Free Essay

M Commerce

In:

Submitted By vijaymunni
Words 1687
Pages 7
Challenges and risks involved in m-commerce:
The term m-commerce was coined by Kevin Duffy, the director of Group Telecom of Logical, in February 1997.Several definitions have been suggested for m-commerce. The Durlacher Mobile Commerce Report defines m-commerce as .any transaction with monetary value that is conducted via a mobile telecommunications network. This definition is fairly rigid, and makes a very clear-cut distinction between m-commerce applications and other mobile applications.

The challenges to the emergence of m-commerce do not end with limited resources. The bandwidth currently available is not ideal. The effective bandwidth, as quoted by m-commerceworld.com, is somewhere around 9kbps. This further hinders the advent of sites containing graphics and user-friendlier interfaces, in turn discouraging users from opting for m-commerce.
M-commerce or mobile e-commerce represents the using of mobile devices for communication and implementation of electronic commerce transaction or any transaction with monetary value achieved through mobile devices. M-commerce appeared due to the rapid evolution of the mobile devices and connection among internet became more accessible regardless of the geographical location of the person who connects to the Internet.

M-Commerce applications are obtained by the two methods:
• supplement or extend existing applications, which involves the addition of new tools to improve more efficient the access to E-Commerce applications existing through mobile devices;
• Innovative requires the development of new services and new applications for M-Commerce to facilitate access through mobile devices; in this category of applications are not used old e-commerce applications; new applications are designed from the beginning.
Security for mobile devices and applications for these devices is provided in the following aspects:
• Authentication foxmd in the M-Commerce applications with virtual identity verification (Ivan et al., 2012), the request of personally identifiable information and checking them with the information previously provided in the registration; according to (Marian, 2009) authentication is the process of establishing or confirming the accuracy and reliability of information relating to the identity or origin of an entity. The authentication process is divided into two parts:
- The first part is to identify the entity that is done by presenting an identifier associated with the entity that authenticates;
- The second step is the verification and validation entity that authenticates.
In the M-Commerce applications used is that user authentication. The user authentication involves the two steps in sequence:
• User identification;
• Claimed identity verification and validation.
The manufacturers of both mobile phones and security software have to ensure that their products reflect those new trends in user behavior.
Android powered phones have already been attacked by virus-carrying apps which can potentially steal personal information saved on those devices.

Google, the developer of Android, have assured the public that the next version of that software will be a lot more robust. Still, what is clear is that at the moment criminals are a step ahead and this could be stopping shoppers from fully endorsing m-commerce.

Apple took a more cautious approach and individually reviews each app before it is available to download by iPhone and iPad users. This, however, has been criticized by the developers as too restrictive. It seems that customer safety and their demand for new software do not currently always go hand in hand.

On the other end of the spectrum are payment service providers, who may not want to support technology which could potentially put buyers at risk. That is why they may delay their endorsement of mobile payments until most of threats are removed.

Some of the issues making the mobile payment platform open to cybercrime at the moment is the fact that devices can wirelessly access unsecure networks and the software powering them is often not robust enough to protect sensitive information required to complete purchases.

There is also the problem of phones being lost with sensitive information saved on them. That data could be then used by criminals to make fraudulent purchases.

It will take time for parties involved in the set-up, implementation and the delivery of mobile payments to identify all the risks and prevention methods. E-commerce businesses who decide to introduce it now will be taking on a lot more unidentified risk than those who decide to wait and have the benefit of hindsight when setting up their platforms.

Nevertheless, it can be safely assumed that mobile payments are here to stay, as a growing number of consumers want to be able to make purchases on the go.

Global Positioning System (GPS) is the only system today that is able to locate the exact position of a GPS receiver anywhere on earth anytime, anywhere, and in any weather. GPS works by having 24 satellites in space orbiting earth. These satellites are positioned in such a way that in theory it is always possible to receive signals from 4 or more satellites anywhere on earth anytime. The main strength of GPS is that it provides precision of up to 10 meters.
This is a revolutionary breakthrough in location detection and its precision has caused great interest in military, commerce and private sectors.
There are several disadvantages in GPS. Power consumption for one is a major hindrance for mobile computing. This is crucial as electrical power is always in short supply even for modern mobile computing. Due to satellite reliance, GPS cannot be used indoors effectively and it is subjected to blockages by tall buildings outdoors. Sky scrapers in the cities create an ‘urban canyon’ that block coverage of satellites, causing significant problems for users in cities. The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter.
Main Types of Physical Topologies
The following sections discuss the physical topologies used in networks and other related topics. * Linear Bus * Star * Tree (Expanded Star) * Considerations When Choosing a Topology * Summary Chart
Star Topology Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)
Star-Wired Ring
A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the MAU of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or ring. The Token Ring protocol uses a star-wired ring topology.
Ring Topology In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network.
To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses.
Bus Topology Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.
Tree Topology Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.
Mesh Topology Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing.
A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.
Hybrid Topology
A combination of any two or more network topologies. Note 1: Instances can occur where two basic network topologies, when connected together, can still retain the basic network character, and therefore not be a hybrid network. For example, a tree network connected to a tree network is still a tree network. Therefore, a hybrid network accrues only when two basic networks are connected and the resulting network topology fails to meet one of the basic topology definitions. For example, two star networks connected together exhibit hybrid network topologies. Note 2: A hybrid topology always accrues when two different basic network topologies are connected.

Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable

References:
Source: file:///C:/Users/t1541md/Desktop/10.1.1.19.4489.pdf IVAN, I., MILODIN, D., & ZAMFIROJU, A. (2013). Security of M-Commerce transactions. Theoretical & Applied Economics, 20(7), 59-76.
Source: http://www.edrawsoft.com/Network-Topologies.php

Similar Documents

Premium Essay

M Commerce

...M-commerce(Mobile Commerce) is “the delivery of electronic commerce capabilities directly into the hands, anywhere, via wireless technology” and “putting a retail outlet in the customer’s hands anywhere.” This can be done with just a mobile phone, a PDA connected to a mobile phone or even a portable PC connected to a mobile phone. M-commerce is the buying and selling of goods and services through wireless handheld devices such as cell phones and personal digital assistants (PDAs). Known as next-generation e-commerce, m-commerce enables users to access the Internet without needing to find a place to plug in. The emerging technology behind m-commerce, which is based on the Wireless Application Protocol, has made far greater strides in Europe. M-commerce allows one to reach the consumer directly, not his fax machine, his desk, his secretary or his mailbox, but ones consumer directly, regardless of where he is. Internet use has grown to such a level on the strength of PC networks. Due to the huge base of installed PCs, which is predicted to grow in a faster pace in the days to come, electronic commerce and other communication applications are bound to thrive further. Also, these computing systems will have greater power and storage capability, the best ever price-performance ratios, more powerful and sophisticated applications will likely emerge for desktop computing and the Internet. However, there are two major limitations on PCs. First , users have to sit in front of them...

Words: 709 - Pages: 3

Free Essay

M Commerce

...FreePaisa for the world q Home q About FreePaisa for the world Electronic Financial blog post Posts Comments NBAD to dial ‘R’ for remittance National Bank of Abu Dhabi (NBAD) has signed an agreement with MoneyGram International to allow customers to send money home using mobile phones. Recent Posts q NBAD to dial ‘R’ for remittance Worldwide Mobile Payment Users to Reach 108.6 Million in 2010 Mobile banking will expand in UAE 8 million Filipinos now using mobile banking — BSP Citibank Launches Mobile Banking Service In Russia ‘2.5 billion World’s Adults remain Unbanked’, Barclays Report $10 million fund designed to incentivise mobile financial services companies. Huge growth in operator revenue by offering financial services studies by q q q q q q When the service is introduced customers will be able to send money directly from their accounts with the touch of a few buttons. They will also be able to send money home from pre-paid cards after MoneyGram’s systems are integrated with NBAD’s existing Arrow mobile phone transfer service. q http://freepaisa.com/wordpress/ (1 of 6)25-06-2010 10:23:24 FreePaisa for the world Continue reading NBAD to dial ‘R’ for remittance q CGAP Western Union reveals international mobile strategy Mobile Banking: You can now pay school fees using your phone MTN Uganda sees explosive growth in mobile money Doha Bank gets nod for mobile money transfer MasterCard Mobile MoneySend Platform...

Words: 1439 - Pages: 6

Premium Essay

M Commerce

...me-Commerce: An Infrastructure for Personal Predictive Mobile Commerce Andreas Komninos, Peter Barrie, Julian Newman, Stuart Landsburgh Department of Computer Science Glasgow Caledonian University Glasgow, UK [ako2, pba4, jne,slands10]@gcal.ac.uk Abstract Given mobile phone penetration statistics and current mobile phone technical specifications, it is apparent that in developed countries, the majority of citizens carry not just mobile phones, but true mobile computing devices. These devices are still primarily used for telephony, although information access is slowly emerging as a popular service on these devices. Despite the availability of network connectivity and device characteristics that make Information Access possible, this is currently generally confined to accessing the WWW. While useful, this method is not the best way of providing information access to mobile devices. This paper discusses current research in the use of mobile services and proceeds by presenting a background on an infrastructure for a focused information access application for mobile commerce. Through this background, we discuss the need for embedding multi-dimensional context awareness into the design of applications that provide dedicated, targeted and personalised information access to users, and describe the dimensional vectors necessary for the acquisition of contextual information. Further to this, the paper highlights the challenges that must be overcome in obtaining contextual information...

Words: 6787 - Pages: 28

Free Essay

M Commerce

...Question 4 – Assignment 1 app – Business Intelligence, Mobile payments, Mobile advertising and Personalisation Imagine that you are the developer of the mobile phone application you designed during assignment 1. 1) Remind me what your mobile commerce was and its name. ” My app is Child Care ” ** Description my app: log in by username and password OR signature Search page: choose your language and your Location ” country “ è City and suburb Then select full time OR part time and with food or not, and age your child The app give you list of child care to available with price, distance, address, map,…. If you choose one of them the app give you more information about it such as photo center, staff, game,… and contact and support chatting ,Facebook, twitter. Translation and Booking Booking page: enter your information child and payment and receive receipt by iPhone or email. 2) List all the mobile payments you know (e.g. credit card, Vouchers, PayPal, fingerprint,….) and explain how each of them they work and what you need to do as an application developer to be able to use them. 3) How would you personalise the application to the individual users? And why? 4) What would be your strategy to advertise for your app? Content, where, when and why? 5) How can you include external advertising in your mobile phone app? Where do you get the ads from and under what criteria – be precise? 6) How would you use...

Words: 1876 - Pages: 8

Free Essay

M-Commerce

...Case D M-COMMERCE Q1. What is the 8-second rule and why is it important to m-commerce technology? The 8-second rule is an old way of measuring the adequate response time of a webserver through different bandwidth connections, the average web user will wait about eight seconds for a page to download, but that current average download time across backbone connection on most web sites is almost ten seconds. If the load time of a webpage is more than 8 seconds, users will have no patience to wait it and they will close this website. For the aspect of its importance: Firstly, the 8-seond rule is prerequisite for m-commerce technology. The mobile phones and other handheld devices provide the high speed internet connectivity, which provides the basis of the M-commerce. Once you have high speed internet connectivity on your mobile phones, you can shop, sell, pay or trade online anytime and anywhere in the world. Secondly, speed is very much an issue when using your mobile, because you often tend to be impatient in the first place, when the mobile is so slow to connect to the internet. Thirdly, Consumers become nervous when an electronic financial transaction takes too long, or when they have to re-enter their information to make it happen. Q2. Why might it be useful to m-commerce providers to have records of their users’ purchase histories? By engaging a mobile commerce, mobile providers not only allow the customers to go to more sophisticated behaviors, but also do have...

Words: 1077 - Pages: 5

Free Essay

Case C – M-Commerce: the Past, Present and Future

...CASE C – M-COMMERCE: THE PAST, PRESENT AND FUTURE Q1 - What is the 8 seconds rule of Internet and why is it so important for m-commerce technology? The 8-second rule is an old rule of the Internet; it is the rough unit of measure of the performance of a web server. This rule was implemented when Internet was taking its first steps. It indeed specified that if the loading time of a web page exceeded eight seconds, Internet users would not wait any longer. Yet the fact remains that this rule no longer applies as a much higher percentage of Internet users have reliable Internet connections, which allow them to upload almost all websites in less than a second. M-commerce is the ability to conduct a transaction while using a mobile device. There are two frequent types of usage of the m-commerce, a mobile user can buy something online from his mobile web connection, or he can use his mobile device as a way of physical payment in a shop (which thus replaces money, checks or credit card). There rules are truly fondamentals when talking about making m-commerce technology a reality: reliability, security and speed. In fact speed is a critical need for the development of m-commerce, one will not use its mobile phone to pay for something if it takes longer than using a regular money payment. Furthermore, todayeveryone expect us to be very fast, and we live much faster than former generations used to, and this has only been possible through technological improvement. This boils down...

Words: 1612 - Pages: 7

Free Essay

Reviews on Practical Perspectives of M-Commerce in Asean Countries

...M-Commerce or E-Commerce on Mobile is known as a term that describes online sales transactions via wireless electronic devices such as hand-held computers, mobile phones, smart phones, tablets or laptops. These wireless devices interact with computer networks which have ability to conduct online merchandise purchases. It also includes the purchase and sale of a wide range of goods and services, online banking, bill payment, information delivery and so on. Mobile e-commerce is therefore one of the subsets of electronic commerce. In 2015, Thailand and other countries in ASEAN will have free trading. The rapidity of trading must be the first priority. The M–Commerce offers a great solution to support ASEAN markets. Therefore, Thailand should realize and prepare concrete plans to manage technology in order to support the growth of M-commerce. This paper provides the reviews of M-Commerce fundamentals in order to help business units, especially the people who have no IT background, to understand the key elements and general issues from M-Commerce. The objective is to explore M-commerce in Thailand market by learning success case study from the capital of M-commerce in Japan. For instance, Line and Rakuten were jump to success after they introduced the systematic of M-commerce. There is case study report named “Study Smartphone users in Thailand” from LINE Corporation. The report reveals that there are 22 million Line users and 25% were subscribed to the LINE sale channel...

Words: 316 - Pages: 2

Free Essay

M-Commerce

...Pinkberry drives in-store product launch trial via mobile advertising Frozen yogurt chain Pinkberry launched a location-based ad campaign that served up mobile coupons to lure nearby consumers into stores in April. The ads ran within the Pandora iPhone app with creative that showed consumers how many miles away they were from a Pinkberry location. When clicked on, a landing page presented an offer for $1 off of a greek yogurt product. The landing page also included directions and a click-to-call option. The coupon was redeemable by showing a screen grab of the ad at the point-of-sale. As marketers increasingly look to make mobile ads more contextual and relevant to consumers, location and targeted data has been one of the biggest growth areas in the industry this year. In Pinkberry’s case, consumers are more inclined to interact with the banner ad since it ties together an offer with a specific location. • When consumers tap on the mobile ad, a landing page is brought up with four tabs that run across the top of the page – home, map, details and call. • The homepage of the ad shows the offer, which runs through April 30. Consumers can save the coupon by taking a screenshot of the ad to show at the point-of-sale. • Under the maps tab, consumers can view the address and directions to the nearest Pinkberry store. • Additional information about the product is under the details tab, and consumers can choose to call the local store via the ad. • Tying a coupon to...

Words: 1180 - Pages: 5

Free Essay

Survey M Commerce

...A Report on  Customer Attitude Towards M‐Commerce in B2B  Submitted to  Ms. Priya S  Senior HR  Mydeals247  At  Mydeals247  Bangalore, Karnataka  Prepared by  Anumeha  PGDM 2014‐16  IIM Rohtak      Acknowledgement  I  would  like  to  express  my  heartfelt  gratitude  to  all  the  employees  of  Mydeals247,  who constantly made me feel at home, even though my training span was for only  two  months.  I  would  also  like  to  profusely  thank  all  the  members  of  the  Business  Develpoment  Team  for  being  kind  enough  to  answer  my  queries  whenever  I  approached  them.  I  would  like  to  specially  extend  my  thankfulness  to  Mr.  Venu  G.  Somineni for motivating us constantly during these two mots of internship. I would  like to thank Mr. Panchseheel and Mr. Rafique for taking pains in helping me grasp  the existing work processes and at the same time making the environment cheerful  to  learn  in.  I  would  also  like  to  particularly  mention  Mr.  Aneef  and    Ms.  Anjali    for  being kind enough to always offer a helping hand and a cheerful smile. Last, but far  from  least,  I  would  like  to  profusely  thank  Ms.  Priya  S,  for  offering  his  constant  guidance and motivation which helped me complete this internship programme with  a gain in knowledge and experience and in a timely manner.                    Contents  E‐ Commerce Industry in India  Trends in B2B eCommerce  Concerned Challenges  ...

Words: 5623 - Pages: 23

Premium Essay

Report on M-Commerce

...Samsung Galaxy SII- SWOT Analysis The Strengths of the Galaxy S II actually go back to their Marketing Orientation defined by Kotler, Adam, Denise and Armstrong (2009) as the Product Concept where the company will favour quality, performance and innovation features. This orientation is in line with Samsung’s billion dollar research investments and 40000 employees dedicated to develop the world’s greatest technology products (“R&D” Samsung.com 2010). Also their Marketing Concept is in line with their huge marketing budget starting with understanding customer needs, integrated marketing and customer satisfaction (Marketing Core Concepts and Applications, 2008). Business Review Weekly in November 2004 claimed that Samsung was the world’s 4th largest advertiser in the world. Also Samsung’s Total Quality Management approach drives Galaxy S II customer perception as a reliable product backed by a worldwide brand and huge media presence. One of the weaknesses of Samsung is that their costs are relatively high as compared to the competition. Also the fact that Samsung operates in a very competitive market, another weakness is lack of penetration in the Business Mobile market being outperformed by Blackberry an even Apple. With the rapid changes of technologies today, Samsung has to manage the company in a very efficient manner to be even more productive. (“Company Profile” Bloomberg.com, 2011) Although Samsung is already one of the most profitable and one of the leaders in the market...

Words: 699 - Pages: 3

Free Essay

Case Study M-Commerce

...gaUniversidade Lusofona de Humanidades e Tecnologias Caso de estudo m-Commerce Tiago Banha 20085961 LEI 28-10-2011 Universidade Lusofona de Humanidades e Tecnologias O que é a regra '8-segundos' da Internet e porque é tão importante para a tecnologiado m-commerce? R: A regra dos “8 segundos” diz respeito ao tempo da comunicação da acção, isto é, o tempo que a acção do utilizador leva a ser recebida. Claro que é uma regra bastante importante, pois é na base da rapidez que o cliente toma preferençia pela tecnologia m-Commerce. Porque poderá ser útil que os fornecedores de m-commerce ter registos históricos das compras dos seus utilizadores? R: Ter registos de compras dos utilizadores pode ser util e importante para o melhoramento dos serviços e ofertas, pois esses registos ajudarão a ter um maior conhecimento da ultilização dos clientes, ajustando assim os seus serviços as necessidades dos clientes. Qual é a maior preocupação que a maioria dos utilizadores de telemóveis têm acerca da utilização dos serviços de m-commerce? Que outras preocupações têm? R: A maior preocupação dos utilizadores de telemoveis que utilizam serviços mCommerce é a segurança, tais como tambem a fiabilidade e velocidade. São estes os maiores ‘medos’ dos utilazadores destes serviços. Porque motivo são os avanços tecnológicos como os “pseudo-wires” e tecnologia MPLS importantes para aumentar a capacidade de “backhaul”? Tenta pesquisar estas tecnologias utilizando outras fontes para...

Words: 447 - Pages: 2

Free Essay

Lbs-Challenges in M Commerce

...contributed articles doi:10.1145/1941487.1941515 Mobile advertising will become more pervasive and profitable, but not before addressing key technical and business challenges. By Subhankar Dhar and Upkar Varshney Challenges and Business Models for Mobile Location-based Services and Advertising for wireless cellular networks in the U.S. have also enabled location-based functionalities using variations of triangulation, GPS, and cell-ID technologies. In addition to the current and emerging satellite-based systems, such as GPS (U.S.), GLONASS (Russian), GALILEO (EU), and COMPASS (China),30 which will provide wider coverage to benefit location-based services. In some cases locational information can also be derived and utilized from sensors, RFID, Bluetooth, WiMax, and Wireless LANs.7,31,32 These systems can be used standalone or supplement the coverage for location tracking in indoor environments, where satellite coverage is intermittent or inaccurate. The potential for location-based services is evident from powerful and ubiquitous wireless devices that are growing in popularity.8,23 Many surveys predict billions of dollars in revenues for mobile advertising.27 Mobile Network Operators are well positioned to take up a significant percent of this advertising revenue as they negotiate deals with content providers. Recent deals between media companies, advertising agencies and Internet/software industry also demonstrate significant optimism...

Words: 7416 - Pages: 30

Premium Essay

M-Commerce Research Paper

...Hair Today Gone Tomorrow Ltd. INTRODUCTION Companies are formed to create a legal identity separate from the individuals who make up the membership of the company. A company is the predominant form of legal entity for conducting business in Ireland today. There are different types of company including private companies limited by shares, public limited companies, single member companies, unlimited companies, companies limited by guarantee having a share capital and companies limited by guarantee not having a share capital. The companies clear objectives are stated throughout but in a sentence are: To provide a barber service to customers, whilst maintaining high customer service standards and a quality health and safety implementation. 1. Legal Structure I have chosen to set up a private limited company, a private limited company is a company whose shareholders are offered limited liability. However, ownership restrictions are strictly in place to avoid the hostile takeover attempt by any association or bylaws. The restrictions include the sale or transfer of a shareholder's share must be first offered to the other shareholders the shareholders cannot sell their shares on the stock exchange to the public, a fixed number of individuals are considered to be shareholders. Reasons for using a private limited company structure There are many advantages to having a private limited company, these include: * A Private Limited Company is a legal entity;...

Words: 3467 - Pages: 14

Premium Essay

8-Second Rule and M-Commerce

...1. What is the '8-second rule' of the Internet and why is it important to m-commerce technology? The 8-second rule is an old rule of the Internet; it is the rough unit of measure of the performance of a web server. This rule was implemented when Internet was taking its first steps. It indeed specified that if the loading time of a web page exceeded eight seconds, Internet users would not wait any longer. Yet the fact remains that this rule no longer applies as a much higher percentage of Internet users have reliable Internet connections, which allow them to upload almost all websites in less than a second. M-commerce is the ability to conduct a transaction while using a mobile device. There are two frequent types of usage of the m-commerce, a mobile user can buy something online from his mobile web connection, or he can use his mobile device as a way of physical payment in a shop (which thus replaces money, checks or credit card). Some rules are truly fundamentals when talking about making m-commerce technology a reality: reliability, security and speed. In fact speed is a critical need for the development of m-commerce, one will not use its mobile phone to pay for something if it takes longer than using a regular money payment. Furthermore, nowadays, everyone expect transactions to be very fast, and this has only been possible through technological improvement. This boils down to the fact that a new technology must feature speed in its main characteristics in order to gain...

Words: 354 - Pages: 2

Premium Essay

M-Commerce: the Past, Present and Future

...YEAR 3 ENGLISH CONTRACT 2010 Months/ Date Theme/Topics Skills Specification Language Content Resources Weeks JAN 4-8 1) World of Self, 1.1.1 Listen to and repeat words. 1(1) Family & 1.1.2 Listen to and identify different types of letter sounds. Friends 1.3.1 Listen to and understand keywords in stories heard. 2) World of 1.3.3 Listen and match the meaning of words to pictures and the spoken word. Knowledge 1.6.1 Listen to and enjoy children’s songs and rhymes. TOPIC: 2.1.1 Pronounce words with the follow ing sounds: Home Sweet a) short and long vowels, b) diphthongs, c) initial blends, Home d) final blends, e) initial digraphs, f) final digraphs, g) silent letters 2.2.4, 2.6.6, 4.3.3 2.1.2 Pronounce 2-syllable words correctly. 2.1.3 Repeat exclamations with the correct intonation and stress. 2.2.2 Ask questions pertaining to numbers. 2.3.1 Responding to ‘Wh’ questions. 2.6.1 Give non-verbal response to the story heard or read. 2.7.1 Thank people. 2.7.3 Take leave. 2.7.4 Express good wishes 3.1.1 Look at letters and say aloud the following sounds: a) short and long vowels, b) diphthongs, c) initial blends, d) final blends...

Words: 5533 - Pages: 23