{"title":"Speech interface: an enhancer to the acceptance of m-commerce applications","authors":"Yandong Fan, A. Saliba, E. Kendall, J. Newmarch","doi":"10.1109/ICMB.2005.97","DOIUrl":"https://doi.org/10.1109/ICMB.2005.97","url":null,"abstract":"Speech interfaces have become increasingly popular to support mobile commerce. While interface frameworks and dialogue management have been well studied, there is a lack of analytical research on the acceptance of speech-enabled m-commerce services. In this paper, we propose a framework to explain the acceptance of m-commerce from the consumers' perspective. The framework incorporates value propositions of m-service into a service acceptance model derived from a meta-analysis. The significance of a speech interface to m-commerce is evaluated and confirmed in line with the proposed framework. Strategies for developing speech-enabled applications are also suggested.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127863508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal placement of access point in WLAN based on a new algorithm","authors":"S. Kouhbor, J. Ugon, A. Kruger, A. Rubinov","doi":"10.1109/ICMB.2005.75","DOIUrl":"https://doi.org/10.1109/ICMB.2005.75","url":null,"abstract":"When designing wireless communication systems, it is very important to know the optimum numbers and locations for the access points (APs). The impact of incorrect placement of APs is significant. If they are placed too far apart, they will generate a coverage gap, but if they are too close to each other, this will lead to excessive co-channel interferences. In this paper we describe a mathematical model developed to find the optimal number and location of APs. To solve the problem, we use the discrete gradient optimization algorithm developed at the University of Ballarat. Results indicate that our model is able to solve optimal coverage problems for different numbers of users.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126752111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile station location based on hybrid of signal strength and time of arrival","authors":"G. Kbar, W. Mansoor","doi":"10.1109/ICMB.2005.69","DOIUrl":"https://doi.org/10.1109/ICMB.2005.69","url":null,"abstract":"Positioning of users or mobile station (MS) in cellular systems becomes an interesting topic since the related number of applications for the location information is growing rapidly. The decision to make the locating of mobile phones under the US Federal Communications Commission (FCC) mandatory is one of the driving forces to research and provide solutions to it. Deploying such applications would require a proper method for positioning the MS that are simple and accurate especially in urban area. There are many research papers addressing this issue based on timing method that calculate the timing delay for signal sent from MS to base station (BS) or vise versa, and other method based on signal strength. In this paper, we present a new calculation method to locate the mobile phone in urban district. This technique is based on hybrid method that uses signal strength to estimate the timing delay and comparing it with the measured time of arrival of the signal. The minimum timing value of the two results would be accepted and averaged for n samples. This will improve the accuracy and reduce the effect of multi-path signaling that both timing signaling and signal strength methods suffer from. In addition, a new calculation method has been presented to find the location of MS based on the BSs coordinates.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122487080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use scenarios: a useful design tool for mbusiness","authors":"Kirsten Sadler, Toni Robertson, Melanie Kan","doi":"10.1109/ICMB.2005.109","DOIUrl":"https://doi.org/10.1109/ICMB.2005.109","url":null,"abstract":"This paper presents use scenarios, derived from user-centred design research and practice, as a useful tool for representing the user in the design of mbusiness technologies. Use scenarios are increasingly being employed as a method for addressing issues facing the mbusiness community such as lack of adoption of technologies and services, usability issues, and the difficulty of designing technologies for a variety of users. Their use in the design of new mobile technologies enhances the likelihood that these technologies will be widely adopted to successfully exploit the wealth generating potential of the mobile wireless market. This paper reviews the place of use scenarios within user-centred design and then considers how scenarios have been used to date within mbusiness. We conclude with a discussion of the differences between empirically derived and fictional use scenarios, arguing for the importance of the former for grounding the design within its context of use.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131224909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless remote healthcare monitoring with Motes","authors":"Einstein Lubrin, E. Lawrence, Karla Felix Navarro","doi":"10.1109/ICMB.2005.115","DOIUrl":"https://doi.org/10.1109/ICMB.2005.115","url":null,"abstract":"As the world's aged population grows many governments are looking to remote healthcare monitoring solutions. It is certainly cheaper to keep the elderly and infirm in their own homes rather than in aged-care facilities. However will these remote and wireless monitoring devices deliver what they promise? The medical profession needs strong evidence before they embrace such techniques. In this paper the authors describe the building of a remote monitoring prototype which uses motes, a PDA and a network management application to show that commodity-based hardware may provide one answer to the problem of remotely monitoring people in their own homes. Privacy and security issues associated with such monitoring are also discussed.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131565821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile ticketing system employing TrustZone technology","authors":"Wan Huzaini Wan Hussin, P. Coulton, R. Edwards","doi":"10.1109/ICMB.2005.71","DOIUrl":"https://doi.org/10.1109/ICMB.2005.71","url":null,"abstract":"Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the critical issues for successful adoption of mobile commerce both from an operator and user perspective. Although there are many aspects relating to security in this paper we concentrate on one of the current difficulties concerned with the provision of mobile receipt. Current systems depend entirely on the merchant providing the proof of purchase relating to a particular item or service and many users can experience difficulty if the system fails. Further, as current mobile devices do not offer any verifiable security over the data stored means that merchants can have little confidence in receipts stored on the device. In this paper we present a simple mobile receipt system that offers security both for customer and merchant based on the new TrustZone architecture for ARM devices.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116236516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simple implementation framework for m-government services","authors":"A. Mukherjee, A. Biswas","doi":"10.1109/ICMB.2005.93","DOIUrl":"https://doi.org/10.1109/ICMB.2005.93","url":null,"abstract":"In today's world, where mobile and wireless technology are growing without bounds, the extension of e-government services to m-governance seems to be not a distant reality. M-government is itself a complex business strategy for the efficient utilization of all wireless devices providing for instant availability of services and information for better benefits to users. This concept paper proposes the implementation framework for m-government services to different parties like citizens, businesses and governments. This implementation framework contains two guidelines namely the network architecture for m-government and the implementation methodology for its (government's) services to different parties particular to citizens. The implementation methodology, we propose here, is applied with to other parties with some modifications of this methodology. This framework for m-government services points to Indian context in few occasions as an example case to explain the fact.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity management in vertical handovers for UMTS-WLAN networks","authors":"Mo Li, K. Sandrasegaran, Xiaoan Huang","doi":"10.1109/ICMB.2005.43","DOIUrl":"https://doi.org/10.1109/ICMB.2005.43","url":null,"abstract":"One motivation of mobile next-generation networks (NGN) is the ubiquitous computing abilities, which provide automatic handovers for any moving computing devices in a globally networked environment. The vertical handover is defined as the process of changing from one technology to another. For example, the data services are switched to wireless local area networks (WLAN) from the previously attached Universal Mobile Telecommunication System (UMTS) networks. Identity management is considered important for vertical handovers for managing continued access to network resources. In this paper, we address several aspects of identity management requirements in the vertical handovers between UMTS and WLAN.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"589 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123180829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inhibitors and facilitators for mobile payment adoption in Australia: a preliminary study","authors":"Evelyn Teo, Bardo Fraunholz, C. Unnithan","doi":"10.1109/ICMB.2005.47","DOIUrl":"https://doi.org/10.1109/ICMB.2005.47","url":null,"abstract":"With the seamless diffusion and acceptance of mobile phones into people's everyday life as trusted communication devices, businesses have begun exploring their potential as payment devices. In this paper, we report on the findings from a pioneering study conducted in Australia, which explored inhibitors and facilitators in the adoption of mobile phones as payment devices.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124479253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consumers perceptions and attitudes towards SMS mobile marketing in New Zealand","authors":"Amy Carroll, S. Barnes, Eusebio Scornavacca","doi":"10.1109/ICMB.2005.30","DOIUrl":"https://doi.org/10.1109/ICMB.2005.30","url":null,"abstract":"Mobile marketing is an area of m-commerce expected to experience tremendous growth in the next 5 years. This paper explores consumer's perceptions and attitudes towards mobile marketing via SMS through a sequential, mixed methods investigation. Four factors were identified and proven as all having a significant impact on mobile marketing acceptance - permission, content, wireless service provider (WSP) control and the delivery of the message, which guided the development of a revised and empirically tested model of m-marketing consumer acceptance. The findings also suggest that marketers should be optimistic about choosing to deploy mobile marketing, however exercise caution around the factors that will determine consumer acceptance. The paper concludes with a discussion about directions for future research.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124907670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}