15 resultados para mobile Commerce

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Millions of data capable mobile devices are currently in use around the world enabled by the growing acceptance of Internet over wireless networks. However, security mechanisms still remain nascent. Security plays a crucial role in facilitating the level of trust users place on mobile devices and applications. To effectively diffuse the mobile devices in the marketplace, sufficient levels of trust has to be established in the underlying security of mobile devices and applications. This paper is an appraisal of recent issues and emerging trends regarding mobile security, within the context of conducting mobile commerce via mobile networks by individual consumers and businesses.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The internet and the mobile phone - two technological advancements that have profoundly affected human behaviour in the last decade - have started to converge. The products .of this association are mobile data services. Using a variety of platforms, services are being created to enable mobile devices to perform many activities of the traditional internet, albeit in a reduced format for mobile devices. One area of activity is mobile (m-) banking (one of the first areas of commercial transaction on the wireless internet). Banking is an area that has extended in many different ways in recent years, including telephone and online banking. M-banking provides yet another channel for banking services, and in emerging markets, provides some possibility for becoming a primary channel. This paper examines the strategic implications of m-banking and the strategic positioning of m-banking services in different markets. The paper concludes with a discussion of the future for m-banking services.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Many technological innovations have occurred within the past decade that have revolutionized the banking industry. The most important has been the Internet and the emergence of mobile-commerce (m-commerce). The aim of this paper is to investigate how Wireless Application Protocol (WAP) banking is being implemented with younger adopters. A conceptual model is developed based on the behavioral intentions younger adopters have on WAP banking that is tested through a survey instrument. Social cognitive theory underpins the conceptual model and helps to explain some of the findings from the study. Suggestions for future research are also espoused.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The banking industry has globalised as a result of the many technology innovations created by the internet. The electronic commerce (e-commerce) industry is a result of these technological innovations that have revolutionised the way both consumers and businesses conduct business. In the past decade, banks have encouraged the use of e-commerce and most people are now comfortable conducting their banking online. More recently, mobile commerce (m-commerce) has started to gain momentum and an increasing amount of people are conducting their banking on mobile phone devices instead of through the internet. Mobile banking is a technological innovation that people adopt in different ways depending on internal and external environmental influences. In this paper, a social cognitive theoretical framework is adopted to understand an individual’s intention to adopt mobile banking. A conceptual model is proposed, which helps to explain how environmental influences affect an individual’s intention to adopt mobile banking. Implications for mobile banking and m-commerce industry are stated along with suggestions for future research on technological innovations.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper examines the behavior Australian youths have toward mobile banking. Social cognitive theory is the theoretical framework in which a conceptual model is empirically tested. The conceptual model includes five constructs (media, modeling, outcome expectancy, learning orientation and entrepreneurial orientation), which are proposed to influence an individual’s intention to adopt mobile banking. The conceptual model is tested in a sample of Australian youths and the analysis supports a portion of the proposed conceptual model. The findings support the link between the media and an individual’s entrepreneurial orientation with their intention to adopt mobile banking. The paper demonstrates how social cognitive theory is a useful foundation to understand the external and internal stimuli that influence an individual’s desire to adopt mobile banking.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper examines an individual’s entrepreneurial adoption decisions to use mobile banking for both business and social reasons. A conceptual model based on social cognitive theory is developed to explain an individual’s propensity to adopt mobile banking. The theoretical framework examines how advertising, experience, perceived risk, learning inclination, and entrepreneurial proclivity influence a person’s intention to use mobile banking. This paper stresses the role of financial risk in determining a person’s intention to use mobile banking and whether their entrepreneurial nature is influenced by their experience and advertising they are subjected to about the advantages or disadvantages of mobile banking. This paper ties together research on technological innovation with entrepreneurship and learning studies. The author stresses the importance for financial institutions to market the innovativeness of mobile banking whilst addressing security concerns. The impact of a person’s social environment through personal contacts and acquaintances underpins social cognitive theory and helps to understand the motives for a person adopting mobile banking. The paper integrates mobile banking literature with current thinking on the importance of entrepreneurship and learning influences to how a person adopts a technological innovation.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper focuses on the role of entrepreneurship and e-finance in determining a person's intention to adopt mobile banking. The approach utilised in this paper is to develop a conceptual framework that includes a number of propositions that are developed and justified by the literature. The main findings of this paper are that people's entrepreneurial inclination and learning tendency will determine how they respond to marketing and knowledge about mobile banking. The practical implications are that financial institutions involved in e-finance can focus their marketing efforts at increasing people's exposure to mobile banking.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In settings such as electronic markets where trading partners have conflicting interests and a desire to cooperate, mobile agent mediated negotiation have become very popular. However, agent-based negotiation in electronic commerce involves the exchange of critical and sensitive data that must be highly safeguarded. Therefore, in order to give benefits of quick and safe trading to the trading partners, an approach that secures the information exchanged between the mobile agents during e-Commerce negotiations is needed. To this end, we discuss an approach that we refer to as Multi-Agent Security NEgotiation Protocol (MASNEP). To show that MASNEP protocol is free of attacks and thus the information exchanged throughout electronic negotiation is truly secured, we provide a formal proof on the correctness of the MASNEP.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Electronic negotiation (e-negotiation) is a major activity in e-Commerce applications. Agent-based e-negotiation has recently received increasing attention. However, agent-based electronic negotiation suffers from a number of security attacks. In this paper, we present a mobile agent-based e-commerce framework. We also propose a security protocol that protects the information exchanged between the mobile agents during e- negotiations. We reason the correctness of the proposed security protocol in the presence of various security threats. The reasoning shows that the protocol maintains privacy, non- repudiation, authenticity, anonymity, and strong integrity of exchanged information.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An online transaction always retrieves a large amount of information before making decisions. Currently, the parallel methods for retrieving such information can only provide a similar performance to serial methods. In this paper we first perform an analysis to determine the factors that affect the performance of exiting methods, i.e., HQR and EHQR, and show that the several of these factors are not considered by these methods. Motivated by this, we propose a new dispatch scheme called AEHQR, which takes into account the features of parallel dispatching. In addition, we provide cost models that determine the optimal performance achievable by any parallel dispatching method. Using experimental comparison, we illustrate that the AEHQR is significantly outperforms the HQR and EHQR under all conditions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mobile agents have been implemented in e-commerce to search and filter information of interest from electronic markets. When the in format ion is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent's itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described , which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol using Symbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data authenticity, origin confidentiality and data non-repudiability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various security threats by malicious hosts or intruders. Conversely, genuine platforms may run malicious agents. It is essential to establish a truly secure framework for mobile agents to gain trust of clients in the system. Failure to accomplish a trustworthy secured framework for Mobile Agent System (MAS) will limit their deployment into the key applications. This chapter presents a comprehensive taxonomy of various security threats to Mobile Agent System and the existing implemented security mechanisms. Different mechanisms are discussed, and the related security deficiencies are highlighted. The various security properties of the agent and the agent platform are described. The chapter also introduces the properties, advantages, and roles of agents in various applications. It describes the infrastructure of the system and discusses several mobile agent frameworks and the accomplished security level.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mobile smart phones and Mobile applications (apps) can be seen as an added opportunity for education and for teachers in particular, this can be true if educational institutions are willing to enable this type of delivery mechanism. With the recent development of app technologies in today’s society and the shift towards mobile technologies (devices and applications), it seems hard to imagine better devices and tools that can grant students easy and on demand access to learning content. These smart devices and technologies are multitasking and can offer variety of educational apps that teachers and students are able to integrate into their daily learning activities and can carry with them anywhere. In this paper mobile apps and their integration in education are discussed, a case study on the use of three mobile apps (e-Lecture-Producer, Dropbox and QR Code) in an educational setting in a Business e-commerce course is described. Results and outcomes are discussed based on the results from the case study.