CHAPTER 8 Wireless Mobile Computing and Mobile Commerce
CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce
Announcements n Project 4 (Excel Refresher) due Today n Chapter 8 - Mobile Computing n Friday – Excel Scenario Manager Workday
Review – Chapter 7 n E-Commerce n n Pure vs. Partial B 2 B, B 2 C, C 2 C Mechanisms Benefits/Limitations n Issues in E-Tailing n n Disintermediation Order Fulfillment n Ethical/Legal Issus
CHAPTER OUTLINE 8. 1 Wireless Technologies 8. 2 Wireless Computer Networks and Internet Access 8. 3 Mobile Computing 8. 4 Mobile Commerce 8. 5 Pervasive Computing 8. 6 Wireless Security
Chapter Opening Case: The Battle for the Mobile Wallet Source: Slavoljub Pantelic/ Shutterstock
8. 1 Wireless Technologies © Oleksiy Makymenko/Alamy © Såndor Kelemen/i. Stockphoto © Photo. Edit/Alamy How many smart phones are now being used worldwide?
Capabilities of Wireless Devices Cellular telephony Bluetooth Wi-Fi Digital camera Global positioning system MP 3 music player Address book E-mail access Short message service Instant messaging Text messaging Organize Video player Internet access What problems might companies have with personal smartphones?
2013 Trends in Mobile Technology n 4 G LTE n Android Operating System n Near Field Communications n BYOD n Tablet PCs n Location Based Applications n Mobile Payment Apps
Wireless Transmission Media n Microwave Transmission n Satellite transmission n Geostationary Orbit (GEO) Middle Earth Orbit (MEO) Low Earth Orbit (LEO) n Radio n Satellite Radio n Infrared
How the Global Positioning System Works © Toh Kheng Ho/Age Fotostock America, Inc.
8. 2 Wireless Computer Networks and Internet Access 1. Short range wireless networks 2. Medium range wireless networks 3. Wide area wireless networks
8. 2. 1 Short Range Wireless Networks Bluetooth Near-field Communications
8. 2. 2 Medium Range Wireless Networks Wireless fidelity (Wi-Fi) Wireless access point n Hotspot n Wireless network interface card n © STOCKBROKERXTRA/Age Fotostock America, Inc. http: //v 4. jiwire. com/
8. 2. 2 Medium Range Networks: Wireless Mesh Networks
8. 2. 3 Wide-Area Wireless Networks Cellular Radio 1 st Generation 2 nd Generation 3 rd Generation (3 G) 4 th Generation (4 G) Wireless Broadband or Wi. Max (Wi. Fi on steroids)
8. 3 Mobile Computing Basis of mobile computing: Mobility n Broad reach n Five value-added mobile computing attributes: 1. 2. 3. 4. 5. Ubiquity Convenience Instant connectivity Personalization Localization of products and services
8. 4 Mobile Commerce The development of m-commerce is driven by the following factors: n n n Widespread availability of mobile devices No need for a PC The “Cell phone culture” Declining prices Bandwidth improvement
Mobile Commerce Applications n Location-Based Applications and Services n Financial Services n Intrabusiness Applications n Accessing Information n Telemetry Applications
Mobile Commerce Applications: Location-Based Applications Shopping from Wireless Devices Google Shopper
Mobile Commerce Applications: Location-Based Applications Location-based Advertising Location-based Services
Mobile Commerce Applications: Financial Services • Wireless Electronic Payment System • Mobile Banking • Wireless Bill Payments • Mobile Wallet • Micropayments Frederic Lucano/Stone/Getty Images, Inc.
Mobile Commerce Applications: Intrabusiness Applications Example: UPS
Mobile Commerce Applications: Accessing Information n Mobile Portal n Voice Portal © Sergey/Age Fotostock America, Inc.
Mobile Commerce Applications: Telemetry Examples of Telemetry Applications n n n Medicine Automobiles Find My i. Phone Telemedicine predicted in 1924
8. 5 Pervasive Computing • Radio frequency identification (RFID) • Wireless Sensor Networks (WSNs)
Bar Code, QR Code, RFID Source: Media Bakery © raphotography/i. Stockphoto
Small RFID Reader and Tag See video © Ecken, Dominique/ Keystone Pressedienst/Zuma Press Coming soon to a supermarket near you https: //squareup. com/wallet
The Internet of Things The number of everyday “things” connected to the Internet. http: //blogs. cisco. com/news/the-internet-of-things-infographic/ http: //www. engadget. com/2011/01/13/vitality-glowcap-review/ http: //www. symplio. com/2011/09/4 -infographics-about-internet-of-things/
8. 6 Wireless Security Four major threats 1. Rogue access point 2. War driving 3. Eavesdropping 4. RF (Radio frequency) jamming © Sebastian/Age. Fotostock America, Inc.
Chapter Review Describe the four main types of wireless transmission media.
Chapter Review Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network.
Chapter Review (continued) Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business.
Chapter Review (continued) Define pervasive computing, describe one technologies that underlies this technology, and provide at least one example of how a business can utilize each one.
Chapter Review (continued) Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business.
- Slides: 34