Mobile e-Commerce
-
Upload
ma-luisa-gabriel -
Category
Documents
-
view
102 -
download
4
Transcript of Mobile e-Commerce
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
THE FUTURE OF M-COMMERCE
Mobile Commerce Overview: How mobile phones have changed our lives • mobile phone seems to give us more power as individual
• many people consider mobile phones as extensions of themselves
• mobile phone makes us available to others
• Creates opportunity to deliver new services to existing customers and to attract new ones
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
History:
• Birth of mobile commerce was in 1997 in Finland.
• In 1998 the first sales of downloadable ringtones were made possible in Finland
• In 1999 a mobile platform for mobile commerce was launched in the Philippines, the Smart money
• Currently Australia is offering train ticketing via the mobile devices
• Japan offers mobile purchase of airline tickets
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
What is Mobile Commerce?
Any transaction with a business value that is conducted via mobile telecommunication network.
An emerging applications and services people can access from their internet enabled mobile devices such as smartphones, PDAs, ipads and laptops.
Mobile commerce has enabled people now to connect, inform, interact and influence one another on a mobile platform, anytime and anywhere .
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Main Drivers of Mobile Commerce Technology
• Proliferation of mobile devices
• Convergence of mobile telephone networks and the internet
• Transition from 2nd generation (2G) to 3rd and 4th generations (3G & 4G) telecommunications technology
• Growing customer demand
• Evolution of a new value chain
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Difference between M-Commerce and E-Commerce
• M-commerce is an offshoot of e-commerce.
• E-commerce involves transaction on the internet but with m-commerce we enjoy the mobility feature without any physical connectivity to internet.
• Users pay a little higher cost for airtime as opposed to free internet access in e-commerce.
• M-commerce is more effective as a marketing and advertising medium than the e-commerce due to mobility and portability of mobile devices.
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
SWOT Analysis
STRENGTH
Portability and mobility features of mobile devices
Ease of use and instant connectivity
High customer satisfaction and loyalty
OPPORTUNITIES
New and enhanced m-commerce application
Mobile banking
Mobile ticketing
Mobile payments
Advertising & marketing
WEAKNESSES
Low bandwidth
Poor reliability
Transaction security concerns
High Cost of MMS
Quality of Service (QoS)
THREATS
Personal privacy protection
Constraints with mobile devices Authentication and confidentiality
Security of payment transactions
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Benefits of Mobile Commerce
Providing wider reach
Streamline business processes
Reducing transaction cost
Unlimited bandwidth
Competitive pricing
Faster and accurate communication and information exchange
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Mobile e-Commerce
Building Blocks of Mobile Commerce
User Equipment
Cellphone
PDA IP-based access Protocols Access
Network
VPN Service Network Application Service Provider
Smart Card(User-Identity) Digital Wallet
Commerce Application
(mobile part)
Security Module Portal Access
Mobile Execution EnvironmentMobile OS
BillingQoS
Authentication
Commerce Portal Service Portals
Network Location Billing Security
Application ServersOther Service Networks(including Internet)
Location Info
User Profiles
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile Technology ApplicationsMobile PaymentsConsumer can use a mobile phone to pay for wide range of services and digital goods such as ringtones, music, wallpapers and hard goods like books, magazines, tickets, etc.
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Mobile BankingThe use of mobile phone to send, receive, or facilitate financial transactions including loan disbursements, payments, money transfers, deposits, withdrawals, remittances and even payroll services.
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Mobile Location Services
The ability to identify the exact geographical location of a mobile userat any time.
Location based application opportunities include:• Navigation and real time traffic• Emergency assistance• Concierge and travel services• Location based marketing and advertising• Location based billing• Dispatch and delivery route optimization• Fleet, asset and individual tracking• Security and theft control
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Location Based Mobile Solutions Using GPS TechnologyTelematics uses wireless data and voice system in vehicles in combination with car companies that has new cars and trucks with telematics systems that include applications like emergency roadside assistance, stolen vehicle tracking, remote door lock and concierge services.
internet
satellite Mobile network
Server
Location coordinates are sent to the internet using a mobile network
Built in GPS system points location of a car using a satellite
Response combining location and content is generated dynamically
LOCATION BASED TELEMATICS SOLUTIONS USING GPS TECHNOLOGY TO LOCATE A VEHICLE
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Overview of Mobile Security
PKI (Public Key Infrastructure) is the only technology that provides the key elements of authentication, confidentiality, data integrity, and nonrepudiation which are of the primary importance in security of mobile commerce.
Mobile PKI employs the SIM/USIM card that is present in a GSM/UMTS mobile phone. The SIM card inside the cell phone plays a central role in Mobile PKI. Actually, the obvious way to implement Mobile PKI is through a so-called SIM Application Toolkit (SAT) applet installed on the SIM card.
PKI functions in Mobile Devices Generation of key-pair (public and private keys)
Receiving & Storing certificate issued by CA
Digital Signature generation and verification
Functions for encryption and decryption
Validating third party certificates
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Mobile e-Commerce
Issues with Mobile Network Security Phishing Attack Upon clicking the link the user is taken to the ff
The following email pretends to be from citibank authentic looking page
How do we know if this is an authentic bank website or a fake? The first indication is the vague, slightly illogical problem they are trying to convince you to solve: “some of our members no longer have access to their email addresses and we must verify it”. Another tip-off is that the address is supposedly secure (using the https:// notation), but there is no padlock icon in the bottom right hand corner of the browser window. And finally, the Address Bar is a fake. The website operator has turned off the address bar.
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Issues with Mobile Network Security Sniffing: The ability of a hacker to monitor traffic as it crosses the network involving clients and server; Intercept all outgoing/incoming requests for Web documents and display them; it could be use to gather password, read inter-machine e-mail and examine client-server database records in transit.
DoS (Denial of Service): Sending numerous dummy requests to server to keep it busy so that legitimate transactions cannot get through.
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
To protect your mobile devices the following are recommended
Install only applications that you need, make sure that you download them from trusted sources.
Just like your computer, backup your mobile device on a regular basis this way if something happen to the device, your information is not lost.
Make sure you update your mobile device and applications on a regular basis. Cyber attackers can easily exploit your devices if you are running outdated software.
If you have security software installed such as anti-virus or firewall then make sure they are enabled and updated with the latest version.
If you receive a text message that seems suspicious or too good to be true simply delete it.
Disable wifi if you are not using it. Many mobile devices will automatically connect to wifi networks without asking you, putting your device at risk.
Just like wifi, disable Bluetooth if you are not using it. If you use Bluetooth, check you settings and disable any Bluetooth capabilities that you do not need. It is also important to turn off Bluetooth auto discovery.
Protect your devices with hard to guess password or PIN. If your device has port encryption, use it.
Consider enabling remote wiping. This means if your Smartphone is lost or stolen you can erase all your information remotely.
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Conclusion As technology continues to progress and new system are being created, mobile commerce is on a rapid rise. Today most people are constantly on the go and the ability to conduct businesses in the palm of your hand wherever you go is definitely in high demand.
As with any new technological services, its going to take some time to work out all of the limitations and perfect the mobile commerce computing environment.
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Generation of Mobile Communication
1st Generation (Analog)
1980 1990 2000 2010
2nd Generation (GSM)
3rd Generation (IMT 2000)
Voice
Voice & Data(narrowband)
High Speed Multimedia
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce
Mobile e-Commerce
Issues with Mobile Network Security
return
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Graduate School and Professional Services
Information Technology Resource Management in a Networked Environment
Mobile e-Commerce