Menu Expand
Mobile Commerce and Wireless Computing Systems

Mobile Commerce and Wireless Computing Systems

Geoffrey Elliott | Nigel Phillips

(2007)

Additional Information

Book Details

Abstract

As content delivery over wireless devices becomes faster and more secure, it is thought that mobile commerce (m-commerce) will overtake tethered e-commerce as the medium of choice for digital commerce transactions. As well as the obvious effect on financial services (mobile banking), telecommunications, and retail and information services (such as video delivery of sports results) it is also likely to have a profound effect on the way a wide variety of businesses arrange for people to meet and interact.

This book explores the theory and practice of both the technical and business domains of m-commerce, particularly wireless networking and mobile commerce applications, as well as discussing the 'what, why and how' of m-commerce. The book starts by covering the theoretical underpinning of the subject, before going on to put the theory into practice, covering the technologies, approaches, applications and design issues.


Table of Contents

Section Title Page Action Price
Cover Cover
Mobile Commerce and Wireless Computing Systems i
Contents v
Preface xv
Acknowledgements xvii
Mobile Commerce (M-commerce): definitions and context 1
Defining M-commerce 3
A short history of wireless computing 4
Diffusion of M-commerce innovation 10
Obstacles to M-commerce 11
The Mobile Internet and mobile information assets 12
The untethered Mobile Internet 15
M-commerce versus E-commerce 20
The wireless world 21
Pervasive computing systems, theory and practice 23
Trends in mobile and pervasive computing 24
Applications of M-commerce 26
The trend towards mobile working 27
Effectiveness and efficiency in mobile domains 32
The M-commerce value chain 33
Networked wireless business systems 37
Bluetooth technology 37
Factors determining M-commerce innovation and adoption in the 21st century 38
Conclusions 44
Commercial communications and networks 49
Introduction 51
The nature of commercial communication 54
Communication and language complexity 55
Information and meaning 58
Data and knowledge 63
Shared meaning 64
Communication and information theory 66
Telecommunications and networks 69
Media types in telecommunications 72
Modulation and digitization 75
Communications network infrastructures 76
Types of channel 79
The International Standards Organization reference model 81
Transport Control Protocol/Internet Protocol (TCP/IP) 87
Communications network devices 89
Network topologies 91
Conclusions 96
Wireless protocols: context and usage 101
Introduction 103
Wireless cellular phone networks 105
The Wireless Applications Protocol (WAP) 117
WAP architecture layers 122
WAP functionality and adaptation 127
Service bearer adaptation 129
Comparison of wireless and wired network Internet protocols 130
The integration of WAP and TCP/IP within the OSI architecture model 132
The Mobile Internet 135
The Mobile Internet–services and products 139
Other wireless Internet providers 142
A case study of iMode 143
A comparison of WAP and iMode 148
WAP and iMode billing models 149
Conclusions 151
Wireless programming for mobile devices: context and usage 157
Introduction 159
The development and use of the xHTML 161
WML and xHTML convergence 162
A comparison of WML and xHTML transmission protocols 164
Creating an Internet WAP site 165
Developing a basic WAP site using WML 170
WML and WML Script 172
The WML language basics – elements and attributes 173
WML deck navigation – event and task handling 177
Push and pull browsing 182
WML option menus and variables 183
Passwords and security in WML 190
Handling text formatting, tables and images in WML 192
Capturing and sending information within the WAP environment 194
Application and web server access security 196
WML Scripting within the WAP environment 196
WML Script libraries 201
WML Script statements 202
WAP site usability issues 205
Hosting WAP sites 206
Conclusions 207
Operating systems: micro and mobile devices 217
Introduction 219
Target devices 219
Mobile-specific operating systems requirements 222
Operating systems basics for wireless understanding 224
Operating system abstractions 227
Information protection and security 231
Scheduling and resource management 232
Dividing to rule 234
Modern operating system concepts 236
Operating systems requirements for mobile devices 239
Mobile applications 244
The Java Virtual Machine (JVM) 247
Mobile device operating systems 252
Comparisons of mobile device platforms 260
Conclusions 262
Personal area and mobile networking 267
Introduction 269
The development of area networks 270
Wireless-enabled domestic appliances 276
Environment characteristics 277
Local Area Networks (LANs) 279
Wireless networks 281
Personal area network intelligent gateways 285
Bluetooth technology 287
Bluetooth radio frequency channels 289
Bluetooth piconets 290
Establishing and maintaining wireless connections 292
The physical connection 296
Wireless surveillance 300
Wireless service discovery and use 301
Conclusions 305
Wireless applications: push and pull services and products 311
Introduction 313
WAP push and pull messaging 314
The Short Message Service (SMS) 316
SMS pricing 318
Push profiling 318
Profiling cookies 319
Base platform services 320
M-commerce services for consumers 324
Electronic cash (e-cash) 326
Mobile electronic banking (e-banking) 327
Mobile alerts 330
Mobile gambling 330
M-commerce services for business 331
Wireless Internet business model 335
Mobility and location 338
Mobile systems thinking 343
Wireless business applications 345
The economics of wireless Internet data 353
Mobile Multimedia Portals (MMPs) 356
Conclusions 357
Pervasive and embedded mobile systems 363
Defining pervasive computing 365
Technologies within the pervasive computing domain 368
Networked pervasive computing 370
Embedded systems ergonomics 373
Wearable computing 374
Biometric systems 380
Biometric issues and systems security 383
Biometric systems applications 386
Biometric systems integration 388
Digital signatures 389
Automobile telematics and vehicle telemetry 391
In-vehicle user interfaces and applications 393
Universal Information Appliances (UIAs) 397
Obstacles in pervasive computing 399
Conclusions 400
Security in a mobile world 409
Introduction 411
Aspects of security 412
Wireless network security 415
Access control 418
Encryption 420
The Diffie-Hellman key agreement method 424
Security aspects of wireless networks 425
Wide area wireless network security – 3G 426
Wireless Local Area Network (WLAN) security features 433
Bluetooth and Personal Area Network (PAN) security 438
Bluetooth baseband security 440
Bluetooth security profiles 443
The headset security model 444
Securing small devices 447
Conclusions 448
Enabling the mobile workforce: extending enterprise applications 453
The agile and mobile workforce 455
Supporting the mobile workforce 457
Mobile systems development 460
Issues in M-commerce 462
Privacy 463
Social, ethical and legal issues 463
Ethical business behaviour 465
Ethical issues 466
Ethical dilemmas in wireless business systems 467
Rights and duties, and privileges and responsibilities 468
Trust and control 470
Surveillance 474
Data protection 475
Impact analysis using a real-world case study 481
Conclusions 483
M-commerce glossary 511
Index 523