Download presentation
Presentation is loading. Please wait.
Published byScott Jackson Modified over 9 years ago
1
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce
2
Announcements Project 4 (Excel Refresher) due Today Chapter 8 - Mobile Computing Friday – Excel Scenario Manager Workday
3
Review – Chapter 7 E-Commerce Pure vs. Partial B2B, B2C, C2C Mechanisms Benefits/Limitations Issues in E-Tailing Disintermediation Order Fulfillment Ethical/Legal Issus
4
CHAPTER OUTLINE 8.1 Wireless Technologies 8.2 Wireless Computer Networks and Internet Access 8.3 Mobile Computing 8.4 Mobile Commerce 8.5 Pervasive Computing 8.6 Wireless Security
5
Chapter Opening Case: The Battle for the Mobile Wallet Source: Slavoljub Pantelic/ Shutterstock
6
8.1 Wireless Technologies © Oleksiy Makymenko/Alamy © PhotoEdit/Alamy © Såndor Kelemen/iStockphoto How many smart phones are now being used worldwide?
7
Capabilities of Wireless Devices Cellular telephonyE-mail access BluetoothShort message service Wi-FiInstant messaging Digital cameraText messaging Global positioning systemOrganize MP3 music player Video player Address bookInternet access What problems might companies have with personal smartphones?
8
2013 Trends in Mobile Technology 4G LTE Android Operating System Near Field Communications BYOD Tablet PCs Location Based Applications Mobile Payment Apps
9
Wireless Transmission Media Microwave Transmission Satellite transmission Geostationary Orbit (GEO) Middle Earth Orbit (MEO) Low Earth Orbit (LEO) Radio Satellite Radio Infrared
10
How the Global Positioning System Works © Toh Kheng Ho/Age Fotostock America, Inc.
11
8.2 Wireless Computer Networks and Internet Access 1. Short range wireless networks 2. Medium range wireless networks 3. Wide area wireless networks
12
8.2.1 Short Range Wireless Networks Bluetooth Near-field Communications
13
8.2.2 Medium Range Wireless Networks Wireless fidelity (Wi-Fi) Wireless access point Hotspot Wireless network interface card © STOCKBROKERXTRA/Age Fotostock America, Inc. http://v4.jiwire.com/
14
8.2.2 Medium Range Networks: Wireless Mesh Networks
15
8.2.3 Wide-Area Wireless Networks Cellular Radio 1st Generation 2nd Generation 3rd Generation (3G) 4th Generation (4G) Wireless Broadband or WiMax (WiFi on steroids)
16
8.3 Mobile Computing Basis of mobile computing: Mobility Broad reach Five value-added mobile computing attributes: 1.Ubiquity 2.Convenience 3.Instant connectivity 4.Personalization 5.Localization of products and services
17
8.4 Mobile Commerce The development of m-commerce is driven by the following factors: Widespread availability of mobile devices No need for a PC The “Cell phone culture” Declining prices Bandwidth improvement
18
Mobile Commerce Applications Location-Based Applications and Services Financial Services Intrabusiness Applications Accessing Information Telemetry Applications
19
Mobile Commerce Applications: Location-Based Applications Shopping from Wireless Devices Google Shopper
20
Mobile Commerce Applications: Location-Based Applications Location-based Advertising Location-based Services
21
Mobile Commerce Applications: Financial Services Frederic Lucano/Stone/Getty Images, Inc. Wireless Electronic Payment System Mobile Banking Wireless Bill Payments Mobile Wallet Micropayments
22
Mobile Commerce Applications: Intrabusiness Applications Example: UPS
23
Mobile Commerce Applications: Accessing Information Mobile Portal Voice Portal © Sergey/Age Fotostock America, Inc.
24
Mobile Commerce Applications: Telemetry Examples of Telemetry Applications Medicine Automobiles Find My iPhone Telemedicine predicted in 1924
25
8.5 Pervasive Computing Radio frequency identification (RFID) Wireless Sensor Networks (WSNs)
26
Bar Code, QR Code, RFID Source: Media Bakery © raphotography/iStockphoto
27
Small RFID Reader and Tag Coming soon to a supermarket near you See videovideo © Ecken, Dominique/ Keystone Pressedienst/Zuma Press https://squareup.com/wallet
28
The Internet of Things The number of everyday “things” connected to the Internet.things http://blogs.cisco.com/news/the-internet-of-things-infographic/ http://www.engadget.com/2011/01/13/vitality-glowcap-review/ http://www.symplio.com/2011/09/4-infographics-about-internet-of-things/
29
8.6 Wireless Security Four major threats 1. Rogue access point 2. War driving 3. Eavesdropping 4. RF (Radio frequency) jamming © Sebastian/AgeFotostock America, Inc.
30
Chapter Review Describe the four main types of wireless transmission media.
31
Chapter Review Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network.
32
Chapter Review (continued) Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business.
33
Chapter Review (continued) Define pervasive computing, describe one technologies that underlies this technology, and provide at least one example of how a business can utilize each one.
34
Chapter Review (continued) Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.