Preface
Acknowledgements
1Mobilecommerce(M-commerce):definitions
andcontext
1.1DefiningM-commerce
1.2Ashorthistoryofwirelesscomputing
1.2.1Firstgenerationwirelesscommunication
1.2.2Secondgenerationwirelesscommunication
1.2.3Thirdgenerationwirelesscommunication
1.3DiffusionofM-commerceinnovation
1.4ObstaclestoM-commerce
1.5TheMobileInternetandmobileinformationassets
1.6TheuntetheredMobileInternet
1.7M-commerceversusE-commerce
1.8Thewirelessworld
1.9Pervasivecomputingsystems,theoryandpractice
1.10Trendsinmobileandpervasivecomputing
1.11ApplicationsofM-commerce
1.12Thetrendtowardsmobileworking
~1.12.1Wirelesstelemetryandwirelesstelematics
1.12.2Trackingandmonitoringthemobileworkforce
1.12.3Customer-focusedproductsandservices
1.13Effectivenessandefficiencyinmobiledomains
1.14TheM-commercevaluechain
1.15Networkedwirelessbusinesssystems
1.16Bluetoothtechnology
1.17FactorsdeterminingM-commerceinnovationand
adoptioninthe21stcentury
1.17.1Fivecharacteristicsofinnovation
1.17.2Thesocio-technicalperspectiveoftechnology
innovationandadoption
1.18Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
2Commercialcommunicationsandnetworks
2.1Introduction
2.2Thenatureofcommercialcommunication
2.3Communicationandlanguagecomplexity
2.4Informationandmeaning
2.4.1Informationaschannelcapacity
2.4.2Informationasameasureofvariety
2.4.3Informationasameansofreducinguncertainty
2.4.4Informationasameasureofanagent'sability
toestimateaparameter
2.5Dataandknowledge
2.6Sharedmeaning
2.7Communicationandinformationtheory
2.7.18ource
2.7.2Transmitter
2.7.3Channel
2.7.4Noise
2.7.5Receiver
2.7.6Destination
2.7.7Channelsandtransportation
2.8Telecommunicationsandnetworks
2.9Mediatypesintelecommunications
2.9.1Boundmedia
2.9.2Unboundmedia
2.10Modulationanddigitization
2.10.1Modulation
2.10.2Digitization
2.11Communicationnetworkinfrastructures
2.12Typesofchannel
2.12.1Circuitswitching
2.12.2Packetswitching
2.12.3Protocolsandprotocolstacks
2.13TheInternationalStandardsOrganizationreference
Model
2.13.1ApplicationLayer
2.13.2PresentationLayer
2.13.3SessionLayer
2.13.4TransportLayer
2.13.5NetworkLayer
2.13.6DataLinkbayer
2.13.7PhysicalLayer
2.14TransportControlProtocol/InternetProtocol(TCP/IP)
2.15Communicationsnetworkdevices
2.15.1Transceivers
2.15.2Repeaters
2.15.3Bridges
2.15.4Hubs
2.15.5Routers
2.15.6Switches
2.15.7Gateways
2.15.8Wirelessaccesspoints
2.15.9Mobileterminal
2.16Networktopologies
2.16.1Meshtopology
2.16.2Bustopology
2.16.3Startopology
2.16.4Starbus
2.16.5Hierarchicalstar
2.16.6Ring
2.16.7Adhocwireless
2.16.8Infrastructurewireless
2.16.9Piconet
2.16.10Networkaddresses
2.17Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
3Wirelessprotocols:contextandusage
3.1introduction
3.2Wirelesscellularphonenetworks
3.2.1Historyanddevelopmentofcellularradio
networks
3.2.2Currentandfuturecellularcommunication
networks
3.2.3Cellularradionetworks
3.2.4Cellularmobilitymanagement
3.2.5Wirelessoperationalfeatures
3.3TheWirelessApplicationsProtocol(WAP)
3.4WAParchitecturelayers
3.4.1TheWirelessApplicationEnvironment(WAE)
layer
3.4.2TheWirelessSessionProtocol(WSP)layer
3.4.3TheWirelessTransactionProtocol(WTP)layer
3.4.4TheWirelessTransportLayerSecurity(WTLS)
3.4.5TheWirelessDatagramProtocol(WI)P)layer
3.5WAPfunctionalityandadaptation
3.6Servicebeareradaptation
3.7ComparisonofwirelessandwirednetworkIntemet
protocols
3.8TheintegrationofWAPandTCP/IPwithintheOSI
architecturemodel
3.9TheMobileIntemet
3.9.1MobileIntemetnetworkoperators
3.9.2WirelessIntemetportalproviders
3.10TheMobileIntemet-servicesandproducts
3.11OtherwirelessIntemetproviders
3.12Acasestudyof/Mode
3.12.1iModeserviceoperation
3.12.2CharacteristicsofiMode
3.13AcomparisonofWAPandiMode
3.14WAPandiModebillingmodels
3.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
4Wirelessprogrammingformobiledevices:
contextandusage
4.1Introduction
4.2ThedevelopmentanduseofthexHTML
4.3WMLandxHTMLeonvergenee
4.4AcomparisonofWMLandxHTMLtransmissionprotocols
4.5CreatinganIntemetWAPsite
4.5.1Step1-Downloadinganemulator
4.5.2Step2-CreatingandbuildingtheWAP
orxHTMLsite
4.5.3Step3-RegisteringandpublishingaWAPsite
4.6DevelopingabasicWAPsiteusingWML
4.7WMLandWMLScript
4.8TheWMLlanguagebasics-elementsandattributes
4.9WMLdecknavigation-eventandtaskhandling
4.10Pushandpullbrowsing
4.11WMLoptionmenusandvariables
4.12PasswordsandsecurityinWML
4.13Handlingtextformatting,tablesand
imagesinWML
4.14Capturingandsendinginformationwithinthe
WAPenvironment
4.15Applicationandwebserveraccesssecurity
4.16WMLScriptingwithintheWAPenvironment
4.16.1Variables
4.16.2Functions
4.16.3Pragmas
4.17WMLScriptlibraries
4.18WMLScriptstatements
4.19WAPsiteusabilityissues
4.20HostingWAPsites
4.21Conclusions
Shortserf-assessmentquestionsandGroupactivities
ReferencesandBibliography
Appendix4.1CommonlyusedWMLtags
Appendix4.2CommonlyusedHTMLtags
5Operatingsystems:microandmacrodevices
5.1Introduction
5.2Targetdevices
5.3Mobile-specificoperatingsystemsrequirements
5.3.1Wirelessnetworking
5.3.2Locationindependentcomputing
5.3.3Physicalconstraintsofdevices
5.3.4Increasedlevelsofuncertaintyinthe
environment
5.3.5Differencesinpsychologicalaffordanceof
smalldevices
5.4Operatingsystemsbasicsforwireless
understanding
5.5Operatingsystemabstractions
5.5.1Systemsproeesses
5.5.2Multi-proeessingenvironments
5.5.3Memorymanagement
5.5.4Virtualmemory
5.6Informationprotectionandsecurity
5.7Schedulingandresourcemanagement
5.8Dividingtorule
5.9Modernoperatingsystemconcepts
5.9.1Thekernel
5.9.2Multi-threading
5.9.3Object-orientedprogramming
5.10Operatingsystemsrequirementsformobiledevices
5.10.1Wirelessnetworksandtelephony
5.10.2Processingpower
5.10.3Computingandcomputation
5.10.4Mobilememory
5.10.5Mobilenetworksecurity
5.10.6Multimedia
5.11Mobileapplications
5.11.1vCard
5.11.2vCalendar
5.11.3Messaging
5.11.4SubscriberIdentityModule(SIM)
5.12TheJavaVirtualMachine(JVM)
5.12.1Java2MicroEdition
5.12.2Configurationandprofiles
5.12.3JavaConnectedDeviceConfiguration(CDC)
5.12.4JavaConnected,LimitedDeviceConfiguration
(CCDC)implementation
5.12.5JavaPhone
5.12.6JavaCard-smartcards
5.13Mobiledeviceoperatingsystems
5.13.1PalmOS
5.13.2EmbeddedMicrosoftWindows
5.13.3Symbian
5.14Comparisonsofmobiledeviceplatforms
5.15Conclusions
Shortself-assessmentquestionsandGroupactivities
ReferencesandBibliography
6Personalareaandmobilenetworking
6.1Introduction
6.2Thedevelopmentofareanetworks
6.2.1PersonalOperatingSpace(POS)
6.2.2PersonalAreaNetworks(PANs)
6.2.3Personalinformationappliances
6.3Wireless-enableddomesticappliances
6.4Environmentcharacteristics
6.4.1Mobilewirelessenvironments
6.4.2Staticwirelessenvironments
6.4.3Smartspaces
6.4.4Biddablespaces
6.5LocalAreaNetworks(LANs)
6.5.1Thenetworkbackbone
6.5.2FibreDistributedDataInterface(FDDI)
6.5.3Ethernet802.3
6.5.4CarrierSenseMultipleAccesswith
CollisionDetection(CSMA/CD)
6.6Wirelessnetworks
6.6.1Power,rangeanddatarate
6.6.2IEEE802.11bwirelessEthernet
6.6.3CSMA/CA
6.6.4802.11a
6.6.5HiperLAN2
6.7Personalareanetworkintelligentgateways
6.8Bluetoothtechnology
6.9Bluetoothradiofrequencychannels
6.10Bluetoothpieonets
6.10.1Networkmasterandslaves
6.10.2Seatternets
6.11Establishingandmaintainingwirelessconnections
6.11.1Wirelessoperatingmodes
6.11.2Creatingnetworkconnections
6.12Thephysicalconnection
6.12.1Time-slots
6.12.2Frequency-hopping
6.12.3Security
6.12.4IEEE802.15
6.13Wirelesssurveillance
6.14Wirelessservicediscoveryanduse
6.14.1JINI
6.14.2UniversalPlugandPlay(UPnP)
6.14.3Salutation
6.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
7Wirelessapplications:pushandpullservices
andproducts
7.1Introduction
7.2WAPpushandpullmessaging
7.3TheShortMessageService(SMS)
7.4SMSpricing
7.5Pushprofiling
7.6Profilingcookies
7.7Baseplatformservices
7.7.1Digitalcontentservices
7.7.2Digitalcontentproducts
7.8M-commerceservicesforconsumers
7.9Electroniccash(e-cash)
7.10Mobileelectronicbanking(e-banking)
7.11Mobilealerts
7.12Mobilegambling
7.13M-commerceservicesforbusiness
7.13.1Wirelessbusiness-to-business
7.13.2Mobilecollaboration
7.13.3Wirelessbusiness-to-consumer
7.14WirelessInternetbusinessmodel
7.15Mobilityandlocation
7.15.1GlobalPositioningSystems(GPSs)
7.15.2Mobilenetworklocation
7.15.3Locationtriangulation
7.16Mobilesystemsthinking
7.17Wirelessbusinessapplications
7.17.1Staticmobileenvironments
7.17.2Location-responsemobileenvironments
7.17.3Dedicated-embeddedmobileenvironments
7.17.4Wirelesssystemsconneetivity
7.17.5Wirelesssystemsflexibility
7.18TheeconomiesofwirelessInternetdata
7.19MobileMultimediaPortals(MMPs)
7.20Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
Appendix7.1SMStexting
8Pervasiveandembeddedmobilesystems
8.1Definingpervasivecomputing
8.2Technologieswithinthepervasivecomputingdomain
8.3Networkedpervasivecomputing
8.3.1Firstgenerationpervasivecomputing
8.3.2Secondgenerationpervasivecomputing
(andbeyond)
8.4Embeddedsystemsergonomics
8.5Wearablecomputing
8.6Biometricsystems
8.6.1Fingerprints
8.6.2Handgeometry
8.6.3Facialfeatures
8.6.4Eyefeatures
8.6.5Voicefeatures
8.6.6Signaturefeatures
8.7Biometricissuesandsystemssecurity
8.8Biometricsystemsapplications
8.9Biometricsystemsintegration
8.10Digitalsignatures
8.11Automobiletelematicsandvehicletelemetry
8.12In-vehicleuserinterfacesandapplications
8.12.1Voice-activatedinterfaces
8.12.2Intemetapplications
8.13UniversalInformationAppliances(UIAs)
8.14Obstaclesinpervasivecomputing
8.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
Appendix8.1:MEMS-BigideasforSmallDevices
9Securityinamobileworld
9.1Introduction
9.2Aspectsofsecurity
9.2.1Generalsecurityissues
9.2.2Generalsecuritythreats
9.2.3Mundanethreats
9.2.4Policy
9.3Wirelessnetworksecurity
9.3.1Networkenvironments
9.3.2Communicationchannelthreats
9.3.3Misappropriationandmisusethreats
9.4Accesscontrol
9.5Encryption
9.5.1Codes
9.5.2Codebreaking
9.6TheDiffie-Hellmankeyagreementmethod
9.7Securityaspectsofwirelessnetworks
9.8Wideareawirelessnetworksecurity-3G
9.8.1Userdomainroles
9.8.2Infrastructuredomainroles
9.8.3Networktraffic
9.8.4Networkintruders
9.8.5Off-lineparties
9.8.6MobileterminalsandUICC
9.8.7Radiointerface
9.8.8Wiredinterfaces
9.8.9Homeenvironmentsandusers
9.8.10Requirementstoreduceoravoidvulnerabiliti,
9.9WirelessLocalAreaNetwork(WLAN)securityfeature
9.9.1IEEE802.11b
9.9.2ServiceSetIdentifier(SSID)
9.9.3Theauthenticationprotocol
9.9.4WiredEquivalentPrivacy(WEP)
9.10BluetoothandPersonalAreaNetwork(PAN)security
9.10.1Adhocnetworkvulnerabilities
9.11Bluetoothbasebandsecurity
9.12Bluetoothsecurityprofiles
9.13Theheadsetsecuritymodel
9.14Securingsmalldevices
9.15Conclusions
Shortself-assessmentquestionsandGroupactivity
ReferencesandBibliography
10Enablingthemobileworkforce:extending
enterpriseapplications
10.1Theagileandmobileworkforce
10.2Supportingthemobileworkforce
10.2.1Deviceandtechnologymaintenance
10.2.2Integratingkillerapps
10.2.3Thecostofmobileworkeraccess
10.3Mobilesystemsdevelopment
10.4IssuesinM-commerce
10.5Privacy
10.6Social,ethicalandlegalissues
10.7Ethicalbusinessbehaviour
10.8Ethicalissues
10.9Ethicaldilemmasinwirelessbusinesssystems
10.10Rightsandduties,andprivilegesandresponsibilities
10.10.1Duties
10.10.2Rights
10.10.3Privileges
10.10.4Responsibilities
10.11Trustandcontrol
10.11.1Confidentiality
10.11.2Freedomandcapabilities
10.11.3Freedomfromconstraint
10.11.4Freedomtoparticipate
10.12Surveillance
10.13Dataprotection
10.13.1Dataprotectionprinciples
10.13.2Monitoringatwork
10.14Impactanalysisusingareal-worldcasestudy
10.15Conclusions
Shortself-assessmentquestions
ReferencesandBibliography
Appendix10.1Impactanalysisusingareal-world
casestudy
M-commerceglossary
Index
Moreinformationcanbefoundat:
www.booksites.net/elliottphillips