首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
移动互联网技术的快速发展,为移动电子商务的发展奠定了坚实的基础。随着信息技术革命不断发展和加深,移动电子商务正前所未有地改变着社会生产、交换、分配和消费方式,成为转变经济发展方式的重要推动力量和建设创新型国家的战略性产业。本文分析了影响移动电子商务发展的关键因素,探讨了当前移动电子商务的商业模式,并以此对未来移动电子商务的发展趋势作出相应的预测。  相似文献   

2.
移动医疗商业介入路径研究   总被引:1,自引:0,他引:1  
首先,分析移动医疗发展的现状,指出中国移动医疗行业面临巨大的机遇.其次,对比分析传统医疗行业产业链和移动医疗产业链,指出移动医疗具有良好的行业发展前景.然后,具体分析移动医疗的三大类群用户和产业链,指出可产生增值效益的商业模式对移动医疗行业至关重要.最后,通过对国外成熟的移动医疗商业模式的分析,提出中国可发展的未来移动医疗商业模式.  相似文献   

3.
基于RFID(射频识别)的非接触式移动支付势必会给我国的电子商务市场带来巨大的变革,而支付技术和商业模式是决定移动支付成败的关键。文章重点分析我国移动支付的关键支撑技术,比较各种技术的优缺点,剖析几种主流的移动商业模式及其主要特征,最后指出我国移动支付目前存在的问题和发展趋势。  相似文献   

4.
在现阶段的发展中,移动互联网的商业模式越来越明显,在人们的生活和工作中,已经没有办法离开移动互联网。就现阶段的情况而言,商业模式的发展对人们的生活和工作产生了较大的积极影响,因此,在将来的发展中,可以对商业模式的移动互联网进一步的深化。移动互联网商业模式中,无论是社会效益还是经济效益,都有很大的提高,对我国的发展来说,是一个全新的突破。  相似文献   

5.
移动电子商务   总被引:5,自引:0,他引:5  
林翔 《现代通信》2003,(1):18-19
随着互联网和移动通信两大技术的迅速发展,基于互联网的移动电子商务正逐渐成为一种新的商业运作模式。移动互联的商业模式与传统互联商业模式虽有类似点,但仍存在区别,游戏规则、商业模式及其价值链将发生变化。  相似文献   

6.
必须承认,在我国,无论移动支付还是移动电子商务目前都处于一个探索阶段,商业模式不是非常清晰,也存在各种问题  相似文献   

7.
移动互联网商业模式浅析   总被引:3,自引:0,他引:3  
陈圣举 《移动通信》2010,34(6):23-26
文章分析了移动互联网商业模式的三种主要类型,并结合移动互联网商业模式的未来发展趋势和目前存在的主要问题,分别从CP/SP、移动运营商两个角度提出了发展建议。  相似文献   

8.
杨晓峰 《通讯世界》2016,(4):291-292
随着信息时代的到来,为了迎合新型商业模式的产生,电子商务互动营销方案被不断提出。企业为长久发展,研究电子商务互动营销方式及应用模式迫在眉睫。为了迎合信息时代下的新形势,本文对移动电子商务互动营销进行研究,并分析其应用模式,从此种营销模式的利弊及解决问题的方向找出最佳应用模式,以期为电子商务行业人士提出合理建议。  相似文献   

9.
文章介绍了移动电子商务的概念和意义,然后列举了湖南、重庆和广州三个典型省市移动电子商务应用的发展现状,并对目前移动电子商务发展存在的六个问题进行了分析,同时分析了移动电子商务的三个发展趋势。  相似文献   

10.
随着目前无线移动通信技术的飞速发展,为移动电子商务的发展提供了更加良好的发展环境,因此,文章结合笔者的实践工作经验,首先分析了基于移动互联网下的移动电子商务突出优势,在此基础上,对移动电子商务面临的挑战及建议进行了探讨,希望能够为相关的理论和实践提供一定的参考价值。  相似文献   

11.
近几年,随着无线网络技术的发展,移动电子商务成为无线网络应用的必然趋势。但由于网络本身的开放性,使得移动电子商务面临着各种各样的安全威胁,其安全问题已成为核心焦点被提到了极其重要的位置。本文通过对我国移动电子商务发展现状进行描述,探讨了制约移动电子商务安全发展的相关安全问题。在此基础上进一步从核心技术、立法和专业人员培训需求等层面提出了相应的安全对策。  相似文献   

12.
A Service Management Framework for M-Commerce Applications   总被引:1,自引:0,他引:1  
Mobile commerce (m-commerce) refers to an ability to conduct wireless commerce transactions using mobile applications in mobile devices. M-commerce applications can range from as simple as an address book synchronization to as complicated as credit card transactions. M-commerce is expected to grow dramatically in the near future supporting simple to complex commerce transactions. Even though the Wireless Application Protocol (WAP) is designed to facilitate the development of wireless applications, it will not be sufficient to handle complex business transactions that require cooperation of different service applications. In order to handle these complex mobile commerce transactions efficiently, an intelligent, robust and scalable framework that provides diverse m-commerce services is required. This paper describes in detail such an m-commerce framework based on the Java Intelligent Network Infrastructure (JINI) and Wireless Applications Protocol (WAP).  相似文献   

13.
Supporting Mobile Commerce Applications Using Dependable Wireless Networks   总被引:1,自引:0,他引:1  
Mobile commerce (m-commerce) is an emerging discipline involving applications, mobile devices, middleware, and wireless networks. While most of existing e-commerce applications can be modified to run in a wireless environment, m-commerce also involves many more new applications that become possible only due to the wireless infrastructure. These applications include mobile financial services, user and location specific mobile advertising, mobile inventory management, wireless business re-engineering, and mobile interactive games. In addition to device and wireless constraints, mobile commerce would also be impacted by the dependability of wireless infrastructure. Unlike e-commerce applications that usually run on fixed networking infrastructure of fairly high dependability (approaching to about 100%), m-commerce applications may not receive such high dependability from the existing and emerging wireless infrastructure. So far, most of the m-commerce research focuses on applications, devices, and security issues. We believe that some work is necessary in addressing the dependability challenges of the wireless infrastructure. In this paper, we present (a) the dependability issues of wireless infrastructure, (b) several architectures to improve the dependability of wireless networks, and (c) a simulation model and results on wireless dependability for m-commerce. The results show that a significant improvement is possible in wireless dependability for supporting m-commerce applications.  相似文献   

14.
As smartphone penetration continues to double in Sub-Saharan Africa, many businesses are looking into this channel for conducting their business activities. In Cameroon, all the top e-commerce giants have deployed smartphone applications to facilitate m-commerce activities. However, little is known about the factors that influence m-commerce adoption in the country. As such, this study had as objective to determine the key factors that influence consumer’s adoption of m-commerce applications in Cameroon. Using data from 372 respondents, a modified version of the extended unified theory of acceptance and use of technology (UTAUT2) was validated in the Cameroon context. The findings showed that social influence, facilitating conditions, hedonic motivations, perceived risk and perceived trust were significant predictors of the behavioural intention to adopt m-commerce applications. Also, the results showed that consumers who had a high intention to adopt m-commerce were more likely to recommend the technology to others. For researchers, the study depicts the relevance of extending existing technology acceptance models like the UTUAT2 with appropriate factors in different technological and geographical context. For practitioners, the study identifies customer-specific and environmental factors that m-commerce providers in Cameroon and other regions with similar characteristics could consider when designing and implementing strategies for attracting consumers to use their m-commerce applications.  相似文献   

15.
Fan  K. Kou  W. 《Electronics letters》2005,41(3):117-119
To solve the problems due to restriction of handheld devices and the improperness of traditional steganography schemes in m-commerce applications, a new steganography scheme based on (N, t) threshold is proposed. This scheme can significantly reduce the computing complexity and the requirements for the communication devices  相似文献   

16.
M-commerce, or mobile commerce, is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. In this paper, the special characteristics of m-commerce are identified and some important security issues considered.  相似文献   

17.
The emerging mobile services, including m-commerce, have received considerable interest among researchers, developers, service providers, and users. Some of these mobile services require the support for group communications among mobile users for conducting transactions. Therefore, there is a need for protocols that are designed to support transactions for group-oriented mobile services especially under brief dis-connectivity and/or intermittent connectivity. In this paper, we identify the transaction requirements of group-oriented mobile services, present three protocol schemes and several new metrics for transactions, and evaluate the performance of protocol schemes under varying conditions. Our results show that higher levels of transaction completion probabilities and lower levels of transaction delays can be achieved to support the performance requirements of diverse group-oriented mobile services. Upkar Varshney is an Associate Professor of CIS at Georgia State University, Atlanta. He has authored over 80 papers on wireless networks, mobile commerce, and other topics in major journals and international conferences. Many of his papers are among the most widely cited publications in m-commerce. He has delivered over 50 invited speeches, including several keynotes at conferences and workshops. Upkar was awarded Myron T. Greene CIS Outstanding Teaching Award in 2000 and RCB College Outstanding Teaching Award in 2002. He is also on the editorial board of IEEE Computer, International Journal on Mobile Communications, and Communications of AIS. He has also served on the program committees several international conferences. He is a member of the ACM, IEEE, and AIS.This revised version was published online in August 2005 with a corrected cover date.  相似文献   

18.
Unique Features of Mobile Commerce   总被引:1,自引:0,他引:1  
While the market potentials and impacts of web-based e-commerce are still in the ascendant, the advances in wireless technologies and mobile networks have brought about a new business opportunity and research attention, what is termed mobile commerce. Commonly, mobile commerce is considered to be another new application of existing web-based e-commerce onto wireless networks, but as an independent business area, mobile commerce has its own advantages and challenges as opposed to traditional e-commerce applications. This paper focuses on exploring the unique features of mobile commerce as compared with traditional e-commerce. Also, there are still some limitations arisen in m-commerce in contrast to web-based e-commerce. Finally, current state of mobile commerce in Japan is presented in brief, with an introduction of several cases involving mobile commerce applications in today's marketplace.  相似文献   

19.
We present MAGICS, a mobile agent-based system for supporting business-to-consumer electronic commerce (e-commerce) or mobile commerce (m-commerce) applications. To use the system, consumers first provide their buying requirements to a proxy/agent server through a Web browser or a wireless application protocol (WAP) terminal. Having obtained the requirements, mobile agents are generated to carry out tasks for the consumers including getting offers from merchants, evaluating offers, and even completing purchases. In the case of mobile commerce, consumers can generate a mobile agent to conduct a search and evaluation in the digital marketspace before making a purchase in the physical marketplace. To make it possible to choose an offer that best satisfies the consumer's requirement(s), we present a mathematical model for evaluating multiple decision factors. To test the basic functions of the mobile agent-based Internet commerce system (MAGICS), we have built a prototype system. To minimize the average cost of a product (including the cost of sending agents), we have also developed an analytical model that can determine how many agents should be sent to compare prices. Four different price distributions and some real price information are analyzed based on the model. The analysis provides valuable insights into the design of mobile agent-based shopping applications for m-commerce, in particular, and for e-commerce, in general.  相似文献   

20.
The main driving force for the rapid acceptance rate of small sized mobile devices is the capability to perform e-commerce transactions at any time and at any place, especially while on the move. There are, however, also weaknesses of this type of e-commerce, often called mobile e-commerce, or m-commerce. Due to their small size and easy portability mobile devices can easily be lost or stolen. Whereas the economic values and privacy threats protected with Personal Identification Numbers (PIN) are not particularly high for normal voice-enabled mobile phones, this is not true any more when phones have developed to Personal Trusted Devices (PTDs). Still, PINs are used also in this new context for authorization and identification purposes. PINs are currently used both for protection of the devices and for authentication, as well as authorization of the users. It is commonly recognized that not many techniques of storing the PINs into the memory of the device or on the SIM card are safe. Even less sophisticated thieves might uncover the PIN inside the stolen mobile devices and for sophisticated thieves uncovering the PIN stored safely might be possible. In this paper we propose a new scheme to cope with the problem of uncovering the PIN that reduces the risks of m-commerce. The basic idea is that instead of storing the entire PIN digits (or some hash value) in the mobile device, we store part of the PIN in a remote machine in the network. The PIN verification then involves both the mobile device and the remote machine, which must verify their respective parts of the PIN. Also, the improvements of the security over the existing schemes are shown using a probabilistic model. In the best case, where the probability of discovering the PIN irrespective of the storage scheme is negligible in relation to directly uncovering it, the increase in security is over 1000%.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号