![Page 1: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/1.jpg)
CHAPTER 7
Wireless, Mobile Computing and Mobile Commerce
![Page 2: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/2.jpg)
CHAPTER OUTLINE
7.1 Wireless Technologies
7.2 Wireless Computer Networks and InternetAccess
7.3 Mobile Computing and Mobile commerce
7.4 Pervasive Computing
7.5 Wireless Security
![Page 3: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/3.jpg)
LEARNING OBJECTIVES
Discuss the various types of wireless devices and wireless transmission media. BUSINESS OPPORTUNITIES: Smart phones
could be part of a new marketing campaign, based upon location or user preferences.
BUSINESS RISKS: Smart wireless phones may be unable to access regular websites, causing loss of revenue to the target website.
![Page 4: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/4.jpg)
LEARNING OBJECTIVES (continued)
Describe wireless networks according to their effective distance. BUSINESS OPPORTUNITIES: Appropriate
wireless systems can enable the organization to effectively handle new products and equipment as the organization grows.
BUSINESS RISKS: Wireless systems purchased may be unable to keep up with organizational growth, to physically send the signal the required distance.
![Page 5: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/5.jpg)
LEARNING OBJECTIVES (continued)
Define mobile computing and mobile commerce. BUSINESS OPPORTUNITIES: Customer
service and employee flexibility can be improved through the use of innovative forms of wireless devices.
BUSINESS RISKS: Wireless devices can be used to blur the boundary between personal and work time, increasing the amount of time engaged in work.
![Page 6: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/6.jpg)
LEARNING OBJECTIVES (continued)
Discuss the major M-commerce applications. BUSINESS OPPORTUNITIES: Sales,
marketing and geographic information systems can be linked, improving the ability to track products and provide rapid service.
BUSINESS RISKS: Employees may feel an invasion of privacy if geographic positioning and wireless systems are used to track their movements.
![Page 7: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/7.jpg)
LEARNING OBJECTIVES (continued)
Define pervasive computing and describe two technologies that underlie this technology. BUSINESS OPPORTUNITIES: RFID tags or
chips in products can result in a better ability to track products, improving customer service and reducing costs.
BUSINESS RISKS: New technologies may be incorrectly installed, increasing costs and reducing effectiveness.
![Page 8: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/8.jpg)
LEARNING OBJECTIVES (continued)
Discuss the four major threats to wireless networks. BUSINESS OPPORTUNITIES: Restrictive
wire-based systems can be replaced with more flexible wireless systems, lowering cost and improving productivity.
BUSINESS RISKS: Data communicated could be exposed to unauthorized access.
![Page 9: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/9.jpg)
LEARNING OBJECTIVES (continued)
Explain how wireless threats can be mitigated. BUSINESS OPPORTUNITIES: Reasonable
controls can prevent unauthorized access to information, avoiding privacy violations.
BUSINESS RISKS: Excessive controls can slow down employees, making activities cumbersome and more expensive.
![Page 10: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/10.jpg)
7.1 Wireless Technologies
Wireless devices
Wireless Application Protocol (WAP)
Microbrowsers
Wireless transmission media
![Page 11: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/11.jpg)
Capabilities of Wireless Devices
Cellular telephony E-mail access
Bluetooth Short message service
Wi-Fi Instant messaging
Digital camera Text messaging
Global positioning system
Organizer MP2 music player
Scheduler Video player
Address book Internet access
Calculator QWERTY keyboard
![Page 12: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/12.jpg)
Wireless Transmission Media
Microwave Transmission Satellite transmission
Geostationary Orbit (GEO) Middle Earth Orbit (MEO) Low Earth Orbit (LEO) Global Positioning System (GPS) Internet Over Satellite (IOS)
![Page 13: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/13.jpg)
Wireless Transmission Media (continued)
Radio Radio transmission uses radio-wave
frequencies to send data directly between transmitters and receivers.
Satellite Radio Satellite radio (digital radio) offers
uninterrupted, near CD-quality music that is beamed to your radio from space. XM satellite radio and Sirius have agreed to merge as of mid-2007.
![Page 14: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/14.jpg)
7.2 Wireless Computer Networks and Internet Access
Short-range wireless networks generally have a range of 100 feet or less.
Medium-range wireless networks are the familiar wireless local area networks (WLANs). The most common type of medium-range wireless
network is Wireless Fidelity (Wi-Fi).
Wide-area wireless networks connect users to each other and to the Internet over
geographically dispersed distances.
![Page 15: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/15.jpg)
Wide-Area Wireless Networks
Cellular Radio uses radio waves to provide two-way
communication 1st Generation 2nd Generation 2.5 Generation 3rd Generation
Wireless Broadband or WiMax access range up to 31 miles and data-transfer
rate up to 75 Mbps
![Page 16: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/16.jpg)
7.3 Mobile Computing and Mobile Commerce Mobile computing
refers to real-time, wireless connection between a mobile device and other computing environments, such as the Internet and an intranet.
Mobility users carry a mobile device and can initiate a real-
time contact with other systems from wherever they happen to be.
Broad reach users can be reached instantly when they carry an
open mobile device.
![Page 17: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/17.jpg)
Mobile Computing
The characteristics, mobility and broad reach, create five value-added attributes that break the barriers of geography and time: Ubiquity Convenience Instant connectivity Personalization Localization of products and services
![Page 18: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/18.jpg)
Mobile Commerce
Mobile Commerce The development of m-commerce is driven by
the following factors: Widespread availability of mobile devices No need for a PC The “Cell phone culture” Declining prices Bandwidth improvement
![Page 19: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/19.jpg)
Mobile Commerce Applications
Financial Services Mobile Banking Wireless Electronic Payment Systems Micropayments Mobile (Wireless) Wallets Wireless Bill Payments
![Page 20: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/20.jpg)
Intrabusiness Applications
Accessing Information Mobile Portal
aggregates and provides content and services for mobile users that include news, sports, email, entertainment, travel and restaurant information; community services; and stock trading.
Voice Portal a Web site with an audio interface and can also
be accessed through a standard phone or cell phone.
![Page 21: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/21.jpg)
Location-Based Applications
Shopping from Wireless Devices
Location-based Advertising
Location-based Services
![Page 22: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/22.jpg)
Telemetry Applications
Technicians can use telemetry to identify maintenance problems in equipment;
Doctors can monitor patients and control medical equipment from a distance;
Car manufacturers use telemetry for remote vehicle diagnosis and preventive maintenance.
![Page 23: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/23.jpg)
7.5 Wireless Security
Four major threats Rogue access point War driving Eavesdropping RF (Radio frequency) jamming
![Page 24: CHAPTER 7 Wireless, Mobile Computing and Mobile Commerce](https://reader036.vdocument.in/reader036/viewer/2022081418/56649dc95503460f94ac00ee/html5/thumbnails/24.jpg)
Copyright © 2008 John Wiley & Sons Canada, Ltd. All rights reserved. Reproduction or translation of this work beyond that permitted by Access Copyright (the Canadian copyright licensing agency) is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons Canada, Ltd. The purchaser may make back-up copies for his or her own use only and not for distribution or resale. The author and the publisher assume no responsibility for errors, omissions, or damages caused by the use of these files or programs or from the use of the information contained herein.
Copyright