Study on Location Based Services Driven Mobile E-Commerce System

2013 ◽  
Vol 734-737 ◽  
pp. 3214-3219
Author(s):  
Hai Dong Zhong ◽  
Ping Li ◽  
Shao Zhong Zhang ◽  
Wen Ting Yuan ◽  
Xu Dong Zhao ◽  
...  

With the tremendous advances in mobile computing and communication capabilities, rapid proliferation of mobile devices, increasing powerful functions, and decreasing device costs, we are seeing a explosively growth in mobile e-commerce in various consumer and business markets. On the basis of analyzing demands of both buyers and seller in mobile e-commerce, the paper put forward a novel concept and technological framework of Location Based Services (LBS) driven mobile e-commerce. Some LBS related functions, in mobile device terminal, of the prototype system based on the architecture put forward are implemented. Also, some key issues of LBS based mobile e-commerce, such as positioning accuracy and new privacy and security risks, are discussed in detail.

Author(s):  
Robin Deegan

Humans are approaching a new and intriguing time with regards to Mobile Human Computer Interaction. For years we have observed the processing power, memory capabilities and battery life of the mobile device increase exponentially. While at the same time mobile devices were converging with additional technologies such as increased connectivity, external peripherals, GPS and location based services etc. But what are the cognitive costs associated with these advancements? The software used on mobile devices is also becoming more sophisticated, demanding more from our limited mental resources. Furthermore, this complex software is being used in distracting environments such as in cars, busses, trains and noisy communal areas. These environments, themselves, have steadily become increasingly more complex and cognitively demanding. Increasingly complex software, installed on increasingly complex mobile devices, being used in increasing complex environments is presenting Mobile HCI with serious challenges. This paper presents a brief overview of five experiments before presenting a final experiment in detail. These experiments attempt to understand the relationship between cognition, distraction, usability and performance. The research determines that some distractions affect usability and not performance while others affect performance but not usability. This paper concludes with a reinforced argument for the development of a cognitive load aware system.


Author(s):  
Pramod Sharma ◽  
Devon Nugent

This chapter focuses on Mobile GIS (MGIS), which uses wireless networks and small screen mobile devices (such as PDAs and smartphones) to collect or deliver real time, location specific information and services. Such services can be divided into field and consumer (location based services) GIS applications. The use of wireless networks and small screen devices, introduce a series of challenges, not faced by desktop or wired internet GIS applications. This chapter discusses the challenges faced by mobile GIS (e.g. small screen, bandwidth, positioning accuracy, interoperability, etc.) and the various means of overcoming these problems, including the rapid advances in relevant technologies. Despite the challenges, many efficient and effective Mobile GIS applications have been developed, offering a glimpse of the potential market.


2012 ◽  
Vol 9 (1) ◽  
pp. 1-21 ◽  
Author(s):  
Won-Ik Park ◽  
Sanggil Kang ◽  
Young-Kuk Kim

With the development and diffusion of compact and portable mobile devices, users can use multimedia content such as music and movie on personal mobile devices, anytime and anywhere. However, even with the rapid development of mobile device technology, it is still not easy to search multimedia content or manage large volume of content in a mobile device with limited resources. To resolve these problems, an approach for recommending content on the server-side is one of the popular solutions. However, the recommendation in a server also leads to some problems like the scalability for a lot of users and the management of personal information. Therefore, this paper defines a personal content manager which acts between content providers (server) and mobile devices and proposes a method for recommending multimedia content in the personal content manager. For the recommendation based on user's personal characteristic and preference, this paper adopts and applies the DISC model which is verified in psychology field for classifying user's behavior pattern. The proposed recommendation method also includes an algorithm for reflecting dynamic environmental context. Through the implements and evaluation of a prototype system, this paper shows that the proposed method has acceptable performance for multimedia content recommendation.


2014 ◽  
Vol 22 (1) ◽  
pp. 97-114 ◽  
Author(s):  
Mark A. Harris ◽  
Karen P. Patten

Purpose – This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, invest in less expensive minimum security technologies with increased risk, or postpone the business mobility strategy in order to protect enterprise and customer data and information. This paper investigates mobile device security and the implications of security recommendations for SMEs. Design/methodology/approach – This conceptual paper reviews mobile device security research, identifies increased security risks, and recommends security practices for SMEs. Findings – This paper identifies emerging mobile device security risks and provides a set of minimum mobile device security recommendations practical for SMEs. However, SMEs would still have increased security risks versus large enterprises who can implement maximum mobile device security recommendations. SMEs are faced with a dilemma: embrace the mobility business strategy and adopt and invest in the necessary security technology, implement minimum precautions with increased risk, or give up their mobility business strategy. Practical implications – This paper develops a practical list of minimum mobile device security recommendations for SMEs. It also increases the awareness of potential security risks for SMEs from mobile devices. Originality/value – This paper expands previous research investigating SME adoption of computers, broadband internet-based services, and Wi-Fi by adding mobile devices. It describes the SME competitive advantages from adopting mobile devices for enterprise business mobility, while accentuating the increased business risks and implications for SMEs.


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 1950
Author(s):  
David Gualda ◽  
María Carmen Pérez-Rubio ◽  
Jesús Ureña ◽  
Sergio Pérez-Bachiller ◽  
José Manuel Villadangos ◽  
...  

Indoor positioning remains a challenge and, despite much research and development carried out in the last decade, there is still no standard as with the Global Navigation Satellite Systems (GNSS) outdoors. This paper presents an indoor positioning system called LOCATE-US with adjustable granularity for use with commercial mobile devices, such as smartphones or tablets. LOCATE-US is privacy-oriented and allows every device to compute its own position by fusing ultrasonic, inertial sensor measurements and map information. Ultrasonic Local Positioning Systems (U-LPS) based on encoded signals are placed in critical zones that require an accuracy below a few decimeters to correct the accumulated drift errors of the inertial measurements. These systems are well suited to work at room level as walls confine acoustic waves inside. To avoid audible artifacts, the U-LPS emission is set at 41.67 kHz, and an ultrasonic acquisition module with reduced dimensions is attached to the mobile device through the USB port to capture signals. Processing in the mobile device involves an improved Time Differences of Arrival (TDOA) estimation that is fused with the measurements from an external inertial sensor to obtain real-time location and trajectory display at a 10 Hz rate. Graph-matching has also been included, considering available prior knowledge about the navigation scenario. This kind of device is an adequate platform for Location-Based Services (LBS), enabling applications such as augmented reality, guiding applications, or people monitoring and assistance. The system architecture can easily incorporate new sensors in the future, such as UWB, RFiD or others.


2014 ◽  
Vol 6 (2) ◽  
pp. 73-78
Author(s):  
Sonia Chiasson ◽  
Heather Crawford ◽  
Serge Egelman ◽  
Pourang Irani

The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI'13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or even novice users, regularly making important decisions while their main focus is on other primary tasks. This is especially true for mobile devices where users can quickly and easily install apps, where user interfaces are minimal due to space constraints, and where users are often distracted by their environment. Likewise, mobile devices present unique privacy and security risks because they allow third-party applications access to personal information and sensor data. The amount and sensitivity of such personally identifying information is likely to increase as device functionality increases. The convergence of these factors means that improvements to security and privacy provisions on mobile devices are becoming increasingly important. Workshop participants had a chance to explore mobile device usage and the unique usable security and privacy challenges that arise, discuss proposed systems and ideas that address these needs, and work towards the development of design principles to inform future development in the area.


2017 ◽  
Vol 7 (2) ◽  
pp. 120
Author(s):  
Nur Imansyah ◽  
Sri Handani Widiastuti

Getting information in real time at specific times and locations is especially needed when users have high mobility. But often users are not familiar with the area, so difficulty in finding locations and information. The development of technology for location based services and augmented reality makes it easy to get information from available resources in locations using mobile devices equipped with GPS devices. The research aims to combine hotel location based services and augmented reality in android-based mobile device by manipulating virtual objects into real objects through the camera as input and mobile phone display as output.The integration of hotel location based services and augmented reality is useful for hotel users to be able to search hotel information by directing the camera mobile device in the direction of specific targets to be retrieved information. The output of the system is provided in real time on the mobile device display for the user. Output information provided in the direction of location of the hotel object and information about the object of the hotel. 


Mobile devices have several sensors, including GPS that can capture information about the location of a mobile user. The use of certain devices will, therefore, simplify services and make it simpler for operators to respond to the demands of mobile users. The main aim of this analysis is to incorporate middleware to pick suitable cloud services that leverage from mobile device position and cost preferences. If the number of small activities within a meta feature exceeds the number of major work, the Max min algorithm device operations are conducted in addition to big tasks, where the design of the process is dependent on how many functions it does. The model is wide since tasks cannot be conducted simultaneously. A new amendment to the computation system is used to overcome the drawbacks of the Max-Min algorithm. It encompasses the positives of Max-Min and eliminates drawbacks. This study focuses specifically on the number of resources and incidents. The work can be further expanded with the algorithm suggested for the cloud system and several other parameters such as scalability, performance, reliability, and others can be taken into account.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2208
Author(s):  
Jesús D. Trigo ◽  
Óscar J. Rubio ◽  
Miguel Martínez-Espronceda ◽  
Álvaro Alesanco ◽  
José García ◽  
...  

Mobile devices and social media have been used to create empowering healthcare services. However, privacy and security concerns remain. Furthermore, the integration of interoperability biomedical standards is a strategic feature. Thus, the objective of this paper is to build enhanced healthcare services by merging all these components. Methodologically, the current mobile health telemonitoring architectures and their limitations are described, leading to the identification of new potentialities for a novel architecture. As a result, a standardized, secure/private, social-media-based mobile health architecture has been proposed and discussed. Additionally, a technical proof-of-concept (two Android applications) has been developed by selecting a social media (Twitter), a security envelope (open Pretty Good Privacy (openPGP)), a standard (Health Level 7 (HL7)) and an information-embedding algorithm (modifying the transparency channel, with two versions). The tests performed included a small-scale and a boundary scenario. For the former, two sizes of images were tested; for the latter, the two versions of the embedding algorithm were tested. The results show that the system is fast enough (less than 1 s) for most mHealth telemonitoring services. The architecture provides users with friendly (images shared via social media), straightforward (fast and inexpensive), secure/private and interoperable mHealth services.


Sign in / Sign up

Export Citation Format

Share Document