Você está na página 1de 21

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

THE FUTURE OF M-COMMERCE

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Mobile Commerce Overview:


How mobile phones have changed our lives

mobile phone seems to give us more power as individual


many people consider mobile phones as extensions of themselves mobile phone makes us available to others Creates opportunity to deliver new services to existing customers and to attract new ones

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

History:

Birth of mobile commerce was in 1997 in Finland.


In 1998 the first sales of downloadable ringtones were made possible in
Finland

In 1999 a mobile platform for mobile commerce was launched in the


Philippines, the Smart money

Currently Australia is offering train ticketing via the mobile devices

Japan offers mobile purchase of airline tickets


Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

What is Mobile Commerce?


Any transaction with a business value that is conducted via mobile telecommunication network.

An emerging applications and services people can access from their internet enabled mobile devices such as smartphones, PDAs, ipads and laptops.

Mobile commerce has enabled people now to connect, inform, interact and influence one another on a mobile platform, anytime and anywhere .
Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Main Drivers of Mobile Commerce Technology Proliferation of mobile devices


Convergence of mobile telephone networks and the internet Transition from 2nd generation (2G) to 3rd and 4th generations (3G & 4G) telecommunications technology Growing customer demand Evolution of a new value chain

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Difference between M-Commerce and E-Commerce M-commerce is an offshoot of e-commerce.


E-commerce involves transaction on the internet but with m-commerce we enjoy the mobility feature without any physical connectivity to internet.

Users pay a little higher cost for airtime as opposed to free internet access in
e-commerce.

M-commerce is more effective as a marketing and advertising medium than


the e-commerce due to mobility and portability of mobile devices.

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

SWOT Analysis
STRENGTH WEAKNESSES

Portability and mobility features of mobile devices


Ease of use and instant connectivity High customer satisfaction and loyalty OPPORTUNITIES New and enhanced m-commerce application Mobile banking Mobile ticketing Mobile payments Advertising & marketing

Low bandwidth Poor reliability Transaction security concerns High Cost of MMS Quality of Service (QoS) THREATS Personal privacy protection Constraints with mobile devices Authentication and confidentiality Security of payment transactions

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Benefits of Mobile Commerce


Providing wider reach

Streamline business processes


Reducing transaction cost

Unlimited bandwidth
Competitive pricing

Faster and accurate communication and information exchange

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Building Blocks of Mobile Commerce


User Equipment
Cellphone

Smart Card (User-Identity)

Digital Wallet

Commerce Application (mobile part) Portal Access

Security Module

Mobile Execution Environment Mobile OS


PDA

Access Network
Authentication

Billing

IP-based access Protocols QoS

VPN
Service Network
Application Service Provider
Other Service Networks (including Internet)

Commerce Portal
Network Location

Service Portals
Billing Security

Location Info

Application Servers

User Profiles

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Mobile Technology Applications


Mobile Payments
Consumer can use a mobile phone to pay for wide range of services and digital goods such as ringtones, music, wallpapers and hard goods like books, magazines, tickets, etc.

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Mobile Banking
The use of mobile phone to send, receive, or facilitate financial transactions including loan disbursements, payments, money transfers, deposits, withdrawals, remittances and even payroll services.

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Mobile Location Services

The ability to identify the exact geographical location of a mobile user


at any time. Location based application opportunities include: Navigation and real time traffic Emergency assistance Concierge and travel services Location based marketing and advertising Location based billing Dispatch and delivery route optimization Fleet, asset and individual tracking Security and theft control

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Location Based Mobile Solutions Using GPS Technology


Telematics uses wireless data and voice system in vehicles in combination with car companies that has new cars and trucks with telematics systems that include applications like emergency roadside assistance, stolen vehicle tracking, remote door lock and concierge services.
satellite
Location coordinates are sent to the internet using a mobile network

Mobile network

internet

Built in GPS system points location of a car using a satellite

Server

Response combining location and content is generated dynamically LOCATION BASED TELEMATICS SOLUTIONS USING GPS TECHNOLOGY TO LOCATE A VEHICLE

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Overview of Mobile Security


PKI (Public Key Infrastructure) is the only technology that provides the key elements of authentication, confidentiality, data integrity, and nonrepudiation which are of the primary importance in security of mobile commerce. Mobile PKI employs the SIM/USIM card that is present in a GSM/UMTS mobile phone. The SIM card inside the cell phone plays a central role in Mobile PKI. Actually, the obvious way to implement Mobile PKI is through a so-called SIM Application Toolkit (SAT) applet installed on the SIM card.

PKI functions in Mobile Devices


Generation of key-pair (public and private keys) Receiving & Storing certificate issued by CA Digital Signature generation and verification Functions for encryption and decryption Validating third party certificates
Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Issues with Mobile Network Security


Phishing Attack
The following email pretends to be from citibank Upon clicking the link the user is taken to the ff authentic looking page

How do we know if this is an authentic bank website or a fake? The first indication is the vague, slightly illogical problem they are trying to convince you to solve: some of our members no longer have access to their email addresses and we must verify it. Another tip-off is that the address is supposedly secure (using the https:// notation), but there is no padlock icon in the bottom right hand corner of the browser window. And finally, the Address Bar is a fake. The website operator has turned off the address bar.

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Issues with Mobile Network Security


Sniffing: The ability of a hacker to monitor traffic as it crosses the network involving clients and server; Intercept all outgoing/incoming requests for Web documents and display them; it could be use to gather password, read inter-machine e-mail and examine client-server database records in transit. DoS (Denial of Service): Sending numerous dummy requests to server to keep it busy so that legitimate transactions cannot get through.

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

To protect your mobile devices the following are recommended


Install only applications that you need, make sure that you download them from trusted sources.
Just like your computer, backup your mobile device on a regular basis this way if something happen to the device, your information is not lost.
Make sure you update your mobile device and applications on a regular basis. Cyber attackers can easily exploit your devices if you are running outdated software. If you have security software installed such as anti-virus or firewall then make sure they are enabled and updated with the latest version. If you receive a text message that seems suspicious or too good to be true simply delete it. Disable wifi if you are not using it. Many mobile devices will automatically connect to wifi networks without asking you, putting your device at risk.

Just like wifi, disable Bluetooth if you are not using it. If you use Bluetooth, check you settings and disable any Bluetooth capabilities that you do not need. It is also important to turn off Bluetooth auto discovery.
Protect your devices with hard to guess password or PIN. If your device has port encryption, use it. Consider enabling remote wiping. This means if your Smartphone is lost or stolen you can erase all your information remotely. Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Conclusion
As technology continues to progress and new system are being created, mobile commerce is on a rapid rise. Today most people are constantly on the go and the ability to conduct businesses in the palm of your hand wherever you go is definitely in high demand. As with any new technological services, its going to take some time to work out all of the limitations and perfect the mobile commerce computing environment.

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Generation of Mobile Communication

High Speed Multimedia


Voice & Data (narrowband) Voice

3rd Generation (IMT 2000) 2nd Generation (GSM) 1st Generation (Analog) 1980 1990 2000 2010

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Issues with Mobile Network Security


return

Mobile e-Commerce

Graduate School and Professional Services


Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Você também pode gostar