Additional Information
Book Details
Abstract
As content delivery over wireless devices becomes faster and more secure, it is thought that mobile commerce (m-commerce) will overtake tethered e-commerce as the medium of choice for digital commerce transactions. As well as the obvious effect on financial services (mobile banking), telecommunications, and retail and information services (such as video delivery of sports results) it is also likely to have a profound effect on the way a wide variety of businesses arrange for people to meet and interact.
This book explores the theory and practice of both the technical and business domains of m-commerce, particularly wireless networking and mobile commerce applications, as well as discussing the 'what, why and how' of m-commerce. The book starts by covering the theoretical underpinning of the subject, before going on to put the theory into practice, covering the technologies, approaches, applications and design issues.
Table of Contents
Section Title | Page | Action | Price |
---|---|---|---|
Cover | Cover | ||
Mobile Commerce and Wireless Computing Systems | i | ||
Contents | v | ||
Preface | xv | ||
Acknowledgements | xvii | ||
Mobile Commerce (M-commerce): definitions and context | 1 | ||
Defining M-commerce | 3 | ||
A short history of wireless computing | 4 | ||
Diffusion of M-commerce innovation | 10 | ||
Obstacles to M-commerce | 11 | ||
The Mobile Internet and mobile information assets | 12 | ||
The untethered Mobile Internet | 15 | ||
M-commerce versus E-commerce | 20 | ||
The wireless world | 21 | ||
Pervasive computing systems, theory and practice | 23 | ||
Trends in mobile and pervasive computing | 24 | ||
Applications of M-commerce | 26 | ||
The trend towards mobile working | 27 | ||
Effectiveness and efficiency in mobile domains | 32 | ||
The M-commerce value chain | 33 | ||
Networked wireless business systems | 37 | ||
Bluetooth technology | 37 | ||
Factors determining M-commerce innovation and adoption in the 21st century | 38 | ||
Conclusions | 44 | ||
Commercial communications and networks | 49 | ||
Introduction | 51 | ||
The nature of commercial communication | 54 | ||
Communication and language complexity | 55 | ||
Information and meaning | 58 | ||
Data and knowledge | 63 | ||
Shared meaning | 64 | ||
Communication and information theory | 66 | ||
Telecommunications and networks | 69 | ||
Media types in telecommunications | 72 | ||
Modulation and digitization | 75 | ||
Communications network infrastructures | 76 | ||
Types of channel | 79 | ||
The International Standards Organization reference model | 81 | ||
Transport Control Protocol/Internet Protocol (TCP/IP) | 87 | ||
Communications network devices | 89 | ||
Network topologies | 91 | ||
Conclusions | 96 | ||
Wireless protocols: context and usage | 101 | ||
Introduction | 103 | ||
Wireless cellular phone networks | 105 | ||
The Wireless Applications Protocol (WAP) | 117 | ||
WAP architecture layers | 122 | ||
WAP functionality and adaptation | 127 | ||
Service bearer adaptation | 129 | ||
Comparison of wireless and wired network Internet protocols | 130 | ||
The integration of WAP and TCP/IP within the OSI architecture model | 132 | ||
The Mobile Internet | 135 | ||
The Mobile Internet–services and products | 139 | ||
Other wireless Internet providers | 142 | ||
A case study of iMode | 143 | ||
A comparison of WAP and iMode | 148 | ||
WAP and iMode billing models | 149 | ||
Conclusions | 151 | ||
Wireless programming for mobile devices: context and usage | 157 | ||
Introduction | 159 | ||
The development and use of the xHTML | 161 | ||
WML and xHTML convergence | 162 | ||
A comparison of WML and xHTML transmission protocols | 164 | ||
Creating an Internet WAP site | 165 | ||
Developing a basic WAP site using WML | 170 | ||
WML and WML Script | 172 | ||
The WML language basics – elements and attributes | 173 | ||
WML deck navigation – event and task handling | 177 | ||
Push and pull browsing | 182 | ||
WML option menus and variables | 183 | ||
Passwords and security in WML | 190 | ||
Handling text formatting, tables and images in WML | 192 | ||
Capturing and sending information within the WAP environment | 194 | ||
Application and web server access security | 196 | ||
WML Scripting within the WAP environment | 196 | ||
WML Script libraries | 201 | ||
WML Script statements | 202 | ||
WAP site usability issues | 205 | ||
Hosting WAP sites | 206 | ||
Conclusions | 207 | ||
Operating systems: micro and mobile devices | 217 | ||
Introduction | 219 | ||
Target devices | 219 | ||
Mobile-specific operating systems requirements | 222 | ||
Operating systems basics for wireless understanding | 224 | ||
Operating system abstractions | 227 | ||
Information protection and security | 231 | ||
Scheduling and resource management | 232 | ||
Dividing to rule | 234 | ||
Modern operating system concepts | 236 | ||
Operating systems requirements for mobile devices | 239 | ||
Mobile applications | 244 | ||
The Java Virtual Machine (JVM) | 247 | ||
Mobile device operating systems | 252 | ||
Comparisons of mobile device platforms | 260 | ||
Conclusions | 262 | ||
Personal area and mobile networking | 267 | ||
Introduction | 269 | ||
The development of area networks | 270 | ||
Wireless-enabled domestic appliances | 276 | ||
Environment characteristics | 277 | ||
Local Area Networks (LANs) | 279 | ||
Wireless networks | 281 | ||
Personal area network intelligent gateways | 285 | ||
Bluetooth technology | 287 | ||
Bluetooth radio frequency channels | 289 | ||
Bluetooth piconets | 290 | ||
Establishing and maintaining wireless connections | 292 | ||
The physical connection | 296 | ||
Wireless surveillance | 300 | ||
Wireless service discovery and use | 301 | ||
Conclusions | 305 | ||
Wireless applications: push and pull services and products | 311 | ||
Introduction | 313 | ||
WAP push and pull messaging | 314 | ||
The Short Message Service (SMS) | 316 | ||
SMS pricing | 318 | ||
Push profiling | 318 | ||
Profiling cookies | 319 | ||
Base platform services | 320 | ||
M-commerce services for consumers | 324 | ||
Electronic cash (e-cash) | 326 | ||
Mobile electronic banking (e-banking) | 327 | ||
Mobile alerts | 330 | ||
Mobile gambling | 330 | ||
M-commerce services for business | 331 | ||
Wireless Internet business model | 335 | ||
Mobility and location | 338 | ||
Mobile systems thinking | 343 | ||
Wireless business applications | 345 | ||
The economics of wireless Internet data | 353 | ||
Mobile Multimedia Portals (MMPs) | 356 | ||
Conclusions | 357 | ||
Pervasive and embedded mobile systems | 363 | ||
Defining pervasive computing | 365 | ||
Technologies within the pervasive computing domain | 368 | ||
Networked pervasive computing | 370 | ||
Embedded systems ergonomics | 373 | ||
Wearable computing | 374 | ||
Biometric systems | 380 | ||
Biometric issues and systems security | 383 | ||
Biometric systems applications | 386 | ||
Biometric systems integration | 388 | ||
Digital signatures | 389 | ||
Automobile telematics and vehicle telemetry | 391 | ||
In-vehicle user interfaces and applications | 393 | ||
Universal Information Appliances (UIAs) | 397 | ||
Obstacles in pervasive computing | 399 | ||
Conclusions | 400 | ||
Security in a mobile world | 409 | ||
Introduction | 411 | ||
Aspects of security | 412 | ||
Wireless network security | 415 | ||
Access control | 418 | ||
Encryption | 420 | ||
The Diffie-Hellman key agreement method | 424 | ||
Security aspects of wireless networks | 425 | ||
Wide area wireless network security – 3G | 426 | ||
Wireless Local Area Network (WLAN) security features | 433 | ||
Bluetooth and Personal Area Network (PAN) security | 438 | ||
Bluetooth baseband security | 440 | ||
Bluetooth security profiles | 443 | ||
The headset security model | 444 | ||
Securing small devices | 447 | ||
Conclusions | 448 | ||
Enabling the mobile workforce: extending enterprise applications | 453 | ||
The agile and mobile workforce | 455 | ||
Supporting the mobile workforce | 457 | ||
Mobile systems development | 460 | ||
Issues in M-commerce | 462 | ||
Privacy | 463 | ||
Social, ethical and legal issues | 463 | ||
Ethical business behaviour | 465 | ||
Ethical issues | 466 | ||
Ethical dilemmas in wireless business systems | 467 | ||
Rights and duties, and privileges and responsibilities | 468 | ||
Trust and control | 470 | ||
Surveillance | 474 | ||
Data protection | 475 | ||
Impact analysis using a real-world case study | 481 | ||
Conclusions | 483 | ||
M-commerce glossary | 511 | ||
Index | 523 |