International Conference on Mobile Business (ICMB'05)最新文献

筛选
英文 中文
Comparing consumer value creation in Internet and mobile banking 比较互联网和手机银行的消费者价值创造
International Conference on Mobile Business (ICMB'05) Pub Date : 2005-07-11 DOI: 10.1109/ICMB.2005.28
Tommi Laukkanen
{"title":"Comparing consumer value creation in Internet and mobile banking","authors":"Tommi Laukkanen","doi":"10.1109/ICMB.2005.28","DOIUrl":"https://doi.org/10.1109/ICMB.2005.28","url":null,"abstract":"The financial services sector has experienced major changes during the last decade. Among others, the technological development has reshaped the consumption of financial services. Banking especially has undergone changes unprecedented in its history. Understanding consumers, customer needs and values has become more important for financial institutions, not only due to the changing environment but also because of changed customer behaviour. The aim of this paper is to explore and compare consumer value creation in Internet and mobile banking. A qualitative in-depth interviewing method was applied in order to ascertain the factors that create value for customers in the use of the fund transfer service via personal computer and mobile phone. The results indicate that Internet and mobile channels differ in their potential to create value for customers' banking actions.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127231640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Business model scenarios for seamless content distribution and delivery 无缝内容分发和交付的业务模型场景
International Conference on Mobile Business (ICMB'05) Pub Date : 2005-07-11 DOI: 10.1109/ICMB.2005.24
U. W. D. Montalvo, P. Ballon, J. Sokol
{"title":"Business model scenarios for seamless content distribution and delivery","authors":"U. W. D. Montalvo, P. Ballon, J. Sokol","doi":"10.1109/ICMB.2005.24","DOIUrl":"https://doi.org/10.1109/ICMB.2005.24","url":null,"abstract":"This paper addresses the issue of feasible business models for seamless multimedia content distribution and delivery over mobile, wireless and fixed networks. An open, interlayer approach to content delivery networks sets the scene for a great deal of flexibility in the value network for content distribution and delivery by uncoupling CDN-related roles currently bound together in proprietary solutions. Based on empirical research among the most important CDN stakeholders (network operators, service providers, and content providers), this paper presents a set of business model scenarios for next-generation multimedia CDNs. It concludes that these CDNs are either integrated downstream by network operators or ISPs or result in a new breed of service platform provider.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using the novel FLC dynamic buffer size tuning technique to support more dependable location-aware information retrieval 采用新颖的FLC动态缓冲区大小调优技术,支持更可靠的位置感知信息检索
International Conference on Mobile Business (ICMB'05) Pub Date : 2005-07-11 DOI: 10.1109/ICMB.2005.111
Wilfred W. K. Lin, T. Dillon, Allan K. Y. Wong
{"title":"Using the novel FLC dynamic buffer size tuning technique to support more dependable location-aware information retrieval","authors":"Wilfred W. K. Lin, T. Dillon, Allan K. Y. Wong","doi":"10.1109/ICMB.2005.111","DOIUrl":"https://doi.org/10.1109/ICMB.2005.111","url":null,"abstract":"This paper proposes to use the novel fuzzy logic controller (FLC), which is a dynamic buffer size tuning technique, to support more dependable location-aware information retrieval. Within a smart space supported by mobile/pervasive computing a user may request service from the surrogate through a portable SFF (small-for-factor) device (e.g. PDA). Therefore, the one-surrogate-to-many-SFF-clients relationship or asymmetric rendezvous can easily lead to surrogate reception buffer overflow during peak demand periods. In fact, the traffic of requests to a surrogate is tied in with the transient traveler traffic through the smart space, for example, an airport. Once overflow has happened the user cannot benefit from the cyber foraging supported by the infrastructure. The FLC adoptively tunes the surrogate buffer size so that the buffer length always covers the queue length by the given /spl Delta/ safety margin. In this way the chance of surrogate reception buffer overflow is eliminated, and as a result the asymmetric rendezvous becomes more reliable and dependable, leading to shorter SFF-client/surrogate service roundtrip time.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge management through mobile networks in emergency situations 在紧急情况下通过移动网络进行知识管理
International Conference on Mobile Business (ICMB'05) Pub Date : 2005-07-11 DOI: 10.1109/ICMB.2005.54
Hamidreza Pousti, H. Hasan
{"title":"Knowledge management through mobile networks in emergency situations","authors":"Hamidreza Pousti, H. Hasan","doi":"10.1109/ICMB.2005.54","DOIUrl":"https://doi.org/10.1109/ICMB.2005.54","url":null,"abstract":"This paper concerns public emergency situations, which are the responsibility of a select set of organisations in the public, private and community sectors. It reports on an analysis of the knowledge management implications of mobile networks, using wireless technology designed for such situations. This follows the path of a research project concerning the need to integrate technological, logistical and organisational knowledge management issues within and between organisations with regard to their response to emergency situations. The analysis of a secondary case is used to illustrate and analyse the issue using a realistic and holistic approach.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125674754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MMPS: a versatile mobile-to-mobile payment system MMPS:一个多功能的移动到移动支付系统
International Conference on Mobile Business (ICMB'05) Pub Date : 2005-07-11 DOI: 10.1109/ICMB.2005.61
A. Saxena, M. Das, Anurag Gupta
{"title":"MMPS: a versatile mobile-to-mobile payment system","authors":"A. Saxena, M. Das, Anurag Gupta","doi":"10.1109/ICMB.2005.61","DOIUrl":"https://doi.org/10.1109/ICMB.2005.61","url":null,"abstract":"The paper presents an effective mobile-to-mobile payment system. A mobile phone with or without SIM card is enabled as an EMV payment instrument and is linked to a debit or credit account in a bank to pay merchant who has a mobile phone or an online EMV capable terminal. In a single phone, multiple credit or debit accounts from different banks can be configured without compromising on security. The proposed framework provides a secure and convenient payment mechanism without any terminal infrastructure.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
RFID-based logistics control system for business-to-business e-commerce 基于rfid的企业对企业电子商务物流控制系统
International Conference on Mobile Business (ICMB'05) Pub Date : 2005-07-11 DOI: 10.1109/ICMB.2005.85
Lei Ye, Henry C. B. Chan
{"title":"RFID-based logistics control system for business-to-business e-commerce","authors":"Lei Ye, Henry C. B. Chan","doi":"10.1109/ICMB.2005.85","DOIUrl":"https://doi.org/10.1109/ICMB.2005.85","url":null,"abstract":"This paper presents an RFID-based logistics control system for business-to-business electronic commerce. In particular, two contributions are made. First, we employ an XML-based method that effectively and flexibly reads/writes RFID tags for the purpose of identifying goods. Second, we employ a Markov decision model or backward induction algorithm to find the best way to transport goods based on the information on the tags. Analytical results are presented to evaluate the effectiveness of the system.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A framework of privacy shield in organizational information systems 组织信息系统中的隐私保护框架
International Conference on Mobile Business (ICMB'05) Pub Date : 2005-07-11 DOI: 10.1109/ICMB.2005.4
G. Skinner, Song Han, E. Chang
{"title":"A framework of privacy shield in organizational information systems","authors":"G. Skinner, Song Han, E. Chang","doi":"10.1109/ICMB.2005.4","DOIUrl":"https://doi.org/10.1109/ICMB.2005.4","url":null,"abstract":"Preserving privacy and the protection of personally identifiable information (PH) has been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in an attempt to fight terrorism, would have a serious impact on an individual's right and ability to protect their privacy. This paper proposes a new framework for preserving privacy for individuals along with the protection of personally identifiable information. We have termed it privacy shield. Through the application of anonymity and privacy principles in design, the privacy protecting separation of data, the use of public key infrastructure, and the application of our information system Hippocratic policies, we provide a framework of privacy shield to protect an information system user's personal data.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132148965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Boosting m-business using a truly secured protocol for data gathering mobile agents 使用真正安全的协议来收集移动代理的数据,促进移动商务
International Conference on Mobile Business (ICMB'05) Pub Date : 2005-07-11 DOI: 10.1109/ICMB.2005.23
Raja Al-Jaljouli
{"title":"Boosting m-business using a truly secured protocol for data gathering mobile agents","authors":"Raja Al-Jaljouli","doi":"10.1109/ICMB.2005.23","DOIUrl":"https://doi.org/10.1109/ICMB.2005.23","url":null,"abstract":"The paper focuses on the security issue of employing mobile agents in m-business. The trustworthiness of mobile agents is crucial to the success of m-business. To be trustworthy, a mobile agent must protect its gathered data against adversaries encountered while traversing the Internet. Several cryptographic protocols were presented in the literature asserting the security of gathered data. Formal verification of the protocols reveals security flaws, such as truncation, alteration, or breach of privacy of gathered data. We present an accurate security protocol for data gathering mobile agents. The protocol uses co-operating agents, performs verifications during agent's lifecycle in addition to the verifications upon agent's return to the originator. It also implements special security techniques on the top of the common techniques, which would rectify revealed flaws. We prove its correctness by verifying the security properties: authenticity, confidentiality, and strong integrity using STA, an infinite-state exploration formal method.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evolution of 3D games on mobile phones 手机3D游戏的演变
International Conference on Mobile Business (ICMB'05) Pub Date : 2005-07-11 DOI: 10.1109/ICMB.2005.39
F. Chehimi, P. Coulton, R. Edwards
{"title":"Evolution of 3D games on mobile phones","authors":"F. Chehimi, P. Coulton, R. Edwards","doi":"10.1109/ICMB.2005.39","DOIUrl":"https://doi.org/10.1109/ICMB.2005.39","url":null,"abstract":"While there is no doubt that there will be an increasing trend towards 3D games on mobile devices the resource constraints of the devices themselves and the highly variable nature of the environment present considerable challenges for games developers. In this paper we consider some of the current constraints together with current and, probable, future developments both in the software and hardware of mobile phones that will enable more sophisticated games to be developed. As part of this process we benchmark some of the latest and most prevalent software and devices to ascertain both the quality of the graphics produced and the effects on the battery life. Whilst we are certain that 3D games play an important future in the success of future mobile services the current baseline for development is highly variable and presents difficulties for games programmers both in development and wide scale distribution.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Using system dynamics to simulate the strategic planning of the mobile commerce terminal (MCT) industry and mobile commerce diffusion 运用系统动力学方法对移动商务终端产业战略规划和移动商务扩散进行了模拟
International Conference on Mobile Business (ICMB'05) Pub Date : 2005-07-11 DOI: 10.1109/ICMB.2005.110
Wenqing Wang, F. Cheong
{"title":"Using system dynamics to simulate the strategic planning of the mobile commerce terminal (MCT) industry and mobile commerce diffusion","authors":"Wenqing Wang, F. Cheong","doi":"10.1109/ICMB.2005.110","DOIUrl":"https://doi.org/10.1109/ICMB.2005.110","url":null,"abstract":"Mobile commerce refers to business activities over mobile terminals. A system dynamics (SD) approach is used to analyze how the strategic planning of the mobile commerce terminal (MCT) industry will influence the process of mobile commerce diffusion in a market. We study mobile commerce market development in a country as a dynamic social economic system. The simulation model is based upon the mobile commerce diffusion simulation model. We create a model for the Chinese market for the purpose of simulating MCT strategic planning and mobile commerce diffusion. The SD model is useful for providing an understanding of the process of mobile commerce diffusion and the formulation of strategies for the MCT industry.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132630646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信