies can be adopted. Service providers must follow physical and digital security measures to protect consumer's business information. Independent auditing should ensure compliance with best practice security standards.


Author(s):  
Jonathan O'Donnell ◽  
Margaret Jackson ◽  
Marita Shelly ◽  
Julian Ligertwood

Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical mass and acceptance of a new service; training and technical issues, as well as staff acceptance issues; that privacy and security issues arise through the potential to track the location of people and through the amounts of personal data collected; difficulties in integrating with existing back-end systems; projects being affected by changes to legislation, or requiring changes to the law; and that while there is potential for mobile phone operators to develop new billing methods that become new models for issuing credit, they are not covered by existing credit laws. We have placed the case studies in a Fit-Viability framework and analyzed the issues according to key success criteria. While many organizations are keen to use the technology, they are struggling to find a compelling business case for adoption and that without a strong business case projects are unlikely to progress past the pilot stage.


2020 ◽  
pp. 66-75
Author(s):  
Ilya Livshitz ◽  

Abstract The purpose of the study is to analyze the existing requirements for personal data security and assess the impact of these requirements on the enterprises security in the Russian Federation. Research method: the problem of ensuring the security of personal data in accordance with the requirements of the Federal law of the Russian Federation FZ-152 and the international General Data Protection Regulation is investigated. The article analyzes the possible risks of interrupting the normal activities of enterprises in the Russian Federation due to violations of these requirements for personal data protection and the imposition of significant fines by international regulators. Numerical relationships are estimated between the amount of fines for violations of established requirements, including General Data Protection Regulation, and the cost of creating an effectiveness personal data protection system. Estimates of the permissible degree of influence of the General Data Protection Regulation requirements on the enterprises security in the Russian Federation are obtained. Research result: a study and comparison of possible penalties for violation of compliance with the requirements of the Federal law of the Russian Federation FZ-152 and the international General Data Protection Regulation was performed. Risk assessments of sanctions for violation of the established requirements for personal data protection were obtained. The analysis of the cost of preparing a personal data protection system for compliance with the requirements of the General Data Protection Regulation was performed. Based on the data obtained, examples of calculating the degree of maturity of the security system are presented – based on the ratio of the share of the budget allocated for security in relation to the cost of creating an effectiveness personal data protection system and based on the ratio of the amount of the fine for violation of the established requirements. The importance of accounting for the costs of personal data security to ensure the security of enterprises in the Russian Federation, taking into account the requirements of the General Data Protection Regulation, is shown


Author(s):  
Tetiana Zatonatska ◽  
Oleksandr Dluhopolskyi

The article describes the main characteristics, types and properties of cloud computing. The most widespread cloud technologies in Ukraine are analyzed. It is identified that the largest share among users of cloud technologies in Ukraine currently belong to large holdings, IT companies, commercial enterprises and banks, but other sectors of business are also involved in the development of these services. The aim of the article is to develop the methodology for evaluating the efficiency of cloud technologies implementation at enterprises and its experimental verification. The economic component of the cloud computing implementation at enterprises (expenditures and revenues of both cloud technology owners and users) is considered. The efficiency of using cloud computing at enterprises is proved. It is found that organizations usually do not use the power of their personal data centers to a full extent. This leads to idle equipment, extra cost on maintenance and servicing of hardware, amortization, staff salaries and etc. The feasibility of transition of enterprises to cloud computing in such situations has been proved, which considerably reduce the costs of the enterprise due to the absence of need for hardware and necessary staff to support the operation of information systems. Usability of the methodology of total cost of ownership in evaluating the effectiveness of using services for the enterprise has been proved. The proposed methodology compares the main costs of using personal data centers and the cost of using cloud computing. It is experimentally proven that in most cases, the cost of maintaining personal data center (PDC) is higher than the cost of cloud services. It is also proved that the efficiency of cloud technology operation depends on the internal structure and organization of computing processes inside the systems, as well as on external factors such as the size of enterprises-clients, industries, costs for the organization of data centers, etc. Cloud computing is an advanced technology which has future prospects and is cost-effective for both enterprise users and provider organizations.


Author(s):  
Keng Siau ◽  
Ee-Peng Lim ◽  
Zixing Shen

Advances in wireless technology increase the number of mobile device users and give pace to the rapid development of e-commerce using these devices. The new type of e-commerce, conducting transactions via mobile terminals, is called mobile commerce. Due to its inherent characteristics such as ubiquity, personalization, flexibility, and dissemination, mobile commerce promises business unprecedented market potential, great productivity, and high profitability. This paper presents an overview of mobile commerce development by examining the enabling technologies, the impact of mobile commerce on the business world, and the implications to mobile commerce providers. The paper also provides an agenda for future research in the area.


Sign in / Sign up

Export Citation Format

Share Document