……... business informatics 2 (pwin) ss 2011, chair of mobile business & multilateral...

52
. . . Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral Security Exercise 2 Business Informatics 2 (PWIN) Information Systems III & Communication Systems SS 2011 Dr. Andreas Albers www.m-chair.net

Upload: jonathan-walsh

Post on 17-Jan-2018

214 views

Category:

Documents


0 download

DESCRIPTION

……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 3 Exercise 1: Mobile Device Characteristics a)Name three characteristics specific to mobile devices.

TRANSCRIPT

Page 1: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1

Jenser (Flickr.com)

Chair of Mobile Business & Multilateral Security

Exercise 2Business Informatics 2 (PWIN) Information Systems III &Communication SystemsSS 2011

Dr. Andreas Alberswww.m-chair.net

Page 2: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 2

Agenda

Exercise 1: Mobile Device Characteristics Exercise 2: SIM Card Exercise 3: Functions of a Mobile Operating System Exercise 4: Mobile Apps vs. Mobile Web Apps Exercise 5: Mobile App Markets Exercise 6: Mobile Marketing Exercise 7: Layer-based Communication Models Exercise 8: Network Layer: Routing

Page 3: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 3

Exercise 1: Mobile Device Characteristics

a) Name three characteristics specific to mobile devices.

Page 4: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 4

Exercise 1a): Solution

Page 5: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 5

Exercise 1: Mobile Device Characteristics

b) How can one summarise the situation for the InstantONS provider with regard to the development of a Mobile App?

Page 6: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 6

Exercise 1b): Solution

Page 7: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 7

Exercise 1: Mobile Device Characteristics

c) What technological means exist to alleviate the situation in b) for the InstantONS provider?

Page 8: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 8

Exercise 1c): Solution

Page 9: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 9

Agenda

Exercise 1: Mobile Device Characteristics Exercise 2: SIM Card Exercise 3: Functions of a Mobile Operating System Exercise 4: Mobile Apps vs. Mobile Web Apps Exercise 5: Mobile App Markets Exercise 6: Mobile Marketing Exercise 7: Layer-based Communication Models Exercise 8: Network Layer: Routing

Page 10: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 10

Exercise 2: SIM Card

a) Name one central function of the SIM card with regard to mobile communications.

Page 11: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 11

Exercise 2a): Solution

Page 12: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 12

Exercise 2: SIM Card

b) Which function of the SIM card enables the automatic identification of InstantONS users in order to process their corresponding user profile?

Page 13: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 13

Exercise 2b): Solution

Page 14: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 14

Agenda

Exercise 1: Mobile Device Characteristics Exercise 2: SIM Card Exercise 3: Functions of a Mobile Operating System Exercise 4: Mobile Apps vs. Mobile Web Apps Exercise 5: Mobile App Markets Exercise 6: Mobile Marketing Exercise 7: Layer-based Communication Models Exercise 8: Network Layer: Routing

Page 15: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 15

Exercise 3: Functions of a Mobile Operating System

a) Security functions are only one category of the mobile operating system functionality. Name two more categories and explain their purpose.

Page 16: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 16

Exercise 3a): Solution

Page 17: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 17

Exercise 3: Functions of a Mobile Operating System

b) Why is specifically security important for the InstantONS service and its users?

Page 18: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 18

Exercise 3b): Solution

Page 19: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 19

Agenda

Exercise 1: Mobile Device Characteristics Exercise 2: SIM Card Exercise 3: Functions of a Mobile Operating System Exercise 4: Mobile Apps vs. Mobile Web Apps Exercise 5: Mobile App Markets Exercise 6: Mobile Marketing Exercise 7: Layer-based Communication Models Exercise 8: Network Layer: Routing

Page 20: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 20

Exercise 4:Mobile Apps vs. Mobile Web

Appsa) Name two significant differences

between Mobile Apps and Mobile Web Apps.

Page 21: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 21

Exercise 4a): Solution

Page 22: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 22

Exercise 4:Mobile Apps vs. Mobile Web

Appsb) What would be the benefits /

drawbacks of offering the InstantONS service as a Mobile App?

Page 23: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 23

Exercise 4b): Solution

Page 24: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 24

Exercise 4:Mobile Apps vs. Mobile Web

Appsc) Considering your answer in b), what

kind of application type (Mobile Apps vs. Mobile Web Apps) would you recommend to the InstantONS service provider?

Page 25: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 25

Exercise 4c): Solution

Page 26: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 26

Agenda

Exercise 1: Mobile Device Characteristics Exercise 2: SIM Card Exercise 3: Functions of a Mobile Operating System Exercise 4: Mobile Apps vs. Mobile Web Apps Exercise 5: Mobile App Markets Exercise 6: Mobile Marketing Exercise 7: Layer-based Communication Models Exercise 8: Network Layer: Routing

Page 27: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 27

Exercise 5: Mobile App Markets

a) From which specific characteristics do two-sided markets benefit? What are their weaknesses?

Page 28: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 28

Exercise 5a): Solution

Page 29: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 29

Exercise 5: Mobile App Markets

b) Describe the characteristics of two-sided markets with regard to mobile apps markets. What are the differences of the Apple App Store and the Google Android Market with regard to the business strategy of both companies?

Page 30: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 30

Exercise 5b): Solution

Page 31: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 31

Exercise 5b): Solution

Page 32: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 32

Exercise 5: Mobile App Markets

c) Assuming the current market for Mobile Apps will resolve into a market of Mobile Web Apps, what are the consequences for Google, Apple and the other players in the market? Do they need to align their business strategy in order to maintain their current revenues? If yes, how?

Page 33: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 33

Exercise 5c): Solution

Page 34: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 34

Agenda

Exercise 1: Mobile Device Characteristics Exercise 2: SIM Card Exercise 3: Functions of a Mobile Operating System Exercise 4: Mobile Apps vs. Mobile Web Apps Exercise 5: Mobile App Markets Exercise 6: Mobile Marketing Exercise 7: Layer-based Communication Models Exercise 8: Network Layer: Routing

Page 35: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 35

Exercise 6: Mobile Marketing

a) Name three benefits of Mobile Marketing which originate from the unique characteristics of mobile data communications.

Page 36: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 36

Exercise 6a): Solution

Page 37: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 37

Exercise 6a): SolutionUnique Features of

Mobile Marketing at Present

Based on Praxisleitfaden Mobile Marketing (2008)

Page 38: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 38

Exercise 6: Mobile Marketing

b) What are the benefits of available context information about mobile users (i.e. current location, identity and time) for the InstantONS service?

Page 39: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 39

Exercise 6b): Solution

Page 40: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 40

Exercise 6: Mobile Marketing

c) Discuss the area of conflict between the benefit of the InstantONS service collecting context information about users and the demand of users to maintain their privacy.

Page 41: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 41

Exercise 6c): Solution

Page 42: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 42

Agenda

Exercise 1: Mobile Device Characteristics Exercise 2: SIM Card Exercise 3: Functions of a Mobile Operating System Exercise 4: Mobile Apps vs. Mobile Web Apps Exercise 5: Mobile App Markets Exercise 6: Mobile Marketing Exercise 7: Layer-based Communication Models Exercise 8: Network Layer: Routing

Page 43: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 43

Exercise 7: Layer-based Communication Models

a) What is the reason for the development of layer-based communications?

Page 44: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 44

Exercise 7a): Solution

Page 45: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 45

Exercise 7: Layer-based Communication Models

b) How does layer-based communication work in principal? Give a brief example.

Page 46: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 46

Exercise 7b): Solution

Page 47: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 47

Agenda

Exercise 1: Mobile Device Characteristics Exercise 2: SIM Card Exercise 3: Functions of a Mobile Operating System Exercise 4: Mobile Apps vs. Mobile Web Apps Exercise 5: Mobile App Markets Exercise 6: Mobile Marketing Exercise 7: Layer-based Communication Models Exercise 8: Network Layer: Routing

Page 48: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 48

Exercise 8: Network Layer: Routing

a) The main task of the Network Layer constitutes routing. In this regard, describe the basic concept of the Dijkstra algorithm as one important approach in this context.

Page 49: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 49

Exercise 8a): Solution

Page 50: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 50

Exercise 8: Network Layer: Routing

b) Assume when using the InstantONS service, a text message to your dating partner has to be passed through various systems before it is able to reach its destination. Since it is critical to reach your beloved in time, calculate the shortest path (from person “a” to person “z”) based on the Dijkstra algorithm.

Please note that lower case letters denote system vertices and numbers denote the milliseconds it takes for a message to travel between two system vertices.

Page 51: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 51

Exercise 8b): SolutionDijkstra Algorithm (1)

A

B

C G

K

H

ED

5

3

8

8

5

9

4

2

(∞,-) (∞,-)

(∞,-)

(∞,-)(∞,-) (∞,-)

(∞,-)(0,-)

2

2

6

I

JL

M

Z

(∞,-)

(∞,-)

(∞,-)(∞,-) (∞,-)1

2

4

4

2

1

1

Page 52: ……... Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 1 Jenser (Flickr.com) Chair of Mobile Business & Multilateral

……

...

Business Informatics 2 (PWIN) SS 2011, Chair of Mobile Business & Multilateral Security 52

Questions

Open Questions?