mobile e-commerce

21
Graduate School and Professional Services Information Technology Resource Management in a Networked Environment Mobile e-Commerce THE FUTURE OF M-COMMERCE

Upload: ma-luisa-gabriel

Post on 18-Apr-2015

105 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Mobile e-Commerce

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

THE FUTURE OF M-COMMERCE

Page 2: Mobile e-Commerce

Mobile Commerce Overview: How mobile phones have changed our lives • mobile phone seems to give us more power as individual

• many people consider mobile phones as extensions of themselves

• mobile phone makes us available to others

• Creates opportunity to deliver new services to existing customers and to attract new ones

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 3: Mobile e-Commerce

History:

• Birth of mobile commerce was in 1997 in Finland.

• In 1998 the first sales of downloadable ringtones were made possible in Finland

• In 1999 a mobile platform for mobile commerce was launched in the Philippines, the Smart money

• Currently Australia is offering train ticketing via the mobile devices

• Japan offers mobile purchase of airline tickets

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 4: Mobile e-Commerce

What is Mobile Commerce?

Any transaction with a business value that is conducted via mobile telecommunication network.

An emerging applications and services people can access from their internet enabled mobile devices such as smartphones, PDAs, ipads and laptops.

Mobile commerce has enabled people now to connect, inform, interact and influence one another on a mobile platform, anytime and anywhere .

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 5: Mobile e-Commerce

Main Drivers of Mobile Commerce Technology

• Proliferation of mobile devices

• Convergence of mobile telephone networks and the internet

• Transition from 2nd generation (2G) to 3rd and 4th generations (3G & 4G) telecommunications technology

• Growing customer demand

• Evolution of a new value chain

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 6: Mobile e-Commerce

Difference between M-Commerce and E-Commerce

• M-commerce is an offshoot of e-commerce.

• E-commerce involves transaction on the internet but with m-commerce we enjoy the mobility feature without any physical connectivity to internet.

• Users pay a little higher cost for airtime as opposed to free internet access in e-commerce.

• M-commerce is more effective as a marketing and advertising medium than the e-commerce due to mobility and portability of mobile devices.

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 7: Mobile e-Commerce

SWOT Analysis

STRENGTH

Portability and mobility features of mobile devices

Ease of use and instant connectivity

High customer satisfaction and loyalty

OPPORTUNITIES

New and enhanced m-commerce application

Mobile banking

Mobile ticketing

Mobile payments

Advertising & marketing

WEAKNESSES

Low bandwidth

Poor reliability

Transaction security concerns

High Cost of MMS

Quality of Service (QoS)

THREATS

Personal privacy protection

Constraints with mobile devices Authentication and confidentiality

Security of payment transactions

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 8: Mobile e-Commerce

Benefits of Mobile Commerce

Providing wider reach

Streamline business processes

Reducing transaction cost

Unlimited bandwidth

Competitive pricing

Faster and accurate communication and information exchange

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 9: Mobile e-Commerce

Mobile e-Commerce

Building Blocks of Mobile Commerce

User Equipment

Cellphone

PDA IP-based access Protocols Access

Network

VPN Service Network Application Service Provider

Smart Card(User-Identity) Digital Wallet

Commerce Application

(mobile part)

Security Module Portal Access

Mobile Execution EnvironmentMobile OS

BillingQoS

Authentication

Commerce Portal Service Portals

Network Location Billing Security

Application ServersOther Service Networks(including Internet)

Location Info

User Profiles

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Page 10: Mobile e-Commerce

Mobile Technology ApplicationsMobile PaymentsConsumer can use a mobile phone to pay for wide range of services and digital goods such as ringtones, music, wallpapers and hard goods like books, magazines, tickets, etc.

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 11: Mobile e-Commerce

Mobile BankingThe use of mobile phone to send, receive, or facilitate financial transactions including loan disbursements, payments, money transfers, deposits, withdrawals, remittances and even payroll services.

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 12: Mobile e-Commerce

Mobile Location Services

The ability to identify the exact geographical location of a mobile userat any time.

Location based application opportunities include:• Navigation and real time traffic• Emergency assistance• Concierge and travel services• Location based marketing and advertising• Location based billing• Dispatch and delivery route optimization• Fleet, asset and individual tracking• Security and theft control

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 13: Mobile e-Commerce

Location Based Mobile Solutions Using GPS TechnologyTelematics uses wireless data and voice system in vehicles in combination with car companies that has new cars and trucks with telematics systems that include applications like emergency roadside assistance, stolen vehicle tracking, remote door lock and concierge services.

internet

satellite Mobile network

Server

Location coordinates are sent to the internet using a mobile network

Built in GPS system points location of a car using a satellite

Response combining location and content is generated dynamically

LOCATION BASED TELEMATICS SOLUTIONS USING GPS TECHNOLOGY TO LOCATE A VEHICLE

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 14: Mobile e-Commerce

Overview of Mobile Security

PKI (Public Key Infrastructure) is the only technology that provides the key elements of authentication, confidentiality, data integrity, and nonrepudiation which are of the primary importance in security of mobile commerce.

Mobile PKI employs the SIM/USIM card that is present in a GSM/UMTS mobile phone. The SIM card inside the cell phone plays a central role in Mobile PKI. Actually, the obvious way to implement Mobile PKI is through a so-called SIM Application Toolkit (SAT) applet installed on the SIM card.

PKI functions in Mobile Devices Generation of key-pair (public and private keys)

Receiving & Storing certificate issued by CA

Digital Signature generation and verification

Functions for encryption and decryption

Validating third party certificates

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 15: Mobile e-Commerce

Mobile e-Commerce

Issues with Mobile Network Security Phishing Attack Upon clicking the link the user is taken to the ff

The following email pretends to be from citibank authentic looking page

How do we know if this is an authentic bank website or a fake? The first indication is the vague, slightly illogical problem they are trying to convince you to solve: “some of our members no longer have access to their email addresses and we must verify it”. Another tip-off is that the address is supposedly secure (using the https:// notation), but there is no padlock icon in the bottom right hand corner of the browser window. And finally, the Address Bar is a fake. The website operator has turned off the address bar.

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Page 16: Mobile e-Commerce

Issues with Mobile Network Security Sniffing: The ability of a hacker to monitor traffic as it crosses the network involving clients and server; Intercept all outgoing/incoming requests for Web documents and display them; it could be use to gather password, read inter-machine e-mail and examine client-server database records in transit.

DoS (Denial of Service): Sending numerous dummy requests to server to keep it busy so that legitimate transactions cannot get through.

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 17: Mobile e-Commerce

To protect your mobile devices the following are recommended

Install only applications that you need, make sure that you download them from trusted sources.

Just like your computer, backup your mobile device on a regular basis this way if something happen to the device, your information is not lost.

Make sure you update your mobile device and applications on a regular basis. Cyber attackers can easily exploit your devices if you are running outdated software.

If you have security software installed such as anti-virus or firewall then make sure they are enabled and updated with the latest version.

If you receive a text message that seems suspicious or too good to be true simply delete it.

Disable wifi if you are not using it. Many mobile devices will automatically connect to wifi networks without asking you, putting your device at risk.

Just like wifi, disable Bluetooth if you are not using it. If you use Bluetooth, check you settings and disable any Bluetooth capabilities that you do not need. It is also important to turn off Bluetooth auto discovery.

Protect your devices with hard to guess password or PIN. If your device has port encryption, use it.

Consider enabling remote wiping. This means if your Smartphone is lost or stolen you can erase all your information remotely.

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 18: Mobile e-Commerce

Conclusion As technology continues to progress and new system are being created, mobile commerce is on a rapid rise. Today most people are constantly on the go and the ability to conduct businesses in the palm of your hand wherever you go is definitely in high demand.

As with any new technological services, its going to take some time to work out all of the limitations and perfect the mobile commerce computing environment.

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 19: Mobile e-Commerce

Generation of Mobile Communication

1st Generation (Analog)

1980 1990 2000 2010

2nd Generation (GSM)

3rd Generation (IMT 2000)

Voice

Voice & Data(narrowband)

High Speed Multimedia

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce

Page 20: Mobile e-Commerce

Mobile e-Commerce

Issues with Mobile Network Security

return

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Page 21: Mobile e-Commerce

Graduate School and Professional Services

Information Technology Resource Management in a Networked Environment

Mobile e-Commerce