The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the most important component of pervasive computing in mobile business, context-aware system gets more and more attention from the researchers. One of the basic technologies used to implement the contexts' description and reasoning in context-aware systems is ontology which has the big advantage at knowledge presenting and sharing. However, the shortage of the existing methods with ontology is...
User acceptance of mobile service is the first step for enterprises to successfully implement mobile commerce. Extant research has tried to explain user acceptance of mobile commerce based on TAM and neglected the impact of usage cost, enjoyment and social evaluation on user behavior. Based on the theory of perceived value,this paper examines the impact of perceived value on user acceptance behavior...
A precondition for mobile commerce success is user acceptance. Based on UTAUT that explains user acceptance of information technology, and combined with a special characteristic of mobile technology: contextual offering, we examined the factors significantly affecting mobile commerce user acceptance. We employed questionnaire survey to collect 250 valid papers and analyzed data with SEM software:...
The mobile communication and wireless technology continues to grow at a substantial rate in China as well as in world, with estimates for mobile phone users in china reaching 539.37 million by the end of November 2007 (Ministry of Information Industry, PRC, 2007). Despite this growth, mobile-commerce (m-commerce) still experiences challenges on many fronts. Several studies have identified trust as...
Anonymity is the property of keeping secret the identity of user accessing a certain resource or service, and it is a main approach to protect userpsilas privacy. At present, many solutions of anonymity have been proposed, but they seldom concern how to evaluate the security of an anonymity mechanism. As userpsilas actions are often dynamic and random in the network, this paper proposes a novel conceptual...
Mobile supply chain management is increasingly recognized as an area offering significant potential for generating improvements and creating competitive advantage to corporations. Obviously, high efficiency mobile chain network needs simultaneous and accurate information about demand, supply, sale, inventory, shipment and operational activities. However, there is little academic literature on how...
Mobile commerce is the significant development of E-commerce. While consumer trust has become the bottleneck of the development of e-commerce, it is also becoming the major obstacle of mobile commerce. In this paper, we discuss the influencing factors of consumer initial trust in mobile commerce based on discussing the foundation of trust, the formation process of online trust and the characteristics...
Digitized urban management is a new mode of urban management today, is also an important application field of M-commerce technology. This paper attempts to probe into the application of M-commerce in digitized urban management, beginning with the development of M-commerce technology and the requirement of digitized urban management. With the case of Shenzhen ldquoChengGuanTongrdquo mobile information...
Based on the review and dissertating of related literature of M-commerce, this paper defined the concept of this emerging business model. Meanwhile, from the scientific research and manufacturing perspectives, we analyzed the development foundation of M-commerce industry in different stages according to the application of mobile communication technology. Moreover, united the application of mobile...
The purpose of this paper is to resolve information security problem in the mobile electronic commerce industry chain. We analyze information security based on evolutionary game theory. In this paper, we set up the information security game model with penalty parameter, calculate replicator dynamics, and analyze the evolutionary stable strategy of the game model. The result reveals that reducing the...
In order to statically validate the interesting and desired properties of concurrent and distributed system, an abstract interpretation frame based on the ambient occurrence counting for the calculus of boxed ambients, a variant of the calculus of mobile ambients, is developed. The analysis computes a safe approximation of the set of all processes to whom the given system can evolve. The frame is...
This paper constructs 3-level evaluation model based on ACSI model and confirm the attribute weights by the means of entropy weight method, then compute the overall customer satisfaction index making use of fuzzy comprehensive evaluation method and illustrate the method by an empirical investigation. Results provide policymakers with insights into consumers' mental perception for M-commerce.
Information and communication technologies innovating applications have posed technical, organizational and commercial challenges in securities industry. This study uses a hypercube model to investigate electronic trading innovative changes in securities industry of China and focuses on their impacts on stakeholders: providers, network operators, securities brokerage firms and customers. The results...
Mobile e-commerce is a new e-commerce branch and the new form of development of e-commerce. However, due to constraints in the development of mobile e-commerce payment security problem has not been soluted, mobile e-commerce applications are still on the surface. This paper, in such circumstances, first of all, introduces transactions mode from the view of safety of mobile e-commerce, and mobile e-commerce...
E-voting based on the Internet has been recently performed in a wide region. There isn't any spatial restriction that a voter has to go to a certain polling place, but an e-voting using the Internet has to gather the computer in which the internet connection is possible. This voting method requires an access account for the e-voting through the beforehand report of a voter. To minimize these disadvantages,...
With the rapid development of Internet and Mobile technologies, Web-based Mobile-Learning System has created new ways for educators to communicate with learners. Association rule mining is one of the most important fields in data mining and knowledge discovery in databases. Rules explosion is a serious problem which causes great concerned, as conventional mining algorithms often produce too many rules...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.