Presentation is loading. Please wait.

Presentation is loading. Please wait.

CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce.

Similar presentations


Presentation on theme: "CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce."— Presentation transcript:

1 CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce

2 Announcements Business Week – Tuesday Class Cancelled (Attend a session) - RegisterRegister Project 4 (Excel Refresher) due Tonight by midnight Project 5 (Scenario Manager) due next Thursday by midnight

3 Review – Chapter 7 E-Commerce Pure vs. Partial B2B, B2C, C2C Mechanisms Benefits/Limitations Issues in E-Tailing Disintermediation Order Fulfillment Ethical/Legal Issus

4 CHAPTER OUTLINE 8.1 Wireless Technologies 8.2 Wireless Computer Networks and Internet Access 8.3 Mobile Computing 8.4 Mobile Commerce 8.5 Pervasive Computing 8.6 Wireless Security

5 Chapter Opening Case: The Battle for the Mobile Wallet Source: Slavoljub Pantelic/ Shutterstock

6 8.1 Wireless Technologies © Oleksiy Makymenko/Alamy © ecco/Shutterstock © PhotoEdit/Alamy© Såndor Kelemen/iStockphoto How many smart phones are now being used worldwide?

7 Capabilities of Wireless Devices Cellular telephonyE-mail access BluetoothShort message service Wi-FiInstant messaging Digital cameraText messaging Global positioning systemOrganize MP3 music player Video player Address bookInternet access What problems might companies have with personal smartphones?

8 Wireless Transmission Media Microwave Transmission Satellite transmission Geostationary Orbit (GEO) Internet over Satellite Middle Earth Orbit (MEO) Global Positioning System Low Earth Orbit (LEO) Satellite Communications

9 How the Global Positioning System Works © Toh Kheng Ho/Age Fotostock America, Inc.

10 Wireless Transmission Media (continued) Radio Satellite Radio Infrared

11 8.2 Wireless Computer Networks and Internet Access 1. Short range wireless networks 2. Medium range wireless networks 3. Wide area wireless networks

12 8.2.1 Short Range Wireless Networks Bluetooth Near-field Communications © ZOONAR GMBH LBRF/Age Fotostock America, Inc.

13 8.2.2 Medium Range Wireless Networks Wireless fidelity (Wi-Fi) Wireless access point Hotspot Wireless network interface card

14 8.2.2 Medium Range Networks: Wireless Mesh Networks

15 8.2.3 Wide-Area Wireless Networks Cellular Radio 1st Generation 2nd Generation 3rd Generation (3G) 4 th Generation (4G) Wireless Broadband or WiMax (WiFi on steroids)

16 8.3 Mobile Computing Basis of mobile computing: Mobility Broad reach Five value-added mobile computing attributes: 1.Ubiquity 2.Convenience 3.Instant connectivity 4.Personalization 5.Localization of products and services

17 8.4 Mobile Commerce The development of m-commerce is driven by the following factors: Widespread availability of mobile devices No need for a PC The “Cell phone culture” Declining prices Bandwidth improvement

18 Mobile Commerce Applications Location-Based Applications and Services Financial Services Intrabusiness Applications Accessing Information Telemetry Applications

19 Location-Based Applications Shopping from Wireless Devices Location-based Advertising Location-based Services

20 Financial Services Frederic Lucano/Stone/Getty Images, Inc. Wireless Electronic Payment System Mobile Banking Wireless Bill Payments Mobile Wallet Micropayments

21 Intrabusiness Applications Example: UPS

22 Accessing Information Mobile Internet Apps vs. Web Browser: who’s winning? http://responsivedesignchecker.com/

23 Telemetry Examples of Telemetry Applications Medicine Automobiles Find My iPhone Telemedicine predicted in 1924

24 8.5 Pervasive Computing Radio frequency identification (RFID) Wireless Sensor Networks (WSNs)

25 Bar Code, QR Code, RFID Source: Media Bakery

26 Small RFID Reader and Tag Coming soon to a supermarket near you See videovideo © Ecken, Dominique/ Keystone Pressedienst/Zuma Press

27 8.6 Wireless Security Four major threats 1. Rogue access point 2. War driving 3. Eavesdropping 4. RF (Radio frequency) jamming © Sebastian/AgeFotostock America, Inc.

28 Chapter Review Describe the four main types of wireless transmission media. Microwave Satellite Radio Infrared

29 Chapter Review Discuss the basic purposes of short-range, medium-range, and long-range networks, and explain how businesses can use at least one technology employed by each type of network. Short-range: near field communications Medium-range: WiFi technologies Long-range: Cellular networks

30 Chapter Review (continued) Discuss the five major m-commerce applications, and provide a specific example of how each application can benefit a business. Location-Based Applications and Services Financial Services Intrabusiness Applications Accessing Information Telemetry Applications

31 Chapter Review (continued) Define pervasive computing, describe one technologies that underlies this technology, and provide at least one example of how a business can utilize each one. Radio Frequency Identification

32 Chapter Review (continued) Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business. 1. Rogue access point 2. War driving 3. Eavesdropping 4. RF (Radio frequency) jamming


Download ppt "CHAPTER 8 Wireless, Mobile Computing and Mobile Commerce."

Similar presentations


Ads by Google