Wireless, Mobile Computing and Mobile Commerce

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Telecommunications and Mobile Commerce
Chapter 7 Mobile Commerce Information Technology for Management Improving Performance in the Digital Economy 7 th edition John Wiley & Sons, Inc. Slides.
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
Chapter 61 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Mata Kuliah: M0014 / Konsep Sistem Informasi Tahun : 2008 Pertemuan Chapter 07 : Wireless, Mobile Computing, and Mobile Commerce.
Chapter 41 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Chapter 8 Mobile Commerce
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Mobile Commerce and Ubiquitous Computing
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
Wireless, Mobile Computing, and Mobile Commerce
ACCOUNTING INFORMATION SYSTEMS
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
CHAPTER 6 Wireless, Mobile Computing and Mobile Commerce
Mobile commerce Yuri kang.
Mobile Computing and Commerce
TECHNOLOGY GUIDE 2: Software 1. 2 TG2.1 Introduction to Software TG2.2 Software Issues TG2.3 Systems Software TG2.4 Application Software TECHNOLOGY GUIDE.
Information Technology Foundations-BIT 112 CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce.
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce.
Wireless, Mobile Computing, and Mobile Commerce
TECHNOLOGY GUIDE 3: Emerging Types of Enterprise Computing
Basic Data Communication
Communications & Networks
Wireless, Mobile Computing and Mobile Commerce
1 CHAPTER 18 Creating a Wireless Organization. 2 Learning Outcomes Explain how a wireless device helps an organization conduct business anytime, anywhere,
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
Copyright 2007 John Wiley & Sons, Inc. Chapter 71 Introduction to Information Systems HTM Management Information Systems College of Business Administration.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 6-1 Introduction to Information Technology.
Wireless Technologies and the Modern Organization
CHAPTER 7 Wireless Technologies and the Modern Organization.
Telecommunication & Network Applications Part 2
Chapter 15 Long-Term Liabilities
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 9 Mobile Computing and Commerce and Pervasive Computing.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Mobile Computing and Commerce Mata kuliah: M Konsep E-Business Tahun: 2010.
INVESTMENTS: Analysis and Management Second Canadian Edition INVESTMENTS: Analysis and Management Second Canadian Edition W. Sean Cleary Charles P. Jones.
Wireless, Mobile Computing today’s wireless devices and wireless transmission media wireless networks according to their effective distance Define mobile.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
CHAPTER 1 The Modern Organization in the Global, Web-Based Environment.
BBA (Hons) (Mobile Commerce and Ubiquitous Computing) By: Farhan Mir
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.
TENTH CANADIAN EDITION INTERMEDIATE ACCOUNTING PREPARED BY: Lisa Harvey, CPA, CA Rotman School of Management, University of Toronto 1 CHAPTER 16 Appendix.
Chapter 2 Appendix 2A Chapter 2 Appendix 2A Fair Value Measurements Prepared by: Dragan Stojanovic, CA Rotman School of Management, University of Toronto.
Mobile Commerce and Ubiquitous Computing. Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce.
C HAPTER 6 Mobile Commerce and Ubiquitous Computing.
CHAPTER 7 1 Wireless, Mobile Computing and Mobile Commerce.
Wireless, Mobile Computing, and Mobile Commerce
Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie Tech Guide D: The Details of SQL, Data Modelling,
CHAPTER 5 Network Applications. Chapter Outline 5.1 Network Applications 5.2 Web E-Learning and Distance Learning 5.4 Telecommuting.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Tech Guide B: The Details of Software
Wireless, Mobile Computing and Mobile Commerce
Information Systems: Concepts and Management
Introduction to Information Technology Turban, Rainer and Potter
Networking: Discovery, Communication, Collaboration
Chapter Appendix 8A The Retail Inventory Method of Estimating Inventory Costs Prepared by: Dragan Stojanovic, CA Rotman School.
Wireless, Mobile Computing and Mobile Commerce
Mobile Commerce and Ubiquitous Computing
Chapter 16 Appendix 16C Advanced Models for Measuring Fair Value
Mobile Commerce and Ubiquitous Computing
Presentation transcript:

Wireless, Mobile Computing and Mobile Commerce CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce

CHAPTER OUTLINE 7.1 Wireless Technologies 7.2 Wireless Computer Networks and Internet Access 7.3 Mobile Computing and Mobile commerce 7.4 Pervasive Computing 7.5 Wireless Security

LEARNING OBJECTIVES Discuss the various types of wireless devices and wireless transmission media. BUSINESS OPPORTUNITIES: Smart phones could be part of a new marketing campaign, based upon location or user preferences. BUSINESS RISKS: Smart wireless phones may be unable to access regular websites, causing loss of revenue to the target website.

LEARNING OBJECTIVES (continued) Describe wireless networks according to their effective distance. BUSINESS OPPORTUNITIES: Appropriate wireless systems can enable the organization to effectively handle new products and equipment as the organization grows. BUSINESS RISKS: Wireless systems purchased may be unable to keep up with organizational growth, to physically send the signal the required distance.

LEARNING OBJECTIVES (continued) Define mobile computing and mobile commerce. BUSINESS OPPORTUNITIES: Customer service and employee flexibility can be improved through the use of innovative forms of wireless devices. BUSINESS RISKS: Wireless devices can be used to blur the boundary between personal and work time, increasing the amount of time engaged in work.

LEARNING OBJECTIVES (continued) Discuss the major M-commerce applications. BUSINESS OPPORTUNITIES: Sales, marketing and geographic information systems can be linked, improving the ability to track products and provide rapid service. BUSINESS RISKS: Employees may feel an invasion of privacy if geographic positioning and wireless systems are used to track their movements.

LEARNING OBJECTIVES (continued) Define pervasive computing and describe two technologies that underlie this technology. BUSINESS OPPORTUNITIES: RFID tags or chips in products can result in a better ability to track products, improving customer service and reducing costs. BUSINESS RISKS: New technologies may be incorrectly installed, increasing costs and reducing effectiveness.

LEARNING OBJECTIVES (continued) Discuss the four major threats to wireless networks. BUSINESS OPPORTUNITIES: Restrictive wire-based systems can be replaced with more flexible wireless systems, lowering cost and improving productivity. BUSINESS RISKS: Data communicated could be exposed to unauthorized access.

LEARNING OBJECTIVES (continued) Explain how wireless threats can be mitigated. BUSINESS OPPORTUNITIES: Reasonable controls can prevent unauthorized access to information, avoiding privacy violations. BUSINESS RISKS: Excessive controls can slow down employees, making activities cumbersome and more expensive.

7.1 Wireless Technologies Wireless devices Wireless Application Protocol (WAP) Microbrowsers Wireless transmission media 10

Capabilities of Wireless Devices Cellular telephony E-mail access Bluetooth Short message service Wi-Fi Instant messaging Digital camera Text messaging Global positioning system Organizer MP2 music player Scheduler Video player Address book Internet access Calculator QWERTY keyboard 11

Wireless Transmission Media Microwave Transmission Satellite transmission Geostationary Orbit (GEO) Middle Earth Orbit (MEO) Low Earth Orbit (LEO) Global Positioning System (GPS) Internet Over Satellite (IOS) 12

Wireless Transmission Media (continued) Radio Radio transmission uses radio-wave frequencies to send data directly between transmitters and receivers. Satellite Radio Satellite radio (digital radio) offers uninterrupted, near CD-quality music that is beamed to your radio from space. XM satellite radio and Sirius have agreed to merge as of mid-2007. 13

7.2 Wireless Computer Networks and Internet Access Short-range wireless networks generally have a range of 100 feet or less. Medium-range wireless networks are the familiar wireless local area networks (WLANs). The most common type of medium-range wireless network is Wireless Fidelity (Wi-Fi). Wide-area wireless networks connect users to each other and to the Internet over geographically dispersed distances. 14

Wide-Area Wireless Networks Cellular Radio uses radio waves to provide two-way communication 1st Generation 2nd Generation 2.5 Generation 3rd Generation Wireless Broadband or WiMax access range up to 31 miles and data-transfer rate up to 75 Mbps 15

7.3 Mobile Computing and Mobile Commerce refers to real-time, wireless connection between a mobile device and other computing environments, such as the Internet and an intranet. Mobility users carry a mobile device and can initiate a real-time contact with other systems from wherever they happen to be. Broad reach users can be reached instantly when they carry an open mobile device. 16

Mobile Computing The characteristics, mobility and broad reach, create five value-added attributes that break the barriers of geography and time: Ubiquity Convenience Instant connectivity Personalization Localization of products and services 17

Mobile Commerce Mobile Commerce The development of m-commerce is driven by the following factors: Widespread availability of mobile devices No need for a PC The “Cell phone culture” Declining prices Bandwidth improvement 18

Mobile Commerce Applications Financial Services Mobile Banking Wireless Electronic Payment Systems Micropayments Mobile (Wireless) Wallets Wireless Bill Payments 19

Intrabusiness Applications Accessing Information Mobile Portal aggregates and provides content and services for mobile users that include news, sports, email, entertainment, travel and restaurant information; community services; and stock trading. Voice Portal a Web site with an audio interface and can also be accessed through a standard phone or cell phone. 20

Location-Based Applications Shopping from Wireless Devices Location-based Advertising Location-based Services 21

Telemetry Applications Technicians can use telemetry to identify maintenance problems in equipment; Doctors can monitor patients and control medical equipment from a distance; Car manufacturers use telemetry for remote vehicle diagnosis and preventive maintenance. 22

7.5 Wireless Security Four major threats Rogue access point War driving Eavesdropping RF (Radio frequency) jamming 23

Copyright Copyright © 2008 John Wiley & Sons Canada, Ltd. All rights reserved. Reproduction or translation of this work beyond that permitted by Access Copyright (the Canadian copyright licensing agency) is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons Canada, Ltd. The purchaser may make back-up copies for his or her own use only and not for distribution or resale. The author and the publisher assume no responsibility for errors, omissions, or damages caused by the use of these files or programs or from the use of the information contained herein.