{"title":"A Roadmap to Ambient e-Service","authors":"Yuanchu Hwang, Soe-Tsyr Yuan","doi":"10.1109/WMCS.2005.3","DOIUrl":"https://doi.org/10.1109/WMCS.2005.3","url":null,"abstract":"The notion of ambient e-services is defined in this paper to identify a new scope of mobile e-services. The notable features of ambient e-services are the exhilarated linkage based on social context and significantly rapid growth of connections. We present an ambient e-service framework that characterizes ambient e-services with three dimensions (value stack, environment stack and technology stack). Several ambient e-service applications are also exemplified, which rest on the mobile peer-to-peer technology and ambient context aware sensors environments. Ambient e-services make a mobile user not only connect to dynamic ambient environments but also cooperate with other mobile users in the nearby surrounding environment, capitalizing dynamic environmental values as well as dynamic social values. We also present an Ambient e-Service Embracing Model (ASEM) framework that addresses the core elements required for fostering the growth of ambient e-services and steering the directions of future relevant research","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130191035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavioral Pattern Analysis of Secure Migration and Communications in eCommerce using Cryptographic Protocols on a Mobile MAS Platform","authors":"S. Pozo, R. M. Gasca, R. Ceballos","doi":"10.1109/WMCS.2005.6","DOIUrl":"https://doi.org/10.1109/WMCS.2005.6","url":null,"abstract":"Mobile multi-agent systems (MAS) systems can be used with real success in a growing number of eCommerce applications nowadays. Security has been identified as numerous times by different researchers as a top criterion for the acceptance of mobile agent adoption. In this paper, we present an in-depth analysis of behavior patterns of a mobile MAS platform when using different cryptographic protocols to assure communication and migration integrity and confidentiality. Different use case sceneries of eCommerce applications as well as many other aspects have been studied, such as overhead, different communication patterns, different loads and bandwidth issues. This work is also extensible to other mobile and non-mobile MAS platforms. The results obtained can be used and should be taken into account by designers and implementers of secure mobile and also non-mobile agent platforms and agents","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130801134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Challenges of Location-Aware Mobile Business","authors":"E. I. Tatli, D. Stegemann, S. Lucks","doi":"10.1109/WMCS.2005.23","DOIUrl":"https://doi.org/10.1109/WMCS.2005.23","url":null,"abstract":"In addition to mobility, the ability of context awareness and especially location awareness has greatly enhanced the opportunities of mobile businesses. Many different kinds of context-aware services ranging from \"finding nearby restaurants\" to \"sending ambulances to people in emergency\" have already taken their places in the business. Besides availability and quality of the service, the user acceptance and therefore the economic success of mobile business applications fundamentally depend on a robust and easy-to-use security architecture meeting the users' needs for privacy, anonymity, confidential communication and secure payment schemes. Based on a generic framework that is able to execute arbitrary context-aware services, we analyse the security challenges in mobile business with special focus on location as a context property and provide directions towards possible solutions","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"713 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116124989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Expectations for Simple Mobile Ubiquitous Computing Environments","authors":"M. C. Brugnoli, J. Hamard, E. Rukzio","doi":"10.1109/WMCS.2005.27","DOIUrl":"https://doi.org/10.1109/WMCS.2005.27","url":null,"abstract":"In mobile ubiquitous computing environments, users will be able to interact with different devices, providing them with many services. The technological heterogeneity of these environments is expected to increase overall system complexity. Flexibility and adaptability thus become key requirements. The goal of the IST-Simplicity project is to design, develop and evaluate an architectural framework supporting easy customization of terminals, services and networks in a consistent manner. In this paper, we present results from focus groups that have provided valuable user feedback on the concepts, user scenarios and business models developed during the project","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115103629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Luley, A. Aimer, C. Seifert, G. Fritz, L. Paletta
{"title":"A Multi-Sensor System for Mobile Services with Vision Enhanced Object and Location Awareness","authors":"P. Luley, A. Aimer, C. Seifert, G. Fritz, L. Paletta","doi":"10.1109/WMCS.2005.1","DOIUrl":"https://doi.org/10.1109/WMCS.2005.1","url":null,"abstract":"We describe a system which proposes a solution for multi-sensor object awareness and positioning to enable stable location awareness for a mobile service in urban areas. The system offers technology of outdoors vision based object recognition that will extend state-of-the-art location and context aware services towards object based awareness in urban environments. In the proposed application scenario, tourist pedestrians are equipped with a GPRS or UMTS capable camera-phone. They are interested whether their field of view contains tourist sights that would point to more detailed information. Multimedia type data about related history might be explored by a mobile user who is intending to learn within the urban environment. Ambient learning is in this way achieved by pointing the device towards the urban sight, capturing an image, and consequently getting information about the object on site and within the focus of attention, i.e., the user's current field of view. The described mobile system offers multiple opportunities for application in both mobile business and commerce, and is currently developed towards an industrial prototype","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130849846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing Mobile Services: Balancing Customer and Network Value","authors":"H. Bouwman, T. Haaker, E. Faber","doi":"10.1109/WMCS.2005.10","DOIUrl":"https://doi.org/10.1109/WMCS.2005.10","url":null,"abstract":"Designing mobile services and the business models behind them is a complex undertaking. A business model can be seen as a blueprint of four interrelated components: service offering, technical architecture, and organizational and financial arrangements. How these different components are related to one another, is hardly been object of research. In this paper the connections between these components are explored by analyzing the critical design issues, e.g. targeting, branding and customer retention in the service domain, security, quality of service and system integration in the technology domain, network governance in the organization domain, and revenue sharing in the finance domain. These critical design issues are linked to each other and to expected customer value and expected network value in a conceptual model","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"22 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120856645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Benchmarking Wireless LAN Location Systems Wireless LAN Location Systems","authors":"M. Wallbaum, S. Diepolder","doi":"10.1109/WMCS.2005.7","DOIUrl":"https://doi.org/10.1109/WMCS.2005.7","url":null,"abstract":"Wireless LANs not only provide an affective means of communication, but also allow to extract information about the location of mobile stations. Numerous wireless LAN location systems have been proposed in the past, yet it is difficult to compare the performance of different systems, since the conditions under which these systems are evaluated differ considerably. Hence, the accuracy information presented in literature varies widely, even for conceptually identical systems. This paper proposes to evaluate the performance of location systems in standardised test environments. To this end, existing location systems are discussed to assess their information requirements and their reported accuracies. Subsequently, the requirements for benchmarks in the context of Wireless LAN location systems are established. To conclude, a publicly available benchmark is presented against which different Wireless LAN location systems can be compared","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125999007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rebecca Bulander, M. Decker, Gunther Schiefer, B. Kölmel
{"title":"Comparison of Different Approaches for Mobile Advertising","authors":"Rebecca Bulander, M. Decker, Gunther Schiefer, B. Kölmel","doi":"10.1109/WMCS.2005.8","DOIUrl":"https://doi.org/10.1109/WMCS.2005.8","url":null,"abstract":"Mobile terminals, such as cellular phones and PDAs, have an enormous advertising potential: they are extremely popular and most people carry such devices with them all day, enabling personalized advertising. However, there is a serious danger that the Spam wave, known from e-mail communication, will spillover to mobile devices. In addition, it is important to take protection of private data seriously, because mobile terminals are also used for personal communication. In this article, we discuss the special features and challenges of mobile advertising and introduce the MoMa-system for mobile advertising. MoMa supports personalized advertising using context information while guaranteeing data protection. We also name criteria for the comparison of mobile advertising systems and apply them to compare MoMa to other approaches","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122659790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Humancentric Applications of RFID Implants: The Usability Contexts of Control, Convenience and Care","authors":"A. Masters, K. Michael","doi":"10.1109/WMCS.2005.11","DOIUrl":"https://doi.org/10.1109/WMCS.2005.11","url":null,"abstract":"Recent developments in the area of RFID have seen the technology expand from its role in industrial and animal tagging applications, to being implantable in humans. With a gap in literature identified between current technological development and future humancentric possibility, little has been previously known about the nature of contemporary humancentric applications. This paper utilizes usability context analyses, to provide a cohesive study on the current development state of humancentric applications, detached from the emotion and prediction which plagues this particular technology","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130463460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing the Application of E-Commerce inWireless Network","authors":"Hyunsung Kim, Il-Gon Kim, Jin-Young Choi","doi":"10.1109/WMCS.2005.29","DOIUrl":"https://doi.org/10.1109/WMCS.2005.29","url":null,"abstract":"Owing to the explosive growth of the Internet, various electronic payment systems have been studied and suggested. The security of electronic payment protocols is of particular interest to researchers in academia and industry. However, current electronic cash protocols are not offering adequate security of user information. The BCY protocols (Beller, Chang, and Yacov) are electronic commerce protocols using a certificate in a wireless network. The core of BCY is a set of electronic transactions that reflect common trading activities such as purchasing goods or depositing funds. We use FDR (failure divergence refinements) to verify BCY protocols. Our aim in this paper is to design a practical electronic payment protocol which is secure in wireless circumstances","PeriodicalId":117531,"journal":{"name":"Second IEEE International Workshop on Mobile Commerce and Services","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132192033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}