{"title":"Location-Based Services for Emergency Management: A Multi-stakeholder Perspective","authors":"A. Aloudat, K. Michael, Roba Abbas","doi":"10.1109/ICMB.2009.32","DOIUrl":"https://doi.org/10.1109/ICMB.2009.32","url":null,"abstract":"This paper investigates the deployment of location-based services for nationwide emergency management by focusing on the perspectives of two stakeholders, government and end-users, in the cellular mobile phone value chain. The data collected for the study came from a single in-depth interview and open comments in a preliminary end-user survey. The themes presented have been categorised using a qualitative analysis. The findings indicate that although governments and end-users believe that location-based services have the potential to aid people in emergencies, there are several major disagreements over the proposed deployment. This paper is an attempt to help determine the underlying motivations and impediments that would influence the decisions of both stakeholders and also towards providing a better understanding of the anticipated role of each party in such a deployment.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115252573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nan Jiang, Xiang-dong Liu, Jing-ying Zhao, Dezhi Yang
{"title":"A Mobile Micropayment Protocol Based on Chaos","authors":"Nan Jiang, Xiang-dong Liu, Jing-ying Zhao, Dezhi Yang","doi":"10.1109/ICMB.2009.55","DOIUrl":"https://doi.org/10.1109/ICMB.2009.55","url":null,"abstract":"By research on typical payment protocol of the PayWord, the paper points out its security problems, and presents a new mobile micropayment protocol based on chaotic Hash function. This protocol generates pay certificate and encrypts order messages transmitted in the network with symmetric encryption algorithm. It also constructs secure chaotic Hash function based on Hénon-like mapping, and creates two payment chains using chaotic Hash function in the protocol, The protocol is not only the anonymous concerning so that the user information which can ensure the confidentiality of the ordered message, but also realizes the partial fairness. Research results demonstrate that the new protocol has greater security and efficiency, and suits to those mobile micropayment transactions systems.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical Study on Factors Influencing C2C Online Fraud in China","authors":"Meng Xianqiang, Shao Bingjia, He Junhui","doi":"10.1109/ICMB.2009.53","DOIUrl":"https://doi.org/10.1109/ICMB.2009.53","url":null,"abstract":"Internet fraud is becoming one of the important factors which hinder the development of CtoC electronic commerce in China. This paper developed an antecedent model of CtoC e-commerce fraud that includes the factors of product characteristic, seller characteristic, communication ability and buyer characteristic. The research model has been tested with the data from TaoBao. The results show that product characteristics and ability to communicate are the two important factors. Some suggestions for sellers and C2C service provider have been given based on the results.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"62 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131298095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heng Xu, Sumeet Gupta, M. Rosson, John Millar Carroll
{"title":"Effectiveness of Privacy Assurance Approaches in Location-Based Services: A Study of India and the United States","authors":"Heng Xu, Sumeet Gupta, M. Rosson, John Millar Carroll","doi":"10.1109/ICMB.2009.54","DOIUrl":"https://doi.org/10.1109/ICMB.2009.54","url":null,"abstract":"The increasing commercial potential and rapid growth of location based services (LBS) have been accompanied by concerns over the collection and use of personal information by LBS providers. In this paper we study the influence of three privacy assurance approaches that might be used to ensure privacy in location-based services. With the usage context included as a covariate, we examine the influence of privacy assurance approaches in individualist and collectivist cultures. The results reveal how culture may moderate the effects of privacy assurance approaches on influencing users' privacy risk and information control perceptions. Implications for theory and practice are discussed.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131209178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical Study on Mobile Web Browsing Service Adoption in Korea","authors":"S. Ryoo, Hyojin Kim, So-Won Jeon","doi":"10.1109/ICMB.2009.62","DOIUrl":"https://doi.org/10.1109/ICMB.2009.62","url":null,"abstract":"Mobile web browsing services bring the full PC browsing experience to customer's mobile handsets which have been emerged. This study is to investigate the intention to use mobile web browsing based on Technology Acceptance Model (TAM) which has been widely used to explain and predict the IT acceptance and incorporated with self-efficacy which was identified as an important determinant of user's new technology adoption in recent literature on technology acceptance. Specifically, from a theoretical perspective, this study is not only clarifies mobile self-efficacy, but also develops an instrument to measure the concept of mobile self-efficacy. The results indicate that both internet self-efficacy and mobile self-efficacy directly influence perceived ease of use. And the findings indicate that perceived ease of use and usefulness have direct effects on attitude and then it is positively associated with intention to use mobile web browsing. Additional theoretical and practical implications of these findings are also discussed in the paper.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133746904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Current State of Commercial Location-Based Service Offerings in Australia","authors":"Roba Abbas, K. Michael, M. Michael, A. Aloudat","doi":"10.1109/ICMB.2009.40","DOIUrl":"https://doi.org/10.1109/ICMB.2009.40","url":null,"abstract":"Location-based services (LBS) provide geographic data for a variety of purposes, and through numerous devices such as mobile phones, GPS navigation systems, palm pilots and increasingly desktop computers. Presently, there is scant information relating to the current state of the LBS market, specifically location-based service applications in Australia. This study makes use of usability context analyses to examine Australia’s three leading telecommunications operators- Telstra, Optus and Vodafone- with a view to providing an overview of the types of services and solutions presently offered and targeted at the consumer, business and emergency segments. There are two units of analysis (i) the company at the upper level, and (ii) the usability context at the lower level. A number of general, regulatory and future considerations and questions are also posed in the paper to indicate the future research direction.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Understanding Dynamics of Mobile Phone Worm Propagation Using Social Network Analysis","authors":"Q. Wei, Ming Ren, Guoqing Chen","doi":"10.1109/ICMB.2009.56","DOIUrl":"https://doi.org/10.1109/ICMB.2009.56","url":null,"abstract":"These years have witnessed the growing impact of worms that target mobile phones, which attracts more and more research interests and applicable focuses. Traditionally, SI model is used to analyze the dynamics of the worm propagation, which adopts the “random surfer” hypothesis. However, the contact social network of a mobile phone population is static and fixed in a short propagation period, which means the traditional SI model will overestimate the worm propagation dynamics. This paper will explore the dynamics of SI model based on a static contact network using social network analysis method. Theoretic analysis and simulated experiments show that the Traditional SI model overestimates worm propagation dynamics even in the worst contact network structure.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134217816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A MCT Acceptance Model from the Cultural Perspective and Its Empirical Test in the Mobile Municipal Administrative System Application","authors":"N. Zhang, Xunhua Guo, Guoqing Chen, Gang Song","doi":"10.1109/ICMB.2009.61","DOIUrl":"https://doi.org/10.1109/ICMB.2009.61","url":null,"abstract":"With the development of mobile communication technologies (MCT), non-tech factors show more significant impacts in the process of innovation diffusion and service utilization in the ubiquitous network society. To analyse the individual acceptance of mobile communication technology (MCT) from the cultural perspective, a novel model is proposed based on Hofstede’s theoretical framework. In this paper, we conduct an empirical study with regard to the acceptance of a mobile municipal administrative system in Beijing for testing this model and analyzing the acceptance mechanism of the target system as well as other similar MCTs for governmental organizations. Some cultural implications of the validation results, limitations, and future goals of the study are also discussed.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121975591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Model and Trait of the 4G Self-Organization Mobile Business Network","authors":"Wu Di, Guo Hongyan","doi":"10.1109/ICMB.2009.47","DOIUrl":"https://doi.org/10.1109/ICMB.2009.47","url":null,"abstract":"Mobile business is a promising industry created by the emergence of wireless date networks. The users could use mobile terminals to transmit data and conduct business activities. The 4G Self-organization Mobile Business Network is a sort of business network in which the clients and the services or goods providers, both of whom move freely, could organize a self-organized network rapidly especially without infrastructure in emergency situation or in the case of requiring high privacy. It isolates from public network. This paper proposes a model of 4G Self-organization Mobile Business Network and then displays the trait of it.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HTML Tree Parsing Algorithm Based on Pre-extracted Data","authors":"Mingqiu Song, Ruixue Zhang, Duo Gang","doi":"10.1109/ICMB.2009.50","DOIUrl":"https://doi.org/10.1109/ICMB.2009.50","url":null,"abstract":"In the paper, a new method of extracting HTML Tree from web pages is proposed. Its main idea is that the parts of web pages which are not easy to parse including tags and attributes should be handled previously, then the remaining parts are tidied and parsed, and then both the two former extracted parts are deposited in the tree. As integrated the tidying process and the parsing process, the new method does not only keep the web data integrity but also simplify the complexity of algorithms. The test shows that it can parse all kinds of web pages and provide concrete fault tolerance mechanisms.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"159 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}