{"title":"Security Analysis of Two Password Authentication Schemes","authors":"Zuowen Tan","doi":"10.1109/ICMB.2009.57","DOIUrl":"https://doi.org/10.1109/ICMB.2009.57","url":null,"abstract":"Recently, Rhee, Kwon and Lee proposed a practical authentication scheme only based on the common storage device. In the scheme the remote user does not need to use smart cards. It is convenient for the users to use a common storage device such as a universal serial bus memory. The scheme is easy to implement. However, this authentication scheme is vulnerable to impersonation attacks and middle man attacks. An attacker could impersonate legitimate users to login and access the remote server. In addition, we analyze the security of Fan-Chan- Zhang’s scheme. The scheme suffers from replay attacks and impersonation attacks.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical Studies on Mobile Phone Dependency Syndrome","authors":"Dong-Her Shih, Ching-Chiang Chen, Hsiu-Sen Chiang","doi":"10.1109/ICMB.2009.38","DOIUrl":"https://doi.org/10.1109/ICMB.2009.38","url":null,"abstract":"Mobile phones have become so popular that nearly everybody owns one. According to the investigation research of National Communications Commission, the popularity rate of mobile phone was 107.3%. It means that third-generation mobile services have become the mainstream of Taiwan mobile services. In the future, during the continuous progress of mobile technology, each person will be more seriously dependence on mobile phones. A total of 450 questionnaires were sent and the response rate is 47.1% and total 184 valid questionnaires received. The analytical results revealed that there is a significant difference between the usage of mobile phone and the level of MPDS. Besides, the level of the dependence on mobile phone between the male users and female users have no significant difference and there are no significant difference between the dependence on mobile phone and the handset uses time.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127262630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discussion on the Dimensions of Consumers' Perceived Risk in Mobile Service","authors":"Yongqing Yang, Jinlong Zhang","doi":"10.1109/ICMB.2009.71","DOIUrl":"https://doi.org/10.1109/ICMB.2009.71","url":null,"abstract":"Mobile service is increasingly known by most of the users of mobile devices, but individuals’ adoption of mobile service is relative slow. Consumers’ perceived risk is one of the reasons for that. Thus, the research on consumers’ perceived risk in mobile service is necessary. On the basis of the review of consumers’ perceived risk theory, and considering the characteristics of the mobile service, the dimensions of consumers’ perceived risk in mobile service are proposed and verified through a focus group discussion. The study may be helpful for mobile service providers to take effective measures to reduce consumers’ perceived risk, and then to improve their operation and profitability.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130872569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Phones and Their Substitutes: Task-Medium Fit and Business Models","authors":"Mads Bødker, Gregory Gimpel, J. Hedman","doi":"10.1109/ICMB.2009.12","DOIUrl":"https://doi.org/10.1109/ICMB.2009.12","url":null,"abstract":"Drawing on data from a longitudinal field study, this paper investigates the influence of existing, better and stand-alone technology substitutes on the use of smart phones. By applying prospect theory, media richness theory, and business model literature, the purpose of this paper is to improve our understanding of the role of substitutes, device content fit issues, and implications for business models by asking the question: What is an effective business model to address the relationship between user preference and the fit of the smart phone and everyday task? The field study data suggest the need for business models to recognize that adoption decisions are reference dependent and strongly influenced by the fit between task and smart phone.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133419631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Factors Affecting the Acceptance of Mobile Coupons in Malaysia","authors":"Sudarsan Jayasingh, U. Eze","doi":"10.1109/ICMB.2009.63","DOIUrl":"https://doi.org/10.1109/ICMB.2009.63","url":null,"abstract":"Distributing discount coupons through mobile phone text messages or short message service has become the latest promotional strategies of companies. Mobile coupons present an exciting new opportunity to target consumers with highly customized offers. Not much research is done on the factors influencing attitude and behavioral intention of consumers using m-coupons. The present study uses the Technology Acceptance Model (TAM) as the basic model to analyze the attitude and behavioral intention of consumers towards m-coupons. A number of researchers have studied user acceptance of mobile technology and services such as the mobile Internet, text messaging, contact services, mobile payment, mobile gaming and mobile parking services based on IS adoption models. They found that usefulness and ease of use are very important factors determining user acceptance of mobile technology. The results of these studies confirm that in the mobile technology context, traditional adoption models such as TAM could be applied but they need to be modified and extended in order to increase their prediction and explanation power. Results of the study shows that Perceived usefulness, attitude and Social factor influence the behavior and intention of consumers in using m-coupons.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133068566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Karaiskos, Panos E. Kourouthanassis, Panagiota Lantzouni, G. Giaglis, C. Georgiadis
{"title":"Understanding the Adoption of Mobile Data Services: Differences among Mobile Portal and Mobile Internet Users","authors":"D. Karaiskos, Panos E. Kourouthanassis, Panagiota Lantzouni, G. Giaglis, C. Georgiadis","doi":"10.1109/ICMB.2009.10","DOIUrl":"https://doi.org/10.1109/ICMB.2009.10","url":null,"abstract":"This study attempts to investigate the potential differences among individual adoption patterns between m-portal and m-internet services usage. A theoretical model that reflects a set of unique predominant factors of IS usage was developed. The model was empirically tested using data collected on mobile data services adoption. The results indicate that there are differences among the adoption behavior of mobile portal users and mobile internet users. Specifically, mobile internet use is likely to be driven by utilitarian expectations and overall usefulness of accessing the web through this alternative medium. On the contrary, mobile portals use is likely to be dependent on the users’ current state of innovativeness and not being affected by the actual utility of the mobile data service. The paper concludes with theoretical and practical implications of our findings.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114831545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The \"Silk\" Road to 3G: Mobile Telecommunications Market Innovation in China","authors":"Zhiyuan Ge, Jiang Yu, P. Gao","doi":"10.1109/ICMB.2009.64","DOIUrl":"https://doi.org/10.1109/ICMB.2009.64","url":null,"abstract":"Drawing upon actor-network theory and Lyytinen and King (2002)’s classification on the factors influencing standard adoption, this paper investigates China’s experience of moving towards the third generation (3G) market. We will disclose how the specific technological, institutional and social contexts of China has influenced different social actors to push the market innovate in a unique way.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Context-Aware Mobile Chinese Language Learning for Foreign Students","authors":"Khalil Al-mekhlafi, Xiangpei Hu, Ziguang Zheng","doi":"10.1109/ICMB.2009.65","DOIUrl":"https://doi.org/10.1109/ICMB.2009.65","url":null,"abstract":"In recent years, there are a large number of foreign students coming to learn Chinese language. However due to the characters of Chinese language, it is usually difficult for them to learn. In order to provide a suitable mobile environment to learn Chinese language for foreign students, this paper presents an approach to Context-aware Mobile Chinese Language Learning (CAMCLL) for foreign students. The idea of CAMCLL approach is, to provide service guide for foreign students when they are out of school, and moreover the form of service will be provided as suitable sentences towards achieving the real world Chinese language practice. The architecture of CAMCLL is introduced. A context model including four contexts (time, location, activity, and learner level) is proposed. The ontology-based matching with the combination of rule-based matching is a special feature in building matching mechanism. The approach discussed will enhance the Chinese language learning efficiency and effects for foreign students.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132849621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
She-I Chang, Tien-Cheng Peng, Yu-Chung Hung, I-Cheng Chang, W. Hung
{"title":"Critical Success Factors of Mobile Commerce Adoption: A Study Based on the System Life Cycle and Diamond Model","authors":"She-I Chang, Tien-Cheng Peng, Yu-Chung Hung, I-Cheng Chang, W. Hung","doi":"10.1109/ICMB.2009.29","DOIUrl":"https://doi.org/10.1109/ICMB.2009.29","url":null,"abstract":"This research aims to identify the critical successful factors of mobile commerce (m-commerce) adoption in each stage of the system life cycle and to further build a reference model for businesses’ consultation towards a successful m-commerce adoption. We initially identified 21 critical factors based on Gowin’s Vee conceptual learning framework and the grounded theory method. These factors are further arranged into a model developed from combining the four aspects in Leavitt’s diamond model and the six stages in Sathish et al’s system life cycle. A Delphi questionnaire and a case study are used to revise the model and verify the its applicability, respectively. The results of this study have found more factors from the top 10 critical success factors categorized as Technology and Task aspects. Furthermore, the top three important factors for m-commerce adoption are the support capabilities of the IT vendor, senior management support, and capabilities of the project team.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130497283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Future Scenarios for Local Area Access: Industry Structure and Access Fragmentation","authors":"T. Smura, Antti Sorri","doi":"10.1109/ICMB.2009.17","DOIUrl":"https://doi.org/10.1109/ICMB.2009.17","url":null,"abstract":"Indoor deployments of wireless access points will likely be required to fulfill the future traffic capacity requirements. Considerable uncertainty exists, however, about the technologies utilized to provide local area access, as well as the roles of different actors in the value network providing mobile services. We apply Schoemaker’s scenario planning method to identify and analyze the key uncertainties and to construct four alternative and plausible future scenarios having different implications to local area access technologies and business models. The results are valuable in designing wireless technologies and standards for the future, as well as in pointing out the role of local area access provisioning as a potential control point in the mobile services business.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133928459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}