Diffusion of Mobile Commerce Application in the Market ABSTRACT The rapid growth of mobile applications has given rise to a new term—mobile commerce, or m- commerce. Due to the fact that m-commerce is still at its initial stage, there is no unified definition of it. Any transaction or economic values managed through at least one kind of mobile terminal equipment on the mobile telecommunication network are considered a part of mobile commerce. In general mobile commerce is defined as the application of wireless communications networks and devices to the execution of transactions with monetary value either direct or indirect. Mobile applications have become especially valued in an age where time is precious and the weight attached to convenience is high. Also, the rapid proliferation of wireless devices, including mobile phones, personal digital assistants (PDAs), and other handheld devices, has made mobile commerce a major driving force for the next wave of electronic commerce. In addition, mobile commerce is expected to have an
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Diffusion of Mobile Commerce Application in the Market
ABSTRACT
The rapid growth of mobile applications has given rise to a new term—
mobile commerce, or m-commerce. Due to the fact that m-commerce is still at its
initial stage, there is no unified definition of it. Any transaction or economic values
managed through at least one kind of mobile terminal equipment on the mobile
telecommunication network are considered a part of mobile commerce. In general
mobile commerce is defined as the application of wireless communications
networks and devices to the execution of transactions with monetary value either
direct or indirect.
Mobile applications have become especially valued in an age where time is
precious and the weight attached to convenience is high. Also, the rapid
proliferation of wireless devices, including mobile phones, personal digital
assistants (PDAs), and other handheld devices, has made mobile commerce a
major driving force for the next wave of electronic commerce. In addition, mobile
commerce is expected to have an even greater impact on organizations, as wireless
technologies and application begin to challenge the existing process, strategies,
structures, roles of individuals, and even cultures of organizations.
Many scholars and analysts have asserted that there is a huge market
potential for mobile commerce applications. It is becoming one of the major topics
of interest for the IS research community and a key priority for many business
organizations. The eyes of scholars and industry representatives are now on the
Diffusion of Mobile Commerce Application in the Market
opportunities offered by wireless media, envisaging that the next –or the real phase
of e-business growth will be in the area of mobile commerce.
Nowadays, our world is characterized by the development of communication
technologies. World of information is a reality through the evolution of the Internet
and people can have access to a vast amount of data by just clicking on their
personal computer. Moreover, as the standard of living becomes higher, people
want efficient and effective access of information anytime and anywhere. Mobile
phones and other mobile devices contribute to the effective and efficient access to
information. People can call a call center and get informed about what they want.
However, handling routine phone requests can consume a substantial amount of
staff time and money. For this reason many companies have replaced live operators
with an automated system which is based on IVR (interactive voice response)
technology. More advanced IVR systems allow callers to retrieve customized
information. A system with text-to-speech recognition can read aloud information
that is stored in a database. Banks and credit card companies use IVR systems as
well, so that their customers can receive up-to-date account information instantly
and easily without having to speak directly to a person. IVR technology is also
used to gather information, as in the case of telephone surveys in which the user is
prompted to answer questions by pushing the numbers on a touch-tone telephone.
VoiceXML is a substantial element for the implementation of IVR systems. The
typical VoiceXML browser runs on a specialized voice gateway node that is
connected both to the public switched telephone network and to the Internet. These
voice gateways extend the power of the web to the world’s 1,300,000,000 phones.
Diffusion of Mobile Commerce Application in the Market
Here a web based application, in particular a dynamic voice portal which
allows users to access dynamic cultural content that is stored in a database. This
application is based on IVR systems and is designed with VoiceXML and JSP.
Diffusion of Mobile Commerce Application in the Market
CONTENTS
1. Introduction
2. Literature Survey
2.1. Classification of Mobile Commerce Application
2.2. Diffusion of Mobile Commerce Application
3. Project Description
3.1. Job Hunting
3.2. Mobile Voting
3.3. Programming Modules
4. System Specification
4.1. Hardware Specification
4.2. Software Specification
5. Architecture
5.1. Architecture for Job Hunting
5.2. Architecture for Mobile Voting
6. Code
6.1 .Job Hunting
6.2 .Mobile Voting
7. Implementation
Diffusion of Mobile Commerce Application in the Market
7.1. Implementation of job hunting
7.2. Data flow diagram for job hunting
7.3. Use case diagram for job hunting
7.4. Implementation of mobile job hunting
7.5. Mobile voting speech process
7.6. Data flow diagram for vote casting
7.7. Use case diagram for voter login
8. Testing
8.1. Testing for mobile system
9. Snapshot
9.1. Snapshot for job hunting
9.2. Snapshot of mobile voting
10. Performance analysis
10.1. Building the house of quality model mobile commerce to improve performance
10.2. performance analysis of mobile voting
11. Future Enhancement
11.1. Wireless use equipment and system
11.2 .radio frequency Identification
11.3. Location determination
11.4. Software defined radio
11.5. Adaptive modulation and coding
11.6. Digital signal compression
Diffusion of Mobile Commerce Application in the Market
11.7. Biometrics
12. Conclusion
13. Bibliography
Diffusion of Mobile Commerce Application in the Market
CHAPTER 1
INTRODUCTION
The rapid growth of mobile applications has given rise to a new term—mobile
commerce, or m-commerce. Due to the fact that m-commerce is still at its initial
stage, there is no unified definition of it. Any transaction or economic values
managed through at least one kind of mobile terminal equipment on the mobile
telecommunication network are considered a part of mobile commerce. In
general mobile commerce is defined as the application of wireless
communications networks and devices to the execution of transactions with
monetary value either direct or indirect.
Mobile applications have become especially valued in an age where time is
precious and the weight attached to convenience is high. Also, the rapid
proliferation of wireless devices, including mobile phones, personal digital
assistants (PDAs), and other handheld devices, has made mobile commerce a
major driving force for the next wave of electronic commerce. In addition, mobile
commerce is expected to have an even greater impact on organizations, as
wireless technologies and application begin to challenge the existing process,
strategies, structures, roles of individuals, and even cultures of organizations.
Many scholars and analysts have asserted that there is a huge market
potential for mobile commerce applications. It is becoming one of the major
topics of interest for the IS research community and a key priority for many
Diffusion of Mobile Commerce Application in the Market
business organizations. The eyes of scholars and industry representatives are now
on the opportunities offered by wireless media, envisaging that the next –or the
real phase of e-business growth will be in the area of mobile commerce.
Nowadays, our world is characterized by the development of
communication technologies. World of information is a reality through the
evolution of the Internet and people can have access to a vast amount of data by
just clicking on their personal computer. Moreover, as the standard of living
becomes higher, people want efficient and effective access of information
anytime and anywhere. Mobile phones and other mobile devices contribute to
the effective and efficient access to information. People can call a call center and
get informed about what they want. However, handling routine phone requests
can consume a substantial amount of staff time and money. For this reason many
companies have replaced live operators with an automated system which is based
on IVR (interactive voice response) technology. More advanced IVR systems allow
callers to retrieve customized information. A system with text-to-speech
recognition can read aloud information that is stored in a database. Banks and
credit card companies use IVR systems as well, so that their customers can
receive up-to-date account information instantly and easily without having to
speak directly to a person. IVR technology is also used to gather information, as in
the case of telephone surveys in which the user is prompted to answer questions
by pushing the numbers on a touch-tone telephone. VoiceXML is a substantial
element for the implementation of IVR systems. The typical VoiceXML browser
runs on a specialized voice gateway node that is connected both to the public
Diffusion of Mobile Commerce Application in the Market
switched telephone network and to the Internet. These voice gateways extend
the power of the web to the world’s 1,300,000,000 phones.
Here a web based application, in particular a dynamic voice portal which
allows users to access dynamic cultural content that is stored in a database. This
application is based on IVR systems and is designed with VoiceXML and JSP.
Diffusion of Mobile Commerce Application in the Market
CHAPTER 2
LITERATURE SURVEY
Several applications based on VoiceXML have been developed in following
different approaches. Many companies have invested in this technology. We
present some of them. One popular company which is one of the prevalent
companies in the world and is based on IVR systems is Nuance. Nuance is one of
many providers of speech and imaging solutions for businesses and consumers
around the world. Nuance 8.5 supports voice automation services that are built
using VoiceXML 2, the open, standards-based voice application programming
language. With the VoiceXML 2.0 standard and Nuance 8.5 speech recognition
software, carriers and enterprises can leverage their existing expertise and
investments in Web infrastructure to reduce the cost and effort of deploying
voice-driven services. Hearsay is a non-visual Web browser developed at Stony
Brook University in collaboration with the Helen Keller Services for the Blind in
Hempstead, NY. hearsay features a flexible dialog interface and innovative
context-directed browsing not used by any existing screen - readers. HearSay
helps visually impaired and blind users browse the Web more efficiently and
quickly by identifying relevant information on Web pages. The technology
underlying hearsay brings together the fields of content analysis, natural language
processing, and machine learning.
In the past, voice-enabled applications were based upon prerecorded
audio. New information models and speech synthesis tools have boosted the
development of voice enabled applications. The text-to-speech synthesis feature
Diffusion of Mobile Commerce Application in the Market
of advanced VoiceXML tools has opened new perspectives in the fields of e-
commerce and e-learning too. We are no longer restricted to prerecorded audio
but can bring any text to the ear of the user - a user that could be visually
impaired and needs a voice channel to communicate - or a user who can read but
who prefers to listen. Voice-enabled applications can support e-learning in many
ways. They can open e-learning systems to visually impaired users.
A bank can let its customers access their account balances, obtain
information on interest rates and mortgages, calculate loan payments, or transfer
funds, all using voice response applications. Using a voice response application,
brokerage firms can make current stock prices, quotations, and portfolio balances
available over the telephone. Clients can perform complex transactions without
the intervention of a broker. The design of the Voice XML dialogues which enable
the interaction is informed by the experience of workers on the Age Resource
Desk at Age concern Oxford shire and comments from their clients who
experimented with a VoiceXML system. A synthesis of work was carried out by
tutors at Age Concern Oxford shire and research work from the Speech Project at
Oxford Brookes University. It describes the Voice Access Booking System (VABS)
which enables clients at Age Concern Oxford shire to organize their IT taster
session by booking, cancelling or rearranging them using a speech dialogue over
the telephone from their own homes.
2.1 CLASSIFICATION OF MOBILE COMMERCE APPLICATION
There are potentially an unlimited number of mobile commerce applications,
which leads to a demand for classification, since currently, it is almost impossible
Diffusion of Mobile Commerce Application in the Market
to cover the whole range of potential mobile commerce application. To help
understand mobile commerce, we reviewed the classification of mobile
commerce application. It will allow developers and providers to strategize and
effectively design and implement mobile commerce applications.
In general, mobile commerce applications have two major attributes:
mobility and reachability. According these attributes, mobile commerce
application can be classified into the following six categories: Time critical services
(e.g. SMS-based notifications or alerts);
Location-aware and location-sensitive service (e.g. mobile advertising, product
location tracking); Identity enacted service (e.g. mobile bank, mobile
micropayments); Ubiquitous communications and content delivery services (e.g.
video-on-demand, interactive game); Business process streamlining; Mobile
office. Senn classified mobile commerce applications into three main categories:
transaction management (e.g. payment, shopping), digital content delivery (e.g. E-
mail, short messages) and telemetry services (e.g. status monitoring, smart
messaging). Varshney and Vetter developed a more detailed class of mobile
commerce applications roughly categorized by mobile commerce models based
on mobile characteristics. The applications are classified into 11 categories,
including mobile financial applications, mobile advertising, mobile inventory
management, locating and shopping for products, proactive service management,
wireless re-engineering, mobile auctions or reverse auctions, mobile
entertainment services and games, mobile offices, mobile distance education, and
wireless data centers .Yuan and Zhang argue that value propositions in mobile
commerce which define the relationship between seller offerings and buyer
Diffusion of Mobile Commerce Application in the Market
purchases by identifying how the seller achieves the buyer’s needs originate from
mobility and location awareness and are contrary to Internet-based ecommerce.
Therefore, they group various mobile commerce applications based on these
value propositions into six categories (Ubiquitous communication, Emergency and
time critical information services, Location-sensitive service, Pocket e-wallet,
portable entertainment, Improving productivity of mobile workforce).
From the perspective of marketing, Nysveen, Pedersen, and Thorbjornsen
propose a grid of mobile Internet service classification that employs four primary
axes: person-interactive versus machine interactive, and goal-oriented versus
experiential service. “Person interactivity” occurs between people through a
medium, while “machine interactivity” refers to the interaction between people
and the medium. In the latter, users can freely modify the content and form of a
mediated environment. A goal-oriented process is defined by utilitarian benefits,
while an experiential process provides hedonic benefits. From the perspective of
market, we could perceive the diffusion trend of mobile commerce application in
market, from communication service, information service to transaction service
and interaction service. In this paper, we incorporated the diffusion of mobile
commerce application with perspective of marketing as a new analytic framework
(Figure 2.1).
Diffusion of Mobile Commerce Application in the Market
Fig 2.1: Diffusion of m-commerce application in market
2.2 DIFFUSION OF MOBILE COMMERCE APPLICATION
To promote mobile commerce, there should be less focus on increasing the
speeds of wireless data networks now and more on developing compelling
applications. With an increasingly mobile society, more and more people are one
the move. Many interesting services can be offered to these people through
mobile device and wireless networks. This includes mobile communication
service, mobile information service, mobile transaction service, and mobile
interaction service.
2.2.1 Mobile Communication Services
Mobile communications facilitate personal contact anytime, anywhere. While
voice and short messages are currently the primary form of mobile
communication, future mobile devices such as 3G phones are capable of handling
much more information and providing broader bandwidth. As a result, ubiquitous
communications can become an important application in m-commerce.
Diffusion of Mobile Commerce Application in the Market
Some researchers seem to agree that e-mail services will become an initial
killer wireless application for mobile commerce. Gordon Xu.et.al carried out a
Delphi survey and the result indicated that short message service (SMS) was most
likely killer application of m-commerce. They also identified four features of SMS
and the critical success factors in m-commerce.
2.2.2 Mobile Information Services
Since people have different information needs and preferences, one of the
challenges for mobile information systems is to take advantage of the
convenience of handheld devices and provide personalized information to the
right person in a preferred format. Dongsong Zhang proposed a generic
framework for delivering personalized and adaptive content to mobile users. It
introduced a variety of enabling technologies and highlights important
issues in this area.
Finding the geographic location of a person is commercially valuable
because, in a mobile society, people and goods are in motion, and tend to
become lost in this mobile environment. If a service could help pinpoint the
location of a mobile device to the degree of precision appropriate for different
applications, significant value could be added.
Location–based services (LBS) are services that generate commercial
activity by using geographic location (i.e., place-related) information of the mobile
Diffusion of Mobile Commerce Application in the Market
devices, along with information about services and products available in (certain
degree of) physical proximity. LBS include locate-info service, mobile advertising,
product location tracking service, locate-a friend service, mobile inventory
management, and patient monitoring service. These services generated great
interest among researchers and developers, primarily due to the presumed
potential for: (1) user empowerment, (2) the estimated market for location based
advertising, (3) and the ability to handle many emergency situations(e.g., airline
flight schedule changes, stock price alerts and quotations, home burglar alarms).
Varshney presented integrated location management architecture to
support the diverse location requirements of m-commerce applications. The
proposed architecture is capable of supporting a range of location accuracies,
wider network coverage, wireless multicast, and infrastructure dependability for
m-commerce applications. Varshney (2005) also identified and discussed several
vehicular mobile commerce applications as well as wireless and networking
challenges. He presented possible solutions for vehicular mobile commerce and
defined several research problems that should be undertaken.
Mobile adverting can also be a very important part of mobile commerce
applications. Using demographic information collected by wireless service
providers and the information on the current location of mobile users, much
targeted advertising can be done. The advertisements sent to a user can also be
location sensitive to inform a user about various on-going specials (shops, malls,
and restaurants) in surrounding areas.
Diffusion of Mobile Commerce Application in the Market
2.2.3 Mobile Transaction Services
The power of mobile commerce is primarily due to the anytime-anywhere
connectivity of wireless devices, which provides enormous opportunities for
business process innovation. Mobile services can also be used to enhance the
efficiency of business processes and reduce transaction costs or improve service
quality.
Mobile financial applications are likely to be one of the most important
components of mobile commerce. These could involve a variety of applications
such as mobile banking and brokerage service, mobile money transfer, and
mobile micro-payment. These services could turn a mobile device into a business
tool, replacing bank, ATM, and credit cards by mobile money. Certainly more
work is needed in providing transaction support in the applications and network
infrastructure. Secure transactions are required before any of these applications
are widely deployed.
Herzberg believed the use of secure and convenient mobile personal
devices could revolutionize the payment, banking, and investment industries
worldwide. He also discussed some of the challenges and opportunities involved
in their use for making secure payments and authorizing banking transactions.
Clayton.et.al presented a classification scheme of m-commerce, examined the
relative strengths and weaknesses of the models, and discussed developing
trends and their implications for mobile commerce in the brokerage industry.
Niina.et.al investigated some mobile financial applications, including both mobile
payments and banking services, showing how the new financial services can be
Diffusion of Mobile Commerce Application in the Market
deployed in mobile networks and identifying the main players in the mobile
financing value chain. They used examples from the European context to highlight
the features of the new services as they explored the players’ particular strengths
and weaknesses in providing the services.
2.2.4 Mobile Interaction Services
Entertainment is an important interactive service that mobile commerce could
provide. It includes mobile games, mobile music, video-on-demand and other
services. The convergence of entertainment, Internet and telecommunication
industries has taken steps towards creating completely new ways to spend time,
so mobile games are revolutionizing entertainment. Mobile games are interactive
in nature and it allows players to experience virtual worlds far more exciting than
everyday life. In Japan the downloadable wireless entertainment is become
extremely popular. It has changed the way people wait for transportation or just
kill time. This development has begun also in western world and China.
Kleijnen.et.al published an interesting study of mobile gaming adoption in
the Netherlands. They applied a series of sophisticated multivariate analyses to
examine mobile gamers’ profiles. Pavlos and Adam investigated customers’
preferences and attitudes towards mobile music services in Europe through an
exploratory research approach. Their findings suggested mobile music providers
should design tailored marketing mix programs towards sufficiently meeting the
needs of customers in the emerging mobile music industry.
Diffusion of Mobile Commerce Application in the Market
Diffusion of Mobile Commerce Application in the Market
CHAPTER 3
PROJECT DESCRIPTION
Our project’s ideal goal is to enable the mobile phone to Vote and hunt for a job
Mobile communication systems of today provide increased availability,
miniaturization and enhanced data rates. This emergence is expected to enhance
the deployment of mobile systems in many services.
3.1 JOB HUNTING
In India all earlier job Hunt the employer and the jobseeker need to depend fully
on the website and text based information display is there. In this voice based job
hunt the job seekers can easily get the information through the landline or mobile
with the help of IVRS based system through voice xml.
3.1.1 Existing System
Job Hunter can get the job information only if they have internet connection or
only through newspaper and its fully text based information system.
3.1.2 Drawbacks of Existing System
If internet is not available say some remote area the job hunters won’t get
the correct information at correct time. So there is a major chance of losing
their interviews.
The job hunter cannot always read all the papers which and displaying all
job related rules.
Diffusion of Mobile Commerce Application in the Market
There are lot web site and newspapers are available so they cannot predict
in which paper or in which website they may get the correct information.
3.1.3 Proposed System
Our system is purely based on voice and it can be transmitted to both mobile and
landline phones. Existing systems were mainly based on text but in the proposed
system the main aim is to deliver the service through speech.
3.1.4 Features of the Proposed System
Nowadays Telecommunication is the basic for all people.
Delivering a job hunt based on IVRS through telecommunication will easily
reach the jobseeker.
3.1.5 Advantages of the Proposed System
The jobseeker can easily get the information only if they have a mobile or
landline.
This increases the number of candidates attending interview so it will be
helpful for the company to get the right candidate.
3.2 MOBILE VOTING
In this Project, Mobile technology-IVR is used for election polling.
3.2.1 Existing System
Voting is done in voting stations where voters cast their votes using electronic
Diffusion of Mobile Commerce Application in the Market
voting device.
3.2.2 Drawbacks of Existing System
Voting station might be far and the voters cannot go there.
Voters will have to stand in long queues to cast their votes.
3.2.3 Proposed System
A Person needs to call a Number authorized by the Election Committee. First the
person will be evaluated asking for the biometric election card number. An
algorithm is implemented for security reasons. Once the person is authorized, he
can continue with the polling process. After that, IVR will play the various parties
contesting in elections. Based on the User inputs, polling will be recorded. User
inputs can either be DTMF or Speech Recognition.
3.2.4 Features of Proposed System
If voters want to vote through Mobile, they have to be registered in
Election Commission or they can register online provided they must have a
unique identification number like pan card number, license number etc.
This means that the voters have already registered their real names and
addresses by presenting their eligible credentials at the time of
subscription.
The mobile users have to dial a designated phone number and follow the
instructions using a password already provided.
Privacy: All votes remain secret while voting takes place and each individual
3.2.5 Advantages of Proposed System
Mobile Voting can be used in cases where it is physically impossible for the
Diffusion of Mobile Commerce Application in the Market
voter to travel to the polling station to vote.
Mobile Voting for persons who are physically disabled or who cannot
come to the polling station for other valid reasons.
1. Blind peoples.
2. Handicapped peoples.
To achieve democracy, Voters need to be properly registered and
authenticated, and then there should be a convenient way for them to cast
their votes, for example, availability of different language choices, special
aid for disabled voters, and proper ways for absentee voting and early
voting.
Voters can also choose not to vote.
3.3 PROGRAM MODULES
3.3.1 Sip Phone
Sip phone is an emulator with the help of which user can call IVRS. Here there is
more than one line. So based on their application which they want to contact, the
customer can call that particular line. In this, emulator is used to receive the user
input in the format of DTMF or Speech and it also delivers the output to the user
in the form of speech.
3.3.2 Call Routing
You may have one or many inbound telephone numbers. Set up a call route to
specify which application to play when a call is placed to a specific telephone
number or DID. You can also define a default application to play when an
Diffusion of Mobile Commerce Application in the Market
unassigned number is dialed. Here in our application we have set the routing by
giving our default local server URL.
3.3.3 Voice Browser
Voice Browser is a web Browser in which the voice xml (VXML) is embedded in
Java Server Pages(JSP) and its is ready to get the user input in the format of
DTMF or Speech mode and it analyze the user input and based on that it will
deliver the output in the format of voice.
Diffusion of Mobile Commerce Application in the Market
CHAPTER 4
SYSTEM SPECIFICATION
4.1 HARDWARE SPECIFICATION
Processor : Pentium IV
Processor Speed : 1.8 GHz
Hard Disk Capacity : 40 GB
Clock Speed : 650 MHz
RAM Capacity : 1GB
4.2 SOFTWARE SPECIFICATION
Operating System : Windows XP
Front End : JSP, VXML, SIP Phone Emulator
Back End : MYSQL SERVER
Diffusion of Mobile Commerce Application in the Market
CHAPTER 5
ARCHITECTURE
5.1 ARCHITECTURE FOR JOB HUNT
The Architecture for job hunt is as per the figure 5.1 shown below.
The customer can call IVRS using a mobile or a Landline phone which
connects to the host IVRS server with the help of PSTN (public switched telephone
network). In the server there will be an option to route more than one call with
the call Router. This helps to run more than one IVRS application simultaneously
in time sharing basis.
Diffusion of Mobile Commerce Application in the Market
Fig 5.1: Architecture for Job Hunt
In the IVRS server, our server program containing jsp and voice xml will be
embedded and it is useful for getting the input from the user as well as delivering
output to the user through sip phone emulator. Our server application will
contact the particular database and it will get all the resources and deliver to the
end user in the form of voice.
5.1.1 Interactive Voice Response System (IVRS)
IVRS is a technology that allows a computer to detect voice and Dual Tone Multi
Frequency signaling (DTMF) keypad inputs. IVR technology is used extensively in
telecommunication, but is also being introduced into automobile systems for
hands-free operation. Current deployment in automobiles revolves around
satellite navigation, audio and mobile phone systems. In telecommunications, IVR
allows customers to access a company’s database via a telephone keypad or by
Diffusion of Mobile Commerce Application in the Market
int i = 1;
String sql = "INSERT INTO votePollJANATADALA (jds) VALUES ('"+i+"')";
int res = st.executeUpdate(sql);
if (res == 1) {
out.println("Records Updated!");
} else {
out.println("Records Added Failed!");
}
connection.close();
}
catch(Exception e) {
out.println(e.toString());
}
%>
<form id="insertJds">
<block>
<prompt>Thank u .your vote has been succesfully polled for the party JDS.</prompt>
</block>
<exit/>
</form>
</vxml
Diffusion of Mobile Commerce Application in the Market
CHAPTER 7
IMPLEMENTATION
7.1 IMPLEMENTATION OF JOB HUNT
7.1.1 Calling IVRS to Get Job Information
The customer can call IVRS using mobile or a Landline phone and this connects to
the host IVRS server with the help of PSTN public switched telephone network).
7.1.2 Getting Information from the Server
In the server itself there will be option to route more than one call with the call
Router option this helps to run more than one IVRS application simultaneously in
time sharing basis. In the IVRS server our server program containing jsp and voice
xml will embedded and it is useful for getting the input from the user as well as
delivering output to the user through sip phone emulator. Our server application
will contact the particular database it will get all the resources and deliver to the
end user in the form of voice.
7.1.3 Delivering the Information to the Job Seeker
If the server finds any job openings related to qualification of the job seeker, the
information is given which contains the details about the company name,
interview location and the interview time.
7.2 DATA FLOW DIAGRAM FOR JOB HUNTING
Job Hunting process is explained using the data flow diagram. It depicts the data
flow between various entities. When the user calls the ivr, he will be prompted to
Diffusion of Mobile Commerce Application in the Market
choose touch tone mode or speech recognition mode.
Once he entered into a mode he will be asked for his Job category with
respect to the mode he chose. Depends on the job category he chooses, the user
will be asked to enter the sub category within the selected job category. For
example, if the user chooses computer science as his job category the he will be
asked to enter his field of interest in the sub categories such as Networking,
testing, development and so on.
Once this information is obtained, the sever will provide the information
about job openings in various companies if the field of interest provided matches
with that present in the server.
Diffusion of Mobile Commerce Application in the Market
Fig.7.1: Data Flow Diagram for Job Hunt
Diffusion of Mobile Commerce Application in the Market
7.3 USE CASE DIAGRAM FOR JOB HUNT
Fig.7.2: Use case diagram for Job Hunt
Diffusion of Mobile Commerce Application in the Market
7.4 IMPLEMENTATION OF MOBILE VOTING
In this section, we outline our mobile voting scheme.
7.4.1 Voters Authentication Phase
In this phase Election commission is responsible to verify the authenticity of the
voters. If the voter is authentic then only he will be allowed to participate in the
next steps of voting.
7.4.2 Voting Phase
In this phase, the voter dial a designated phone number and follow the
instructions using a password already provided.
• The voter selects the appropriate option to vote the particular party.
• The voter checks the signature and retrieves the VS- signed voter, voter ID
• The voter sends the voting token along with voter ID and the public key
correspond to this particular voter ID to AC, these three items keep the
privacy of the voter.
• Upon receiving the encrypted key and the voting token, CS keeps its safe till
counting start as per the predefined schedule.
7.4.3 Counting Phase
Counting Phase At the scheduled time of counting CS decrypts the ballot and
checks whether the voting token is valid or not. If it is valid it will be counted else
it will be rejected. In entire process describe above it is strongly require that
whenever AC is sending data to VS. Sender Identification will not be revealed at
Diffusion of Mobile Commerce Application in the Market
any time. So even if somebody track a ballot can be identified with the particular
AC but not with the particular User and a single AC can have number of users
7.4.4 Security Analysis
In this section, we discuss how and to what extent the security requirements is to
be
Authenticate: only the authorized voters can vote.
First, voters are authenticated through Voter ID, which assures that voters
are who they claim to be.
Second, the eligibility of voters is checked by VS. This prevents voters from
voting more than once.
Privacy: All votes remain secret while the voting takes place and each individual
vote cannot be linked to the voter who casts it. The proposed scheme is divided
into three phases, and they are separated in time. In the voting phase, a signature
is applied to the vote in a way that vote is not linkable with voter and is signed by
the AC without revealing the vote and in the same way it is signed by the VS. In
the next step the communication between voters and CS achieves anonymity with
the help of AC. Hence, for all the components of the voting system, if the Voters
cannot be linked with the vote, the privacy of the voter is protected.
7.5 MOBILE VOTING SPEECH PROCESS
In the below diagram voter authentication process is diagrammatically explained
about how the speech recognition software loads the grammar from the database
and matches it with the user input. The system will prompt the user for his voter
Id and simultaneously loads the grammar from the database to the speech
Diffusion of Mobile Commerce Application in the Market
recognition system. Once the grammar is loaded, the speech recognizer starts to
look for the exact utterance from the user so that it can find a match in the
grammar. Interaction with the users will be handled by voiceXML documents. The
dynamic behavior of the user interaction like loading grammar from the database,
responding user queries based on the user input will be handled by java server
pages.
After it finds voter id match, the system now prompts the user for his
password. If his voter id and password matches then the user will be asked some
security questions to provide voter authentication. Finally he will be allowed to
cast his vote in two different modes via touch tone or speech recognition.
Diffusion of Mobile Commerce Application in the Market
Fig.7.3: Speech Recognition Process in Mobile Voting
7.6 DATA FLOW DIAGRAM FOR VOTE CASTING
Vote casting process is explained using the data flow diagram. It depicts the data
flow between various entities. Once the user is authenticated to cast his vote he
will be prompted to choose touch tone mode or speech recognition mode. Once
he entered into a mode he will be asked for his constituency name or
constituency number with respect to the mode he chose. For example, he has to
know his constituency number if he chooses to vote in touch tone mode.
Depends on the Constituency he chose, the ballot will be generated with
the list of candidates contesting in the constituency and their respective symbols.
The ballot will be generated with the help of information available in the tables
Party Details and Candidate Details. He can vote for the candidate by saying the
symbol of the candidate or saying the candidate number. The system will check
his vote validity like duplicate votes and illegal votes before accepting his vote. If
the system finds anything wrong with his validation of vote, his vote will be
rejected.
Diffusion of Mobile Commerce Application in the Market
Cast Vote
Prompt User For DTMF or Voice Input Mode
Recognize Touch Tone
Input
Recognize Voice Input
Generate Ballot to
Cast VoteValidate User
Vote
Party_Details
Constituency_Details
Voice InputDTMF Input
SuccessfulValidation
Unsuccessful Validation
Check Election ID
Reject Vote
No Match
MatchElection_Details
End User Session
Accept VoteCasting
Fig.7.4: Data Flow Diagram for Vote Casting
7.7 USE CASE DIAGRAM FOR VOTER LOGIN
Use case diagram captures the user interaction with the system. The diagram
depicts the system overview of how the user interacts with the system and
external entities, the system have to depend upon. When the user enters the
system he will be asked whether he wants to vote or know results. Once the user
selects his choice he will be directed accordingly.
Diffusion of Mobile Commerce Application in the Market
If the user chooses to vote he has to go through various processes like
voter authentication and vote validation as explained in the above diagram. The
system restricts the user from casting his vote second time for a particular
election and also do not accept illegal votes like forcing someone to cast his vote
against their wish.
If the user chooses result he will be asked to select overall result or
constituency wise results. Selecting overall result notifies the user about the
winner of the current election and his margin of victory with respect to other
parties. If he chooses Constituency wise result he has to provide the system with
constituency name. The system notifies the user with the winner of the
constituency, total votes secured and his margin of victory with respect to other
candidate.
Diffusion of Mobile Commerce Application in the Market
Generate Reports
Vote Counting
Voting SystemVote Validation
Mobile Cl ient
Voter Registration
VoiceXml Application
Cast Vote
User Authentication
<<include>>
Fi
g.7.5: Use Case Diagram for Voter Login
Diffusion of Mobile Commerce Application in the Market
CHAPTER 8
TESTING
8.1 TESTING OF MOBILE SYSTEM
The software, which has been developed, has to be tested to prove its validity.
Testing is considered to be the least creative phase of the whole cycle of system
design. In the real sense it is the phase, which helps to bring out the creativity of
the other phases, and makes it shine. The “Mobile System” was tested along the
following guidelines to prove its validity. It was tested using the following two
techniques of software testing.
8.1.1 White Box Testing
By using this technique it was tested that all the individual logical paths
were executed at least once.
All the logical decisions were tested on both their true and false sides.
All the loops were tested with data in between the ranges and especially at
the boundary values.
8.1.2 Black Box Testing
By the use of this technique the missing functions were identified and
placed in their positions.
The errors in the interfaces were identified and corrected.
This technique was also used to identify the initialization and termination
errors and correct th
Diffusion of Mobile Commerce Application in the Market
CHAPTER 9
SNAPSHOTS
9.1 Snapshots of Job Hunt
Fig 9.1 : Voxeo SIP Soft phone
Diffusion of Mobile Commerce Application in the Market
Fig 9.2 :Call Routing for Job Hunt
Diffusion of Mobile Commerce Application in the Market
9.2 Snapshots of Mobile Voting
Fig 9.3 : Voxeo SIP Soft phone
Diffusion of Mobile Commerce Application in the Market
Fig 9.4: Directory Listing for Mobile Voting
Diffusion of Mobile Commerce Application in the Market
Fig
9.5 : Call Routing for Mobile Voting
Diffusion of Mobile Commerce Application in the Market
CHAPTER 10
PERFORMANCE ANALYSIS
10.1 BUILDING THE HOUSE OF QUALITY MODEL OF MOBILE COMMERCE TO IMPROVE PERFORMANCE
In the Fig., Ii (where i=1…n, n is the number of the number of quality
requirements) is the degree of importance for customer quality requirements ith.
Ii can be assigned from1 meaning the least importance to 5 meaning the most
importance. Rij is the ratings of the relationship between quality requirements ith
and technical requirements jth, it can be assigned 0, 1, 3 or 5, 0 represents no
relationship between them, 1 represents weak relationship, 3 represents medium
relationship, and 5 represents strong relationship. Xj (where j=1…m, m is the
number of the number of technical requirements) is the technical importance
rating for technical requirements jth. It’s given by the weighted column sum of
each quality requirement by the quantified relationship values of technical
requirements ith. Consequently, Xj can be calculated by the flowing formulation.
According to the value of Xj, we can distinguish the priority of technical
requirements, so that we can develop a more robust service system of mobile
commerce, to reduce or eliminate the service quality gaps, and assure the service
quality in mobile commerce. Figure 10.1 . QFD calculation of compositor’s .
Diffusion of Mobile Commerce Application in the Market
TABLE 10.1: QFD CALCULATION OF COMPOSITORS
Diffusion of Mobile Commerce Application in the Market
Diffusion of Mobile Commerce Application in the Market
10.2 PERFORMANCE ANALYSIS OF MOBILE VOTING
We have analyzed the percentage of voting in the past 3 years in Bangalore.
aised to 55% and in 2010 it reduced to 45%. By using mobile for voting we can
increase the percentage of voting to 65%.
The expected increase in voting is calculated due to the various advantages of our
proposed system such as-
Voters do not have to wait in long queues.
Handicapped people who cannot go the voting stations
can vote conveniently
Diffusion of Mobile Commerce Application in the Market
Percentage
70%
60%
50%
40%
30%
20%
10%
Year
2008 2009 2010 expected
Fig 10.1: Statistics of Voting
Diffusion of Mobile Commerce Application in the Market
CHAPTER 11
FUTURE ENHANCEMENTS
As a measure of security features mobile devices allows the user to make use of
biometric information’s which are unique to individuals. For example voice
biometrics can be used with voiceXML to authenticate a user. Similarly finger
prints can also be used with mobiles that provide those options. Scalability is
another important feature to be addressed.
Future enhancements for mobile commerce can be done in the following
systems. This improves the service quality in the below systems.
11.1 WIRELESS USER EQUIPMENT AND SYSTEMS
Today’s communication-centric and computing-centric devices are becoming a
single intelligent wireless device. The future user wireless devices, dubbed as
universal wireless handheld devices, will have numerous functionalities, all aiming
to establish communications, enhance education, furnish entertainment, provide
information, and conduct
transactions for mobile users. Few of the device features are already available in
handheld devices, but many of them, yet to be incorporated, will need to increase
the device size, weight, complexity, power, memory, and processing
Diffusion of Mobile Commerce Application in the Market
requirements. To this end, engineering design trade-offs will be required to form
the right balance between devices’ capabilities and their constraints.
With low-power requirements and long-lasting batteries, the universal
wireless handheld devices will be small, low cost, light-weight, easy-to-use, and
IC-card-reader equipped. They can be attached to desk-/lap-top computers and
their peripherals, including keyboards, printers, scanners, loud speakers, and fax
machines. They will have high-resolution color screens to present pin-point
information, thus minimizing the burden on users’ attention. The wireless devices
and networks will employ intrusion detection systems to detect cracking attempts
in real time and to take effective protective measures based on the information it
has. These devices include anti-virus software to handle malicious code and to
support for authenticating users, servers, and applications.
11.2 RADIO FREQUENCY IDENTIFICATION (RFID)
RFID is a generic term for technologies that use radio waves to automatically
identify individual items or some of their attributes. RFID possesses several
benefits over bar codes. First, it does not need to meet line-of-sight requirements
as long as the RFID tags are within the range of a reader. Second, quite many
number of RFID tags can be read simultaneously. Third, every unique item can
have its own RFID tags. The mobile consumer will use RFID readers in their mobile
phones to scan RFID tags, say in the packaging of products on store shelves, to
pay for tolls and access fees, to purchase at vending machines and points of sales,
to access secure rooms, buildings, and other partitioned areas, and to control
home and office appliances.
Diffusion of Mobile Commerce Application in the Market
With RFID, a scanner can read the encoded information even when the tag
is concealed. For example, it may be embedded in a product’s casing, or sewn into
an item of clothing, or sandwiched between a banknote’s layered paper. The
stealthy nature of RFID technology has raised concerns among privacy advocates
that RFID tags could be tracked beyond their intended use. For example, security
agencies might use them to covertly monitor individuals or their belongings.
Lower frequencies (LF and MF) usually are cheaper, use less power, are better
able to penetrate non-metallic substances, and are ideal for scanning objects with
high-water content.
On the other hand, higher frequencies (HF and UHF) typically offer a better
range and can transfer data faster; they tend to be more directed and, thus,
require a clearer path. Active tags can have a farther read range than passive tags,
but passive tags are less expensive and require no maintenance. RFID will play a
critical role in emerging wireless access and monitoring applications, especially in
today’s security-aware era.
11.3 LOCATION DETERMINATION
Location determination is seen to be an indispensable feature for mobile
commerce. Network-based positioning is carried out by terrestrial systems
through various techniques,
such as cell of origin, time of arrival, angle of arrival, and enhanced observed time
difference. The device-based positioning is carried out by satellite systems
typically using
Diffusion of Mobile Commerce Application in the Market
three or four MEO satellites, also known as GPS. However, a hybrid approach
delivering the accuracy of device-centric option, while avoiding a line-of-sight
requirement as well as increased cost, size, and power consumption, is also used.
Though FCC does not require the mobile network operators to use a specific
technology, it has indicated specific performance metrics for location-enabled
technology. For network-based technology, location information accuracy is
required to be within 100 meters 67% of the time and within 300 meters 95% of
the time . But for the device-centric technology, these distances must be halved.
In view of possible launches of LEO satellites and the significant increase in the
processing capabilities of the wireless devices, as well as the fact that the cell
sizes are shrinking from macro to micro to pico, the location-based technologies
are expected to become more accurate and less costly in the future
11.4 SOFTWARE DEFINED RADIO (SDR)
SDR enables reconfigurable system architectures for wireless networks and user
devices. To provide users with m-commerce services under an array of
heterogeneous networks, certain design problems (such as limitations in device
size, cost, power consumption, and backward compatibilities to systems) must all
be overcome. The most viable way of implementing these types of wireless
devices is to adopt a software radio approach. The received analog signal is
processed by a reprogrammable baseband digital signal processor in accordance
with the wireless environment. However, certain problems then need to be
addressed—such as an analog radio interface with multiple antennas and
amplifiers and very fast high-speed analog-to digital conversions and DSP
functions—which can all, in turn, add to the circuit complexity and high-power
Diffusion of Mobile Commerce Application in the Market
consumption and dissipation. SDR can provide the user with a single piece of
scalable hardware that is at once compatible
at a global scale
11.5 ADAPTIVE MODULATION AND CODING (AMC)
AMC is one of the most viable and effective means to dynamically combat
wireless channel degradation and meet performance requirements. In AMC, for
the same symbol rate (i.e., occupied bandwidth), the signal power, the
modulation technique, the information rate, and the channel-coding rate, can all
be adjusted in accordance with instantaneous variations in channel conditions
(such as multi-path and proximity to the base station) and quality of service
requirements. Forward-error correcting (FEC) codes (whose rates may range from
1/2 to 5/6) and digital modulation techniques (ranging from QPSK to 64 QAM) will
be dynamically adapted for every single 5 individual, giving rise to up to a six-fold
spectral efficiency (bits per second per Hz)
11.6 DIGITAL SIGNAL COMPRESSION
Digital signal compression also known as source coding, is employed to reduce
the bit rate requirements (bandwidth demands). It is widely applied to all sources
of modality. Both proprietary and standard techniques are widely available and
are constantly being improved upon. Texts, software, and faxes generally employ
lossless compression techniques, such
as the Lempel-Ziv and Huffman codes. On the other hand, MPEG video, JPEG
image, and MP3 audio coding standards employ lossy compression, where known
limitations of the human visual and audio systems are exploited to introduce
losses but in a controlled manner. With advances in compression, a wider array of
Diffusion of Mobile Commerce Application in the Market
feature-rich m-commerce applications and/or lower service costs can be
provided.
11.7 BIOMETRICS
Biometrics as an essential security measure will play an imperative role in the
next-generation m-commerce services. Traditionally, most security systems
authenticate the user
based on something that he/she knows, such as a password. However, where
security really matters, it makes sense to add a second layer, which could be
something that he/she has (e.g., a smartcard). Also, as a third option, and
probably the most authentic method, could be something that he/she is,
something that, at least theoretically, would be virtually impossible to forge.
Biometric control measuring physical characteristics and behavioral patterns will
be widely employed to allow the user to access his/her own wireless device, to
enable the user to access certain places, and to allow the user to monitor assets.
Of course, depending on
their effectiveness, cost, intrusiveness, and accuracy, more than one biometric
controls may be simultaneously employed. Biometric control may include finger
imaging, palm print, hand geometry, iris and retina vascular pattern, facial
recognition and thermography, signature and
handwriting, key stroke dynamics, and voice recognition and speech pattern
Diffusion of Mobile Commerce Application in the Market
CHAPTER 12
CONCLUSION
The project consists of two applications: Job Hunt and Mobile Voting.
Regarding job hunt, m-commerce has attracted the attention of both practitioners
and academics. Research activities on m-commerce have increased significantly.
Here we have attempted to provide a general picture of the main characteristics
of mobile commerce application in the market. Through review the research
literatures of m-commerce, we can find that current research is heavily skewed
toward consumer issues. It seems that the most popular m-commerce application
is that supporting financial activities. Mobile banking and payments are issues
that have been widely discussed by researchers.
On the aspect of methodology, the existing body of research on mobile
business has a disproportionately high level of secondary research studies. So
there should be an increase of empirically-based studies (surveys, interviews,
experiments, action research, ethnography, and so on) as well as simulation. In
addition to the above conclusions, we would like to offer the following
suggestions for further research in mobile commerce applications: Firstly, Mobile
commerce researchers should begin to focus their efforts more carefully.
Diffusion of Mobile Commerce Application in the Market
Among the applications, m-commerce entertainment services and games
have a great deal of market potential and will dominate global m-commerce
revenues in the future. Additional research is required in other related areas such
as mobile education, mobile supply chain management, and so forth.
Secondly, since the bright prospect for mobile commerce, many industries
have sought to join this arena. The mobile commerce value chain is thus formed,
and new business opportunities are created for the participants. Among the
participants, telecommunication operators are the most critical and dominant. So
it is necessary to exploit a game-theoretic approach of based on mobile
commerce value chain for analyzing relation between the participants.
Lastly, as application of RFID technology grows, they are bound to offer
new opportunities in the future. Therefore, the combination of RFID and mobile
commerce, which can be called mobile RFID, becomes a new focus of future
business. An important research that should be pursued is suitable models for the
adoption of RFID in organizations, and the RFID’s impact on supply chains.
The major limitations of m-commerce, as viewed today, are small screens
on wireless devices, limited processing power, modest memory, restricted power
consumption, poor voice quality, low-speed data transmission, non-ubiquitous
coverage, unproven security, scarce bandwidth, and possible health hazards.
Diffusion of Mobile Commerce Application in the Market
In case of mobile voting, the system allows the user to cast his vote with
high level of confidentiality and keep voters away from the possible threats like
booth capturing and it may increase the voter turnouts in remote areas and even
in urban areas. People, who are uncomfortable to wait in queues, like physically
challenged persons, can use this alternative solution. Since the system operates
on IVR platform the voter session will be interactive and user friendly which
makes the user to feel in a very comfortable zone. The system provides security
features like checking the unique identification number of the voter.
Diffusion of Mobile Commerce Application in the Market
BIBILIOGRAPHY
[1] S.J. Barnes, The mobile commerce value chain: analysis and future developments, International Journal of Information Management 22 (2) (2002) 91– 108.
[2] I. Clarke III, Emerging value propositions for m commerce, Journal of Business Strategies 18 (2) (2001) 133–148.
[3] Ting-Peng Liang, Chih-Ping Wei, Introduction to the Special Issue: Mobile Commerce Applications, International Journal of Electronic Commerce, Vol. 8, No. 3(2004), 7–17.
[4] Senn, J.A.. The emergence of m-commerce, Computer, 33(12) (2000),148-150.
[5] Varshney, U., &Vetter, R.. Mobile commerce: Framework, applications and networking support., Mobile Networks and Applications, 7(3) (2002), 185-198.
[6] Yuan, Y., Zhang, J.J., Towards an appropriate business model for m-commerce, International Journal of Mobile Communications, 1(1/2) (2003), 35-56.
[7] Nysveen, H., P.E. Pedersen, and H. Thorbjornsen, Intentions to Use Mobile Services: Antecedents and Cross Service Comparisons, Journal of the Academy of Marketing Science, 33(3)(2005), 330 346.
Diffusion of Mobile Commerce Application in the Market
[8] Gordon Xu, Jairo A. Gutiérrez, An Exploratory Study of Killer Applications and Critical Success Factors in Mcommerce, Journal of Electronic commerce in Organizations, 4(3)(2006), 63-79.
[9] Dongsong Zhang, Delivery of Personalized and Adaptive Content to Mobile Devices: A Framework and Enabling Technology, Communications of the AIS , 12(2003),183-202.
[10] Karlene Cousins, Upkar Varshney, A product location framework for mobile commerce environment, Proceedings of the 1st international workshop on Mobile commerce, July 2001, Rome, Italy, 43-48.
[11] U. Varshney, Location management for mobile commerce applications in wireless Internet environment, ACM Transactions on Internet Technology, 3 (3) (2003),
236– 255.
[12] U. Varshney, Vehicular Mobile Commerce: Applications, Challenges, and Research Problems, Communications of the Association for Information Systems,16 (2005), 329-339.
[13] A. Herzberg, Payments and banking with mobile personal devices, Communications of the ACM 46 (5) (2003) 53– 58.
[14] Clayton A. Looney, Leonard M. Jessup, and Joseph S. Valacich, Emerging Business Models for Mobile Brokerage Services, Communications of the ACM, 47(6)(2004), 71-77.
Diffusion of Mobile Commerce Application in the Market
[15] Niina Mallat, Matti Rossi, and Virpi Kristiina Tuunainen, Communication of the ACM May 47(5)(2004), 42-46.
[16] Kleijnen, M.H.P., K. de Ruyter, and M.G.M. Wetzels, “Consumer Adoption of Wireless Services: Discovering the rules, While Playing the Game”, Journal of Interactive
Marketing, 18(2)(2004), 51-61.
[17] Pavlos Vlachos, Adam Vrechopoulos, ICEC'04, Sixth International Conference on Electronic Commerce. New York:ACM.2004: 566-574.