{"title":"Comparing consumer value creation in Internet and mobile banking","authors":"Tommi Laukkanen","doi":"10.1109/ICMB.2005.28","DOIUrl":"https://doi.org/10.1109/ICMB.2005.28","url":null,"abstract":"The financial services sector has experienced major changes during the last decade. Among others, the technological development has reshaped the consumption of financial services. Banking especially has undergone changes unprecedented in its history. Understanding consumers, customer needs and values has become more important for financial institutions, not only due to the changing environment but also because of changed customer behaviour. The aim of this paper is to explore and compare consumer value creation in Internet and mobile banking. A qualitative in-depth interviewing method was applied in order to ascertain the factors that create value for customers in the use of the fund transfer service via personal computer and mobile phone. The results indicate that Internet and mobile channels differ in their potential to create value for customers' banking actions.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127231640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business model scenarios for seamless content distribution and delivery","authors":"U. W. D. Montalvo, P. Ballon, J. Sokol","doi":"10.1109/ICMB.2005.24","DOIUrl":"https://doi.org/10.1109/ICMB.2005.24","url":null,"abstract":"This paper addresses the issue of feasible business models for seamless multimedia content distribution and delivery over mobile, wireless and fixed networks. An open, interlayer approach to content delivery networks sets the scene for a great deal of flexibility in the value network for content distribution and delivery by uncoupling CDN-related roles currently bound together in proprietary solutions. Based on empirical research among the most important CDN stakeholders (network operators, service providers, and content providers), this paper presents a set of business model scenarios for next-generation multimedia CDNs. It concludes that these CDNs are either integrated downstream by network operators or ISPs or result in a new breed of service platform provider.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using the novel FLC dynamic buffer size tuning technique to support more dependable location-aware information retrieval","authors":"Wilfred W. K. Lin, T. Dillon, Allan K. Y. Wong","doi":"10.1109/ICMB.2005.111","DOIUrl":"https://doi.org/10.1109/ICMB.2005.111","url":null,"abstract":"This paper proposes to use the novel fuzzy logic controller (FLC), which is a dynamic buffer size tuning technique, to support more dependable location-aware information retrieval. Within a smart space supported by mobile/pervasive computing a user may request service from the surrogate through a portable SFF (small-for-factor) device (e.g. PDA). Therefore, the one-surrogate-to-many-SFF-clients relationship or asymmetric rendezvous can easily lead to surrogate reception buffer overflow during peak demand periods. In fact, the traffic of requests to a surrogate is tied in with the transient traveler traffic through the smart space, for example, an airport. Once overflow has happened the user cannot benefit from the cyber foraging supported by the infrastructure. The FLC adoptively tunes the surrogate buffer size so that the buffer length always covers the queue length by the given /spl Delta/ safety margin. In this way the chance of surrogate reception buffer overflow is eliminated, and as a result the asymmetric rendezvous becomes more reliable and dependable, leading to shorter SFF-client/surrogate service roundtrip time.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge management through mobile networks in emergency situations","authors":"Hamidreza Pousti, H. Hasan","doi":"10.1109/ICMB.2005.54","DOIUrl":"https://doi.org/10.1109/ICMB.2005.54","url":null,"abstract":"This paper concerns public emergency situations, which are the responsibility of a select set of organisations in the public, private and community sectors. It reports on an analysis of the knowledge management implications of mobile networks, using wireless technology designed for such situations. This follows the path of a research project concerning the need to integrate technological, logistical and organisational knowledge management issues within and between organisations with regard to their response to emergency situations. The analysis of a secondary case is used to illustrate and analyse the issue using a realistic and holistic approach.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125674754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MMPS: a versatile mobile-to-mobile payment system","authors":"A. Saxena, M. Das, Anurag Gupta","doi":"10.1109/ICMB.2005.61","DOIUrl":"https://doi.org/10.1109/ICMB.2005.61","url":null,"abstract":"The paper presents an effective mobile-to-mobile payment system. A mobile phone with or without SIM card is enabled as an EMV payment instrument and is linked to a debit or credit account in a bank to pay merchant who has a mobile phone or an online EMV capable terminal. In a single phone, multiple credit or debit accounts from different banks can be configured without compromising on security. The proposed framework provides a secure and convenient payment mechanism without any terminal infrastructure.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RFID-based logistics control system for business-to-business e-commerce","authors":"Lei Ye, Henry C. B. Chan","doi":"10.1109/ICMB.2005.85","DOIUrl":"https://doi.org/10.1109/ICMB.2005.85","url":null,"abstract":"This paper presents an RFID-based logistics control system for business-to-business electronic commerce. In particular, two contributions are made. First, we employ an XML-based method that effectively and flexibly reads/writes RFID tags for the purpose of identifying goods. Second, we employ a Markov decision model or backward induction algorithm to find the best way to transport goods based on the information on the tags. Analytical results are presented to evaluate the effectiveness of the system.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework of privacy shield in organizational information systems","authors":"G. Skinner, Song Han, E. Chang","doi":"10.1109/ICMB.2005.4","DOIUrl":"https://doi.org/10.1109/ICMB.2005.4","url":null,"abstract":"Preserving privacy and the protection of personally identifiable information (PH) has been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in an attempt to fight terrorism, would have a serious impact on an individual's right and ability to protect their privacy. This paper proposes a new framework for preserving privacy for individuals along with the protection of personally identifiable information. We have termed it privacy shield. Through the application of anonymity and privacy principles in design, the privacy protecting separation of data, the use of public key infrastructure, and the application of our information system Hippocratic policies, we provide a framework of privacy shield to protect an information system user's personal data.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132148965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Boosting m-business using a truly secured protocol for data gathering mobile agents","authors":"Raja Al-Jaljouli","doi":"10.1109/ICMB.2005.23","DOIUrl":"https://doi.org/10.1109/ICMB.2005.23","url":null,"abstract":"The paper focuses on the security issue of employing mobile agents in m-business. The trustworthiness of mobile agents is crucial to the success of m-business. To be trustworthy, a mobile agent must protect its gathered data against adversaries encountered while traversing the Internet. Several cryptographic protocols were presented in the literature asserting the security of gathered data. Formal verification of the protocols reveals security flaws, such as truncation, alteration, or breach of privacy of gathered data. We present an accurate security protocol for data gathering mobile agents. The protocol uses co-operating agents, performs verifications during agent's lifecycle in addition to the verifications upon agent's return to the originator. It also implements special security techniques on the top of the common techniques, which would rectify revealed flaws. We prove its correctness by verifying the security properties: authenticity, confidentiality, and strong integrity using STA, an infinite-state exploration formal method.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133426155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of 3D games on mobile phones","authors":"F. Chehimi, P. Coulton, R. Edwards","doi":"10.1109/ICMB.2005.39","DOIUrl":"https://doi.org/10.1109/ICMB.2005.39","url":null,"abstract":"While there is no doubt that there will be an increasing trend towards 3D games on mobile devices the resource constraints of the devices themselves and the highly variable nature of the environment present considerable challenges for games developers. In this paper we consider some of the current constraints together with current and, probable, future developments both in the software and hardware of mobile phones that will enable more sophisticated games to be developed. As part of this process we benchmark some of the latest and most prevalent software and devices to ascertain both the quality of the graphics produced and the effects on the battery life. Whilst we are certain that 3D games play an important future in the success of future mobile services the current baseline for development is highly variable and presents difficulties for games programmers both in development and wide scale distribution.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using system dynamics to simulate the strategic planning of the mobile commerce terminal (MCT) industry and mobile commerce diffusion","authors":"Wenqing Wang, F. Cheong","doi":"10.1109/ICMB.2005.110","DOIUrl":"https://doi.org/10.1109/ICMB.2005.110","url":null,"abstract":"Mobile commerce refers to business activities over mobile terminals. A system dynamics (SD) approach is used to analyze how the strategic planning of the mobile commerce terminal (MCT) industry will influence the process of mobile commerce diffusion in a market. We study mobile commerce market development in a country as a dynamic social economic system. The simulation model is based upon the mobile commerce diffusion simulation model. We create a model for the Chinese market for the purpose of simulating MCT strategic planning and mobile commerce diffusion. The SD model is useful for providing an understanding of the process of mobile commerce diffusion and the formulation of strategies for the MCT industry.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132630646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}