M-Commerce

Author(s):  
Raymond R. Panko

In the next few years, we are likely to see dramatically improved wireless communication technologies and small handheld access devices (HADs) such as Internet-enabled cellphones and personal digital assistants (PDAs). These converging trends open new possibilities for electronic commerce. These new possibilities often are discussed under the banner of m-commerce or mobile electronic commerce. This chapter looks at device trends, wireless communication trends, potential applications and potential problems in m-commerce.

Author(s):  
D. Santos ◽  
Jose Luis do Nascimento ◽  
Hyggo Almeida ◽  
Angelo Perkusich

In the past few years, industry has introduced cellular phones with increasing processing capabilities and powerful wireless communication technologies. These wireless technologies provide the user with mechanisms to easily access services, enabling file sharing among devices with the same technology interfaces (Mallick, 2003). In the context of electronic commerce, which demands new techniques and technologies to attract consumers, these wireless technologies aim to simplify the shopping process and provide up-to-date information about available products.


Author(s):  
Samuel Pierre

Electronic commerce or e-commerce can be briefly defined as a financial transaction or commercial information between two parties based on data transmitted over communication networks (Soriano & Ponce, 2002). It relies upon users’ interventions to initiate a transaction and select the main steps of the process. Users’ actions stem from a succession of virtual decisions. Indeed, when shopping with a virtual catalog, customers can select products which meet their needs, tastes, and respect their price range. Such decisions consistently require the users’ input, thus costing them both time and money. These costs are even more exorbitant when a search is launched for an order that includes a variety of products from different sources which have different characteristics (price range, delivery dates, etc.). When transactions involve users who are moving or take place over mobile networks, this is referred to as mobile electronic commerce, a specific type of e-commerce. Mobile electronic commerce (or m-commerce) refers to an ability to carry out wireless commercial transactions using mobile applications within mobile devices, such as mobile phones and personal digital assistants (PDAs). It is generally defined as the set of transactions or processes which can be carried out over a wireless mobile network. According to this definition, m-commerce constitutes a subset of all electronic commercial transactions (electronic commerce or e-commerce) from business to consumer (B2C) or business to business (B2B). Thus, short personal messages such as those from SMS (short messaging system) sent between two individuals do not fall into the category of m-commerce, whereas messages from a service provider to a salesperson or a consumer, or vice versa, do fit this very definition. M-commerce appears as an emerging manifestation of Internet electronic commerce which meshes together concepts such as the Internet, mobile computing, and wireless telecommunications in order to provide an array of sophisticated services (m-services) to mobile users (Varshney, Vetter, & Kalakota, 2000; Veijalainen, Terziyan, & Tirri, 2003). E-commerce includes an initial step where consumers search for a product they wish to purchase by virtually visiting several merchants. Once the product is found, negotiations can take place between the customer and the merchant (electronic negotiation or e-negotiation) (Paurobally, Turner, & Jennings, 2003). If an agreement is reached, the next step is the payment phase. At each step of the process, some problems arise, such as transaction security, confidence in the payment protocol, bandwidth limitations, quality of service, shipping delays, and so forth (Younas, Chao, & Anane, 2003; Zhang, Yuan, & Archer, 2002). The peak withdrawal periods have always presented a major challenge for certain types of distributed applications. The advent of m-commerce further highlights this problem. Indeed, in spite of rather optimistic predictions, m-commerce is plagued by several handicaps which hinder its commercial development, security being the main one. Many market research studies, like those carried out by Strategy Analytics and the Gartner Group, predicted that by 2004 there would be over one billion wireless device users, some 600 million wireless Internet subscribers, a $200 billion m-commerce market, and 40% of consumer-to-business e-commerce will take place over Web-enabled phones (Gosh & Swaminatha, 2004). However, these business opportunities could be compromised by new security risks specific to the wireless medium and devices. As a result, the potential boom in the number of new m-commerce applications and markets can be achieved if and only if security and privacy can be integrated into online m-commerce applications. This article analyzes some major security issues concerning mobile commerce. The next section presents background and related work, followed by a summary of some security issues and challenges. Future and emerging trends in secure m-commerce are then outlined, and the article is concluded.


2009 ◽  
pp. 2653-2659 ◽  
Author(s):  
Samuel Pierre

Electronic commerce or e-commerce can be briefly defined as a financial transaction or commercial information between two parties based on data transmitted over communication networks (Soriano & Ponce, 2002). It relies upon users’ interventions to initiate a transaction and select the main steps of the process. Users’ actions stem from a succession of virtual decisions. Indeed, when shopping with a virtual catalog, customers can select products which meet their needs, tastes, and respect their price range. Such decisions consistently require the users’ input, thus costing them both time and money. These costs are even more exorbitant when a search is launched for an order that includes a variety of products from different sources which have different characteristics (price range, delivery dates, etc.). When transactions involve users who are moving or take place over mobile networks, this is referred to as mobile electronic commerce, a specific type of e-commerce. Mobile electronic commerce (or m-commerce) refers to an ability to carry out wireless commercial transactions using mobile applications within mobile devices, such as mobile phones and personal digital assistants (PDAs). It is generally defined as the set of transactions or processes which can be carried out over a wireless mobile network. According to this definition, m-commerce constitutes a subset of all electronic commercial transactions (electronic commerce or e-commerce) from business to consumer (B2C) or business to business (B2B). Thus, short personal messages such as those from SMS (short messaging system) sent between two individuals do not fall into the category of m-commerce, whereas messages from a service provider to a salesperson or a consumer, or vice versa, do fit this very definition. M-commerce appears as an emerging manifestation of Internet electronic commerce which meshes together concepts such as the Internet, mobile computing, and wireless telecommunications in order to provide an array of sophisticated services (m-services) to mobile users (Varshney, Vetter, & Kalakota, 2000; Veijalainen, Terziyan, & Tirri, 2003). E-commerce includes an initial step where consumers search for a product they wish to purchase by virtually visiting several merchants. Once the product is found, negotiations can take place between the customer and the merchant (electronic negotiation or e-negotiation) (Paurobally, Turner, & Jennings, 2003). If an agreement is reached, the next step is the payment phase. At each step of the process, some problems arise, such as transaction security, confidence in the payment protocol, bandwidth limitations, quality of service, shipping delays, and so forth (Younas, Chao, & Anane, 2003; Zhang, Yuan, & Archer, 2002). The peak withdrawal periods have always presented a major challenge for certain types of distributed applications. The advent of m-commerce further highlights this problem. Indeed, in spite of rather optimistic predictions, m-commerce is plagued by several handicaps which hinder its commercial development, security being the main one.


2008 ◽  
pp. 654-659
Author(s):  
D. Santos ◽  
Jose Luis do Nascimento ◽  
Hyggo Almeida ◽  
Angelo Perkusich

In the past few years, industry has introduced cellular phones with increasing processing capabilities and powerful wireless communication technologies. These wireless technologies provide the user with mechanisms to easily access services, enabling file sharing among devices with the same technology interfaces (Mallick, 2003). In the context of electronic commerce, which demands new techniques and technologies to attract consumers, these wireless technologies aim to simplify the shopping process and provide up-to-date information about available products.


Author(s):  
Michail Yu. Maslov ◽  
Yuri M. Spodobaev

Telecommunications industry evolution shows the highest rates of transition to high-tech systems and is accompanied by a trend of deep mutual penetration of technologies - convergence. The dominant telecommunication technologies have become wireless communication systems. The widespread use of modern wireless technologies has led to the saturation of the environment with technological electromagnetic fields and the actualization of the problems of protecting the population from them. This fundamental restructuring has led to a uniform dense placement of radiating fragments of network technologies in the mudflow areas. The changed parameters of the emitted fields became the reason for the revision of the regulatory and methodological support of electromagnetic safety. A fragmented structural, functional and parametric analysis of the problem of protecting the population from the technological fields of network technologies revealed uncertainty in the interpretation of real situations, vulnerability, weakness and groundlessness of the methodological basis of sanitary-hygienic approaches. It is shown that this applies to all stages of the electromagnetic examination of the emitting fragments of network technologies. Distrust arises on the part of specialists and the population in not only the system of sanitary-hygienic control, but also the safety of modern network technologies is being called into question. Growing social tensions and radio phobia are everywhere accompanying the development of wireless communication technologies. The basis for solving almost all problems of protecting the population can be the transfer of subjective methods and means of monitoring and sanitary-hygienic control of electromagnetic fields into the field of IT.


Author(s):  
Senthil Prabu Ramalingam ◽  
Prabhakar Karthikeyan Shanmugam

Background: The smart grid communication network is constructed with three tiers namely, Home Area Networks (HANs), Neighborhood Area Networks (NANs) and Wide Area Networks (WANs). These networks function with various communication protocols like table protocol, on-demand protocol, Wi-Fi, Zigbee, Z-Wave, Wi-MAX, GSM, LTE, Cognitive Radio Networks. The network interconnection is heterogonous and all appliances have to communicate through the IP gateways. A large amount of data is collected from various sensors placed in different locations. The analytics on large data- “big data” is essential because these data were used to organize and plan an efficient control and management of the smart home including secured data exchange in different sectors. Objective: This paper investigates broadly on data rate, channel bandwidth, power consumption, and a coverage range of both wired and wireless communication technologies used in residential buildings. Besides, a literature survey on optimization algorithms with various constraints to manage home appliances through scheduling is included. The paper also discusses the communication standards along with security and privacy requirements for smart metering networks. Conclusion: Discussion on IEEE standards for both wired and wireless communication protocols. Gives direction to identify the suitable communication technique through mathematical model for computing the communication channel bandwidth. Comparison of various optimization algorithms with multiple constraints in HEMS to achieve the minimum electricity cost and user comfort (with and without Renewable Energy Sources). From the investigation on both wired and wireless networks, the wireless communication networks (Zig-Bee & Wi-Fi) are mostly preferred to use in HAN because of more reliability and low cost. Zigbee is the most appropriate technology used for data transmission between the individual appliances and smart meters. Wi-Fi is a suitable technology for controlling and monitoring appliances because of its high data rate.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 4075 ◽  
Author(s):  
Ali Balador ◽  
Anis Kouba ◽  
Dajana Cassioli ◽  
Fotis Foukalas ◽  
Ricardo Severino ◽  
...  

Cooperative Cyber-Physical Systems (Co-CPSs) can be enabled using wireless communication technologies, which in principle should address reliability and safety challenges. Safety for Co-CPS enabled by wireless communication technologies is a crucial aspect and requires new dedicated design approaches. In this paper, we provide an overview of five Co-CPS use cases, as introduced in our SafeCOP EU project, and analyze their safety design requirements. Next, we provide a comprehensive analysis of the main existing wireless communication technologies giving details about the protocols developed within particular standardization bodies. We also investigate to what extent they address the non-functional requirements in terms of safety, security and real time, in the different application domains of each use case. Finally, we discuss general recommendations about the use of different wireless communication technologies showing their potentials in the selected real-world use cases. The discussion is provided under consideration in the 5G standardization process within 3GPP, whose current efforts are inline to current gaps in wireless communications protocols for Co-CPSs including many future use cases.


Sign in / Sign up

Export Citation Format

Share Document