scholarly journals Australian Case Studies in Mobile Commerce

Author(s):  
Jonathan O'Donnell ◽  
Margaret Jackson ◽  
Marita Shelly ◽  
Julian Ligertwood

Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical mass and acceptance of a new service; training and technical issues, as well as staff acceptance issues; that privacy and security issues arise through the potential to track the location of people and through the amounts of personal data collected; difficulties in integrating with existing back-end systems; projects being affected by changes to legislation, or requiring changes to the law; and that while there is potential for mobile phone operators to develop new billing methods that become new models for issuing credit, they are not covered by existing credit laws. We have placed the case studies in a Fit-Viability framework and analyzed the issues according to key success criteria. While many organizations are keen to use the technology, they are struggling to find a compelling business case for adoption and that without a strong business case projects are unlikely to progress past the pilot stage.

2017 ◽  
Vol 1 (2) ◽  
pp. 400
Author(s):  
Vasilios Zoumpoulidis ◽  
Aggelos Zoitsas ◽  
Vasilios Ferelis ◽  
Michael Nikolaidis

<p class="AbstractText">The mobile commerce, as an integral and often dominant part of a broader technological, economic and social system, is closely linked to environmental conditions that affect; this affects their decisions and strategy implemented. Undoubtedly, in the current era, the competition is increased and dominant in the market, pushing their bodies and citizens to abandon traditional and time-consuming methods of business functions, practices and yet purchases.</p><p class="AbstractText">The purpose of this study, it is the presentation and the penetration of mobile commerce to the citizens of Kavala. In particular, how they use their mobile devices in making purchases. The survey conducted in 2015 on a random sample of 220 people with criterion that the respondents have a mobile equipment. It was studied the use of wireless technologies in conjunction with the recognition and use of electronic commerce by both consumers and business world.</p><p class="AbstractText">The questionnaire has 47 questions concerning the population distribution, the advanced technology of their mobile devices, the interest for products and services provided by m-commerce and the security they feel. Finally, the respondents were asked for the purchases made by their mobile equipments and whether they were satisfied.</p>For the measurement of the research factors which appear in the conducted study, the method of multiple determinants variables were used. The data analysis was carried out with the use of the statistical program SPSS Statistics 19.0.<br />The conclusions of the survey is that despite the cost of use, the connection speeds, and security and misuse of personal data problems, the mobile commerce is in constant development due to the critical mass of the users who immediately and practically use their mobile devices.


2019 ◽  
Vol 13 (12) ◽  
pp. 21
Author(s):  
Mohammad awni ahmad mahmoud ◽  
laith Talal khrais ◽  
Rasha mohammad alolayan ◽  
Asyah muzahim alkaabi ◽  
Sara qasem Al- suwaidi ◽  
...  

The proliferation of mobile devices and the increased adoption of the internet across the globe has led to the rise of m-commerce. reports highlight that in spite of the different advancements in the technology, trust in the platform is still a significant hindrance to its adoption. Consequently, the current study seeks to identify privacy and security issues affecting m-commerce users of three shopping sites: Amazon, Alibaba and eBay. The aim here is to develop recommendations that mitigate these challenges. The expected output of the study is an anticipation for insights regarding user perspectives on trust in m-commerce and as a result, contribute to existent knowledge in the area benefitting regulatory bodies and online vendors.


Author(s):  
A. Denker

Abstract. The project of smart cities has emerged as a response to the challenges of twenty-first- century urbanization. Solutions to the fundamental conundrum of cities revolving around efficiency, convenience and security keep being sought by leveraging technology. Notwithstanding all the conveniences furnished by a smart city to all the citizens, privacy of a citizen is intertwined with the benefits of a smart city. The development processes which overlook privacy and security issues have left many of the smart city applications vulnerable to non-conventional security threats and susceptible to numerous privacy and personal data spillage risks. Among the challenges the smart city initiatives encounter, the emergence of the smartphone-big data-the cloud coalescence is perhaps the greatest, from the viewpoint of privacy and personal data protection. As our cities are getting digitalized, information comprising citizens' behavior, choices, and mobility, as well as their personal assets are shared over smartphone-big data-the cloud coalescences, thereby expanding cyber-threat surface and creating different security concerns. This coalescence refers to the practices of creating and analyzing vast sets of data, which comprise personal information. In this paper, the protection of privacy and personal data issues in the big data environment of smart cities are viewed through bifocal lenses, focusing on social and technical aspects. The protection of personal data and privacy in smart city enterprises is treated as a socio-technological operation where various actors and factors undertake different tasks. The article concludes by calling for novel developments, conceptual and practical changes both in technological and social realms.


2019 ◽  
pp. 1440-1459
Author(s):  
Sara Usmani ◽  
Faiza Rehman ◽  
Sajid Umair ◽  
Safdar Abbas Khan

The novel advances in the field of Information Technology presented the people pleasure, luxuries and ease. One of the latest expansions in the Information Technology (IT) industry is Cloud Computing, a technology that uses the internet for storage and access of data. It is also known as on-demand computing. The end user can access personal data and applications anywhere any time with a device having internet. Cloud Computing has gained an enormous attention but it results in the issues of data security and privacy as the data is scattered on different machines in different places across the globe which is a serious threat to the technology. It has many advantages like flexibility, efficiency and scalability but many of the companies are hesitant to invest in it due to privacy concerns. In this chapter, the objective is to review the privacy and security issues in cloud storage of Big Data and to enhance the security in cloud environment so that end users can enjoy a trustworthy and reliable data storage and access.


Author(s):  
Elizabeth Harrin

This chapter considers the reasons behind the lack of adoption of social media tools in a project environment. It discusses how project practitioners can overcome concerns about the lack of overall strategy, lack of senior management sponsorship, lack of a proven business case, security issues, information overload and the blurring of lines between professional and personal data online in order to realize the benefits of social and collaboration tools. It concludes that social tools are a fundamental part of the current and future project management landscape and that ‘social' should be intelligently incorporated into working practices in order to meet a need instead of being a response to outside trends.


Author(s):  
Kijpokin Kasemsap

This chapter reveals the prospect of mobile commerce (m-commerce); m-commerce and trust; m-commerce, privacy, and security issues; m-commerce adoption and technology acceptance model (TAM); and the significant perspectives on m-commerce. M-commerce is used for business transactions conducted by mobile phones for the promotional and financial activities using the wireless Internet connectivity. M-commerce is the important way to purchase the online items through online services. The main goal of m-commerce is to ensure that customers' shopping experience is well-suited to the smaller screen sizes that they can see on smartphones and tablets. Computer-mediated networks enable these transaction processes through electronic store searches and electronic point-of-sale capabilities. M-commerce brings the new possibility for businesses to sell and promote their products and services toward gaining improved productivity and business growth.


Author(s):  
Kijpokin Kasemsap

This chapter reveals the prospect of mobile commerce (m-commerce); m-commerce and trust; m-commerce, privacy, and security issues; m-commerce adoption and technology acceptance model (TAM); and the significant perspectives on m-commerce. M-commerce is used for business transactions conducted by mobile phones for the promotional and financial activities using the wireless Internet connectivity. M-commerce is the important way to purchase the online items through online services. The main goal of m-commerce is to ensure that customers' shopping experience is well-suited to the smaller screen sizes that they can see on smartphones and tablets. Computer-mediated networks enable these transaction processes through electronic store searches and electronic point-of-sale capabilities. M-commerce brings the new possibility for businesses to sell and promote their products and services toward gaining improved productivity and business growth.


Author(s):  
W. Dorner ◽  
F. Hau ◽  
R. Pagany

After the success of GNSS (Global Navigational Satellite Systems) and navigation services for public streets, indoor seems to be the next big development in navigational services, relying on RTLS – Real Time Locating Services (e.g. WIFI) and allowing seamless navigation. In contrast to navigation and routing services on public streets, seamless navigation will cause an additional challenge: how to make routing data accessible to defined users or restrict access rights for defined areas or only to parts of the graph to a defined user group? The paper will present case studies and data from literature, where seamless and especially indoor navigation solutions are presented (hospitals, industrial complexes, building sites), but the problem of restricted access rights was only touched from a real world, but not a technical perspective. The analysis of case studies will show, that the objective of navigation and the different target groups for navigation solutions will demand well defined access rights and require solutions, how to make only parts of a graph to a user or application available to solve a navigational task. The paper will therefore introduce the concept of private graphs, which is defined as a graph for navigational purposes covering the street, road or floor network of an area behind a public street and suggest different approaches how to make graph data for navigational purposes available considering access rights and data protection, privacy and security issues as well.


2016 ◽  
pp. 1875-1893
Author(s):  
Elizabeth Harrin

This chapter considers the reasons behind the lack of adoption of social media tools in a project environment. It discusses how project practitioners can overcome concerns about the lack of overall strategy, lack of senior management sponsorship, lack of a proven business case, security issues, information overload and the blurring of lines between professional and personal data online in order to realize the benefits of social and collaboration tools. It concludes that social tools are a fundamental part of the current and future project management landscape and that ‘social' should be intelligently incorporated into working practices in order to meet a need instead of being a response to outside trends.


Author(s):  
W. Dorner ◽  
F. Hau ◽  
R. Pagany

After the success of GNSS (Global Navigational Satellite Systems) and navigation services for public streets, indoor seems to be the next big development in navigational services, relying on RTLS – Real Time Locating Services (e.g. WIFI) and allowing seamless navigation. In contrast to navigation and routing services on public streets, seamless navigation will cause an additional challenge: how to make routing data accessible to defined users or restrict access rights for defined areas or only to parts of the graph to a defined user group? The paper will present case studies and data from literature, where seamless and especially indoor navigation solutions are presented (hospitals, industrial complexes, building sites), but the problem of restricted access rights was only touched from a real world, but not a technical perspective. The analysis of case studies will show, that the objective of navigation and the different target groups for navigation solutions will demand well defined access rights and require solutions, how to make only parts of a graph to a user or application available to solve a navigational task. The paper will therefore introduce the concept of private graphs, which is defined as a graph for navigational purposes covering the street, road or floor network of an area behind a public street and suggest different approaches how to make graph data for navigational purposes available considering access rights and data protection, privacy and security issues as well.


Sign in / Sign up

Export Citation Format

Share Document