Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless, Mobile Computing and Mobile Commerce

Similar presentations


Presentation on theme: "Wireless, Mobile Computing and Mobile Commerce"— Presentation transcript:

1 Wireless, Mobile Computing and Mobile Commerce
CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce

2 CHAPTER OUTLINE 7.1 Wireless Technologies
7.2 Wireless Computer Networks and Internet Access 7.3 Mobile Computing and Mobile commerce 7.4 Pervasive Computing 7.5 Wireless Security

3 LEARNING OBJECTIVES Discuss the various types of wireless devices and wireless transmission media. BUSINESS OPPORTUNITIES: Smart phones could be part of a new marketing campaign, based upon location or user preferences. BUSINESS RISKS: Smart wireless phones may be unable to access regular websites, causing loss of revenue to the target website.

4 LEARNING OBJECTIVES (continued)
Describe wireless networks according to their effective distance. BUSINESS OPPORTUNITIES: Appropriate wireless systems can enable the organization to effectively handle new products and equipment as the organization grows. BUSINESS RISKS: Wireless systems purchased may be unable to keep up with organizational growth, to physically send the signal the required distance.

5 LEARNING OBJECTIVES (continued)
Define mobile computing and mobile commerce. BUSINESS OPPORTUNITIES: Customer service and employee flexibility can be improved through the use of innovative forms of wireless devices. BUSINESS RISKS: Wireless devices can be used to blur the boundary between personal and work time, increasing the amount of time engaged in work.

6 LEARNING OBJECTIVES (continued)
Discuss the major M-commerce applications. BUSINESS OPPORTUNITIES: Sales, marketing and geographic information systems can be linked, improving the ability to track products and provide rapid service. BUSINESS RISKS: Employees may feel an invasion of privacy if geographic positioning and wireless systems are used to track their movements.

7 LEARNING OBJECTIVES (continued)
Define pervasive computing and describe two technologies that underlie this technology. BUSINESS OPPORTUNITIES: RFID tags or chips in products can result in a better ability to track products, improving customer service and reducing costs. BUSINESS RISKS: New technologies may be incorrectly installed, increasing costs and reducing effectiveness.

8 LEARNING OBJECTIVES (continued)
Discuss the four major threats to wireless networks. BUSINESS OPPORTUNITIES: Restrictive wire-based systems can be replaced with more flexible wireless systems, lowering cost and improving productivity. BUSINESS RISKS: Data communicated could be exposed to unauthorized access.

9 LEARNING OBJECTIVES (continued)
Explain how wireless threats can be mitigated. BUSINESS OPPORTUNITIES: Reasonable controls can prevent unauthorized access to information, avoiding privacy violations. BUSINESS RISKS: Excessive controls can slow down employees, making activities cumbersome and more expensive.

10 7.1 Wireless Technologies
Wireless devices Wireless Application Protocol (WAP) Microbrowsers Wireless transmission media 10

11 Capabilities of Wireless Devices
Cellular telephony access Bluetooth Short message service Wi-Fi Instant messaging Digital camera Text messaging Global positioning system Organizer MP2 music player Scheduler Video player Address book Internet access Calculator QWERTY keyboard 11

12 Wireless Transmission Media
Microwave Transmission Satellite transmission Geostationary Orbit (GEO) Middle Earth Orbit (MEO) Low Earth Orbit (LEO) Global Positioning System (GPS) Internet Over Satellite (IOS) 12

13 Wireless Transmission Media (continued)
Radio Radio transmission uses radio-wave frequencies to send data directly between transmitters and receivers. Satellite Radio Satellite radio (digital radio) offers uninterrupted, near CD-quality music that is beamed to your radio from space. XM satellite radio and Sirius have agreed to merge as of mid-2007. 13

14 7.2 Wireless Computer Networks and Internet Access
Short-range wireless networks generally have a range of 100 feet or less. Medium-range wireless networks are the familiar wireless local area networks (WLANs). The most common type of medium-range wireless network is Wireless Fidelity (Wi-Fi). Wide-area wireless networks connect users to each other and to the Internet over geographically dispersed distances. 14

15 Wide-Area Wireless Networks
Cellular Radio uses radio waves to provide two-way communication 1st Generation 2nd Generation 2.5 Generation 3rd Generation Wireless Broadband or WiMax access range up to 31 miles and data-transfer rate up to 75 Mbps 15

16 7.3 Mobile Computing and Mobile Commerce
refers to real-time, wireless connection between a mobile device and other computing environments, such as the Internet and an intranet. Mobility users carry a mobile device and can initiate a real-time contact with other systems from wherever they happen to be. Broad reach users can be reached instantly when they carry an open mobile device. 16

17 Mobile Computing The characteristics, mobility and broad reach, create five value-added attributes that break the barriers of geography and time: Ubiquity Convenience Instant connectivity Personalization Localization of products and services 17

18 Mobile Commerce Mobile Commerce
The development of m-commerce is driven by the following factors: Widespread availability of mobile devices No need for a PC The “Cell phone culture” Declining prices Bandwidth improvement 18

19 Mobile Commerce Applications
Financial Services Mobile Banking Wireless Electronic Payment Systems Micropayments Mobile (Wireless) Wallets Wireless Bill Payments 19

20 Intrabusiness Applications
Accessing Information Mobile Portal aggregates and provides content and services for mobile users that include news, sports, , entertainment, travel and restaurant information; community services; and stock trading. Voice Portal a Web site with an audio interface and can also be accessed through a standard phone or cell phone. 20

21 Location-Based Applications
Shopping from Wireless Devices Location-based Advertising Location-based Services 21

22 Telemetry Applications
Technicians can use telemetry to identify maintenance problems in equipment; Doctors can monitor patients and control medical equipment from a distance; Car manufacturers use telemetry for remote vehicle diagnosis and preventive maintenance. 22

23 7.5 Wireless Security Four major threats Rogue access point
War driving Eavesdropping RF (Radio frequency) jamming 23

24 Copyright Copyright © 2008 John Wiley & Sons Canada, Ltd. All rights reserved. Reproduction or translation of this work beyond that permitted by Access Copyright (the Canadian copyright licensing agency) is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons Canada, Ltd. The purchaser may make back-up copies for his or her own use only and not for distribution or resale. The author and the publisher assume no responsibility for errors, omissions, or damages caused by the use of these files or programs or from the use of the information contained herein.


Download ppt "Wireless, Mobile Computing and Mobile Commerce"

Similar presentations


Ads by Google