Presentation is loading. Please wait.

Presentation is loading. Please wait.

CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.

Similar presentations


Presentation on theme: "CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce."— Presentation transcript:

1 CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce

2 Announcements Project 4 (Excel Refresher) due Today Chapter 8 - Mobile Computing Friday – Excel Scenario Manager Workday

3 Review – Chapter 7 E-Commerce Pure vs. Partial B2B, B2C, C2C Mechanisms Benefits/Limitations Issues in E-Tailing Disintermediation Order Fulfillment Ethical/Legal Issus

4 CHAPTER OUTLINE 8.1 Wireless Technologies 8.2 Wireless Computer Networks and Internet Access 8.3 Mobile Computing 8.4 Mobile Commerce 8.5 Pervasive Computing 8.6 Wireless Security

5 Chapter Opening Case: The Battle for the Mobile Wallet Source: Slavoljub Pantelic/ Shutterstock

6 8.1 Wireless Technologies © Oleksiy Makymenko/Alamy © PhotoEdit/Alamy © Såndor Kelemen/iStockphoto How many smart phones are now being used worldwide?

7 Capabilities of Wireless Devices Cellular telephonyE-mail access BluetoothShort message service Wi-FiInstant messaging Digital cameraText messaging Global positioning systemOrganize MP3 music player Video player Address bookInternet access What problems might companies have with personal smartphones?

8 2013 Trends in Mobile Technology 4G LTE Android Operating System Near Field Communications BYOD Tablet PCs Location Based Applications Mobile Payment Apps

9 Wireless Transmission Media Microwave Transmission Satellite transmission Geostationary Orbit (GEO) Middle Earth Orbit (MEO) Low Earth Orbit (LEO) Radio Satellite Radio Infrared

10 How the Global Positioning System Works © Toh Kheng Ho/Age Fotostock America, Inc.

11 8.2 Wireless Computer Networks and Internet Access 1. Short range wireless networks 2. Medium range wireless networks 3. Wide area wireless networks

12 8.2.1 Short Range Wireless Networks Bluetooth Near-field Communications

13 8.2.2 Medium Range Wireless Networks Wireless fidelity (Wi-Fi) Wireless access point Hotspot Wireless network interface card © STOCKBROKERXTRA/Age Fotostock America, Inc. http://v4.jiwire.com/

14 8.2.2 Medium Range Networks: Wireless Mesh Networks

15 8.2.3 Wide-Area Wireless Networks Cellular Radio 1st Generation 2nd Generation 3rd Generation (3G) 4th Generation (4G) Wireless Broadband or WiMax (WiFi on steroids)

16 8.3 Mobile Computing Basis of mobile computing: Mobility Broad reach Five value-added mobile computing attributes: 1.Ubiquity 2.Convenience 3.Instant connectivity 4.Personalization 5.Localization of products and services

17 8.4 Mobile Commerce The development of m-commerce is driven by the following factors: Widespread availability of mobile devices No need for a PC The “Cell phone culture” Declining prices Bandwidth improvement

18 Mobile Commerce Applications Location-Based Applications and Services Financial Services Intrabusiness Applications Accessing Information Telemetry Applications

19 Mobile Commerce Applications: Location-Based Applications Shopping from Wireless Devices Google Shopper

20 Mobile Commerce Applications: Location-Based Applications Location-based Advertising Location-based Services

21 Mobile Commerce Applications: Financial Services Frederic Lucano/Stone/Getty Images, Inc. Wireless Electronic Payment System Mobile Banking Wireless Bill Payments Mobile Wallet Micropayments

22 Mobile Commerce Applications: Intrabusiness Applications Example: UPS

23 Mobile Commerce Applications: Accessing Information Mobile Portal Voice Portal © Sergey/Age Fotostock America, Inc.

24 Mobile Commerce Applications: Telemetry Examples of Telemetry Applications Medicine Automobiles Find My iPhone Telemedicine predicted in 1924

25 8.5 Pervasive Computing Radio frequency identification (RFID) Wireless Sensor Networks (WSNs)

26 Bar Code, QR Code, RFID Source: Media Bakery © raphotography/iStockphoto

27 Small RFID Reader and Tag Coming soon to a supermarket near you See videovideo © Ecken, Dominique/ Keystone Pressedienst/Zuma Press https://squareup.com/wallet

28 The Internet of Things The number of everyday “things” connected to the Internet.things http://blogs.cisco.com/news/the-internet-of-things-infographic/ http://www.engadget.com/2011/01/13/vitality-glowcap-review/ http://www.symplio.com/2011/09/4-infographics-about-internet-of-things/

29 8.6 Wireless Security Four major threats 1. Rogue access point 2. War driving 3. Eavesdropping 4. RF (Radio frequency) jamming © Sebastian/AgeFotostock America, Inc.

30 Chapter Review Describe the four main types of wireless transmission media.

31 Chapter Review Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network.

32 Chapter Review (continued) Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business.

33 Chapter Review (continued) Define pervasive computing, describe one technologies that underlies this technology, and provide at least one example of how a business can utilize each one.

34 Chapter Review (continued) Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business.


Download ppt "CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce."

Similar presentations


Ads by Google