(PDF) Advances in Mobile Commerce Technologies - · PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (2024)

(PDF) Advances in Mobile Commerce Technologies - · PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (1)

Advances in Mobile Commerce Technologies

byEe-Peng LimandKeng Siau (eds) ISBN:159140052x

Idea Group Publishing © 2003 (337 pages)

This text serves as an introduction to mobile commerce with emphasis on both theory andapplication; it stresses that to tap the potential of mobile commerce, application, service, contentand technology providers have to work together.

Table of Contents

Advances in Mobile Commerce Technologies

Preface

Part I - Overview of Mobile Commerce

Chapter 1 - Mobile Commerce: Current States and Future Trends

Part II - Technology Issues in Mobile Commerce

Chapter 2 - Mobile E-Commerce on Mobile Phones

Chapter 3 - Transactional Database Accesses for M-Commerce Clients

Chapter 4 -Techniques to Facilitate Information Exchange in MobileCommerce

Chapter 5 - Digital Rights Management for Mobile Multimedia

Chapter 6 -Predicate Based Caching for Large Scale Mobile Distributed On-Line Applications

Part III - Information System and Application Issues in Mobile Commerce

Chapter 7 -Modeling Static Aspects of Mobile Electronic CommerceEnvironments

Chapter 8 -Known by the Network: The Emergence of Location-Based MobileCommerce

Chapter 9 -Usable M-Commerce Systems: The Need for Model-BasedApproaches

Chapter 10 -Managing the Interactions between Handheld Devices, MobileApplications, and Users

Chapter 11 - Mobile Commerce and Usability

Chapter 12 -Using Continuous Voice Activation Applications in Telemedicine toTransform Mobile Commerce

Chapter 13 -Mobile Applications for Adaptive Supply Chains: A LandscapeAnalysis

Index

List of Figures

List of Tables

List of Examples, Definitions and Algorithms

Advances in Mobile Commerce Technologies

byEe-Peng LimandKeng Siau (eds) ISBN:159140052x

Idea Group Publishing © 2003 (337 pages)

This text serves as an introduction to mobile commerce with emphasis on both theory andapplication; it stresses that to tap the potential of mobile commerce, application, service, contentand technology providers have to work together.

Table of Contents

Advances in Mobile Commerce Technologies

Preface

Part I - Overview of Mobile Commerce

Chapter 1 - Mobile Commerce: Current States and Future Trends

Part II - Technology Issues in Mobile Commerce

Chapter 2 - Mobile E-Commerce on Mobile Phones

Chapter 3 - Transactional Database Accesses for M-Commerce Clients

Chapter 4 -Techniques to Facilitate Information Exchange in MobileCommerce

Chapter 5 - Digital Rights Management for Mobile Multimedia

Chapter 6 -Predicate Based Caching for Large Scale Mobile Distributed On-Line Applications

Part III - Information System and Application Issues in Mobile Commerce

Chapter 7 -Modeling Static Aspects of Mobile Electronic CommerceEnvironments

Chapter 8 -Known by the Network: The Emergence of Location-Based MobileCommerce

Chapter 9 -Usable M-Commerce Systems: The Need for Model-BasedApproaches

Chapter 10 -Managing the Interactions between Handheld Devices, MobileApplications, and Users

Chapter 11 - Mobile Commerce and Usability

Chapter 12 -Using Continuous Voice Activation Applications in Telemedicine toTransform Mobile Commerce

Chapter 13 -Mobile Applications for Adaptive Supply Chains: A LandscapeAnalysis

Index

List of Figures

List of Tables

List of Examples, Definitions and Algorithms

(PDF) Advances in Mobile Commerce Technologies - · PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (2)

Back Cover

As the number of mobile device users increases rapidly and exceeds that of PC users by a large margin, conductingbusiness and services over these mobile devices, also known as mobile commerce is becoming very attractive and isexpected to drive the future development of electronic commerce. To tap the potential of mobile commerce,application providers, service providers, content providers, and technology providers have to work together to realizethe future mobile commerce applications. In the process of conceptualizing and developing these applications, theyhave to be cognizant of the latest development in mobile commerce technology. Advances in Mobile CommerceTechnologies serves as an introduction to mobile commerce with emphasis on both theory and application.

About the Editors

Ee-Peng Lim is an associate professor in the School of Computer Engineering, Nanyang Technological University(NTU), Singapore. He received his Ph.D. degree in computer science from the University of Minnesota, Minneapolis, in1994. His research interests include Web warehousing, electronic commerce, database integration and digitallibraries. He has published more than 100 refereed journal and conference articles. He has also chaired severalconferences and workshops, including the Fifth International Conference on Asian Digital Libraries (ICADL 2002) andthe ACM Workshop on Web Information and Data Management (WIDM 2001 and 2002). He has served in theprogram committee of numerous international conferences. Dr. Lim is currently the director of the Centre forAdvanced Information Systems at NTU. He is a senior member of IEEE and a member of ACM.

Keng Siau is an associate professor of management information systems (MIS) at the University of Nebraska, Lincoln(UNL). He received his Ph.D. degree from the University of British Columbia (UBC) where he majored in managementinformation systems and minored in cognitive psychology. He has published more than 40 refereed journal articles,and these articles have appeared in journals such as Management Information Systems Quarterly, Communicationsof the ACM, IEEE Computer, Information Systems, ACM’s Data Base, Journal of Database Management, Journal ofInformation Technology, International Journal of Human-Computer Studies, Transactions on Information andSystems, Quarterly Journal of E-commerce, and many others. In addition, he has published over 60 refereedconference papers in proceedings such as ICIS, ECIS, WITS, and HICSS. He served as the organizing and programchairs for the International Workshop on Evaluation of Modeling Methods in Systems Analysis and Design (EMMSAD)(1996–2002).

(PDF) Advances in Mobile Commerce Technologies - · PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (3)

Advances in Mobile Commerce TechnologiesEe-Peng Lim Nanyang Technological University,Singapore

Keng Siau University of Nebraska-Lincoln,USA

IDEA GROUP PUBLISHINGHershey * London * Melbourne * Singapore * Beijing

Acquisition Editor: Mehdi Khosrow-Pour

Senior Managing Editor: Jan Travers

Managing Editor: Amanda Appicello

Development Editor: Michele Rossi

Copy Editor: Amy Bingham

Typesetter: Amanda Lutz

Cover Design: Weston Pritts

Printed at: Integrated Book Technology

Published in the United States of America by

Idea Group Publishing (an imprint of Idea Group Inc.)701 E. Chocolate Avenue, Suite 200Hershey PA 17033Tel: 717-533-8845Fax: 717-533-8661E-mail: <[emailprotected]>Web site: http://www.idea-group.com

and in the United Kingdom by

Idea Group Publishing (an imprint of Idea Group Inc.)3 Henrietta StreetCovent GardenLondon WC2E 8LUTel: 44 20 7240 0856Fax: 44 20 7379 3313Web site: http://www.eurospan.co.uk

Copyright © 2003 by Idea Group Inc.

ISBN:159140052x

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (4)

All rights reserved. No part of this book may be reproduced in any form or by any means, electronic ormechanical, including photocopying, without written permission from the publisher.

Library of Congress Cataloging-in-Publication Data

eISBN

British Cataloguing in Publication Data

A Cataloguing in Publication record for this book is available from the British Library.

About the Authors

Ee-Peng Lim is an associate professor in the School of Computer Engineering, Nanyang TechnologicalUniversity (NTU), Singapore. He received his Ph.D. degree in computer science from the University ofMinnesota, Minneapolis, in 1994. His research interests include Web warehousing, electronic commerce,database integration and digital libraries. He has published more than 100 refereed journal and conferencearticles. He has also chaired several conferences and workshops, including the Fifth International Conferenceon Asian Digital Libraries (ICADL 2002) and the ACM Workshop on Web Information and Data Management(WIDM 2001 and 2002). He has served in the program committee of numerous international conferences. Dr.Lim is currently the director of the Centre for Advanced Information Systems at NTU. He is a senior member ofIEEE and a member of ACM.

Keng Siau is an associate professor of management information systems (MIS) at the University of Nebraska,Lincoln (UNL). He received his Ph.D. degree from the University of British Columbia (UBC) where he majoredin management information systems and minored in cognitive psychology. He has published more than 40refereed journal articles, and these articles have appeared in journals such as Management InformationSystems Quarterly, Communications of the ACM, IEEE Computer, Information Systems, ACM's Data Base,Journal of Database Management, Journal of Information Technology, International Journal of Human-Computer Studies, Transactions on Information and Systems, Quarterly Journal of E-Commerce, and manyothers. In addition, he has published over 60 refereed conference papers in proceedings such as ICIS, ECIS,WITS, and HICSS. He served as the organizing and program chairs for the International Workshop onEvaluation of Modeling Methods in Systems Analysis and Design (EMMSAD) (1996-2002). For moreinformation about him, please refer to his personal website at http://www.ait.unl.edu/siau/.

Maristella Agosti is a professor of computer science in the Department of Electronics and Computer Scienceand faculty of Humanities, University of Padua, Italy. She is the leader of a research group in the departmentfocusing on database systems, digital libraries, and information retrieval research. Her research areas ofinterest include design and implementation of digital libraries applications; distributed multichannel access toinformation and data stored in digital libraries of distributed collections of semi-structured text and multimediadigital documents; information retrieval on the Web; and multilingual information retrieval. She has publishedmore than 100 refereed articles on journals and conference proceedings and authored or coauthored booksand journal issues on hypertext and information retrieval, database design, and automatic construction ofhypertexts. She is a coordinator of research activities in the context of national and European researchprojects. She served as the Program Chair for the 6th European Conference on Digital Libraries-ECDL 2002,Rome, and the director of First DELOS International Summer School on Digital Library Technologies-ISDL2001, Pisa. She also served as the program committee member of several international conferences, includingACM-SIGIR, CIKM, and ACM-DL. She is a member of the editorial board of Information Processing &Management, the subject area editor for Hypermedia of Information Retrieval. She is also a member of IEEE-CS and ACM.

Stuart J. Barnes is associate professor of electronic commerce at the School of Information Management,Victoria University of Wellington, New Zealand. He has been teaching and researching in the informationsystems field for over a decade. His academic background includes a first-class degree in economics from

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (5)

University College London and a Ph.D. in business administration from Manchester Business School. Hiscurrent research interests include evaluating Website and e-commerce quality, e-commerce strategy,information systems implementation, knowledge management systems, and business applications of wirelessinformation technologies. He has published and presented more than forty articles in leading conferences,academic journals, professional outlets, and edited books. He has published three books: E-Commerce and V-Business in 2001, a bestseller for Butterworth Heinemann, Knowledge Management Systems in 2002, and M-Business in 2003. Recently, consulting assignments have included those for the UK Inland Revenue, UKCustoms and Excise and the OECD.

Peter Bertok received his master's of engineering degree from the Technical University of Budapest,Hungary, and his Ph.D. from the University of Tokyo, Japan. Peter has worked in the area of computing andautomation as a senior researcher and a senior software developer. Recently, he has been teachingComputer Science at the Royal Melbourne Institute of Technology. His research interests include distributedand networked systems and mobile computing. Peter is a member of IEEE, ACM and IFIP.

Petter Bae Brandtzæg received a master's degree in work and organizational psychology at the NorwegianUniversity of Technical Science, Trondheim, Norway in 2000. He is currently working at the Institute ofTelecom and Informatics, SINTEF, Oslo, Norway. His research interests are concerned with human-computerinteraction.

Aslihan Celik is an assistant professor of the operations & management information systems in the LeaveySchool of Business and Administration at Santa Clara University. She received the B.S. and M.S. degrees inindustrial engineering from Bilkent University, Ankara, Turkey, in 1992 and 1994, respectively. She laterreceived her Ph.D. in management information systems from the University of Arizona. Her research interestsinclude designing and testing wireless protocols for data and Web page delivery. She has published in theACM Transactions on Database Systems and various conferences.

Susy S. Chan is an associate professor and the director of the Center for E-Commerce Research in theSchool of Computer Science, Telecommunications and Information Systems at DePaul University. Herresearch focuses on e-business strategies, e-commerce and IS curriculum, and usability of m-commerce.

Anindya Datta is the CEO and founder of a venture-backed software company called Chutney Technologiesand is regarded as an industry authority on Web infrastructure issues. Chutney is defining and leading anemerging category of solutions called Web Application Optimization, which allows enterprise Web applicationsto scale to support significantly higher user loads and to deliver faster performance and QoS levels. As arenowned "thought leader," Anindya is frequently invited to speak at industry events. Recently, he deliveredpresentations at Supercomm 2001, Networld+Interop Fall 2001, and the SunTrust Internet AccelerationConference. Prior to founding Chutney, Anindya built extensive experience leading teams in the developmentand implementation of large-scale database systems, including a large commercial project for the USDA. Hehas served as a consultant for AT&T, US West, IBM and the Israeli government in the fields of datawarehousing, data mining and e-commerce. A substantial contributor to several innovations, Anindya holdsnumerous patents for a variety of data management and Internet technologies. One of his most recentcontributions was in developing technologies similar to those incorporated by IBM in the DB2 product for theAS/400 platform. He has also worked on broadcast technologies for mobile users and the access security ofsubscription-based broadcast information services. In addition to his leadership of Chutney, Anindya is anassociate professor at the Georgia Institute of Technology and founder of the iXL Center for ElectronicCommerce. Previously, he was an assistant professor at the University of Arizona, after finishing his doctoralstudies at the University of Maryland, College Park. Anindya's undergraduate education was completed at theIndian Institute of Technology, Kharagpur. His primary research interests lie in studying technologies that havethe potential to significantly impact the automated processing of organizational information. Examples of suchtechnologies include electronic commerce, data warehousing/OLAP, and workflow systems. He has publishedover 50 papers in prestigious refereed journals such as ACM Transactions on Database Systems, IEEETransactions on Knowledge and Data Engineering, INFORMS Journal of Computing, and the VLDB Journal,

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (6)

and in reputed conferences such as ACM SIGMOD, and VLDB. He has also chaired as well as served on theprogram committees of reputed international conferences and workshops.

Do van Thanh obtained his MSc in electronic and computer sciences from the Norwegian University ofScience and Technology in 1984 and his Ph.D. in informatics from the University of Oslo in 1997. In 1991 hejoined Ericsson R&D Department in Oslo after 7 years of R&D at Norsk Data, a minicomputer manufacturer inOslo. In 2000 he joined Telenor R&D and is now in charge of PANDA (Personal Area Network & DataApplications) research activities with a focus on SIP, XML and next generation mobile applications. He holdsalso a professor position at the Institutt for Telematikk at the Norwegian University of Science and Technologyin Trondheim. He is the author of numerous publications and an inventor of a dozen patents.

Xiaowen Fang is an assistant professor in the School of Computer Science, Telecommunications andInformation Systems at DePaul University. He is the associate director for the Center for E-CommerceResearch. His research focuses on user-centered design of Web search tools, usability of e-business, andusability of mobile commerce.

Nicola Ferro has been a Ph.D. student in computer science in the Department of Electronics and ComputerScience at the University of Padua, Italy since January 2002. He received the Laurea degree inTelecommunications Engineering at the University of Padua in April 2001 with a thesis focused on onlineinformation access through handheld devices. His main research interests are the design and implementationof applications for searching and retrieving documents through mobile clients; examples of such applicationsare digital libraries and search engines.

Pavan Gundepudi is a senior research analyst at e-Business Strategies. He specializes in using economicand mathematical modeling to address management problems. Pavan is completing a Ph.D. in businessadministration at the University of Rochester. With background in process control, management science, andoperations management, Pavan is part of the research group on Next Generation Supply Chains. He is amember of INFORMS.

Jan Heim received a Ph.D. degree from University of Trondheim in 1982. From 1971 to 1985, he was anassistant professor at the Department of Psychology, University of Trondheim. After that he joined theNorwegian Computing Center as a research scientist. In 1992, he joined SINTEF. He is now the seniorresearch scientist with SINTEF. His main fields of research are cognitive psychology and human-computerinteraction, evaluation and design of user interfaces. He has a special interest in individual prerequisites forthe use of complex software, user interfaces and usability methods for elderly and disabled, fitness-for-purpose of communication technology, and user interface and experience of interactive TV.

Ravi Kalakota is cofounder and CEO of e-Business Strategies, a technology research and consulting practicebased in Atlanta, Georgia. His current research and consulting focuses on multichannel e-business, mobilebusiness strategies, brick-and-click process models, and design of e-service platforms. Ravi holds thedistinction of coauthoring several bestselling books on e-commerce, e-business and now m-business. His newbook M-business: The Race to Mobility (McGraw-Hill, 2001), coauthored with Marcia Robinson, looks at theevolution of enterprise applications into the mobile economy. Ravi received a Ph.D. in e-commerce from theUniversity of Texas at Austin.

John Krogstie has a Ph.D. (1995) and a M.Sc. (1991) in information systems, both from the University ofTrondheim (NTNU). He is currently a senior research scientist at SINTEF and a group leader for the Group forCooperative Information Systems. He is also a (part-time) professor at NTNU. He was employed as amanager in Accenture 1991-2000. John Krogstie is the Norwegian Representative for IFIP TC8 and a memberof IFIP WG 8.1, where he is the initiator and leader of the task group for Mobile Information Systems. He haspublished approximately 40 refereed papers in journals, books and archival proceedings since 1991.

Sai Ho Kwok received a BEng (Hons) in electronic and communications engineering (1992) from theUniversity of North London. He received his Diploma of Imperial College (DIC) (1997) from the Imperial

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (7)

College of Science, Technology and Medicine, and his Ph.D. in digital image processing (1997) from theUniversity of London. He is currently assistant professor of the Department of Information and SystemsManagement at the Hong Kong University of Science and Technology (HKUST). He was visiting scholar and aresearch assistant in the Department of Electronic and Information Engineering at the Hong Kong PolytechnicUniversity (1994-1995). His research interests include digital watermarking, digital rights management,copyright and intellectual property protection, knowledge management, and electronic commerce applications.

Hong Va Leong received his Ph.D. from the University of California at Santa Barbara and is currently anassociate professor at the Hong Kong Polytechnic University. He has served on the program committees andorganization committees for many international conferences. He has also served as the program co-chair ofseveral international conferences and is a reviewer for a number of international journals, including ACMTransactions, IEEE Transactions, and Information Systems. His research interests mainly lie in mobilecomputing, internet computing, distributed systems, distributed databases, and digital libraries. He is amember of the ACM and IEEE Computer Society.

Andreas L. Opdahl is professor of information science in the Department of Information Science at theUniversity of Bergen in Norway. He received his Ph.D. from the Norwegian University of Science andTechnology in 1992. He is the author, coauthor or coeditor of more than thirty journal articles, book chapters,refereed archival conference papers and books within multi-perspective enterprise modelling, object-orientedmodelling, requirements engineering, software performance engineering, and other areas. Professor Opdahl isa member of IFIP WG8.1 on Design and Evaluation of Information Systems. He serves regularly as a reviewerfor internationally recognised journals and on the program committees of several international conferencesand workshops.

Marcia Robinson is cofounder and president of e-Business Strategies. Marcia has extensive background inservice delivery and customer side of e-Business. She was responsible for multi-channel delivery initiativessuch as single sign-on, industry trend examination, customer analysis and integration strategy development.Her book e-Business: Roadmap for Success (Addison-Wesley, 1999) and e-Business 2.0: Roadmap forSuccess (Addison-Wesley, 2001), coauthored with Ravi, is an international bestseller and was ranked #3 onAmazon.com's Business Best Seller list. This was the first book on e-Business that looked at the organizationand changes necessary in order to compete in the digital economy.

James A. Rodger received his doctorate (1997) in Management Information Systems from Southern IllinoisUniversity at Carbondale. He earned an MBA from IUP (1990) and a B.S. in biology (1970) from the Universityof Pittsburgh. Dr. Rodger joined the MIS and Decision Sciences Department at IUP as an associate professorin 1999, teaching e-commerce, networking, system architecture, and introduction to MIS at both the graduateand undergraduate level. Previously, Dr. Rodger worked as an assistant professor in the business departmentat the University of Pittsburgh at Johnstown. Dr. Rodger has an extensive and diversified portfolio of scholarlyactivities. He has published his work in 33 journals, five book chapters, and 50 conferences. His work hasappeared in Annals of Operations Research, Communications of the ACM, Expert Systems with Applications,Journal of Database Management, and several other journals and proceedings of international, national, andregional conferences. Dr. Rodger has consulted with the US Department of Defense, the Navy HealthResearch Center, Army Medical Board, and several local health care companies. Dr. Rodger has served as ajournal editor for the Pennsylvania Journal of Business and Economics. He is on the advisory board of severaljournals and Info-Science Online, with Idea Group Publishing Company. In addition, he has served as areviewer for many academic journals and conferences. Dr. Rodger received a research grant from the CentralResearch Development Fund, Small Grants Program, University of Pittsburgh, Pittsburgh, Pennsylvania, inorder to fund several of his research projects in health care. Dr. Rodger is also active in free consulting tosmall businesses in the region through the Small Business Institute. He received the Outstanding MIS andDecision Sciences Faculty award in academic year 2000-2001. He is also a member of the board of directorsfor Goodwill Industries of the Laurel Highlands, Inc.

Zixing Shen is a graduate student in Department of Management at University of Nebraska-Lincoln. She

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (8)

earned her bachelor's degree from Sichuan University, Chengdu, China, and worked in China Tobacco Importand Export Sichuan Corporation for three years.

Zahir Tari is an associate professor at RMIT University. He received his bachelor's degree in mathematics atUniversity of Algiers (Algeria), master's degree in operational research at University of Grenoble (France), anda Ph.D. degree in computer science at the University of Grenoble. He is currently the leader of Distributed andNetworking Systems activity unit at School of Computer Science and Information Technology. His research ismainly focused on middleware and Web services, in particular dealing with mobility, interoperability, security,and performance (such as caching and load balancing). Dr Tari has been the general cochair and PC cochairof several international conferences, including CoopIS/DOA/ODASE 2002, DOA 2001/2000/1999, IFIP WG11.3 on Database Security 2000 and IFIP WG 2.6 on Data Semantics 1998. He has coauthored severalbooks, most recently, Fundamentals of Distributed Object Systems (John Wiley, 2001). He is a senior memberof IEEE. More details about Dr. Tari can be found at http://www.cs.rmit.edu.au/~zahirt.

Jari Veijalainen received a B.Sc. degree in mathematics in 1978 and a M.Sc. degree in computer science in1983 from the University of Helsinki, Finland, and a Ph.D. in computer science (Informatik) in 1989 from theTU-Berlin, Germany. During 1989-1997 he worked as a senior research scientist and as a group manager atthe Technical Research Center of Finland (VTT). Since 1996 he has been a full professor in computer scienceat the University of Jyväskylä, Finland. His research interests include heterogeneous transactionmanagement, CSCW transaction models and mechanisms, electronic commerce systems, formal modeling,mobile computing, and multimedia data management. He is a member of ACM and IEEE CS, and a memberof the editorial board of ACM WINET and VLDB Journal. See www.cs.jyu.fi/~veijalai for more details.

Abhinav Vora is a Ph.D. candidate at RMIT University, Melbourne, Australia, and a member of the Distributedand Networking Systems Activity Unit at the School of Computer Science and Information Technology. Hisresearch interests are in the area of mobile and pervasive computing. His research supervisors are AssociateProfessor Zahir Tari and Dr. Peter Bertok. He received his B.S. (Honours) in computer science from RMITUniversity in 2001.

Mathias Weske received a doctoral degree from the University of Koblenz in 1993 and a habilitation degreefrom the University of Muenster in 2000. Since 2001 he has been a professor of software systems technologyat the Hasso Plattner Institute for Software Systems Engineering at the University of Potsdam, Germany,where he leads a business process technology research group. His current research interests include varioustopics in workflow management, Web services technology, and enterprise application integration. He is amember of the GI, vice chair of the executive committee of GI SIG EMISA, and a member of IEEE and ACM.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (9)

Preface

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

With the number of mobile device users exceeding that of PC users, conducting business and services overthese mobile devices, which is known as mobile commerce, is becoming real and attractive. Although mobilecommerce shares many similarities with traditional electronic commerce, it extends the latter by offering a widerange of personalized and location-aware services to users by integrating a myriad of technologies together.Some of these technologies are required to realize new mobile business opportunities, while others areneeded to overcome the operating constraints within the mobile environment, such as limited screen size, lessreliable and smaller bandwidth communication channel, shorter battery lifespan, and keyboardless input.

This book discusses mobile commerce with emphasis on both theory and application and serves as a goodintroductory guide for both researchers and practitioners. It consists of a collection of chapters on mobilecommerce addressing a wide spectrum of technology and application issues. These chapters are essential tounderstanding the current state of mobile commerce applications and services. The book is structured intothree parts.

Part I reviews the current trends and future development in mobile commerce applications and technology.

The article "Mobile Commerce: Current States and Future Trends," by Keng Siau, Ee-Peng Lim, and ZixingShen presents an overview of mobile commerce development by examining the features of mobile commerce,the value-added applications, the enabling technologies, the business implications, and the challenges inimplementing mobile commerce. The paper also provides an agenda for future research to enhance mobilecommerce. The article provides the necessary back-ground knowledge for readers to understand the rest ofthe book.

Part II focuses on the technological challenges facing mobile commerce.

In the chapter "Mobile E-Commerce on Mobile Phones," Do van Thanh describes the protocol and securityissues involved in using mobile phones to conduct business-to-consumer transactions. The author explainsthe fundamental differences between mobile commerce and e-commerce in B2C transactions and identifiesthe limitations of Wireless Application Protocol (WAP) in mobile commerce. The author also proposes asolution known as Mobile ePay to provide authentication and micropayment services using mobile phones. Amobile commerce receipt system enabling instantaneous delivery is also described in detail.

The chapter on "Transactional Database Accesses for M-Commerce Clients," by Hong Va Leong, discussesthe required generic architecture and appropriate mechanisms to be supported by database servers in themobile environment. In particular, it focuses on the transaction processing component of the database serverthat ensures the atomicity and other desirable correctness criteria of the database accessing activities. Theconcept of transaction processing is generalized to encompass accessing multiple databases, while stayingwithin the context of a mobile computing platform. Relevant issues on the broadcast database and thedisconnected processing of transactions are also considered.

To overcome bandwidth and energy limitations resulting from short battery life of mobile devices, it isnecessary to provide an energy-efficient wireless data dissemination architecture that supports broadcastingapplications. The chapter "Techniques to Facilitate Information Exchange in Mobile Commerce," by AslihanCelik and Anindya Datta, presents such an architecture. The chapter discusses the energy cost and accesstime of some proposed data broadcast and access protocols. It finally describes how secure data broadcastscan be achieved by incorporating encryption into the proposed protocols.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (10)

In the chapter "Digital Rights Management for Mobile Multimedia," Sai Ho Kwok proposes a digital rightsmanagement framework for mobile commerce. In the proposed framework, operations on digital rights,security, and payment are addressed. The framework can be adopted for the current 2.5G and 3G mobiletechnologies and even for 4G technologies.

For the chapter "Predicate Based Caching for Large Scale Mobile Distributed On-line Applications," the threeauthors, Abhinav Vora, Zahir Tari, and Peter Bertok, describe their experience in designing a predicate-basedcaching technique for mobile object-based middleware that optimizes the performance of the mobile mediumby better utilizing the available bandwidth.

Part III covers the application studies and information systems issues in mobile commerce.

In the chapter "Modeling Static Aspects of Mobile Electronic Commerce Environments," by Jari Veijalainenand Mathias Weske, an object model that describes the fundamental static aspects of the mobile commerceenvironment and their relationships is presented. It distinguishes four spheres of concern: RegulatoryFrameworks, Business Models, Enabling Technologies, and the Global Infrastructure. The spheres provide usa mean to understand and classify the development of mobile commerce applications and environment.

With location information about users and business entities, new kinds of mobile commerce applications canbe developed. Stuart J. Barnes, in his chapter "Known By the Network: The Emergence of Location-BasedMobile Commerce," examines the technologies, applications, and strategic issues associated with thecommercialization of location based services.

The chapter "Usable M-Commerce Systems: The Need for Model-Based Approaches," by John Krogstie,Petter Bae Brandtzæg, Jan Heim, and Andreas L. Opdahl, discusses new challenges and possible solutionsfor developing and evolving usable m-Commerce systems. The chapter focuses on model-based approaches.The authors summarize the main challenges on using model-based approaches to support the development ofusable mCommerce systems and highlight research issues in this very dynamic area.

In the chapter "Managing the Interactions between Handheld Devices, Mobile Applications, and Users," byMaristella Agosti and Nicola Ferro, several issues related to managing the interactions between handhelddevices, mobile applications, and users are discussed. The chapter suggests some approaches to overcomethe constraints imposed by the mobile environment and to enhance the interactions between handhelddevices and mobile applications.

Susy Chan and Xiaowen Fang, in the chapter "Mobile Commerce and Usability," analyse the usability issuesthat have great impact on the interface design, development, deployment and adoption of m-commerceapplications. The chapter also highlights some usability topics for future research.

The chapter "Using Continuous Voice Activation Applications in Telemedicine to Transform MobileCommerce" by James Rodger describes the use of mobile technologies in telemedicine efforts in defense. Astrategy for implementing mobile telemedicine is given.

Finally, the chapter "Mobile Applications for Adaptive Supply Chains: A Landscape Analysis" by Ravi Kalakota,Marcia Robinson and Pavan Gundepudi examines the changes to supply chains brought about by mobiletechnologies.

The above collection of chapters provides a good mix of views on the technological and application aspects ofmobile commerce. Mobile commerce is still in its infancy. More developments in this area are expected to takeplace in the near future. There will certainly be new technologies that will render some of the existing ideasobsolete. Nevertheless, this book will provide the necessary foundation for readers to understand the mobilecommerce area and inspire more research work on mobile commerce-related technologies.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (11)

Part I: Overview of Mobile Commerce

Chapter List

Chapter 1: Mobile Commerce: Current States and Future Trends

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (12)

Chapter 1: Mobile Commerce: Current States andFuture Trends

Overview

Keng SiauUniversity of Nebraska-Lincoln, USA

Ee-Peng LimNanyang Technological University, Republic of Singapore

Zixing ShenUniversity of Nebraska-Lincoln, USA

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (13)

Abstract

Advances in wireless technology increase the number of mobile device users and give pace to the rapiddevelopment of e-commerce using these devices. The new type of e-commerce, conducting transactions viamobile terminals, is called mobile commerce. Due to its inherent characteristics such as ubiquity,personalization, flexibility, and dissemination, mobile commerce promises business unprecedented marketpotential, great productivity, and high profitability. This paper presents an overview of mobile commercedevelopment by examining the enabling technologies, the impact of mobile commerce on the business world,and the implications to mobile commerce providers. The paper also provides an agenda for future research inthe area.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (14)

Introduction

Advances in wireless technology increase the number of mobile device users and give pace to the rapiddevelopment of e-commerce conducted with these devices. The new type of e-commerce transactions,conducted through mobile devices using wireless telecommunications network and other wired e-commercetechnologies, is called mobile commerce (increasingly known as mobile e-commerce or m-commerce). Mobilecommerce enables a new mode of information exchange and purchases, and it presents an unexploreddomain. To consumers, it represents convenience; merchants associate it with a huge earning potential;service providers view it as a large unexplored market; governments look it as a viable and highly productiveconnection with their constituents. In short, mobile commerce promises many more alluring marketopportunities than traditional e-commerce and the global mobile commerce market is expected to be worth astaggering US$200 billion by 2004 (Guy Singh, 2000). Because of the characteristics and constraints of mobiledevices and wireless network, the emerging mobile commerce operates in an environment very different frome-commerce conducted over the wired Internet. Although mobile commerce will emerge as a major focus ofthe business world and telecommunication industry in the immediate future, the marriage of mobile devicesand the Internet is filled with challenges as well.

The article is structured as follows. We first summarize the features of mobile commerce. Next, value-addedapplications of mobile commerce and an overview of mobile commerce technology are presented, and thebusiness implications are discussed. We then highlight the challenges in implementing mobile commerce.Finally, we suggest possible directions for future mobile commerce research.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (15)

Features of Mobile Commerce

The essence of mobile commerce revolves around the idea of reaching customers, suppliers, and employeesregardless of where they are located. Mobile commerce is about delivering the right information to the rightplace at the right time. It gives users the ability to access the Internet from any location at any time, thecapability to pinpoint an individual mobile terminal user's location, the functionality to access information at thepoint of need, and a need-based data/information update capability. Mobile commerce has features notavailable to traditional e-commerce, some of which we discuss next:

Ubiquity

Ubiquity is the primary advantage of mobile commerce. Users can get any information that they are interestedin, whenever they want regardless of their location, through Internet-enabled mobile devices. In mobilecommerce applications, users may be engaged in activities, such as meeting people or traveling, whileconducting transactions or receiving information. In this sense, mobile commerce makes a service or anapplication available wherever and whenever such a need arises.

Reachability

Through mobile devices, business entities are able to reach customers anywhere anytime. With a mobileterminal, on the other hand, a user can be in touch with and available for other people anywhere anytime.Moreover, the user might also limit his/her reachability to particular persons or at particular times.

Localization

The knowledge of the user's physical location at a particular moment also adds significant value to mobilecommerce. With location information available, many location-based applications can be provided. Forexample, with the knowledge of the user's location, the mobile service will quickly alert him/her when his or herfriend or colleague is nearby. It will also help the user locate the nearest restaurant or ATM.

Personalization

An enormous number of information, services, and applications are currently available on the Internet, and therelevance of information users receive is of great importance. Since owners of mobile devices often requiredifferent sets of applications and services, mobile commerce applications can be personalized to representinformation or provide services in ways appropriate to a specific user.

Dissemination

Some wireless infrastructures support simultaneous delivery of data to all mobile users within a specificgeographical region. This functionality offers an efficient means to disseminate information to a largeconsumer population.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (16)

Value-Added Applications

As mobile commerce extends current Internet sales channel into the more immediate and personalized mobileenvironment, it also revolutionizes the business world by presenting it tremendous opportunities to provideadditional value to hardto-reach end customers. These value-added services include:

Easy, timely access to information (e.g., the latest availability of flights). Delivering a service that not onlyreaches more people but also is available all of the time, mobile commerce enables consumers to makepurchases from wherever they are whenever they are ready. This will result in an increase in revenue tothe company providing the mobile services.

Immediate purchase opportunity (e.g., last-minute purchases of tickets or gifts). Provided with apersonalized, immediate opportunity to purchase, customer will make the purchasing decision on the spotand not go to an alternate source.

Wireless coupon based on user profiles. Since a mobile device's location can be determined precisely,the stores around the mobile device user can transmit user-specific information, such as current sales orspecials, and alert the user about similar upcoming events. Wireless coupons, which enable an advertiserto deliver geographically targeted and time-sensitive message to a willing consumer directly with apromotional offer virtually anytime and anywhere, will increase acquisition efficiency and allow direct offerssuited to user profiles or stated users' preferences.

Beaming money. Some bank transactions such as withdrawals and deposits will be conducted via mobileterminals in the near future. Electronic money can even be transferred to mobile devices allowing thelatter to be used for electronic payments.

The only limit on the number and types of mobile commerce applications is our imagination. Varshney andVetter (2001) identified a few important classes of applications such as mobile finance applications, mobileadvertising, mobile inventory management, and product location shopping. As wireless technology furtherevolves, its application in business will only be broadened by more and more innovative mobile commercepossibilities (see Figure 1).

Figure 1: Applications of mobile technology

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (17)

Mobile Commerce Technology: An Overview

Mobile commerce is enabled by a combination of technologies such as networking, embedded systems,databases, and security. Mobile hardware, software, and wireless networks enable mobile commerce systemsto transmit data more quickly, locate users' positions more accurately, and conduct business with bettersecurity and reliability. In this section, we introduce the key technologies that make mobile commerce a realityand that will improve its performance and functionality in the near future.

Communication Technology

GSM

Global System for Mobile Communication (GSM) is so-called the second-generation (2G) digital network,operating in the 900 MHz and the 1800 MHz (1900 MHz in the US) frequency band. A circuit-switched service,where users must dial in to maintain a connection when data communications are desired, is the prevailingmobile standard in Europe and most of the Asia-Pacific region.

GPRS and EDGE

GPRS (General Packet Radio Service) and EDGE (Enhanced Data GSM Environment) are so-called 2.5Gtechnologies. GPRS uses the existing network infrastructure but is being marketed as delivering ISDN-typespeeds. Rather than sending a continuous stream of data over a permanent connection, GPRS's packetswitching system only uses the network when there is data to be sent. Users can send and receive data atspeeds of up to 115 kbits/second with GPRS. EDGE, a faster version of GSM, is designed to enable thedelivery to multimedia and other broadband applications. It will use new modulation techniques to enable datarates of up to 384 kbits/second over the existing GSM infrastructure.

UMTS

Universal Mobile Telecommunications System (UMTS), the so-called third-generation (3G) technology, aims tooffer higher-bandwidth, packet-based transmission of text, voice, video, and multimedia needed to supportdata-intensive applications. Once UMTS is fully implemented, computer and phone users can be constantlyconnected to the Internet and have access to a consistent set of services worldwide. Integrating the functionsof a whole range of different equipments, the new 3G-enabled mobile phone can be used as a phone, acomputer, a television, a paper, a video conferencing center, a newspaper, a diary, and even a credit card.

Fourth-Generation Technologies

Although 3G technologies are just emerging, research has commenced on fourth-generation (4G)technologies. These research initiatives encompass a variety of radio interfaces and even entirely newwireless access infrastructure. Better modulation methods and smart antenna technology are two of the mainresearch areas that enable fourth-generation wireless systems to outperform third-generation wirelessnetworks (PriceWaterHouseCoopers, 2001).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (18)

Figure 2: Evolution of wireless communication technology

Bluetooth

Bluetooth, named after a tenth-century Danish king who conquered Scandinavia, is a low-power radiotechnology for communication and data exchange. Using a single chip with built-in radio-transmission circuitry,Bluetooth is an inexpensive short-range wireless standard supporting local area networks (LANs). It wasdeveloped to replace the cables and infrared links within a ten-meter diameter. Bluetooth can be used to linkelectronic devices, such as PCs, printers, mobile devices, and PDAs, to wireless data networks.

As depicted in Figure 3, the 1st generation wireless technology was the cellular phone. The 2nd generationwireless technology, which includes digital cellular phones, is narrow-band and currently in use worldwide. The3rdgeneration wireless technology offers high bandwidth to support data-intensive applications.

Figure 3: Evolution of wireless technology

WAP

Wireless Application Protocol (WAP) is an open and global standard for mobile solutions, designed specificallyto deliver Web information to mobile terminals (as shown in Figure 4). As an end-to-end application protocol, itattempts to provide solutions to the challenges in developing mobile applications, such as connecting mobileterminals to the Internet and making mobile terminals become communication devices capable ofcommunicating with other devices over a wireless network. It also permits the design of interactive and real-time mobile services.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (19)

Figure 4: WAP Operation System

Information Exchange Technology

HTML

HTML (Hyper-Text Markup Language) is widely adopted by the Internet community as the document format forbrowsing. The availability of authoring tools and browsers make it easy for users to create HTML documentsincorporating multimedia objects. Although HTML is not a suitable format for information exchange in thewireless domain, compact version of HTML, known as cHTML, has been used in the NTT DoCoMo's iModeservices.

XML

eXtensible Markup Language (XML) is a meta-language, designed to communicate the meaning of the datathrough a self-describing mechanism. It tags data and puts content into context, therefore enabling contentproviders to encode semantics into their documents. For XML compliant information systems, data can beexchanged directly even between organizations with different operation systems and data models, as long asthe organizations agree on the meaning of the data they exchange.

WML

Wireless Markup Language (WML), which has been derived from XML, has been developed especially forWAP. It allows information to be represented as cards suitable for display on mobile devices. So WML isbasically to WAP what HTML is to the Internet.

SMS

Short Message Service (SMS) enables sending and receiving text messages to and from mobile phones. Upto 160 alphanumeric characters can be exchanged in each SMS message. Widely used in Europe, SMSmessages are mainly voice mail notification and simple person-to-person messaging. It also provides mobileinformation services, such as news, stock quotes, sports, and weather. Recently, SMS chat and downloadingof ringing tones have also been offered.

Location Identification Technology

In mobile communication, knowledge of the physical location of a user at any particular moment is central tooffering relevant service. Location identification technologies are important to certain types of mobilecommerce application, particularly those whose content is varied depending on location. Global PositioningSystem (GPS), a useful location technology, uses a system of satellites orbiting the earth. Because thesatellites continuously broadcast their own positions and directions, GPS receivers can calculate the exact

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (20)

geographic locations with great accuracy. Originally developed in the US for military use, GPS is now alsoused for civilian purposes. For example, GPS can now be used in car navigation systems.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (21)

Business Implications

Like e-commerce, mobile commerce is a complex process involving a chain of operations. Transactions inmobile commerce typically involve customers, merchants and often banks, mobile network operators, andpossibly other entities. In this section, we describe the business value chain and its primary participants,categorize its vast range of services, and illustrate its market segments.

Mobile Commerce Value Chain

As described by Barnett (2000), transport, basic enabling service, transaction support, presentation service,personalization support, user application, and content aggregators are the seven links in the mobile businessvalue chain (illustrated in Table 1). Based on the value chain, we can identify seven players in mobilecommerce as shown in Figure 5.

Figure 5: Players in mobile commerce value chain

Table 1: Mobile commerce business value chain

Link Name Function

1 Transport To maintain and operate the infrastructure and equipment toguarantee data communication between mobile users and applicationproviders.

2 Basic enablingservice

To provide services such as server hosting, data backup, and systemintegration.

3 Transactionsupport

To provide the mechanism for assisting transactions, for security, andfor billing users.

4 Presentationservice

To convert the content of Internet-based applications to a wirelessstandard suitable for the screens of mobile devices.

5 Personalizationsupport

To gather users' personal information, which enables personalizedapplications for individual users.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (22)

Link Name Function

6 Contentaggregators

To provide information in a category or search facilities to help usersfind their way around the Internet.

7 User applications To carry out mobile commerce transactions for mobile consumers.

From the perspective of a transaction, the following entities are the main participants in mobile commerce: (1)Customer. He or she can initiate a transaction in one place, receive the service in another place, and completethe transaction in a third place. The places can be in different cities, states, and countries. (2) Contentprovider. It provides customers specific content, which can be transmitted through a WAP Gateway or througha portal. (3) Mobile portal. Different from an Internet portal, it offers customers services with a greater degreeof personalization and localization. (4) Mobile network provider. It plays different roles in mobile commercevarying from a simple mobile network provider to an intermediary, portal or trusted third party, depending onwhere it stands in the mobile commerce chain.

Types of Mobile Commerce Markets

As an amalgamation of several different market segments, mobile commerce can be divided into three basicareas (Liebmann, 2000). They are internal business operations (also called internal mobility, probably the mostcommon form of mobility currently in use), business-to-business applications using an extranet, and Web-based consumer services (illustrated in Figure 6).

Figure 6: Three market segments in mobile commerce

6 Contentaggregators

To provide information in a category or search facilities to help usersfind their way around the Internet.

7 User applications To carry out mobile commerce transactions for mobile consumers.

From the perspective of a transaction, the following entities are the main participants in mobile commerce: (1)Customer. He or she can initiate a transaction in one place, receive the service in another place, and completethe transaction in a third place. The places can be in different cities, states, and countries. (2) Contentprovider. It provides customers specific content, which can be transmitted through a WAP Gateway or througha portal. (3) Mobile portal. Different from an Internet portal, it offers customers services with a greater degreeof personalization and localization. (4) Mobile network provider. It plays different roles in mobile commercevarying from a simple mobile network provider to an intermediary, portal or trusted third party, depending onwhere it stands in the mobile commerce chain.

Types of Mobile Commerce Markets

As an amalgamation of several different market segments, mobile commerce can be divided into three basicareas (Liebmann, 2000). They are internal business operations (also called internal mobility, probably the mostcommon form of mobility currently in use), business-to-business applications using an extranet, and Web-based consumer services (illustrated in Figure 6).

Figure 6: Three market segments in mobile commerce

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (23)

Challenges and Concerns

The prospect and advantages of mobile commerce may appear obvious to many of us, but the path tosuccess using mobile commerce is not necessarily so plain. Technical restrictions of mobile devices andwireless communication, business concerns, and legal constraints complicate the practical use of mobilecommerce. In this section, we focus on the obstacles confronted by mobile commerce applications.

Application Challenges

Absence of Killer Application(s)

A killer application for a computing platform is "an application compelling enough to motivate purchases of thatplatform" (PriceWaterHouseCoopers, 2001, p. 9). For example, access to the Internet is the killer applicationthat spurs PC purchases in the second half of the 1990s. For the mobile commerce to succeed, one or morekiller applications must be developed to compel organizations to purchase and use mobile devices in theirdaily operations.

Mobile Devices Limitations

Current wireless devices include phones, hand-held or palm-sized computers, laptops, and vehicle-mountedinterfaces. Whereas mobile terminals demonstrate a greater extent of mobility and flexibility, they are inferiorin several respects when compared to personal computers. The screen is small and the display resolution islow. The small and multifunction keypad complicates user input. Because of the need to be physically smalland light, these input and output mechanisms impede the development of user-friendly interfaces andgraphical applications for mobile devices. Mobile handsets are also limited in computational power, memoryand disk capacity, battery life, and surfability. These drawbacks in mobile devices do not support complexapplications and transactions, and consequently limit usage of mobile commerce.

User Distrust

In every transaction, each party involved needs to be able to authenticate its counterparts, to make sure thatreceived messages are not tampered with, to keep the communication content confidential, and to believe thatthe received messages come from the correct senders. Due to the inherent vulnerability of the mobileenvironment, users in mobile commerce are more concerned about security issues involved with mobiletransactions. Mobile commerce users need to be assured that their financial information is secure and thatwireless transactions are safe. The mass adoption of mobile commerce will not be realized until users begin totrust mobile commerce (Siau & Shen, 2003).

Strategy Changes

To stay competitive and realize genuine productivity benefits from mobile commerce, many organizationsactually need to be redesigned. They will have to make fundamental changes in organizational behavior,develop new business models, and eliminate the inefficiencies of the old organizational structures. Theprocess of rethinking and reengineering is a demanding task. For example, implementing mobile governmentis more than developing a website on the mobile Internet. Actually, it is about rethinking and reengineering theway government does its business. It requires rethinking how government to be organized from theperspective of its citizens and reengineering how government to perform its functions according to the needsof its citizens rather than to the requirements of bureaucracies.

Investment Risk

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (24)

A major problem faced by mobile commerce is the huge investment required to implement and operate it.Engineering massive organizational and system changes to reposition the organization strategically iscomplicated as well as expensive. For example, a company has to build a mobile infrastructure in order tobetter manage its supply chain. But the mobile technology itself does not guarantee the true benefits of mobilecommerce. Expertise in fields other than technology is also prerequisites for successful applications of mobilecommerce. How can organizations obtain a payoff from their investment in wireless technology?Understanding the costs and benefits of mobile commerce is difficult.

Network Obstacles

Incompatible Networks

Multiple, complex and competing protocols exist in today's cellular network standards. As previouslymentioned, GSM is a single standard used by the network operators in Europe and Pacific Asian region. ButTDMA (Time-division multiple access) and CDMA (Code-division multiple access) are widely used in the US.These different standards have resulted in the global incompatibility of cellular handsets. The networkincompatibility poses problems for organizations to communicate and cooperate with their suppliers,distributors, retailers, and customers.

Bandwidth Access

The Federal Communications Commission (FCC) has established several frequency bands for use by cellularnetwork operators across the country. In order to encourage competition, the FCC prohibits cellular operatorsfrom owning more than 45 MHz of radio spectrum in a given geographic region. Known as the "spectrum cap,"this regulation imposes barrier for US cellular network operators who are attempting to implement the newhigh-bandwidth, next-generation networks.

Security Concerns

Compared with the wired counterpart, wireless communications are more vulnerable. Although most wirelessdata networks today provide reasonable levels of encryption and security, the technology does not ensuretransmission security in the network infrastructure. Data can be lost due to mobile terminal malfunctions.Worse, these terminals can be stolen and ongoing transactions can be altered. In short, the mobility enjoyedby mobile commerce also raises many more challenging security tasks. Serious consideration must be givento the issue of security as mobile commerce applications play an increasingly significant role in our dailybusiness and personal life.

Infrastructure Problems

Competing Web Languages

Today's mobile devices utilize a broad range of often incompatible standards, making the process of creatinga successful m-commerce application even more difficult. Newer mobile phones will incorporate WAP and itsWML. NTT DoCoMo's iMode, on the other hand, uses condensed HTML. The fact that incompatible standardsare utilized in mobile devices today makes the process of creating successful m-commerce applications evenmore difficult.

Seamless Integration

The integration between network operators and businesses is a key issue for mobile commerce. In addition, toconduct business via mobile devices, companies must be capable of managing and supporting a large base ofmobile customers or employees. This poses a challenge to the traditional helpdesk and customer care

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (25)

function. On one hand, companies must deal with the logistics, procurement, and asset management issuessurrounding large numbers of devices and software. On the other hand, the broad range of mobile devicesmakes customer care far more complex and harder to manage.

Legal Concerns

Apart from its technical and business obstacles, the implementation of mobile commerce has its legalconcerns, too. The application of traditional law to the mobile Internet is not always a straightforward process.Legal issues plaguing mobile commerce are similar to those facing e-commerce. Some of them are how tomaintain privacy, how to deal with defamation, how to protect intellectual property, and how to treat Internettaxation (Dietel, Dietel & Steinbuhler, 2001). Like the wired Internet, the wireless Internet also posessignificant challenges to our legal structure.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (26)

Future Research Agendas

Research plays a vital role in solving problems in current mobile commerce applications and directing its futuredevelopment. In this section, we delineate the research we feel should be carried out in mobile commerce inorder to correct or address the challenges and tasks we discussed in the previous section.

Application-Level Issues

Seek Killer Application(s)

For the mobile commerce to succeed, one or more killer applications must be developed to compel individualsto purchase and use mobile devices in their daily commercial activities. The killer application(s) for mobilecommerce should make full use of mobility, provide services directly relevant to mobile needs and benefitusers in immediacy and efficiency.

Enhance Usability of Mobile Devices

As previously discussed, the usability of mobile devices is poor due to the various limitations of mobileterminals. Future mobile devices are expected to be smaller and more wearable, but they will also possesslarger processing and storage resources. Screens for cellular phones also will be made larger, making themeasier to use and more visually appealing. Meanwhile, offline methods without direct connection of mobiledevices to the network can also help to minimize the technical limitations. Future mobile devices will also beable to integrate Bluetooth technology, allowing them to access nearby appliances such as vending machinesand televisions using very low-cost, short-range moderate bandwidth connection. With such capabilities,mobile devices will have a combination of different communication connections to conduct mobile commerce.

Design User-Friendly Interface

Unlike the wired computing environment where large screens are available, mobile commerce applicationshave to operate on small and often wearable mobile devices that can only include small screens. Scientistsare now developing voice-based and pen-based interaction to replace the present keyboard and mouseinteraction. Pen-based interaction on touch screens may replace the mouse; voice-based interaction may beused for activation and control of functions like voice dialing. Some studies on the user interface for mobiledevices have been reported in the Workshop series on Human Computer Interaction with Mobile Devices.

Build Business Models for Mobile Commerce

Although mobile commerce has the potential to improve the performance of organization, business modelsunique to mobile environment need to be built. Business models introduced within the e-commerceenvironment require further refinement to suit the mobile environment. It is vital to ensure that all the relatedapplications and services can be accessed with ease and minimal cost.

User Infrastructure Issues

Consolidate Network Infrastructure

Bandwidth and coverage are major issues for the network infrastructure (Varshney, Vetter & Kalakota, 2000).The former allows more data to be exchanged between servers and the mobile devices, thus supportingmultimedia content delivery. The latter minimizes the complications of connection losses when a mobile devicemoves beyond a network boundary or crosses from one network to another. These two issues directly affect

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (27)

the quality of mobile data transfer and, therefore, are critical for the further development and futuredeployment of mobile commerce applications.

Address Security Issues

Research on how to improve security in mobile commerce must be carried out due to the vulnerability ofmobile devices and wireless networks. To meet security requirements including authentication, integrity,confidentiality, message authentication, and nonrepudiation in mobile commerce, additional security softwareand information (e.g., certificate, private, and public keys) will have to be installed on mobile devices.Nevertheless, due to the limited computing resource of mobile devices, at some point it will be necessary toestablish additional servers to store information, perform security checking, and conduct electronic paymenton behalf of mobile devices (Thanh, 2000).

Middleware Issues

Develop Content Delivery and a Format for Mobile Commerce

At present, much of the attention has been given to providing visual access to Web content. As a result, WMLand compact HTML (cHTML) are widely used now. Voice access can also be employed to enable Webcontent to be displayed on mobile devices. VoiceXML (VoiceXML 1.0 Specification, 2000) is a new markuplanguage for creating voice-user interfaces to Web applications or content using normal telephones. Sincemost mobile devices can be equipped with voice capabilities, it is therefore important to study how a combinedvoice, screen, and keyboard (or button) access to the Web can be realized by integrating the features inVoiceXML with wireless markup language

Improve Mobile Access to Databases

To allow users to run applications on their mobile devices without having to maintain constant connection withthe servers and pay expensive connection time, at least part of the database systems must be able to resideon the mobile devices. These mobile database systems require little memory and are able to transfer theirdatabases to the centralized database systems or to synchronize their databases with those at the centralizeddatabase systems. In some cases, a mobile database system may only manage a portion of a large centraldatabase, pulling in additional data on demand and pushing back data that are not required. In a mobileenvironment where databases are on the move and little computing resources are available, the databaselocation, query processing, and data recovery capabilities of the mobile database systems will have to befurther improved.

Explore Agent Technologies

The relatively high cost of connection time and data exchange for mobile devices discourages the adoption ofmobile commerce by cost-sensitive organizations. Agent technologies can alleviate this problem. Mobilecommerce users can contact agents to look for products and services, to locate merchants, to negotiateprices, and to make payments. All of these activities can be performed without having the mobile devicesconstantly connected to the network. In an agent-based mobile commerce framework, agents can beenvisioned as merchants, consumers, and other brokering services, interacting with one another to enableelectronic transactions.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (28)

Conclusions

Despite the skepticism around mobile commerce (e.g., Dugan, 2000), we share the industrial and academiccommunities' optimism. Though there remain a great number of technical, regulatory, and social challenges toovercome for their further development, we believe that mobile devices will continue to develop andincorporate additional functionality in the coming years and that the end result will be a global marketplace ofmobile commerce.

For example, Japan and Europe are already witnessing early successes in mobile commerce. In Japan, NTTDoCoMo's iMode phone has emerged as a great success highlighting the application of wireless technology toa business environment. Introduced in February 1999, NTT DoCoMo iMode provides a continuous Internetconnection via mobile phones and connects users to a wide range of online services, many of which areinteractive. iMode has already attracted more than 13 million Japanese consumers, particularly youth.Connected continuously to the Internet, these 13 million users can send e-mail, get stock quotes, and playonline games. Europe has also embraced a simple mobile data service wholeheartedly. SMS technologymakes wireless email a reality, and the new WAP facilitates Web browsing and other Web-based transactionson mobile phones. Bluetooth, another European data initiative, further establishes a common standard for awide range of appliances and industrial devices to communicate wirelessly.

North America, where people tend to have a PC-centric view of the Internet, has lagged behind in applicationsof mobile technology. But companies here have started to realize that they might miss business opportunitiesif they don't get a share of the current mobile commerce market, and they are attempting to catch up. Cellularoperators such as Sprint PCS and Verizon now offer customers wireless access to news, the weather, sports,and financial information. MasterCard International and Motorola announced they would collaborate on mobilecommerce projects.

As wireless technologies evolve, the coming mobile revolution will bring dramatic and fundamental changes tobusiness strategies, enterprise resource planning, supply chains, and customer relations. This revolution hasalready begun, but it is still in its infancy. When complete, the revolution will impact numerous facets ofeveryday life. It will provide important data in real time to assist decision makers, exert great influence on theways businesses communicate and develop relationships with consumers, and ultimately transform the waywe do business.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (29)

References

Barnett, N., Hodges, S., & Wilshire, M. J. (2000). M-Commerce: An operator's manual. McKinseyQuarterly, 3, 162-173. Retrieved from the World Wide Web:http://www.libfind.unl.edu:2020/journals/iris/busis.html.

Bluetooth White Paper. The Official Bluetooth Websites. Retrieved from the World Wide Web:http://www.bluetooth.com/developer/whitepaper/whitepaper.asp

Deitel, H. M., Deitel, P. J., & Steinbuhler, K. (2001). e-Business and e-Commerce for Managers. UpperSaddle River, New Jersey: Prentice Hall.

Dugan, S. M. (2000). Oh the horror, the horror: The new world of wireless commerce runs amok. InfoWorld, 22 (25), 92. Retrieved from the World Wide Web:http://www.libfind.unl.edu:2020/journals/iris/busis.html.

Gosh, A. K., & Swaminatha, T. M. (2001). Software security and privacy risks in mobile e-commerce.Communications of the ACM, 44 (2), 51-57.

Liebmann, L. (2000). Preparing for m-commerce. Communication News, 37 (9), 132. Retrieved from theWorld Wide Web: http://www.libfind.unl.edu:2020/journals/iris/busis.html.

Muller-Veerse, F. (2000). Mobile commerce report. Durlacher Corporation. Retrieved from the World WideWeb: http://www.durlacher.com/downloads/mcomreport.pdf.

PriceWaterHouseCoopers (2001). Technology forecast: 2001-2003-Mobile Internet: Unleashing the powerof wireless

Siau, K., & Shen, Z. (2003). Building consumer trust in mobile commerce. Communications of the ACM(forthcoming).

Singh, G. (2000). Securing the mobile e-conomy. Retrieved from the World Wide Web:http://www.allnetdevices.com/wireless/opinions/2000/09/11/securing_the.html.

Thanh, D. V. (2000). Security issues in mobile commerce. Proceedings of the 1st InternationalConference on Electronic Commerce and Web Technologies (EC-Web 2000), London, 412-425.

Varshney, U., Vetter, R. J., & Kalakota, R. (2000, October). Mobile e-commerce: A new frontier. IEEEComputer, 33 (10), 32-38.

Varshney, U., & Vetter, R. (2001). A framework for the emerging mobile commerce applications.Proceedings of the 34th Hawaii International Conference on System Sciences.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (30)

VoiceXML 1.0 Specification (2000, March). Retrieved from the World Wide Web:http://www.voicexml.org/spec.html.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (31)

Part II: Technology Issues in Mobile Commerce

Chapter List

Chapter 2: Mobile E-Commerce on Mobile Phones

Chapter 3: Transactional Database Accesses for M-Commerce Clients

Chapter 4: Techniques to Facilitate Information Exchange in Mobile Commerce

Chapter 5: Digital Rights Management for Mobile Multimedia

Chapter 6: Predicate Based Caching for Large Scale Mobile Distributed On-Line Applications

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (32)

Chapter 2: Mobile E-Commerce on Mobile Phones

Do van ThanhTelenor - Norwegian University of Science and Technology, Norway

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

Abstract

This chapter considers mobile e-commerce on mobile phones and in particular GSM mobile phones. It isaiming at clarifying the differences between e-commerce and mobile e-commerce. The powerful aspects ofthis new e-commerce form born with mobility are explained carefully. The chapter starts with a presentation ofthe generic business-to-consumer e-commerce followed by two typical examples of e-commerce on the WorldWide Web. The mobile e-commerce is then described thoroughly. The fundamental differences with e-commerce are explained, and an ideal mobile commerce system is presented. The limitations in currentwireless communication systems are clarified. The Wireless Application Protocol together with its impacts andlimitations for mobile e-commerce are also considered. Different types of mobile phones will then be studied,and their limitations regarding security are shown. A solution providing adequate authentication and micro-payment, called Mobile ePay, is then presented with examples of operation. A mobile e-commerce receiptsystem enabling instantaneous delivery is described thoroughly. The chapter concludes with suggestions forfuture works.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (33)

Introduction

The rapid and constant growth of the Internet and especially the World Wide Web brought numerous valuableapplications to private homes and, among them, business-to-consumer commerce. The private consumersuddenly obtained the possibility to browse and purchase goods across all borders. He is, however, stillconfined to his computer at home. Another dimension is, of course, to be able to do the same anytime andanywhere. Mobile e-commerce seems to be a natural step, but many issues need to be solved before it can bepart of the private consumer's daily life. First, mobile e-commerce needs to be better understood in order todiscover all its potential. Indeed, mobile e-commerce is more than the wireless extension of the Internet e-commerce. Second, the limitations of the wireless technologies need to be overcome in order to make mobilee-commerce sufficiently secure.

In this chapter, the mentioned issues will be considered thoroughly. Since mobile phone is undoubtedly themost popular and used mobile device, we will focus on mobile e-commerce on mobile phones, although thesecurity issues presented apply to other mobile devices as well. The chapter starts with a presentation of thegeneric business-to-consumer e-commerce, followed by two typical examples of e-commerce on the WorldWide Web. The mobile e-commerce is then described thoroughly. The fundamental differences with e-commerce are explained, and an ideal mobile commerce system is presented. The limitations in currentwireless communication systems are explained. The Wireless Application Protocol together with its impactsand limitations for mobile e-commerce are also considered. Different types of mobile phones will then bestudied, and their limitations regarding security are shown. A solution providing adequate authentication andmicropayment, called Mobile ePay, is then presented with example scenarios. A mobile e-commerce receiptsystem enabling instantaneous delivery is described thoroughly. The chapter concludes with suggestions forfuture works.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (34)

Business-to-Consumer E-Commerce

Generally, commerce refers to the exchange of goods for money. The merchant hands over certain productsto the consumer in exchange for money. Actually, such an exchange consists of a set of actions that arecarried out at a common place where both the merchant and the consumer are present. Figure 1 shows theactions performed in commerce.

Figure 1: Commerce as a set of actions

The consumer examines the shop to make sure that it is trustworthy and worth visiting. The consumeris actually carrying out a visual authentication of the merchant and his shop. She enters the shopand starts browsing.

1.

The consumer examines the product to make sure that it is what she wants. Both the functionality andthe quality of the product are inspected by the consumer. The consumer performs the verification ofthe goods. She may also consider different alternatives regarding price versus functionality andquality. She may also ask for other conditions related to guarantee or service.

2.

If satisfied she decides to buy and tells the merchant.3.

Before handing the product over to consumer the merchant must make sure that he gets paid for theproduct. He asks for cash or payment schemes.

4.

The consumer pays.5.

If and only if the payment is successful, the merchant delivers the purchased products to the consumer.6.

The consumer checks to make sure that she gets all the products she has paid for.7.

The consumer may ask for receipt for accounting or guarantee.8.

The merchant issues a receipt to the consumer.9.

Commerce is a transaction that can be considered as successful only when all the actions are successful. Weobserve that trust plays a crucial role for the success. The consumer must trust the merchant and believe thatthe products are as good as they look. The merchant must be sure that he gets paid by the consumer for theproducts he delivers.

In business-to-consumer e-commerce where the consumer and the merchant communicate indirectly via

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (35)

software entities and the Internet, trust must be somehow established between the two parties. In order toachieve trust the following security functions must be performed:

Authentication: Each party needs to be able to authenticate its counterpart, i.e., to make sure that thecounterpart is the one he claimed to be.

Integrity: Each party needs to make sure that the received messages are not altered or fabricated bysomeone other than their counterpart.

Confidentiality: Each party wants to keep the content of their communication secret.

Nonrepudiation: Each party wants to prevent that the counterpart later on denies the agreements that hehas approved earlier.

Usually, the two parties do not and do not have to know each other in order to do trading. In such a case, theasymmetric cryptographic algorithm, also called the public key algorithm, is more appropriate than thesymmetric cryptographic algorithm.

Briefly, the public key algorithm uses a key pair, one private and one public, for encryption and decryption.What is encrypted by one key can only be decrypted by another. It should also be practically impossible toderive one key from the other. Confidentiality and integrity are preserved when the sending party encrypts themessage with the recipient's public key since only the later has the corresponding private key to decrypt themessage. Authentication and nonrepudiation are achieved when the sender encrypts the message or part of itwith his private key. The receiver decrypts the message with the sender's public key and can be sure that itcomes from the sender because only he has the private key. This later encryption scheme is known as digitalsignature, which usually also consists of a message digest (hash function) to reduce the size of the messageto be encrypted and to optimize the signing process. There are currently several public key algorithms such asRSA's Public-Key Cryptography Standards (PKCS) #1-15 (RSA Laboratories, 1993), Elliptic Curve (IEEE,1999).

It is worth emphasizing the difference between digital signature and electronic signature.

Digital signature (ETSI 1998 Telecommunications Security) is a cryptographic transformation (using anasymmetric cryptographic technique) of the numerical representation of a data message, such that anyperson having the data message and the relevant public key can determine:

that the transformation was created using the private key corresponding to the relevant public key;and

that the data message has been altered since the cryptographic transformation.

So based on a digital signature it is not possible to identify the signer of the message. An example ofdigital signature is PKCS #1.

Electronic signature means data in electronic form in, affixed to, or logically associated with a datamessage and used to identify the signer of the data message and indicate the signer's approval of theinformation contained in the data message. An example of electronic signature is PKCS #7.

The issue now is to be certain who owns what key pair. A certificate issued by a trusted authority, also calledCertificate Authority (CA), attests that a public key belongs to an entity or individual with a certain name andattributes. Both certificates and keys need to be managed, i.e., generated, revoked, updated, recovered, etc.,and a Public Key Infrastructure (PKI) is necessary for that. Unfortunately, no such global PKI exists yet, and,

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (36)

as we will explain in later sections, ad hoc solutions have been adopted in Web e-commerce.

Currently, the most popular business-to-consumer e-commerce is the Web e-commerce. Since our intention isnot to give a deep presentation of Web e-commerce but only an elucidation necessary for the explanation ofmobile e-commerce later on, only simplified views of Web shopping and Web banking are described.

Web Shopping

Web shopping is getting more and more popular, especially for books, music, films, etc. The procedure variesslightly depending on the visited website but can be summarized as follows:

A user visits a website of a merchant. He browses among the offers. Up to this point, no securitymeasure is needed since everything is public.

1.

He wants to order goods or services.2.

The Web server asserts its site identity by signing its server certificate, i.e., encrypt its server certificateusing its private key. It will send both the encrypted certificate and the original unencrypted one to thebrowser. In this case the server must be a secure server, i.e., having a server certificate and beingenabled for security. The browser uses the server's public key (from the server's certificate) to decryptthe signed certificate. It compares the result with the unencrypted certificate and in this way ensuresthat the owner of the certificate is the same who signed it.

3.

The browser checks if the issuing CA is one that it accepts. The trusted CAs are specified in the list ofso-called trusted root certificates. A root certificate is a certificate issued by a CA to itself, e.g., acertificate to VeriSign issued by VeriSign itself. Such a list is embedded in the browser. Some browserslike Microsoft's Internet Explorer allow the import of new trusted root certificates. If unknown, thebrowser informs the user that this server certificate was issued by an unknown CA.

4.

The user manually (visually) authenticates that the site's certificate was issued by a trusted third partyfor the exact site the user is visiting.

5.

The browser generates a session key, encrypts this key with the server public key, and sends itsecurely back to the server.

6.

A secure channel is established, with the session key generated by the browser.7.

The user will be asked to enter his personal data, i.e., name, address, and email.8.

The user will be asked to enter his credit card number that will be charged for the purchase.9.

The server issues a receipt to the user or sends it back via email.10.

The merchant validates the credit card number and if valid ships the purchased goods to the user.11.

The transaction can be closed at this stage.

The procedure to establish the secure channel described above is in accordance with the SecureSocket Layer (SSL) protocol.

12.

In Figure 2, Crypto Functions stand for cryptographic functions. Root Certificate CAx depicts the rootcertificate of Certificate Authority X. The requirements on the user's side are as follows:

His PC must have a browser.1.

The browser must be equipped with root certificates used in the authentication of the server.2.

3.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (37)

1.

2.

It must have access to cryptographic functions that are capable of validating server certificates andcapable of encrypting and decrypting for the secure channel.

3.

Figure 2: Web shopping

The channel is secure in the sense that confidentiality and integrity prevail. However, it is not a trustedchannel. Neither merchant nor user can be sure that they are dealing with the right counterpart. On themerchant side, only the Web server authentication is executed but not the merchant authentication. On theuser side, no user authentication is done. It is worth noting that only the validation of the credit card number isdone, i.e., the credit card number is valid and can be charged for the purchase. Nothing is said about whetherthe user is owner of the credit card and, hence, is entitled to use it.

The described Web-shopping scheme is used widely because it is simple and does not require muchinfrastructure and investment. However, it has the following limitations:

The user has to trust the merchant's site. For well-known sites with good reputation, he can do that, butfor unknown sites he faces a lot of risks. The site may be a fake shop that collects and abuses his creditcard number.

The merchant may deal with impostors that use credit card numbers from stolen cards or valid cardnumbers that are generated by an illegal process. In such cases, the validation of the card number issuccessful and the fraud can only be discovered long after the delivery of goods. The financial institutionsrefuse to cover losses for such cases, because the merchant has not verified that the user has a validcredit card and the signature is identical to the one on the credit card.

The financial institutions are not satisfied, because the authentication of the user and the authentication ofthe merchant are skipped. The risk of frauds and the number of disputes are higher.

Visa and MasterCard have jointly developed the SET Secure Electronic Transaction protocol (Visa & MasterCard, 1997) as a method to secure payment card transactions over open networks. SET, however, requiresinvestments both on the merchant and on the consumer side and is not widely used.

Web Banking

Many banks in Europe have realized that by providing banking services such as paying bills, doing moneytransfers, balancing checks, etc. on the Web, they can reduce costs at the same time as offering betterservices to customers. However, they are very concerned about security and do not find the procedure used inWeb shopping secure enough, since no client authentication is performed. In order to remedy the situation,the banks have adopted different authentication schemes.

Authentication using a set of numbered passcodes: The user receives from the bank by post a plastic cardwith a series of numbered passcodes printed on. The number of passcodes varies depending on the bank.The user is supposed to keep this card in a secure manner. When the user visits the bank's site, a secure

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (38)

communication is first established between the user's computer and the bank's server. Then, the user is askedto enter his username. The server will then ask him to enter for example passcode number n. The userconsults his plastic card and enters the value of the passcode number n. If the passcode is correct, the user isauthenticated.

Authentication using a passcode calculator: The user receives from the bank by post a calculator, which iscapable of generating a one-time passcode. The calculator is secured by a PIN code chosen by the user atinitialization. When the user visits the Bank's site, a secure communication is first established between theuser's computer and the bank's server. Then, the user is asked to enter his username. The server will thenask him to enter the passcode. The user enters the passcode generated by the calculator. The server thencompares this passcode with the passcode generated by another similar calculator at the server. If the twopasscodes match, the user is authenticated. This method requires synchronization between the twocalculators.

Authentication using software: Instead of a physical calculator the calculation function is delivered to theuser as software on diskette or CD-ROM. The user installs it in his PC. Alternatively, the calculation functioncan be provided in a smart card, but in this case the user must have a card reader and associated software.When the user visits the Bank's site, a secure communication is first established between the user's computerand the bank's server. Then, the user is asked to enter his username. The authentication is then carried out bythe user's client program (browser) and the merchant's server without intervention of the user. The clientsoftware generates the passcode and sends it to the server. The server compares with the code it hasgenerated. If they match, the user is authenticated.

All the three schemes described above, although accepted by the banks because they provide sufficientlystrong authentication, still have weaknesses as follows:

The two first schemes are not very user friendly, since the user has to really concentrate in order to enterthe numbers correctly.

The user cannot be sure that the bank is performing the correct transaction that he wants.

The bank, on its side, cannot prove that the user has requested a transaction, and the latter one can denyit later on.

What is Mobile E-Commerce?

Mobile e-commerce is e-commerce brought to mobile users via mobile devices such as palmtops, PDAs or,most dominantly, mobile phones. With an ever-increasing number of devices on the market, mobile phoneswill undoubtedly play a crucial role in promoting mobile e-commerce. Mobile e-commerce allows users toconduct e-commerce on their mobile devices: obtain marketing and sales information, receive orderinginformation, make a purchase decision, pay for it, obtain the service or product, and finally, receive customersupport required.

Mobile e-commerce is more than a mobile and wireless extension of the Web-based e-commerce. It is anentirely new sales and promotion channel and is the enabler for a whole range of new services such as buyinga co*ke, paying for parking, buying train tickets, etc. via mobile phone. Most importantly, it is tailored to theusers in many aspects. It follows the user and is available anytime and anywhere. Although mobility is avaluable characteristic to the user in general, it is especially precious for e-commerce because it enables akey factor, which is missing in other e-commerce forms, namely the ability to adapt to the user, his humor andhis demands. In fact, the essence of commerce is to be able to satisfy the demands of the users. It isimportant not only to be able to offer whatever the user wants but also whenever he wants. Mobile e-commerce can also be customized such that it fits the preferences of the user in combination with time andlocation.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (39)

Another important aspect of mobile e-commerce is the ability to mix electronic media with other media such asnewspaper, TV, radio, natural communication in any of the commerce phases, i.e., presentation, selection,ordering, payment, delivery, and customer care. For example, the mobile user can browse on his mobilephone and obtain the location of the closest shop. He goes there and buys a co*ke. In this case, thepresentation and selection are done electronically via the mobile phone, while the rest is done in a traditionalway via natural communication. In another situation, the user buys groceries and pays via his mobile phone.The presentation, selection, ordering, delivery, and customer care phases are carried out in the traditional wayand only the payment phase is done electronically.

At first glance, mobile e-commerce may appear to be identical to "wired" e-commerce extended with mobilewireless access, and the solutions used in Web commerce, e.g., Web shopping and Web banking, can beapplied directly to mobile e-commerce. However, mobile e-commerce differs to "wired" e-commerce in thefollowing aspects:

Instantaneous delivery: The mobile user is of course interested in having services like Web shoppingwhere the delivery of nonelectronic goods is carried out later. But, in addition, he may want to have thegoods delivered to him immediately or in a short time. For example, after paying for a co*ke via his mobilephone, he expects the can to roll out from the co*ke vending machine. When paying for a cinema ticket heexpects to be able to collect the ticket on the same day. It is therefore necessary to have mechanisms forquick user authentication and receipt delivery.

Micro payment: For mobile users it is also being able to buy small things and to pay small amounts ofmoney. The administrative charges for such payments must be small compared to the payments.

Mobile context: The mobile user must in many situations be able to operate the services with only onehand. The user may be in environments that are distracting, e.g., crowded and noisy, and interactions withthe e-commerce services must both simple and small in numbers. The payment scheme of Web shoppingdescribed earlier where the user has to enter his personal data and his credit card number is hence notappropriate for the mobile user. A user-friendly payment scheme is required.

Do (2000) proposed an ideal mobile e-commerce system that is shown in Figure 3. Such a system shallsupport the following:

User authentication

Merchant authentication

Secure channel, i.e., encrypted channel

User-friendly payment scheme supporting micropayment

Receipt delivery

Simple user interface

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (40)

Figure 3: An ideal mobile e-commerce system

Limitations in Wireless Communication Systems

The current wireless communications such as GSM (Global System for Mobile Communications) (Mouly andPautet, 1992) is intended for voice communication only and is not optimized for data applications. In order toallow access to the Web from mobile devices, such as mobile phones, palmtops, PDAs, etc., the WAP forumintroduced the Wireless Application Protocol (WAP) (WAP forum, 1998). WAP enables a wide range of dataapplications such as information services, messaging services, location-dependent services, etc., but it is notsufficient in supporting mobile e-commerce since end-to-end security between the user's device and themerchant's server cannot be achieved. The physical limitations in the mobile phones in terms of storage andprocessing are the main obstacles. The WAP architecture and the limitations of the mobile phones will bepresented in the following subsections.

WAP and Mobile E-Commerce

The Wireless Application Protocol (WAP) promoted by the WAP forum enables access to the Internet frommobile devices. Taken into account the limited bandwidth of the wireless link, the limitation of mobile devicesconcerning processing, storage, battery life, size and weight, WAP is optimized for the wireless environment.The architecture of WAP is shown in Figure 4.

Figure 4: The Wireless Application Protocol architecture

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (41)

Of course, WAP will contribute to the success of mobile e-commerce, but it is worth noting that mobile e-commerce exists also without WAP. For example, the first mobile e-commerce application in Norway, "thecinema ticket" that was jointly developed by Ericsson and Telenor Mobile, is not based on WAP. It is based ona SIM (Subscriber Identity Module) application toolkit where the commerce application is implemented on theSIM of the mobile phone. It is worth mentioning that WAP contains security specifications, but they are notsufficient because they do not provide end-to-end security. In the future, mobile e-commerce can be extendedfurther through the adoption of newer technology such as Bluetooth, which allows local communicationsbetween devices without the need of an online connection with the network.

WAP has defined Wireless Transport Layer Security (WTLS) (WAP forum, 1998) aiming at providing privacy,data integrity and authentication between mobile phones and WAP gateways. However, WTLS does notprovide end-to-end security between mobile phones and merchant servers unless the merchant server isequipped with the whole WAP protocol stack. Such a situation can happen for banks or large financialinstitutions, but it is not realistic to expect that every merchant server in the Web has such a WAP protocolstack.

Limitations of the Mobile Phones

An ideal e-commerce system places stringent requirements that are difficult to meet by the mobile phone itself.These are:

The mobile phone must be equipped with a browser that has interface to the cryptographic functions.1.

It must be capable of digitally signing a message using the user private key in order to participate in theuser authentication. For that, it must have public key cryptographic functions such as RSA. It musthave a tamper-proof storage for storing the user's private key. It must also have enough storage for theuser's certificate.

2.

It must be capable of authenticating the merchant. For that, it needs to have enough storage for rootcertificates and must be equipped with public key cryptographic functions.

3.

It must have symmetric cryptographic functions for the establishment of the secure channel betweenthe mobile phone and the merchant' server.

4.

Let us consider successively a few different types of GSM mobile phones and see what capabilities they haveand how to enable them to participate in mobile e-commerce. Although American mobile standards like TDMA(IS-54) and CDMA (IS-95) and Japanese digital mobile (PDC) system (Gibson 1999) are not considered in thischapter, the limitations identified for GSM mobile phones also apply to these mobile phones.

Standard GSM phones

A GSM (Global System for Mobile communication) phone (ETSI, 1998) consists of two components:

An ME (Mobile Equipment) which is actually the "empty" phone with the display, keypad, microphone, andspeaker;

And a SIM (Subscriber Identity Module), which is a removable smart card. The SIM contains theInternational Mobile Subscriber Identity (IMSI), which unambiguously identifies the subscriber. Without avalid IMSI, the GSM service is not accessible. The SIM also contains the security features for subscriberauthentication such as authentication algorithm (A3), subscriber authentication key (Ki), cipher keygeneration algorithm (A8), and cipher key (Kc).

The ME is the master and initiates commands to the SIM, and there is no mechanism for the SIM to initiate acommunication with the ME. A standard GSM phone does not meet any of the requirements mentioned (1-4)above and is not capable of engaging in mobile e-commerce.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (42)

GSM SAT-enabled Phones

The SIM Application Toolkit (SAT) provides mechanisms which allow applications, existing in the SIM, tointeract and operate with any ME supporting the specific mechanisms required by the application. A browser,the public key cryptographic functions, and a user private key can be installed in the SIM. However, the SIMdoes not have enough storage capacity for all the certificates needed and is hence not capable of generatingcomplete digital signatures. In addition, in order to communicate with merchant's Web server, the SAT phoneneeds assistance from an intermediary server that has similar functionality as the WAP gateway. We will notconsider pure SAT phones, since more powerful WAP phones have emerged.

WAP Phones

The WAP phone is a mobile phone that has a WML browser and a WAP protocol stack on the ME. It is hencecapable of communicating with any Web servers via the WAP gateway. The connection with the WAPgateway can be based on different bearers such as GSM circuit-switched connection, GPRS, SMS, USSD,etc.

The first version of WAP phones, called WAP 1.1 phones, do not have public key cryptographic functions fordigital signature. However, a combined WAP-SAT phone will have a WML browser in the ME as well as publickey functionality in the SIM. The only problem is the lack of interface between the browser and thecryptographic functions of the SIM. The browser is hence not able to invoke the cryptographic functionsnecessary for user authentication.

In the WAP 1.2 phone, there will be a Wireless Identity Module (WIM) which incorporates the SIM as well aslocal memory in the ME. Public key cryptographic functions and also the user private key can be stored in theWIM. There will also be an interface which allows the browser to communicate with the cryptographicfunctions. WAP 1.2 phones will be capable of generating digital signatures according to the PKCS#1 standard(RSA Laboratories, 1993), but they will not able to generate an electronic signature according to the PKCS#7(RSA Laboratories, 1993) that is required in the validation process of the signature. It is possible to say thateven WAP phones are unable to participate in mobile e-commerce by themselves-they need assistance fromthe network system.

In this chapter, in order to make the solutions simpler and easier to understand, only WAP 1.1 phones will beconsidered in later sections.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (43)

The Mobile Epay Solution

To allow mobile phones to perform digital signature, we present a solution which provides user authentication,merchant authentication and payment schemes while taking into account the limitations of the mobile phones.The solution proposes to use a proxy server, called Mobile ePay, which resides in the network. The MobileePay should be operated by a trusted party that could be an operator or a service provider. On behalf of themobile phones the Mobile ePay is responsible of performing the tasks that the former is not capable of, suchas:

Storing the user's certificates.

Generating electronic signature, e.g., PKCS#7 message format from digital signature, e.g., PKCS#1format, generated by mobile phones.

Validating of the merchant's servers.

In addition to the security functions the Mobile ePay also has payment functions such as:

Prepaid account supporting micropayment.

Interfacing with the payment systems of the financial institutions.

Tsalgatidou and Veijalainen (2000) proposed a similar solution with the mobile network operator as the ownerof the proxy server. To illustrate the role of the Mobile ePay in our payment system two operations aredescribed, namely user authentication for WAP 1.1 phones and payment from WAP 1.1 phones.

User Authentication

The user authentication as depicted in Figure 5 comprises of the following steps:

The user visits a merchant site.1.

The merchant server sends the content to the mobile phone via the WAP gateway.2.

The user wants to authenticate himself toward the merchant. The authentication request is sent to theWAP gateway, which sends it to the Mobile ePay. The Mobile ePay sends it to the merchant server.

3.

The merchant server generates an authentication message, e.g., a random number, and sends it to theMobile ePay, which sends it to the SMS-C (Short Message Center). The SMS-C delivers it to the SIMon the mobile phone.

4.

The SIM asks for permission to sign.5.

If the user accepts, the SIM performs the signing, i.e., generating a digital signature in PKCI#1 format.6.

The SIM sends it back to the SMS-C, which sends it to the Mobile ePay.7.

The Mobile ePay generates an electronic signature in PKCS#7 format by using the received digitalsignature in PKCS#1 format.

8.

The Mobile ePay sends the complete electronic signature to the merchant server.9.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (44)

9.

Figure 5: Mobile ePay role in user authentication

Payment from WAP 1.1 Phones

The payment as depicted in Figure 6 comprises of the following steps:

The user visits a merchant site.1.

The merchant server sends the content to the mobile phone via the WAP gateway.2.

The user wants to buy. The request is sent to the WAP gateway, which forwards it to the Mobile ePay.The Mobile ePay delivers it to the merchant server.

3.

The merchant server sends an offer to the Mobile ePay.4.

The Mobile ePay sends a request for payment type to the browser via the WAP gateway.5.

The user selects the payment type, e.g., prepaid account, credit cards, etc., and6.

The payment type is sent to the Mobile ePay via the WAP gateway.7.

The Mobile ePay sends the contract to the SIM via the SMS-C. The contract captures all theinformation about the transaction, e.g., user id, merchant id, merchandise, etc.

8.

After asking for confirmation from the user, the SIM performs the signing.9.

The SIM sends the digital signature back to the Mobile ePay via the SMS-C.10.

The Mobile ePay executes the necessary transactions according to the payment type. This may includetransactions towards financial institutions in case of payment by credit card.

11.

The Mobile ePay sends a confirmation to the merchant server.12.

The merchant server returns a URL for the continuation of browsing.13.

The mobile ePay generates a receipt and sends it together with the URL for continuation to the browservia the WAP gateway.

14.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (45)

14.

Figure 6: Payment from WAP 1.1 phones

The browser can then continue with the browsing from the received URL. The shopping is hence completed.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (46)

Mobile E-Commerce Receipt System

In Web commerce goods, except electronic services, are usually delivered later on. With mobile e-commerce,the user should be able to access the same commerce services with postponed delivery as the Web; but inaddition, he must be able to access commerce services with a short delivery time. For example, a user whenon the move and thirsty wants to get the soft drink from the automat right after payment via his mobile phone.Another mobile user when visiting a city and wanting to see a movie expects to be able to collect the ticket atleast before the beginning of the show.

In such situations, the delivery entity, that could be a human being or a machine, needs to receive theauthorization for delivery quite rapidly. In addition, as in the case of the cinema ticket purchase, the userneeds to receive some sort of electronic receipt that he shows to the delivery entity to get the cinema ticket.Such an electronic receipt must fulfill the requirements:

It needs to be recognizable by the delivery entity.

It can be used as proof showing that the holder of the receipt has made the purchase and goods can bedelivered to him.

It cannot be falsified.

It cannot be duplicated or used twice.

Obviously, there is a need for a receipt system in mobile e-commerce.

Existing Receipt System

As we know, there is currently no such receipt system in the existing mobile e-commerce system. Systems forcinema ticket, such as the one offered by Telenor Mobile in Norway, have only a very primitive scheme forreceipt. After the user confirms the acquisition of the tickets by entering his PIN code, he will receive a code,e.g., a four- or six-digit number. To collect his cinema tickets, the user tells the code at the ticket desk. Theperson in charge compares the code with the one he received earlier. If they match, he/she delivers thepurchased tickets to the user.

An example of a current mobile e-commerce is depicted in Figure 7. The user uses a mobile phone equippedwith a browser, e.g., WAP browser or a SIM Application toolkit browser, that allows him to browse on theWorld Wide Web via a gateway. The gateway can be a WAP gateway, an SMS gateway or any specific servercapable of communicating with the browser on the mobile phone. The user visits a merchant's website. Hecontemplates the offers and selects the items that he wants. He pays for them through a payment scheme.The payment scheme may be, for example, based on a prepaid account, a credit or debit card, or a bankaccount. He receives a code from the merchant that he can use to collect the purchased items.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (47)

Figure 7: Overview of current receipt systems

Such a system is simple but relies totally on the reliability of the merchant's system. It is only satisfactory if thedelivery entity gets both the correct code and the correct information about the wanted tickets, e.g., theatre,movie, seats, etc. Otherwise, the user will not receive the tickets that he has paid for. In case of failure, theuser has only a code that is insufficient to prove that he has bought the tickets. Of course he will not becharged for the tickets in such a situation, but this is not what he wants. It is quite frustrating not be able towatch the movie that one likes and has paid for.

Ideal Solution for Mobile Receipt

As stated in the previous section, the current solution with a simple code is not sufficient since the user has torely totally on the reliability of the merchant and his system. Although the merchant is honest and does nothave the intention to play tricks on the user, if a fault occurs in his system the user will not have the goodsdelivered that he has actually bought. In addition, a mismatch can occur between the ordered goods and thegoods that are delivered to the user.

Ideally, a contract stating all the details of the deal, i.e., the goods ordered, prices and quantity, etc., should besigned digitally by the merchant and then sent to the user mobile phone for local storing in the phone. At thedelivery counter, the user can connect his phone via, for example, a cable, a socket, or wireless usingBluetooth or IEEE 802.11 to the delivery system and hand over the signed contract. The delivery entity verifiesthe signed contract and if valid delivers the goods to the user.

Such an ideal solution is however difficult to realize with existing technologies due to the following issues:

A detailed digital contract is rather large, and the mobile phone may not have sufficient storage capacityfor storing multiple contracts, which is necessary when the user buys several items.

If the mobile phone is broken or stolen the user will lose all his contracts and hence may also lose all hispurchases. Of course, the user can always claim to the merchant, but it is up to the merchant to honor theclaim.

The delivery entity must have sufficient capability to verify rapidly the digital contract, and this could beunacceptable from an economic point of view.

In some situations, the merchant having the deal with the user may not be the same as the delivery entity,and a contract showing all the details about the user: address, prices, etc. may be inappropriate since theuser's privacy can be a concern.

The Mobile E-Commerce Receipt System

In order to avoid the problems described in the previous section and in the same time to enable short timegoods delivery that is usually required in mobile e-commerce we propose a system as shown in Figure 8. The

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (48)

system consists of the following entities:

Mobile phone with a browser

Gateway

Delivery entity terminal

Trusted Third Party

Merchant server

Figure 8: The mobile e-commerce receipt system

A Trusted Third Party (TTP) is a new entity introduced between the user and the merchant. It acts like aneutral intermediary that gives equal protection to both parties, i.e., the user and merchant. It is worth notingthat a TTP is a role that any actor, such as network operator, service provider, bank, financial institution, etc.may play. In addition, it will enable the short time delivery feature that is required in mobile e-commerce. Sincethe mobile phone does not have enough capacity for storing contracts, the TTP stores contracts on behalf ofthe mobile phone and the mobile user. Based on the contract, the TTP will issue and sign a simpler andsmaller digital receipt that could be stored in the mobile phone. This digital receipt is then returned to themerchant's server, which sends it to the mobile phone. The digital receipt is stored in the mobile phone andwill be used at the delivery of goods.

The mobile user browses on his mobile phone and visits a merchant's website. He selects the itemsthat he wants and makes an order.

1.

The payment procedure is carried out. Note that different payment schemes may be used according tothe merchant's system and the user's subscription, e.g., prepaid account, credit card, debit card, bankaccount, etc.

2.

The Merchant's server generates and digitally signs the contract using the merchant private key. Thecontract may contain the following attributes:

customer name

address

email

MISDN number of the mobile phone

As shown in Figure 9, the system works as follows:

3.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (49)

Figure 9: Mobile e-commerce with mobile receipt

credit card number and expiration date (in case of payment by credit card)

merchant name and ID number

address

email

date and time of contract

contract ID

delivery place (if necessary specify the delivery entities)

earliest delivery date and time (if necessary)

latest delivery date and time (if necessary)

list of items with quantity for each item, unit price, part no

total amount paid

The contract is then sent to the TTP.

The TTP validates the contract to make sure that it is valid and does originate from the correspondingmerchant. The validation is done using public key cryptographic functions. If it is the case, the TTP willstore it. Based on the digital contract the TTP will then generate and sign a receipt using its private key.This digital receipt may contain the following:

contract ID

TTP ID

TTP address

The TTP will then send it to the merchant's server.

4.

The merchant's server sends the digital receipt to the user's mobile phone that stored it.5.

At the delivery counter, the user connects his mobile phone to the delivery entity's terminal. This can bedone via a wire, a direct contact, infrared or a wireless link such as Bluetooth, IEEE 802.11, etc. Themobile phone hands over the digital receipt to the delivery entity's terminal.

6.

a.

7.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (50)

6.

At this stage there are two alternatives depending on the capability of the delivery entity's terminal.

It validates the digital receipt. If valid, it will fetch the corresponding contract either from themerchant's server or from a repository in order to find the list of purchased items. Move to step9.

a.

It is not capable of performing the validation of the digital receipt by itself. It will then get in touchwith the TTP by using the address specified in the digital receipt and send over the digitalreceipt for validation.

b.

7.

The TTP validates the digital receipt. If valid, the TTP will fetch the corresponding contract by using thecontract ID specified in the receipt. It will extract the list of purchased items and send it together with anOK back to the delivery entity terminal.

8.

The purchased items are delivered to the user. The delivery entity asks the user to acknowledge thathe has received the goods. This can be done via verbal communication between the person in chargeof the delivery or via the delivery entity terminal that sends an acknowledge request to the mobilephone via the link between the two devices.

9.

The user acknowledges via his mobile phone that the goods have been delivered to him. The mobilephone sends an acknowledgement to the TTP. The acknowledgement can simply be the digital receiptdigitally signed by the mobile phone using the user's private key.

10.

The TTP validates the acknowledgement to make sure that it does originate from the right user and isnot modified. If valid, the TTP will save it with the corresponding contract. The TTP will then send anOK to the Delivery Entity terminal.

11.

The transaction is hence concluded.

The Trusted Third Party assumes the following responsibilities:

Ensure that the interests of both parties are equally protected.

Store the contract for the user such that it can be used in case of dispute.

Issue a simpler receipt that can be used in the delivery phase.

Certify that a trade is concluded successfully with a delivery of goods.

It has the following functions and capabilities:

receive and validate contracts signed by merchant

store and retrieve contracts

issue and digitally sign receipt based on the received contracts

validate digital receipts

validate acknowledgements

store and retrieve acknowledgements

have access to necessary cryptographic function in order to perform signing, verification and validation ofreceipts and acknowledgement.

The Delivery Entity's terminal is located at every delivery counter. It assumes the following responsibilities:

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (51)

accept the digital contract and send it to the TTP for validation

receive delivery information from the TTP

ask for delivery acknowledgement

It has the following capabilities:

communication with the mobile phones

communications with the TTP and the merchant's server

The communications between:

TTP and Merchant's server;

TTP and Delivery Entity'sTerminal; and

Delivery Entity's Terminal and Merchant's server

can go through secure channels on the Internet, i.e., encrypted or through dedicated networks. Thecommunication between the mobile phone and the TTP goes through the mobile network, the gateway and theInternet. The communication between the mobile phone and the Delivery Entity's terminal can be via a cable,a socket, or wireless via infrared, Bluetooth, IEEE 802.11.

This solution has many advantages, such as:

It enables short time delivery that is required in mobile e-commerce, while not requiring much capabilityeither on the mobile phone or the delivery entity's terminal.

It provides adequate protection to the user. In case of failure in the merchant's system, the contractdigitally signed by the merchant that is stored by the TTP can be retrieved and used as proof. In the casewhere the mobile phone is broken or stolen the user does not lose the goods/services that he has paidfor. The privacy of the user is achieved in the sense that information such as identity, personalia, creditcard number, bank account, etc. is not revealed at the delivery entity.

It provides adequate protection to the merchant. It ensures that purchased items cannot be deliveredtwice, since delivery acknowledgements are stored by the TTP.

It is realizable without requiring much effort and resource.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (52)

Conclusion

In this chapter mobile e-commerce via mobile phone is carefully explained. The differences between e-commerce and mobile e-commerce are clarified. An ideal mobile e-commerce system is also presented.Unfortunately, the wireless world is characterized by limitations both on the wireless link and on the mobilephones, and such an ideal mobile e-commerce is difficult to realize. Two systems aiming at remedying thesituation are presented. Taking into account the physical and functional limitations that prevent mobile phonesfrom participating in mobile e-commerce, the first system introduces a proxy server that offers the necessaryassistance to mobile phones. In addition to the security functions, the Mobile ePay also supports paymentfunctions such as prepaid account, which interface towards financial systems. With Mobile ePay, the user canperform in a secure way any mobile e-commerce service, such as doing bank transactions and buying goodsor services, from mobile phones. The second system offers a more reliable receipt, allowing the consumer topresent and collect goods that he has paid for via his mobile phone.

The proposed solutions are far from perfect, and quite a lot of issues remain to be done such as time stampingfor electronic signature, the relation between the private public key pair and the user (i.e., how many key pairsshould the user have), and the relation between key pair and certificates (i.e., how many certificates can beassociated to a key pair). The administration and storage of the user's key pairs are of utmost importance andneed to be considered carefully. Another obvious issue is the one about the actor most suited to assuming therole of Trusted Third Party in the mobile receipt system.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (53)

References

Do, V. T. (2000). Security issues in mobile ecommerce. Lecture Notes in Computer Science, ElectronicCommerce and Web Technologies. 1st International Conference EC-Web 2000. Springer, 467-476.

ETSI (1998). GSM 02.17 V8.0.0 Digital cellular telecommunications system (Phase 2+); SubscriberIdentity Modules (SIM); Functional characteristic.

ETSI (1998). GSM 11.14 Digital cellular telecommunications system (Phase 2+); Specification of the SIMApplication Toolkit for the Subscriber Identity Module-Mobile Equipment (SIM - ME) Interface.

ETSI (1998). Telecommunications Security; Electronic signature standardization report Draft TR 101xxxV0.4.2 (1998-11).

Gibson, J. D. (1999). The mobile communications handbook. CRN Press and IEEE Press.

IEEE (1999). P1363 standard specifications for Public-Key Cryptography.

Mouly, M., & Pautet, M. B. (1992). The GSM system for mobile communications. Mouly & Pautet, 49 rueLouise Bruneau, F-91120 Palaiseau-France, 1992.

RSA Laboratories (1993). PKCS #1: RSA Encryption Standard. Version 1.5, Nov 1993.

RSA Laboratories (1993). PKCS #7: Cryptographic Message Syntax Standard. Version 1.5, Nov 1993.

Tsalgatidou, A., and Veijalainen, J. (2000). Mobile electronic commerce: Emerging issues. Lecture Notesin Computer Science, Electronic Commerce and Web Technologies. 1st International Conference EC-Web2000. Springer, 477-486.

Visa & Master Card (1997). SET Secure Electronic Transaction Specification- Book one: Businessdescription. Version 1.0, May 31, 1997. Retrieved at: http://www.setco.org/download.html/#spec.

Visa & Master Card (1997). SET Secure Electronic Transaction Specification- Book two: Programmer'sguide. Version 1.0, May 31, 1997. Retrieved at: http://www.setco.org/download.html/#spec.

Visa & Master Card (1997). SET Secure Electronic Transaction Specification- Book three: Formal protocoldefinition. Version 1.0, May 31, 1997. Retrieved at: http://www.setco.org/download.html/#spec.

WAP forum (1998). Wireless Application Protocol architecture specification. Version April 10, 1998.

WAP forum (1998). Wireless Application Protocol, Wireless transport layer security specification. VersionFebruary 18, 2000.

WAP forum (1999). Wireless Application Protocol, Wireless markup language specification. Version

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (54)

November 4, 1999.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (55)

Chapter 3: Transactional Database Accesses for M-Commerce Clients

Hong Va LeongHong Kong Polytechnic University, Hong Kong

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

Abstract

Advances in wireless communication technologies in the past decade have led to the emergence of e-commerce applications that can be executed on mobile handheld devices. A major class of this new type ofapplications, commonly known as mobile e-commerce or m-commerce applications, relies on access to one ormore database servers. Although conventional database technologies can still serve for applications in thisevolving context, some of the techniques need to be adapted to the new environment to take advantage of thecharacteristics of the mobile environment or to combat the inherent limitations in such an environment. Thischapter explores the appropriate mechanisms to be supported by database servers in the mobile environmentand the generic architecture that can suit such a need. In particular, we focus our discussion on an importantclass of database applications, namely, transaction processing, which ensures the atomicity and otherdesirable correctness criteria of the database accessing activities. Furthermore, the concept of transactionprocessing is generalized to encompass accessing multiple databases while staying within the context of amobile computing platform. A generic architecture that supports the necessary features is described. Relevantissues on the broadcast database and the disconnected processing of transactions are also considered.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (56)

Database Access in a Mobile Environment

Recent advances in wireless communication technologies, both the hardware and software, have resulted inthe prosperity of the mobile computing paradigm. Mobile clients may be based on the resource-rich laptopcomputers communicating with the wireless network access points via a high bandwidth IEEE 802.11 wirelessLAN, or resource-poor PDA or WAP (Wireless Application Protocol) devices communicating with a fixednetwork via low bandwidth wireless modems, using cellular phones. Classifying the mobile environment basedon the computational power of the client device and the bandwidth of the communication network yields fourdifferent types of environments, as illustrated in Table 1.

Table 1: Different mobile computing environments

ComputationalPower

High Low

Bandwidth

High Laptop under wirelessLAN

PDA under wireless LAN or 3Ginfrastructure

Low Laptop using wirelessmodem

PDA/WAP device using cellular phone

In Table 1, the computational model exhibited by laptop computers with a high bandwidth wireless network isalmost the same as the conventional distributed computing model, except for the added dimension of clientmobility. Research, therefore, is focused on the management of the client location and providing location-dependent services (Imielinski and Badrinath, 1992). Moving away from the high bandwidth environment withrelatively static mobile clients, quite a significant amount of research work in the past decade has beenfocused on the mobile environment where laptop computers interact and process data through low bandwidthnetworks using, for instance, wireless modems. The movement of clients is much more frequent in such anenvironment. This is further complicated by the limited bandwidth of the unreliable communication channels, tothe extent that mobile clients are often left disconnected from the network. Obviously, a disconnected clientcannot access the file server or the database. Providing partial services upon disconnection is important,since a mobile client will need to access shared data. Research work addressing this issue has drawn themost share of attention in the past few years, as pioneered by the work on the Coda file system (Mummert,Ebling, and Satyanarayanan, 1995). In Coda, frequently accessed files are cached by the clients, and updatesmade during client disconnection are reintegrated with the file system upon reconnection.

The environment with resource-poor devices but a high bandwidth network will not be completely realized untilthe new 3G communication infrastructure becomes commonly established in several years time. We anticipatethat by that time, the computational resources of those devices will have been improved to a level where theypossess reasonable programming capability. We hope that by then there would be strong support for the JVM(Java Virtual Machine) on the Java Card or for well-developed platforms such as J2ME (Java 2 Platform,Micro Edition). In particular, the expected market penetration of wearable computers could form an ideal classof clients that access the Internet through the wireless network. Existing research in the mobile computingenvironment should therefore be dedicated to addressing the challenges in the use of relatively resource-poordevices accessing information via low bandwidth networks, since research has been conducted on this type ofenvironment only quite recently.

Database systems constitute a very important component in commercial applications, ranging from theconventional to e-commerce applications, and then further to mobile e-commerce (m-commerce) applications;they serve as the information source and repository for these applications. Thus, database support for mobile

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (57)

clients forms a core component in m-commerce and it is application-independent. Those more application-specific issues, such as those arising from B2C exchanges, B2B exchanges or CRM, can be addressedseparately. In practical m-commerce applications, we envision that most clients are moving around, and theyare often far away from their home locations. Research and application focus should therefore be on the lowbandwidth communication environment, as well as on the mobility of clients. In such an environment, a largeclient population communicates with various database servers over wireless communication channels (Alonsoand Korth, 1993). Efficient access mechanisms to these mobile-client-enabled database servers (or simplymobile databases) must be devised. The major issues include the limitation in the bandwidth of the wirelesschannels, as well as their unreliability, and the frequent disconnection of clients from the wireless network(Imielinski and Badrinath, 1994). The movement of mobile clients and their location management should alsobe considered (Pitoura and Samaras, 2001). The new class of applications that arises from the mobility ofclients and involves returning query results that are dependent on the location of a client are referred to aslocation-dependent queries (Madria, Bhargava, Pitoura, and Kumar, 2000). The querying need can beresolved by adding a geographical information system component to the database server (Choy, Kwan, andLeong, 2000) to enable geo-referencing. The relevant portion of the location-enriched database for a mobileclient can be modeled as a view to that client (Lee, Leong, and Si, 2000a).

In this chapter, we are more focused on the database access issues and the provision of services for the PDAor WAP devices like WAP phones, though our design is intended to be generic enough to realize the potentialof more powerful mobile clients. A typical mobile computing environment that is capable of supporting e-commerce applications is depicted in Figure 1, where different types of mobile clients are communicating withthe Web server and connecting, possibly via intermediate computer systems, to the database servers thatsupport data manipulation (through, for example, Java DataBase Connectivity or JDBC). In this example, thereare two base stations that transmit data to and from the mobile clients, including laptops, PDAs and WAPphones. The base stations can communicate with a computer system, or even with a database system,through a wired network, thus enabling the mobile client to access the database system directly. Here, themobile clients send and receive messages over the wireless channel as if they were regular TCP/IPconnections. Alternatively, some base stations may be connected to a Web server through which othercomputer systems or database systems can be accessed. This is useful in providing Web access to clients.

Figure 1: A typical mobile environment for m-commerce

In an environment such as that shown in Figure 1, the wired database servers are relatively fixed, and themovement of clients can be masked with the use of mobile IP or other mobile networking solutions.Alternatively, this can be handled with appropriate middleware. [1] In our design, we explore the notion ofa*gents to allow mobile clients to handle client movement with respect to wireless connectivity in a transparentmanner. We would also like to simplify and standardize the architecture, which we will describe in the nextsection.

There are two major types of data access requirements for a mobile database: data dissemination anddedicated data access. Data dissemination is preferred in a mobile environment, since it can serve a large

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (58)

client population in utilizing the high bandwidth downstream channel to broadcast information of commoninterest, such as stock quotations, traffic conditions, special events, or the number of available seats at atheater performance. Dedicated data access has to be conveyed over dedicated communication channels withlimited bandwidth. Mobile clients can query (dedicated data query) and update (dedicated data update) dataitems in the database. Owing to the bandwidth limitation, these dedicated data accesses are more expensive.Taking advantage of the efficient data dissemination mechanism, the proportion of dedicated accesses fordata query would be small compared with data update. Although it is possible to handle a dedicated dataquery, such as querying for the availability of seats in a concert, through data dissemination, a dedicated dataupdate is necessary in many m-commerce applications since clients often need to make a change in thedatabase state for activities such as those to buy or sell a stock, or to reserve a seat in a show.

To disseminate data items in a database effectively, we can schedule the data items in the form of abroadcast disk (Acharya, Alonso, Franklin, and Zdonik, 1995; Tan and Yu, 1998). The scheduled broadcastcan be viewed as the "air storage" (Leong and Si, 1997). The notion of a broadcast disk comes from theobservation that a broadcast cycle resembles the rotation of a physical disk. A client accessing a certain partof the database must wait until those data items are broadcast, which is similar to the way a required datablock rotates under the read/write head of a disk. The sequence of data items to be broadcast is referred to asa broadcast program (Acharya et al., 1995). The augmentation of the client cache and server database to thebroadcast disk can make the structure analogous to the memory hierarchy as viewed by the mobile client,hence the name of "tertiary" air storage (Leong and Si, 1997). The concepts of broadcast disk and databasecache hierarchy are depicted in Figure 2. A small broadcast disk containing information about five stocks isdepicted. The broadcast program is (DELL, INTC, MFST, ORCL, SUNW). Proper indexes can be built tofacilitate access to data items in the broadcast (Imielinski and Badrinath, 1994).

Figure 2: The broadcast disk and the cache hierarchy

Observing that regular indexing is of an item-based nature, improvement can be achieved by ascribingsemantic information to the indexing structure. This provision of semantics to the data organization in abroadcast disk results in semantic data chunks (Deshpande, Ramasamy, Shukla, and Naughton, 1998; Lee,Leong, and Si, 2000b). An example comparing conventional item-based data broadcast with semantic chunk-based broadcast is depicted in Figure 3. Using data chunks, a query for stocks priced between $30 and $70can be resolved by accessing only the first two data chunks, and the client is certain that the results arecomplete even if some parts of the broadcast have been missed. On the contrary, a client listening to thebroadcast in an item-based broadcast cannot assert that it has obtained the appropriate data items unless alldata items are contained in the broadcast disk, and it has not missed any part of the broadcast. For instance,if the client missed the records for Intel and Microsoft, it would not know that it had missed part of its answer. Ithas to send a complementary request to a server for the prices of Intel and Microsoft. However, a clientmissing the chunk [50 < price n 75] would request information from the server for stocks with a price between$50 and $70, but a client missing only the chunk [75 < price n 100] will know that it has obtained all of itsanswer. This desirable property, exhibited by chunk-based broadcast, is termed the self-answerability of clientqueries (Lee, Leong, and Si, 2000b). Such broadcast processing approaches are appropriate for resource-rich

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (59)

clients. To improve the data access efficiency, appropriate client caching mechanisms can be implemented(Chan, Leong, Si, and Wong, 1999). The cache of a client can be used to answer queries even in the event ofa disconnection. The semantic data chunks can be used for answering queries, and the precise nature ofmissing data items from the cache can be asserted by the client. In the example above, a client knows that ithas all the results if chunks for [25 < price n 50] and [50 < price n 75] are found in the cache, while a clientunder item-based broadcast will remain in doubt about the completeness of its cached data for the query.

Figure 3: Conventional versus semantic data chunk organization

To support data update, queries to databases are transmitted from the client to the server via a back channel.Since location-dependent queries form a significant portion of m-commerce services, mechanisms to improvethe performance of location-dependent queries should be implemented (Madria et al., 2000). For instance,typical information that is useful with respect to a location can be materialized in the form of a data warehouse,whose content can be updated dynamically with respect to changes in location (Lee, Leong, & Si, 2000a). Inparticular, the client view is defined based on a conjunction of location-independent and location-dependentpredicates. It can be materialized through filtering based upon the location-dependent predicates.

Regular access to a database normally involves the querying and updating of database information. Withmultiple clients accessing the database, it is important to ensure the correctness of those concurrentaccesses. This is realized and enforced through concurrency control protocols to support the notion ofdatabase transactions, which satisfy the ACID properties, namely, atomicity, consistency, isolation, anddurability (Bernstein, Hadzilacos, and Goodman, 1987). The correctness criterion is the serializability ofconcurrent transactions. Intuitively, serializability means the possibility of rearranging concurrently executingtransactions to a serial execution of those transactions. If this can be done, the concurrent transactions can beexecuted in a sequential manner effectively, thereby eliminating interference and anomaly. Consider thespace-time diagram in Figure 4 where Peter is transferring $1,000 from his saving account, Saving, to hischecking account, Checking. While this transfer is in progress, the bank executes a program to calculate theinterest payment of 5% for each account and perform the appropriate credit operation. It is unfortunate thatPeter has lost the interest on his "phantom" cash of $1,000 while it was transferred. He received interest of$455 instead of $505, and the total balance became $10,555 instead of $10,605. If the transfer and theinterest calculation were executed as transactions, it would not be possible for the interest calculation to occurin the middle because both transactions would access shared accounts in a "conflicting" mode. Theconcurrency control protocol, which ensures serializability, will delay the calculation of interest on the checkingaccount until the deposit is made.

Figure 4: Problems in the absence of database transactions

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (60)

In a mobile environment, it is appropriate to relax the strong serializability requirement, which could beimposing overly restrictive constraints on the execution of transactions. It is often acceptable for a mobileclient not to see the updates that were made by some concurrently executing mobile clients, in exchange for afaster execution and a higher probability of committing its transaction. In the above example, if the interestcalculation transaction were replaced by a balance inquiry transaction, it might well be acceptable for Peter tosee a total balance of $9,100 instead of $10,100 if he only needs to ensure that he has sufficient funds tocover his tuition fee, say, $5,000. Isolated-only transactions (Lu and Satyanarayanan, 1995) are proposed toreduce the impact of client disconnection. N-ignorance (Krishnakumar and Bernstein, 1994), boundedinconsistency (Wong, Agrawal, and Mak, 1997), and update consistency (Shanmugasundaram,Nithrakashyap, Sivasankaran, and Ramamritham, 1999) are some of the common weaker forms ofcorrectness criteria for database accesses. They would try to ignore some of the operations in a transaction orallow them to be executed out-of-order in some controlled manner. Taking bounded inconsistency as anexample, the concept of a resolution set is proposed for each operation, which may be serialized out-of-order.In particular, commutative operations such as deposit and withdraw (assuming sufficient fund) can beexecuted in any order. However, deposit or withdraw conflicts with balance. When a new operation balance isconsidered for admission to a set of admissible concurrent operations of deposit and withdraw, there can be amaximal difference in value equal to the sum of the amounts requested by the deposit and withdrawoperations. With respect to Figure 4, let us replace the interest operation by the balance operation. Now, theresolution set for the balance operation to account Saving will be {9000, 10000}. The maximal deviation is$1,000. If this deviation is acceptable to the client at that moment, the operation is allowed to be executed andis included in the set. Performance studies on bounded inconsistency by Wong, Agrawal, and Mak (1997)indicate that there is a significant improvement to the degree of concurrency. N-ignorance is similar in natureto bounded inconsistency, except that the degree of ignorance is on a transaction basis rather than on theoperation basis.

Regardless of whether serializability or its weaker form is adopted, a common avenue to improve transactionprocessing throughout in a mobile environment is to utilize the broadcast bandwidth effectively. The databasecan be broadcast and transactions can be processed against the broadcast database. This is very useful forread-only transactions (Pitoura and Chrysanthis, 1999), because it is sufficient to catch a consistent set ofdata items over the broadcast. To enable update transactions to be processed, the hybrid transactionprocessing protocol by Mok, Leong, and Si (1999) ensures serializability by performing validation for updatetransactions and utilizing the uplink channel to request for additional data items not readily available over thebroadcast. Consistency across data items is ensured through the use of timestamps. We will discuss theconsistent broadcast when we describe the broadcast manager later.

Shanmugasundaram et al. (1999) propose the notion of update consistency, a weaker form of serializability. Inupdate consistency, a mobile client is only required to see updates made at server consistent with the values itreads, without having to follow the same serialization order as those observed by other mobile clients. Forinstance, assume that the server is broadcasting updated stock prices for SUNW and ORCL. Two mobileclients, A and B, inquire about the stock price. The global history H = readA(SUNW,64) write1(SUNW,65)commit1 readB(SUNW,65) readB(ORCL,28) write2(ORCL,29) commit2 readA(ORCL,29) may be resulted,where the server is executing update transactions T1 and T2 and the mobile clients are executing TA and TB,

respectively. Clearly, H is not serializable. However, for A, it observes a partial history, HA = readA(SUNW,64)write1(SUNW,65) commit1 write2(ORCL,29) commit2 readA(ORCL,29), which is serializable with respect toupdates made at the server. Similarly for B, the partial history HB = write1(SUNW,65) commit1readB(SUNW,65) readB(ORCL,28) write2(ORCL,29) commit2 is also serializable. Assuming that A and B areindependent, both HA and HB will be acceptable; thus H should also be acceptable in order to improve systemperformance. H is said to be an update consistent history. The cycle-based algorithm by Shanmugasundaramet al. (1999) can guarantee update consistency.

In traditional database applications, it is often only necessary to control concurrent accesses to a singledatabase system. With the rise of e-commerce and m-commerce, it is becoming more imminent thatsimultaneous access to multiple databases, which are maintained by different organizations, will become a

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (61)

norm rather than an exception. A collection of database systems organized in a coherent way, and functioningin a cohesive and collaborative manner, is often referred to as a federated database system (Fang,Ghandeharizadeh, McLeod, and Si, 1993; Lim, Hwang, Srivastava, Clements, and Ganesh, 1995). In certainapplications, it is important to provide consistent accesses to those multiple databases with support for atransaction-like behavior across them. This stronger correctness criterion is called global serializability(Breitbart, Garcia-Molina, and Silberschatz, 1992). The distributed activity accessing the multiple databases(or multidatabase system) is called a global transaction. Consider the example in Figure 4 again. Now,assume that the two accounts are at two different banks and that the interest calculation becomes a requestby the government to determine the balance of Peter's accounts for assessing taxation. There are fourtransactions: withdraw(bankB,1000), deposit(bankA,1000), balance(bankA), balance(bankB). A similarscenario to the one shown in Figure 4 would occur if each bank executes its transactions in a serializablemanner but without coordination. The government would observe a balance of only $9,100. On the other hand,executing the transfer and balance enquiry as two global transactions would always produce the correctbalance of $10,100.

In the past, creating a federated database system could involve a lot of coordination efforts, both at thesystem level and the enterprise managerial level. Furthermore, the execution cost of the global transactions, interms of concurrency control and atomic commitment, can be very high. As a result of these factors, globaltransactions have not been widely adopted, despite their usefulness and convenience. Rather, multiplesubtransactions were commonly executed on individual databases without achieving the global serializabilitystandard. In other words, under existing systems, it is likely that the government in the above example wouldobserve a total balance of $9,100 for Peter, and yet the accuracy of bank records is taken for granted.

Riding on the wave of the adoption of the Internet computing paradigm, more and more companies are willingto publicize their databases as part of their drive towards e-commerce. Under most cases, these databasescan be accessed from outside the company via a Web interface, and they are gradually moving from an HTMLrepresentation to an XML representation of the data, thereby promoting data interchangeability and systeminteroperability. With these recent developments, the ability to access consistent information using globaltransactions in a federated database system becomes even more useful and more manageable. Althoughupdates to databases are normally restricted in a nonfederated database environment, we can witness moreand more databases becoming enabled for the execution of read-only transactions by external parties (limitedto certain predefined database views). As a result, the use of global transactions for "loosely" federateddatabases could become more popular. Furthermore, the presence of a high proportion of read-onlytransactions can render the concurrency control for global transactions far more efficient. To further reduce theoverheads of global transaction processing, one can relax the stringent global serializability requirement toallow a controlled degree of inconsistency, such as with N-ignorance (Krishnakumar and Bernstein, 1994) orupdate consistency (Shanmugasundaram et al., 1999) and exploit the abundance of read-only transactions.Relaxed requirements still provide a better correctness guarantee than most existing approaches which ignoreglobal serializability completely.

To enforce global serializability, there are different well-defined concurrency control protocols. In the OptimisticTicket Method by Georgakopoulos, Rusinkiewicz, and Sheth (1994), the concept of ticket updating isintroduced, which causes direct conflict among different global subtransactions at local database systems.This can prevent the development of the indirect conflict that cannot be readily detected by the multidatabasesystem. In this approach, a global serialization graph is maintained to validate all global transactions beforetheir commitment. In other ticket-based methods, tickets may be updated at different moments by a globaltransaction (Hwang and Son, 1996). The Implicit Ticket Method (Georgakopoulos, Rusinkiewicz, and Sheth,1994) takes advantage of certain local database systems, which allow only serialization orders that areconsistent with the transaction commitment order. It achieves global serializability by controlling thecommitment order of global transactions, and hence their serialization order, without maintaining tickets.

Owing to the complexity of global transaction processing and the resource limitations of mobile clients, it issensible to migrate the coordination effort to the proxy server and the Web server, thereby relieving the mobile

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (62)

clients from the complex processing. This is especially important in the context of WAP devices. As such, wepropose a database access architecture that will decouple the transaction processing mechanism from theapplication logic. We make use of agents to combat the disconnection problem. The agent can act on behalfof the client for event-driven transactions, such as stock selling transactions or auctioning. Support for globaltransactions can occur primarily on the wired network through the agent. Proper exchange of data items canbe conveyed to the client via the proxy architecture.

In the rest of this chapter, we first describe the architecture of our mobile global transaction processing systemand then describe the major components as well as discuss some of the design issues in the next section.The support for global transactions with global serializability is described in the section, Supporting GlobalTransactions for Mobile Clients. More effective processing of read-only global transactions that is achieved byexploiting the consistent broadcast cache is also examined. Next, the issues associated with providingservices to disconnected mobile clients and handling the integration of data updates to the database systemsare also investigated. Finally, we conclude with a brief discussion on some of the challenges for practical m-commerce systems.[1]Our research group is building a prototype for location-dependent querying based on Bluetooth andmiddleware, called BluePoint.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (63)

System Architecture

The overall system architecture to support both conventional and global transactions generated by mobileclients in the wireless Web-based environment is illustrated in Figure 5. We adopt a geographic-basedhierarchical structure (Choy, Kwan, and Leong, 2000) for our transaction processing architecture. There is onebase station server (BSS) for each cellular structure and a regional server for a number of neighboring basestation servers. The BSS is normally associated physically with the base station or mobile support station ofthe cellular wireless communication structure. It plays the role of a proxy server in the context of Webbrowsing, and this is similar to the role that the base station serves as the entry point for mobile clients in acell or the role that the firewall/proxy serves as the first contact point to clients residing inside a department ofan organization. To improve redundancy, fault-tolerance and load balancing capability of the BSSs, we couldexploit multiple regional servers to organize these BSSs in a hierarchical manner (Choy, Kwan, and Leong,2000), or we could even associate several regional servers with each BSS, with say, a primary serverapproach.

Figure 5: System architecture

In our architecture, there are two types of mobile clients: resource-rich laptop computers and resource-poorWAP devices. They communicate with the BSS serving the cellular structure covering these mobile clients.The BSS deals with the mobile client interface issue and communicates with the regional server to carry outthe necessary m-commerce activities. As with the architecture by Choy, Kwan, and Leong (2000), the regionalserver will possess better computational power, and it acts as a concentrator of requests from different BSSs.It houses the major components and computational processes for the dedicated functionality. Within theregional server, there is a transaction coordinator thread, which is normally realized as a Java servlet, for eachactive transaction to access the remote databases. This coordinator thread accesses the databases for eithera conventional transaction, through mechanisms such as RPC (remote procedure call) or RMI (remote methodinvocation), or a global transaction by maintaining contact with multiple database servers; it executes a 2PC-like protocol (Two Phase Commit) (Bernstein, Hadzilacos, and Goodman, 1987) at the end of the transactionto install the updates. The presence of a high proportion of read-only subtransactions in the Web-enabled m-commerce environment is highly beneficial in yielding a higher commitment rate to the global transactions.This is due to the reduced degree of conflict among subtransactions at each local database system as well asthe reduced cost incurred in the 2PC-like protocol for the database servers servicing read-onlysubtransactions. To support the execution of global transactions, individual local database systems shouldprovide appropriate mechanisms that can serve as a bridge to the remaining system components.Architectural details and functionalities for the different system components will be discussed in thesubsequent subsections.

Local Database System

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (64)

A conventional transaction that accesses only one single database is referred to as a local transaction, incontrast with a global transaction that spans across several databases. Although a local database systeminherently supports the execution of local transactions, additional components are incorporated to supportglobal transactions. In our design, we exploit the transaction server to serve as the bridge between the localdatabase system and the external world. As we will see in the next subsection, the transaction server interactswith the transaction coordinator at the regional server to support global transaction processing. To thedatabase server, the transaction server acts as the database client. To the rest of the system, it serves as aparticipant site to the distributed transaction, which is under the coordination of the transaction coordinator.The local database system does not see any other system component beyond the transaction coordinator.The structure inside an individual local database system is depicted in Figure 6.

Figure 6: Structure of a database system supporting global transactions

In Figure 6, the transaction server receives subtransactions containing database operations intended for it thatwere sent from the transaction coordinator; it then passes them to the transaction manager for execution.There is a division of labor in the design between the transaction server and transaction manager. Althoughthe transaction manager is inherently a built-in component, the transaction server is a bridging component thata local database system should possess in order to process global transactions. The flexibility of such adesign lies in the possibility of imparting minimal changes to the existing local database system. Additionalprocessing need for information pertaining to the support of the global transactions is intended to be handledin the transaction server as much as possible.

The transaction server behaves like a "proxy" for the transaction coordinator at the local database system. It isconsidered as a "special" component (represented within a dotted box), because it may contain some foreignflavor. In particular, with an agent-based implementation, it may be realized as a place for foreign agents tovisit (Yau, Leong, and Si, 2001), which pass operations on to the transaction manager and gather and processstatus information. The use of agents provides maximal flexibility to the local database system to supportdifferent types of global transaction processing mechanisms. In the Java context, it can be implemented bymeans of exported Java objects and interfaces, so that the transaction coordinator can send it the databaseoperations and gather results by means of RMI. We have explored the possibility of using RMI for this purpose(Leung, 1998). In a more traditional context, it can be implemented as a process listening to a certain TCPport and accepting connections from the transaction coordinator for operation specifications through sockets.

The transaction manager in a local database system receives and processes operations for local transactionsthat originate from within its own organization. To support global transactions, the transaction manager mustalso handle operations from global transactions. The functionality and autonomy of the database system isgoverned by the behavior of the transaction manager, which coordinates and schedules the operations itreceives from the two groups of transactions for execution, through its own concurrency control and recoveryprotocols. Quite often, no changes are needed at the transaction manager for global transaction processing.For instance, provided that the original local database system supports distributed transactions, theinformation pertaining to the implementation of the distributed 2PC protocol, such as the status of whether anactive subtransaction can be committed or not (the ready-to-commit response), is automatically available from

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (65)

the system. With this return status from the transaction manager via the transaction server, the transactioncoordinator at the regional server can ensure the atomicity or atomic commitment of the associated globaltransactions.

In certain global transaction concurrency control protocols, information ppertaining to the local serializationorders of global subtransactions is useful to ensure global serializability of global transactions. One way tokeep the serialization order of global subtransactions at the local database system totally under control is tohave the transaction server force artificial conflicts on shared data. Nevertheless, this can lower the degree ofconcurrency of the global subtransactions. Therefore, although it is possible to maintain the serializationinformation at the transaction server without changing the transaction manager, it would often be far moreefficient to make a minor modification to the local transaction manager, which can provide such information atminimal cost.

Regional Server

The regional server acts as a concentrator of global transactions from different mobile clients, which submittheir requests via BSSs. Figure 7 depicts the architecture of the regional server. The core transactionprocessing mechanisms for global transactions are supported, together with the different mechanisms for datadissemination via broadcast scheduling, caching and refreshing, and transaction validation and disconnectedtransaction reconciliation. The transaction controller accepts formulated transactional operations from theapplications at BSSs in a format that is independent from the user interface (regardless of HTML or WML). Italso maintains relevant book-keeping information. To support transaction processing over a broadcastdatabase, the broadcast manager maintains a set of mutually consistent data items that are ready to bebroadcast to a collection of mobile clients via the BSS. It also maintains important data structures to keeptrack of the set of hot data items that are eligible to be scheduled for broadcast (data dissemination). The dataintegrator receives updates from mobile clients via BSSs that are made during the disconnection mode ormade with respect to the broadcast database, and then confirms with their validity before passing them on tothe remote database systems for installation.

Figure 7: Structure of a regional server

The transaction coordinator behaves like the coordinator processing a distributed transaction. It interfacesdirectly with the transaction servers at various participating local database systems. To ordinary "local"transactions submitted by mobile clients for accessing a single database system, the coordinator merelybecomes a transceiver, passing on the operations from the "local" transactions and returning the result sets.In general, the coordinator organizes the operations that compose a global transaction into subsequences ofoperations, creating different subtransactions, with one subtransaction per participating database. To improveefficiency, we try to perform request batching. In particular, several operations composing the samesubtransaction can be grouped into one single aggregate request to be transferred to the individual localdatabase systems. This aggregate request can be in the form of a TCP message, an RPC, or an RMI. One ormore result sets will be returned for an aggregate request that contains multiple read operations.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (66)

The transaction controller can be modeled in the form of a Web server, or it can be coupled with a Web serverat the regional server to support the Web-enabled environment. Through the Web server, it can provide Webservices, accepting client requests encoded in HTML or XML formats. In the past few years, XML has evolvedvery rapidly into one of the most important data interchange standards so that a proper support mechanism forXML has become essential. There are also an increasing number and different types of systems supportingXML-based data repositories, or even XML databases (Luk, Leong, Dillon, Chan, Croft, and Allan, 2002).

The transaction controller monitors, controls and schedules the execution of both "local" and globaltransactions, through cooperation with the transaction coordinator, broadcast manager and data integrator. Itkeeps track of the identities of mobile clients, their initiated transactions, and the set of operations from thosetransactions. This information is useful for various accounting and statistical purposes, such as determiningthe set of data items of high affinity to the mobile client population for potential broadcasting by the BSSs.Other useful information can include the readset and writeset of the transactions to be used later for validationpurpose.

The broadcast manager maintains a consistent broadcast cache, ready to be broadcast via the BSSs. Aconsistent broadcast cache is a data structure that holds a collection of data items that are mutuallyconsistent. In fact, a consistent broadcast corresponds to a snapshot of the database, or collection ofdatabases, on a set of selected data items at a "quiescent" point (in the absence of executing transactions).Operationally, such a consistent broadcast corresponds to the result set returned by a read-only transactionreading the set of data items of interest. An example of a consistent broadcast of the balances for three bankaccounts is illustrated in Figure 8. In this example, the respective balances for the three accounts, namely,(Checking,3100), (Saving,2000) and (TimeDeposit,13000), are consistent because they reflect a snapshot inwhich both transfer transactions of $2,000 from TimeDeposit to Checking (T1) and $1,000 from Saving toChecking (T2) have been performed, but the transfer transaction of $3,000 from TimeDeposit to Saving (T3)has not yet taken place. The sum of the balance remains the same as before, i.e., $3,100+$2,000+$13,000 =$100+$3,000+$15,000. Note that a direct snapshot taken vertically (i.e., at the same time) may reflectbalances of (Checking, 2100), (Saving, 2000), and (TimeDeposit, 13000), and it is not consistent. In particular,the read-only transaction that returns such a consistent snapshot could be a global transaction that returnsresults from several database systems and potentially reads a large amount of data items. Techniques forreturning the values for a large collection of data items by a read-only transaction can be found in Barghoutiand Kaiser (1991).

Figure 8: An example of a consistent broadcast cache

The consistent broadcast cache is indexed by the identity of the individual database systems and perhapsalso by the geographical location of the data items. Appropriate data items in the broadcast cache areselected by BSSs for broadcast to their mobile clients. Periodically, the broadcast manager determines theaccess patterns of the clients and the aggregate access patterns of data items from the statistical informationmaintained by the transaction controller. A possible way to determine the set of useful data items for broadcastis based on the approach by Leong and Si (1997). The data items can be organized in the form of a flattenedB+tree for broadcast, as in some existing approaches (Imielinski, Vishwanathan, and Badrinath, 1994; Tanand Yu, 1998). Alternatively, one may consider structuring them in semantic chunks as proposed by Lee,

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (67)

Leong, and Si (2000b). Since the maintenance of item consistency and the selection of broadcast items areorthogonal to the way they are organized for broadcast, we concentrate on the discussion of the former andmore important issues in this chapter. To ensure the recency and consistency of the set of data itemsbroadcast, the broadcast manager can refresh the data items through a large read-only transaction. Mobileclients reading the set of broadcast items in the same broadcast cycle are guaranteed transactionalcorrectness (Mok, Leong, and Si, 1999). Thus, they can choose to process read-only transactions based onthe broadcast (Pitoura and Chrysanthis, 1999) or to read data items from the broadcast and to send updaterequests for data reintegration.

The data integrator manages an upstream update queue, which holds updates to data items made by updatetransactions that need additional processing, besides managing conventional global transaction processing.One kind of information received by the data integrator is the information pertaining to individual mobile clients.Another kind of information is updates made by a mobile client based on data values that it obtains from thebroadcast. The updates must be installed back to the databases, after being validated for consistency withconcurrently executing transactions. Finally, there are also updates made by a client in a disconnected mode.All these disconnected transactions must be validated and reconciled against the databases to ensure thatthey are consistent with transactions of which they are unaware.

The fundamental mechanism for data reconciliation, which is performed at the data integrator, has beendiscussed in depth by Davidson (1984). In particular, the concept is to determine a set of undesirabletransactions that should be aborted. All the remaining transactions can then be committed. Intuitively, the setof transactions executed can be modeled as a serialization graph, which is a form of precedence graph. Toreconcile updates made in several executions, the histories representing the executions are merged. If there isno cycle in the precedence graph for the merged history, then the executions are compatible and there is noundesirable transaction. When there is a cycle, we can select a certain number of transactions to be aborted,in a similar way to how we can select some victim processes to break a deadlock cycle. The victimtransactions selected for abortion are called undesirable transactions. The difficult part is to determine theoptimal set of undesirable transactions to be aborted. Unfortunately, finding the optimal set is known to be anNP-complete problem. Several suboptimal strategies have been proposed and evaluated by Davidson (1984),and the one used to break two-cycles appears to be close to optimal, in general.

One can draw an interesting observation to the three transaction-related components, which arecommunicating with the transaction coordinator. The transaction controller is generic for handling transactionsfrom mobile clients. The broadcast manager appears to be executing large read-only transactions to preparefor consistent sets of broadcast data, maintaining appropriate indexing and timing information to the broadcastdata for mobile clients. The data integrator handles update transactions, which are "pseudo"-committed at themobile clients, ready to be confirmed for validity through the validation process. The actual updates by thetransactions can be made within a relatively short period, since all the operations are known, together with theexpected values or result sets. These components will exchange information about transactions with thetransaction coordinator, which maintains the relevant information carefully to ensure that all transactions canbe executed in a harmonious manner.

Base Station Server

Figure 9 depicts the structure of the base station server, which is responsible for communicating with themobile clients through the Web-based interface. A laptop mobile client has a higher computational power andcan also interact with the BSS through standard HTTP using HTML or even XML Web pages. However, aWAP device mobile client only possesses a low computational power and can only interact with the BSSthrough WAP using specially formatted WML pages. To enable the BSS to cater for both types of mobileclients, the WAP gateway can be utilized to translate the standard HTML or XML Web pages into WML pages(Tai, 2001). Alternatively, two different sets of HTML and WML pages can be designed (Lo, 2001). To abstractout the commonality, we can associate the interfacing mechanism with each individual application by providing

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (68)

a simple annotation mechanism to guide the automatic translation. Application business logic is embedded inthe applications, which are designed through the use of a set of well-defined application programminginterfaces (API). We have developed an API suitable for the design and implementation of global transactionsin the Internet environment (Leung, 1998) and in the WAP environment (Lo, 2001). Depending on the natureof the mobile client, the modules within the API interact with the appropriate proxy. For regular mobile clients,the modules interact with the server proxy, while for resource-poor WAP devices, they talk to the WAPgateway instead. In the former situation, there is a corresponding client proxy associated with the mobileclient, as depicted in Figure 5. The pair comprising a server proxy and client proxy achieves a division of laborto improve the overall system performance. Technically, the pair of proxies can be referred to as a serverintercept and a client intercept, and this is a variation of the traditional Web client/server model to alleviate thenegative impact of the wireless links (Housel, Samaras, and Lindquist, 1998). In the latter case, the WAPgateway normally delivers the WML pages directly to the WAP devices, because we would not expect to getmuch processing power out of those devices. As such, the client proxy can be considered to be minimal oreven null, with the transmission optimization capability defined precisely by the WAP and managed at theclient side by the WAP browser.

Figure 9: Structure of a base station server

The server proxy is a standard proxy that interacts with the mobile client to support the necessary databaseservices through the use of HTTP or other more efficient interaction protocols. An appropriate transcodingmechanism (Bharadvaj, Joshi, and Auephanwiriyakul, 1998) to reduce the size of the transmitted data can beimplemented. The server proxy also helps to return updates, which are made to cached data items by mobileclients during disconnection for transactions, back to the regional server for reintegration. Upon reconnectionof a mobile client, transactions executed in the disconnected mode must undergo the process of validationand reconciliation. This task is performed by the data integrator at the regional server. Finally, this serverproxy can implement the data broadcasting mechanism for mobile clients. The data items to be broadcast areselected from the consistent broadcast cache maintained by the broadcast manager at the regional server. Itcan also select data items with respect to its geographical location and ignore those in other locations(location-dependent information). The data items selected to be broadcast are first stored in a downstreambroadcast queue and then transmitted to the mobile clients using appropriate mechanism such as a UDPbroadcast or a channel expressed as CDF (Channel Definition Format) documents in a subscription-basedWeb environment. To serve a mobile client that is a WAP device, the server proxy will be replaced by theWAP gateway. It translates the information into WML pages to be transmitted to the WAP device client.

The client proxy located at the mobile client will carry out the appropriate actions in correspondence with theserver proxy, but it may not be necessary to support the full set of functionality. In particular, mobile clients canexecute a number of read-only transactions using the broadcast data items by considering them to come froma broadcast disk (Acharya, Alonso, Franklin, and Zdonik, 1995), since the data items are guaranteed to beconsistent by the broadcast manager (see section 3.2). Furthermore, the broadcast data items can be cachedin client local storage with timestamp or cycle information, for future support of read-only or disconnected

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (69)

transactions (Chan, Leong, Si, and Wong, 1999). The client proxy for a WAP device can be considered adirect add-on to the WAP browser. Owing to the low computational power of the device, it may not be able toutilize the data broadcast well.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (70)

Supporting Global Transactions for Mobile Clients

There are two major types of transactions to be supported for mobile clients: local transactions accessing datain only one local database and global transactions accessing data in several databases. Although traditionalconcurrency control protocols can handle local transactions (assuming that all local database systems supportlocal transaction processing), there must be some cooperation from the local database systems to supportglobal transaction processing. We will first describe how global transactions can be processed in a regulardistributed environment. We then proceed to consider making use of the broadcast data at the broadcastmanager and performing data reconciliation at the data integrator to improve transaction processing efficiency.

Global Transaction Processing

The correctness criterion for global transaction processing is global serializability. There are many differentmechanisms that can be used to ensure global serializability. A simple solution is achieved by means oftimestamp ordering (thereby establishing a global ordering). Each global transaction is assigned a uniquetimestamp, which is carried to the local database systems. All transactions at a local database are serialized intheir timestamp ordering. This ensures global serializability. Besides its simplicity, an added advantage of suchan approach is its freedom from deadlock, which is expensive to detect and resolve. However, there is adrawback that timestamps generated by local transactions have to be kept roughly synchronized with those ofglobal transactions. Otherwise, excessive abortion is experienced by the transactions with small timestamps.Furthermore, the degree of concurrency is not as high in timestamp ordering as in 2PL (Two Phase Locking),as evidenced from performance studies on various concurrency control protocols.

Another common solution is realized when the strict 2PL concurrency control protocol is adopted by allindividual database systems. An important advantage of this approach is that it comes almost for free, sincemost practical databases adopt the strict 2PL as their primary concurrency control protocol because of itsefficiency and higher throughput in practice. The major problem with 2PL is that it is deadlock-prone. Globaldeadlock detection involving a number of databases is much more difficult, and resource wait-for graphinformation has to be made available to the deadlock detection mechanism. Revealing resource wait-forinformation may not be desirable in practice, since it could expose too much internal information of theindividual database systems.

A simple modification to the 2PL mechanism to avoid the necessity of global deadlock detection is to allowdeadlocks to be detected and resolved locally, using an appropriate timeout mechanism to handle globaldeadlocks. Local deadlocks are detected and resolved periodically by individual database systems.Subtransactions for global transactions are associated with a deadlock timer. This timer is maintained by thetransaction coordinator. When the timer goes off, the global transaction is assumed pessimistically to beinvolved in a deadlock, and it is aborted by the coordinator. The timer is reset when a new operation from theglobal transaction arrives or when a result set is returned. To cater for possibly belated transmission of theoperations for a subtransaction from mobile clients, due to a poor wireless connection, this timer value can beadjusted adaptively. Note that this timer is not the deadlock timer that is set by the local deadlock detectionmechanism at individual databases.

It is not always possible to assume that all participating database systems employ the 2PL concurrency controlprotocol. A conservative mechanism that can be easily implemented to operate on database systems withheterogeneous concurrency control protocols is the definition and use of the site lock, one for each databasesystem. A global transaction must obtain a site lock before it can submit a subtransaction to the databasesystem at a particular site. This simple mechanism prevents global transactions from executing on conflictingsites, thus dismissing the potential problem of being serialized in different ways on different database systems.A disadvantage is that global transactions can suffer from performance degradation for the loss of a certaindegree of concurrency. Other concurrency control protocols can also be implemented (Georgakopoulos,

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (71)

Rusinkiewicz, and Sheth, 1994).

Utilizing the Consistent Data Broadcast

The broadcast paradigm is effective in a mobile environment for the dissemination of information to a largecollection of mobile clients (Lee, Leong, and Si, 2000b). With a data broadcast comprising a consistent set ofdata items, read-only transactions can be processed at a low cost against the broadcast. The broadcastmanager at the regional server maintains a consistent set of data items in its broadcast cache, whosecontents could come from the result set for a large read-only transaction. We observe that mobile clientsreading the set of broadcast items in the same broadcast cycle are guaranteed transactional correctness(Mok, Leong, and Si, 1999) because the broadcast represents a consistent snapshot of the databases. TakingFigure 8 as our example again, in which there is a consistent broadcast containing three data items:(Checking,3100), (Saving,2000), and (TimeDeposit,13000). A credit-checking read-only transaction, Tc, maybe initiated by a credit card company that is only interested in the balance in Saving and TimeDepositaccounts. The read-only transaction can be executed directly using the broadcast values, and in this case it isa total balance of $15,000 at a particular point in time when both T1 and T2 have been committed. It ispossible that by the time the credit-checking transaction Tc is issued, the transfer transaction T3 has alreadybeen committed. The result is still correct because we can choose to serialize Tc before T3. In fact,serialization of read-only transactions to an earlier point can result in a good improvement in performance(Pitoura and Chrysanthis, 1999). Note that even if the set of broadcast items were an inconsistent one, forinstance, (Checking,2100), (Saving,2000), and (TimeDeposit,13000) blindly returning results for Tc would stillreflect the correct sum of $15,000 in this case, since Tc is not concerned with the balance of Checking.However, one is not always that lucky in avoiding the inconsistent items.

In the presence of updates to transactions processed through the broadcast data, the updates must bepropagated back to the database systems for installation. In particular, one has to validate the updates againstall concurrent accesses. In the research work by Mok, Leong, and Si (1999), an optimistic concurrency controlprotocol is adopted. We now modify the example from Figure 8, by considering an interest computationtransaction Ti, as illustrated in Figure 10. We assume that the interest rate is higher if the total balance of allaccounts exceeds a certain threshold, say, $100,000. Furthermore, no interest is paid on the balance in achecking account. Thus, the readset of Ti includes all of the three accounts, and the writeset includes bothSaving and TimeDeposit accounts. Though the read part is guaranteed to be correct, the updates need to bevalidated against concurrent updates occurring in the database systems. When validation is successful, theupdates are installed through a short update transaction. Note that Ti will not interfere with a concurrent credit-checking transaction Tc even if both are processed against the same set of broadcast items. This is because,irrespective of the actual submission time of Ti and Tc, Tc can return results from the broadcast and can be

serialized before Ti, as if it were transaction in the figure. In fact, the issue of processing data updatesand their installation to the database systems is quite similar to data reconciliation. As a result, we discuss thisin further details in the next section.

Figure 10: Utilizing the consistent broadcast cache

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (72)

To improve the flexibility of the data broadcast selection made by each BSS for its clients, the consistentbroadcast cache may be maintained in a multiversioned manner. Several versions of the cache produced withthe read-only transactions can be stored and indexed. This is particularly useful for time-stamp-basedprotocols, since a mobile client may have to read the correct data version in order to be able to commit. Usingmultiple data versions for time-stamp-based protocols can also be useful for data reconciliation upon thereconnection of a previously disconnected client, see the next subsection.

From another perspective, the set of data items in the consistent broadcast cache can be visualized in theform of a data warehouse, since it represents consistent information jointly available from a number ofdatabases. In addition to using a simple read-only transaction, possibly reading a large amount of data items,the consistency of the data warehouse can be maintained by different view update mechanisms (Zhuge,Garcia-Molina, Hammer, and Widom, 1995). In a general model, the set of data items broadcast during twoconsecutive cycles may be slightly different. It is possible that a client reading data item x from cycle c canonly read data item y from cycle c+1 (which is unavailable in cycle c). To determine whether the two items areconsistent, the cycle number (or the identity of the read-only transaction) can be included for cross-cycleconsistency checking (Shanmugasundaram et al., 1999). Mobile clients can choose to process read-onlytransactions based on the broadcast or to read data items from the broadcast and send update requests fordata reintegration. Alternatively, those updates can be transmitted together for data reconciliation in a batch,as if the client had been disconnected to reduce the cost of using the uplink channel, at the expense ofpotentially more conflicts.

Mobile Client Disconnection and Data Reconciliation

An additional dimension in transaction processing with mobile clients is the possibility of mobile clientdisconnection. In other words, mobile clients might have held locks for the operations they have initiated andthen been disconnected. Alternatively, mobile clients may have performed updates based on broadcast dataitems or even based on cached data items. Owing to disconnection, or otherwise, they may be unable to relayback those updates to the BSS and then the regional server for validation and installation. Furthermore, it ispossible that multiple mobile clients have made conflicting updates to the same set of data items, therebydictating the need for data reconciliation. These scenarios require validation of previously made updates, uponreconnection. This leads to the data reconciliation issue.

To combat the problem of mobile client disconnection, while holding locks for transactions, the locks held onbehalf of mobile clients could be like a "lease." Data items whose leases have expired will be unlocked. Leaseextension is required when the mobile client is still connected and accessing the data item. The leasemechanism can be implemented by the agents residing at the BSS, which act as surrogates for the mobileclients. This mechanism is, thus, transparent to the rest of the system. When the mobile client is still "alive"and connected, its agent can extend the lease for the client by continuing to hold onto the lock on the dataitem and requesting a reset of the deadlock timer. When the lease expires and the client has becomedisconnected, the agent releases the lock on the data item on behalf of the client. This arrangement canreduce deadlocks caused by mobile client disconnection. On the other hand, there are scenarios where mobileclients have delegated certain data access operations and decisions to the agents. With both delegation andlease renewal mechanisms, the deadlock timer can be set to a smaller value to terminate disconnected globaltransactions earlier. With the timeout mechanism at the transaction coordinator for global transactions, theautonomy of participating database systems can be preserved, as there is no modification required at thetransaction manager.

The data integrator at the regional server is responsible for data reconciliation of updates made by mobileclients. As mentioned previously, there are three major kinds of information to be considered for datareconciliation, namely, updates to private or personalized information "owned" by a mobile client, updatesmade based on information received over the consistent broadcast, and updates made by clients in adisconnected mode that are based on cached values. The differences between the second and third kinds of

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (73)

updates are the timeliness of the updates and the volume of transactions to be reintegrated. Both kinds ofupdates must be validated against the databases before they can be installed. Updates of the second kind areof a more instantaneous nature, occurring on a per-transaction basis for each mobile client. Updates of thethird kind are often of a batch nature, for a collection of interdependent transactions that are "pseudo"-committed by a reconnecting mobile client (Mok, Leong, and Si, 1999).

It is relatively easy to integrate private information or information pertaining to an individual mobile client. Thiskind of information logically belongs exclusively to a mobile client. A good example of this information includespersonal records for the user of a mobile client stored in a database system for his/her own organization.Updates to such "private" information as the user profiling information are conveyed to the appropriateinformation repository. It is natural to assume that a mobile client is the one who knows best about itself. Thus,a collision in updates would be resolved for the "owner" in favor of other conflicting updates by other clients.One can signify a subset of data items to be of a personalized nature, through annotation at the databases.Those data items then become associated with a particular mobile client. The data integrator can alwaysinstall updates made by the "owner" client to the databases, aborting other active transactions whennecessary. In most cases, those data items are only updated by transactions from the owner and quite oftenby update-only transactions.

To reintegrate updates of the second kind, that is, those made by clients in a connected mode after readingdata items from the broadcast, we can simply process the update transactions sequentially, since theynormally arrive in a sequential manner. The simplest validation mechanism is to compare the readset and thewriteset of the update transaction made by the mobile client with those transactions that have been committed,since the data items were read by the client, following the optimistic concurrency control protocol (Bernstein,Hadzilacos, and Goodman, 1987). In particular, the server will check backward for read/write conflicts andcheck forward for write/read conflicts. With a consistent broadcast cache, this process translates into checkingthe version number of the data items read from the broadcast cache with the current version number of thosedata items. Updates from validated transactions can then be installed to the databases by reexecuting thewrite operations of the validated transactions. To improve the commit rate of these update transactions, onecan apply a reprocessing approach by attempting to reexecute an update transaction and comparing thevalues of data items returned with the values in the original execution. The update transaction can becommitted if the values are consistent, even though there may be several update transactions changing thevalues of the data items in between (for instance, the system state remains the same when customer Areleases a booked seat, followed by the booking of the seat by customer B). Such an improvement effectivelyextends the notion of a conflict in the readset and writeset in conflict serializability to the notion of a reads-fromrelation in view serializability. This is because transactions executing under the same views produce the sameeffects on the database.

Reintegration of the third kind of updates is similar, except that there is now a list of transactions to bereintegrated, and the transactions are only submitted to the server quite some time after their creation. Thistime interval increases the potential for conflicts to develop and for a cascading abort of the reintegratingtransactions. The heuristics by Davidson (1984) could be employed to determine a near to optimal set ofundesirable transactions for abort. As the consistent broadcast cache may contain multiple versions of theconsistent set of data items, one can also employ the multiversion reconciliation mechanism to improve theperformance (Phatak and Badrinath, 1999). Further research is required to bring a good solution to thiscomplicated problem.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (74)

Concluding Remarks and Challenges

In this chapter, we have discussed the support of transactions, both local and global, to carry out consistentand atomic operations on multiple databases. This is achieved in the context of a Web-based mobileenvironment, intended to support primitive m-commerce applications. An architecture is described that iscapable of delivering the necessary functionality. In particular, we have considered issues such as the supportof global transaction processing and the separation of the interface design, the business logic and theapplication program development. Transactional access to databases has been isolated. As such, the sameglobal transaction processing mechanism can be used to develop applications that support clients utilizingWAP devices and those utilizing regular Web browsers simultaneously. We have also taken into account thesupport for data dissemination in the form of a broadcast database, via the broadcast manager with aconsistent broadcast cache. Processing of read-only transactions over the broadcast database can be veryeffective. On the other hand, updates made by transactions reading data items over the broadcast databaseand by disconnected transactions have to be validated and integrated back to the database systems throughthe data integrator. To reduce the reliance on the wireless network and the impact of client disconnection andmigration, agents can be considered and utilized in the design of the architecture.

A number of challenges remain to be addressed before a seamless integration of the architecture realizationinto a practical m-commerce system can be achieved, and we name a few here. Security and authenticationare the most important issues that have to be tackled, before an m-commerce application can be of anypractical value. No one would feel comfortable conducting any activity involving a moderately large amount ofmoney over an insecure network. Mobile clients such as WAP devices possess very limited computationalcapability, making the encryption overhead for good algorithms, such as RSA, too high to be practical. [2]

Second, a good payment infrastructure must be set up before m-commerce can be useful. This infrastructurecan basically be built upon the infrastructure available for e-commerce. This issue is currently beinginvestigated in our research laboratory. Global transaction processing with payment via a bank (Lo, 2001) onlyconstitutes one particular solution, but this solution requires preauthorization of the involved parties. Third, theuse of agents can consume quite a significant amount of resources, especially the code and the state of theagents, and this becomes more serious when they migrate. Fourth, there are many potentials and yetproblems to consider in the support of location-dependent queries. Some of them are concerned with not onlylocal information in a time-dependent manner, but also information in locations exhibiting certain spatialrelationships with the current location. Efficient spatial-temporal processing mechanisms should be provided.Finally, support for advanced applications other than database applications will be even more complicated, butthis still needs to be addressed. Those applications may dictate different problem solving requirements, forinstance, support for multimedia information retrieval and perhaps processing with real-time constraints. Inconclusion, there is still a long way to go for m-commerce research and its practical deployment.[2]Computational optimization must be done very carefully, since it could draw on a timing attack on themathematical property of the private key.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (75)

References

Acharya, S., Alonso, R., Franklin, M., & Zdonik, S. (1995). Broadcast disks: Data management forasymmetric communication environments. In Proceedings of the ACM SIGMOD International Conferenceon Management of Data (pp. 199–210). ACM.

Alonso, R., & Korth, H. (1993). Database system issues in nomadic computing.y In Proceedings of theACM SIGMOD International Conference on Management of Data (pp. 388–392). ACM.

Barghouti, N. S., & Kaiser, G. E. (1991). Concurrency control in advanced database applications. ACMComputing Surveys, 23 (3), 269–317.

Bernstein, P. A., Hadzilacos, V., & Goodman, N. (1987). Concurrency Control and Recovery in DatabaseSystems. Reading, MA: Addison-Wesley.

Bharadvaj, H., Joshi, A., & Auephanwiriyakul, S. (1998). An active transcoding proxy to support mobileweb access. In Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems (pp. 118–123).IEEE.

Breitbart, Y., Garcia-Molina, H., & Silberschatz, A. (1992). Overview of multidatabase transactionmanagement. VLDB Journal, 1 (2), 181–239.

Chan, B. Y. L., Leong, H. V., Si, A., & Wong, K. F. (1999). MODEC: A multi-granularity mobile object-oriented database caching mechanism, prototype and performance. Journal of Distributed and ParallelDatabases, 7 (3), 343–372.

Choy, M., Kwan, M., & Leong, H. V. (2000). Distributed database design for mobile geographicalapplications. Journal of Database Management, 11 (1), 3–15.

Davidson, S. B. (1984) Optimism and consistency in partitioned distributed database systems. ACMTransactions on Database Systems, 9 (3), 456–481.

Deshpande, P. M., Ramasamy, K., Shukla, A., & Naughton, J. F. (1998). Caching multidimensionalqueries using chunks. In Proceedings of the ACM SIGMOD International Conference on Management ofData (pp. 259–270). ACM.

Fang, D., Ghandeharizadeh, S., McLeod, D., & Si, A. (1993). The design, implementation and evaluationof an object-based sharing mechanism for federated database systems. In International Conference ofIEEE Data Engineering (pp. 467–475). IEEE.

Georgakopoulos, D., Rusinkiewicz, M., & Sheth, A. P. (1994). Using tickets to enforce the serializability of

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (76)

multidatabase transactions. IEEE Transactions on Knowledge and Data Engineering, 6 (1), 166–180.

Housel, B. C., Samaras, G., & Lindquist, D. B. (1998). WebExpress: A client/intercept based system foroptimizing web browsing in a wireless environment. ACM Mobile Networks and Applications, 3, 419–431.

Hwang, B., & Son, S. H. (1996). Decentralized transaction management in multidatabase systems. InProceedings of 20th International Computer Software and Application Conference (pp. 192–198). IEEE.

Imielinski, T., & Badrinath, B. R. (1992). Querying in highly distributed environments. In Proceedings ofthe 18th International Conference on Very Large Data Bases (pp. 41–52).

Imielinski, T., & Badrinath, B. R. (1994). Mobile wireless computing: Challenges in data management.Communications of the ACM, 37 (10), 18–28.

Imielinski, T., Vishwanathan, S., & Badrinath, B. R. (1994). Power efficient filtering of data on the air. InProceedings of the 4th International Conference on Extending Database Technology (pp. 245–258).Springer-Verlag.

Krishnakumar, N., & Bernstein, A. J. (1994). Bounded ignorance: A technique for increasing concurrencyin a replicated system. ACM Transactions on Database Systems, 19 (4), 586–625.

Lee, K. C. K., Leong, H. V., & Si, A. (2000a). Incremental view maintenance for mobile databases.Knowledge and Information Systems: An International Journal, 2 (4), 413–437.

Lee, K. C. K., Leong, H. V., & Si, A. (2000b). A semantic broadcast scheme for a mobile environmentbased on dynamic chunking. In Proceedings of the 20th International Conference on DistributedComputing Systems (pp. 522–529). IEEE.

Leong, H.V., & Si, A. (1997). Database caching over the air-storage. The Computer Journal, 40 (7),401–415.

Leung, H. C. (1998). Global transaction management in the Internet environment. Master's thesis, TheHong Kong Polytechnic University, Hong Kong.

Lim, E. P., Hwang, S. Y., Srivastava, J., Clements, D., & Ganesh, M. (1995). Myriad: Design andimplementation of a federated database prototype. Software—Practice and Experience, 25 (5), 533–562.

Lo, J. (2001). Mobile transactions based on WML pages. Technical report, Department of Computing,Hong Kong Polytechnic University, Hong Kong.

Lu, Q., & Satyanarayanan, M. (1995). Improving data consistency in mobile computing using isolation-onlytransactions. In Proceedings of the 5th Workshop on Hot Topics in Operating Systems.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (77)

Luk, R. W. P., Leong, H. V., Dillon, T. S., Chan, A. T. S., Croft, W. B., & Allan, J. (2002). A survey inindexing and searching XML documents. Journal of the American Society for Information Science andTechnology, 53 (6), 415–437.

Madria, S. K., Bhargava, B. K., Pitoura, E., & Kumar, V. (2000). Data organization issues for location-dependent queries in mobile computing. In Proceedings of International Conference on DatabaseSystems for Advanced Applications (pp. 142–156).

Mok, E., Leong, H. V., & Si, A. (1999). Transaction processing in an asymmetric mobile environment. InProceedings of First International Conference on Mobile Data Access (pp. 71–81). Springer-Verlag.

Mummert, L. B., Ebling, M., & Satyanarayanan, M. (1995). Exploiting weak connectivity for mobile fileaccess. In Proceedings of the 15th ACM Symposium on Operating System Principles (pp. 143–155).ACM.

Phatak, S. H., & Badrinath, B. R. (1999). Multiversion reconciliation for mobile databases. In Proceedingsof International Conference on Data Engineering (pp. 582–589). IEEE.

Pitoura, E., & Chrysanthis, P. K. (1999). Scalable processing of read-only transactions in broadcast push.In Proceedings of the 19th International Conference on Distributed Computing Systems (pp. 432–439).IEEE.

Pitoura, E., & Samaras, G. (2001). Locating objects in mobile computing. IEEE Transactions onKnowledge and Data Engineering, 13 (4), 571–592.

Shanmugasundaram, J., Nithrakashyap, A., Sivasankaran, R., and Ramamritham, K. (1999). Efficiencyconcurrency control for broadcast environments. In Proceedings of the ACM SIGMOD InternationalConference on Management of Data (pp. 85–96). ACM.

Tai, M. (2001). Formulating WML Web pages for mobile clients. Technical report, Department ofComputing, Hong Kong Polytechnic University, Hong Kong.

Tan, K. L., & Yu, J. X. (1998). Generating broadcast programs that support range queries. IEEETransactions on Knowledge and Data Engineering, 10 (4), 668–672.

Wong, M. H., Agrawal, D. & Mak, H. K. (1997). Bounded inconsistency for type-specific concurrencycontrol. Journal of Distributed and Parallel Databases, 5 (1), 31–75.

Yau, S. M. T., Leong, H. V., & Si, A. (2001). Multi-resolution Web document browsing in a distributedagent environment. In Proceedings of International Conference on Mobile Data Management (pp.279–281). Springer-Verlag.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (78)

Zhuge, Y., Garcia-Molina, H., Hammer, J., & Widom, J. (1995). View maintenance in a warehousingenvironment. In Proceedings of the ACM SIGMOD International Conference on Management of Data (pp.316–327). ACM.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (79)

Endnotes

1 Our research group is building a prototype for location-dependent querying based on Bluetooth andmiddleware, called BluePoint.

2 Computational optimization must be done very carefully, since it could draw on a timing attack on themathematical property of the private key.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (80)

Chapter 4: Techniques to Facilitate InformationExchange in Mobile Commerce

Overview

Aslihan CelikSanta Clara University, USA

Anindya DattaChutney Technologies, USA

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (81)

Abstract

Data management issues related to organizing and retrieving information from wireless channels have posedchallenges for the database community. In this chapter, we discuss data dissemination to mobile clients andpresent solutions that address the bandwidth and energy limitations resulting from short battery life of themobile units. We also add a subscription-based data access layer on top of this. Our solutions overall proposea secure and scalable wireless data dissemination architecture. Our broadcast organization and subscription-based access protocols are geared to work hand-in-hand to facilitate a complete content distribution solutionvia broadcasts.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (82)

Information as a Commodity

As more and more e-commerce applications are brought to the mobile platform, the users have increasinglybecome reliant on mobile data. Mobile commerce applications cover a wide range from short and multimediamessaging and wireless mail, to downloadable multimedia. Financial services, business-to-business m-commerce, as well as consumer m-commerce are areas that will potentially use mobile data. With theextensive use of location-based services, more data will be available to information providers for relaying tothe clients.

All these applications, when deployed, can quickly fill the airwaves and cause service disruption or servicequality problems. Therefore, it is important to distinguish the types and priorities of data and design theinformation exchange protocols accordingly. In the rest of this chapter, we will concentrate on "rapidlychanging data" that potentially has many users (e.g., stock market data) and present techniques todisseminate the data in an efficient manner.

The challenges of designing and implementing wireless networks are important ones for thetelecommunications research community. At the same time, data management issues related to organizingand retrieving information from wireless channels have posed challenges for the database community as well.Some of the software problems, such as data management, transaction management, database recovery,etc., have their origins in distributed database systems. In mobile computing, however, these problemsbecome more difficult to solve, mainly because of the narrow bandwidth of the wireless communicationchannels, the relatively short active life of the power supplies (battery) of mobile units, and the changinglocations of required information due to client mobility. Solutions to such problems should also adequately dealwith the requirement of securely accessing data from the wireless channels.

In this chapter, we will discuss data dissemination to mobile clients and will first present solutions that addressthe bandwidth and energy limitations resulting from short battery life of the mobile units. We will then turn ourattention to add a subscription-based data access layer on top this. Our solutions overall propose a secureand scalable wireless data dissemination architecture.

This chapter is organized as follows. After a brief introduction to the mobile data concept, we first present ageneral architecture, requirements and trade-offs in designing a data dissemination application. We thenpresent our solutions that provide 1) energy efficient and timely data delivery and access, and 2) subscription-based secure access to wireless data. We provide a brief literature review and outline the significance of ourwork and future research directions.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (83)

An Architecture for Mobile Information Exchange

In this section, we present the "broadcasting" paradigm in data dissemination. We first present a mobilearchitecture and describe the parameters. We then present the two problems that we are addressing in thischapter: the broadcasting problem and the subscription-based data access problem.

Mobile Architecture

A general architecture of a mobile platform was given by Dunham and Helal (1995) and is shown in Figure 1. Itis a distributed architecture where a number of computers, fixed hosts and base stations, are interconnectedthrough a high speed wired network. Fixed hosts are general purpose computers which are not equipped tomanage mobile units but can be configured to do so. Base stations are equipped with wireless interfaces andcommunicate with mobile units to support data access.

Figure 1: A general architecture of a mobile platform

The mobile units are battery-powered portable computers, which move around freely in a restricted area,referred to here as a geographic mobility domain. The size restriction on a unit's mobility is mainly due to thelimited bandwidth of wireless communication channels. To manage the mobility of units, the entire geographicmobility domain is divided into smaller domains called cells. The mobile discipline requires that the movementof mobile units be unrestricted within the geographic mobility domain (inter-cell movement).

The mobile computing platform can be effectively described under the client/server paradigm. Thus,sometimes we refer to a mobile unit as a client and sometimes as a user. The base stations are identified asservers. Each cell is managed by a base station, which contains transmitters and receivers for responding tothe information processing needs of clients located in the cell. We assume that the size of a cell is such thatthe average query response time is much smaller than the time required by the client to traverse it. Therefore,it will seldom occur that a user submits a query and exits the cell before receiving the response.

Clients and servers communicate through wireless channels. The communication link between a client and aserver may be modeled as multiple data channels or a single channel (Imilienski, Viswanathan, and Badrinath,1997). We assume a single channel since the objective is the efficient use of the overall bandwidth. Wefurther assume that this channel consists of both an uplink for moving data from client to server and adownlink for moving data from server to client.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (84)

Database Architecture and its Characteristics

The data in this application is characterized as rapidly changing (Datta, 1994); users often query servers toremain up-to-date. More specifically, they will often want to query the server for their data item of interest.Typical examples of this type of data are stock, weather, and airline information. We assume the following forfully characterizing our mobile database.

The database is updated asynchronously, i.e., by an independent external process. Also, such updatesarrive with high frequency, signifying that the database is rapidly changing. Examples of suchinformation are stock, weather, etc.

1.

Users are highly mobile and randomly enter and exit from cells. There is a parameter called ResidenceLatency (RL), which characterizes the average duration of a user's stay in the cell.

2.

User reference behavior is localized; e.g., some stocks are more popular than others.3.

Servers are stateless, i.e., they maintain neither client arrival and departure patterns nor client-specificdata request information (Imielinski et al., 1997). We assume a stateless server, because we believethat the cost of maintaining a stateful server in a mobile environment would be prohibitively expensive.We want to emphasize, however, that our scheme will work with stateful servers as well.

4.

Broadcasting Problem

Wireless networks differ from wired networks in many ways. Database users over a wired network remainconnected not only to the network, but also to a continuous power source. Thus, response time is the keyperformance metric. In a wireless network, however, both the response time and the active life of the user'spower source (battery) are important. While a mobile unit is listening or transmitting on the line, it isconsidered to be in active mode. Assuming a power source of 10 AA batteries and a laptop equipped with CD-ROM and display, estimated battery life in active mode is approximately 2.7 hours.

In order to conserve energy and extend battery life, a clients slips into doze (standby) mode, in which it is notactively listening on the channel. Clients expend significantly less energy in doze mode than in active mode.Therefore, one of the major goals of our scheme is to minimize the amount of time a client must spend inactive mode to retrieve the data items it requests.

The problem addressed may be captured by the following question: given that users are highly mobile in theirmobility domain, what are good strategies that the server can use to decide on what data to provide? Theassumption is that such strategies need to adapt to user demand patterns in the highly mobile environment.We are also interested in the question of retrieval strategies: given that good strategies are found, what aregood retrieval algorithms by which users can retrieve/download data from the server, with a minimum ofenergy expenditure? The basic idea is one of "mixed broadcasting," i.e., automatic as well as on-demandbroadcasting.

We define the following terms:

Access Time (AT): Access time refers to the time elapsed between query submission and receipt of theresponse.

Tuning Time (TT): Tuning time is the duration of time that the client spends actively listening on thechannel.

The meaning of these terms is illustrated in Figure 2. Consider a client who submits a request at time T0 andreceives the response at time T7. In this scenario, if the client listens continuously from the time a query issubmitted until the response is received, then:

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (85)

AT = TT = T7 - T0. On the other hand, if the client slips into doze mode intermittently, then TT is noticeablyless than AT, significantly reducing battery usage. In this case, AT= T7 - T0, and TT = (T7 - T6) + (T5-T4) +(T3-T2) + (T1-T0).

Figure 2: Access and tuning times

This results in energy conservation, as the client is in active mode for only short periods of time. The question,of course, is how to determine the smallest possible tuning intervals. An ideal approach appears to beproviding the client with precise knowledge of when its requested information will be broadcast.

Our aim is to find optimal points in the two-dimensional space of AT and TT. This becomes difficult, becausethere appears to be a trade-off between AT and TT; attempts to reduce one tend to increase the other. Forexample, access time is directly related to the size of the broadcast, i.e., AT is smaller for a smaller broadcastsize. On the other hand, providing information for selective auto-tuning, i.e., informing the user precisely whereits required data is located in the broadcast, reduces tuning time. However, inclusion of such tuninginformation would increase the overall size of the broadcast by including overhead, which in turn couldincrease AT. Conversely, eliminating this overhead will reduce AT at the expense of an increased TT, becausethe user will not know precisely when to tune in.

Subscription-Based Data Access Problem

In this chapter, we address another critical problem: providing secure access control in broadcast schemes.To get a feel for this problem, consider the classical broadcast environment, where an information serverbroadcasts to a large number of clients using a shared channel. Each broadcast consists of a number of dataobjects that clients are interested in. Each client is interested in a certain number of these objects andsubscribes to them. Subscription refers to a contract that each client enters into with an agent, which entitlesthe client to access a data object for a specific period of time. Once the contracted period for a subscription isover, the subscription is considered to have expired and the client cannot access the data object any longerwithout resubscribing. Therefore, broadcast protocols should provide adequate security and should scale wellwith the number of clients using the system.

Subscription-based access to broadcasts necessitates the use of encryption techniques in order to let only thelegitimate subscribers to access the broadcasts. Therefore, the broadcast protocols should have the ability todistribute encryption keys to clients in an efficient manner. We present protocols that add a security layer ontop of the basic broadcasting model discussed earlier. In this system, a server broadcasts data items over ashared communication channel, and clients tune in to the broadcasts to download their subscribed items. Weadd an access control layer that involves encrypting the data items and then adding smart controls on top ofthe encryption logic.

To enable the deployment of such applications, the following functionalities are necessary.

A client must only be able to access the data items that it is subscribed to. In other words, the accessto all items that a client is not subscribed to must be blocked. An intuitively natural way to tackle thisproblem is by encrypting the data items in some way.

1.

A client must only be able to access items as long as its subscription to that item has not expired. Thisis a non-trivial problem—clearly, in order to be given access to an item, assuming items are encrypted,

2.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (86)

a client needs to be provided with some sort of decrypting mechanism to retrieve this item. When itssubscription expires, however, the client is still left with the decrypting mechanism, which compromisessecurity. One obvious way of course is to change the security mechanism of a data item every time asubscription expires to that item. This is, however, prohibitively expensive, given the large number of(client, subscribed_item) pairs present in a system of reasonable size.

2.

The protocol(s) must be scalable, i.e., increasing the number of clients should not deteriorate thequality of service.

3.

Finally, the protocol that implements the above two functionalities must provide an adequate level ofsecurity, i.e., it should not be easy to breach the security provided by the access control mechanism.

4.

Essentially, the problem is one of secure data management in broadcasts. Given such an environment, in therest of this section we stipulate distributed protocols to help the simultaneous achievement of the goalsoutlined above.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (87)

Broadcasting Solutions

Two broadcasting solutions to the broadcasting problem specified above are the Variable Broadcast Size(VBS) and the Constant Broadcast Size (CBS) protocols. These techniques, first proposed in Datta, Celik,Kim, VanderMeer and Kumar (1997), seek to achieve a minimal tuning time while reducing the access time.However, it is important to understand the broadcast structure before explaining the protocols.

Broadcast Structure

Broadcast structure refers to the specific broadcast organization that we assume in developing our strategies.It is important to understand this structure in order to properly appreciate our protocols. We assume a (1, m)indexing strategy outlined in Imielinski et al. (1997). In this scheme, index information is provided at regularintervals in the broadcast. More specifically, a complete index is inserted m times in a broadcast at regularintervals.

Figure 3 illustrates our broadcast structure. A broadcast is a sequence of data blocks (containing data) andindex segments (containing access information) as shown in Figure 3A. Using the (1, m) data organizationmethodology, an index segment appears every 1/mth of the broadcast, i.e., there are m index segments.Clearly, each of the m data blocks is also of equal size. Each data block is composed of one or more dataclusters as shown in Figure 3B, where each data cluster consists of a collection of tuples of a single data itemof interest. For example, assume the broadcast consists of stock information, and each tuple is a triple<stock_id, price, market>. In such a scenario, the data items of interest would be represented by stock IDs.Consider a particular stock ID, e.g., IBM. All IBM records would comprise a data cluster. A data cluster mayspan more than one data block.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (88)

Figure 3: Broadcast structure

Data clusters are composed of data buckets (Figure 3C), which contain data records as well as some tuninginformation (denoted by the 5-tuple <X,Y,Z,N, EB> in the figure) explained below.

We assume that each client has its own items of interest (e.g., clients are not interested in all stocks, butinstead in specific ones). For the purposes of this study, we assume a client has a single data item of interest.As explained above, all records pertaining to this item appear in a specific data cluster which we refer to asthe client's Data Cluster of Interest (DCI). Within the broadcast, the data clusters are organized in order ofdecreasing popularity, such that the most popular item will be broadcast first, and the least popular item will bebroadcast last. This helps to reduce the access times for popular items.

An index segment is a series of buckets containing index tuples and some other special tuning information.We first describe the index tuples. Each index tuple consists of a 4- tuple, <K,B,C,EC>, that not only informsthe client precisely where the DCI appears in the broadcast, but also provides information about updates tothe cluster since the previous broadcast. The structure of the index segment is shown in Figure 3D. K, B, Cand EC are defined below.

K: The cluster's key value (e.g., for an IBM cluster, the key value is IBM).

B: The ID of the first bucket of the data cluster.

C: The offset from B to the first dirty bucket (bucket where changes have occurred since the lastbroadcast) of the data cluster. If all buckets in the data cluster are clean, C takes a default valueof -1.

EC: The time when the cluster is scheduled to be dropped from the broadcast.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (89)

The dirty/clean information (i.e., B and C) are included to handle the rapidly changing data scenario explainedearlier in this section. We assume a tree-like structure for the index. Thus, clients must begin reading theindex at the root in order to find the pointers to their DCIs.

As mentioned above and shown in Figure 3C and Figure 3D, all buckets, whether index or data, have aspecial tuple displayed as a 5-tuple <X,Y,Z,N,EB>. This information is provided to orient clients as they initiallytune in to a broadcast. The X, Y, Z, N and EB terms are defined as follows.

X: An offset to the first bucket of the next nearest index segment.

Y: An offset to the end of the broadcast, i.e., the start of the next broadcast.

Z: Shows the bucket's type (data or index) and contains tuning information for items updated sincethe previous broadcast. It can hold one of four possible values: Z = -2 indicates an index bucket.Z = 0 indicates a data bucket and that the bucket is clean, i.e., unmodified since the previousbroadcast. Z = i, where i is a positive integer, indicates a data bucket and that the bucket is dirty,i.e., modified since the previous broadcast. Moreover, the actual i value, i.e., the positive integer,is an offset to the next dirty bucket in the same data cluster. Z = -1 indicates a data bucket andthat it is the last dirty bucket of the data cluster.

N =0

Indicates a data bucket and that is the last data bucket of the data cluster.

N =i

Indicates that this is not the last bucket of a DCI, and the offset to next data bucket of the sameDCI is i.

EB: The expected departure time (EDT) of the data item in the bucket. Obviously, the EB value ofevery bucket in the same data cluster is going to be identical and equal to the EDT of the of thecluster key.

Protocols to Support Adaptive Broadcast Content and EfficientRetrieval

In the following, we describe two adaptive broadcast protocols which seek an optimal balance of access time(quality of service or average query response time) and tuning time (energy consumption) (Datta et al., 1997).

As mentioned earlier, periodicity is an important parameter in designing broadcast strategies. A periodicbroadcast signifies that the broadcast "size" (i.e., number of buckets) is fixed. One can ascribe bothadvantages (e.g., predictability) as well as disadvantages (e.g., loss of flexibility) to periodicity. To study sucheffects, we describe two sets of protocols below for the periodic and the aperiodic cases. We refer to theperiodic protocol as the constant broadcast size (CBS) strategy, whereas the aperiodic broadcast protocol istermed a variable broadcast size (VBS) strategy.

Finally, note that these protocols support a mixed mode retrieval policy, i.e., when a client arrives in a cell, itfirst tunes in to the broadcast to see if its DCI is already there. If not, the client explicitly sends a request to theserver through the uplink for that item. Thus items may be found readily in the broadcast or may have to beplaced "on demand." This policy has been deemed the most "general" policy in the literature.

Constant Broadcast Size Strategy

We first present the server protocol, i.e., the strategy used by the server in deciding upon the broadcastcontent. We then present the client protocol, i.e., how the client retrieves data from the broadcast.

CBS Server Protocol

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (90)

In this strategy, broadcast size is limited, and the broadcast is periodic. Periodicity mandates an equal size forevery broadcast (recall that we consider both size and time in terms of buckets). If there are too few requesteditems to fill the broadcast period, the broadcast will contain dead air. On the other hand, if there are morerequested items than space in the broadcast, the server must prioritize requested items to decide which toinclude in the broadcast set. This prioritization mechanism should simultaneously satisfy two properties:popularity consciousness and avoidance of chronic starvation. Popularity consciousness means that items thatare requested more often should have a greater chance of being included in the broadcast than less popularitems. Avoidance of chronic starvation means that if a client requests a "less popular" item, it should not bechronically starved, i.e., the item should appear in the broadcast at some point during that client's residence inthe cell. At a minimum, our protocol attempts (but does not guarantee) to provide access to a requested dataitem at least once during a client's probable stay in the cell; that is, within RL time of the request.

A system of priority ranking of items based on two factors, i.e., a Popularity Factor (PF) and an Ignore Factor(IF) is the following:

The popularity factor of item at time T, denoted by identifies the number of clients in the cell at time T

who are interested in X. When a client requests X, is increased by 1. However, every time it isincremented, the system records the corresponding time. Let the timestamp of the ith increment be denoted by

.. Then, a corresponding decrement of 1 is performed on the value of the popularity factor at time .This reflects the (anticipated) departure of the client whose request caused the ith increment.

The Ignore Factor (IF) is proposed to counterbalance the PF's effect. The IF ensures that less popular butlong-neglected items get an opportunity to be included in the broadcast. The IF of a data item X at time t issimply the number of broadcasts that this item has not been included in the broadcast (i.e., ignored) since itwas requested and is denoted by

Let TReq be the time the item was requested and PB be the period of the broadcast preset under the constantsize strategy. The ignore factor at a time Ti is defined as follows:

(1)

Priority computation using IF and PF: An item's priority can be computed based on the following expression:

(2)

where ASF is an Adaptive Scaling Factor which is an exponential weighting factor based on a nearestneighbor approach. Its purpose is to increase the likelihood that items which have been ignored for a long timewill appear in the broadcast. PF and IF differ largely in scale; if ASF is relatively low, PF dominates the priorityexpression (limited by the number of clients in a cell). If, however, an item has been ignored for a long time,we would like IF to dominate. A larger ASF value will achieve this. ASF is initialized to a base value for 1 for alldata items and reset to this base value each time the item is included in the broadcast. It is incremented whenthe average time the clients have been waiting for a data item exceeds a preset value.

Having explained the underlying concepts, we are now prepared to describe the server protocol forconstructing a broadcast. Prior to a broadcast epoch (the time at which a new broadcast is scheduled tobegin), i.e., in its broadcast preparation stage, the server prioritizes all items which have been requested, i.e.,items with a PF > 0, and sorts the items in order of descending priority. It then adds items to the broadcast setuntil the broadcast is full. For all requested but excluded items, their IFs are adjusted.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (91)

CBS Client Protocol

We now describe a client protocol designed to cleverly retrieve data from the broadcast in cooperation with theserver protocol defined above. When a client senses the need for a particular data item, it begins the retrievalprocess by tuning in to the broadcast at an arbitrary time and reading a bucket. We remind the reader that thedata cluster in the broadcast that holds the item of a client's interest is referred to as the Data Cluster ofInterest (DCI).

The random initial probe in a continuous flow of broadcasts creates a large number of tuning possibilities.Note that because we assume a tree-like rather than a linear index structure, the client must start reading fromthe top of the index segment (i.e., the root). If it does not find a pointer to its DCI (i.e., DCI is not in the currentbroadcast set), then it requests the item and tunes to the initial index of every succeeding broadcast untileither the DCI is found in the broadcast or it departs from the cell.

Variable Broadcast Size Strategy

Having discussed a periodic broadcasting strategy, we now turn our attention to an aperiodic broadcastingscenario. This strategy is called the variable broadcast size (VBS) strategy. Note that while the broadcast sizevaries across broadcasts, at the start of each individual broadcast the size is known; therefore, the start of thesubsequent broadcast is known as well. However, the server has no knowledge beyond that, as it does notknow what requests may arrive during the current broadcast.

VBS Server Protocol

The server protocol for VBS is much simpler than that for the constant size strategy. All requested items areincluded, i.e., all items with a PF greater than 0 are added to the broadcast set. The broadcast length changesas items are added and deleted. Items remain in the broadcast for RL units of time from their latest requestand are subsequently dropped from the broadcast set. Within the broadcast, items (i.e., DCIs) are orderedbased on descending popularity. Since no item is ignored, there is no notion of ignore factor in VBS.

VBS Client Protocol

The client protocol in this strategy is similar to that of the CBS strategy. The main difference is in the client'sresponse to finding that its DCI is not in the broadcast. Here, if its DCI is not in the broadcast, or if it hasmissed its DCI and the item will be dropped when the next broadcast is composed, the client requests the itemand exits from the protocol. Since its DCI is guaranteed to be in the succeeding broadcast, it begins theretrieval process at the beginning of the next broadcast and finds its DCI in that broadcast.

Performance of the CBS and the VBS Protocols

An empirical performance evaluation by means of an extensive simulation study reveals that the CBS and theVBS protocols perform differently under different system characteristics (Datta, VanderMeer, Celik, andKumar, 1999). The Access Time (AT) metric is used to measure the quality of the broadcasting service. Thesmaller the AT, the faster the clients are receiving their data items from the broadcast. The Tuning Timemetric, explained earlier, is originally proposed to approximate the energy expenditure of the clients thatdownload data from the broadcast. A more direct measure of the energy expenditure is the Normalized EnergyExpenditure (NEE). NEE is simply the energy spent on average by a client to download a bucket of data. Thesimulation study allows us to keep track of the energy spent by each client's mobile unit (a combination of theCPU, the disk, the mobile data card, and the display). NEE is derived by dividing the total energy that theclient has spent by the total number of data buckets that it has downloaded from the broadcast. In oursimulations, a bucket is 128 Bytes.

The simulation results distinguish between the hot and the cold items. Twenty percent of the data items arehot, meaning that they are more popular and requested more often then the cold data items.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (92)

The simulation is run for various client arrival rates that reflect the frequency of requests made to thebroadcast server. The arrival rates are represented on the horizontal axis in the figures.

The access times for the CBS and VBS protocols corresponding to clients that requested hot and cold clientsare shown in Figure 4A and Figure 4B, respectively. The NEEs for the CBS and VBS protocols are shown inFigure 5A and Figure 5B.

Figure 4: Experimental results— [A] AT curves for CBS and VBS hot clients; [B] AT curves for CBS andVBS cold clients

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (93)

Figure 5: Experimental results— [A] NEE curves for CBS and VBS hot clients; [B] NEE curves for CBSand VBS cold clients

Both sets of curves show that for hot clients, CBS outperforms VBS at all but very low loads, i.e., where theCBS broadcast is not full. Here, the VBS dominates. For cold clients, for all load levels, the VBS protocoleither outperforms or performs identically to the CBS protocol. This is reasonable, since the CBS protocol isoptimized to provide better service to clients interested in more popular items at the expense of service forcold items.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (94)

Solutions for Secure Data Access From Broadcasts

In this section, we present two protocols that provide secure data access from the broadcasts by the clients:(1) SubScribe (Datta, Celik, Wright and Biliris, 1998), and (2) Drop Groups (Celik and Datta, 2000). [1], [2], [3]

Both protocols rely on a security layer supported by the communication infrastructure. We explain theprotocols and the broadcast structure that incorporates the security mechanism.

Protocols to Support Secure Data Access from Broadcasts

The protocols use encryption techniques to scramble the communication between the data server and theclients. Two types of encryption keys: (a) client keys, and (b) data keys are implemented. For the client keys, apublic key cryptosystem such as RSA, proposed by Rivest, Shamir, and Adleman (1978), is used. For datakeys, a symmetric system such as DES by Shepherd (1995) is appropriate. The public key of client cj, which isassumed to be known by the server, is denoted by PKj. cj's corresponding private key, which is assumed to besecret to cj, is denoted by SKj. Messages encrypted with PKj can only be decrypted by cj using SKj. Each dataitem Di has a data key, denoted by DKi, for use in the symmetric system. The data keys are initially known bythe server only but will also be securely transmitted to subscribers of Di. New data keys will be chosen asneeded to ensure that only current subscribers can read a particular broadcast.

The SubScribe Protocol

In accordance with the basic cryptosystem described above, the SubScribe protocol operates as follows:When broadcasting Di, the server encrypts it with DKi, producing the ciphertext DKi(Di) of Di, denoted by Ti. Ti

is included in the data component of the data block corresponding to DKi. Subsequently, only clients knowingDKi are able to access Di. Thus, the data key DKi is included (in an encrypted fashion) in the key componentof the data block corresponding to Di. In order to provide maximum efficiency, the data key is only changedwhen clients drop their subscriptions. The protocol has two components: a server side, or information deliverycomponent, and a client side, or information access component.

SubScribe Server Side Protocol

The server side protocol is responsible for the delivery strategy for data items. It distinguishes between twotypes of data items: (a) data items whose subscriber set in the current broadcast includes every client whowere subscribed to this item in the previous broadcast as well—these items are referred to as NODROP items,and (b) data items not satisfying the previous criterion, i.e., items which have lost some subscribers in thecurrent broadcast. We will refer to these as DROP items. To include a DROP item, say Di, in the broadcast,the server chooses a new data key, DKi, and creates a data block for this item as follows:

Data Component: The server encrypts Di with DKi and includes the ciphertext in the data component.1.

Key Component: For each client in the subscriber set of Di, the server encrypts DKi with the client'spublic key and includes the ciphertext in the key component. In other words the key component ofDROP items essentially becomes a concatenation of ciphertext chunks, where each ciphertext chunkrepresents an encryption of DKi with a specific subscriber's public key.

2.

To include a NODROP item into the broadcast, the server uses the same data key that was used in theprevious broadcast for this data item. This is possible due to the fact that using this data key does notcompromise security—all prior subscribers are still subscribed to this item. Also, in this case (potentially)substantial savings are realized as the key need not be sent to all the prior subscribers. The server composesthe key component by encrypting the data key only for the new subscribers. Existing clients are notified of the

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (95)

fact that the data key remained the same by inserting a special offset value of -1 in an index in front of thedata block for that data item. In both the DROP and NODROP cases, index records are created by the serverfor constructing the two types of indexes described before.

The Drop Groups Protocol

In the SubScribe protocol, the broadcast is organized in such a way that each data item is encrypted with itsown key and is broadcast together with the key information intended for each subscriber. This key informationfor each client is obtained by encoding the data item key using the public key of the recipient. That is, thebroadcast server sends off as many encodings as there are clients. This effectively renders the size of thebroadcast unpredictable. Particularly when the number of subscribers is high, the key segment may becomevery large and significantly increase the size of the broadcast. Obviously, a longer broadcast means a reducedquality of service. Therefore, there is a scalability issue.

The Drop Groups (DG) Protocol is designed to bound the size of the key component in a broadcast regardlessof the number of clients in the system.

DG achieves scalability by using a novel grouping criterion. DG assigns each client to predetermined groupsand assigns each group a group key valid until the group changes. This is similar to the Group Key approach.In the Group Key protocol, subscribers of an item usually form a group and are given a group key valid untilthere are drops (i.e., subscription expiration) from the group. When a drop occurs, a new group key must begenerated and distributed to remaining subscribers so that the dropped subscribers don't have access to newvalues of the data item. In DG, however, we propose to further divide the groups of a data item into subgroupsusing an additional criterion. The new criterion we use is the time to drop, which is simply the amount of timeuntil a client's subscription for a data item expires. Therefore, two subscribers, A and B, of data item i are inthe same group if and only if their subscription for i expires at the same time. Of course, in order to achievethis sort of grouping, we have to ensure that subscription expirations are bunched together at discrete epochs.This is done as explained later.

The choice of the time to drop as the grouping criteria is crucial. This is designed to remedy a major problemassociated with the group key approach, namely, the key expiration problem in a dynamic environment. In thisenvironment, the period of validity of a key is small, necessitating the generation of a new key frequently.Although key generation is rather fast and cheap, it is costly to distribute this new key to the clients.

In DG, since all subscribers in the same group will be dropped at the same time, it is never necessary to issuea new group key and distribute it to the group. Furthermore, when a new client contacts the subscriptionserver, the client is given a group key for each data item that it is interested in. The client then listens to thebroadcast prepared by the subscription server and downloads the data items.

The time continuum is divided into subscription epochs such that subscription expirations are only scheduledto happen at the end of an epoch. For example, if the epoch length is 1 hour, and client A wants to subscribeto a data item for 2.5 hours, it must choose to subscribe for either two or three hours. To limit the number ofepochs, a limit is set on the horizon of subscription. For example, if a subscription epoch is one hour long, andthe horizon is 24 hours, then there are 24 possible subscription epochs that clients may choose from. Notethat real-world analogies exist for this scenario: readers may subscribe to journals between 1 and 24 monthsand receive issues monthly. The server can adjust the duration of an epoch depending on the popularity orsubscription patterns of the clients of an item. Given such a framework, given a subscription horizon of Hepochs, in the key component, there can be at most H group keys preceding the data item regardless of thenumber of subscribers in each group. Therefore, if there are d data items with H groups in each, then there willbe dH group keys in the broadcast. At the end of each subscription epoch, d groups will be dropped, and dgroups will be added, one group per each data item. Essentially, this bounds the number of groups. Clearly,this is a big step towards limiting the size of the broadcast, thus satisfying the scalability requirement.

Drop Groups Architecture

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (96)

In this environment, there are two separate servers, the Subscription Server (SServ) and the Broadcast Server(BServ). When a client wishes to access the service, it first contacts the SServ that handles the subscriptionrequests. After exchanging information with the SServ, the client listens to the broadcast prepared by theBServ until its subscription expires. Once the client contacts the SServ, it communicates the request to theBServ, which incorporates the requested data item in the broadcast.

The two servers need to maintain communication between each other mainly for exchanging informationspecific to data items. The client needs to contact the SServ but has no interaction with the BServ except forlistening to the broadcast.

In DG, client keys are used for communicating with the Subscription Server. Authentication, subscription andthe initial key exchange are performed using public and private keys. The group key of a data item Di forepoch k is denoted by GKki. Thus, Rki, the data key for Di encrypted with GKki; i.e. GKki(DKi) is included in thekey component of the data block corresponding to Di.

Broadcast organization in DG

The organization of a broadcast implementing the DG protocol is shown in Figure 6. A broadcast starts off witha broadcast index, followed by a sequence of data blocks. The broadcast index segment and all the datablocks contain an orientation header (OH). The OH consists of a single element, namely an offset to the startof the next broadcast. This pointer is intended as a "tuning-aid" for clients.

Figure 6: Detailed view of broadcast structure in DG

The Broadcast Index (BI) precedes everything else in a broadcast. The BI consists of index records that holdpointers to each item's data block in the current broadcast. More specifically, an index record consists of a 2-tuple < item id, offset to data block>. A client obtains pointers to its desired data items from the BI and thensleeps, only to wake up at the desired points in time.

The BI is followed by a sequence of data blocks. A data block consists of four parts.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (97)

1. OH that contains the 2-tuple <offset to item (OTI), flag>. The flag bit is set if the item key haschanged since the previous broadcast. When clients download the OH, if the flag bit is not set, theydon't need to download the Key Segment if they have the key to the data item from the previousbroadcast.

2. Data block index consists of the <group number, offset to key segment (OKS)>. The OKS elementassociated with client ID cj indicates where cj can find the key information for its group.

2. The second part in a data block is the key component. It contains key chunks for all the groupssubscribed to Di, i.e., it contains Rki for all groups k that have at least one subscriber.

2. The last part of a data block is the data component. This contains Ti, a data item Di encrypted withdata key DKi.

Therefore, a client, upon successfully downloading the key chunk and Ti, can obtain Di.[1]Aslihan Celik is an assistant professor with the department of OMIS, Santa Clara University, California95053, USA.

[2]Anindya Datta is an associate professor with the DuPree College of Management, Georgia Institute ofTechnology, Georgia 30332, USA.

[3]Another protocol, the SEMD, is omitted for brevity (Celik, Datta & Narasimhan, "Secure Data DeliveryProtocols for Information Commerce in a Push-Based Environment," IEEE Transactions on Systems, Man andCybernetics, 30(4), 2000).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (98)

Related Literature

Our work is focused on disseminating data in wireless networks and on accessing the data securely. We usedata broadcasting as the means for data dissemination. Alonso and Korth (1993) introduced database systemissues in mobile computing. They also point out that the assumption of unlimited battery power for databasequeries is challenged due to short-lived batteries of the mobile units. Dunham and Helal (1995) identified newdatabase problems in a wireless environment. Imielinski and Badrinath (1994) were among the first to notethat bandwidth limitations would make the data broadcasting a desirable alternative to interactive access.Vaidya and Hameed (1999) addressed, among other issues, the notion of broadcast scheduling, i.e., when tobroadcast particular items. A very relevant work from our perspective is the work on Broadcast Disks (BD)performed by Acharya, Alonso, Franklin and Zdonik (1995). A BD involves the determination of a broadcastprogram containing all the data items to be disseminated and the subsequent transmission of this program ina periodic manner. BDs are constructed based on known access probabilities—this is very hard, if notimpossible, to know in a mobile framework where clients move in and out of cells at their own will. Ourstrategies consider stateless servers, i.e., servers have no a priori knowledge of client movement or accesspatterns. For the abovementioned reason (i.e, clients moving in and out of cells), the broadcast content needsto be dynamic—BDs provide a static broadcast content. In the BD framework, client demands are completelysatisfied, i.e., all the demanded items are included in the broadcast. In a mobile scenario however, thebroadcast period may be too small for the inclusion of all items (particularly if some items are broadcast moreoften that others as in the BD framework)—this means that some method would need to be constructed thatincludes certain items in the broadcast in preference to others. The BD framework is unable to handle this. Wehave created a sophisticated prioritization mechanism to handle this issue. Finally, the BD frameworkexclusively considers latency as the primary performance metric—no attention is paid to energy conservationby the clients. We, on the other hand, simultaneously pay attention to both.

Kenyon and Schabanel (1999) proved that the broadcast scheduling problem that minimizes the averageresponse time is NP-hard. Su, Tassiulas and Tsotras (1999) outline the properties of the optimal schedulingsolution where the broadcast schedule is computed based on access probabilities of the users. Oh, Hua andPrabhakara (2000) proposed a mixed approach by broadcasting the popular data objects and providing other(unpopular) objects via the point to point method.

While mechanisms have been suggested to improve the security of wireless communications (Lo and Chen,1999), there is not a widely adopted standard by the industry. As far as we are aware, no existing productssupport the subscription-based access control schemes studied in this work.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (99)

Conclusions and Future Research Directions

In this chapter, we looked at (1) the problem of data organization and access in mobile networks usingbroadcasts, and (2) subscription-based data access from broadcasts. The protocols presented here provideefficient methods for designing a broadcasting application to counter the effects of infrastructural inadequaciessuch as low bandwidth and limited battery power. Section 3 concentrates on deciding the broadcastingstrategy (indexing, broadcast organization, and broadcast period). Section 4 builds upon these results andprescribes a security layer on top of the basic broadcast structure. Any subscription-based access protocolmay be implemented with either the constant broadcast strategy or with the variable broadcast strategy. Basedon the characteristics of the data, network capacity, and customer needs, the right combination of protocolsshould be determined.

Our solutions can be implemented in a wide range of data and content delivery applications, ranging fromfinancial data to wireless Internet services. The dynamic content in a Web page can be distributed to thesubscribers via broadcasts. The users could cache the static elements of the page (frames, appearance, etc.)and obtain the freshest content (stock quotes, traffic, movie times, etc.) from the broadcasts. Broadcasting isalso a good candidate for providing access to enterprise applications: mobile workers can subscribe to dataitems that they need to run the application, and any updates to the data items can be broadcast using ourprotocols. The security of such a system is enhanced if an encryption mechanism such as the one describedin the Drop Groups protocol is used. The most general case for using our protocols is for content distributionto handheld devices, such as cellular phones and the PDAs (Personal Digital Assistants, such as Palm). Here,either the wireless carrier alone, or a content provider in alliance with the wireless carrier, could operate thebroadcasting application.

The broadcasts should be prepared considering the current and near future demands of the clients. Forexample, assume that the broadcasts are prepared based on the requests of the clients within a geographicarea. When new clients come into that broadcast area, their items of interest may not be included in thecurrent broadcast. Then, these clients will have to resubscribe to the broadcast and wait until these items arebroadcast. However, if the broadcasts are prepared preemptively, i.e., by estimating the incoming clients'requests, then resubscription can be prevented. To do this, the broadcast application needs to keep track ofthe movements of the clients in the wireless network. However, keeping track of client movements is bothcostly and difficult to manage. Therefore, trade-offs between preemptively including the data items in thebroadcasts and managing the location information of the clients must be considered. We have startedresearching this area. We plan to derive analytical solutions that optimize bandwidth utilization and cost ofoperating the system.

In summary, the protocols and concepts presented in this chapter have a wide range of applicability in contentdistribution. Our broadcast organization and sub-scription-based access protocols are geared to work hand-in-hand to facilitate a complete content distribution solution via broadcasts.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (100)

References

Acharya, S., Alonso, R., Franklin, M., & Zdonik, S. (1995). Broadcast disks: Data management forasymmetric communication environments. Proceedings of ACM SIGMOD, San Jose, California, pp.199–210.

Alonso, R., & Korth, H. (1993). Database issues in nomadic computing. Proceedings of the ACM-SIGMOD.

Celik, A., & Datta, A. (2000). A scalable approach for subscription-based information commerce.Workshop on Electronic Commerce and Web-Based Information Systems (WECWIS), Milpitas, CA, USA.

Celik, A., Datta, A., & Narasimhan, S. (2000). Secure data delivery protocols for information commerce ina push-based environment. IEEE Transactions on Systems, Man and Cybernetics, 30 (4).

Datta, A. (1994). Research issues in databases for active rapidly changing data systems (ARCS). ACMSigmod Record, 23 (3).

Datta, A., Celik, A., Kim, J. K., VanderMeer, D., & Kumar, V. (1997). Adaptive broadcast protocols tosupport power conservant retrieval by mobile users. Proceedings of the Thirteenth InternationalConference on Data Engineering (ICDE), Birmingham, UK.

Datta, A., Celik, A., Wright, R., & Biliris, A. (1998). SubScribe: Secure and efficient data delivery/accessservices in a push-based environment. Proceedings of the International Conference onTelecommunications and Electronic Commerce (ICTEC), Dallas, TX, USA.

Datta, A., VanderMeer, D., Celik, A., & Kumar, V. (1999). Adaptive broadcast protocols to support efficientand energy conserving retrieval from databases in mobile computing environments. ACM Transactions onDatabase Systems, 24 (1), 1–79.

Dunham, M. H., & Helal, A. (1995). Mobile computing and databases: Anything new? ACM SIGMODRecord, 24 (4), 5–9.

Imielinski, T., & Badrinath, B. R. (1994). Mobile wireless computing: Challenges in data management.Communications of the ACM, 37 (10), 18–28.

Imielinski, T., Vishwanathan, S., & Badrinath, B. R. (1997). Data on air: Organization and access. IEEETransactions on Knowledge and Data Engineering, 9 (3), 353–372.

Kenyon, C., & Schabanel, N. (1999). The data broadcast problem with non-uniform transmission times.Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms. Baltimore, Maryland.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (101)

Lo, C.-C. & Chen, Y.-J. (1999). Secure communication mechanisms for GSM networks. IEEETransactions on Consumer Electronics, 45 (4).

Oh, J., Hua, A., & Prabhakara, K. (2000). New broadcasting techniques for an adaptive hybrid datadelivery in wireless mobile network environment. Proceedings of the IEEE International Performance,Computing and Communications Conference (IPCCC 2000), Phoenix, Arizona.

Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public keycryptosystems. Communications of the ACM, 21 (2).

Shepherd, S. J. (1995). A high speed software implementation of the Data Encryption. Computers andSecurity, 14 (4), 349–357.

Su, C.-J., Tassiulas, L., & Tsotras, V. J. (1999). Broadcast scheduling for information distribution.Wireless Networks, 5 (2).

Vaidya, N. H., & Hameed, S. (1999). Scheduling data broadcast in asymmetric communicationenvironments. Wireless Networks, 5 (3).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (102)

Endnotes

1 Aslihan Celik is an assistant professor with the department of OMIS, Santa Clara University, California95053, USA.

2 Anindya Datta is an associate professor with the DuPree College of Management, Georgia Institute ofTechnology, Georgia 30332, USA.

3 Another protocol, the SEMD, is omitted for brevity (Celik, Datta & Narasimhan, "Secure Data DeliveryProtocols for Information Commerce in a Push-Based Environment," IEEE Transactions on Systems, Man andCybernetics, 30(4), 2000).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (103)

Chapter 5: Digital Rights Management for MobileMultimedia

Sai Ho KwokHong Kong University of Science and Technology, China

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

Abstract

In the future, intellectual property protection will be a need for distributed media in mobile multimedia. With theconstraints of mobile commerce and mobile technologies such as limited bandwidth and computing capability,new schemes of rights management emerge. Digital rights management (DRM) operations in these schemesdiffer from those in existing DRM solutions for electronic commerce. This chapter presents a general DRMframework for mobile multimedia based on current DRM, mobile network, mobile device, and paymenttechnologies. The framework is partially referenced to the NTT DoCoMo i-mode model, which centralizespayment and maintains user information within the service center. This chapter also presents the basicoperations of the general framework and illustrates how rights insertion, rights enforcement, and musicsharing are realized under the framework.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (104)

Introduction

Mobile multimedia has been predicted to be a key service and application in mobile e-commerce (m-commerce) by many mobile operators and mobile service providers. At present, mobile multimedia is still in itsinfancy, accessed by relatively low-end mobile devices with limited bandwidth and resources. Several mobileservice providers have already launched low-grade multimedia services with relatively low-end technologies totest the market, for example, a radio broadcast service from Orange in Hong Kong in 2000 (Orange). Theowners, publishers and distributors of the distributed media pay very little attention to the issue of intellectualproperty protection since the market and business models are not actually there. With advances in mobilenetworks and technologies, the demand for mobile multimedia services will be much higher in terms of qualityand convenience. Intellectual property protection, rights control and management of distributed media becomeconcerns, similar to what happened in the market for distributed digital music.

Mobile multimedia services are different from multimedia services in electronic commerce due to the natureand properties of their client devices and communication networks. However, copyright protection and rightsmanagement are needed for the content distributed by these multimedia services over the wired Internet.Rights management technology makes various online payment schemes possible, such as pay-per-view, pay-per-download, pay-per-game, and so on. But until now, there has been no specific digital rights management(DRM) solution designed for mobile multimedia. This chapter will present a general DRM framework for mobilemultimedia based on current DRM, mobile network, mobile device, and payment technologies.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (105)

Background

What is Digital Rights Management?

The Australasian Performing Right Association Limited (APRA) [APRA] classifies different types of rights thatmusic copyright owners possess and defines some common rights in music. These rights are listed below.

The rights to reproduce their work, that is, record their music onto a CD, into a film soundtrack or onto acomputer disk or reproduce their lyrics as sheet music or photocopy them. In the music industry the rightto record a song onto record, cassette or CD is known as the mechanical right; the right to include musicwith visuals (i.e., on the soundtrack of a film or video) is known as the synchronisation right.

The rights to publish their work; this means making their work available to the public for the first time.

The rights to perform their work in public, for instance, performing their work live in pubs, clubs or atfestivals or by playing a recording of their work or showing a film containing their work. In the musicindustry the right to perform a work in public is part of the performing rights.

The rights to communicate their work to the public, for instance, by the Internet or by television or radiobroadcasting. In the music industry the right to communicate a work to the public is part of the performingrights.

The rights to make an adaptation of their work, for example, by arranging or transcribing music ortranslating lyrics.

From the consumer perspective, end-user rights usually refer to usage against payment. Rights managementaddresses both owner and end-user rights. In general it refers to the problems associated with intellectualproperty rights, including copy protection. In particular it addresses the problems of assuring that, in acommercial setting, payment is made for a particular use of content and that the use made does not exceedthe use authorized (Stewart, 1998). Online, rights management can be regarded as a process of honoringthose copyright provisions, license terms and usage agreements established by the owners of the intellectualproperty in online media business (Anderson & Lotspiech, 1995). The explicit rights and obligations of themusic owner are stated in a digital license (for example, how many times the licensee can play the licensedmusic), and DRM systems execute the rights granted in the license. However, note that DRM in this chapteraddresses end-user rights only, as the owner's rights are not specific to the scope of mobile multimedia.

DRM standards have been developed for distributed digital content. For instance, the Secure Digital MusicInitiative (SDMI, 1999), backed by the Recording Industry Association of America (RIAA) and 148 music andtechnology companies (as of October 2000), has been proposed to provide a secure environment for musicdistribution over the Internet. Another standard developed by the Moving Picture Experts Group (MPEG) isknown as MPEG-21 (Bormans & Hill), dedicated to distributing digital multimedia content. In addition, there arecommercial DRM systems especially for the wired Internet music business. They include Windows MediaRights Manager by Microsoft (Windows Media), Electronic Music Management System (EMMS) by IBM, IntelSoftware Integrity System (ISIS) by Intel, and MetaTrust by InterTrust Technologies (InterTrust, 2000).

The blooming of the online music business and the popularity of music sharing have attracted tremendousattention from the industry and for technology firms. A key to the success of any online music business modelis effective digital rights management. The majority of music labels and related IT firms are positive aboutbusiness models with DRM, and therefore early DRM solutions have been designed mainly for online musicdistribution.

For the online music business, DRM involves specifying and associating rights with the distributed music,

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (106)

placing controls on the music to enforce rights, enabling access checks, and tracking permissions usage andpayment. For a general media service, the required capabilities include 1. rights specification and rights labelmanagement; 2. rights authorization; 3. content protection, rights enforcement, and trusted rendering; 4. rightstracking; and 5. a security and commerce infrastructure. Business transactions, such as payment, ordering,customer enquiry, etc. may occur between the concerned parties during content packaging, distribution, andusage (Ramanujapuram & Ram, 1998). Managing rights in all these transactions is necessary. Figure 1summarizes the rights management capabilities involved in different transactions. To support all thesecapabilities, the DRM system needs rights insertion and rights enforcement operations. In addition, a licensemanagement mechanism is also needed in managing license documents.

Figure 1: Major transactions in digital rights management— content creation, content distribution, andcontent usage

Rights Insertion

Rights insertion is an operation to embed the identities of the concerned parties and assign business rules andconditions to the distributed content. The concerned parties in online media transactions include contentcreators, owners, distributors, and consumers. Their identities (IDs) can be represented through digitalcertification (usually for any individual ID) and digital watermarks (for the company's ID). Business rules andconditions are usually laid down in a license document, while the IDs are embedded in the digital media filecontaining the content. All the rights information, together with the file, is delivered to the consumer in asecured way. The rights insertion operation takes place at the production company or the distribution site, orsometimes both. A digital media file with an associated license document is known as a rights-protected mediafile.

To respond to new circ*mstances, opportunities and challenges in the electronic business market, additional,supplemental rules for the use of the media file may be needed for value chain partner, so that the distributormay enforce other rights to the content. A typical example is the consumer information, including consumer'scertificate or consumer's keys, inserted into the licensed document during the transaction to certify that theconsumer is the legitimate buyer. Another common situation is ownership transfer in media sharing.

Rights Enforcement

There are two types of rights enforcement, namely, active enforcement and passive enforcement. In the usualsituation, DRM systems perform active rights enforcement before the rights-protected material is played orused. The active enforcement takes place within the media player as a built-in function. For example, theactive enforcement of Windows Media Rights Manager by Microsoft [Windows Media] will fail to verify andfollow specified business rules and conditions specified if the media file or the license document is corruptedby intentional or unintentional attacks. Some DRM systems may fail in detecting this, and the consumer mayuse other players to render the file. In case of the failure of active enforcement, passive enforcement is anoffline ownership verification operation to check for the hidden owner identities represented by digitalwatermarks.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (107)

License Management

A license document can be a separate file or message embedded in a media file. The license document statesall the terms and conditions concerning use of the licensed media file. These terms and conditions can bestatic or dynamic depending on the payment scheme. License management is a mechanism to execute theterms and conditions stated in the license. This requires coordination among the media player, the media file,and other supporting modules, e.g., the payment module. From the technical perspective, licensemanagement refers to issuing, hosting, and verifying the license.

There are two basic license management models—tethered and untethered models—used in commercialDRM systems. In the tethered model backed by Microsoft [Windows Media], Intel [ISIS], IBM [EMMS] andothers, consumers must be online to purchase digital music. License distribution and management arehandled by a license services center providing centralized license storage and centralized security. Theadvantage of centrally storing digital licenses is that it is easier to upgrade security as flaws are uncovered. Inaddition, the tethered model takes up less space on the consumer's computer and operates more discreetlythan the untethered model. In the untethered model, specifically by InterTrust (InterTrust, 2000), consumersstore licenses on their own computers and are able to make purchases offline. Payment is made at a laterdate. The untethered model is designed to promote music super-distribution models (Cox, 1996), whereconsumers can share files in a viral Napster-like fashion and where consumers can make micropayments on asong-by-song basis or on a subscription basis. The trade-off is that DRM becomes highly complex, takes upmore memory, and is not user friendly.

The categorization of these models is based on where the DRM technology is hosted and how digital rightsare distributed. The choice of a license management model depends heavily on the payment model in use. Forinstance, online payment favors the tethered model, while offline payment allows the untethered model.Existing commercial DRM systems support either the tethered model or the untethered model (Anonymous,2000). An enhanced license management model, which combines tethered and untethered models in oneDRM system, is being developed (Kwok, 2000). An appropriate license management model can facilitatecontent sharing. When a user shares purchased content with another user, the license creation, modification,and transfers that are required processes in sharing activity can be handled comfortably by the licensemanagement system.

Mobile E-Commerce

With the current 2.5G technologies of mobile devices and mobile communication networks, rights-protecteddigital content is usually delivered to mobile users through a low-quality audio channel. For example, Orange[Orange] has launched a radio broadcast service using the ordinary mobile/telephone network. The quality ofthe content is inevitably degraded subject to the limited bandwidth of the service network and the limited audiocapability of the mobile devices. However, in the most popular service in mobile multimedia—musicdistribution—the media channel can be either the ordinary telephone network or an MP3 channel. The MP3channel was invented and developed by Vitaminic [VITAMINIC], and it plays an important role of ensuring thequality of the music at an acceptable level. Higher music quality and higher quality of multimedia service canbe achieved when a higher bandwidth channel or a dedicated media channel and a powerful mobile device arein use, perhaps when the 3G technologies become available.

DRM for M-Commerce

Today's mobile network and mobile device technologies constrain the sophistication of mobile multimediaservices. These underlying technologies are fundamentally different from those used in Internet commerce,and they impose many limitations on the services. This explains why existing DRM systems cannot beapplicable to DRM over the mobile environment in a straightforward way. Some of the most important

1.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (108)

technical and physical obstacles that inhibit DRM over the mobile environment are

License management: As explained above, there are three license management models available forDRM in e-commerce: tethered, un-tethered, and enhanced license management models. These modelswork fine in e-commerce applications, but not with m-commerce, in which the client mobile deviceusually has limited resources of both memory and processing power to handle and process licensedocument and rights-protected content.

1.

Limited storage and processing power: Due to the limited resources of the mobile device, it is notpossible to download the rights-protected content to the mobile device and play it there. DRMoperations cannot be executed on the client side.

2.

Rights insertion: A sophisticated consumer's ID, such as a private key or digital signature, cannot bekept on the consumer's device due to the storage limitation. Hence, the required consumer's ID mustbe provided by another party or uploaded for rights insertion, for example, through registration.

3.

Rights enforcement: Active rights enforcement cannot take place on the mobile device because thedevice is not capable of intensive computation. However, passive rights enforcement is always possiblewhen the rights-protected content requires rights verification offline using a normal PC.

4.

Payment: Security has been a very important issue in handling payment through the Internet.Cryptography has been widely used in the protection of payment information. However, it is also proventhat most of the cryptography techniques are breakable—it is just a matter of time. Besides, encryptionand deencryption require elaborate computation, but mobile devices cannot support this. And, it isbelieved that the most secure payment method would be one using a private channel, such as a value-added network (VAN), and the payment method should involve minimal exposure of personal and creditcard information over the public network—including the Internet and even the mobile network.

5.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (109)

A General DRM Framework for M-Commerce

The proposed framework is partially referenced to the NTT DoCoMo i-mode model [DoCoMo]. In thisframework, the mobile devices can be ordinary WAP or i-mode phones with limited physical resolution in theirdisplay and limited storage memory, as these devices are dominant in the current mobile market. The DRMmodel in the framework is based on the license management scheme presented in Kwok (2000) and thedesign of commercial DRM systems in the e-commerce domain (EMMS, ISIS, InterTrust, 2000; Kwok, 2000;Kwok et al., 2000a; Kwok et al., 2000b; Windows Media, Bormans & Hill, SDMI, 1999), but all DRMoperations, including rights insertion and rights enforcement, are executed at the service center. This DRMframework resolves many of the problems presented earlier in the previous section, and more importantly,DRM is realized and operated in the mobile environment. In addition, this framework can also enable otherDRM-related activities, such as music sharing between mobile users using digital licenses.

Figure 2 presents a general framework for DRM for digital music distribution in a mobile environment. Thecenter of the framework is a service center, which manages information to and from mobile users, informationproviders (IPs), and other concerned parties. The principal components include (1) a mobile networkinfrastructure, (2) a DRM system, (3) a payment system, and (4) a database. There are three types of partiesinvolved in this framework: the information providers (both official and unofficial sites), the bank, and themobile users. The communication channels between different parties and the service center are different fromeach other depending on the required security level. For example, a dedicated network is used between thebank and the service center, since highly confidential information is transferred through this channel, whilst theservice center relies on the packet network for content delivery.

Figure 2: A general framework of DRM for m-commerce

Mobile Network Infrastructure

The mobile network infrastructure is based on the NTT DoCoMo i-mode [DoCoMo]. It provides a networkarchitecture that connects all involved parties to the service center, which is the mobile operator—NTT, in thiscase. The service center, being the only gateway for information delivery to mobile users, can provide value-added applications and services on top of the regular services offered by IPs. Value-added applications andservices include billing service, a highly secure payment scheme, DRM service, and so on.

Network capacity, bandwidth, throughputs, and error tolerance vary with different telecommunicationcompanies and communication networks. A 3G networking system could greatly improve many different

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (110)

aspects of the performance of the mobile network. Mobile multimedia, virtual reality and other high-bandwidthservices could become possible. This general framework could also take advantage of these services andenhance the applications and services.

Payment

Payment is an undetachable component of m-commerce. The payment part of the general framework alsoadopts the DoCoMo i-mode [DoCoMo] and eCyberPay [eCyberPay] approaches. The concept of theseapproaches is to centralize the payment process within the service center and IPs and to require noconfidential information from the consumer during transaction and payment. The concerned IPs receivepayments from the service center, and the service center will bill the mobile consumers together with theirmonthly service charges at the end of the month. The major benefit of this payment method is that consumersdo not need to provide any confidential personal information to the merchant through the mobile network.Instead, a highly secure payment channel—a dedicated network—is used in the payment process.

Database

Within the service center, there are a number of databases—content database, license database, billdatabase, and user database. The content and license databases are additional to the DoCoMo i-modemodel, while the bill and user databases are not. These databases hold necessary information for variousprocessing and operations, such as transaction, payment, and DRM.

The content database contains all the downloadable content provided by all official IPs (and perhaps unofficialIPs as well). The downloadable files are transferred to and held in the content database before purchasing andtransactions. When a digital file is requested by a mobile user, the requested media will be retrieved from thecontent database and delivered to the user.

The license database holds license documents for all mobile users. Each license document states the ownersof the content—creator, buyer, borrower, together with terms and conditions for use.

The billing database keeps records of all transactions, including information about the seller and buyer,together with the transaction date and charges.

The user database is a database about all registered mobile users—their personal and payment information. Amobile user must register with the mobile operator before accessing the mobile network and experiencingmobile services. Hence, each mobile user has a record in the user database.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (111)

DRM Operations

In this section, we first present the basic operations of the general framework, then illustrate how rightsinsertion, rights enforcement, and music sharing are realized under the framework. With the current 2.5Gmobile technologies, media services may only refer to music distribution.

Rights Insertion

The rights insertion operation is outlined in Figure 3.

Figure 3: Basic operations of the general DRM framework

Step 1: A digital music distributor uploads digital music to the content database at the service center. Theservice center will insert the IP's identity (this may refer to a distributor's ID or a content provider's ID) andthe service center's ID into the music using digital watermarking. The operation can be treated as therights insertion operation.

Step 2: A mobile user browses a music catalog from the music distributor via his/her mobile device. Whenthe user decides to subscribe to the service and purchase specific music, the distributor will then confirmand acknowledge the user.

Step 3: The distributor formally notifies the service center about the order by providing the IP's and thecustomer's (mobile user) identities—the caller's phone number. The service center will then verify theinformation. A way to verify the information is to cross-check the connection ID between these two parties.

Step 4: The service center then updates the customer's monthly bill with the charge of the purchasedmusic. A money-transfer process is activated to transfer money from the service center's bank account tothe IP's bank account.

Step 5: The service center retrieves the selected digital music from the content database and inserts thecustomer's ID (as a digital watermark) to the digital music. This is also considered to be a rights insertionoperation. The digital music becomes rights-protected music. A digital license is also generated and keptin the license database. The license contains the music usage agreement and other terms.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (112)

Step 6: The rights-protected music will be delivered to the customer via the packet network or theconventional voice channel (if a high-quality music channel, such as an MP3 channel, does not exist).This step can be executed immediately after the purchase and whenever the user requests it.

In the above steps, the rights insertion operation takes place at steps 1 and 5, where the distributor's ID orcontent provider's ID, service center's ID, and customer's ID are embedded in the media content.

Rights Enforcement

When a mobile user wants to listen to his previously purchased music, the user can make a request to theservice center directly through his mobile device. Built-in software in the mobile phone can facilitate this. Theservice center will first verify the user's ID and the license terms. If the user has the right to listen to the music,the service center will execute step 6 and alter the license terms if a pay-per-view payment scheme is in use.This is regarded as an active rights enforcement operation. The active rights enforcement operation istransparent to the mobile user, as the operation takes place at the service center.

Passive rights enforcement is conducted by external parties and organizations. In Hong Kong, Customs andExcise officers administer the intellectual property law and are responsible for performing passive rightsenforcement operations against any suspected copyright violation. The passive rights enforcement basicallycompares the embedded digital watermarks in the rights-protected music and the rights information kept in thedigital license stored in the license database. Watermark extraction or watermark detection is used in therights extraction or detection operation to obtain the embedded watermarks for verification. This is an offlineoperation, as depicted in Figure 4.

Figure 4: The passive rights enforcement operation in the general DRM framework

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (113)

Music Sharing

Consider the case where User A wants to share his purchased digital music with his friend User B, with orwithout charge. Figure 5 shows the procedure to share rights-protected digital music from one user to another.Here are the required steps.

Figure 5: Music sharing in the DRM framework

Step 1: User A informs the service center about his decision to loan his purchased digital music to anotherregistered user—User B. This could be done in the portal site of the service center.

Step 2: The service center extracts the corresponding license from the license database and verifies itsterms and agreements. The license terms must state that the purchased music is sharable beforeproceeding to the next step.

Step 3: If User A wants to charge User B for the usage, the service center may bill User B according tothe instructions from User A and the agreement from User B. Otherwise, this will be skipped.

Step 4: The service center generates a "borrow" license for User B to enable User B to render the music.The "borrow" license enables User B to enjoy the music, but it may or may not be shareable with the thirdparty, subject to the agreement specified by User A. The license for User A could be frozen if the originallicense prohibits concurrent use, while User B has the rights to render the music.

Step 5: User B can access and listen to the digital music, just like User A before.

It is noted that User B will not participate in the music sharing process if payment is not required. User A hasthe right to instruct the service center to transfer the ownership of his purchased digital music to another useras he wishes.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (114)

Conclusion

This chapter has outlined a general DRM framework for m-commerce. The framework is general in the sensethat current 2.5G mobile technologies support this framework, but future 3G and even 4G mobile standardscan also make use of it. Its applicability, usability and extensibility are justified, as the framework is based onexisting DRM, mobile, and payment technologies. The concept of basic operations, such as DRM, paymentand sharing, may remain unchanged, even as advanced mobile networks and mobile devices are adopted.The DRM framework will become more valuable when mobile multimedia really takes off in the future.

The proposed framework does not address some outstanding research issues. For example, user acceptanceand user satisfaction with DRM have not yet been evaluated with real users.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (115)

References

Anderson, L. C., & Lotspiech, J. B. (1995). Rights management and security in the electronic library.Bulletin of the American Society for Information Science, 22 (1), 21–23.

Anonymous (2000). The major players, partners in digital-rights management. Billboard, 112 (16), 103.

APRA. The Australasian performing right association limited. Available online athttp://www.apra.com.au/index.htm.

Bormans, J., & Hill, K. MPEG-21 Overview, version 3. Available online athttp://mpeg.telecomitalialab.com/standards/mpeg-21/mpeg-21.htm.

Cox, B. (1996). Superdistribution: Objects as Property on the Electronic Frontier. Addison-Wesley.

DoCoMo. NTT DoCoMo i-mode. Available online at http://www.nttdocomo.com/top.shtml.

ECyberPay. eCyberPay.com. Available online at http://www.ecyberpay.com.

EMMS. IBM's electronic music management system (EMMS). Available online athttp://www.almaden.ibm.com/cs/madison.html.

InterTrust (2000). InterTrust, the MetaTrust utility, announces OpenRights Initiative. Intertrust pressrelease.

ISIS. Intel® software integrity system enhances secure online distribution of music, documents, video andbooks. Available online at: http://www.intel.ca/ca/pressroom/releases/110999.htm.

Kwok, S. H. (2000). An enhanced license management model in digital rights management for onlinemusic business. Proceedings of the International Conference on Information Society in the 21 Century:Emerging Technologies and New Challenges (IS 2000).

Kwok, S. H., Wong, K. C., Tsang, K. F., Cheung, S. C., and Tam, K.Y. (2000a). Digital rights managementin Internet open trading protocol (IOTP). Proceedings of the International Conference on ElectronicCommerce (ICEC 2000), pp. 179–185.

Kwok, S. H., Yang, C. C., Tam, K. Y., and Wong, J. S. W. (2000b). An SDMI-based rights managementsystem for electronic media using digital watermarking. Proceedings of the International Conference onElectronic Commerce (ICEC 2000), pp. 193–200.

Orange. Orangehk.com. Available online at http://www.orangehk.com/chi/index.jsp.

Ramanujapuram A., & Ram, P. (1998). Digital content & intellectual property rights. Dr. Dobb's Journal,pp. 20–27.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (116)

SDMI (1999). SDMI portable device specification, part 1, version 1.0. Available online athttp://www.sdmi.org.

Stewart, T. (1998). Designing Systems for Internet Commerce (pp. 166–167). Addison Wesley.

VITAMINIC. News: VITAMINIC in WAP deal. Available online at:http://www.vitaminic.co.uk/news/0075.php3.

Windows Media. Microsoft Windows Media Rights Manager 7.1 SDK. Available online athttp://msdn.microsoft.com/library/default.asp?url=/library/en-us/wmrm/htm/windowsmediarightsmanagersdk7.asp.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (117)

Chapter 6: Predicate Based Caching for Large ScaleMobile Distributed On-Line Applications

Abhinav Vora, Zahir Tari, and Peter BertokRMIT University, Australia

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

Abstract

Robust mobile middlewares are crucial for online applications as they provide solutions for the core issues ofmobility, data interoperability, and security. This chapter describes our experience in designing suchmiddlewares for one of the largest Australian transport companies (CMS Transport Systems). We focus on thedesign of a predicate-based caching technique for mobile object-based middlewares that optimises theperformance of the mobile medium by better utilising the available bandwidth.

Several caching techniques have been proposed to improve system and application performance. Suchtechniques, along with consistency control mechanisms, are used to reduce the communication load betweenclients and servers, which is particularly important in wireless networks. Caching techniques are generallyclassified as either ID-based or predicate-based. In this chapter we propose a predicate-based cachingscheme, in which the predicates are used in combination with updates and are broadcast by servers in a setof appropriate messages called cache invalidation reports. Each report/message contains information aboutthe data items that have been updated in the server during a given period. A function mapping the predicateinto binary representation is defined for each attribute. Because not all updates are relevant to a cache, thereis a matching algorithm for detecting relevancy between the cache predicate and the predicates in the cacheinvalidation reports. The predicate-based cache invalidation reports inform the client cache manager conciselyabout items that need to be refreshed and about those that need to be discarded, and ensure efficientbandwidth usage.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (118)

Motivation

With mobile computing devices becoming smaller and faster coupled with networks supporting higherbandwidth and reliability, mobile computing is playing an increasingly important part in how applications aredesigned today. Handheld devices enable users to actively participate in distributed computing while on themove. Communication in such distributed, in many cases wireless, environments is hampered by intermittentand weak connections; in particular, mobile devices encounter wide variations from high bandwidth, lowlatency through to low bandwidth, high latency and to possibly no connectivity at all (Forma and Zahorjan,1994).

To avoid high cost of connection or overcome availability problems mobile clients often deliberately disconnectfor some time and then reconnect to the network. It is as essential for mobile clients to keep operating whiledisconnected as it is to support operations when the connection is weak, since there may be clients that neverget good connection and still need to operate. Caching is one technique that can be used to supportdisconnected operations as well as improve performance for mobile clients. Caching objects not only improvesresponse time but also reduces the number of messages between clients and server during operation, whichis particularly important due to the high costs and unreliability of connections in a wireless network.

Mobile and portable computing devices have relatively limited memory, processing, and power resources. Thislimits the ability of the mobile device to cache a large quantity of data. Caching and cache consistencyalgorithms need to take these factors into concern. Reducing the number and size of messages used formaintaining cache consistency can lead to performance improvement in the form of reduced battery andprocessing requirements in addition to the saved wireless bandwidth.

Existing caching techniques can be broadly classified into ID-based and predicate-based. Both use cacheinvalidation reports (server broadcast messages), which are used by the clients for maintaining theconsistency of their cache. In addition to other information, a cache invalidation report contains a list ofidentifiers of data items that have been modified since broadcasting of the last message. ID- basedapproaches only tell clients which data items have been modified and do not contain any information about thenew values. Clients need to query the server for new values before they can determine whether updates arerelevant to them or not. If the size and the number of the cache invalidation reports are large, this approachcan become impractical and impeding on the wireless environment. Predicates are used to representaggregate states of updates in a server in the predicate-based approach. Mobile clients submit a query to aserver in the form of a predicate (e.g., age < 20 and address = "Melbourne"). The server returns all the datathat matches the predicate. Cache invalidation reports contain a timestamp and a list of predicaterepresentations that reflect the current content of the objects that have been modified since the last report.These reports also contain a binary representation of the range of the new value (the client can use this todetermine whether the update is relevant to it or not). The size of these messages is smaller than ID-basedmessages, thus making them an ideal choice in mobile environments.

Middlewares (Tari and Bukhres, 2001) provide the right software infrastructure for mobile environments, suchas e-commerce/m-commerce, because they open the boundaries between intra-enterprise and inter-enterprisesystems. Middlewares unite different applications, tools, networks, and technologies, giving users a commonset of standard interfaces that hide the underlying implementation details. A mobile middleware is an enablinglayer of software that connects m-commerce applications with different mobile devices, networks andoperating systems while still preserving mobility transparency. However, current middleware platforms haveprofound limitations when used as a basis for m-commerce applications due to their inability to properlyaddress the issues of mobility, performance and security. This chapter deals with the issue of performance ofmiddleware platforms, i.e., how to make the processing of m-commerce applications efficient in terms ofresponse time.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (119)

Object brokers, such as CORBA (OMG, 1995) and DCOM (Chung et al., 1998), are middlewares which offerthe best integration of advanced software and data paradigms (e.g., object paradigm) in distributedenvironments by providing modularity, reusability and transparent handling of complex issues related to objectbinding and information processing. Object brokers are based on the integration of the distributed client-servercomputing (i.e., based on message-passing systems most commonly found in Unix-based environments) andobject-oriented programming. An object broker plays the role of an object-oriented remote procedure call(RPC) application program interface. It provides common services, such basic messaging and an RPC-typecommunication between clients and servers, directory services, meta-description and location and hosttransparency. This integration has several advantages, such as transparency and extensibility. Differenttransparencies are supported (e.g., location, host) as clients do not need to be aware about where objects arelocated or how to interface their applications (with legacy code), or how to communicate with remote objects.Extensibility is the result of decoupling interfaces with implementations. Therefore existing legacy applicationscan be extended by inheriting from existing interfaces to support new requirements (whether it is new softwarerequirements, such as a new language, to be supported by the new applications or changes in therequirements).

A detailed discussion and analysis of object brokers can be found in Tari and Bukhres (2001). This bookprovides a technical insider's view of all of the most technical issues related to object brokers, includingarchitecture (e.g., portable adapter), performance (e.g., caching) and object services (e.g., trading, transactionand query).

Existing object brokers provide scalable solutions for distributed applications; however, they have severelimitations when dealing with m-commerce applications. The aim of the DOK project, which is currently underdevelopment at RMIT University, is to analyse and understand these limitations and to propose innovativesolutions to deal with core issues of m-commerce applications. DOK intends to

Extend the communication layer of object brokers, called IIOP (Internet Inter-Object Protocol), to deal withmobile objects, object consistency and disconnection.

Extend object brokers to efficiently manage diverse data sources by designing advanced techniques forobject prefetching and object pooling.

Design sophisticated optimisation techniques, such as cooperative caching and dynamic load balancing,and integrate them with object brokers to provide better performance and scalability.

This chapter deals with improving the performance of mobile object brokers by caching data on the mobileclients' side. m-commerce applications that might want to use caching include transportation and logisticssoftware managing and assigning deliveries and pick-up, clients having their schedule periodically updatedfrom a control centre, emergency services, remote banking terminals (Mobile Funds Transfer System), etc.Caching data in the client environment offers substantial performance gain by reducing the need for remoteaccess to data repositories and query processing.

The mobile object broker of the DOK system supports m-commerce applications by enabling communicationacross different software and database platforms, and by providing high performance and availability. Thischapter describes a predicate-based caching technique with a server broadcasting approach, which usespredicates to evaluate updates in the cache invalidation report. A predicate mapping function is associatedwith each attribute, which produces a binary representation of the attribute. To detect the relevancy of anupdate, an algorithm matching the cache predicate and the predicates in the cache invalidation report is used.Predicate-based cache invalidation reports inform the client cache manager of items that need to be refreshedand ones that need to be discarded, resulting in efficient bandwidth usage.

In this chapter, we use the term server to refer to application nodes. A server could be a database server,application server or any type of service that maintains data and serves it to clients. The term client is used(interchangeably) to refer to mobile hosts, client application and client cache manager. A client cache manager

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (120)

is a part of the client software that manages the cached objects and is responsible for maintaining cacheconsistency.

This chapter is organised as follows. The next section gives an overview of caching in mobile-orientedsystems. Section 3 reviews current caching techniques in wireless environments and puts our cacheconsistency approach in context. Section 4 explains the predicate representation and describes the structureof the proposed predicate-based invalidation report. Section 5 proposes a cache consistency protocol, andsection 6 concludes the chapter.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (121)

Background on Caching in Wireless Environments

A General Picture

Wireless environments are characterized by low bandwidth, high latency, being subject to network interferenceand frequent disconnection, which results in weak connections. Due to these limitations, it is important toreduce bandwidth requirements and to increase accessibility of data for mobile clients. Caching is one of thesolutions enabling improved performance and reduced usage of bandwidth: by caching frequently accesseddata objects at the mobile client side the communication between mobile clients and servers can besignificantly reduced (Chan, SI, and Leong, 1998; Wu, Yu, and Chen, 1996). At the first request for a data itemthe server sends the data to the client. Subsequent requests for the same item can be satisfied locally, whichreduces response time and conserves bandwidth. In addition, caching enables continuing operations at themobile client while disconnected, since the mobile client can access data objects locally withoutcommunicating with the server.

A cache invalidation strategy ensures that updates to data on the server are consistent with the mobile clients'cache (Chan, SI, and Leong, 1998). In a wireless environment, the design of a cache invalidation strategyneeds special attention, so that substantial reduction in bandwidth usage can be achieved. Several cacheinvalidation strategies have been proposed, which can be divided into two categories (Barbara and Imielinski,1994): stateful and stateless methods. The stateful-server technique requires the server to know which clientsare currently connected, and each client's cache state has to be known to and maintained by the server at alltimes. On the other hand, a stateless server does not need to know which clients are connected and what thestate of the client's cache is. The responsibility of maintaining the cache relies with the client. Since mobileclients disconnect and reconnect frequently, the stateful server approach is impractical for wirelessenvironments. The stateless server approach is more scalable and practical for wireless environmentsbecause the server does not have to keep track of which clients are connected or store the cache informationof each connected client.

In both stateful and stateless cases, cache consistency needs to be addressed. Server broadcasting is anefficient method for maintaining cache consistency, since the cost of broadcasting a message can becomeindependent of the number of clients receiving the message when using appropriate data transfer protocols.The stateless server approach broadcasts update information to clients in a message, called a cacheinvalidation report. Depending on the scheme used, invalidation reports use a specific data structure (toreduce the size of messages to be broadcasted) and contain specific information (needed to support theunderlying consistency method). Figure 1 depicts the structure of a cache invalidation report used in one ofimportant caching scheme, Selective Dual-Report Cache Invalidation Scheme (SDCI) (Kian-Lee et al., 2001).In this scheme, a pair of invalidation reports, an object invalidation report (OIR) and a group invalidation report(GIR) are sent every L time units. The GIR is a triplet of the form (group-id, TS, ptr) where group-id representsthe group identifies, TS is the timestamp of the most recent update (excluding those in the OIR) of the group,and ptr is an offset to the starting position of the objects in OIR corresponding to the group identified by group-id. Each OIR contains a list of updated objects (in that specific group) and their timestamps.

Figure 1: An example of structure of invalidation reports (SDCI model)

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (122)

There are different techniques that can be used to organise cache invalidation reports. A client uses theinformation contained in the cache invalidation report to keep its own cache consistent with the server's data.One way to do so is by comparing the signature or the timestamp of the item in the cache invalidation reportwith that of the locally cached data. The problem with this approach is that a report contains only informationrelating to which items have been updated on the server (and not their new values), and therefore this won'thelp a client in determining whether or not the updates are relevant to its cached data. Thus, the client wouldneed to make remote invocations to the server to find out the new values. After the remote invocations areperformed, if the client determines that the update is not relevant, then the remote invocations wereunnecessary and therefore should not have been performed.

Example 1

A mobile fund transfer system that caches a copy of customers' accounts might have a requirement that it onlybe notified of updates of customers' account balance, such as if the balance of an account is reduced. Inexisting caching solutions, even if the balance of an account is increased, the client using this account will stillneed to access remote data to check the validity of the updated information (before determining whether ornot it is relevant). Our approach, however, does avoid requiring the client to access remote servers as thecache manager checks the predicate in the invalidation report and finds out that the update is not relevant(because the balance increased instead of decreased).

A generic mobile computing environment is depicted in figure 2. In this environment, the Mobile Hosts (MHs)query and interact with the database servers and application servers that are connected to a static network.The mobile hosts communicate with the servers via a wireless cellular network consisting of Mobile SupportStations (MSS). A mobile host can be in either of two modes: awake or asleep. When the mobile host isawake (i.e., connected to the servers), it can send and receive messages. A MH can't be disconnected fromthe static network either voluntarily (to save network usage, battery, etc.) or involuntarily (unable to access thewireless network, etc.). We will not differentiate between the type of disconnection for any purpose.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (123)

Figure 2: Mobile computing environment

Figure 3 illustrates the system components required to support caching in mobile environments. Apreassigned static host (the mobile support station) of any mobile host maintains its Home Location Cache(HLC). If a mobile host is roaming, its HLC is duplicated at the MSS of its current cell. Thus, an MSS alwaysmaintains an HLC for MHs in its coverage area. HLC is a list of records (x, T, invalid_flag) for each data itemlocally cached at an MH, where x is is the identifier of the cached data item, T is the timestamp of the lastinvalidation of x, and invalid_flag is set to true for data items for which an invalidation has been sent to the MHbut no acknowledgement has been received. The mobile host consists of at least a cache manager (clientcache manager) that is responsible for maintaining the consistency of the cached data items. The cachemanager also tries to provide mobility transparency to the client application (for example, by retransmitting arequest if there are connection problems).

Figure 3: Caching system architecture

A mobile host can be disconnected (either voluntarily or involuntarily) from the static network. Whiledisconnected (for whatever reason) the mobile host (client) satisfies application requests from the localcached data. Caching data on the client requires a consistency protocol that can ensure that cached data isconsistent with the server data. For a consistency protocol to be suitable for wireless environments, it isimportant to minimize the number and size of messages exchanged between the mobile host and theapplication nodes for maintaining consistency of the cached data, to allow stateless servers, and to minimizethe bandwidth requirements.

Updates are handled differently in different schemes. In general, when a client modifies a data item, thisupdate needs to be propagated to the server at a certain time. All schemes do not guarantee that if a clientupdates a data item while disconnected, the update will be accepted by the server after reconnection. This isbecause the cached data item might have been modified by another client in the server side while the originalclient was disconnected. Therefore, the server needs to ascertain the validity of the client data before anupdate is accepted. Detection-based approaches (e.g., Franklin et al. & Adya et al.) defer the validity check ofthe data until commit time (which means that updates can be rejected by the server and the client would haveto roll back the updates it applied), whereas avoidance-based approaches (e.g., Agarwal et al. & Goodman)check the validity of the data before it is accessed by the client (thus guaranteeing that the updates would notbe rejected by the server).

In this chapter, we propose a cache invalidation strategy for wireless environments that substantially reducesboth the amount of data transmitted by the server (as it includes information about the new values of updated

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (124)

items in the cache invalidation report) as well as the granularity of cached data from object to attribute. In theproposed approach, a server periodically broadcasts invalidation reports to clients so they can maintainconsistency of their cached data. In order to reduce the information sent to (client) cache managers, cacheinvalidation reports contain only minimal information that enables these cache managers to make decisions(e.g., check whether the changes made at the server are relevant to the objects recorded in their caches).Relevancy in this context means that a cache manager will only consider those updates that are related to thecached information. For instance, when some attributes of an object are updated on the server side, the cachemanager will discard the update if the update does not relate to the attributes cached by the client.

To allow relevant updates being detected by a cache manager, the new state of the updated data is includedin the cache invalidation reports. In this chapter we propose an appropriate predicate-based data structure tomodel these reports. It not only informs each client about the attributes that have been modified in the serverside but also includes the range of the new value. The latter information helps clients avoid requesting copiesof attributes unnecessarily since a client is able to check the value of the updated data. We also incorporateobject identifiers (OIDs) of objects whose attributes have been modified in the cache invalidation reports.Finally, relevancy is detected by matching the query predicate with the updated predicate (included in theinvalidation report).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (125)

Existing Caching Techniques

This section looks at the two main approaches for consistency control in wireless environments and puts ourcontribution in context. There are two basic approaches: ID-based and predicate-based. Both use the conceptof cache invalidation report, which employs a message that a server periodically broadcasts to clients. Clientsare responsible for maintaining the consistency of their caches. A cache invalidation report contains a list ofidentifiers of data items that have been modified in the server since the broadcasting of the last message. Inaddition to these identifiers, other information may also be added to a cache invalidation report to enable a(client) cache manager to check whether a client is aware of the new update (e.g., a report can append atimestamp to an identifier). The cache manager evaluates the combined information by comparing it with thecached information. The result indicates whether the version of the cached information is out-of-date or up-to-date.

ID-Based Server Broadcasting Approaches

Several techniques using server broadcasting have been proposed for wireless environments (Barbara andImielinski, 1994; Hu and Lee, 1997; Jing et al., 1995; Lynch, 1999). These techniques differ in the way thecontent of a cache invalidation report is structured and how cache consistency is restored when clientsreconnect to the server.

In Barbara and Imielinski (1994), Timestamps (TS), Amnesic Terminals (AT), and Signature (SIG)techniques are presented. These techniques are designed for connections of different durations; hence,depending on client connection, relevant technique can be used.

The TS approach uses timestamps to allow a client to check its awareness of the most recent updates onthe data items. The server timestamps each report with a timestamp as the initialisation of the broadcast.A client verifies the freshness of its cached item by comparing its timestamp with that of the item in thecache invalidation report. For instance, if the last report is broadcast with a timestamp Ti and the clientdetermines that the cached item is still valid after receiving the report, then the cache gets timestampedwith the value Ti (marked as valid up to this time). In case the cache is invalid, the obtained copy will havea timestamp of this last request. In this approach, the server agrees to notify clients (or mobile units)about data items that have been modified within a given (fixed) period.

Figure 4 shows the broadcast of invalidation messages in the TS and AT schemes. W is the window size(time) between invalidation messages, and L represents the message latency. AT broadcasts only theidentifiers of items updated since the last report. The server has the obligation of informing clients aboutthe identifiers of items that are changed since the last invalidation report. As in TS, the server builds a listof items to be broadcast. Upon receiving the invalidation report, a mobile unit compares the items in itscache with those of the report. The client (or mobile unit) removes items whose identifiers appear in thereport from its cache. The client cache manager will have to request a fresh copy of the data item (fromthe server) when the client application program wishes to reference the item. The client considers cacheitems not mentioned in the report to be valid; i.e., they require no further communication with the server.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (126)

Figure 4: Barbara and Imilienski's TS/AT scheme (L— broadcast latency; W— window size (timebetween invalidation reports); k<1 for the TS scheme and k=1 for the AT scheme)

SIG is based on data compression techniques for file comparison. It computes checksums of the valuesof items, called signatures. This technique computes one signature per item (or per page) and a set ofcombined signatures calculated as exclusive OR of the individual checksums. As for TS and AT, theserver periodically broadcasts invalidation reports, i.e., these combined signatures. By comparing thesignatures of the items in the invalidation report and in the cache, the client (or mobile unit) determineswhether the cached copy is up-to-date.

With these techniques every client (or mobile unit) maintains a variable Tlast, the timestamp of the last reportreceived. If the difference between the current report timestamp (broadcast from the server) and Tlast isgreater than the fixed broadcast period, then the entire cache is dropped as the items in it are not valid andthe entire cache is refreshed by fetching data from the server.

Bit-Sequence scheme (BS) is proposed by Jing et al. In this technique, a set of timestamps is associatedwith a sequence of bits, which is included in the cache invalidation report. The association between thetimestamps and the bit-sequences gives information about the freshness of the client cache. While BS ismore bandwidth efficient in handling disconnection than the techniques in Barbara and Imielinski (1994), itis more complex and its cache invalidation report is much larger.

Other techniques attempt to provide a more efficient caching support based on the techniques describedabove for mobile clients after reconnection. The improved techniques either modify the TS and ATalgorithms (Hu and Lee, 1997) or use a combination of different cache invalidation reports, such as TSand BS, adaptively (Lynch, 1999). The former technique includes an update history window to reduce thelikelihood of invalidating the entire cache upon reconnection. The adaptive techniques change the type ofcache invalidation report according to system status, e.g., according to query/update pattern anddisconnection frequency.

In general, ID-based server broadcast techniques can work reasonably when the size and the number ofmessages is small. They are, in general, suited for ID-based operations, such as ReadObject (ID) andWriteObject (ID). However, they have serious limitations when the number and/or size of messagesexchanged between clients and servers is large. These techniques use cache invalidation reports in a limitedway, as these reports only tell clients (mobile units) which data items are changed and do not contain anyinformation about the new values. As a consequence, clients will not be able to check whether the new updateis relevant, as the new updated value is not supplied. The client has to contact the server to find out theupdate information. Because the size of the cache invalidation report (as well as the number of thesemessages) is large, the whole ID-based approach can become impractical. However, if a cache invalidationreport contains extra appropriate information about the update of the data item, this will help clients avoidrefreshing the cached data item just because it has been modified. The client can judge from the extrainformation whether the update is relevant to it or not, and based on that it can refresh the cache.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (127)

Predicate-Based Approaches

Predicates have been suggested to represent aggregate states of updates in a server and could be used forcache consistency control (Barbara and Imielinski, 1994; Forma and Zahorjan, 1994). Using predicates toquery items in the cache and also including predicates in the cache invalidation report can be combined withadding a timestamp to the predicate similar to the ID-based TS techniques. A predicate with a timestamp inthe cache invalidation report informs mobile clients that at least one object that satisfies the predicate hasbeen updated on the server at the specified timestamp. No objects are updated after that time.

A mobile client initially submits a query in the form of a predicate. The server processes the query using anappropriate access method (e.g., index) and returns all data items that satisfy the query predicate. The serverperiodically broadcasts cache invalidation reports to all mobile clients in its coverage area. When a clientreceives a report, it retrieves the predicate that matches that of the cache and compares the timestamps. Ifthe timestamp in the report is more recent, the client has to send the predicate as a request to the server andretrieve all data objects for that predicate. The client (or mobile unit) then caches information with thetimestamp of the last update of the cache content. The cache invalidation report contains a timestamp and alist of predicate representations that reflects the current content of the attributes of objects that have beenupdated since the last cache invalidation report.

If there are many objects satisfying a predicate and only few items are updated, retrieving all items of thepredicate results in unnecessary information requests, wasting scarce bandwidth in the wireless channel.Furthermore, it is not practical to include all possible predicates in a single cache invalidation report when thenumber of bits in the predicates is large. An improvement of such a strategy is to select a subset of predicatesto be included in the report. This set has to cover all data items in the server for completeness. The tradeoff isthat exact matches of the predicate in the report and the predicate representing the client's query are nolonger guaranteed. Without exact matches of predicates, there is a greater probability of a false alarm, whenthe client thinks a data item is out-of-date but it is not. When a false alarm occurs, the client would present apredicate to the server and then realise that the items are still up-to-date and the retrieval was unnecessary.

Example 2

If a client caches 2 objects, say x and y, of a certain type that satisfy a certain predicate, though the samepredicate actually matches 3 objects at the server (objects x, y and z). Now if object z is modified at theserver, an invalidation report matching the predicate would be sent. The client would have to update its cacheby sending the predicate as a request to the server and retrieving updates. This would result in a wastedretrieval since the client's cache was already consistent (since object x and y were not modified).

Our Approach: The Predicate Match (P-Match) Approach

Predicate-based approaches detailed earlier have serious limitations, as they do not address the issue ofexact match guarantee in a practical way. Using predicates to represent aggregate information about a set ofitems is not appropriate, as it is not possible to know which items have been updated on the server. A clientwill therefore need to request the content of these items from the server and then discard the informationbecause the updates are not relevant.

It is common that a (mobile) client requests an item and keeps it in its cache while only a few parts of the itemare of interest to the client's application program. This occurs when an object is chosen as the unit of datarequest. In such a case, time and bandwidth are wasted on transmitting the unused part of the object. Inaddition, the unused part of the object occupies some of the cache space that could be used for more relevantinformation. In terms of bandwidth and cache space usage, it is more efficient to perform caching at theattribute level, so the client requests and caches only a minimal amount of data, such as the new updated

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (128)

value of an attribute. To cache at attribute level, the update information in the server should also be reportedat the attribute granularity.

Figure 5 shows the architecture of the proposed predicate-based caching scheme. Mobile clients submit aquery in the form of a predicate (step 1 in the figure). The server returns the results for the query to the client(step 2). The contents of the client cache are represented by a predicate, called the cache predicate. Thecache predicate corresponds to the submitted query. For example, if the cache predicate of a client is '1*1',then the client caches data records satisfying the predicate '1*1'. The timestamp of a cache predicate is thelast update time of the cache. The server broadcasts Cache Invalidation Reports (CIR), which are organisedwith predicates and their timestamps.

Figure 5: The architecture of our caching scheme (where circled numbers represent the different steps inthe caching process)

A mobile client receives the CIR (Cache Invalidation Report) and retrieves the corresponding predicate, whichis matched with the client's cache predicate. Then, the client compares the timestamp of the cache predicateand that of the matched predicate (step 3). As depicted in Figure 5, since the timestamp of the cachepredicate is less than the timestamp of the matched predicate (TS1 < TS2), then the client cache needs to beupdated. Consequently, the client requests new data records for '1*1' (step 4), and the server returns the newdata records to the client in step 5. The timestamp of the cache predicate is updated to reflect the new TS,i.e., it is updated to TS2. Steps 3, 4 and 5 are repeated for all clients.

All updates performed on the server side need to be reflected in cached objects; however, several of theseupdates do not create any consistency conflicts. For example, an application performing calculations aboutprofits made does not need to know where the stock of a product is located, and any change in the location ofthe stock is not relevant for this client. However, this update is important for an application that keeps track ofstocks of products in the company.

We have designed a predicate-based cache invalidation report that reflects the updates made to attributes.This approach introduces a multiattribute mapping table for every object type. This data structure provides abinary representation for a range of attribute values, which is included in cache invalidation reports broadcastto clients. One of the advantages of this binary representation is that it is smaller in size than the actual value,which makes it more suitable for transmission over wireless networks. At the same time, it providesinformation relating to the new values of updated attributes for relevancy judgements by the cache manager.The proposed predicate-based report structure allows the detection of broadcast update relevance to cache

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (129)

information by a simple predicate matching technique. The predicate matching technique can inform the cachemanager which cached attributes need to be refreshed.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (130)

Cache Invalidation Report (CIR)

Predicate-Based Representation

This section describes the data structure we have designed to model the content of attributes so that (i)relevant updates can be "picked" up by clients and (ii) less bandwidth is used to broadcast cache invalidationreports. Each attribute is associated with a mapping function. By applying the mapping function to the value ofthe attribute, the resultant bit streams become the binary representations of the value of the attribute. Theconcatenation of the binary representation of all the attributes of an object can therefore represent the contentof the object. Such representation gives a general picture of object content instead of providing its exact value,but it is smaller in size than the exact values.

We illustrate the use of the attribute mapping function on a "Product" object, which consists of four attributes:A1: sales amount, A2: price, A3: stock quantity, A4: location. Each of the attributes has a mapping functionassociated with it. Let F1 be the mapping function for attribute A1 "sales amount", F2 for attribute A2 "price", F3

for attribute A3 "stock quantity", and F4 for attribute A4 "location."

(1)

(2)

(3)

(4)

An example of an object of type Product is given with the following attribute values:

(5)

The predicate-based representation of this Product object becomes "01 001 1 10." Although the bit streamdoes not give the exact value of the object attributes, we can infer from the bit-stream that

between 100 and 200 pieces have been sold, the current price is less than 50, there are more than 9

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (131)

pieces in stock, and the product is located at the Melbourne City Store.

This information is useful for the client cache manager to determine if the value of some attributes has falleninto the value range that is relevant to the client's application, e.g., stock level is too low.

The proposed predicate-based representation can be improved by using only the part of an object that hasbeen updated, i.e., the cache invalidation report includes the predicates of modified attributes together withadditional information, such as (i) the attributes to which predicates are applied and (ii) the order in which theattributes are represented. Details of the proposed data structure for cache invalidation report are presented inthe next section (section 5).

The length of the binary representation is proportional to exactness: the more exactly a predicate reflects anattribute, the more bits are required to represent the value. (The number of bits, k, required for n possibleranges is 2k = n, where k = log2n.) The proposed data structure is scalable in terms of increasing the numberof value ranges for more precise update information. In general, a predicate mapping function takes anattribute value as parameter and returns a binary value representing the range in which the value falls. Let Fbe the mapping function, x be the value of a data item, and P be the set of binary representations for all thepossible values of x. The general definition of the attribute-mapping table is as follows:

Definition 1: Attribute Mapping

Let x be in the mth range of all the possible value ranges for the attribute and m (0, 1, 2, …, n-1).

The value of the yth bit of the binary representation for x, where y (k-1, k-2, …, 0), is as follows: F

(6)

A concatenation of predicate representation (see above product example for the predicate representation) forobjects creates predicate streams that can be broadcast. Client and server each has to keep a copy of themapping table so that predicate streams can be constructed and interpreted.

Structure of the Cache Invalidation Report

This section describes the components of the proposed cache invalidation report. A typical data item is anobject, which consists of a set of attributes and has a unique object identifier OID. An OID represents anobject instance and identifies the object being updated. To represent all N attributes of an object beingupdated we need N bits: each bit corresponds to an attribute and the value is 1 if the attribute has beenmodified, 0 otherwise. The predicate representing the current value of each modified attribute is thenappended to the end of the N-bit flags in the same order as follows:

(7)

where N-bit-flags(i) = 1.

Using again the previous example, after a sale the attribute "amount of sale" of product OID-i is changed to200 and the number of products left becomes 9. The N-bit flag is therefore 1010, indicating that the 1st and the3rd attributes have been updated. The cache invalidation report for this object becomes:

(8)

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (132)

The entire report is then the concatenation of such each individual report plus a timestamp. The OID in thecache invalidation report serves two purposes. First, it is used for identifying the object that has been modified.Second, the type information conveyed by the OID allows the client to find the corresponding functions andinterpret the changes in attributes.

When the client cache manager receives a cache invalidation report, it checks the OID-i to find out basic typeinformation about the object, such as set of attributes and their order. This information is used to interpret theN-bit flag that corresponds to the set of attributes and their order. The 1st part of the N-bit-flag tells the cachemanager which attributes of the object have been updated in the server. The cache manager checks ifupdates of those attributes are relevant. If the cache invalidation report contains relevant updates, the cachemanager uses the corresponding predicates to check whether the predicates match the client's cache query.Details of the predicate matching algorithm are provided in the next section.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (133)

Cache Consistency

This section describes the cache consistency protocol. We consider client data to be consistent with theserver data as long as the server data satisfies the client predicate condition. If the data cached by the client isupdated and if the updated value is within the client specified threshold (client predicate), we consider thatclient cache to be consistent with the server data, for example, if the client caches a copy of an object withattribute age = 10 and the client predicate is (age < 18). Now if this attribute were to be modified to 11, wewould consider the client data to be consistent with the server data (even though in the classical sense thedata is inconsistent) as long as the predicate (age < 18) is not violated.

Typically, the cache manager performs the following steps to enforce consistency:

If a client receives a cache invalidation report, it checks each item in the report.

If the timestamp of a predicate included in the cache invalidation report is older than the cached predicate,the client cache manager ignores the report.

Otherwise, if a predicate matches the predicate of a query, the attributes in the matched set are added tothe set of attributes to be requested from the server later. These matched attributes may or may not be inthe cache. If they are in the cache, the attributes have become outdated. If they are not in the cache, theattributes have become relevant to the client after having been updated at the server. The cachemanager, therefore, is able to detect attributes that have recently become relevant.

If a predicate does not match the predicate of the cache query, any attributes specified in the predicatemust be purged from the cache if they exist there. Attributes included in the report but not in the cache areignored.

Finally, the timestamps of the remainder of the client's cached attributes are updated to the currenttimestamp.

For two predicates to match each other, two criteria have to be satisfied. First the predicates must be relevant,i.e., the set of attributes on which the predicates are defined must overlap. Second, each attribute in theintersection of the two relevant predicates must have the same binary value, i.e., they share the commonvalue ranges of the attribute.

The query predicate also has type information and N-bit flags at the front of the predicate. This typeinformation is the same as the one contained in an OID. The N-bit-flags, where N equals the number ofattributes of an object, indicate which attributes are relevant to the query. The relevant ones are marked as"1," and "don't care" attributes have the value of "0." For example, a query predicate to a type of object couldbe as follows:

(9)

where N-bit-flags(i) = 1.

Suppose an object has 4 attributes, and the type is identified by type-o. The query predicate represented as

(10)

which means that the cache manager requires the 2nd and the 3rd attributes of objects of type-o if the 2nd

attribute satisfies predicate P(2) and the 3rd attribute satisfies predicate P(3).

To check if the predicate in the cache invalidation report matches the query predicate, the following algorithm

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (134)

is used.

As shown in algorithm 1, upon reconnecting to the network, the mobile client first waits for the server tobroadcast a cache invalidation report. After receiving the report, the client compares the timestamp of itscache to that of the report. If the timestamp of its cache is older than the timestamp of the report minus theserver's broadcast period, the current report is not useful to the client.

Algorithm 1: Predicate matching algorithm (clients disconnection time is shorter than the serversbroadcast period)

Notation

Tq: object type information in the cache query.

Tcir: object type information inside the OID in the predicate in the

CIR.

N-bit-flags-q: N-bit flag of the predicate of the cache query.

N-bit-flags-

cir:N-bit-flag of a predicate in the cache invalidation report.

Pq: predicate of the query.

Pcir: predicate in the cache invalidation report.

MatchSet: set of modified attributes in a predicate of the cache invalidation report thatmatches the query.

Input: Pcir, Pq

Output: Boolean (match or no-match)

BASIC-MATCH Algorithm

if Tq Tcir

then return No-MATCH; else Relevant-bits = N-bit-flags-q bit wise AND N-bit flags-cir

if Relevant-bits == 0 then // Pcir is NOT relevant return No-MATCH else for each i in Relevant-bits do if Pq(i) == Pcir(i)) then MatchSet = MatchSet + {i}

if MatchSet == {} then return No-Match; else return MATCH

The mobile client then submits its query to the server with the timestamp of the last cache update. Uponreceiving the query, the server divides the attributes that have been updated since the last cache update time

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (135)

of the client into 2 sets. The first set contains the attributes satisfying the query. The second set has theattributes that do not satisfy the query. The server then sends the actual values for the first set and only theidentifiers for the second set. The client keeps the first set in its cache and uses the 2nd set to remove itemsno longer valid from the cache. Formally, the mobile client uses the following algorithm.

Algorithm 2: Predicate matching algorithm (clients disconnection time is longer than the server'sbroadcast period)

Notation

Ti: timestamp of the current broadcast.

T1: timestamp of the broadcast the client last received.

w: interval between two consecutive broadcasts.

Pj: predicate of the item j in the cache invalidation report.

Pq: predicate of the cache query.

oid-j: OID if the item j.

RequestSet: set of items requested from the server to satisfy the cache query.

RemainderSet: set of items in the cache not reported in the cache invalidation report.

CIR: Cache Invalidation Report.

Cache: All the objects of the client cache.

Input: Cache

Output: nil

P-MATCH Algorithm

RemainderSet:=Cache; if Ti - Tl <= w then for each j CIR do if BASIC-MATCH(Pj,Pq)

then RequestSet := RequestSet MatchSet(j)

for each attribute a, a Pj and a MatchSet(j)

do if a Cachethen Cache = Cache - {a} send RequestSet to the server RemainderSet = Cache - RequestSet; for each attribute k, k RemainderSet do Tk := Ti;Tl := Ti;else send (Pq + Tl) to the server

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (136)

Algorithm 1 is used only when the client's disconnection time is shorter than the broadcast period of theserver. This is usually the case with intermittent connections. If the disconnection is longer, the server isresponsible for the update information relevant to the client based on the client's cache query and its lastupdated time.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (137)

Conclusion

This chapter proposed a caching technique for mobile-oriented middlewares for m-commerce applications.The method not only maintains the consistency of cached items but also intelligently determines if data itemsare relevant to the client applications. By identifying required data items and their updates, the cache managercan reduce the number of data item retrievals, resulting in efficient utilisation of bandwidth and cache space.

In the proposed caching scheme the server periodically broadcasts cache invalidation reports, similarly toother solutions in ID-based type retrieval systems in wireless environments. The proposed algorithm improvesefficiency by employing a predicate-based match for content-based data retrieval. Information about thecontent of updated data items helps the cache manager in selecting and requesting useful data items thathave been modified and thereby maintaining their freshness, while discarding items no longer useful. Theusefulness of an updated data item is determined by matching predicates of the item in the cache invalidationreport with the cache predicate.

An attribute-mapping table is used to reduce data length in cache invalidation reports. A good set of functionsin the mapping table can carry considerable amount of information about content of updated data items, whichunderlines the usefulness of predicates in cache invalidation reports. In general, to provide more preciseinformation about the new values of updated data items the number of attribute value ranges needs to beincreased. While more attribute value ranges require more bits in the predicate representation, the complexityincreases only by log2.

One limitation of the proposed approach is that the size of a cache invalidation report will increase linearly withthe number of updates during the relevant broadcasting period. If the number of updates is large, additionalpolicies will be required to provide further improvement in efficiency. Future work will focus on combiningcache consistency with the selection of "what to cache" in order to keep net communication costs, mainly interms of used bandwidth, between server and mobile clients as low as possible. The approach proposed here,in particular with the outlined improvements, promises efficient practical support for mobile clients retrievingdata from a server via slow or weak links. [1]

[1]This project is fully supported by the ARC Linkage-Project grant no. LP0218853 awarded by the AustralianResearch Council (ARC), 2002–2004.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (138)

References

Adya, A., Gruber, R., Liskov, U., & Maheshwari, U. (1995). Efficient optimistic concurrency control usingloosely synchronized clocks. In Proceedings of ACM SIGMOD Conference on Management of Data, pp.23–28.

Agrawal, A., Simoni, R., Hennessy, J., & Horowitz, M. (1988). An evaluation of directory schemas forcache coherence. In Proceedings 15th International Symposium on Computer Architecture, pp. 208–289.

Barbara, D., & Imielinski, T. (1994). Sleepers and workaholics: Caching in mobile distributedenvironments. Proceedings of ACM SIGMOD, pp. 1–12.

Chan, B., SI, A. & Leong, H. (1998). Cache management for mobile databases: Design and evaluation.Proceedings of IEEE 14th International Conference on Data Engineering, pp. 54–63.

Chung, P. E., Huang, Y., Yajnik, S. et al. (1998). DCOM and CORBA side by side, step by step and layerby layer. C++ Report, 10 (1), 19–30.

Forma, G. H., & Zahorjan, J. (1994). The challenges of mobile computing. IEEE Computer, 27 (6), 38–47.

Franklin, M. J., Carey, M. J., & Livny, M. (1997). Transactional client-server cache consistency:Alternatives and performance. ACM Transactions on Database Systems, 22 (3), 315–363.

Goodman, J. R. (1983). Using cache memory to reduce processor-memory traffic. In Proceedings 10th

ACM Symposium on Computer Architecture.

Hu, Q., & Lee, D. L. (1997). Adaptive cache invalidation methods in mobile environments. Proceedings of6th IEEE International Symposium on High Performance Distributed Computing Environments, pp.264–273.

Jing, J., Bukhres, O., Elmagarmid, A., & Alonso, R. (1995). Bit-sequences: A new cache invalidationmethod in mobile environments. Technical Report CSD-T-94-074, Department of Computer Sciences,Purdue University.

Kian-Lee T., Jun C., & Beng C. O. (2001). An evaluation of cache invalidation strategies in wirelessenvironments. IEEE Transactions on Parallel and Distributed Systems, 12 (8), 789–807.

Lynch, N. (1999). Supporting disconnected operation in mobile CORBA. [Online]. Msc Dissertation,ftp://ftp.cs.tcd.ie/pub/tech-reports/reports.99/TCD-CS-1999-66.pdf.

OMG (1995). Common object request broker: Architecture and specification. Revision 2.0.

Tari, Z., and &Bukhres, O. (2001). Fundamentals of Distributed Object Systems—The CORBA

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (139)

Perspective. John Wiley & Sons.

Tari, Z., Tari, K., & Setiawan, S. (2002). CODAR—A POA-Based CORBA Database Adaptor for WebService. In D. Taniar (eds,) Forthcoming. Hershey, PA: Idea Group.

Tari, Z., & Stokes, J. (1997). Designing the reengineering service for the DOK federated database system.Proceedings of the IEEE International Conference on Data Engineering (ICDE), Birmingham, pp.465–475.

Tari, Z., Hamidjaja, H., & Lin, Q. T. (2000). Cache management in CORBA distributed object systems.IEEE Concurrency, 8 (3), 48–55.

Tari, Z., Tari, K., & Dupin, V. (2002). An object and query cache management system for CODARdatabase adapter: Concepts, architecture and implementation. Proceedings of International Conferenceon Enterprise Information Systems (ICEIS), Spain. To appear.

Tari, Z., & Craske, G. (2000). A query propagation approach to improve CORBA trading service scalability.Proceedings of the International Conference on Distributed and Computer Systems (ICDCS), Taipei.

Tari, Z., & Fry, A. (2001). Controlling aggregation in distributed object systems: A graph-based approachfor aggregation. IEEE Transactions on Parallel and Distributed Systems, 12 (12), 1236–1255.

Wu, K. L., Yu, P. S., & CHEN, M. S. (1996). Energy-efficient caching for wireless mobile computing.Proceedings of the 12th International Conference on Data Engineering, pp. 336–343.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (140)

Endnote

1 This project is fully supported by the ARC Linkage-Project grant no. LP0218853 awarded by the AustralianResearch Council (ARC), 2002–2004.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (141)

Part III: Information System and Application Issues inMobile Commerce

Chapter List

Chapter 7: Modeling Static Aspects of Mobile Electronic Commerce Environments

Chapter 8: Known by the Network: The Emergence of Location-Based Mobile Commerce

Chapter 9: Usable M-Commerce Systems: The Need for Model-Based Approaches

Chapter 10: Managing the Interactions between Handheld Devices, Mobile Applications, and Users

Chapter 11: Mobile Commerce and Usability

Chapter 12: Using Continuous Voice Activation Applications in Telemedicine to Transform MobileCommerce

Chapter 13: Mobile Applications for Adaptive Supply Chains: A Landscape Analysis

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (142)

Chapter 7: Modeling Static Aspects of MobileElectronic Commerce Environments

Overview

Jari VeijalainenUniversity of Jyvaskyla, Finland

Mathias WeskeHPI University of Potsdam, Germany

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (143)

Abstract

Mobile phones and other small and powerful portable devices have revolutionized personal communicationand affected the lifestyles of the people in the industrialized world. Following credible estimates, in a few yearsthere will be one billion of such portable devices. An emerging trend is the electronic commerce performedusing mobile terminals, often called mobile commerce. Mobile commerce environments are characterized byhigh complexity, including myriads of technical and organizational aspects. This property makes it difficult todistinguish the more fundamental issues, structures, and concepts in mobile commerce from the hype. Tocapture the fundamental aspects of mobile commerce environments, we have developed a model. It coversfundamental static aspects of the m-commerce environment and their relationships. We distinguish fourspheres of concern: Regulatory Frameworks, Business Models, Enabling Technologies, and the GlobalInfrastructure. Rather than providing technical details of m-commerce environments, our aim is to modelinvariant properties that will evidently persist for years to come. Making use of the abstraction capabilitiesprovided by the object-oriented approach, the model is represented by OO structure diagrams.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (144)

Introduction

Mobile phones and other small and powerful portable gadgets have revolutionized personal communicationand affected, considerably, the lifestyles of the people in the industrialized world. In a recent development,voice capabilities of mobile phones are augmented with data capabilities of increasing speed, and stand-alonePersonal Digital Assistants (PDA) are equipped with additional communication capabilities. The MobileElectronic Transaction Forum (2001) indicates that smallsize mobile terminals are currently converging andevolving into Personal Trusted Devices (PTD) that allow users to access mobile Internet services and runapplications at any time and at any place. The telecom industry estimates that there will be 500 millionInternet-enabled mobile phones in 2003. The number of these mobile Internet-enabled PTDs is expected toexceed the number of fixed-line Internet users around 2003. Mobile commerce (m-commerce) is an importantemerging application class in the wireless Internet environment.

M-commerce involves numerous domains, including network technology, business, government regulation,and standards. The main contribution of this chapter is organizing these aspects of mobile commerceenvironments and describing them using an object-oriented approach. This chapter focuses on the staticaspects of mobile commerce environments; dynamic aspects are discussed briefly, mainly in settings wherethey have implications on the static structures. However a complete modeling of the dynamic aspects ofmobile commerce environments—such as functioning of a particular protocol—is outside the scope of thiscontribution.

The overall setting we have in mind is shown in Figure 1. At the center is the global network infrastructure(called Wireless Backbone) that carries all kinds of high-volume data traffic. Currently, it is mostly the Internet.At the edges there are different wireline and wireless access technologies, such as wireline telecom networks,wireline local area networks (IEEE 802.3), wireless local area networks (IEEE 802.11), standardized by theLAN/MAN Standards Committee 802 of the Institute for Electrical and Electronics Engineers or wirelesstelecom networks (GSM, 3G) specified by the European Telecommunications Standards Institute (ETSI)(2000), and Bluetooth, specified by Bluetooth Consortium (Bluetooth, 2002). In computer network technology(as e.g., Tanenbaum, 1996 points out), these access networks represent OSI-layers 1–3. The electroniccommerce (e-commerce) services are offered by the servers and are accessed by the terminals or otherservers through the wireless or wireline access networks. Most electronic commerce services require end-to-end connections between the terminal and server at OSI-layers 4–7. This is necessary especially due toauthentication and authorization.

Figure 1: Wireless and wireline access networks and the global network infrastructure

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (145)

Differences in the technologies at layers 1–3 are mostly uninteresting for the e-commerce services, includingm-commerce services. This is true for data transfer and general connectivity, but the access network typeshave some important differences that suggest that the division in Figure 1 into the wireless and wired worldswill persist. First, wireless terminals are inherently mobile. This makes roaming between diverse technicallycompatible wireless access networks possible. Interoperability of roaming terminals and local e-commerceservices obtainable "at spot" are a new emerging issue that must be resolved again and again. Second,wireless networks, especially telecom networks, tend to have much smaller transfer capacity than wirelineaccess networks. This causes performance problems, should e-commerce services initially designed for muchfaster networks be used through mobile terminals. Third, the mobile terminal should be as portable as possiblewhich means at the same time that they have much smaller physical dimensions, less memory, slowerprocessors, smaller displays and keyboards (if any), and smaller batteries. For these reasons their usability fore-commerce applications designed for wired desktop terminals are far from good. Last but least, the possibilityto dynamically position a mobile terminal with increasing accuracy opens up possibilities for new e-commerceservices, often called Location Based Services or LBS. These make much sense for mobile terminals, but notmuch sense for fixed terminals, and are thus the crucial difference between m-commerce and internet e-commerce.

Rather than going into the details of the technical specification of wireless networks, we refer to the various 2Gand 3G standards that are widely accessible. The interested reader is referred to ETSI (2000) and two recentcontributions by Helal, Haskell, Carter, Brice, Woelk, Rusinkiewicz (1999) and Siau, Lim (2001), discussingthe specific properties of these wireless network generations concisely.

In addition to nationwide wireless networks, a new type of short-range network, called personal area network(PAN), was developed recently. These networks aim at providing fast and convenient access within shortranges, rendering unnecessary the cumbersome temporary installation of wires between devices. Forexample, synchronizing the PDA agenda can conveniently be supported by a personal area network withoutfiddling with cables or managing docking stations. Wireless access to printers, and wireless link between anearplug and a telecom terminal, are other typical applications of this new technology. As mentioned in aDurlacher Report (2000), Bluetooth is an important product in this context.

For our purposes we do not make a distinction between a PAN or a more conventional terminal as a way toaccess the global infrastructure. A car as a mobile small-scale surrounding environment of a person that alsohas wireless access to the global infrastructure belongs to the same category as a PAN. Such devices ornetworks are modeled below as a terminal or a PTD.

As sketched in Figure 1, the new possibilities of mobile applications come from the ability to offer Location-Based Services that can be regarded as real-time and spatiotemporal. In particular, location-aware servicesand location-dependent services are available and described as follows: Location-aware services are able toanswer queries, where locations of objects in a coordinate reference system and possibly metrics are used("where is the X closest to Y"), but the objects do not move on earth. Location-dependent services use theactual, real-time ("now") location of the terminal or the object to be tracked to answer location-related queries("Where is X nearest to me?"). The results can then be used to offer more complicated services. A typicalexample of a location-dependent service—and mobile commerce—is ordering a taxi in any city just bypressing a button on the PTD a traveler carries. The location-dependent services are those that make themobile commerce different from other forms of e-commerce.

Personalization of the services is also possible, at least to the same extent as in the Internet, because PTDsare highly personal devices, and sophisticated user profiles can be maintained by the operators. In Devineand Holmqvist (2001), it was argued that the most promising M-services are those that belong to thecategories: location-dependent, or personalized, or timely. The most sophisticated and promising services,however, belong to the intersection set, i.e., are location-dependent, personalized, and timely. Thesesophisticated services can be developed by collecting context information from the people, for instance,information on the profile and on the current physical location. But collecting private information compromises

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (146)

the privacy of the people. Thus, there is a trade-off between the quality of the services offered and the loss ofprivacy.

Services where the current location of the user device is crucial only make sense for a person on the moveand are therefore a proper extension of Internet-based electronic commerce facilitated by terminals in fixedlocations. Indeed, some reasonable but simple location-dependent services (e.g., simply displaying the currentcoordinates) can be provided by the wireless networks and/or by a GPS-enabled terminal, without the help ofthe Internet electronic commerce infrastructure. On the other hand, there are Internet electronic commerceservices, which can be used from both wireline and wireless terminals. Typical examples are banking servicesin Scandinavia, as reported by Nordea Bank (2001). This shows that Internet electronic commerceinfrastructure can be used to support mobile commerce. Technical, business, and legal issues become morecomplicated in m-commerce than in electronic commerce performed using stationary workstations and similardevices. See Veijalainen and Tsalgatidou (2000, 2001) for further discussion on this.

Given this technological background, the complexity and dynamic nature of technological as well as businessadvances in the electronic commerce area in general and in mobile commerce in particular overwhelms notonly users but also business experts and information systems people. The general concept of m-commerceenvironments is rather imprecise, often even fuzzy, triggered by their highly dynamic nature: While currentstandards and technology are still not very well understood, new business models and applications arepopping up almost on a weekly basis. In this situation, it is hard to identify the fundamental properties of m-commerce environments and to answer questions like, "What are the fundamental technological properties ofmobile devices, independent of the current technology in place?", "What are the main players in m-commercescenarios and how are they related by particular business models?" and "What are the interrelationshipsbetween properties of mobile devices on the one side and business models and the players involved on theother side?" "What is the impact of the user's willingness to use her time to interact with a wireless terminal?"

How to tackle the issues? First, we view mobile commerce to be a subset of electronic commerce. Moreprecisely, as m-commerce we define any type of economic activity that is considered as electronic commerceby the legislation of some country or by the business community and that is performed using a mobile wirelessterminal by at least one party. In most cases the mobile terminal is used by a customer (not, for example, bymerchant or bank) and the wireless network used is a wireless telecommunications network, although anyother wireless network, such as a wireless IP network or Bluetooth link, could be used, too.

The abovementioned definition of mobile commerce above is still vague and raises many questions. Onereason for this is that the very concept of electronic commerce is currently not very precisely and uniquely laiddown. Our view is thus that mobile commerce is a special case of electronic commerce, i.e., mobile commercehas all the opportunities and problems that Internet-based electronic commerce has, but it offers in additionsome novel and very exciting possibilities— as well as new threats and challenges.

This chapter tries to remedy this fuzzy understanding of m-commerce environments by identifying the mainfundamental and invariant structures and properties behind m-commerce application scenarios. This is aimedby organizing them using an object-oriented modeling approach. What we mean by an invariant here is aconcept whose extension exists over a long period of time (years, tens of years in this case) before it vanishesentirely or changes so much that it becomes something else in quality. A typical example is a "terminal." Wedo believe that some kind of a portable device (or a set of portable devices) is needed at any point of time inorder to perform m-commerce. This is because a human being is not able to directly exchange data andaccess services offered at a network but needs a technical device or devices in order to do it. This holds nowand in the future. However, how these devices are constructed at a particular moment is another question; wehave already seen during the last 5–10 years a tremendous development in the terminals; while the originalsize and weight was comparable to a voluminous book, they now are small like matchboxes—and have stillmore processing capability and memory than a PC 10 years ago. The newest telecom terminals alreadyincorporate video cameras, and a person-to-person video service V-LIVE has been launched in May 2002 inJapan (NTT DoCoMo (2002)). The first really wearable terminals have also seen the light; they are integrated

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (147)

into the clothes, and the parts can use wireless Personal Area Network (PAN) or cables for communication(see, e.g., Kaario, 2000; MIT, 2002; Kahney and Leander, 2002). But they still have the same functionality asany terminal in our sense: they allow the people to access m-commerce services.

The other invariant concepts, like business model, are similar. Although at a certain moment a business modelhas one form and at another moment another form, the concept itself stays for long time. Examples of thesekind of invariants in mobile commerce settings are the inherent mobility of users, limitations of user deviceswith respect to input and output capabilities and connectivity, where the latter is either due to the noncoverageof certain parts of the world by service providers, or because the user decides not to be reachable for sometime. As shown by Veijalainen (1990) and Veijalainen, Eliassen, and Holtkamp (1992), one of the invariants atthis level is that the terminal exhibits communication autonomy.

We are here not only interested in individual permanent concepts, but in a set of concepts that together areessential for the comprehension and development of m-commerce. We want to address the legal andorganizational prerequisites of m-commerce, enabling technologies, and the actual global infrastructure inplace. We thus identify four spheres of concern that refer to the above aspects. The most abstract but at thesame time most pervasive sphere of concern addresses the patchwork of the Regulatory Frameworksemerging in different parts of the world. It influences the Business Models, Enabling Technologies, and theGlobal Infrastructure, the other spheres of concern. The essential criterion in establishing the spheres ofconcern is that they have a dynamics of their own that is relatively independent of the other spheres. Still, theyare dependent on each other; for instance, even if the Regulatory Framework logically precedes m-commerce,deeming some forms of it "illegal" and others "legal," historically, m-commerce can be performed without aspecial legal framework, and in fact, the emergence of m-commerce is the reason for establishing a particularlegislation.

This article is organized as follows: the next section, Mobile Commerce Model, introduces the object-orientedmodel for mobile commerce environments by presenting the individual spheres of concern, introduced above.This section concludes with an integration of the submodels to present an overall mobile commerceenvironment model. In the following section, Sample Scenarios, the applicability of the model is illustrated bysample mobile commerce scenarios. A section on related work and concluding remarks completes thischapter.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (148)

Mobile Commerce Model

By analyzing the complex environment of m-commerce applications, it appears that a variety of diverseentities and organizations are playing important roles, ranging from standardization organizations andtechnical specifications of the network infrastructure to user terminals and particular business models and,finally, to revenues. The approach presented in this chapter takes into account a wide range of these staticaspects. Rather than viewing the environment as an unstructured collection of diverse entities and concepts,we organize them in four spheres of concern and describe them using object-oriented modeling techniques.As noted above, the organization of the entities into spheres of concern is based on the relative independenceof the dynamics within the spheres. The spheres classify the entities into four broad categories, likegovernment rules, enabling technologies, network/terminal technology, and business aspects (they will bespecified more precisely below). Since the spheres of concern represent parts of the overall model, they canalso be regarded as submodels.

Object-oriented approaches have been proven well-suited to capture the static aspects of complex applicationscenarios. However, their use is not limited to specific low-level design models used for systemsimplementation. On the contrary, due to abstraction concepts provided by the object-orientation paradigm likeclassification, association, and inheritance, it is well suited for modeling complex application level scenarios. Inthis chapter, we use the de facto standard Unified Modeling Language (UML) introduced by Booch,Rumbaugh, and Jacobson (2001) to model the static aspects of mobile commerce environments.

Based on the object-oriented approach, we organize the entities involved in m-commerce environments inclasses and represent their relationships by associations between the classes. While typically each classbelongs to one sphere of concern, there may—and must—be overlapping classes, as well as associationsbetween classes of different submodels that act as the glue between the respective spheres of concern.Hence, each sphere of concern is characterized by an object-oriented submodel, and these areinterdependent through overlapping classes and associations. We do not model all possible known conceptsand their relationships as explicit classes and associations in our model. In order to be explicitly present as aclass in the model, the corresponding concept must be essential for the existence and evolution dynamics ofthe sphere of concern it occurs in. Organizing the static aspects of m-commerce environments in this wayaims at clarifying the concepts, technologies, and players in this highly complex and dynamic area.

To organize the presentation in the remainder of this section, the submodels are addressed in turn; finally,these parts are integrated into an overall model for m-commerce environments and the relationships betweenthe spheres of concern are discussed. The spheres of concern are listed as follows:

Regulatory Frameworks: The organizational and technical aspects of laws, standards andrecommendations, as well as the bodies involved in their definition or ratification.

Enabling Technologies: This sphere includes technical aspects like user terminal and networktechnologies and cryptography, and organizations developing these technologies.

Business Models: Business aspects, including business players, provided services, business protocols,revenue sharing, and code of conduct are important artifacts in this sphere.

Global Infrastructure: The global infrastructure sphere deals with the global network and the concreteterminals that facilitate m-commerce.

The general approach for each sphere is as follows: We start by discussing in an informal way the conceptsand artifacts specific to that particular sphere and those that should appear in the respective submodel. Theartifacts are then classified using an object-oriented approach. Relationships between artifacts arerepresented by associations between the respective classes. As said above, we use structure diagrams

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (149)

provided by the Unified Modeling Language as notation.

It is important to stress that we are not focusing on specific technical or organizational properties of artifacts inmobile commerce as they have developed during their history, but—on the contrary—have general, long-lasting patterns and properties in mind. For instance, rather than modeling individual types of terminals, weintroduce a class representing these terminals. This means that whenever a new terminal enters the market,conceptually, an object will be inserted in the terminal class. As a result, the model will not change in responseto the introduction of a new terminal type. The same holds for a new standard, a new business model, a newnetwork protocol, or a new modulation technology. Hence we regard the concepts of the model to be invariantagainst changes in mobile commerce environments in the foreseeable future. A schematic picture of thespheres of concern and their dependencies is presented in Figure 2.

Regulatory Frameworks

Business Models

Global Infrastructure

Enabling Technologies

Figure 2: The four spheres of concern

Notice that the spheres are dependent on each other, as specified in Figure 2: the two up-most layers rely onEnabling Technologies; Business Models cannot be deployed without the Global Infrastructure that facilitatesthe concrete m-commerce transactions. The picture also alludes to the relative independence of the layers.One can change something in one layer without necessarily changing the other ones. For instance, offeringGPRS data transfer service within the Global Infrastructure sphere does not necessitate changes in theexisting concrete business models (albeit new business models might become feasible with the "always-on"functionality of the terminals). Business models can be developed and changed without the need to changethe terminals or the network infrastructure in place. The limits for possible business models are still dictated bythe infrastructure; think of selling video-on-demand services over 9.6 kbps wireless links to slow terminals.Putting it the other way round, certain business models set certain requirements for the infrastructure and newtechnologies. New enabling technologies can be developed based on the business requirements or for otherreasons, but this does not have influence the Global Infrastructure as long as they are not deployed in theconcrete networks; existing new enabling technologies are, however, a necessary condition for the changes inthe global infrastructure. Therefore, Enabling Technologies is the lowest sphere of concern in the picture; theupper spheres stay on top it.

The difference between the Global Infrastructure and Enabling Technologies is exemplified by UMTStechnology. The technology as such is ready and available since 2001, and the network components andterminals are in production. But only a tiny part of the wireless access networks are really currently (Fall, 2002)of this type, and there are much less than one million subscribers in the world.

Regulatory Frameworks put forward requirements for all other spheres of concern and restricts their form. Itstands on its own but leans on the other spheres. This reflects the relative independence of the governments,international organizations, and companies and their leading role against the other spheres of concern. TheRegulatory Frameworks sphere influences directly all other spheres, but there are also indirect influences. Forinstance, legislation can require certain privacy rules to be obeyed by the business actors. This can bereflected by the business model applied, and further in the Global Infrastructure sphere, where technicalsupport for privacy maintenance must be in place. On the other hand, developments in the three otherspheres of concern can require regulatory measures to be taken. Typically, a new body must be formed totake care of some aspect of global interoperability (see below), a new consumer protection law passed, oremerging technology otherwise regulated, etc.

Regulatory Frameworks

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (150)

The Regulatory Frameworks sphere represents the global organizational level that is needed to facilitate theinteroperability of the underlying network infrastructure, terminals, and the higher-level—m-commerce—services. This level is also needed to foster and guide the development of new technologies, andlast but not least, to provide the legislative framework for the m-commerce. Interoperability is closely relatedwith the autonomy of the organizations offering m-commerce services. As was shown in Veijalainen (1992b),in order to guarantee interoperability of systems, one needs to establish an organizational entity called globaldesigner. It is responsible for specifying the rules for interoperability within the technical domain controlled byit. A global designer has to have an exclusive power to control the domain, otherwise there almost certainlywill be mismatch and confusion about what is the right way of handling things (of course, sometimes this isalso intended for reasons of competition). Should several global designers design parts of the sameenvironment they must guarantee that the parts are interoperable. Thus, they must cooperate with eachother—or establish a higher-level global designer, and so on, if they want to ascertain interoperability of theirstandards and recommendations.

We distinguish between three main groups of organizational entities, namely legal bodies, standardizationbodies, and interest groups that have formed so far and that most probably will persist in the foreseeablefuture, because the reasons for their existence will persist in the future. They all play a role within globaldesigners for various aspects of the global environment.

The legal bodies are national governments and other organizations with legislative powers, like the EuropeanCommission or the United Nations. These issue legislation that regulate business in general and mobilecommerce in particular. In general, laws say which business models are legal, which are not, and what has tobe taken into consideration when performing m-commerce transactions. Especially the privacy of customers isof concern at this level, as well as jurisdiction and applicable law addressing consumer protection, liability ofmerchants, and dispute resolution. The governments also determine which wireless technologies and accessnetworks using them are allowed in their territory, thus creating the basis for mobile commerce. In the legalrespect, Japan, EU and USA currently form three different areas of rules as concerns wireless networks andbusiness models for mobile commerce. So the domains controlled by these three legal bodies are geo-spatially separated and nonoverlapping. The rest of the world is mostly a "gray zone" but will join the hopefullycommonly established domain (or one of the three domains).

Legal bodies can enforce and ratify laws and other legally binding rules. In this context, the laws set forthconstraints that mobile commerce systems have to meet. It is the responsibility of the business partners toguarantee that the legal constraints imposed by the legal bodies are met. Within the European Union,electronic commerce legislation in general and mobile commerce legislation in particular is to a large extent inthe hands of the European legislative bodies. The European Commission and Parliament has issuedDirectives that are to be integrated into national legislations. The legislation has thus both a direct impact ontechnology, business models, and network infrastructure, and an indirect one through the adjacent spheres ofconcern. Interested readers are urged to visit the EU Information Society portal (2002) and EU e-Commercelegislation portal (2001) to learn more about the various activities performed and legislation issued by the EU.

Legislation can sometimes directly dictate a standard, but usually it just refers to an existing one that has beenprepared by a standardization body or has become a de-facto standard. Agreements on common technologiesand standards are the key to interoperability. This holds for a variety of domains, including wireless networks,software technologies, positioning methods, etc. Standards can be either international ones ratified byinternational standardization organizations, such as ISO (2002), national bodies, such as American NationalStandards Institute (ANSI, 2002), or international institutes like ETSI or IEEE (ETSI, 2002; IEEE, 2002).However, often industry best practices that act as de facto standards are eventually accepted as an officialstandard. This pattern has been prevalent in the past in various technology areas. It has also been observedin Internet network technology where TCP/IP became the standard transport and network layer protocol of theglobal network infrastructure, as well as the layers on top of it, and it does not comply with the OSI standardopen protocols suggested by ISO. GSM technology as a wireless access technology has also conquered

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (151)

majority of the developed countries in the world, although Japan is an exception, as well as partly the USA.UMTS will most probably have a still wider applicability than GSM, because Japan and USA will be on board(UMTS Forum, 2002) and the rest of the world will follow, eventually.

While standardization bodies have—strictly speaking—no legal powers, they are an important instrument forthe industry and governments to agree upon standards in a specific technical domain. Interest groups are aweak form of standardization body. In our sense they are an instance of the abstract global designer, that is,usually established for a limited period of time in order to solve a pressing technical issue. In mobilecommerce, there are several very strong interest groups, each of which focuses on a specific technology, i.e.,on a particular technical domain. The common behavioral pattern of interest groups is to get the key players ofthe field involved and define a de facto standard with the aim of pushing it into the market through their power.An ultimate case is NTT DoCoMo in Japan who led the specification of the i-Mode system, including the wholeprotocol stack, mark-up language, terminals and business model(s), and also deployed the core system.

In order to reach the true global interoperability in wireless communication systems at the application level,many companies are involved in various interest groups in diverse technical domains. These includemanufacturing terminals, setting up wireless networks, and designing and implementing m-commerceservices. The key factor for success in this context is indeed interoperability, meaning the ability of devicesand network technology produced and provided by different manufacturers and network operators tocommunicate with ease and efficiency as desired by customers.

The division of the world into geographic zones or areas is an important issue for roaming customers whowould like to use location-dependent services (like ordering taxi, see below). His or her PTD must be able tonot only use the local wireless access network, but also the local services. 3G networks and compatibleterminals might solve the first part of the problem, but the second problem area—the heterogeneity of theservices—still remains. In 3G networks, ITU (2002) and ETSI (2002) played a central role as global designers,but as far as m-commerce services are concerned, there is no organization that has the power to dictate howthey should look like. The m-commerce services are, first of all, regulated by the local legislation of the zones,and they are highly dependent on the local culture and rules, as represented, for instance, by specificbusiness models issues and codes of conduct.

The companies involved in the wireless telecom business have realized that if the business models and m-commerce services become incompatible in different parts of the world, or indeed within a zone with the samelegislation, roaming customers would suffer. This would have a negative effect on the whole industry. As aresult, the world has now seen many global designers to emerge that try to tackle the problems. These includethe WAP forum (WAP Forum, 2002), but especially the Mobile electronic Transaction Forum (MeT, 2002),Location Interoperability Forum (LIF, 2002), and last but not least, the Open Mobile Architecture Initiative(OMA, 2001, 2002). All these must closely follow the work of the W3C Consortium (W3C, 2002), as well as thework of many other similar bodies and standardization organizations. The situation raises many questions, likewhat guarantees that the diverse recommendations developed by all these bodies will be coherent andinteroperable? Second, what chances does the work of these interest groups have to become global de factostandards or even a sort of guideline for concrete service design? The first problem is more or lesssatisfactorily addressed because the interest groups consist essentially of the same big players, and thesecoordinate the overall architecture development and the concrete work within the different forums. In general,however, there is no guarantee that many global designers specifying closely related recommendations wouldsucceed in achieving interoperability.

The second question above is a tougher one. The OMA Initiative is the answer of the big players: "Theobjective of the Open Mobile Architecture (OMA) initiative is to create a non-fragmented, interoperable globalmarket for the next generation of mobile services" (OMA, 2002). As the name suggests, the idea is to use onlystandard, openly available specifications and software. What is the controlled domain in this case? Formallysoftware, but of course with software comes the functionality. To which extent does this consortium want tospecify the functionality of the software? Theoretically, the interest group can indirectly specify even the "open"

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (152)

business protocols embodied in the "OMA" software. Whether it wants to go so far remains to be seen.Currently, the emphasis is rather on open industry standards, standard tools, and open platforms.

It is worth of noticing that a commonly agreed upon syntax, such as EDIFACT or a particular mark-uplanguage in the XML family, such as XHTML, does not yet help to completely solve the interoperabilityproblem; it remains to be decided by autonomous organizations, which concrete EDI or XHTML specificationsto adopt and what the elements exchanged mean exactly. Furthermore, one must specify which protocol stackis used to exchange the content. The m-commerce protocols are application protocols that support the chosenbusiness model, and these will most probably vary from zone to zone. The services should be paid in auniform way so that the roaming customers are able to use their terminals smoothly. In any case, should thisconsortium be able to keep its promise, it will certainly have a strong impact on the way mobile commerce isconducted in the future.

Based on this general introduction to regulatory frameworks, their players and issues, we now take the steptowards an object-oriented model of that sphere. This is shown in Figure 3. Starting with organizationalaspects, regulatory bodies and companies are represented as specific classes of organizations, withinheritance relationships between them. Regulatory bodies can be either legal or standardization bodies,represented by subclasses of the regulatory body class. Companies join interest groups, which aim at definingde facto standards, represented by an aggregation association between these classes. If the interest groupsucceeds in defining a recommendation, the companies participating in the interest group have a considerablecompetitive advantage, since they already offer products and services complying with that newrecommendation. The left side covers the legal bodies, like governments, the European Commission, and theUnited Nations. They regulate the technical or business domain in a specific geographic area, i.e., a country,or a larger economic region.

Figure 3: Regulatory frameworks

The model shown in Figure 3 provides a detailed, yet abstract view on the entities involved in the RegulatoryFrameworks sphere. It is important to stress that it details the type level, not the instance level. In general,objects are the instances of classes. Thus, objects of the company class are Nokia, Ericsson and Siemens toname a few players in the mobile commerce arena. These companies participate in interest groups with theaim of setting up recommendations. For instance, the Mobile Electronic Transaction Forum is an interestgroup aiming at defining de facto standards for secure mobile transactions. Tens of big companies, including

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (153)

Nokia, HP, Sony Ericsson, Oracle, Sun, IBM, NTT DoCoMo, NEC, Siemens, Vodafone and AT&T Wirelesshave joined the OMA Initiative (see OMA, 2002 for further details).

We believe that the class structure of the organizational entities as shown in Figure 3 will persist in theforeseeable future. We are still fully aware that a deeper analysis requires populating the instances andgrasping the concrete dynamic relationships between interest groups, standardization bodies, and legalbodies, as well as the analysis of the individual organizations. For instance, the analysis of interest groups, thereasons for their emergence and dissolution, their impact on the technology and markets, their relationship toglobalization, etc., could be studied in research projects. There is work done in this vein on the standardizationof 1G, 2G, and 3G systems: see, e.g., Telecommunications Policy (2002).

Enabling Technologies

Advances in electronic commerce, in general, and in mobile electronic commerce, in particular, have, to alarge extent been spawned by technological advances, both with respect to wireless network technology anduser device or terminal technology. In this section we focus the second part of the overall mobile commercemodel, i.e., Enabling Technologies.

It is not just one technology that makes mobile commerce possible. It must also be available for users throughmobile terminals, access networks, and servers. Personal Trusted Devices (PTDs)—i.e., wireless terminalswith personal flavor and security facilities as access devices in mobile commerce—are in a crucial position inthis respect. This is due to the fact that the technologies incorporated in them (such as processors, protocolstacks, and local applications) largely determine which m-commerce services can be offered. Indeed, thecurrent PTDs where a PDA and a GSM phone are integrated and run WWW and WAP browsers offer mobileaccess to the Internet and m-commerce services but use the basic GSM services offered since the beginningof 1990s. The GSM network technology was thus mature enough from the beginning for mobile commerce, butbefore the terminals had reached the current stage of development, mobile commerce could not be realized.For these reasons, PTD is in the center of the Enabling Technologies sphere in our model, as shown in Figure4.

Figure 4: Enabling technologies

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (154)

Each Personal Trusted Device is associated with a set of features, which can be classified as protocolfeatures, functional features and physical features. Protocol features represent wireless network protocolstacks that the device supports (e.g., GSM and WAP stack). Functional features subsume a variety ofdifferent functional aspects, for example, positioning (like GPS receiver functionality), and security and privacyfeatures. As indicated above, features of PTDs are defined in technical specifications that manufacturers haveto adhere to. Notice that the technical specification class is also present in the Regulatory Frameworks part ofthe overall mobile commerce model. These overlapping classes will act as the bridge between the EnablingTechnologies and Regulatory Frameworks spheres. That is, the impact of the Regulatory Frameworks on theEnabling Technologies comes, among other things, through the technical specifications.

Besides the manufacturer, the network operator is another subclass of company involved in EnablingTechnologies. While manufacturers produce Personal Trusted Devices, network operators also take part intechnology development either directly or through various interest groups. For instance, NTT DoCoMospecified the i-Mode technology and let the manufacturers produce the concrete network components andterminals. In the WAP Forum, network operators try to influence technology development through technicalspecifications.

Global Infrastructure

Enabling technologies are a necessary ingredient for the concrete deployment of wireless network technology.We keep the deployed networks separate from the base technologies for several reasons. First, there aremany individual technologies (such as encryption and protocols) that must be joined coherently in order toform a functioning global infrastructure. Second, the individual technologies were developed ratherindependently from each other and are controlled by players other than telecom operators or networkproviders. Third, the deployment of the concrete networks is largely on the responsibility of the individualtelecom and other operators, such as Internet Service Providers (ISPs). It follows that the global infrastructureis fragmented into hundreds of wireless access networks and a (few) backbone network(s). Each network isconformant with the legislation of the country or area where it is deployed. This causes many potentialdifferences. Although the different network generations might be interoperable among each other, the concretenetworks still might be, technically, at different stages (e.g., 2G, 2.5G (GPRS), 3G). In addition, a terminal canroam and can or cannot get access to the wireless networks of different operators based on the roamingcontracts. But getting access to the wireless network at the levels 1–3 does not yet guarantee that the terminalis able to, in fact, access the local m-commerce services. This is because the business model or the technicallevel implementation might be different (e.g., markup languages in the home network and in the visitednetwork may differ), or it simply cannot find the services in the local network, because it does not know theaddress of the service directory or cannot access it due to protocol differences. Finally, even if the terminalwould be able to find the services and offer them to the user, it might not understand the local language usedin the services in order to properly use them.

The abovementioned problems are largely independent from the Enabling Technologies and also, as it turnsout, from the Business Models. They all manifest the same phenomenon at different system levels. Thephenomenon is sometimes called roaming heterogeneity. It is a severe issue of the wireless globalinfrastructure that is currently not fully understood, albeit recognized or even solved. For instance, the OMAInitiative (2002) does not use the term, but it addresses exactly roaming heterogeneity at the service level, aswas discussed in a previous section.

We envision that the PTDs and the wireless networks will persist far into the future and the networks aredeployed and managed by (mobile) network operators. Irrespective of the technology generation, the structureof the networks is rather coarse, such that the wireless link is between the PTD and a base station or anotherentry point and the backbone network is wired. We also assume that there are hundreds or thousands ofoperators in the world that have their own customer base. Each wireless network occupies a restrictedgeographical area. Because competition is allowed and required in the telecom markets, there are several

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (155)

wireless networks operated in the same geographical area. From this basic organizational arrangement, itfollows that customer roaming requires a patchwork of contracts between operators. It also requires technicalsupport within the network that is at least as powerful as in GSM networks. In theory, a user can roambetween different network operators even if she would not leave her home country, but because of competitionthis is not common. Roaming precludes, thus, that the customer moves to the operation area of a foreignoperator in another country or region.

The submodel of the Global Infrastructure sphere is shown in Figure 5. As represented by the inheritancehierarchy shown, the networks managed by operators may be either wireless or wireline. By definition,Personal Trusted Devices require wireless networks in order to operate. As indicated above, these wirelessnetworks can be used to access wireline networks and the services provided. For instance, second-generationwireless networks, such as GSM, can act as access networks to wireline networks, typically to the internet.WAP 2.0 specification assumes that the wireless terminal can indeed be an IP-enabled device, although it iscompatible with the complete WAP stack solution introduced earlier, as specified by the WAP Forum (2002).

Figure 5: Global infrastructure

To sketch the main classes of the submodel shown below, we remark that manufacturers deliver networkcomponents that are being used to build and run networks. Networks should obey local legislation, i.e.,legislation is pertinent to areas. PTDs may roam to areas and networks. In particular, area binds the validity ofthe business models and extension of the networks into a specific geographic area. The terminal must roamon this area whenever it wants services from a specific network. It is worth mentioning that there is also adirect relationship with Figure 1. The PTDs are a special case of the mobile terminals, and the wireless accessnetworks are usually those deployed by network operators. To this end, Figure 1 can be seen as a moredetailed representation of the different network types and their instances, as well as a rather abstract topologyof the components of the overall global infrastructure.

Business Model

The abovementioned spheres of concern provide the environment for the business aspects of mobilecommerce. After all, economic aspects are the driving force behind mobile commerce developments andapplications, and are the source of revenues for the companies involved.

Timmers (2002) defines business models as follows: A business model consists of:

an architecture for the product, service and information flows, including a description of the variousbusiness actors and their roles;

a description of the potential benefits for the various business actors; and

a description of the sources or revenues.

In brief, a business model thus describes the economic player categories, the products and services offered,

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (156)

how the players interact, the information and goods that flows, the sources of revenue, how the economic yieldis shared among the players, and how they are related with the above flows. We add the code of conduct tothe above list, because it has a considerable local impact on the form m-commerce can adopt.

Japan is probably the most advanced mobile commerce market today. Therefore, we look more closely at it.Devine and Holmqvist (2001) distinguish the following players on that market: user, mobile network operator,telecom operator, application provider, facility supplier, information provider, contents holder, solution provider,financial institution, and terminal manufacturer. All these players get their revenues from the user, but only themobile network operator, the information provider, the application provider, and the financial institution aredirectly involved in individual m-commerce business transactions. Thus only these directly participate inproviding the mobile e-commerce services and in direct revenue sharing. The other players (like solutionprovider and contents holder) get their revenues indirectly. NTT DoCoMo's i-Mode service has currently over30 million subscribers, and the average monthly revenue per subscriber is about 40–50 US $.

The Business Model sphere of the mobile commerce model, reflecting the above narrower view, is shown inFigure 6. The E-Business Company class contains the enterprises involved in electronic business. Businessmodels are in the heart of the e-business companies. A business model consists of one or more businesstransaction specifications. A business transaction specification consists of a business protocol and servicedescriptions the protocol can access and handle. One can, for instance, imagine that the business protocol isan abstract protocol specification and a service is a WWW page that delivers the content needed or runs aprogram changing a database state at the requested organization, e.g., modifies a balance in a bank. Theservice can be atomic, in which case it does not invoke further business transactions. Notice that the businessprotocol can also, in this case, still invoke several request-response pairs towards the service. A service canfurther require other services to be invoked at different sites. Therefore, it runs a new business transaction.Typically, this happens, for instance, if somebody is ordering a book and paying with a credit card. Thepayment would be a new business transaction between Amazon and VISA. Upon running this businesstransaction, revenues are generated. We thus model revenue generation at this level of abstraction.

Figure 6: Business model and related concepts

A simple request-reply PDU pair may access a service, but it may also be a complex of services accessed bymany request-response pairs. This means the service consists of a set of other services, which are related bya Business Protocol. The concept of Business Protocol is treated in more depth in the next section when

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (157)

discussing an example. At the model level, Business Transaction has Business Protocol as a directcomponent, but this can invoke Service or Atomic Service.

A business protocol specifies the steps that occur when business partners cooperate, as well as the format ofthe data exchanged during the cooperation steps. Each step within such a business protocol is typicallycharacterized by the received message and the response sent in another message. A simple one is whereupon receiving an order, a mail order company responds by sending a message, acknowledging the order. Weremark that there are a number of technologies for business-to-business data exchange, known as businessprotocols. There are also a number of standards for business protocols in place, e.g., Electronic DataInterchange (EDI). These technologies cover static as well as dynamic parts of e-commerce environments,because they provide data format standards (e.g., data structures of orders) and data exchange standards(messages sent during a successful cooperation). An Atomic Service is conceptually indivisible in that it doesnot require a further business transaction to be run. An example of a very simple atomic service instance isresponding to a weather forecast request with the respective temperature forecasts. As these brief examplesshow, on the one hand business protocols are used to implement business models; on the other hand theymake use of the global infrastructure to enact the services. They are thus the crucial link between these twoworlds.

Service composition has recently emerged as an important aspect to develop Web applications based on so-called Web services, sponsored by the World Wide Web Consortium, W3C (2002). Web services arebasically applications provided by a company that can be accessed via the HTTP network protocol. Usingsuitable wrappers, many services that are implemented by back-end systems, e.g., Enterprise ResourcePlanning systems, can be made available to a large market by Web services technology. While Web servicesare developed in the context of electronic commerce, they can also be used in mobile commerceenvironments to provide the base functionality required by a complex mobile commerce application. Consider,for example, a mobile commerce application, where customers can make reservations and book and pay forflights via WAP devices. While the interaction with the customer is provided by mobile commerce technology,the back-end functionality like flight reservation and payments has to be offered by a suitable back-endsystem.

Web services are a new technology based on accepted standards. While the key technologies are already inplace, the composition of Web services is currently under research. The basic understanding of Web servicesis that the individual functionality accessed by individual Web services (e.g., making a flight reservation) canbe combined with other services within a predefined order. It is in this way that application processes can bedeveloped based on individual steps, covered by Web services. For example, a payment step can be followedby a successful flight reservation step. In the next level of abstraction, the new Web service processes, flightreservation and payment, can be made available. We model these aspects of service composition, in general,and Web service compositions, in particular, in the static structure model by a recursive federation betweenthe Services class through Business Transaction and Business Protocol.

Business partners provide services to their customers, i.e., business actors. A business actor can either be anindividual (e.g., a person ordering a weather forecast of southwestern France for next Friday), or it may be acorporate business actor. These can make use of services to offer value-added services to their respectivecustomers. The goal of each of the business partners involved is to generate revenue from service'sexecutions. Notice that the legislative bodies provide the legal environment in which the business models aredeveloped.

The Business Models sphere also addresses the geographical validity region of a Business model,represented by the class Geographical Entity, associated with the Business Model class and with the BusinessActor class. This is important, as the business actors and the models applied do have a location on earthwhere they are legal and accessible. It is interesting to notice that the association between business modelsand geographical location are quite stable: As defined by legislative rules (in the Regulatory Frameworks), agiven business model is associated with a geographical location on earth. This may not only be a XYZ-

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (158)

coordinate, but it can also be an organizational entity associated with an area, such as a state or anassociation of states (for example, the European Union). Hence, the geographical entity class has subclassesgeographical location and geographical area, representing the abovementioned concepts in the model.

Complete Model

The four spheres developed above are now integrated into the complete mobile commerce model. Asdiscussed above, the glue between the submodels is provided by the associations between classes of thedifferent spheres as well as by common classes. As an example, the Technical Specification class of theRegulatory Framework submodel is associated with the Feature class of the Enabling Technology submodel,gluing the two submodels together. The same holds for the Business Model sphere and the EnablingTechnology sphere, where the Service class is associated with the Feature class. Another form of gluebetween the spheres is characterized by inheritance: The E-Business Company class of the businesssubmodel is a subclass of the Company class. The overall mobile commerce model is shown in Figure 7. Forease of convenience, each submodel is represented by a package in that figure. These relationships betweenthe packages are represented by the dotted lines in Figure 7.

Figure 7: Complete m-commerce model

Additional associations between classes can be drawn. For instance, Regulatory frameworks have a validityregion on earth; in particular, the three main regions (US, JP, EU) can be regarded as three geographicalregulatory frameworks. Business models adhere to a certain legislation and thus to a certain region, and aterminal is in a certain location on earth that belongs to a certain validity region. The issues in this context areof two kinds: the terminal is able to interact with the rules of a certain region. These rules are characterized bythe wireless access network in place, the business model that the services implement, and the protocol stackthat is used to facilitate the m-commerce services. While roaming to another region, roaming heterogeneitycan occur, i.e., the terminal (or user) is not anymore able to take advantage of the services. Second, and thisis a general problem of electronic commerce, as well: the terminal can use services in another validity regionthan where it is located. If the rules applied to the services differ, whose rules should be followed? Examplesof these rules are legislation, governing taxation, duties, and the handling of disputes.

Some of the above classes have also a direct relationship with the entities presented in Figure 1. The PTD is asubclass of the wireless terminal and the wireless access networks are instances of wireless network in theEnabling Technologies sphere.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (159)

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (160)

Sample Scenarios

In this section we look closer at some mobile commerce scenarios in order to illustrate the feasibility of themodel presented and in order to discuss location-dependent services -which are at the heart of mobilecommerce-in more detail.

Ordering a Taxi

The first scenario is a typical situation in urban environments, where a traveler arrives in a city and wants toorder a taxi for local transport. Different phone numbers of taxi agencies in different cities and-in case offoreign countries-language problems render traditional ordering by phone cumbersome, so that mobilecommerce services will provide a more convenient solution for the customer.

The presence of location information on both the traveler and the taxi facilitates this new convenience. Thebasic idea of this service is that once the terminal (i.e., the traveler carrying the PTD) and a taxi can bepositioned accurately enough, the taxi can be ordered based on that information without the need for thecustomer to know local phone numbers or local business practices.

At the business model level, it can be expected that a taxi that is closest to the terminal can offer thetransportation service cheaper than a more distant taxi. The overall business protocol involved is representedby a simple sequence diagram shown in Figure 8. For each party involved in the scenario, there is a verticalline. The messages between different parties are represented by arrowed lines between the vertical linesassociated with the parties. More elaborate techniques to specify business protocols are feasible, but for thepurpose of this chapter, the notations based on sequence diagrams will suffice.

Figure 8: Business protocol, taxi scenario

Briefly, the steps go as follows:

Positioning of the customer terminal (triggered by the terminal)1.

Sending the coordinates and other parameters to a global directory service server that determines anappropriate service provider based on the position and service type

2.

Sending the coordinates and other parameters to a taxi server instance, selecting an appropriate taxi(terminal and server involved)

3.

Selecting the taxi and guiding it to the customer (server, taxi involved)4.

5.

6.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (161)

4.

Finding the customer and picking him/her up (taxi, terminal)5.

Transport as determined by the customer (taxi, physical step)6.

Taking care of payment (terminal, taxi)7.

In brief, the m-commerce infrastructure does the searching and possibly the negotiation for the customer. It isevident that in step 1 the terminal must be able to position itself and in step 3 subsequently send out thecoordinates to a server instance that takes care of the taxi ordering. The first step can be performed using theGPS functionality of the terminal or asking the wireless telecom network to find out the coordinates (existingtechnology for this tasks includes E-OTD, a GSM-based location technology). In the latter case the terminaluses a special positioning service offered by the network.

In step 2, the main task is to find the address of the local taxi service instance to which the taxi order requestshould be send. This corresponds to the problem of finding the phone number of a local taxi service. Inprinciple, the country, city, and suburb can be deduced from the coordinates of the terminal, but a rather heavyinfrastructure service is needed in order to determine the appropriate taxi service center server in the networkto which the request should be sent. Marketplace and auction mechanisms can be deployed to tradetransportation resources.

Assuming that step 3 is successful, step 4 is taken. It is more complicated than the former ones. During thisstep, the specific taxi to serve the customer is selected. It is immediately clear that the location of theindividual taxis must be tracked by the taxi service center in regular intervals so that the location is known witha reasonable accuracy. Which taxi to select? An obvious answer is "the closest one which is not occupied,"but this is evidently not the only optimization criterion. The closest in Euclidean sense is not necessarily themost appropriate, because the street network might require the closest to drive a long way and maybe stop atmany traffic lights before reaching the waiting traveler. Second, the customer can give as part of the order thedestination and timing parameters. The latter might indicate that the taxi is needed in, e.g., 10 minutes at thelatest. This gives possibilities to optimize the allocation. The destination is also important. Based on theparameters, the taxi service center can optimize the allocation of taxis ahead of time: It knows, at leastpartially, what will be the location of the fleet in the next 10, 20, or 30 minutes. Knowing the destination mightalso prune some allocations, because certain drivers would not want to go to the destination indicated by thecustomer for various reasons. Finally the number of people to be transported as well as specific constraintssuch as large luggage items are also important and could be provided by the customer. Based on thisinformation the taxi service center can allocate an appropriate vehicle.

Step 5 is about finding the customer. This can be tricky, but ordering the taxi through a PTD helps in severalways. The customer could get as part of the response to his/her order the order number, the license numberof the taxi (and even a color picture of it), and the driver's phone number. An even more sophisticated way isto let the taxi track the customer's position while approaching. This is would be handy, if the customer wants tomove from the ordering location while waiting. With customer tracking, the need to order the taxi to a certainaddress and wait there is not necessary anymore. In step 6, the actual trip is performed. The customer canexpress the destination by giving the address or just confirming the destination given earlier. The point is thatthe driver and customer need not have a common spoken or written natural language in this phase. The trip ispaid in step 7. This can be based on cash, physical credit card, or PTD with payment functionality. PTD cancommunicate with the payment infrastructure in the taxi using a Bluetooth link and the customer can confirmthe payment on the PTD.

Of course, the scenario presented is simplified with respect to numerous aspects. There might be disputesabout whether the taxi arrived on time or not, whether the shortest path was chosen, etc. Although important,location-related disputes are for further study (see Tang and Veijalainen (2000) for more on disputes in e-commerce). The commitment to an order and disputes are tricky aspects that are dependent on the businesshabits (code of conduct) in a country and contribute to the roaming heterogeneity, i.e., business model andtechnical heterogeneity between countries and mobile network operators. These become evident because

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (162)

people roam and need services from different local providers. Another not so trivial aspect is to map the (XYZ)coordinates to <address>. It is by no means easy in an arbitrary country that uses local coordinate systems. Itrequires, most probably, coordinate transformations and attachment of them to the local map. Using the XYZcoordinates of the customer directly (in WGS-84 format) is rather hopeless, because they do not tell the taxidriver how to reach the customer. Which player provides this mapping? It can be the taxi ordering company,each individual taxi owner (GPS car map), or an external service provider that upon getting a coordinates<XYZ> returns the <address>. These are actually issues that must be solved within the Global Infrastructure.These infrastructure issues are for further study.

From a business model point of view, it is interesting to investigate what types of players exist and how therevenues obtained from the taxi customer are divided among the parties in the above case. The customerpays both to a mobile network operator and to the taxi company after the trip has been done. If the automatedservice is not better than the current voice based, the customer is hardly interested in paying more than now.There are still many benefits both from the customer point of view, as well as from the taxi company point ofview. Thus, it could be expected that these kinds of systems would become common in the future.

This simple specification of the taxi scenario can be extended in multiple ways. For instance, the orderingsystem could also support small-scale auctioning; who takes this customer to the destination, how fast and forwhat price? The result of the auction could then be returned to the customer as a response. These arebusiness model ideas made possible by technology, but the local taxi companies and legislators shouldendorse them before they become reality.

The above service requires privacy protection measures and customer trust. For instance, the tracking of thephone number should only be enabled for this particular purpose, this taxi-order here and now. In general, m-commerce transaction security can probably be improved through location-based authentication, as it is shownby Denning and MacDoran (1996). Location, as calculated from a location signature, adds a new dimension touser authentication and access control. It can be used to determine whether a person is attempting to log infrom an approved location and using approved services. It is for further study, how this kind of authenticationcan be combined with the m-commerce infrastructure services.

From the discussion of this sample scenario the mapping of the artifacts involved to the mobile commercemodel, as presented above, is quite clear. Rather than discussing this mapping in detail, we state the mainentities for each submodel:

Regulatory Framework: The Regulatory Framework submodel determines the form of the overallinfrastructure and facilitates the terminal and the servers to communicate. While the sample scenariodoes not rely on any particular wireless network (e.g., no video streams have to be passed), the terminaland the servers have to be connected in a way that facilitates their communication. But technicalspecifications are not only necessary for wireless networks, but also for the terminal itself and thepositioning functionality provided. In some cases the network allows a positioning provided by cellinformation, unless the terminal can provide the coordinates itself by using a satellite positioning method(GPS, or GALILEO). To provide a more detailed mapping from the entities of the example to the classesof the model, we mention that the device that the traveler carries must conform to some standards (classStandard) set by an organization (Standardization Body). Standards define technical specifications(Technical Specification) consisting of a set of features (Feature) that the personal trusted device (PTD) ofthe customer offers.

Enabling Technology: The Enabling Technology submodel concentrates on the terminal and its features.In particular, the personal trusted device was built by a manufacturer that is a company, represented by asuper-class relationship between the Manufacturer and the Company class in the model. In order tooperate in a particular network environment, the PTD requires a wireless network (Wireless), which is asub-class of the Network class. Networks are provided by network manufacturers, as specified by theassociation in the class diagram. In this sample scenario, the PTD has to offer specific features, mainly

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (163)

the ability for positioning to make use of the taxi-ordering service. In the class diagram, this feature isrepresented by the named association called Requires between the Feature and the Service class.

Global Infrastructure: The Global Infrastructure models entities that are relevant for facilitating mobilecommerce applications from an infrastructure point of view. In the example at hand, this submodel isrequired for defining the network communication standards as well as specific PTD properties that, e.g.,enables the traveler's PTD to connect to the local mobile network. In addition, roaming contracts betweenthe network operators involved have to be in place to allow the traveler to use services in his or herdestination city. Appropriate business models, as well as the legal context, have to be present at thatlocation. As this brief discussion shows, the main classes of the global infrastructure diagram shown inFigure 5 are required in this particular example.

Business Model: The business model is implemented by a set of services, which are executed accordingto some business protocol. While an exact specification of the protocol is outside the scope of thischapter, we mention that the customer requests the service using his or her terminal. The service istransferred to a service provider, which now performs a series of activities in order to serve the customerwell. In particular, location information has to be tracked and an appropriate taxi has to be triggered toserve the customer. The PTD must thus be able to run the business protocol in Figure 8. This is a trickyrequirement, unless there is a global standard that the terminal can rely on. The global directory service isan easy issue, because one can assume a globally specified protocol. Particular questions arising fromstep 3 are: in which format are the coordinates presented to the local taxi service? How are theparameters encoded? What parameters are allowed? How is the result to be interpreted? The taxi serviceis also a service in our sense, but the special feature is that this service uses a physically moving object(a car) to realize the service. In the business protocol sense a taxi is a service provider and is accessiblethrough the wireless network.

As indicated above, complex positioning issues may arise, taking into account physical aspects such asstreets, and maybe even traffic. However, the geographical entity class represents the location-dependentproperties of the example quite well, including the location of the taxi and the customer (by the Location sub-class of the Geographical Entity class) and the area specification where the taxi service is provided (by Areaclass).

Wireless Payment

Just like fixed payment terminals, PTDs can be used to pay for goods or services, but there are newpossibilities, too. A PTD can contain the private key and credit card information of the customer. Thisinformation can be used to build services that are based on electronic commerce infrastructures, on the onehand, and on a wireless short-range link on the other. Concretely, the PTD can communicate with the cashregister over Bluetooth in order to pay for the (physical) goods in the shopping cart.

In a standardization effort, the Mobile Electronic Transactions Forum (MeT, 2002) has developed a protocol tofacilitate wireless payment. As a result, MeT set up recommendations that service providers have to adhere toin order to provide interoperable and efficient m-commerce solutions, e.g., in wireless payment. But wirelesspayment also requires Enabling Technology and Business Model aspects. For instance, the EnablingTechnology includes a public key infrastructure, which can be modeled as a feature of PTDs. Just likepreviously, these features are defined by Technical Specifications that in the context of payments may also bespecified by law (cf., privacy issues related to payment). In addition, wireless payment is organized as abusiness model of financial institutions. These payment services are provided to the customers, and theyconsist of a number of services, which are executed, in some order, according to the business protocol inplace. Business actors (for instance, the traveler using a taxi) use that service for convenient payment. Thefinancial institution maintains an infrastructure and business relationships that enables it to organize thepayment between the parties involved.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (164)

Ticketing

The idea of ticketing applications is structurally similar to the location-based services where the customer firstdetermines the location and then uses it to access some service. In the case of ticketing, however, thecustomer gets the ticket from a merchant, similarly to the goods in the wireless internet e-commerce. Thepayment scheme can be a credit card, online banking, and also billing. Goods are, of course, in this caseintangible, i.e., bit strings that are stored into the memory of the PTD, encoding the ticket information. Days oreven months later after loading the digital ticket into the memory of the PTD, the ticket is used when enteringthe event, for instance a concert hall or an aircraft in case of a travel ticket. The reasonable usage of this formof electronic tickets requires that the PTDs are capable of communicating over short distances with the cashregisters or ticketing devices in the busses and concert houses, etc. This can currently best happen overBluetooth, although Infrared connections might also be feasible in some cases. The general scheme looks asfollows:

Tickets can often be cancelled or modified before they are used. If cancelled, the money charged is typicallypaid back. The cancellation transaction assumes that paying back is possible by knowing, for example, aterminal owner's identity. In practice, money return is possible by using credit card or bank account numberstored at merchant's database for customer with the recorded identity. Notice that the ticket could also bemodified (typically, an airline ticket is often changed before it is used) and even transferred to other person'sPTD, using a Bluetooth or infrared link. We stress that MeT develops schemes for standard ticket formats. Inthis scenario we refrain from discussing the various classes of the mobile commerce model but leave theseconsiderations to the interested reader.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (165)

Related Work

As concerns related work, we are not aware of as extensive approaches covering wide aspects of mobilecommerce environments as ours. A work somewhat relevant to the one presented in this paper is Siau andLim (2001), where the authors provide an overview of mobile commerce and a research agenda. A clearseparation between Enabling Technologies and Business Models is drawn, but no particular modelingincentive is applied. That paper concentrates on Enabling Technologies and Business Models spheres ofconcern in our sense. The Regulatory Frameworks sphere is hardly touched, and it is not treated as a specialtheme requiring attention.

A somewhat similar framework for m-commerce applications, as ours is presented by Varshney and Vetter(2001). The framework also uses a layered approach, but it focuses strictly on technological layers. The mainpurpose of that work is to assist in the development of m-commerce applications. It analyzes m-commerceapplication types, such as mobile financial applications. The paper shows, in a pragmatic way, that theproperties of wireless network technology can be reflected to the application under development. Thus, thepaper is well equipped to improve the development of m-commerce applications. The focus of our chapter isdifferent: it is broader and more formal. It is broader since not only technical but also organizational and legalaspects are covered in the four spheres of concern. It is more formal, since for each layer the main artifactsare modeled using an object-oriented approach. Finally, we seek to find invariant properties of mobilecommerce environments, which are not covered in Varshney and Vetter (2001).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (166)

Conclusions

This chapter discusses mobile commerce environments from a bird's-eye perspective. The focus is onorganizing the main concepts and players in mobile commerce into four spheres of concern with the aim of abetter understanding of this complex and dynamic area. The fundamental basis is the Global Infrastructure. Itconsists of wireless and wireline access networks and a global backbone, able to transmit huge amounts ofdata between terminals and servers. The Global Infrastructure covers a huge number of wireless terminals,soon more than 1 billion. This basic structure facilitates mobile commerce and will persist a long time into thefuture, although the concrete wireless and wireline access technologies and those of the backbone itself willchange over time. We expect the digital convergence to hom*ogenize the backbone technology, and it is alsorather probable that all wireless and wireline terminals will have a unique global network address in the future.The access technologies will show more variety and at least the big division into wireless and wirelinetechnologies will persist.

From an m-commerce point of view, transmission speeds have an important role, because faster—andcheaper—wireless data transfer enhances the set of m-commerce services that can be used by thecustomers. Transmission speeds on individual channels will increase in both categories over time. A curiousexception seems to be the telecom voice traffic, where the 4kHz bandwidth and 64 kbps uncompressedcapacity requirement are expected to persist years. Wireless channel data transfer rates will have to grow butwill in general be much smaller than wireline ones. Still, already GPRS offers transmission speeds that areessentially the same as typical wireline modems, and 3G should mean a considerable improvement in thisrespect. In overall traffic volume, wireless traffic will increase relatively and absolutely. Within the wirelessaccess networks, voice traffic will form a smaller portion than currently and data traffic a greater portion. Still,the wireless voice traffic will grow many years to come, because the rapid proliferation of the wireless phonecustomer base increases the traffic volume.

Global Infrastructure will consist of hundreds or thousands of different networks, run by different operators.The terminal owner has a home network, and if that cannot service her while roaming, foreign networks haveto offer wireless access and network services. The nasty problem is roaming heterogeneity that isencountered at each system level. The Open Mobile Architecture Initiative tries to tackle this problem at the m-commerce service level.

It remains to be seen how this will succeed, because it is not only a technical and organizational issue, butalso a legal and business issue.

Another fundamental sphere is Enabling Technologies. Their development was a necessary condition for themobile commerce to emerge. The Personal Trusted Devices are in a crucial position in this respect, becausethe technologies incorporated in them largely determine which m-commerce services can be offered. Theadvances in enabling technologies, such as integrated circuits, processor technology, wireless communicationtechnologies, software technologies, cryptography, battery technologies, positioning technologies, etc., andtheir implementation in PTDs are a crucial condition for mobile commerce to advance qualitatively. Throughincreasing m-commerce functionality more sophisticated services are possible and, consequently, higherrevenues become possible.

A further relatively independent sphere of concern is Business Models. For the concrete business models theEnabling Technologies and the Global Infrastructure are a necessary basis. Our modeling effort concentrateson the basic business actors and their interactions over the network that form the concrete instantiation of themobile commerce. We exclude the infrastructure providers that do not explicitly take part in performing m-commerce transactions. The main source of revenues is the customer accessing the m-commerce servicesover the network infrastructure, but also advertisem*nt or other similar sources are possible. The BusinessModels sphere also addresses the geographical validity region of a business model. This is important, as the

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (167)

business actors and the models applied always have a place or area on the earth where they are legal and/oraccessible. How high can the revenues of individual actors be? What kind of business actors and models canexist? These kinds of questions are not answered at the level of our model, but they are interesting and mustbe tackled in the future. Our modeling incentive helps in focusing on the right issues.

Finally, we discuss Regulatory Frameworks. These include the legal bodies that issue legislation, as well asstandardization bodies and interest groups. They all can be seen as global designers specifying a commoninteroperability area. Some standardization bodies, like ISO or ETSI have basically global coverage. They donot, however, have any legal means to enforce the standards into usage. A typical problem with the currenttruly global standardization bodies is that they are rather slow in developing the standards, in comparison tothe emerging needs. This has led to the establishment of industry-led unofficial bodies that we call interestgroups. For mobile commerce area the most important bodies are the WAP Forum, the Mobile ElectronicTransactions Forum, and the Location Interoperability Forum. A still less cohesive conglomerate is the OpenMobile Architecture Initiative (OMA), but it has the most ambitious goal: "to create a nonfragmented,interoperable global market for the next generation of mobile services." Should this initiative be successful, itwill have crucial impact on the future of m-commerce.

Common to mobile commerce and electronic commerce, as they exist currently, are technologies likeHyperText Transfer Protocol (HTTP) for communication, HyperText Markup Language (HTML) or a member ofthe eXtensible Markup Language (XML) family for content, and the Java programming language forfunctionality. Regulatory bodies and especially interest groups also specify these. Furthermore, they play animportant role also in business aspects. For instance, there are a couple of interest groups involved in settingup XML-based recommendations for business to business integration; the ebXML approach is put forward byOASIS and UN/CEFACT, a United Nations body. Naturally, there are a couple of differences in the EnablingTechnology sphere between electronic commerce and mobile commerce. There is little need for definingspecific devices and their properties, since electronic commerce applications are typically run by a computerconnected to the Internet. Business aspects, however, are quite similar. There are electronic businesscompanies, which offer services and business protocols to implement their business models. The MobileElectronic Transaction Forum, for instance, is actually defining essential parts of the business model (servicesand protocols), but also lower-level technical specifications. Whether this is feasible, globally, remains to beseen.

In this chapter we propose a conceptual, object-oriented model to describe different spheres of concerns inmobile commerce environments. The framework seems promising. We are confident that the spheres ofconcern introduced here are fruitful in the forthcoming research. At the same time we are aware of thelimitations of the work as concerns the analysis of the dynamics of the m-commerce field. This is for furtherstudy.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (168)

Acknowledgements

The work of the first author was performed to a considerable extent in summer 2001 while he was visitingFhG-FIT in Sankt Augustin, Germany, during his leave of absence. The support of FhG-FIT, as well as thesupport of the National Technology Agency of Finland (TEKES), Nokia, HP Finland, and Yomi Solutions undercontract 40599/99 (MultiMeetMobile) are highly appreciated. The valuable comments of Jukka Heikkilä, AnttiAarnio, and Aki Enkenberg are also highly appreciated.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (169)

References

ANSI (2002). American National Standards Institute [online]. Accessible at http://www.ansi.org.

Booch, G., & Rumbaugh, J., & Jacobson, I. (2001). The Unified Modeling Language User Guide. Boston:Addison-Wesley.

Bluetooth Consortium [online]. Accessible at http://www.bluetooth.com.

Denning, D. E., & MacDoran, P. F. (1996). Location-Based Authentication: Grounding Cyberspace forBetter Security, Computer Fraud & Security. Elsevier Science Ltd. Accessible athttp://www.cosc.georgetown.edu/denning/infosec/Grounding.txt.

Devine, A., & Holmqvist, S. (2001). Mobile Internet Content Providers and Their Business Models.Master's thesis, Stockholm Kungl Tekniska Högskolan, January 2001. Accessible athttp://www.japaninc.net/online/sc/master_thesis_as1.pdf.

Durchlacher Research, Ltd. (2000). Mobile Commerce Report [online]. Accessible athttp://www.durchlacher.com.

EU Information Society portal (2002). Accessible athttp://europa.eu.int/information_society/services/sitemap/index_en.htm.

EU E-Commerce legislation portal (2001). Accessible (archived) athttp://europa.eu.int/ISPO/ecommerce/legal/legal.html.

ETSI (2002), European Telecommunications Standards Institute (ETSI) [online]. Accessible athttp://www.etsi.org.

Oasis, UN/CEFACT: Electronic Business Exchange Jointly Sponsored by OASIS and United NationsCentre for Trade Facilitation and Electronic Business [online]. Technical Documentation accessible athttp://www.ebxml.org.

Helal, A., Haskell, B., Carter, J. L., Brice, R., Woelk, D., & Rusinkiewicz, M. (1999). Any Time, AnywhereComputing; Mobile Computing Concepts and Technology. Kluwer Academic Publishers.

IEEE (2002). The Institute of Electrical and Electronics Engineers, Inc. [online]. Accessible athttp://www.ieee.org.

IEEE LAN/MAN Standards (2002). LAN/MAN Standards Committee 802 [online]. Standards available athttp://grouper.ieee.org/groups/802/.

ISO (2002). International Organization for Standardization (ISO) [online]. Accessible at http://www.iso.org.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (170)

ITU (2002). International Telecommunication Union [online]. Accessible athttp://www.itu.int/home/index.html.

Kaario (2000). A wearable project presentation [online]. Accessible atwww.uta.fi/hyper/projektit/iti/esitykset/kaario_clothes.pdf.

Kahney & Leander (2002). Video Clothes: "Brand" New Idea. [online]. Accessible athttp://www.wired.com/news/technology/0,1282,36698,00.html.

Location Interoperability Forum (LIF) (2002). Accessible at http://www.locationforum.org.

MeT (2001). MeT overview White Paper: The MeT Initiative-Enabling Mobile E-Commerce version 2.0,January 2001 [online]. Accessible at http://www.mobiletransaction.org.

MeT (2002). Mobile electronic transactions forum [online]. Accessible at http://www.mobiletransaction.org.

MIT (2002). The MIT wearable computing Web page [online]. Accessible athttp://wearcam.org/computing/.

Nordea Bank (2002). See Especially Solo Services [online]. Accessible at http://www.nordea.com.

NTT DoCoMo (2002). FOMA Services/V-LIVE [online]. Accessible at http://foma.nttdocomo.co.jp/english/.

OMA (2001). Open Mobile Architecture Initiative [online]. Press releases available athttp://press.nokia.com/PR/200111/840158_5.html, http://www.hp.com/communications/nokia_mobile.html.

OMA (2002). Open Mobile Architecture Initiative [online]. Accessible at http://www.nokia.com/oma/.

Siau, K., & Lim, E. (2001). Mobile commerce: Promises, challenges, and research agenda. Journal ofData Management, 12 (3).

Tanenbaum, A. S. (1996). Computer Networks, 3rd ed. Englewood Cliffs: Prentice Hall.

Tang, J., & Veijalainen, J. (2000). On e-commerce transaction protocols that support atomicity baseddispute handling with untrustworthy players. Proceedings of the 3rd International Conference onTelecommunications and Electronic Commerce (ICTEC 2000), Dallas, TX, USA, Nov. 16-19, 2000, pp.299-314.

Tang, J., Terziyan, V., and Veijalainen, J. Distributed PIN verification scheme for improvement security ofmobile devices. ACM MONET, Special issue on security in mobile computing environments (forthcoming).

Telecommunications Policy (2002). 26 (3-4). List of contents accessible at

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (171)

http://www.elsevier.com/cdweb/journals/03085961/viewer.htt?vol=26&viewtype=issue&iss=3-4.

Timmers, P. (2002). Business models for electronic markets. Accessible athttp://www.electronicmarkets.org.

UMTS forum (2002). Accessible at http://www.umtsforum.org.

Varshney, U., & Vetter, R. (2001). A framework for emerging mobile commerce applications. In R.Sprague (ed.): Proceedings of the 34th Hawaii International Conference on System Sciences.

Veijalainen, J. (1990). Transaction concepts in autonomous database environments. Ph.D. thesis.Berichte der GMD Nr. 183, Oldenbourg Verlag, 1990.

Veijalainen, J., Eliassen, F., & Holtkamp, B. (1992). The S-transaction model. In A. Elmagarmid (ed.),Database transaction models for advanced database applications. San Mateo: Morgan Kaufmann.

Veijalainen, J. (1992). Issues in Open EDI. In P. Ng, C. Ramamoorthy, L. Seifert, & R. Yeh (eds.),Proceedings of the Second International Conference on Systems Integration (ICSI'92), Morristown, NJ,June 15-18, 1992, pp. 401-412.

Veijalainen, J., & Tsalgatidou, A. (2000). Electronic commerce transactions in mobile computingenvironment. In Q. Jin, J. Li, N. Zhang, J. Cheng, C. Yu, S. Nogushi (eds.), Proceedings of IS2000Conference, f*ckushima, Japan, November 5-8, 2000, (pp. 37-45). (Best Paper Award). Accessible athttp://www.cs.jyu.fi/~mmm.

Veijalainen, J., & Tsalgatidou, A. (2001). Electronic commerce transactions in a mobile computingenvironment. In Q. Jin, J. Li, N. Zhang, J. Cheng, C. Yu, & S. Noguchi (eds.), Enabling Society withInformation Technology (pp. 131-140). Springer Verlag.

WAP forum (2002). Wireless Application Protocol Forum [online]. Accessible at http://www.wapforum.org.

W3C (2002). The World Wide Web Consortium [online]. Accessible at http://w3c.org.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (172)

Chapter 8: Known by the Network: The Emergence ofLocation-Based Mobile Commerce

Stuart J. BarnesVictoria University of Wellington, New Zealand

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

Abstract

The use of mobile telecommunications devices for commercial transactions, coined mobile (m-) commerce,has been an emerging trend since the late 1990s. As the phenomenal growth of the Internet and mobiledevices has continued unabated, the inevitable convergence of these two streams of technologies hasoccurred, promising a plethora of mobile data services to the handset user. Although these services havebeen considerably hyped in the media, and adoption has been somewhat patchy and limited, it does signal theemergence of a range of innovative value added services. With further developments in technology andmarkets, further services will appear, bringing new revenue streams. One potential area of m-commercedevelopment is in location-based services (LBS). LBS are heralded as the next major class of value addedservices that mobile network operators can offer their customers. Using a range of network- and handset-based positioning techniques, operators will be able to offer entirely new services and improvements oncurrent ones. Popular examples cited include emergency caller location, people or asset tracking, navigation,location-based information, or geographically sensitive billing. The purpose of this chapter is to examine thetechnologies, applications and strategic issues associated with the commercialisation of LBS. The chapterconcludes with some predictions on the role of LBS in m-commerce.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (173)

Introduction

Since the technological convergence of the Internet and mobile telecommunications networks in the 1990s, themobile Internet has brought the promise of significant changes in data communications. Separately, theInternet and mobile phone have witnessed extraordinary market penetration, and each is predicted to grow to 1billion users by 2003–4 (IDC Research, 2001 ). Together, these technologies have created the platform for araft of mobile data services, including business-to-consumer (B2C) applications for financial services, gaming,email and news, and business-to-business (B2B) applications for teleworking, logistics, field sales and after-sales servicing. Worldwide, revenues from mobile (m-) commerce—i.e., transactions over wirelesstelecommunications networks—are expected to exceed $200 billion by 2004 (Strategy Analytics, 2000 ).

In the emerging m-commerce economy, the knowledge of the position of a given service subscriber making acall is gaining particular interest among mobile operators who can, in turn, provide innovative location-basedservices (LBS), typically with the assistance of third parties such as service or content providers (see Barnes,2002 ). Such ideas are not new. Location (l-) commerce has existed in a limited form for more than twentyyears. The pioneers of location-based services were basic tracking services and automated vehicle location(AVL). In 2000, more than 100 companies were providing AVL products and services in the US (Airbiquity,2000a ). However, until recently, the specialised location-based industry survived as a niche market to bothhigh-end businesses (such as trucking and freight) and well-to-do customers (via automobiles such as Lexusand BMW). Typically, high-priced devices required subscriptions to special location services, suppressingdemand.

Large-scale commercialisation of location-aware services has only been recognized in the early 21st century,as a series of events and trends have begun to provide an environment that is conducive. Underlying thegrowth in commercial LBS markets are recent technological advancements (in handsets, networks andpositioning technologies), regulatory change (including the removal of restrictions of satellite positioningtechnologies and mandates for emergency services), industry trends (particularly the need for new value-added services, mergers/acquisitions, and call-centre development) and emerging business opportunities (as aresult of converging market conditions, e.g., the growth of LBS in Japan driven by the popular i-mode service).As a result, the door has been opened to a vast array of commercial applications, including those foremergency services, asset tracking, navigation, location-sensitive billing, and location-based informationservices. Indeed, the Strategis Group (2000) estimates that LBS could be worth $3.9 billion by 2004.

The purpose of this chapter is to examine the emerging l-commerce phenomenon. To this end, it analyses thetechnologies and applications involved with introducing the new wave of LBS (in sections 2 and 3,respectively). The chapter continues by exploring a value proposition model for services (section 4) and someof the core inhibitors (section 5). It also briefly explores some of the strategic business implications of theseservices (in section 6). Finally, the chapter rounds off with some conclusions and predictions regarding thefuture of l-commerce.

Location Technologies for Mobile Commerce

One or more location methods can be used to determine the position of user equipment for LBS. It is alsopossible to distinguish between methods that are most useful inside and outside buildings. Leading candidatesfor indoor location identification include short-range radio, such as Bluetooth, and infrared (IR) sensors(Barnes, 2002 ). For example, developers could use Bluetooth or IR to build an automatic tour-guide system,such as for an art gallery; as the tourist with a suitably enabled PDA device moves into range of a piece ofartwork, it could send out a signal that automatically displays information related to the artwork on the screen(Tseng, Wu, Liao, and Chao, 2001 ). However, interesting though this is, the focus of this chapter is onroaming, location-aware technology used largely outside buildings. For a detailed examination of the benefits

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (174)

and applications of short-range wireless technologies, see Barnes (2002) .

Location techniques operate in two steps—signal measurements and location estimate computation based onthe measurements—which may be carried out by the user equipment or the telecommunications network(Lavroff, 2000 ). Subsequently, positioning techniques can be categorized into several varieties, each with itsadvantages and disadvantages. The main types are cell-location, advanced network-based, and satellite-based positioning. Three of the main categories of positioning methods are shown in Table 1 , in order ofincreasing accuracy.

Category LS1: (Basic service level)

Location of all handsets with at least cell accuracy

Cell of Origin (COO) or Cell-ID, including Service Area Identity (SAI), LocWAP and enhanced Cell-ID. May alsoinclude enhancements with propagation time measurements

Low . Depends on cell size and enhancements; typically 150m to 10,000m

Very Fast. Typically around 3 seconds

Very limited accuracy in areas with low cell radius

No modifications needed to networks or handsets

Category LS2: (Enhanced service level)

Location of all new handsets with reasonable cost and improved accuracy

Estimated Time of Arrival (EOTD) for GSM, and its variations such as Advanced Forward Link Triangulation (AF-LT) and Idle Period Downlink (IP-DL) for CDMA and WCDMA respectively

Medium . Typically around 50m to 125m

Fast. EOTD takes around 5 seconds

Dependent on visibility of base stations for signal measurement and number of location measuring units(LMUs)

Software modified handsets needed for positioning

Category LS3: (Extended service level)

Location of new handsets with high accuracy and higher costs than LS2

Global Positioning System (GPS) and Assisted Global Positioning System (GPS)

High . Outside buildings, approx. 10–20m; inside buildings, approx. 50m

Variable. GPS takes around 10–60 seconds, but AGPS around 5 seconds

Signal degradation and reduced accuracy in certain environments, e.g., inside buildings or "urban canyons"

New handsets needed for positioning

Table 1: Three methods of location positioning

LocationServiceCategory

Explanation TypicalMethods ofPositioning

Accuracy ResponseTime

KeyLimitations

MarketRequirements

Cell-location Positioning Techniques

This technique works by identification of the cell of the network in which the handset is operating (the "cell oforigin"). Cell of origin (COO), sometimes called Cell-ID, is the main technology that is widely deployed inwireless networks today. It requires no modification to handsets or networks since it uses the mobile networkbase station as the location of the caller. However, although locating the caller is fast—typically around threeseconds—accuracy is limited. Positioning accuracy depends on the size of the cell and techniques used forenhancing location calculation, such as user self-locating (whereby end-users use landmarks and addresses toimprove their positioning precision) and propagation time measurements. Position accuracy down to 150metres in urban areas is not uncommon, growing very significantly outside major areas of population.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (175)

Advanced Network-based Positioning Techniques

Advanced network-based techniques rely on the measurement of signals from nearby base stations via theuser's equipment. The position of the user is derived by triangulation, using techniques such as EnhancedObserved Time Difference (E-OTD) and Observed Time Difference of Arrival (OTDOA). The E-OTD methodworks on the GSM network. Variations of E-OTD such as Advanced Forward Link Triangulation (AF-LT) andIdle Period Downlink (IP-DL) have been developed for CDMA and WCDMA networks. The positionalinformation is based on relative times of arrival of signals at the handset and fixed receivers as sent by basestations. Location receivers or reference beacons (referred to as Location Measuring Units or LMUs) areoverlaid on the cellular network at a number of geographically dispersed sites. Location is then calculatedusing the time differences of arrival of the signal from each base station at the specially enabled handset andLMU (via time stamps and intersecting hyperbolic lines). E-OTD is typically accurate to approximately 50 to125 metres, with a response time of around 5 seconds. In a manner similar to E-OTD, OTDOA location worksby calculating the time difference of the arrival of a signal from a mobile device and three network basestations. The large cost of network synchronisation affords only small improvements over COO in urban areas,and the response time is much higher at around 10 seconds.

Satellite-based Positioning Techniques

In some cases, a global navigation satellite system such as the Global Positioning System (GPS) can be usedto enhance the accuracy of radio positioning. GPS has been available for general use since the early 1990s.Operating in the L-band frequencies GPS can be used anywhere in the world. The system's satellites transmitnavigation messages that contain their orbital elements, clocks, and statuses, which a GPS receiver uses todetermine its position and thus its roaming velocity (Tseng et al., 2001 ). Determining the receiver's longitudeand latitude requires three satellites, and adding a fourth can determine the user's altitude. However, onlyrecently (in May 2000) has the US Army removed restrictions upon outdoor positioning to a sufficiently highresolution for advanced use—currently 10–20 metres.

Stand-alone GPS have the key problems of no indoor coverage and a relatively long time to first fix, usually10–60 seconds. It also fails in radio shadows and requires considerable cost, complexity and batteryconsumption in handsets (Djuknic and Richton, 2001 ).

The same issues are also involved in the use of GPS for mobile ad hoc networks (MANETs). A MANETconsists of a set of mobile hosts that roam at will and communicate with one another. Typical examples ofMANET applications include battlefields, festival grounds, assemblies, outdoor activities, rescue actions andmajor disaster areas, where communications are needed immediately without core network infrastructure(Tseng et al., 2001 ). However, the flexibility of these systems could lead towards more developed forms beingfurther used commercially. Communication in MANETs takes place through wireless links among mobile hosts,using their antennae, but no base stations are involved. Transmission limitation means that several hosts maybe needed to relay a packet between sender and receiver (Tseng et al., 2001 ). In this environment, location-positioning technologies are needed that do not require traditional network infrastructure. GPS is the primeenabler for this type of outdoor positioning.

Using GPS in addition to a wireless network—often referred to as assisted-GPS (AGPS) —can providesignificant extra benefits. Embedding a GPS receiver into the user's handset can directly provide positioningfixes in less than 5 seconds; the network may assist the user equipment by reducing the power consumed ofthe handset, by optimising the start-up and acquisition time and by increasing the sensitivity of the GPS device(Lavroff, 2000 ). AGPS can also be used indoors, where it is accurate to within 50 metres. In the future,technologies such as Bluetooth and IEEE 802.11 may enable assisted location positioning within building toeven higher resolutions, suggested at around 10 metres (Nokia, 2001 ).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (176)

Overall, the various positioning technologies are complementary—there is no single universal solution. Whereboth accuracy and coverage are important, hybrid technologies may provide an optimum solution. Cellular andadvanced network-based technologies can be used to fill in the gaps in coverage from satellite-based systems,like GPS. The basic positioning accuracy category is focused on market penetration and should be availablefor all phones, enabling a fast time-to-market. The intermediate category will have a software impact onhandsets, whilst the high accuracy category will have a hardware impact on handsets. All three levels ofaccuracy will exist in parallel in the future (Nokia, 2001 ).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (177)

Applications of L-Commerce

The kinds of location-based technologies described above enable many advanced forms of data servicesbased on the position of the user, in both personal and business markets. Typically, services can becategorized into four main areas, as demonstrated by Figure 1. Let us examine each of these areas in turn.

Figure 1: Key areas of application of location-based services

Safety

The prime driver for the implementation of l-commerce infrastructure in the US is safety. Emergency andrescue services have a vital need to know the current location of any host that sends an emergency message.The US government has mandated that providers of personal communication systems must, in the nearfuture, add location-identification capability to their emergency 911 services. Specifically, handset-basedsolutions must, by 1 October 2001, locate an emergency caller to within 50 metres for 67% of calls and within150 metres for 95% of calls. Alternatively, the carriers relying upon network-based technology must achievelocation accuracy of 100 metres for 67% of calls and 300 metres for 95% of calls. Location platforms such asXypoint, the largest provider of such services to operators, are pioneers in this area (Xypoint, 2001a; 2001b).Carriers must also undertake reasonable efforts to achieve 100% penetration of handsets allowing locationservices by 31 December 2004 (Lavroff, 2000). Europe has no such mandate, although during 2001 theEuropean Commission is rewriting the telecommunication regulatory framework in an attempt to makeappropriate location information available to emergency authorities by 1 January 2003 (Wieland, 2000). Thesame technology used for emergency "911" services also has value for other, related aspects of personalsafety, particularly roadside assistance. In the event of an emergency breakdown or accident, the consumer'smobile device could be used to assist in getting roadside assistance to the right location. Accuracyrequirements are likely to be around 125 metres or less for mass acceptance, although 500 metres is widelyregarded as the entry level requirement for such services (Buckingham, 1999).

Navigation and Tracking

Driving directions and the tracking of fleet, packages and people are a core segment of the emerging LBSmarket. In the US, the average person spends 500 hours/year in an automobile. Interestingly, though, only100,000 of the 146 million registered cars in the US and 20 percent of fleet trucks are equipped for telematics(i.e., wireless telecommunications for automobiles). Key players include ATX Technologies/Protection One,AAA/Response, Signature, Cross Country, and OnStar commercial call centres (Airbiquity, 2000a). With the

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (178)

widespread deployment of services, the telematics market could expand considerably in the next few years.

Location technologies can play an important part in logistics. Intelligent transportation systems are beingintroduced around the world, and location technology plays a key part in almost every solution. Taxis are beingequipped with automatic vehicle location devices, allowing the fleet dispatch system to automatically select thetaxi closest to the pickup location (Research in Motion, 2000). Similarly, fleet management systems arehelping freight companies to monitor the status of deliveries and other logistics activities (Little, 2000).Wireless transceivers let portable terminals-such as PDAs-communicate with a central database. Terminalscan log in shipments of materials from vendors and track those materials in inventory, as they are needed(Zeus Wireless, 2000). In this situation it is even conceivable to know all inventory in transit-or "rolling"inventory-allowing an efficient method of selecting a source of components based on their known location. Byknowing the location of "rolling" inventory, times between transaction, manufacture and delivery can be furtherreduced (Varshney, 2000).

In Israel, mobile operator Orange offers a wireless workforce application, using CT Motion's Cellebrityplatform, which includes location technology based on EOTD. Orange can offer companies the ability tomonitor the movements of their workforce throughout the country to an accuracy of up to 100 metres. Thecentral coordinator, or dispatcher, can see where each of the workers is on a map of the country and so canallocate tasks more efficiently (Wieland, 2000).

Tourists are a key customer segment requiring location-based information, since they are most often found inunfamiliar geographic areas. Some services, such as Bluesigns, are aimed at these consumers (Russell,2001). Bluesigns works by the tourist phoning the Bluesigns tourist information centre via a telephone accessnumber. During the tourist's call, location is determined, and location-sensitive information is generated from adatabase. Location can be determined either by GPS or verbal communication with an operator at the touristinformation centre. Based on the customer's location, the tourist can be guided along highways to a particulardestination, such as a petrol station, restaurant, hotel or tourist attraction.

Similarly, Webraska-a mapping and navigation company-offers a number of services through mobile operatorssuch as KPN (Holland), AirTel (Spain), SFR (France) and Proximus (Belgium). Based on COO technology, theservice requires users to type in abbreviations of their location (e.g., L-O-N for London, then B-A-K for BakerStreet) before the network can locate roughly where they are and provide location-specific information, suchas directions (Wieland, 2000).

Transactions

Location-based transactions are perhaps the most complex set of services. The main thrust of the businessmodel is billing based on the customer's location. For example, a number of countries, such as Singapore, useroad pricing as part of their traffic calming and environmental policy. Payments are made electronically througha special, in-car device on entry into a particular geographic area requiring payment. Given the availability ofsecure payment mechanisms through the mobile phone, such as electronic cash, this could present aconvenient replacement.

Location-sensitive transactions open the way to new forms of price differentiation based on the location of theuser. On one level, BellSouth Wireless Data is offering "distressed items" such as discounted last-minutetickets to Broadway shows for people that are near enough to pick them up before curtain (Bourrie, 2000) -aform of price discrimination. On another level, individuals could be charged and taxed according to geographicregion, such as a US state or country, or proximity to outlets selling goods that the consumer wishes topurchase.

Location-based cross-selling is another possible stream of transaction revenue. For example, the mobile userwho has just seen a film at the cinema could immediately be offered a CD or DVD of the soundtrack or film.Similarly, in addition to charging for information requests, such as a query for a restaurant address, service

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (179)

providers could earn additional revenue by asking subscribers whether, for another 10 cents, they would likedirections to the restaurant (Bourrie, 2000). Ultimately, retailers, such as restaurants, could share in servicecosts to encourage customer interest.

In terms of payment systems, the mobile Internet has some way to go towards maturity. However, a number ofsolutions are underway. Mobile electronic cash refers to cash stored-via subscriber identity module (SIM) orcredit-sized card-and transferred via the wireless network. In the UK, Visa piloted a debit smartcard systemcalled Visa Cash in 1999, while France Telecom launched a similar service called Iti Achat. Such a systemrelies on a dual-slot phone such as Motorola's StarTac D model that can accept a credit-sized card. However,the extra size and weight of devices favour a more SIM-based approach. For example, in Finland, Sonera'sPay-by-GSM enables the user to dial a number to receive a charge to a prepaid phone or for a deduction froma mobile account. Similarly, KLELine (part of Paribas) allows a virtual wallet application that can be loadedfrom major credit cards. Visa, Nokia, and Merita-Nordbanken are piloting the dual SIM concept for the Nokia7110 phone, where a second SIM is a Visa credit, debit and bankcard.

Information

The roaming user can be provided with information, alerts or even advertisem*nts based on their locale.Typically, advertisem*nts depend on location. For example, a particular sale may interest only people within acertain distance of a merchant's store. Thus, the sender will only need to transmit the advertisem*nt-whichcan be regarded as a broadcast message-to users within a set distance (Tseng et al., 2001). For example,walking down the street in an urban area could set off a plethora of messages from retailers eager to temptclientele inside. Bell Mobility is currently piloting such ideas via digital couponing, offering discounted productsand services to subscribers within a certain radius of participating merchants (Bourrie, 2000). Similarly, GeePSis beta-testing its location-based wireless online shopping portal in New York and San Francisco, usingcouponing and other strategies.

Similar to advertising, geographic messaging is another useful application of location technologies. Forexample, an alert could inform the user of a security threat in a certain part of the city, such as a train station,stadium or shopping mall. Other types of public localised information can also be broadcast in a particulararea-a public infostation; for example, the opening times of a public library, movie theatre listings, city phonedirectories, the schedule of bus services, or the availability of parking spaces could all be public broadcastinformation.

One of the most basic LBS offered by mobile operators is the mobile Yellow Pages. Indeed, many Europeanoperators are reluctant or unable to go beyond this sort of service (Hamilton, 2000), offered, for example, bySonera, diAx and Telia. In this type of service, the roaming user asks the question: "what's near me?" Forexample, items such as locations of restaurants, shops, public transport or nearby ATMs may be useful tousers as they move through an unfamiliar city. Weather or traffic information can also prove useful; BellMobility's Book4golf service allows the user to locate a North American golf course, book a tee time, and get alocation-specific weather forecast.

An extension of the "what's around" type of service is the "who's around" service. Such an applicationdetermines who currently occupies a specific geographic area. These services are useful for planned orunplanned rendezvous between individuals, such as business colleagues or social friends. Meeting (orpossibly avoiding) people becomes much simpler if individuals are enabled for such LBS.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (180)

Creating Relevant User Services—A Value Proposition Model

While geo-location technologies open the door to a variety of services in consumer and business markets,location in isolation provides a bounded set of opportunities, and the potential for developing relevant servicesfor the user goes much farther in its scope. Indeed, some of the LBS discussed in the section above havehinted at some other important value propositions for wireless services. Overall, wireless devices have anumber of features that together form a fertile bed for advanced value-added services (Kannan, Chang, andWhinston, 2001). Typically, devices are very personal to the user and carried on the person; aspects of thecontext of the user, such as time and place, can be measured and interpreted; services can be provided at thepoint of need; and, applications can be highly interactive, portable and engaging. For the consumer, thismeans that wireless services can be potentially very personal, timely and relevant, or even integrated withother services in a near-seamless way (Katz-Stone, 2001).

In terms of the value proposition, we can untangle three important aspects that influence the nature of servicerelevance: time, location and personal characteristics of the user. An individual's behavior is likely to beinfluenced by his or her location, time of day, day of week, week of year, and so on. Individuals may have aroutine that takes them to certain places at certain times, which may be pertinent for mobile services. If so,marketers can pinpoint location and attempt to provide content at the right time and point of need, which may,for example, influence impulse purchases (Kannan et al., 2001). Feedback at the point of usage or purchaseis also likely to be valuable in building a picture of time-space consumer behavior. Further, the nature of theuser, in terms of a plethora of personal characteristics such as age, education, socioeconomic group, culturalbackground, residence, memberships, and so on is likely to be an important influence on how information isprocessed. Some of these aspects have already proven to be important influences on Internet use (OECD,2001), and, as indicative evidence has shown, elements such as user age are proving an important influenceon data communications via mobile devices (Funk, 2000; Puca, 2001). The wireless medium has a number ofuseful means for building customer relationships. Ubiquitous interactivity can give the customer ever morecontrol over what they see, read and hear. Personalization of content is possible by tracking personal identityand capturing customer data; the ultimate goal is for the user to feel understood and to simulate a one-to-onepersonal relationship.

Let us examine a simple example, where the user wants to catch the next train from work to home. Figure 2presents the value proposition model and analyses the value (V) attributed by the user to a number of serviceoptions. The lowest value proposition involves the traditional provision of train schedules to the user, devoid ofcontext (V = a). This is the situation at the origin of Figure 2. By considering further value functions (f), we maybe able to create additional value associated with the service options. Adding personal characteristics (P) tothe situation would enable a higher value proposition, allowing the user to ask for trains that pass theindividual's home station (V = a + f(P)). Adding time criticality (T) to the user's options can generate an evenhigher value proposition (V = a + f(P, T)). Here, the user could, for example, ask for trains traveling homesoon. Finally, adding location-dependence (L) to the user's request can create the highest value proposition (V= a + f(P, T, L)). Thus, the individual could ask for directions to a platform where they could catch the nexttrain home.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (181)

Figure 2: The value proposition model—value-added services for the train commuter

Various similar value propositions are available in services on the mobile Internet. Kizoom, the online travelservice, provides a good example. The WAP service allows customised, time- and location-sensitive planningof travel. Figure 3 gives an example of how a user of the site might find details of the next train from his or herworkplace to home, based on a known personal profile. The user may also go on to buy a train ticket.Essentially, the site relies on content provided from national timetables, journey planners, location services,spatial database maps, real-time travel information feeders, personal alert services, advertisers, transportcompanies (involved in m-commerce ticket sales), operators and m-commerce portals (Kizoom, 2000).

Figure 3: Catching the next train home using the Kizoom mobile site

Other mobile services can provide similar value propositions, varying in the value-added functions of time,space and personal characteristics. Figure 4 provides a simple categorization of services using the valueproposition model. Focusing on LBS, there are a variety of services that are largely based around the valueproposition of location dependence. Such services include mobile yellow pages, for example, restaurantguides or nearest ATM, and location-based messaging, for example, security alerts or broadcast advertising.Adding time dependence into the value function broadens the scope to include more sophisticated servicessuch as emergency E911, real-time traffic information, roadside assistance and parking information. Finally,personalization opens the door to further, bespoke services. The opportunities here are very large and includetargeted advertisem*nt, personal navigation aids, personal scheduling, and many other personalized servicesand applications. It is important to bear in mind that other services exist outside of LBS that may capitalize onother aspects of the value proposition model. For example, news is largely time-dependent, mobile banking isdependent on the user and account details, and trading on a stock portfolio is dependent on both of theseaspects.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (182)

Figure 4: Categorization of mobile services using the value proposition model

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (183)

Issues in the Commercialisation of LBS—Privacy and Standards

Although considerable progress is being made in the commercialisation of LBS, they are still very much at anembryonic stage of development. Further advancement of l-commerce requires overcoming a significantnumber of obstacles in technology, markets and policy. Even before companies begin to examine whethercustomers are willing to pay for these new services, they need to establish a technological and legal platformfor service provision. Key areas of discussion among industry players are privacy (Airbiquity, 2000b) andtechnology standards (Buckingham, 2000a).

The location industry is currently in the ridiculous and destructive situation that every location finding systemand positioning vendor has a different proprietary location finding technology (Buckingham, 2000a). Recently,a number of companies have come together to form industry associations aimed at establishing standards anddiscussing other important industry-wide issues. In September 2000, Nokia, Ericsson and Motorola announcedthe formation of the Location Interoperability Forum (LIF), a forum to establish global interoperability standardsfor mobile positioning systems and solutions (Buckingham, 2000b). LIF members represent a mix of networkoperators, equipment manufacturers and service providers responsible for deploying equipment. Prominentmembers include Cambridge Positioning Systems, CellPoint and Airflash (LIF, 2001).

In December 2000, eight leading companies involved in the wireless location industry in the US, Canada andEurope—Cell-Loc, SignalSoft, GoAmerica Communications, Cambridge Positioning Systems, Zero KnowledgeSystems, Indexonly Technologies, iProx and ViaVis Mobile Solutions—established another industry group, theWireless Location Industry Association (WLIA). WLIA will interface with government, administrative andregulatory bodies on behalf of the industry and create a forum to develop self-regulating policies, network andshare information among members in the industry (Buckingham, 2000c). It will also provide references andinformation about the industry to the public and policymakers, both in the US and elsewhere.

High on the agenda for the WLIA is the issue of privacy, which promises to be a considerable challenge onwireless devices. In the US, the Fair Location Information Practices (FLIP) dictate that companies must: (1)inform customers about collection practices; (2) give the customer choice regarding any uses of theinformation; (3) allow for access to the data so that customers can ensure that it is correct; (4) maintain thedata securely; and (5) comply with enforcement and auditing of the FLIP policies (Airbiquity, 2000b). Recentattempts to introduce further wireless privacy policies, such as the Wireless Telephone Spam Protection Act(aimed particularly at unsolicited wireless advertising), could further limit the use of location-based technologyto market mobile users (Bassuener, 2001). Overcoming such significant hurdles in the US in order to reachthe commercial market will prove difficult. In Europe, no comparable policies exist yet, but they are currentlyunder discussion at the European Union in Brussels.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (184)

Strategic Implications of LBS

Ultimately, the implementation of LBS technologies and applications has significant implications at thestrategic business level. One strategic issue is the selection of an appropriate technology for a particularservice, both in terms of location positioning infrastructure and speed of network. Most LBS, except those forsafety and navigation, can begin with cell-level accuracy and the current second generation of networks.However, for mass acceptance, the technological platform for specific LBS must go beyond this. To this end,Table 2 shows a variety of LBS applications and indicates some of the appropriate platforms. Typically,packet-switched networks—such as the Global Packet Radio Service (GPRS) —are more suitable forapplications where short, intermittent bursts of data are required, such as navigation, tracking or intermittentmessaging. Other applications can use any network, although the requirements for network speed in areassuch yellow pages and cross-selling will rise with consumer demand for multimedia. Accuracy depends on thecriticality of location in an application. This is highest where the exact location of an individual's handset needsto be known, e.g., emergency services or navigation. More general requirements for zone targeting reduce therequired accuracy.

Table 2: Typical technology requirements for location services

Application Typical accuracy requirement

(typical technology)

Typical network type

(typical technology)

Emergency services High (AGPS) Any

Roadside assistance Medium (EOTD) Any

Vehicle navigation High (AGPS) Packet (GPRS+)

Fleet management High/Medium (AGPS/EOTD) Packet (GPRS+)

Asset tracking, e.g., packages Low (COO) Packet (GPRS+)

People tracking, e.g., workers Medium/Low (EOTD/COO) Packet (GPRS+)

Location-based advertising Medium/Low (EOTD/COO) Packet (GPRS+)

Public infostation Medium/Low (EOTD/COO) Packet (GPRS+)

Geographic messaging Medium/Low (EOTD/COO) Packet (GPRS+)

Yellow pages Medium/Low (EOTD/COO) Any

Location-sensitive billing Medium/Low (EOTD/COO) Any

Road pricing Medium (EOTD) Any

Cross-selling High/Medium (AGPS/EOTD) Any

Once a technological platform is in place that supports the strategic objectives of the firm, the benefits thataccrue in developing and using LBS can occur in many parts of the organization. For example, existingservices can become more efficient (e.g., emergency calls), processes can be transformed (e.g., logistics),and new services can be developed (e.g., location-based products). Figure 5 analyses the strategic benefitsfrom LBS using the Index Matrix, which categorizes the benefits in terms of efficiency, effectiveness andtransformation, in the areas of the individual, function and organization (Farbey, Land, and Targett, 1992).Note that, where an LBS application could be placed into several cells, it has been placed into the cell of bestfit for illustration. As the matrix demonstrates, the strategic impact of LBS is very deep, and applications canprovide significant strategic benefits ranging from basic efficiency improvement to complex redefinition and

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (185)

redesign of organizational aspects.

Figure 5: Benefits of LBS applications - Index Matrix

Large transformation benefits are proving difficult to achieve (Hamilton, 2000; Wieland, 2000), requiring asignificant amount of risk, investment and thinking "outside of the box." An incentive to operators is that themore business transformation that occurs the more benefits can be achieved (Venkatraman, 1994), therebygenerating lucrative new revenue streams. As such, companies that are willing to take risks in adoptingwireless location technology and using it creatively have tremendous possibility for achieving strategicadvantage in the marketplace. However, the novelty, risk, complexity and cost of the largest transformationsand innovations will certainly prove elusive to many firms.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (186)

Summary and Conclusions

Consumers and mobile professionals are demanding access to location-specific information on a whereever,whenever basis (Kivera, 2001). This trend, fuelled by the increasing ubiquity of low-cost wireless services,growing use of GPS and other location technologies, and acceptance of the Web as a primary source ofinformation, is compelling operators and other companies to deliver location-based services to theircustomers. For operators, this offers a new set of revenue enhancing and differentiating value-added services.

This chapter has examined the technologies, applications and strategic issues surrounding the developmentof commercial LBS. As we have seen, a variety of technologies based on the handset, mobile network andsatellite positioning systems are available, such as COO, EOTD and AGPS. These have created the platformfor a plethora of services in areas such as safety, navigation and tracking, information, and location-basedtransactions. Of these, safety is the key market driver, where US policy has mandated emergency servicecaller location. Advertising, roadside assistance, fleet management, people tracking, road pricing, andlocation-based products are some of the other possible LBS under development. By understanding the needsof the user, a suitable value proposition can be created that combines appropriate aspects in time and spacewith personal characteristics.

Notwithstanding, mobile operators face considerable obstacles in large-scale commercialisation of LBS. Keyproblems include standards and privacy. Before a realistic technological platform can be created, fragmentedlocation solutions require an integrative framework. Further, privacy policies pose a significant challenge tomany types of LBS. However, if such obstacles can be overcome, the strategic benefits of LBS are potentiallyenormous, not just in improving efficiency and effectiveness of current services, but in developing newservices and transforming core aspects of business.

In terms of research, considerable future work is needed to better understand how to leverage the value oflocation-based services in both personal and business markets. This chapter has merely scratched thesurface of an emerging and growing phenomenon. Questions for research include:

How can user value (or utility) best be modelled and created in new services?

What business models are supported by new LBS? What are the strategic benefits of LBS for firms?

How can the fragmented standards for location positioning be reconciled to provide the best service formobile users?

Given the current relative anonymity of mobile devices, do consumers want to be identified? How canprivacy be protected?

Clearly, commercial LBS for mobile consumers are still in the embryonic stages of development and use. Thenext few years will be fundamental in the advancement and adoption of services. Although basic services arebeginning to emerge, telecommunications network advancement will enable more sophisticated locationpositioning services. Network standards such as GPRS, currently being rolled-out in many European markets,are eminently suitable for LBS. Beyond GPRS, third-generation (3G) network standards, such as the UniversalMobile Telephone System (UMTS) in Europe, offer greater flexibility; with speeds of up to 2 Megabits persecond, UMTS offers the ability to have simultaneous voice and data calls. With such infrastructure in place,the possibilities for new and improved services become ever larger.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (187)

References

Airbiquity (2000a). The emergence of the location-commerce market. Paper presented at L-Commerce2000—The Location Services and GPS Technology Summit, Washington DC, May.

Airbiquity (2000b). No l-commerce without l-privacy. Paper presented at L-Commerce 2000 —TheLocation Services and GPS Technology Summit, Washington DC, May.

Arthur D. L. (2000). Serving the mobile customer [online]. Available:http://www.arthurdlittle.com/ebusiness/ebusiness.html.

Barnes, S. J. (2002). Under the skin: Short-range embedded wireless technologies. International Journalof Information Management, 22 (3), pp. 165–179.

Bassuener, K. (2001). Wireless privacy protection act targets location-based spam. Wireless Week[online]. Available: http://www.wirelessweek.com/index.asp?layour=print_page&doc_id=14256.

Bergeron, B. (2001). The Wireless Web: How to Develop and Execute a Winning Wireless Strategy. NewYork: McGraw-Hill.

Bourrie, S. R. (2000). A sense of place: Getting there from here [online]. Available:http://www.bluesigns/Press/bluesigns_in_news/wirelessweek_05152000/.

Buckingham, S. (1999). An introduction to mobile positioning. Newbury: Mobile Lifestreams.

Buckingham, S. (2000a). Nokia, Ericsson and Motorola announce the formation of the LocationInteroperability Forum [online]. Available: http://www.mobilepositioning.com/.

Buckingham, S. (2000b). LIF shakes up mobile location standards [online]. Available:http://www.mobilepositioning.com/.

Buckingham, S. (2000c). Wireless Location Industry Association founded [online]. Available:http://www.mobilepositioning.com/.

Djuknic, G. M., and Richton, R. E. (2001). Geolocation and assisted GPS. IEEE Computer, 34 (2),123–125.

Farbey, B., Targett, D., and Land, F. (1992). Evaluating investments in IT. Journal of InformationTechnology, 7, 109–122.

Funk, J. (2000). The Internet market: Lessons from Japan's I-Mode system. Unpublished white paper,

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (188)

Kobe University, Japan.

Hamilton, T. (2000). The mobile concierge [online]. Available:http://www.bluesigns.com/Press/Industry_Insights/The_mobile_concierge.htm.

IDC Research (2001). A billion users will drive e-commerce [online]. Available:http://www.nua.ie/surveys/index.cgi?f=VS&art_id=905356808&rel=true.

Kannan, P., Chang, A., and Whinston, A. (2001). Wireless commerce: Marketing issues and possibilities.Paper presented at the 34th Hawaii International Conference on System Sciences, Maui, Hawaii.

Katz-Stone, A. (2001). Wireless revenue: Ads can work [online]. Available:http://www.wirelessauthority.com.au/r/article/jsp/sid/445080.

Kivera (2001). Kivera Spatial Suite—data sheet [online]. Available:http://www.kivera.com/pdf/kls_data_sheet/pdf.

Kizoom. (2000). Building a WAP application: Software engineering for the mobile Internet. Paperpresented at WAP Wednesday, London, April.

Lavroff, J. L. (2000). Location services: How to enhance personal safety and to stimulate lucrativebusiness opportunities. Brussels: European Commission.

LIF (Location Interoperability Forum) (2001). LIF statement, version 5 [online]. Available:http://www.locationforum.org/.

Nokia (2001). Mobile location services. Helsinki: Nokia Corporation.

OECD (2001). Understanding the digital divide. Paris: OECD Publications.

Puca (2001). Booty call: How marketers can cross into wireless space [online]. Available:http://www.puca.ie/puc_0305.html.

Research in Motion. (2000). The wireless workforce [online]. Available: http://www.rim.net/.

Russell, B. (2001). Making Mobile Commerce Reality Through Concept, Convergence and Cost-Effectiveness—Bluesigns. Anniston: Bluesigns, LLC.

Strategy Analytics (2000). Strategy analytics forecasts $200 billion mobile commerce market by 2004[online]. Available: http://www.wow-com.com/newsline/press_release.cfm?press_id=862.

Strategic Group (2000). European wireless location services: Strategies and outlook [online]. Available:

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (189)

http://www.strategisgroup.com/press/pub/wlocate.htm.

Tseng, Y. C., Wu, S. L., Liao, W .H., and Chao, C. M. (2001). Location awareness in ad hoc wirelessmobile networks. IEEE Computer, 34 (6), 46–52.

Varshney, U. (2000). Recent advances in wireless networking. IEEE Computer, 33 (6), 100–103.

Venkatraman, N. (1994). IT-enabled business transformation: From automation to business scoperedefinition. Sloan Management Review, 35, 73–87.

Wieland, K. (2000). Where are the location-based services? [online]. Available:http://208.220.133.42/issues/200009/where_are_the.html.

WireFree-Solutions (2000). Wireless Applications: Where is Your Opportunity? Madrid: WireFreeSolutions.

Xypoint (2001a). Platform white paper. [online]. Available:http://www.xypoint.com/platform/tech/index.html.

Xypoint (2001b). Location management [online]. Available: http://www.xypoint.com/platform/location.html.

Zeus Wireless (2000). Wireless Data Telemetry. Maryland: Zeus Wireless, Inc.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (190)

Chapter 9: Usable M-Commerce Systems: The Need forModel-Based Approaches

Overview

John KrogstieNorwegian University of Science and Technology, Norway

Petter Bae BrnadtzægSINTEF Telecom and Informatics, Norway

Jan HeimSINTEF Telecom and Informatics, Norway

Andreas L. OpdahlUniversity of Bergen, Norway

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (191)

Abstract

Mobile solutions are becoming more and more common in e-commerce and are giving rise to a new breed ofm-commerce systems, which are characterized, among other things, by strong demands on usability. Thischapter discusses new challenges and possible solutions for developing and evolving usable m-commercesystems, with focus on model-based approaches. We have experienced these new challenges throughseveral research and industrial projects on mobile solutions, usability and model-based approaches over thelast years. In this chapter, we apply our experience to the emerging m-commerce field. We summarize themain challenges on how model-based approaches can support the development of usable m-commercesystems and indicate upcoming research issues in this very dynamic area. We argue that this research area isalso timely, because the underlying technological infrastructure are just becoming sufficiently mature to makefeasible research on personal, group and organizational issues, and not only on technical issues.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (192)

Introduction

Today, the PC is only one of many ways to access information resources. On one hand, traditional computingtechnology is becoming more mobile and ubiquitous and, on the other hand, traditional mass media arebecoming richer as in interactive TV. Whereas information services related to interactive TV (iTV) andubiquitous computing are projected to become prominent in a few years, mobile computing is the mostimportant current market and technological trend within information and communication technology (ICT). Forinstance, it is projected by IDC that in 2004 there will be more mobile devices than PCs connected to theInternet. With the advent of new mobile infrastructures that provide higher bandwidth and constant connectionto the network from virtually everywhere, it is predicted that the way people use information resources will beradically transformed.

According to Siau (2001), the essence of m-commerce is to reach customers, suppliers and employeesregardless of where they are located and to deliver the right information to the right person(s) at the right time.To achieve this, a new breed of mobile information systems (Krogstie, 2001) must be developed. A lot of workhas been reported on the technical aspects of mobile computing and thus on the technical aspects of m-commerce. Work has also been reported on the societal aspects of e-commerce and some of it directly on m-commerce. However, relatively little attention has so far been paid to the user side of m-commerce. The abilityto develop and evolve usable m-commerce systems may become an even more critical success factor forenterprises in the next few years than is their ability to develop and evolve usable e-commerce systems today.

Research on business (information) systems has so far primarily dealt with the development and evolution ofsystems accessed through PCs and workstations. As mobile solutions are applied in more and moresituations, new challenges will face those who develop and evolve business applications. This chaptersummarizes some of the corresponding research challenges and points to how they can be addressed bymodel-based approaches.

The structure of this chapter is as follows: In the next section, we describe some of the specific characteristicsof mobility. In section 3, we highlight some of the main differences between m-commerce systems andtraditional information systems on the user, group, organizational, and inter-organizational level. In section 4we summarize the resulting issues, research opportunities and future trends in how model-based approachescan be used to develop and evolve usable m-commerce systems. The discussion is structured according tothe same levels used in section 3. Section 5 then concludes the chapter.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (193)

Novel Aspects of M-Commerce

M-commerce systems run on mobile devices that can be moved around easily in space and that operateindependently of particular locations.

People in general are getting increasingly mobile in relation to both their professional and private tasks. Theuser of m-commerce systems is characterized by frequent changes in context:

The spatio-temporal context describes aspects related to the time and space. It contains attributes liketime, location, direction, speed, track, and place. This context is particularly important and will bediscussed in more detail below.

The environment context captures the entities that surround the user, e.g., physical objects, services,temperature, brightness, humidity, and noise.

The personal context describes the user state. It consists of the physiological context and the mentalcontexts. The physiological context may contain information like pulse, blood pressure, and weight. Themental context may describe things like mood, expertise, anger, and stress.

The task context describes what the user is meant to be doing. The task context may be described withexplicit goals or the tasks themselves.

The social context describes the social aspects of the user context. It may, for instance, containinformation about friends, neighbors, coworkers and relatives. The role that the user plays is an importantaspect of the social context. A role may describe the user's status in this role and the tasks that the usermay perform in this role. The term social mobility refers to the ways in which individuals can move acrossdifferent social contexts and social roles and still be supported by technology and services.

The information context describes that part of the global and personal information space that is availableat the time.

According to Kakihara and Sørensen (2001), spatial mobility is primarily about people moving about in spacebecause they have wireless access to information and services. However, spatial mobility is also about allsorts of ICT-enhanced things (parcels, cars, etc.) that can move about in the environment and that caninteract with other devices and in this way influence people. In ubiquitous computing, the environment itselfhas become ICT-enhanced by a large number of interacting, stationary or mobile computing devices that areeffectively invisible to the user (Weiser, 1993).

Luff and Heath (1998) identify three types of spatial mobility: Micro-mobility refers to how small artifacts can bemobilized and manipulated by hand. Local mobility involves real-time interaction between people andtechnology at the same location. Finally, remote mobility supports both synchronous and asynchronouscollaboration among individuals who move around in distant physical locations.

Several taxonomies of remote mobility are discussed in the literature. Kristiansen and Ljungberg (1999)distinguish between traveling, visiting and wandering. Traveling is movement between different locations in avehicle. Visiting is a prolonged period spent in one location before moving back to the original location or on toanother one. Wandering is moving about-usually on foot-in the local area. Esbjörnsson (2001) adds mobilework proper, i.e., work that by nature entails moving about. Since m-commerce is also relevant in nonworkingsituations, we may extend this category to mobility proper, i.e., activities where mobility is an essential aspectof the activity itself, such as going on a hike or scenic tour.

Bergquist (1999) proposes a typology that distinguishes between the nomad, the pilgrim and the tourist, andwhich can be seen as an extension of Kritiansen and Ljungberg's traveling. The nomad is constantly on the

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (194)

move, well off and unpredictable. Movements are not necessarily irrational but inherently not able to beplanned and to a large extent improvised. The nomad thus cannot trust existing infrastructures. The pilgrimalso moves between destinations, but movement is essentially planned, and the pilgrim can utilize existinginfrastructure to a certain extent. Finally, the tourist moves in a predictable and planned way. Whereas thenomad and pilgrim travel in relation to their work, the tourist travels for recreation and entertainment.

People also "move" between different ways of organizing their time, i.e., a kind of temporal mobility. Hall(1976) distinguishes between monochronicity and polychronicity. In the former, people seek to structure theirtime sequentially doing only one thing at a time, if possible according to a plan. In the latter, people accept-and maybe prefer-doing several things simultaneously, placing less importance on planned order. The newtechnologies seem to be increasing monochronicity in some situations and polychronicity in others. On the onehand, increased monochronicity appears in the interfaces of many contemporary enterprise systems, whichoften require business process steps to be carried out in strict sequence with little flexibility for individualvariations of temporal order and few possibilities for carrying out several processes in parallel. Because mobiledevices have small screen sizes and memories, monochronicity is strengthened, because it is less convenientto operate on several windows that run different applications in parallel. On the other hand, polychronicity isincreased in many mobile settings. A larger proportion of work is today done by what is termed symbolicanalysts (Thomson and Warhurst, 1998), whose main work resources and work products are symbolstructures and who do their work in (often many concurrent) knowledge-intensive projects, often in dynamicallynetworked organizations. Symbolic analysts, such as consultants, reporters and researchers, will typicallyhave many tasks going on concurrently and will be interested in a lot of different information there and then,much of which cannot be anticipated fully beforehand. There might be a need for learning on the fly, but alsofor capturing interesting situations to feed back to the organization supporting knowledge management andlearning. We predict that many of these workers would like to be supported also in their more complexpersonal processes involving, e.g., governmental agencies, banks, and insurance companies using the samesystem, if possible, as the distinction of work and private life is blurred for many. This is similar to how manypeople nowadays use PDAs, where the calendar is used for capturing both private and professional tasks andappointments.

In sum, mobile technologies inherently tend towards providing monochronic services, while at the same timethey tend to place their users in contexts with polychronic demands.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (195)

Differences between M-Commerce Systems and TraditionalInformation Systems

From an application point of view, m-commerce systems differ from more traditional information systems inseveral ways (Siau, 2001; Hirsch, 2001). These differences are both technical and user-oriented, and the latterones will be focused on in this chapter. We will discuss differences at several levels:

user level,

group level,

organizational level, and

inter-organizational level.

Whereas none of the differences are revolutionary in themselves, m-commerce systems increase theirimportance because (1) each difference is amplified by the m-commerce setting and (2) the difference can becombined in ways that are not yet understood.

User level

Because the new mobile devices integrate functions that were previously offered by physically separate tools,they probably signal the arrival of a plethora of new types of applications. New mobile devices (as of 2002)already integrate handheld or palmtop PCs with mobile phone, Internet connectivity and browsing, fax,cameras, GPS, and office functionality. M-commerce systems on these devices address both traditional ICTusers and new groups of users, meaning that user-interfaces should feature prominently and early in thedevelopment process and that user-interfaces should be extremely simple. Existing usability approachesprovide suitable support for developing stationary, in-office ICT but do not cover the necessary span ofcontexts where mobile devices are used. Usability testing has traditionally been done in usability labs thatmimic an office environment. Field studies and user observations have also been aimed at use in some formof office or work location. The new mobile technology allows the users to utilize business systems in suchlocations as on a bus, in a meeting or at home. Developers often cannot presume that users are acquaintedwith computers at all, and input and output facilities may be severely restricted (no keyboard, small screen-size, etc.) or based on new modalities (speech-recognition and synthesis, etc.). This means thatpersonalization of m-commerce systems becomes increasingly important, where user-interface details such ascommands and screen layout are tailored to personal preferences and hardware using information about thecurrent context and context trace (Ralhff, 2001) of the user. Personalization refers to both m-commercesystems that automatically adapt themselves to the preferences of the user and systems that can be explicitlytailored by users through a specific user-interface. The separation between content and medium found in m-commerce systems poses new important challenges to developers. New systems should thus provide maximalpersonalization from minimal assumptions about physical devices.

The focus of traditional usability research is limited, because ICT-artifacts are seen only as means to completeuser tasks, with focus on how users can complete their tasks faster or according to some measure of userperformance (Jordan, 1997). This tradition broadly ignores the affective part of the user experience obtained.However, some products do not require a formal task to be performed, but rather provide a notion of "havingfun" or obtaining an "optimal experience" (Brandtzæg and Følstad, 2001). The central element in an optimalexperience is that the activity is a goal in itself (Csikszentmihalyi, 1990). As leisure, social, and work activitiesincreasingly involve interacting with or communicating via ICT, personal, intrinsically motivated tasks start tomerge with easier to define and extrinsically motivated tasks.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (196)

Group level

Just as systems at the individual level should be tailored to personal preferences, functions at the work levelshould fit the work processes, processes that typically involve other persons as well. At the group level,awareness of the status of knowledge resources is increasingly important in a mobile setting. Awareness herealso includes the status of technical knowledge resources. Given that knowledge resources include bothindividuals and technology that can be mobile, one should look into interactive systems to improve groupperformance. Peter Wegner's interaction framework (Wegner, 1997; Wegner, 1998) was triggered by therealization that machines involving users in problem solving can solve a larger class of problems thanalgorithmic computing systems in isolation. The main characteristic of an interaction machine is that it canpose questions to human actors (users) during computation. The problem solving process is no longer just auser providing input to the machine that processes the request and provides an answer (output), it is amultistep conversation between the user and the machine, each being able to take the initiative. A majorresearch question in this area is how to specify and utilize interaction machines within a mobile infrastructureto make them more usable than traditional, algorithmic machines.

Traditional usability work typically concerns single users using one single technology to solve well-definedtasks in an undisturbed environment. Experiences from Naturalistic Decision Making have identified thatsolving tasks in this manner requires different strategies, other sources of support, and are accompanied byother problems than the solving of "real-world tasks," which are typically ill-defined and take place inenvironments characterized by time stress and multiple players (Zsambok, 1997). The identification ofcontextual variables of significant importance to the usability of systems in real-world use is important in thedevelopment and evolution of m-commerce systems.

Organizational level

M-commerce systems are often radical, and therefore reward increased focus on idea generation in the earlydevelopment phases. This also means that there are not always existing services or situations in which toanchor problem analysis efforts, e.g., using As-is analysis as a starting point for To-be design (Rolland andPrakash, 2000). Mobile technology still develops rapidly, meaning that idea generation should not be limitedtoo much by what is currently possible. It also means that systems must be designed for change. This appliesto at least two levels:

User interface design: m-commerce development methods should provide ample room for creativity andevaluation of alternatives at the very early stages, probably as part of requirements elicitation, in particularsince there is still no clear convergence towards a dominant user-interface standard.

Overall system architectures: m-commerce systems should be developed based from analyses of stablecomponents and grouped into back-end systems that reflect responsibility and competence areas withinthe provider organizations. Importantly, system architectures must not be derived from unstable andtechnology-dependent usage scenarios. Appropriate, methods for architecture evolution as new servicesare provided and new devices supported should also be in place.

M-commerce calls for highly distributed solutions that comprise new user-interface systems on the client side,new and existing back-end systems, as well as new bridging systems (which port information between othersystems.) The new technologies therefore highlight the need for principled, long-term IS-architecturemanagement in the organization and for integrating architecture management with software developmentmethodologies. Often there is a need to interface to existing enterprise systems and enterprise informationarchitectures to enable the new workflow.

Inter-organizational level

Since mobile devices will typically be used for a mix of personal and professional tasks (often for many

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (197)

different organizations in parallel), new security and privacy aspects arise. M-commerce systems poseadditional challenges to information systems security, most importantly by rendering traditional firewall thinkingunusable.

The emerging technologies provide many different ways to offer the same or similar services to customers.For example, broadcast news in the future will be available through plain-old television (POTS), interactivetelevision (iTV), Internet TV, 3G mobile phone, and numerous other information appliances (the door of theglove compartment in your car, your living-room wall, etc.) This stresses the importance of developing andevolving system architectures that are independent of usage scenarios.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (198)

Model-Based Development and Evolution of Usable M-CommerceSystems

Developing and evolving m-commerce systems with high usability for different mobile devices is not trivial. Thecomplex m-commerce systems, the technical infrastructure, the frequent context changes, the usability issuesinvolved and the development and evolution process itself demands an approach that allows for a high degreeof structure combined with flexibility and even creativity. In addition, the m-commerce systems themselves areonly one small, integrated part of larger enterprise systems. There is therefore a great need to integrateusability-engineering methods into a model-based development approach.

A user-centered iterative development process is a joint effort between different experts and the end-users.The iterative process is a way to ensure alignment between the information gathered from various activitieswith the users, previous knowledge and the proposed solutions from the developers. The different methodsused in a user-centered development process could vary much depending on when, who and where thetechniques are used. This spans from the use of informal models (e.g., rich pictures) (Monk and Howard,1998) early in the process to a rigid user evaluation at the end to verify that the requirements are met(Maguire, 1998). All these activities need to report and link their results into the technical system developmentand architecture evolution.

In general, a model-driven approach to information systems development has been found to provide thefollowing advantages (Krogstie and Sølvberg, 2000):

Explicit representation of goals, organizations and roles, people and skills, processes and systems.

An efficient vehicle for communication and analysis.

Basis for design and implementation, either through traditional code generation, generating calls toprespecified components (whose characteristics need to be modeled), or as documentation.

Readily available documentation as a basis for extensions and personalization.

One striking aspect in connection to contemporary information systems development and evolution is thatthere is an increasing demand for shorter development time for new products and services (Pries-Heie andBaskerville, 2001). This is specifically evident for m-commerce systems, where the convergence of differentplatforms continuously creates opportunities for new functionality. Some would argue that this highly dynamicsituation would make model-based approaches impractical. To the contrary, we claim that for newtechnologies to develop rapidly, idea generation should not be limited by currently available technologies andsystems must be developed for change.

There is little accumulated experience on how to develop software for the new technologies. As aconsequence, lightweight design techniques and early prototyping are natural choices for practical m-commerce systems development at the moment. In addition, research is needed on how to accumulateexperience from early development projects and package this knowledge into comprehensive, integrated andmodel-supported development methodologies. There is a need to develop new user-centered approaches thatare "quick and clean" (Wichansky, 2000) rather than "quick and dirty" to address this.

Looking in more detail on the levels in our taxonomy from section 3, we can identify the following areas forpotentially increased utility of techniques earlier developed as part of model-driven development:

User level

The mobile context of the user is changing all the time and m-commerce systems should therefore be able to

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (199)

adapt to new contexts when relevant for the user. It is for instance very different to access a system from adesktop and through a PDA. One way to make this more efficient is to apply the navigation in simple (process)models to give the necessary context for efficient access and use of enterprise-wide applications fromanywhere using any kind of information appliance. In general, the relevant context parameters should beexplicitly modeled to be able to give an overview of, support analysis of, and simulate the multitude of possibleways to adapt to the context and the use of context traces. The explicit modeling of goals andinterrelationships between goals and activities becomes in connection to this more important to be able to takeinto account all aspects of user experience.

As mentioned above, people will to an increasing degree need to access what is logically the same systemfrom a multitude of platforms (PDAs, PCs, mobile phones, TVs, etc.). Recently, work within user interfacemodeling has focused increasingly on modeling mobile user interfaces (Eisenstein, 2000; Eisenstein, 2001;Muller, 2001; Pribeanu, 2001; Schneider, 2001). This is often done to facilitate some level of common modelsfor the mobile user interfaces and more traditional ones. A central element in this is the development of model-based approached that are powerful enough to be used as a basis for the development of user-interfaces onthe multitude of platforms needed, but still general enough to represent the commonalties in a single place.One approach is to define user-interface patterns with general usability principles as powerful building blocks.A main challenge for model approaches for developing multi-interfaces is to have a set of concepts that are,on the one hand, abstract and general enough to express specifications across a number of quite differentplatforms and, on the other hand, powerful and expressive enough to support mapping to different platforms.Thus, there is a need to combine generalization and specialization. A model-based technique that is abstractenough to be able to describe user interfaces with significant differences may run the risk of being banal. Bythis we mean that the model is not able to describe sufficient number of aspects of the user interfaces in a waythat renders it possible to transform the models to concrete user interfaces without adding so much additionalinformation to the mapping process for each platform that the interfaces might as well have been developedfrom scratch on each platform.

Group level

Process support for users of m-commerce systems in a group setting extends the needs found in traditionalsystems. Experiences with the use of PDAs have shown us that many people will wish to be supported incarrying through many processes at one time (both private and business) by the same device and will wishsupport for both well-defined and emerging processes at the same time. Process support technologies aretypically based on process models, which need to be available in some form for people to change them tosupport their emerging goals. Thus, active models should be supported (Jørgensen and Carlsen, 1999;Jørgensen, 2001). The outset for this thinking is that models can be useful tools in a usage situation, even ifthe models are changing and are partly incomplete and inconsistent. The user is included as an interpreterand changer of the models, based on underlying interaction machines. Emergent workflow systems(Jørgensen and Carlsen, 1999) represent a different approach to static and adaptive workflow systems withrespect to their use of models. They target very different kinds of processes: Unique, knowledge-intensiveprocesses where the structure emerges. It can be argued that this is not specific for mobile informationsystems utilizing GPRS and UMTS technology. On other hand, this area will be even more pronounced insuch systems since future mobile devices (and a multitude of services across the network) will be alwaysavailable (and thus more likely to be used in an emergent or ad hoc fashion). Instead of the specification ofalgorithmic machines, this brings forward the need to specify interaction frameworks.

Organizational level

Siau (2001) highlights the development of m-commerce business models as an important application-orientedresearch area. Within e-commerce, many new business models have appeared. The mobile environment inwhich m-commerce applications reside will require further adaptations of these models. In order for m-commerce to succeed, it is vital to ensure that all the related applications and services can be accessed withease and little cost. Thus, in addition to externalizing the business models in a computing independent way, it

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (200)

is important to integrate these models with the internal enterprise models and enterprise architecture to beable to pinpoint the links to, e.g., internal systems for efficient billing of the m-commerce services. Fororganizational use, it is important to model the roles and responsibilities, the role-structures, and the tasks thatare relevant and allowed for users that fill the different roles. It is also important to be able to use the modelsfor these aspects across different enterprise systems and different mobile-client applications. To enhancesocial mobility, organizations and industries need to develop "social ontologies" that define the significance ofsocial roles and their associated behavior and context. These ontologies should be available as explicitmodels to be useful for the development and evolution of m-commerce systems. Role distinctions are alsorelevant on an inter-organizational level (below).

Another aspect is that there are currently (and will be for some time) a multitude of competing technologiesthat provide the underlying infrastructure for m-commerce systems. A central element when addressing this isthe development of model-based approaches that are powerful enough to be used as a basis for developmentand evolution of systems that run on a large number of mobile infrastructures but are still general enough torepresent the commonalties at one place only. The Object Management Group's (OMG) current major initiativeon Model-Driven Architectures (MDA (Poole, 2001)) specifies both platform-independent and platform-specificmodeling notations, including refinement techniques between these notations, and thereby highlights currentindustrial focus on such an approach. In connection to this, it is interesting to note how meta-modelingtechniques and domain-specific modeling (DSM) have found a special application for the design of mobilephone software (Kelly, 2001). m-commerce systems can be argued as a particularly appropriate area fordomain-specific modeling:

The software (on the client side) is partly embedded and must therefore be more reliable than traditionalsoftware. This can be supported by restricting choices through adding modeling rules and codegeneration.

You often need to develop and evolve many very similar variants of the same application.

There are several standards to adhere to, and the technology and standards change rapidly. For example,one wants to define GSM only once, use this definition in a range of products, and, when necessary, plugin a UMTS or a US analog component in its place. A single developer cannot know all the standards thatmight be useful; there is a need to insulate developers from the plethora of technologies and standards.

Looking at the architecture for existing general m-commerce solutions (e.g., Celesta, 2001), we notice thattheir generic architecture is geared towards the modeling of data, business processes and tasks, events andbehavior, rules, user interfaces and general context information.

Inter-organizational level

An important aspect on the inter-organizational level is the dependability of the systems made. Laprie definesdependability as the "ability to deliver service that can justifiably be trusted" and identifies six dependabilityattributes: availability, reliability, safety, confidentiality, integrity and maintainability. Model-based developmentwill in general be able to support dependability analyses, i.e., use of methods, techniques and tools forimproving and estimating dependability, e.g., risk analyses, probabilistic safety assessment, testing, formalwalkthrough, simulation, animation, exhaustive exploration and formal verification. Many of the dependabilityareas will be even more complex in m-commerce systems than in traditional business systems. As anexample, consider new issues arising in connection to security and privacy. The same device will often beused as a personal tool across the user's commitment to many different organizations and projects, and onemust assure that data does not "leak" across different domains. Another area of concern is the users (lack of)control over the context traces they leave behind when they use location-based or other context-basedgeneral services.

This section has discussed modeling-based approaches to development and evolution of usable m-commercesystems. Although this chapter has focused more on development issues than on evolution, the need for rapid

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (201)

and continuous development of new releases of different variants of m-commerce systems brings forward aneed for a higher degree of reuse and integration of models of different nature. A major research question inconnection to these areas is to what extent existing modeling techniques, e.g., based on the UML, can beapplied, when these techniques should be extended and when they need to be replaced all together. Earlyexperiences with this kind of problem indicate that the development of some technical areas within m-commerce system can benefit from building on and extending the existing techniques within UML. Forexample, advanced dependability and risk-analysis is currently done extending UML (den Braber, 2002). Onthe other hand, Kelly (2001) reported that at least for certain types of software development on mobileplatforms, the current version of UML has been found insufficient. For the business and process-orientedaspects we likewise see the potential uses of traditional enterprise and workflow modeling approaches inconnection to m-commerce systems. A main problem, also found in more traditional development, is thebridging of enterprise and design modeling, an area that is not properly addressed either in theory or practice.Although the proposals for the next version of UML attempts to make the language better also for enterprisemodeling, there is no sign on a that a good solution for bridging enterprise and system modeling will bepresented in UML2.0. Another unsolved area is how to integrate the user-interface models with other parts ofthe requirements and design models; for instance, the class model, process model and goal model. On boththe process and the user-interface side, the challenges can be attacked with extensions of existingapproaches to modeling, although research is needed to investigate both which techniques should beextended and how they could be best adapted to the new problem areas.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (202)

Conclusion

The large-scale application of m-commerce is in its infancy and, unsurprisingly, limited work has so far beendone on m-commerce systems, on usable m-commerce systems and on model-based development andevolution of usable m-commerce systems. On the other hand, the upcoming, 3G (UMTS) infrastructureprovides higher bandwidth and constant connection to the network from virtually everywhere, and the numberof m-commerce applications is therefore predicted to explode. The m-commerce community should thereforebe at the forefront of the development. Obviously we are not starting this work from scratch; it is possible tobuild on existing work within the usability, user interface and modeling fields, specifically on techniques formodeling of functional and nonfunctional requirements, process modeling, usability requirements, model-driven architectures, requirements specifications of Web applications, domain-specific modeling anddependability analysis.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (203)

Acknowledgements

We would like to thank our colleagues Erik Gøsta Nilsson, Jan-Håvard Skjetne and Asbjørn Følstad atSINTEF Telecom and Informatics and Konrad Morgan, Anders Mørch and Bjørnar Tessem at the University ofBergen for input and discussions related to this chapter. We would also like to thank the anonymous reviewersfor helping us to improve the focus of the chapter.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (204)

References

den Braber, F., Dimitrakos, T., Gran, B. A., Stølen, K., Aagedal, J. Ø. (2002): Model-based riskmanagement using UML and UP to appear in Proceedings of IRMA International Conference.

Brandtzæg, P. B., & Følstad, A. (2001). How to understand fun: Using demands, decision latitude andsocial support to understand fun in human factor design. In Proceedings of the International Conferenceon Affective Human Factors Design, Singapore.

Celesta (2001). Universal mBusiness Platform [online]. Available athttp://www.celesta.com/pdf/products/mBusiness_Platform.pdf.

Csikszentmihalyi, M. (1990). Flow: The Psychology of Optimal Experience. New York: HarperPerennial.

Eisenstein, J., Vanderdonckt, J., & Puerta, A. (2000). Adapting to mobile contexts with user-interfacemodeling. In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, WCSMA2000.

Eisenstein, J., Vanderdonckt, J., & Puerta, A. (2001). Applying model-based techniques to thedevelopment of UIs for mobile computers. In Proceedings of ACM Conference on Intelligent UserInterfaces IUI 2001.

Esbjörnsson, M. (2001). Work in motion: Interpretation of defects along the roads. In S. Bjørnestad, R.Moe, A. Mørch, & A. Opdahl (eds.), Proceedings of IRIS24, University of Bergen, Norway.

Hall, E. T. (1976). Beyond Culture. Anchor Books, Doubleday.

Hirsch, R., Coratella, A., Felder, M., & Rodriguez, E. (2001). A framework for analyzing mobile transactionmodels. Journal of Database Management, 12 (3).

Jordan, P. W. (1997). The four pleasures—taking human factors beyond usability. In Proceedings of the13th Triennial Congress of the International Ergonomics Association, Helsinki, Finland.

Jørgensen, H. D., & Carlsen, S. (1999). Emergent workflow: Integrated planning and performance ofprocess instances. In Proceedings Workflow Management '99, Münster, Germany.

Jørgensen, H. D. (2001). Interaction as a framework for flexible workflow modelling. In Proceedings ofGROUP 2001, Boulder, Colorado, October 2001.

Kakihara, M., & Sørensen, C. (2001). Mobility reconsidered: Topological aspects of interaction. In S.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (205)

Bjørnestad, R. Moe, A. Mørch, & A. Opdahl, (eds.), Proceedings of IRIS24, University of Bergen, Norway.

Kelly, S. & Tolvanen, J. P. (2001). Visual Domain-Specific Modelling: Benefits and Experiences of UsingMetacase Tools, Metacase Consulting.

Kristiansen, S., & Ljungberg, F. (2000). Mobility—From stationary to mobile work. In K. Braa, C.Sørensen, & B. Dahlbom (eds.), Planet Internet, Studentlitteratur, Lund.

Krogstie, J., & Sølvberg, A. (2000). Information systems engineering—Conceptual modeling in a qualityperspective. Information Systems Groups, NTNU, Trondheim, Norway.

Krogstie, J. (2001). Requirement engineering for mobile information systems. In Proceedings of REFSQ2001, Interlaken, Switzerland.

Luff, P., & Heath, C. (1998). Mobility in collaboration. In Proceedings of the CSCW'98, Seattle, USA, pp.305–314.

Maguire, M. C. (1998). User-centred requirements handbook (Report D5.3): HUSAT Research Institute.

Monk, A., & Howard, S. (1998). Methods & tools: The rich picture, A tool for reasoning about work context.Interactions, 5 (2), 21–30.

Muller, A., Forbig, P., & Cap, C. (2001). Model based user interface design using markup concepts. InProceedings of the Eighth Workshop on the Design, Specification and Verification of Interactive Systems.

Poole, J. (2001). Model-driven architecture: Vision, standards, and emerging technologies. ECOOP 2001,Workshop on metamodelling and adaptive object models.

Pribeanu, C., Limbourg, Q., & Vanderdonckt, J. (2001). Task modelling for context-sensitive userinterfaces. In Proceedings of the Eighth Workshop on the Design, Specification and Verification ofInteractive Systems.

Pries-Heie, H., & Baskerville, R. (2001). eMethodology. In Proceedings of the IFIP TC 8 Conference onDeveloping a Dynamic, Integrative, Multidisciplinary Research Agenda in E-Commerce/E-Business,Salzburg, June 22–23.

Rahlff, R., Rolfsen, R. K., & Herstad, J. (2001). Using personal traces in context space: Towards contexttrace technology. Personal and Ubiquitous Computing, Special issue on situated interaction and context-aware computing, 5 (1).

Rolland, C., & Prakash, C. (2000). Bridging the gap between organisational needs and ERP functionality.RE Journal, 5 (3), 180–193.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (206)

Schneider, K., & Cordy, J. (2001). Abstract user interfaces: A model and a notation to support plasticity ininteractive systems. In Proceedings of the Eighth Workshop on the Design, Specification and Verificationof Interactive Systems.

Siau, K., Lim, Ee-P., & Shen, Z. (2001). Mobile commerce: Promises, challenges, and research agenda.Journal of Database Management, 12 (3).

Thompson, P., & Warhurst, C. (1998). Workplaces of the Future. Macmillan Business.

Wegner, P. (1997). Why interaction is more powerful than algorithms. Communications of the ACM, 40(5).

Wegner, P., & Goldin, D. (1999). Interaction as a framework for modeling. In Conceptual Modeling:Current Issues and Future Directions, LNCS 1565. Springer.

Weiser, M. (1993). Some computer science issues in ubiquitous computing. Communications of the ACM,36 (7), 75–84.

Wichansky, A. M. (2000). Usability testing in 2000 and beyond. Ergonomics, 43 (7), 998–1006.

Zsambok, C. E. (1997). Naturalistic decision making: Where are we now? In C. E. Zsambok, G. Klein(ed.), Naturalistic Decision Making (pp. 3–16). Mahwah, NJ: Lawrence Erlbaum Associates.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (207)

Chapter 10: Managing the Interactions betweenHandheld Devices, Mobile Applications, and Users

Maristella Agosti and Nicola FerroUniversity of Padua, Italy

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

Abstract

In this work we present the problem of managing the interactions between handheld devices, mobileapplications and users that are the three main entities involved in providing information access in the mobilescenario. After introducing a general framework, which gives the reader a comprehensive view of the featuresof a handheld device and presents some techniques to overcome the constraints imposed by handhelddevices during the interaction with users and mobile applications, we focus our attention on the problem ofsearching for information using a search engine through a handheld device. We present the motivations forstudying this kind of search engines and a discussion on their features and design choices, explaining therelevant aspects that need to be addressed during the design and the development of these mobileapplications.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (208)

Introduction

The goal of this chapter is to introduce the reader the range of issues that need to be addressed for managingthe interactions between handheld devices, mobile applications and users. Specific attention is given to theinteractions between handheld devices and mobile applications that use search engines for informationseeking and discovery, because search engines are often used in mobile applications that provide informationand services.

There are three main types of entities involved in the interactions:

handheld devices: Examples of handheld devices [1] include Personal Digital Assistants (PDAs) andmobile phones;

mobile applications: Among the mobile applications which can possibly be considered for implementation,this chapter will focus on Web search engines. Search engine services are particularly useful to end userswho seek information for work or pleasure using handheld devices;

users: There are different categories of mobile users looking for information resources to solve someemergency needs or to resolve their Anomalous States of Knowledge (ASK) (Belkin, Oddy, & Brooks,1982).

The relationships between the three types of entities are illustrated in Figure 1, where it is shown that one hasto consider human/computer interactions when presenting content on the handheld devices and userrequirements when designing search capabilities for mobile applications. Another aspect that needs to beconsidered is related to the interaction and communication between the handheld devices and the mobileapplications, as the search capabilities of mobile applications are affected by the content presentationcharacteristics and the limitations of handheld devices.

Figure 1: Main entities involved in the mobile computing scenario

This chapter begins with a section that motivates the study on managing the interactions between entities inmobile scenarios. It concentrates on the interactions between handheld devices and mobile applications.Several problems need to be addressed in the use of handheld devices to present information and to adaptinformation content available on the Web to the handheld devices. Many examples are given on how theseproblems can be addressed. A general framework is introduced, giving the reader a comprehensive view ofthe features of a handheld device, and the differences between the handheld device and a desktop or portablecomputer including the constraints imposed by these differences. Some approaches will then be introduced toovercome the constraints imposed by handheld devices.

The chapter then presents the problems concerning the development of a search engine for handheld

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (209)

devices. Indeed, it could be thought that the problems of retrieving information end when the user has a goodbrowser, but that would be a misleading conclusion. It is necessary to provide the user with a tool that allowshim to find and reach relevant sites that otherwise would be difficult to know about. It will be shown how theconsiderations concerning surfing have to be changed and how everything is more complex, due to thefeatures of handheld devices. In this way the reader will be made aware of the interaction problems withsearch engines when using handheld devices and the architecture required to address these problems.[1]A handheld device is also known as a mobile device. In this chapter, we use both terms interchangeably.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (210)

Motivations of Managing the Interaction between Handheld Devices,Mobile Applications and Users

In Mobile Commerce (m-commerce), users will have to use handheld devices such as PDAs and mobilephones to access different types of services. These kinds of devices have special features that distinguishthem from a desktop or portable computer.

Typically, through the handheld devices, users can access the services provided by the ordinary electroniccommerce (e-commerce) sites. However, these e-commerce services designed for desktop computers usuallydo not suit handheld devices well. Due to their unique features, the handheld devices could become abottleneck in accessing e-commerce services—not allowing the user to fully appreciate the information andservices offered by the e-commerce sites.

The key approach to overcome the limitations of handheld devices is content adjustment that refers to theinformation presentation techniques and techniques required to manage user's interactions considering thefeatures of handheld devices.

Over the years, many enterprises have invested in applications to manage their data, and now these are thelegacy applications. Legacy applications were built in an environment where users interacted with theapplications through dumb terminals. Now enterprises need to extend their reach to customers and businesspartners using pervasive devices and the Internet, but the potential risks and costs prohibit companies fromporting these existing applications to any new technology, as observed by Britton et al. (2001). Using contentadjustment, the legacy applications ported to the Internet environment could still be accessed by a variety ofhandheld devices, allowing more effective Business to Business (B2B) and Business to Consumer (B2C)interactions.

Finally, Third Generation Mobile System (3G) introduces the "any time, anywhere, any device" paradigm; and,in order to respect the "any device" constraint, the content needs to be independent of the handheld devices,and so it has to be adjusted to the various devices on which it will be displayed.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (211)

Design Alternatives for Overcoming the Constraints of HandheldDevices

We now analyze the handheld device features that constrain the design of a mobile application and whichneed to be addressed by content adjustment:

screen size;

input method;

wireless link;

small memory;

slow Central Processing Unit (CPU);

energy consumption.

Screen Size

The screen of a handheld device is a very limited and valuable resource. The small screen reduces theamount of information that can be displayed at any one time and can either make a Web page, that has beendesigned for a desktop computer, difficult to read, or it can force the user to do a great deal of scrolling.

Most Web pages are designed to be displayed on the screen of a desktop computer, with colour and with aresolution of at least 640 ¬ 480 pixels, while other pages may be designed with higher resolutions in mind. Fora PDA, the most common resolution is 160 ¬ 160 pixels. This means that only 1/12 of the Web page can bedisplayed on the PDA. This may lead to a good deal of scrolling, both vertically and horizontally. If the PDAallows a long horizontal line to be wrapped into multiple lines, it may save some horizontal scrolling but willsignificantly compromise the readability of the page.

Nowadays, many Web browsers for handheld devices display Web pages without considering their screensizes. Thus, pages do not fit properly onto these small screens, and Web surfing becomes very tedious,reducing a site's effectiveness.

In order to address these problems, various approaches can be adopted, as classified in Bickmore and Schilit(2002):

device-specific authoring;

multiple-device authoring;

client-side navigation;

automatic reauthoring.

Device specific authoring involves authoring a set of Web pages for the display device of a particularhandheld device, be it a mobile phone or a PDA. The users will only have access to a selected set of services.All pages for these services are designed up-front for the display of some particular handheld device(s).

This is the approach taken in Handheld Device Markup Language (HDML) by Phone.com, WirelessApplication Protocol (WAP) and Compact HTML (CHTML) by Nippon Telephone & Telegraph (NTT) DoCoMo.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (212)

Screen size directly affects the amount of information displayed; and page layout needs to be plannedaccurately, so that information can be easily accessed by the user.

As suggested in Metter & Colomb, (2000), the page designer should:

maintain user orientation during navigation by means of a title showing at what point of the site the user isat;

verify that long text lines do not exceed screen dimension, compromising readability; and

rearrange complex tables, made up of many columns, into lists so that they do not exceed screen limits.

Furthermore, scrolling should be reduced by:

placing surfing aids, such as menu bars, in a fixed place near the top of a page;

placing key information at the top of a page; and

reducing the amount of content in a page.

Finally, small-screen users seem to choose and prefer direct access strategies to information, as illustrated inJones, Marsden, Mohd-Nasir, Boone, and Buchanan (1999); Jones, Marsden, Mohd-Nasir, and Buchanan(1999); Jones, Mohd-Nasir, and Buchanan (1999); and Buchanan and Jones (2000), so the designer should:

provide a search mechanism within a website; and

organise the information so that the navigation is focused; for example, suggest to the users a list of goalsthey might want to achieve and present a framework designed for facilitating such access.

Multiple-device authoring identifies a range of target devices and defines the mapping from a single sourcedocument to a set of rendered documents that apply to the different target devices.

For example, StrecthText (Cooper & Shuebotham, [2] 2002) allows the page designer to tag portions of thedocument with a "level of abstraction measure." When the user receives the document, he can select thedesired level of abstraction and the document is presented with the corresponding degree of detail.

Another example is Cascading Style Sheets (CSS) (Lie & Bos, 1999) of HyperText Markup Language (HTML),which allow the page designer to define, within a single style sheet, a set of display attributes for differentstructural portions of a document. For example, all top-level headings have to be in bold or the anchor text of alink has to be red. In general, a set of style sheets can be associated with a document, and the same stylesheet can be shared by different documents. When the user retrieves a document, he also retrieves the set ofstyle sheets associated with that document. For each style sheet in the set, there is a weight that measuresthe degree of satisfaction of applying that style sheet to the document. The CSS cascade mechanism assignsa weight to each style rule. When several rules apply, the one with the greatest weight takes precedence(W3C, 2002). It is relevant to note that in October 2001 the World Wide Web Consortium (W3C) produced theCSS Mobile Profile 1.0 (W3C, 2002).

Client-side navigation allows the user to navigate interactively within a single page, modifying a portion of itthat is displayed at a time.

A trivial example is the use of scroll bars. Another example is PAD++ (Bederson & Hollan, 1994), in which theuser can zoom in and out over portions the document. Active outlining (Hsu, Johnston, & McCarthy, 2002) isalso an example of client-side navigation, because the user can dynamically expand or collapse sections ofthe document under their section headings.

Automatic re-authoring requires the development of a software capable of processing an arbitrary Web

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (213)

document designed for a desktop computer and adjusting it through a series of transformations to the screenof an handheld device. This process can be made on the client, on the server or on a proxy server, which hasthe single task of providing conversion services.

There are many possible reauthoring techniques, which can be categorised along two dimensions: syntacticvs. semantic and transformation vs. elision, as classified by Bickmore & Schilit (2002).

Syntactic techniques operate on the structure of the page, while semantic techniques require a certain degreeof understanding of the content of the page. Transformation techniques modify the content or the presentationof a page, while elision techniques remove some content, leaving the rest unchanged.

So we can have the following cases:

syntactic elision: portions of text or objects within a document are removed, considering the structure ofthe document or the kind of object. Examples are active outlining, displaying only the first paragraph ofeach phrase and removing images;

syntactic transformation: portions of text or objects within a document are reorganized, considering thestructure of the document or the kind of object. Examples are transforming a complex table into a list andimage reduction;

semantic elision: portions of text or objects within a document are removed, upon an understanding oftheir meaning. An example is the removing of duplicate links; and

semantic transformation: portions of text or objects within a document are reorganized, upon anunderstanding of their meaning. Examples are text summarisation and reorganisation of all links within apage into a list.

A full example of automatic reauthoring is Power Browser (Buyukkokten, Garcia-Molina, Paepcke, &Winograd, 2000; Buyukkokten, Garcia-Molina, & Paepcke, 2000; Buyukkokten, Garcia-Molina, & Paepcke,2001b; Kaljuvee, Buyukkokten, Garcia-Molina, & Paepcke, 2001; Buyukkokten, Garcia-Molina, & Paepcke,2001a; Buyukkokten, Kalijuvee, Garcia-Molina, Paepcke, & Winograd, 2002), which utilises semantic andsyntactic techniques to improve the user's interaction on a PDA.

Power Browser is a proxy server that transforms Web content before delivering it to a handheld device.

During navigation, a set of link descriptions is shown, heuristically generated by anchor text, Uniform ResourceLocator (URL) structure and ALT tag. This structure, organised in a tree, not only includes links on a singlepage but also a hierarchical structure of links on linked pages, so the user can directly retrieve a page from alink description which is visible on the screen.

Once the desired page is found, the user can view some of its content. Images are not displayed, and the textcontained in the ALT tag is displayed instead of images; images can be shown on user demand, after arefinement step of adjustment of the image to the low-screen resolution, where the step is performed by theproxy server.

A summary is presented for each page, obtained by partitioning an original Web page into fragments, forexample paragraphs, lists or ALT tag describing images, and selecting the most important fragment as asummary.

Power Browser also tries to address the problem of filling in forms on a PDA screen.

Forms constitute a problem on a PDA and other handheld devices because input controls and associatedtextual explanations occupy too much space on the screen; therefore, it is difficult for users to gain anoverview of the form's content and of what is required of them. For example, if the user has to fill in a form

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (214)

registering for a service, he could interpret the name field as a name and surname field and fill in those twodata instead of the name only. When he proceeds by scrolling the bar he finds that there is another fieldasking for his surname. At this point the user has to go back to the previous field and correct the wronginformation submitted. The problem of filling in forms needs to be carefully addressed in an m-commerce site,because asking users for information is quite a frequent operation.

Instead of showing all the input controls at once, Power Browser initially shows only minimal textual promptsfor the input controls. When the user is ready to fill in information, a pen gesture on a textual prompt causesthe associated input control to be displayed, while all other input controls remain hidden. In general, all the textother than labels is ignored, so each visible string is a label for an input control. Buttons are expresslyidentified and links are handled as usual.

A different solution is WebViews (Freire, Kumar, & Lieuwen, 2001), which allows end-users to create andmaintain simplified views of Web content with a Video Cassette Recorder- (VCR) style interface.

In the following, "WebViews" means the name of the software, "Web view" is a view of the Web obtainedusing WebViews, and "Web views" is a set of views of the Web obtained using WebViews.

A user can create a Web view from a desktop computer by simply browsing the desired page and selectingthe content of interest within the page, while the WebViews recorder registers all intermediate steps andactions undertaken, such as interacting with Common Gateway Interface (CGI) scripts and so on. Therefore, aWeb view is much more than a simple bookmark because it also stores the information needed to interact withscripts. The Web view created is robust to some changes in page layout so, if the site does not change toomuch, the user can avoid recreating the Web view. When the user accesses the Internet through a handhelddevice, he can recall the created Web view from the Web views' server which accesses the previouslyselected content on the desired Web page, clips it and returns an eXtensible HyperText Markup Language(XHTML) response to the client. The client could also be an intermediate proxy, which performs contentadjustment and translates the XHTML content into various formats, e.g., Wireless Markup Language (WML).

WebViews facilitates and shortens the subsequent phase of automatic reauthoring, since it provides thereauthoring module of a simplified version of the Web page; this contains only the content desired by theusers and avoids all the intermediate steps.

To address the problem of filling in forms on a handheld device screen, WebViews allows the user during therecording phase to specify which field values are to be stored in the Web view specification itself and whichones are to be requested by the user every time the Web view is executed.

The International Business Machines (IBM) Websphere Transcoding Publisher (Britton et al., 2001; IBM,2002) is a commercial product which can be considered as being halfway between a multiple authoring and anautomatic reauthoring device. It uses, in fact, users' profiles and both eXtensible Markup Language (XML) andeXtensible Stylesheet Language (XSL) style sheets for content adjustment, just as in multiple deviceauthoring. Another important characteristic is that it transforms HTML into WML cards and decks; to performsuch a transformation, it uses syntactic techniques such as image reduction and semantic techniques, suchas rearranging text into WML cards and decks.

Strengths and weaknesses of those different approaches

"Device specific authoring" typically gives the best results, but it limits users to a small subset of Web pages.Furthermore, managing and keeping a site updated is an onerous task, requiring hours of manual work.

"Multiple device authoring" requires less effort for a single document than device-specific authoring, but itrequires a considerable amount of manual design, and it limits the users to a subset of Web pages.

"Client-side navigation" is a promising approach if a set of good techniques can be developed. In fact, the

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (215)

PAD++ "magnifying glass" approach can be very awkward if the documents are large; the active outliningapproach can have a limited applicability, since many Web pages are not organised into sections andsubsections.

"Automatic reauthoring" is thus the ideal approach to provide a broad access to the Web through a wide rangeof handheld devices, where it is possible to produce legible and aesthetically pleasing documents that can beeasily surfed without loss of information.

An approach such as that taken in WebViews can help the automatic reauthoring process, but it still requires acertain degree of user interaction to prepare the Web view, and that same Web view needs to be recreated ifmany changes are made to the original page. Moreover, the process of creating a Web view is managed on adesktop computer, and that requires the user to plan which pages he will access from the handheld device.

Input Method

During normal Web surfing, the user can utilise both the keyboard and mouse to reach every object on thescreen and to provide input to forms easily.

The input in a PDA is done through a pen, which makes both gestures and character input possible. Anadvantageous aspect of this input method is that the engine for character recognition could be shared with theengine for gesture recognition, as illustrated in Moran, Cheyer, Julia, Martin, & Park (1997).

Characters are written by the user in a special area of the screen and are then recognised via OpticalCharacter Recognition (OCR). With this approach text input is subject to mistakes, and the user has to writecharacters with some care to ensure the system recognises them; this process increases the time required towrite a word. An alternative is to draw a virtual keyboard on the PDA's screen so that the user can choose thecharacters with the pen and compose a word. Even this approach is time consuming and can lead to the usermaking mistakes.

The use of a pen allows the user to reach any object placed on the screen, simplifying the design of objectslayout, but not input difficulties. Furthermore, gestures made with a pen are generally more varied than thosethat can be done with a mouse. For example, a top-down gesture could mean vertical page scrolling.

Input method on a mobile phone is a great constraint, as there is the numeric keypad and a scrolling key. TheWAP Forum requires at least vertical scrolling, so no horizontal or diagonal scrolling is guaranteed. Aconsequence is that the process of surfing a page can be difficult and frustrating, looking for links to otherpages or consulting long lists. Moreover, the user has to press the keys many times to form words. In order toaddress the page-surfing problems, page layout should be carefully planned—making frequently usedfunctions easily reachable. Metter & Colomb (2000) suggest helping the user by gathering all the links within apage in a permanently available list, eventually combining these links with keys on the numeric keypad.

Word completion techniques should be employed to manage text input problems, both for PDAs and mobilephones. We can distinguish between general purpose techniques, meaning techniques developed generally toovercome the constraints of the device, and specialised techniques, meaning techniques tailored to the userand the application.

General purpose techniques try to complete words according to a predefined dictionary, differentiatingbetween one word and another as characters are entered.

A technique developed for handheld devices generally is Predictive cOmposition Based On eXample (POBox)(Masui, 1999), which is organised into two steps: filtering step and selection step. During the filtering step, asthe user enters characters, the system dynamically uses those characters to look for candidate words in adictionary. During the selection step, the user can select the desired word from among candidate words. Thenthe next input words are predicted from the context and passed on to the next filtering step.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (216)

Many solutions were studied to facilitate text input through the numeric keypad of mobile phones, proposing away to introduce words by pressing keys only once, such as in Tegic (Tegic, 2002) Text on 9 keys (T9), whichis a software adopted on many mobile phones and which is available for many languages. Every time there isan ambiguity between words, T9 shows the user a list (by means of an internal database) with the possibleterms in order of utilisation frequency, so that the user can choose the correct one. Furthermore, the internaldatabase can be updated with new words added by the user, when he introduces words unknown to thesystem. GSMBox (2002) reports a study made by Nokia according to which text input with T9 is twice as fastas conventional methods, and the Nokia study confirmed the user's desired word is the first choice 95% of thetime.

Specialised techniques suggest words to users, choosing them from a well-defined set personalised for theuser, his needs, and features of the applications with which the user is interacting.

For example, Power Browser offers support for keyword entry during a local search session within a site: forevery site that the user is visiting, word completion and measures of keyword selectivity are provided. Asusers enter successive keywords, the system shows how many pages match the query, and users can submitqueries only when the keywords are selective enough.

The approach adopted by WebViews facilitates text input, because it avoids all the intermediate steps, thusrequiring less input for surfing the Web; input forms can be partially or fully filled in during the Web viewcreation phase, decreasing the problem of inserting words with a handheld device.

So, if in general we can expect the presence of general purpose techniques on the device, peculiarities of theuser or of the application can require the developing of more specialised techniques.

A very attractive alternative for solving text input problems is speech recognition. It is certainly very useful butstill not widely adopted, due to the problems of implementing voice-independent recognition systems, wherelittle or no information is provided about the domain to which the text to be recognised pertains.

Wireless Link, Small Memory, Slow CPU and Energy Consumption

A handheld device uses a wireless link to transfer data to and from a server. The bandwidth availablenowadays is very low, and as a result the link between the client and the server is very slow and does notallow large data transfer. This problem will be partially overcome in the future by 3G networks. An example ofthis trend is the General Packet Radio Service (GPRS), which is an evolution of the Global System for MobileCommunication (GSM) and a technology emerging today that achieves performances that are roughly thesame as those of a standard analog modem, in a favourable case scenario. Furthermore, wireless networkssuffer from high latency.

The WebViews approach addresses low bandwidth problems, since it minimises the amount of datatransferred between the handheld device and the server, as well as high latency problems because it avoidsrepeated access to the Internet for fetching intermediate pages needed to reach the desired page.

A handheld device has a small amount of memory, and it is impossible to manage complex pages, such as apage containing a large image or a high amount of data. The CPU is quite slow and computational intensiveoperations should be avoided, as otherwise the user has to wait far too long. Moreover, battery energy needsto be saved in order to guarantee the autonomy of the device, and this is a constraint for the operations thatcan be done on the client, since the CPU operations are expensive in terms of energy consumption.

The problems regarding computational load distribution affect the choice of which component has to providethe various functions to help the user—either the server or the handheld device: certainly the server has thepower required to manage the various tasks needed to facilitate surfing, but response time from the server tothe handheld device needs to be considered, since it can compromise performances. So there is a trade-off,

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (217)

as some computational load has to be moved to the client to guarantee the system some efficiency. This is atleast until the slowdown caused by the processing action on the client is below the time required to do thesame processing on the server and to send data to the handheld device.

Ojanen & Veijalainen (2000) give an example of these considerations and the method according to whichvarious parameters have to be evaluated. Ojanen & Veijalainen (2000) study WML code compression before itis sent to a mobile phone, so that the amount of bytes to be transmitted decreases and the transmission timeis reduced. It is explained how to determine whether this choice is convenient or if the overheads introducedby compression and decompression of the code outweigh the gain obtained from reduced transmission time.[2]The date on the availability of documents on the Web is 2002 for all documents, because the presence of allthose digital documents has been checked at the given URL during the late months of the year 2002.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (218)

Mobile Search Engines

In the previous section, the adjustment of contents to handheld devices was analysed, which constitutes a partof the interaction process for the user seeking information. In this section, we analyse the other part of theinteraction process, i.e., that of having a Search Engine (SE) available for use and access from handhelddevices.

This type of SE can be called a Mobile Search Engine (MSE), stressing that these SEs need to be designedand implemented for direct access by any type of mobile device.

The first part of this section clarifies the motivations for studying MSEs. The second part presents a generaldiscussion on MSE features and related problems. The final part presents the design of Odysseus, an ongoingMSE project initiated by the authors of this chapter.

Odysseus is the name of our project for designing and implementing an MSE. At present Odysseus is only inthe early stages of design, so it is used here as an example for discussing relevant aspects that need to beaddressed in designing mobile applications to retrieve information for a user not using a desktop computer buta mobile device. We will explain the concepts, architecture and solutions for Odysseus, which are all undercareful evaluation.

Motivations for Studying MSEs

Search engines are often used to discover and find information on the Web. To search the Web usinghandheld devices, a specific type of search engine will be required.

The user could utilise a search engine on handheld devices for the following reasons:

to choose between services offered, including those of m-commerce, and to find one which best satisfieshis needs; or

to retrieve information of every-day interest for work and pleasure.

With regard to the first point, an analysis of the situation leads to the consideration that the amount ofapplications offered and the range of resources available require a tool that allows the retrieval of services andinformation in a quick, simple and easy manner. If there are sites offering online trading, m-commerce,entertainment and so forth, it is necessary to have an application which finds what is required, since theburden of knowing and remembering various sites cannot be passed on to the user.

The Universal Mobile Telecommunication System (UMTS) Forum (UMTS Forum, 2002) also considers themobile portal as the way of providing access to 3G services and, within the mobile portal, search engine is animportant component.

With regards to the second point, the user, in addition to coping with prepacked proposals such as those thatare managed by the organisation he works with, may desire to use the power of the Internet as a source ofresources and, therefore, to search for documents and information on specific topics of interest for work andpleasure, as with traditional search engines.

At this point someone could wonder how the inquiring and retrieving can take place on a handheld device. Thefollowing scenarios can be shown:

directly legible document: if the size of the document is not too big, it can be displayed directly on thehandheld device's screen, after a content adjustment phase;

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (219)

not directly legible document: if the size of the document does not allow for its online reading, or, if thekind of file does not permit its browsing (such as a binary file), the search result can be sent to aworkplace capable of managing the resource; in this case, the actual use of the document would bepossible later. While the user is moving, the search can serve to find useful documents and some othertool can arrange in advance a source of interest at destination, which can be ready when the user arrivesat destination, so that it can be used immediately—improving efficiency;

printable document: if the user has a portable printer or can connect to a printer or a fax, he canimmediately print the search result and use it, even if the search result is not easily readable on a screen.This option conforms with the concept of "any device," and it is already in line with the Bluetooth(Bluetooth, 2002) standard for wireless interconnection of heterogeneous devices.

The study of searching by means of handheld devices should not be limited to SEs but should be extended toInformation Retrieval Systems (IRS)s generally and Digital Libraries (DL)s. Indeed, mobility could improve theutilisation of a DL: for example, a person can perform a search on a DL while moving between the physicalshelves of a library, as observed in Marshall, Golovchinsky, & Price (2001).

Furthermore, as suggested in Marshall et al. (2001), searching and reading a DL can be done together withother activities, such as working with colleagues, alternating searching with writing and organising materials.During teamwork, one person can add annotations to documents of a DL and another person can search theDL for documents with a specific annotation. Merging content and wireless communication can developubiquitous access to DLs, improving well-established collaborative practices and exploiting physical and digitalresources.

Content Adjustment for MSE

In the previous section the motivations that can lead to the use of search engines from mobile devices wereshown. Those considerations suggest that a Web search engine cannot be used directly from a handhelddevice, but its use should be adjusted to the peculiar features of the types of those devices. Thus, this sectionaddresses the different aspects that have to be taken into account when the content, which constitutes theresult of a query to a search engine, needs to be adjusted to a handheld device. The presentation follows thesame sequence of presentation of device features that has been given previously, so it constitutes a parallelanalysis and study of the previous one.

Screen size. The output of a query to a traditional search engine is shown, in multiple pages, as a list of linkswith a small paragraph of text, taken from the original Web page, describing each Web document of the result.Considering the small screen of a handheld device, search results cannot be displayed in a traditional way,because the information displayed could be difficult to read and the user would be compelled to scroll a longdocument to look for interesting links.

Therefore, it is necessary to identify and design a more compact way of displaying search results, differentfrom the simple traditional ranked list. This new way of presenting results should allow the user to gain anoverview of the search results and to reach the most relevant links easily.

Input method. Another problem is the input method: if during a simple navigation this problem could be lessurgent, the user's interaction is greater in the use of a search engine, since the user inserts the query, thesearch engine returns a set of results, and, eventually, this cycle can be repeated as many times as isnecessary to improve the search.

Therefore, the user needs to be facilitated with a general feature of word completion and a more focusedsuggestion of relevant keywords, tailored to the user's areas of interest.

Wireless link. The low bandwidth and high latency problems also need to be borne in mind, as a genericquery could produce a long list of results and the query refinement process leads to frequent communications

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (220)

between the handheld device and the server.

To address these problems, a measure of the selectivity of a query should be estimated so that the user canactually submit the query when he is sure of not receiving too many results; this reduces the number of stepsotherwise necessary to reduce the size of the set of results to improve the precision of the query.

Caching can help to face these problems—both local caching on the handheld device, as it allows the returnto previous results, and server caching, which allows pages' prefetching while the user is reading the results.

Customizing the search engine. As illustrated generally for 3G services (UMTS Forum, 2002), a necessaryfeature for a search engine for handheld devices is the possibility of customising the application according tothe user's needs. Today, Internet services are already offered as portals, highly configurable, and the user ofhandheld devices can expect to have similar services.

Customisation is important since most users mainly use a specific search engine, because it satisfies theirneeds adequately in terms of topics' coverage; also, they know its features and query language better.Therefore, the interface of the preferred search engine needs to be shown to a specific user, and it needs tobe tailored to the specific device.

Customisation, as better knowledge of a user's needs, is also advantageous for the application, since it allowsanticipation of the user's requests, offering a better service, and gets to know a user's vocabulary and topics ofinterest, which information is important for word completion and keyword suggestion.

Method of implementation. At present the change to 3G services is made as smoothly as possible, and thisis witnessed from the introduction of 2.5G networks, as, for example, for GPRS networks. From this point ofview, the implementation of a search engine to be used from handheld devices should be planned so that itwill not require the redesign of existing systems; rather, it should be added to them as a new layer, permittingthe start of the path towards 3G.

The current proposal, at protocol level, to bring the Web to mobile phones is WAP, which was developed by aconsortium of manufacturers with the aim of making a standard.

However, WAP is designed for current mobile phones, but it is improving to ensure the support of those thatare 3G. Once 3G mobile phones are on the market, other solutions such as XML (Leavitt, 2000) could beused.

The guidelines, which will be used in the design of an MSE, should not be bound too much to currentstandards; they should rather resolve the problems related to the kind of device and application offered, thanexploit today's technology features, so that the design of an MSE is easily portable in the event of a change ofstandards and technology.

On the other hand, it should be shown how the design choices and solutions adopted could be fulfilled in anactual application. From this point of view, developing a prototype with WAP could be advisable; it would allowaccurately documenting the phases of the implementation process, so that these could be used as aparadigm.

A relevant application for consideration is "Pirate," the recent proposal for a search engine for the Palmmade by IBM. Pirate is the Palm Information Retrieval Application for Text sEarch (Pirate) (Aridor, Carmel,Maarek, Soffer, & Lempel, 2001; Aridor, Carmel, Maarek, Soffer, & Lempel, 2002), which allows users topredefine a topic of interest and then capture a very small and representative set of Web pages for the topic,storing it in a persistent repository called Knowledge Agent Bases (KAB). The process of creating a KAB canbe called from a desktop computer or from a PDA. The knowledge acquisition is then performed on a desktopcomputer, and the resulting KAB is downloaded to the PDA.

The KAB is created starting from a set of four to six queries supplied by the user for defining the topic and/or

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (221)

from a set of seed URLs which the user considers relevant to the topic. A Knowledge Agent (KA) thenbrowses the Web looking for pages relevant to the topic.

Stored in the KAB are a topic-specific lexicon, a small number (roughly 100) of core pages whose full text isstored in the KAB, a larger number (roughly thousands) of Web pages pointed from the core pages, for whichonly the URL and anchor text are stored, and an index for searching the KAB.

Pirate offers both word and query completion by using a domain-specific vocabulary from which it suggests, askeys are pressed, the most frequent words in the vocabulary consistent with the input prefix. Furthermore,query completion is performed by suggesting terms related to the query terms already introduced using aglobal semantic word network.

This solution has the advantages of allowing users to perform a search task with few or no data exchangeswith the server, addressing low bandwidth and high latency problems, and completing words and queries in avery focused way, facing text input problems.

On the other hand, Pirate requires users to arrange in advance the KAB, not offering support and help for anonline search of topics not stored in the KAB. Moreover, Pirate does not implement advanced features foraddressing limited screen and scrolling problems.

Odysseus: An Example of an MSE

In order to understand all the problems related to the development of search engines for use on handhelddevices, it seems important to underline the most relevant key features for their design. In Ferro (2001) aproposal called Odysseus was introduced. The most relevant characteristics of that proposal are reported byFerro (2001) and are used here as a useful example, permitting the presentation of all the different aspectsthat have to be addressed when designing and developing a mobile search engine.

Odysseus is organised according to the client-server paradigm: the client sends a user's query to themiddleware server, which forwards it to the selected search engine, collects the search results, and organisesthem for their display them on the client. The general architecture of Odysseus is shown in Figure 2.

Figure 2: Odysseus architecture

The middleware server provides, in general, two kinds of connection: a wireless connection towards mobileclients, and a wired connection with the Internet. The wired connection can be further specialised, atconceptual level, into a general connection to the Internet, which allows the middleware server to fetchrequired Web pages, and a focused connection, which is the interface toward search engines.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (222)

The aim of this architecture is to make the features of a Web search engine usable for handheld devices,without redesigning the technology already in existence. This is done by introducing an intermediate layer,which takes care of the mediation between the mobile clients and the Internet, and by adjusting Web contentto the particular features of a handheld device. Odysseus architecture fits into the roadmap suggested by theUMTS Forum (UMTS Forum, 2002) to reach the mobile portal.

Functionalities of Odysseus middleware server

The middleware server executes the following tasks: it waits for a user's query and forwards it to a searchengine (selected from a list of available search engines).

Once the list of search results has been obtained, Odysseus estimates whether there are too many searchresults to be successfully displayed on the handheld device. If that is the case, Odysseus tries to suggestother words to the user and invites him to refine the query to make it more selective.

The suggested terms together with the selectivity assessments for each term are uploaded from Odysseus tothe client, so that the whole process of query refinement is done on the client, minimizing the data exchangebetween the client and Odysseus to address high latency problems.

Furthermore, Odysseus suggests terms to the user in a focused way—choosing them according to the user'sneeds, as explained later, integrating a general word completion feature, which can already be offered by thedevice, and assisting the user in the difficult phase of text input.

When the number of search results is small enough, the middleware server extracts a concise and significantdescription for each result and indexes the pages referred by search results. In order to perform this task, themiddleware server accesses the Web repeatedly.

There are two kinds of visualisation to satisfy the requirements of adjustment to a device's features: a textualvisualisation and a graphical visualisation, which give the user an overview of obtained results. Thesevisualisations will be explained in more detail later.

The functioning of the middleware server is illustrated in the flow diagram of Figure 3.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (223)

Figure 3: Tasks executed by Odysseus middleware server

By observing the tasks performed by the middleware server and considering that it communicates directly withhandheld devices through the wireless link, you can notice that some features of Odysseus are common to abrowser for handheld devices. Firstly, the middleware server has to manage the user interaction. Secondly,Odysseus has to show search results to the user. Then, when the user chooses a result, Odysseus has topresent the desired page to the user, and this means rendering the page on the device's screen. Finally,Odysseus represents for the client the access point to the World Wide Web (WWW), and so it should alsooffer browsing functionalities. Thus, it could be a good choice to merge the functionalities of Odysseus withthose of a browser for handheld devices.

We will now explain in more detail the techniques for managing the interaction between a search engine and ahandheld device, considering that suggestions about content adjustment for Web browsing have been alreadygiven in the section on design alternatives for overcoming the constraints on handheld devices.

Odysseus middleware server architecture

Within the middleware server the modules (needed to take into account the three main entities described atthe beginning of the chapter) have to be planned. Indeed users, devices, applications and their relationshipsshould be borne in mind during the design and development of an application accessible through handhelddevices.

The architecture of the middleware server is illustrated in Figure 4.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (224)

Figure 4: Architecture of Odysseus and its modules

Four main functional modules are illustrated in Figure 4:

User Modelling Engine: this module models the various kinds of users, taking into consideration the users'preferences, their topics of interest, and the way in which they prefer to receive answers from the system,e.g., a summarisation of information or a list of keywords;

Device Modelling Engine: this module models the various kinds of handheld device the system caninteract with, bearing in mind basic functionalities offered by the device and special features that can beexploited;

Application Modelling Engine: this module models some aspects regarding the kind of application andspecial application needs (for example, an SE is characterized by a user's interaction greater than bybrowsing—in an m-commerce application filling in forms is a more substantial problem than browsing);

Engines Manager: this module is a supervisor and coordinates the interaction of the other modules.

With this architecture, only one user model is maintained for each user, and so the user can access theapplication through various devices, keeping his work environment unchanged when he passes from onedevice to another, such as in Virtual Home Environment (VHE) of UMTS Forum (UMTS Forum, 2002).

On the other hand, only one device model is maintained for each device, and so different users, using thesame device, have the same device model. This approach conforms with the Composite Capability/PreferenceProfiles (CC/PP) initiative (W3C, 2002).

We now see in more detail the function of each component within the middleware server.

User Manager controls all the communication to and from the wireless client. It represents for the client theaccess point to the Internet. Furthermore, by using the User Profiles database, it recognises each user and hispreferences, and stores personalised information for each user; this could be topics of interest, previoussearches along with query terms, links judged to be relevant and visited pages, keywords within these pages,the preferred search engine—thus allowing the customisation of the service.

User knowledge is a progressive and incremental process, because information about a user's behaviour isgathered as he utilises the system, enters queries and browses the Web.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (225)

Device Manager keeps information about various handheld devices in the Device Profiles database,information such as screen resolution, available characters dimension, input characteristics and data protocolused by the handheld device, e.g., WAP, HDML and so forth.

The information on a handheld device's characteristics is used in the phase of content adjustment to tailor thebehaviour of Odysseus to the specific device utilised by the user.

Search Engine Manager co-ordinates interactions with the various search engines supported by Odysseus: itforwards the user's query to the desired search engine, it retrieves the results proposed by the search engine,parses them, and translates them in an internal format (based on XML), so that the other components of themiddleware server can perform their computation without considering the particular search engine used.

Furthermore, the Search Engine Manager can communicate with search engines not only through HyperTextTransfer Protocol (HTTP), but also through CGI script, if the search engine provides advanced functionalities.

The Search Engine Manager keeps information about a search engine in the Search Engine Profilesdatabase. It stores the name and the URL of the search engines, the parameters regarding the interface of thesearch engine, such as the relative position of objects, an object's type and function, information about specialfeatures implemented by the search engine, for example finding all the pages pointing to a desired URL, thesearch engine's available operators, modality of communication, e.g., HTTP, CGI, and a brief guide to thesearch engine's functionalities for helping the user.

Page Manager performs complex tasks and coordinates the components of the middleware server. Itperforms the following tasks:

management of number of results: using a device dependent threshold, the Page Manager decides ifthere are too many search results and, in which case, it warns the user and suggests more terms.

query expansion: the query expansion technique can be used when a user has entered his query, but thatquery would produce too many results; in an automatic way, more terms can be added to the originalquery to reduce the result set to be presented to the user; to reach this objective, the Page Manager asksthe User Manager for terms related to the query by using the user profile and it extracts the moresignificant terms from the set of retrieved documents;

results description: the result page itself is used for extracting a description sentence. Eventually, eventhe pages pointing to the desired page can be utilised: within these pages, the paragraph containing thelink to the desired page is analysed and used to extract the description. An approach of this kind isadopted in InCommonSense (Amitay, 2000). To extract the summary sentence, the Page Manager usesthe Indexing Manager;

page rendering and user interaction: to render the page on the client, the Page Manager asks the DeviceManager for information about the device's physical features and the language to use for describing thepage, e.g., WML, HDML and so on.

Indexing Manager receives as input an HTML page and splits it into sentences of simple text, using structuralelements such as paragraph breaks, lists, tables, titles and sections, punctuation.

Then each sentence is indexed, extracting tokens, filtering the stop words and performing the stemming, andis weighted according to the tf ¬ idf (term frequency, inverse document frequency) weight:

where:

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (226)

wij is the weight of the word Tj in the sentence Si;

tfij if the frequency of the word Tj in the sentence Si;

N is the number of sentences in the collection; and

n is the number of sentences where the word Tj appears at least once.

Then a similarity score is computed between each sentence and the query. The sentence with the highestscore is chosen as a description for a result.

Results visualisation

Odysseus offers two kinds of visualisation: a textual visualisation, similar to the ranked list, and a graphicalvisualisation, which lets the user choose from among three different types of representation of the results set.

Textual visualisation displays the description of a link and, if there is enough space on the screen, the URLas well. The URL is an important element, because from it the user can ascertain which site it is, if he alreadyknows the site and if the site is interesting; thus, the URL should be displayed. If screen size allows it, a linkdescription and a URL can be displayed at the same time while, if there is no space, the link description isdisplayed first and, upon user demand, the URL too.

Depending on the device used, one or two links can be displayed at the same time, and to see those thatfollow, the user can utilise a scroll key. Once the user reaches the desired link, he presses a confirmation keyand the corresponding page is displayed.

The link order in textual visualisation is that returned by the search engine.

Graphical visualisation operates by offering the user the choice between various methods of visualisationand allowing him to move from one to another; once an object of interest is selected, Odysseus shows the linkdescription, as used in textual visualisation, and it is possible to choose to see the Web page or to restart theexploration process.

In graphical visualisation, search results are represented as points in a bidimensional space. The aim is togive the user an overview of the search results, so that he can understand the relationships between the queryand the results, and the relationships between the results themselves, without requiring the user to read eachresult to assess its relevance. In this way the information retrieval process is simplified and sped up.

A problem with graphical visualisation is input: how can the user move among various objects displayed? Thisis a problem especially for a mobile phone, because on a PDA, any object can be selected by the pen. For amobile phone, a movement can be used which allows the probably more significant document to be visitedfirst. For example, a clockwise or anticlockwise spiral movement, according to whether the user presses theup or down key, begins from the result most similar to the query and then moves on to those less similar.

When the desired object is reached, pressing a confirmation key permits the display of pertinent information.

Assuming a vector space model, every graphical visualisation tries to move from the n-dimensional space ofterms of the documents to a two-dimensional space; what is changed from one graphical visualisation toanother is the way in which point position is calculated within two-dimensional space.

Odysseus offers three graphical visualisations:

The first visualisation tries to discover the links between the results, showing the inter-documentsimilarities and which documents regard the same topic, through clustering techniques. If two results aresimilar, the corresponding points will be close while, if the points are far apart, it means that page contentis very different. This approach is taken in Lighthouse (Leuski & Allan, 2000b; Leuski & Allan, 2002;

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (227)

Leuski & Allan, 2000a; Leuski & Allan, 1998).

A circle can be used to represent a judged or estimated relevant document, while a square can representa judged or estimated nonrelevant document. A simple corollary of Cluster Hypothesis is that if a relevantdocument is found, other relevant documents should be in the neighbourhood of this relevant document.As a consequence, with this visualisation, circles of relevant documents move toward circles of otherrelevant documents. Therefore, finding interesting information should be as easy as inspecting a circlenear the circle of a document of known relevance. Similarly, squares of non-relevant documents tend tobe brought together.

An example of this visualisation is shown in Figure 5.

Figure 5: Visualization of interdocument similarities and document clustering

The second visualisation tries to highlight the relationships between the query and the results, in terms ofrelevance and similarity to the query and, in the case of multiple queries, it shows results common to thequeries and the relationship of these results with different queries. This approach is taken in Hyperspace(Beale, McNab, & Witten, 1997).

A circle can be used to represent a document, while a rhombus can represent a query.

Independent and completely separate queries make a series of "dandelion heads," i.e., sets ofunconnected circles, each one centred on the query that generated it. More interesting modalities aregiven by correlated queries, because if the same document belongs to a set of search results of two ormore queries, it is connected to various rhombi.

An example of this visualisation is shown in Figure 6.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (228)

Figure 6: Visualization of relationships between results and query

The third visualisation lets the user analyse the relationships both between the query and the result andbetween the results and the terms of the query. Thus, it is possible to know that a document was judgedrelevant rather by the presence of some terms than the one of others.

A three-terms query could be represented as a pyramid with a triangular basis, which is reminiscent of aNative American Indian tepee. Each face of the tepee is utilised to represent one of the three terms of thequery. A pendulum (representing found documents) is used to show which terms are more relevant. Thependulum is attracted by the tepee's face, which represents the most relevant term, and its length is ameasure of the overall relevance of the document. This approach is taken in Tepee (Grewal, Jackson,Burden, & Wallis, 1999; Grewal, Jackson, Wallis, & Burden, 2002).

The intersection between the pendulum and pyramid's basis can be determined, so that a bidimensionalgraph can be obtained, as in Figure 7. A circle can be used to represent a document, while a rhombuscan represent the query. The extension to queries with more terms is done simply by using a pyramid withpolygonal basis, with as many faces as there are query terms.

Figure 7: Three-terms query and three results

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (229)

Conclusions

Generally, users perceive small screen size and input difficulties make Web surfing on a handheld device apoorer experience than that on a desktop computer. To facilitate better access to the mobile applications, thelatter should know if a user request originates from a desktop computer or a handheld device; in this lattercase, the content should be adjusted so that it is easy to use, making user interaction more effortless.

On the other hand, content adjustment should also preserve the functional features of the mobile applicationsas much as possible; the user should be just as at ease using an application on a handheld device as on adesktop computer.

The responsiveness of mobile application influences user satisfaction. The interactions between mobileapplications and users should be designed to reduce the processing and data transfer time. At present, aproblem experienced by WAP is the long time required for the initial connection set-up with GSM (in severalseconds). To reduce processing time, the mobile applications should not overload the handheld devices withcomputationally intensive operations.

The message emerging from these considerations is clear: the content needs to be adjusted to the handhelddevice, but the required processing should neither force the user to wait too long nor should it consume toomuch energy, compromising the user's mobility.

The aim is to encourage users to leave fixed Internet connections for wireless ones, without distressing themwith different features of devices and discouraging them with great difficulties in Web fruition.

We have described the problems of managing the interaction between handheld devices, mobile applicationsand users, particularly when designing search engines for handheld devices. The project of extending the useof pervasive devices leads to the concept of content adjustment, which is needed for various reasons:

there are different types of handheld devices, and the "anytime, anywhere, any device" paradigm of 3Gsystems underlines that the same content needs to made available and usable for different devices;

handheld devices are very different from desktop or portable computers, and the content developed forthese computers cannot be moved to handheld devices as it is;

legacy applications should be used on handheld devices to extend an enterprise's business opportunities.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (230)

Acknowledgements

We are especially grateful to the editors of the book and to the anonymous referees for their most valuablecomments on the earlier version of this chapter.

During the initial development of this work, Nicola Ferro was attending a training course in the stimulatingenvironment of IBM Technology Deployment of Segrate, Milan, Italy. He wishes to thank his manager, AntonioCaizzi, and his colleagues for the time spent with him and the stimulating discussions.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (231)

References [3]

Amitay, E. (2000). InCommonSense—Rethinking Web search results. In Proceedings of the IEEEInternational Conference on Multimedia and Expo (ICME 2000) (pp. 1705–1708).

Aridor, Y., Carmel, D., Maarek, Y. S., Soffer, A., & Lempel, R. (2001). Knowledge encapsulation forfocused search from pervasive devices. In Proceedings of the Tenth International World Wide WebConference (pp. 754–764).

Aridor, Y., Carmel, D., Maarek, Y. S., Soffer, A., & Lempel, R. (2002). Knowledge encapsulation forfocused search from pervasive devices. ACM Transactions on Information Systems (TOIS), 20 (1), 25–46.

Beale, R., McNab, R. J., & Witten, I. H. (1997). Visualising sequences of queries: A new tool forinformation retrieval. In Proceedings of the IEEE Conference on Information Visualization (pp. 57–62).

Bederson, B. B., & Hollan, J. D. (1994). Pad++: A zooming graphical interface for exploring alternateinterface physics. In Proceedings of the ACM symposium on User Interface Software and Technology (pp.17–26).

Belkin, N., Oddy, R., & Brooks, H. (1982). ASK for information retrieval. Journal of Documentation, 38,61–71 (part 1); 145–164 (part 2).

Bickmore, T. W., & Schilit, B. N. (2002). Digestor: Device-independent access to the World Wide Web.Proceedings of the Sixth International World Wide Web Conference [online]. Available at:http://www.scope.gmd.de/info/www6/technical/paper177/paper177.html.

Bluetooth (2002). The official Bluetooth website [online]. Available at http://www.bluetooth.com/.

Britton, K. H., Case, R., Citron, A., Floyd, R., Li, Y., Seekamp, C., Topol, B., & Tracey, K. (2001).Transcoding: Extending e-business to new environments. IBM Systems Journal, 40 (1), 153–178.

Buchanan, G., & Jones, M. (2000). Search interfaces for handheld Web browser. In Poster Proceedingsof the Ninth International Word Wide Web Conference (pp. 86–87).

Buyukkokten, O., Garcia-Molina, H., & Paepcke, A. (2000). Focused Web searching with PDAs. InProceedings of the Ninth International World Wide Web Conference (pp. 213–230).

Buyukkokten, O., Garcia-Molina, H., & Paepcke, A. (2001a). Accordion summarization for end-gamebrowsing on PDAs and cellular phones. In Proceedings of the Conference on Human Factors andComputing Systems (SIGCHI 2001) (pp. 213–220).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (232)

Buyukkokten, O., Garcia-Molina, H., & Paepcke, A. (2001b). Seeing the whole in parts: Textsummarization for Web browsing on handheld devices. In Proceedings of the Tenth International WorldWide Web Conference (pp. 652–662).

Buyukkokten, O., Garcia-Molina, H., Paepcke, A., & Winograd, T. (2000). Power browser: Efficient Webbrowsing for PDAs. In Proceedings of the Conference on Human Factors and Computing Systems (CHI2000) (pp. 430–437).

Buyukkokten, O., Kalijuvee, O., Garcia-Molina, H., Paepcke, A., & Winograd, T. (2002). Efficient Webbrowsing on handheld devices using page and form summarization. ACM Transactions on InformationSystems (TOIS), 20 (1), 82–115.

Cooper, I., & Shufflebotham, R. (2002). Pda Web browsers: Implementation issues [online]. Available at:http://www.cs.ukc.ac.uk/pubs/1995/57/index.html.

Ferro, N. (2001). Online information access through handheld devices. Laurea's thesis intelecommunications engineering. Department of Electronics and Computer Science. University of Padua,Italy (In Italian).

Freire, J., Kumar, B., & Lieuwen, D. (2001). WebViews: Accessing personalized Web content andservices. In Proceedings of the Tenth International World Wide Web Conference (pp. 576–586).

Grewal, R. S., Jackson, M., Burden, P., & Wallis, J. (1999). A novel interface for representing search-engine results. In Proceedings of the IEE Colloquium Lost in the Web—Navigation on the Internet (ref. no.1999/169) (pp. 7/1 - 7/10).

Grewal, R. S., Jackson, M., Wallis, J., & Burden, P. (2002). Using visualisation to interpret search engineresults [online]. Available at: http://seed.scit.wlv.ac.uk/papers/activeweb99.html.

GSMBox. (2002). Studies confirm T9 text input is fastest method for word entry on mobile phones [online].Available at: http://uk.gsmbox.com/news/mobile_news/all/2091.gsmbox.

Hsu, J., Johnston, W., & McCarthy, J. (2002). Active outlining for HTML documents: An X-Mosaicimplementation. Proceedings of the Second International World Wide Web Conference [online]. Availableat: http://archive.ncsa.uiuc.edu/SDG/IT94/Proceedings/HCI/hsu/hsu.html.

IBM. (2002). Websphere transcoding publisher [online]. Available athttp://www.ibm.com/software/webservers/transcoding/.

Jones, M., Marsden, G., Mohd-Nasir, N., Boone, K., & Buchanan, G. (1999). Improving Web interaction insmall screen displays. In Proceedings of the Eighth International World Wide Web Conference (pp.51–59).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (233)

Jones, M., Marsden, G., Mohd-Nasir, N., & Buchanan, G. (1999). A site-based outliner for small-screenWeb access. In Poster Proceedings of the Eighth International World Wide Web Conference (pp.156–157).

Jones, M., Mohd-Nasir, N., & Buchanan, G. (1999). An evaluation of WebTwig—a site outliner forhandheld Web access. In H. W. Gellerson (ed.), Lecture Notes in Computer Science, LNCS 1707 (pp.343–345). Springer-Verlag.

Kaljuvee, O., Buyukkokten, O., Garcia-Molina, H., & Paepcke, A. (2001). Efficient Web form entry onPDAs. In Proceedings of the Tenth International World Wide Web Conference (pp. 663–672).

Leavitt, N. (2000). Will WAP deliver the wireless Internet? Computer, 33 (5), 16–20.

Leuski, A. (2002). Evaluating a visual presentation of retrieved documents [online]. Available athttp://cobar.cs.umass.edu/pubfiles/ir-159.ps.

Leuski, A., & Allan, J. (1998). Evaluating a visual navigation system for a digital library. In Proceedings ofthe Second European Conference on Research and Advanced Technology for Digital Libraries (ECDL '98)(pp. 535–554).

Leuski, A., & Allan, J. (2000a). Improving interactive retrieval by combining ranked list and clustering. InProceedings of the RIAO 2000 Conference (pp. 665–681).

Leuski, A., & Allan, J. (2000b). Lighthouse: Showing the way to relevant information. In Proceedings of theIEEE Symposium on Information Visualization 2000 (InfoVis 2000) (pp. 125–129).

Leuski, A., & Allan, J. (2002). Details of Lighthouse [online]. Available athttp://cobar.cs.umass.edu/pubfiles/ir-212.ps.

Lie, H. W., & Bos, B. (1999). Cascading Style Sheets: Designing for the Web (2nd ed.). Addison-Wesley.

Marshall, C. C., Golovchinsky, G., & Price, M. N. (2001). Digital libraries and mobility. Communications ofthe ACM, 44, 55–56.

Masui, T. (1999). POBox: An efficient text input method for handheld and ubiquitous computers. InProceedings of the International Symposium on Handheld and Ubiquitous Computing (HUC 99) (pp.288–300).

Metter, M., & Colomb, R. (2000). WAP enabling existing HTML applications. In Proceedings of the FirstAustralasian User Interface Conference (AUIC 2000) (pp. 49–57).

Moran, D. B., Cheyer, A. J., Julia, L. E., Martin, D. L., & Park, S. (1997). Multimodal user interfaces in theopen agent architecture. In Proceedings of the International Conference on Intelligent User Interfaces (pp.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (234)

61–68).

Ojanen, E., & Veijalainen, J. (2000). Compressibility of WML and WML script byte code: Initial results[wireless mark-up language]. In Proceedings of the Tenth International Workshop on Research Issues inData Engineering (RIDE 2000) (pp. 55–62).

Tegic. (2002). T9 [online]. Available at http://www.t9.com, http://www.tegic.com.

UMTS Forum (2002). Enabling UMTS/third generation services and applications [online]. Available athttp://www.umts-forum.org/reports/report11.pdf.

UMTS Forum (2002). Shaping the mobile multimedia future [online]. Available at: http://www.umts-forum.org/reports/report10.pdf.

UMTS Forum (2002). The UMTS third generation market—structuring the service revenues opportunities[online]. Available at http://www.umts-forum.org/reports/report9.pdf.

W3C (2002). CSS Mobile Profile 1.0—W3C Candidate Recommendation, 24 October 2001 [online].Available at http://www.w3.org/TR/css-mobile.

W3C (2002). Cascading style sheets, level 2—CSS2 specification [online]. Available athttp://www.w3.org/TR/REC-CSS2.

W3C (2002). Composite Capability/Preference Profiles (CC/PP): A user-side framework for contentnegotiation [online]. Available at: http://www.w3.org/TR/NOTE-CCPP.

[3]The date on the availability of documents on the Web is 2002 for all documents, because the presence of allthose digital documents has been checked at the given URL during the late months of the year 2002.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (235)

Endnotes

1 A handheld device is also known as a mobile device. In this chapter, we use both terms interchangeably.

2 The date on the availability of documents on the Web is 2002 for all documents, because the presence of allthose digital documents has been checked at the given URL during the late months of the year 2002.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (236)

Chapter 11: Mobile Commerce and Usability

Susy S. Chan and Xiaowen FangDePaul University, USA

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

Abstract

This chapter analyzes the critical issues confronting usability for mobile commerce (m-commerce)applications. Limited bandwidth and multiple form factors pose constraints for user interface design in terms ofthe amount and format of content presentation, navigation, and site structure. Mobile tasks performed onhandheld devices—such as wireless PDAs, Pocket PCs and WAP phones—challenge developers to adoptnew methods and design guidelines that take into account contextual variations in a mobile environment. Atthis early stage of mobile commerce, careful mapping of e-business strategies, mobile tasks, and technologycharacteristics will be critical for wireless interface design. Future research in these areas is needed toimprove the usability of mobile commerce.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (237)

Introduction

Usability refers to how well an application is designed for users to perform desired tasks easily and effectively.Usability issues involve user interface design, methods for development, testing, and deployment. The currentwireless technology poses many constraints for effective interface design. These constraints include limitedconnectivity and bandwidth, diverse yet simplistic devices, the dominance of proprietary tools and languages,and the absence of common standards for application development. Many of these problems are similar toearly Web developments (Ramsay & Nielsen, 2000). However, users of m-commerce are likely to havealready experienced e-commerce technology (Anckar & D'Incau, 2002) and therefore may have heightenedexpectation for data and services.

The convergence of mobile Internet and wireless communications has not yet resulted in expected growth inmobile commerce. Many factors may influence the adoption of m-commerce (Zhu, Nah, & Zhao, 2002).Consumer adoption of m-commerce has been slow, even in countries that have broadly adopted wirelesstechnology (Anckar & D'Incau, 2002). The enterprise and business use of wireless technology holds greaterpromise for business growth and increased competitiveness, but it demands the transformation of businessprocesses and infrastructure (Kalakota & Robinson, 2001). Poor usability of mobile Internet sites and wirelessapplications for commerce activities stands out as a major obstacle for the slow adoption of mobile solutions.Such difficulty discourages users from accessing mobile Internet sites (Chan, Fang, Brzezinski, Zhou, Xu, &Lam, 2002) or choosing m-commerce as a distribution channel (Shim, Bekkering, & Hall, 2002). Even with thelatest 3G phones in Japan, consumers still find the small screen display and small buttons on these devicesdifficult to use (Belson, 2002).

Researchers suggest that interface developers need to consider the interaction among the interface design ofuser tasks, form factors, and purposes of applications (e.g., Chan et al., 2002). Application developers shouldalso consider the interaction between the context of the environment and the device (Johson, 1998). Someresearchers question whether the existing user interface design guidelines for e-commerce are still applicablefor mobile application development, or if new ones should be created (Tarasewich, Nickerson, & Warkentin,2002). A comprehensive methodological and comparative framework for evaluating the usability of m-commerce applications is also necessary (Siau, Lim, & Shen, 2001).

The main objective of this chapter is to provide a critical analysis of usability issues confronting the interfacedesign, development, deployment and adoption of m-commerce applications. We focus primarily on Internet-based solutions in North America that use WAP (Wireless Application Protocol) phones, wireless PDAs(Personal Digital Assistants), Pocket PCs, and wireless two-way pagers. In addition, we examine the uniquecharacteristics of mobile technology that affect user interface design, discuss the incorporation of userinterface in the development of m-commerce applications, and suggest topics for future research anddevelopment.

This chapter consists of four sections. We begin by reviewing definitions of m-commerce and usabilityresearch for both e-commerce and m-commerce. Based on this review, we identify five sets ofissues—technology, user goals and tasks, content preparation, application development, and the relationshipbetween mobile and wired e-commerce. We then examine emerging trends, make recommendations, andconclude with a new research agenda.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (238)

Related Research

Defining Mobile Commerce

Mobile commerce broadly refers to the use of wireless technology, particularly handheld mobile devices andthe mobile Internet to facilitate transactions, information searches, and user task performance in consumer,business-to-business, and intra-enterprise communications (Chan & Fang, 2001). These activities are typicallygrouped under the term "m-business." Such a broad definition is consistent with several proposed m-commerce frameworks. One such framework presents 12 classes of m-commerce applications, ranging fromretail, auction, mobile office, and entertainment to mobile inventory emphasizing the potential of mobile B2Band intra-enterprise applications (Varshney & Vetter, 2001). Another framework groups m-commerce intogoods, services, content for consumer e-commerce, and activities among trading partners (Kannan, Chang, &Whinston, 2001). M-commerce applications can also be categorized as: communication and interaction, valueadded service, information and data access, remote control and decision support, transactions, andentertainment (Lehner & Watson, 2001). While successful m-commerce business models in North Americaare rare, until recently there has been a belief in the potential for wireless technology to enhance a broadrange of commerce processes and activities, particularly in the B2B and intra-enterprise arena.

There are two visions for the potential and opportunities of m-commerce (Waters, 2000). One perspectiveargues that the mobile, wireless channel should be viewed as an extension of the current e-commercechannel or part of a company's multichannel strategies for reaching customers, employees, and partners. Thesecond and more radical view suggests that mobile commerce can create new markets and new businessmodels. In recent years, the slow and selective adoption of wireless technology has indicated that the firstperspective is more realistic, especially considering the current limitations of wireless technology.

Several recent studies provide empirical support for the first perspective. Consumers have shown relativelylow willingness to use m-commerce, but adopters of e-commerce are more likely to embrace this newtechnology (Anckar & D'Incau, 2002). Another study shows that major e-commerce sites implement theirmobile Internet sites as an extension of wired e-commerce to support existing customers (Chan et al., 2002).The perceived difficulty of use can affect the consumer's choice of m-commerce as a distribution channel (Simet al., 2002). These findings suggest that in a multichannel environment, m-commerce supplements e-commerce rather than becoming a substitute for e-commerce.

Enterprise and business applications of m-commerce technologies seem to hold greater promise because it iseasier for companies to standardize and customize the applications and the devices to enhance current workprocesses. Except for the retail industry sector, most industries view m-commerce as being vital for growthand efficiency strategies, but not necessarily for generating new revenue (Ernst & Young, 2001). Most mobileapplications implemented in the United States are for business purposes—extending or enhancing existingwork processes and business models geographically (Jarvenpaa, 2001). More comprehensive integration ofthe wireless platform in an enterprise requires significant structural transformation (Kalakota & Robinson,2001). It will be challenging for companies to undertake the significant process redesigns and breakthroughstrategies necessary for transitioning into a multidevice, multichannel computing environment. Successfultransformation can increase an organization's capability for real-time interaction with its customers,employees, and suppliers.

An essential goal of m-commerce is to search for mobile values for individual users (Keen & Mackintosh,2001). Anckar and D'Incau (2002) present a framework that differentiates between the value offered bywireless Internet technology (wireless value) and the value arising from the mobile use of the technology(mobile value). Wireless values are best represented by convenience, cost savings, and cell phones. Forexample, users can attain the wireless value by using the wireless PDA to perform tasks available through e-commerce. Services that deliver strong mobile values make m-commerce a dominant channel. These services

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (239)

meet the following five needs:

Time-critical needs and arrangements,

Spontaneous needs and decisions, such as auctions, email, and news,

Entertainment needs,

Efficiency needs and ambitions, and

Mobility related needs.

Based on their survey of consumers in Finland, Anckar and D'Incaur (2002) indicate that, at present,consumers are most interested in services with high mobile values that meet time spontaneous and timecritical needs. Furthermore, e-commerce users are more likely to adopt m-commerce services. These findingshave implications for companies in North America for cross-channel coordination and highlight the relationshipbetween e-commerce and m-commerce.

Usability Research for E-Commerce

Usability gauges the quality of a user's experience in interfacing with a product or system, be it a website, asoftware application, mobile technology, or any user-operated device. Generic usability principles (Nielsen,2001) have guided the development of e-commerce applications:

Ease of learning: How fast can a novice user learn the interface sufficiently well to perform basic tasks?

Efficiency of use: Once an experienced user has learned to use the system, how fast can he or sheaccomplish tasks?

Memorability: Can a past user remember enough to use the system more effectively the next time?

Error frequency and severity: How often do users make errors, how serious are these errors, and howeasy is it to recover from an error?

Subjective satisfaction: How much does the user like using the system?

Usability has gained increasing attention in e-commerce website engineering. Industry consultants haveincorporated these principles into a set of guidelines for e-commerce website design. Guidelines developed bythe Nielsen/Norman Group (Nielsen, Farrell, Snyder, & Molich, 2000a, 2000b, 2000c, 2000d) focus on thedesign of category pages, the checkout and registration process, product pages, and user's trust. Severalunpublished research papers (Rehman, 2000; Hurst & Gellady, 2000; Hurst & Terry, 2000) also examinecustomer experience in the e-commerce process and suggest a broad set of design guidelines:

Homepage. Web pages should be clean and not cluttered with text and graphics. Horizontal scrollingshould be avoided.

Navigation. Text on the links or buttons should be descriptive and self-explanatory. Links to anotherproduct-related website should be direct.

Categorization. Products should be categorized meaningfully with no more than three levels in depth.

Product information. Accurate, consistent, and detailed descriptions of products should be provided alongwith full pictures. Inventory information and related charges should be presented up front. The size ofproducts should be shown in a measurable and comparable way.

Shopping cart. There should be a link directing the customer back to the page he/she left in order to

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (240)

resume shopping.

Checkout and registration. The vender should only ask for necessary and meaningful information, such asname and address, not asking marketing questions. Customers should be allowed to browse the sitewithout logging in.

Customer service. Customers should be provided with a 1–800 telephone number on every page of thesite.

In contrast to these broad design guidelines, formal usability studies tend to focus on specific tasks or specificuser behaviors in the e-commerce context. Henderson and his colleagues point out that enjoyment in using anelectronic system and peer norms can significantly contribute to the online shopping experience (Henderson,Rickwood, & Roberts, 1998). Kim and Moon (1998) indicate that manipulation of the visual design factors ofthe customer interface induces a target emotion, such as trustworthiness. The use of a combination ofnavigation features (neighborhood, top, and index) can generate the optimal link structure and increase thedegree of shopping pleasure and convenience (Kim & Yoo, 2000). These studies did not validate any designguidelines and focused on very narrow aspects of e-commerce sites, which typically are feature andinformation rich.

Usability Research for M-Commerce

Usability research on wireless applications has usually focused on addressing the design constraints imposedby bandwidth limitations and small displays of handheld devices. Several studies address the effective inputand output of mobile devices, such as the gesture recognition for PDAs (Sears & Arora, 2001), the effects ofkeyboard for mobile devices (Zha & Sears, 2001), and PDA Web browsing through eye movement analysis(Bautsch-Vitense, Marmet, & Jacko, 2001).

Research on the applications on mobile devices addresses various content presentation issues. Jones and hiscolleagues point out that direct access methods are more effective for retrieval tasks with small displays(Jones, Marsden, Mohd-Nasir, Boone, & Buchanan, 1999). Novice WAP phone users perform better whenusing links instead of action screens for navigation among cards and when using lists of links instead ofselection screens for single-choice lists (Chittaro & Cin, 2001). HTML-based Web content can be convertedautomatically and online to WML by using a conversion proxy server following certain guidelines (Kaasinen,Anltonen, Kolari, Melakoski, & Laakko, 2000). However, these studies did not test handheld devices based onappropriate tasks and did not validate any framework or guidelines.

Ramsay and Nielsen (2000) point out that many WAP usability problems echo issues identified during theearly stage of website development for desktop computers. These problems can be alleviated by applyinggood user interface design. Such design guidelines for WAP applications may include: (1) short links, (2)backward navigation on every card, (3) minimal level of menu hierarchy, and (4) headlines for each card(Colafigi, Inverardi, & Matricciani, 2001). Similar design guidelines were validated in a separate usability studyof WAP phones (Buchanan, Farrant, Jones, Thimbleby, Marden, & Pazzaini, 2001), which include: (1) direct,simple access to focused valuable content, (2) simple hierarchies, (3) reducing the amount of verticalscrolling, and (4) reducing the number of keystrokes. These studies focused solely on WAP phones.

Researchers also conducted usability studies on other platforms, such as PDAs and Pocket PCs. In a studyon the methods of text summarization for Web browsing on handheld devices, Buyukkokten, Garcia-Molina,and Paepcke (2001) found that keyword/summary was the best method. Sugimoto (1999) studied single handkeys input schemes for pocket computers.

Diverse form factors offer different functionalities and have different interface requirements. Chan et al. (2002)systematically evaluated 10 wireless websites— ranging from travel, financial services, retail, news, andInternet portals—across three form factors: wireless Palm, WAP phones, and Pocket PCs. They found that

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (241)

user tasks for the wireless sites were designed with steps similar to the wired e-commerce sites and primarilyfor experienced users. Many usability problems, such as long downloads and broken connections, informationoverload, and excessive horizontal and vertical scrolling, are common to all three form factors. They point outthat interface design flaws are platform independent, but the more limitations imposed on the form factors, themore acute design problems become. They recommend eight guidelines:

Avoid scrolling,

Use a flat hierarchy,

Design a navigation system consistent with a regular Web browser,

Design a back button,

Provide a history list,

Provide an indication of signal strength,

Reduce user's memory load, and

Limit the search scope to improve search efficiency.

Several recent studies have investigated usability issues of mobile applications from different perspectives.Findings from these studies suggest usability for m-commerce goes beyond content presentation and formfactors. Usability also pertains to mobile users' use contexts (Kim, Kim, Lee, Chae, & Choi, 2002) and socio-technical systems (Palen & Salzman, 2002), and their access of people and information anytime, anywhere inthe work environment (Perry, O'Hare, Sellen, Brown, & Harper, 2001). In addition, ways to provide feedbackabout changes in the state of systems connectivity can improve usability of wireless applications (Ebling, John,& Satyanarayanan, 2002). These studies offer new ways of examining factors affecting usability for m-commerce applications.

Context factors have special impact on wireless usability. A study conducted by Kim and his colleagues (2002)reveals that three use context factors—hand (one or two hands), leg (walking or stopping), and co-location(alone or with others)—result in different usability problems. In this study, users reported more problems of sitestructure when they accessed wireless sites with one hand instead of two hands. When accessing wirelesssites while moving rather than stopping, users experienced more difficulty with site representation. Contentpresentation also posed more usability problems for those who were stopping or alone. These findingssuggest that the design of user interface has to consider various use contexts.

Based upon the results of a study of 19 novice wireless phone users who were closely tracked for the first 6weeks after service acquisition, Palen and Salzman (2002) describe the wireless telephony system as havingfour sociotechnical components: hardware, software, "netware," and "bizware." They indicate that each ofthese four components has to be designed as user-friendly as possible. This research suggests a systems-level usability approach.

Perry and his colleagues (Perry et al., 2001) propose different facets of accessing remote people andinformation anytime, anywhere for mobile workers. They identify four key factors in mobile work: the role ofplanning, working in "dead time," accessing remote technological and informational resources, and monitoringthe activities of remote colleagues.

Mobile users access information from different sources and often experience problems caused by a widerange of network connectivity. Ebling et al. (2002) conducted a study addressing the importance oftranslucence in mobile computing systems. Their findings suggest that with the presence of the illusion ofconnectivity provided by translucent cashing even when network performance is poor or nonexistent, noviceusers performed almost as well as experienced users.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (242)

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (243)

Key Issues

Based on the above review, we identify five issues concerning user interface for M-commerce in the followingareas: technology, user goals and tasks, content preparation, application development, and the relationshipbetween M-and e-commerce. These issues correspond to the four sociotechnical components in the wirelesstelephony system: hardware, software, netware, and bizware proposed by Palen and Salzman (2002).

Technology Issues

Limitations of bandwidth and form factors pose special constraints on the interface design of m-commerceapplications.

Limitation of Bandwidth

First of all, the data rate for mobile communication is much lower than regular modems (Sepenzis, Pfau, &Lum, 2000). Most mobile communication standards only support data rates that are less than 28.8 kbps. Onlya few provide higher data rates in select locations. Secondly, the connection to the wireless service basestation is unstable because signal strength changes from place to place, especially on the move. Thislimitation has several implications for the interface design of mobile applications and devices.

The amount of information exchanged between the device and the base station should be limited. Lengthytext messages and graphics are not suitable for mobile applications. A large amount of information takeslonger to download, and the download process can be interrupted by broken connections. This constraintwill therefore affect the functionalities provided by a wireless website.

Indication of the download progress is necessary. Due to the lower data rates, the download process on amobile device is significantly longer than on a regular desktop. Chan et al. (2002) observed that it took onaverage more than 20 minutes to download a regular Web page on Pocket PC devices because mostwireless sites did not tailor their content to fit Pocket PCs. For customers used to speedy downloading onthe Internet, 20 minutes would be intolerable. Furthermore, the Pocket PC reviewed in that study did notprovide a good indication of the download progress. Most participants felt frustrated and frequently quitthe process. Therefore, indicating the download progress can help users to have a better sense of control.

Translucent cashing can be helpful. Ebiling et al. (2002) indicate that with translucent cashing in thepresence of disconnected or weakly connected operations, novice users could perform almost as well asexperienced users. They also found that it is important to make users aware of the state of networkconnectivity. Providing feedback about connectivity may reduce user frustration and enhance perceivedusefulness for mobile users.

Friendly recovery from broken connections is essential. If the connection between the mobile device andits base station is broken during the process of receiving or sending information, the device or theapplication must be able to resume the process once the connection returns. Otherwise, users may not beable to complete a single task due to frequent interruptions. It is also important to explicitly provide userswith information about the recovery.

Form Factors

Mobile commerce services are accessible through multiple platforms. These platforms use different operatingsystems and offer different functionalities. Interface design for different platforms varies. Some popularplatforms are:

Wireless PDA devices using Palm OS. These devices provide computing and personal information

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (244)

management systems. Devices using Palm OS have an LCD display that comes in monochrome andcolor. The screen accepts pen and finger input, as well as handwriting on an electronically sensitive pad.Internet-enabled Palm OS devices have extensive support from third-party developers for applications(e.g., timers, spreadsheets, databases, games, even small Web browsers and email applications.) Thesmall screen size and input device are two primary constraints in the interface design with Palm OShandheld devices. Due to the small size of the screen, Web clipping application pages running onwireless Palms do not support several common Web page features: named typefaces, style sheets,image maps, frames, nested tables, scripts/applets, and cookies. The graphics presented on Palmsshould be no larger than a full page: 63KB, 153 pixels wide, with a depth of 1 or 2 bits. Palm handhelddevices also display some query form elements differently.

Pocket PCs running Microsoft Windows CE/Pocket PC OS. This type of devices represents a stripped-down counterpart to Windows 95/98. This operating system has much the same look and feel of itsdesktop counterpart but does not have all the same features. In general, Pocket PCs have more memoryand functions, slightly larger screen, and a higher resolution than Palm OS devices do. The input deviceof Pocket PCs is very similar to Palms. However, the screen is still too small compared to regulardesktops. Furthermore, Pocket PCs do not support some common Web page features such as frames.

WAP phone. This type of mobile phones can access Internet sites and services via WAP technology.With a much smaller screen than Palms and Pocket PCs, WAP phones use the phone keypad as theprimary input device. Fewer functions are supported by WAP phones as compared to Palms and PocketPCs.

Two-way pagers. This type of device, such as Research in Motion (RIM), can both send and receiveinformation from the base station. They also allow users to send and receive emails and browse the Web.The small screens on these devices provide only a keyhole view of the Web, and the slow data-transferspeeds make even a simple search a major chore.

These four platforms support different functions. Even within the same platform, the design of each type ofhandheld device varies. Consequently, the interface for different devices changes dramatically. A developerneeds to consider the unique characteristics of the form factor when developing an m-commerce application.

User Goals and Tasks

In a fixed environment, such as an office or home with a desktop or a laptop computer, users can fully focuson their tasks or spend hours exploring a regular website. Rich information is far more important than time. M-commerce assumes that users access the Internet or wireless applications either on the move or whilestationary but away from office or home. Because mobile users can spare only limited time and cognitiveresources for performing a task, services that emphasize mobile values, meeting time-critical andspontaneous needs, such as checking flight schedules, checking stock prices, and submitting bids forauctions, are more useful for m-commerce users.

Three issues emerge in the design of tasks for m-commerce applications. First, when developing m-commerceapplications, one should determine what tasks are essential to mobile users and what tasks are suitable forwireless applications. Because of the user's mobility, the interaction between the user and the mobile device isusually very short. It is important to design tasks in such a way that users can perform them in a timelymanner. Currently, most wireless websites only allow users to perform simple tasks such as checking flightstatus and searching for a movie. Table 1 shows the projected market shares of different activities on mobiledevices, suggesting that data transfer, short messaging, location services, playing games, shopping, doing e-business, and checking daily news services are the most suitable tasks for mobile commerce (Reinhardt,2001). While popular in Europe and Asia, short messaging services (SMS) have not yet been widely adoptedby consumers and enterprises in North America as a viable form for mobile communication. Table 1 alsoshows that voice calls will continue to be the primary activity performed using mobile devices. When designing

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (245)

tasks to be performed on wireless devices, a user's perceived usefulness plays an important role (Perry et al.,2001). As suggested by Perry and his colleagues, mobile workers demonstrate the following four accessmodes: planning, working in "dead time," accessing remote technological and informational resources, andmonitoring the activities of remote colleagues. This finding has implications for selecting and designing tasksto support collaboration and communications in the enterprise environment

Table 1: Projected market shares of different activities on mobile devices

Activities Market Share in 2005(%)

Data transfer 22

Short messaging 9

Location services 5

Games and gambling 2

Ads ~1

E-business ~1

Shopping ~1

Daily news service 0.5

Voice calls ~60

Second, how to handle differences in interface design for expert and novice users should be considered. Manywireless websites currently assume that users have experience with regular websites and are familiar with thetask flow (Chan et al., 2002). The wireless site is basically a simplified version of its regular counterpart. Thisstrategy makes sense in that it allows existing customers to transfer knowledge about a website to thewireless site. However, this strategy fails to accommodate the needs of novice users who have never visitedthe regular website. For example, many wireless sites ask users to log in on the main screen withoutinstructing them how to create a new account. Better interfaces should support both experienced and noviceusers.

Third, the best use of location-based technology to support user task performance for m-commerce presentsadditional challenges. Mobile networks can pinpoint a caller's location and supply that information to providersof geographically targeted services. According to Table 1, the projected market for location service will be 5%in 2003. The question is when to use that information. Based on the location theory, Mannecke and Strader(2001) suggest that location-based technology should be employed for applications for geographicaldifferentiation and for low-involvement purchases that do not require extensive information search. Furtherresearch is needed in the proper use of location-based technology to enhance mobile tasks.

Content Preparation

Designing a wireless application is fundamentally different from designing a website because of the limitedscreen space and bandwidth. It is challenging to prepare content for a wireless application or to convert aregular website to a wireless website. Most of the design guidelines for e-commerce (Hurst & Gellady, 2000;Hurst & Terry, 2000; Niesen et al., 2000a, 2000b, 2000c, 2000d) support the development of rich productinformation sets and a complete process of shopping cart, checkout, registration, and order tracking. Incontrast, a wireless website has to simplify the content presentation. The depth of a wireless website'sstructure, navigation, and format will require different design guidelines.

Amount of Information

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (246)

A regular website usually contains very rich information to help users make decisions. This paradigm worksfine for regular websites with large screens and high bandwidth. However, it is not feasible to download andpresent a large amount of information on handheld devices. Therefore, information in a regular website mustbe filtered when the website is to be presented on handheld devices. Research is needed to determine theamount of information suitable for handheld devices. In general, users should have sufficient, if not rich,information to accomplish the goals for the application.

Navigation

Navigation systems vary from one form factor to another because the design of handheld devices differs.Some devices such as RIM two-way pagers provide function keys on the device for users to move back andforth. Some other devices such as Pocket PCs require users to use the toolbar to navigate a site. There is noconsensus yet on what functions or features should be provided by the application or built into the deviceitself.

Depth of Site Structure

Since mobile users can only spend very limited time browsing a wireless application, the organization ofinformation is critical in order to improve efficiency. Information in most wireless applications is organized intoa hierarchy. Numerous studies have addressed the hierarchy design issue of computer menu systems (e.g.,Jacko, Salvendy, & Koubek, 1995; Jacko & Salvendy, 1996). These studies generally assume the responsetime of each step is constant and users have some basic training before using the system. However, wirelessapplications require much more time and effort to connect to the server and to download a page. Therefore, aflatter structure with fewer steps would allow users to review more options in the same step and to locate thedesired information in less time. However, a theoretical framework of menu design for wireless applications isstill needed in order to better justify a particular interface design.

Graphics or Text

Once the content of a wireless application is determined, the next question is how to present the information.In general, graphics as metaphors are better at catching a user's attention. Reading text is time consumingand also requires more human cognitive resources. Due to the constrained screen size and low resolution ofhandheld devices, text is probably a better choice in most cases, although small-size graphics can bedisplayed on most of handheld devices. However, better technology may improve the screen quality ofhandheld devices for displaying more complicated graphics. When determining the format of information topresent, it is important to consider the form factor that may potentially pose additional constraints to theformat.

Development Environment

Methods for mobile application development and usability testing should also be re-examined. User interfacedesign and testing have traditionally been conducted in a "fixed" context of use, i.e., "a single domain, with theusers always using the same computer, to undertake tasks alone, or in collaboration with others" (Johnson,1998). Mobile computing alters this assumption. Traditional means of user interviews or usability testing in alaboratory environment cannot reveal insights into users' activities and mobility in their real life. Contextbecomes a critical consideration in gathering information about user requirements. The method of contextualinquiry (CI) can augment user interface design by exploring the versatility of usage patterns and usage context(Väänänen-Vainio-Mattila & Ruuska, 1998). This method employs an ethnographic approach, i.e., observinguser activities in a realistic context. While contextual inquiry may help developers to secure a realisticunderstanding about contextual factors affecting user behavior in motion, conducting nonobtrusive observationand inquiries remains a challenge.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (247)

In addition, developers for mobile applications need to consider a broad range of contextual variations ininfrastructure, applications, systems, and location (Rodden, Chervest, & Davies, 1998). Variations in theinfrastructure context, resulting from interactions between the mobile device used and the supporting wirelessinfrastructure, can affect mobile user interface. It is important to ensure that the application corresponds to thestate of the supporting infrastructure and the interaction style. Application context, on the other hand, refers tothe relationship between the mobile device and the goals and tasks performed by the user. User interfacesneed to be designed accordingly. Furthermore, advanced mobile application systems are distributed acrossmultiple channels, devices, and infrastructures. Usability needs to be addressed at the systems level. It isnecessary to consider the overall functionality of the application and to develop an architecture that providesappropriate access to different levels of functionality for different tasks. As discussed earlier, contextualvariations due to the interactions between location and tasks also warrant considerations in interface design.

Functionalities of a complex wireless application have to be distributed across multiple wirelessinfrastructures, platforms, and form factors. Mapping platforms and form factors to user tasks and data needsbecomes a critical decision in application development. For example, United Airlines offers a range of wirelessapplications in pagers, WAP phones, and wireless PDAs. As shown in Table 2, their wireless applications varyby form factors, operating systems, and user needs for information (United Airlines, 2001). The time dimensionof the task is inherent in this mapping. Information searches that are time sensitive and require lowinvolvement, such as checking flight status, can be accessed via wireless PDAs and WAP phones. For tasksthat involve more data exchange, such as Mileage Plus Upgrade Status and Mileage Plus Award TravelAvailability, wireless PDAs offer a better platform for showing detail because of its larger screen size andgreater input capability. More complicated trip planning searches require time for browsing and decisionmaking; these tasks would be better suited to the desktop platform.

Table 2: Wireless applications of United Airlines

Alpha-numeric Pager Web Phone Wireless PDA

Book a Flight X X

My Itinerary X X

Flight Availability X X

Flight Status X X

Flight Paging X X X

Mileage Plus Summary X X

Mileage Plus Upgrade Status X

Mileage Plus Award Travel Availability X

Contact United X X

A major architectural issue for context-aware applications concerns the way in which contextual issues cutacross the whole system design. However, structures apparent at the user interface often do not match thosenecessary for efficient implementation and sound software engineering (Rodden et al., 1998). Form factorsmay also pose conflicts with the development of context-aware applications. For example, the toolkits and thearchitecture for supporting Windows CE were designed for fixed environments. The requirements for mobileuser interfaces may not be met by simply modifying some of the functionalities. More research is needed toexamine new approaches for mobile application development that consider user interface issues in the contextof the whole system's architectural and functional complexity.

Relationship between M-Commerce and E-Commerce

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (248)

The wireless channel for e-commerce has raised many new questions. How does this new channel enhancee-commerce? What commercial activities or tasks can be performed on the mobile handheld devices? Howcan wireless user interfaces be coordinated between the two channels? Kannan et al. (2001) postulate thatbecause wireless technology renders m-commerce "transaction aware" and "location aware," consumerswould be likely to increase impulse purchases, especially in low-value, low-involvement product categories,such as books and CDs. Appropriate user interfaces for facilitating push-advertising and dynamic pricingbased on location should be explored. As the wireless technology holds promise as a new marketing channel,a better understanding of customer profiles and preferences can make interface design and contentpresentation more efficient.

Many regular websites have extended the wireless channel to their current customers and subscribers toleverage relationships with existing customers (Chan & Fang, 2001). For example, Amazon only offers theone-click order option for purchasing from its wireless site. This feature does not allow users to review orderdetails before submitting the order, and, once the order is submitted, it is difficult to navigate to the rightscreen on the handheld device to cancel the order. Therefore, only the experienced users who have built trustin Amazon and this special interface would find it efficient to order its product on the move. Novice userswould be intimidated. In the case of accessing e-Bay by a wireless PDA device, users often encounter a largenumber of results from a product search. This high volume of data transfer often results in connection errorsor user frustration. Only seasoned e-Bay users on the move would benefit from using a handheld device tomonitor the bid in progress. Using these two examples, a careful mapping about what tasks would be mostsuitable for the wireless channel should be performed to support the mobile users of these m-commercewebsites.

Given the current state of technology and the poor usability of most wireless sites, it is difficult to expand m-commerce as an independent channel. It is more appropriate to view m-commerce sites as an extension ofexisting e-commerce sites. Many researchers believe that the wireless channel has the potential to strengthenrelationships with customers. Four factors make the mobile Internet an ideal channel to implement customerrelationship management (CRM). They are its ability to (1) personalize content and services, (2) trackconsumers or users across media and over time, (3) provide content and service at the point of need, and (4)provide content of highly engaging characteristics (Kannan et al., 2001). The challenge is the coordination ofuser interfaces and contents across multiple channels so the experienced users and repeat customers canhandle multiple media and platforms with satisfaction.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (249)

Future Trends

This section discusses emerging trends in three areas: technology, application development, and businessmodels.

Technology Trends

Four technology trends will affect the user interface design for mobile commerce in North America. First,multiple standards for wireless communication will not be resolved quickly. Second, the high cost of third-generation (3G) technology will delay the availability of broadband technology for complex functionality andcontent distribution for mobile applications. Investments made by mobile operators and infrastructure providersin Europe already proved to be premature (Gartner Group, 2002). Third, instead of the convergence offunctionalities into a universal mobile handheld device, there will more likely be a variety of communicationdevices operating in harmony to support users in their everyday lives (Ruuska-Kalliokulju, Schneider-Hufschmidt, Väänänen-Vainio-Mattila, & Von Niman, 2001). Fourth, input and output format will expand toincorporate voice and other formats (Ruuska-Kalliokulju et al., 2001) and expandable keyboards, which arealready being marketed by several product vendors. The introduction of the voice-based interfaces maycomplement the text-based interface and remedies some of the information input/display problems tied to thehandheld devices. These trends point to the opportunities to conceptualize wireless user interface beyondtext-based interaction. New challenges are to design better interfaces for inter-device communication in orderto simplify tasks for mobile users.

Development Trends

Alternative methods for interface design and evaluation will be necessary to support m-commerce applicationsdevelopment. First, requirement analysis has to focus on the context of mobile users' behaviors and tasks.Contextual inquiry and other methods may be developed to facilitate the understanding of interaction betweenmobility and usability. Second, usability testing has to be conducted with an understanding of contextualvariables besides user behavior. Third, mapping form factors, user tasks, data needs and content acrossmultiple channels and platforms is important in order to synchronize content and coordinate functionality in adistributed system. These trends require a fresh look at the methodology in use and determine new ways ofincorporating user interface design and usability testing for distributed wireless application development. Otherthan contextual inquiry, traffic logs and more research-based design guidelines are important for improvinguser interface design for mobility. Furthermore, the complexity in contextual variations (Rodden et al., 1998)points to the need for a more comprehensive development framework in which user interface can beconsidered. For example, Roth (2001) has proposed mobility patterns as a design framework to allowdesigners to address multiple problems through reusing design elements, such as user interface, mobile dataand mobile service, as building blocks. Since usability research in m-commerce is new, the need tounderstand commerce workflow and consumer behaviors will further complicate the development framework.

M-Commerce Business Models

Wireless technology holds promise for business enterprises but is still in the early stages of development.Companies typically take a "wait and see" posture until technology issues are resolved and a clearer picture ofthe potential return on investment emerges. A survey by Cap Gemini Ernst & Young (2001) of the 90 largestcompanies in Sweden indicates that the retail industry appeared most unsure about the future of mobilesolutions, while 80% of other industries viewed m-commerce as being central to growth and efficiencystrategies. This study has implications for the North American companies. The result is indicative of severaltrends. For intra-enterprise and business-to-business uses, wireless technology provides location-aware and

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (250)

mobility-aware solutions for mobile workers. The range of possibilities is broad. The deployment can becontrolled more easily. Content distribution can be integrated with the enterprise systems. Variation ininfrastructures and mobile devices can also be limited. Context-based applications, interfaces, functionality,and even devices can be customized according to the mobile tasks and user groups. For example, UnitedParcel Service (UPS) recently consolidated its multiple operating systems and devices to Windows CE andthree devices (Nelson, 2001). This approach makes application development, deployment, and integrationeasier to manage. User interface design for these tasks and contexts can fall back to more familiarmethodology. Distribution of content and data between the wired and wireless, fixed and mobile environmentcan be better synchronized.

In contrast, it is far more challenging to manage the design, development, and deployment of wirelessapplications for customers. The technology's capability for personalization seems to be the strongestargument for establishing a wireless channel. Mobile CRM is likely to be one of the first areas to embracewireless solutions. A careful mapping of tasks, data, form factors, and the CRM process will become essentialfor user interface design. Location technology and personalization of services and content are critical forcontent presentation, navigation, and search. Differences between novice and experienced users will also beimportant, as well as approaches for development and usability testing.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (251)

Conclusions

In this chapter, we have identified the constraints, challenges and opportunities for usability issues affectingthe adoption of m-commerce. At this early stage of mobile commerce, it is likely that the wireless technologyand mobile Internet will continue to undergo rapid advancement. Until the technology matures and band-widthimproves, wireless applications will gear toward those requiring limited bandwidth, short exchange of data andtext, and simple functionality. Two areas of wireless applications, CRM and enterprise efficiency, may reapbetter benefits.

Within this context, user interface design for m-commerce applications may take two directions. The consumere-commerce websites will need to focus on the selection of tasks that are most suitable for the wirelesschannel, especially for experienced users. These are services and applications that demonstrate mobilevalues. Such mapping process requires a good understanding of the CRM strategy, user's preference, andconstraints imposed by a mobile environment. For enterprise adoption, consolidating the wireless platformsand form factors will facilitate interface design. In either case, research to improve usability for mobilecommerce is essential.

Research is urgently needed in the following areas:

Bandwidth limitation: How should wireless applications and handheld devices be designed to remedythe bandwidth problem?

1.

Form factors: How should wireless applications be designed for different form factors?2.

Tasks: What tasks are most suitable for m-commerce applications? How will these tasks supplementthe e-commerce process?

3.

Content preparation: How should the navigation system be designed for wireless applications? Whatfunctions are best provided by devices and what functions are best provided by applications? Howshould a wireless site be structured to facilitate information retrieval?

4.

Development methodology: How should wireless interface design be incorporated into the developmentof distributed, multichannel systems? What alternative methods for interface design and usabilitytesting should be considered for m-commerce applications?

5.

M-commerce applications: How should the wireless technology be used to facilitate CRM? What criteriashould be considered to guide the mapping of e-business strategies, tasks, and technology choices forwireless applications?

6.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (252)

References

Anckar, B., & D'Incau, D. (2002). Value creation in mobile commerce: Findings from a consumer survey.Journal of Information Technology Theory & Application, 4 (1), 43–64.

Belson, K. (2002). Japan is slow to accept the latest phones. The New York Times, April 22, C4.

Bautsch-Vitense, H., Marmet, G., & Jacko, J. (2001). Investigating PDA Web browsing through eyemovement analysis. In M. Smith, G. Salvendy, D. Harris, and R. Koubek (eds.), Proceedings of the 9th

International Conference on Human-Computer Interaction. Mahwah, NJ: LEA.

Buyukkokten, O., Garcia-Molina, H., & Paepcke, A. (2001). Seeing the whole in parts: Text summarizationfor Web browsing on handheld devices. Proceedings of the Tenth International World Wide WebConference. New York, NY: ACM.

Buchanan, G., Farrant, S., Jones, M., Thimbleby, H., Marsden, G., & Pazzani, M. (2001). Improvingmobile Internet usability. Proceedings of the Tenth International World Wide Web Conference, 673–680.New York, NY: ACM.

Chan, S., & Fang, X. (2001). Usability issues for mobile commerce. Proceedings of the Seventh AmericasConference on Information Systems, 439–442.

Chan, S., Fang, X., Brzezinski, J., Zhou, Y., Xu, S., & Lam, J. (2002). Usability for mobile commerceacross multiple form factors. Journal of Electronic Commerce Research, 3 (3), 187–199.

Chittaro, L., & Cin, P. D. (2001). Evaluating interface design choices on WAP phones: Single-choice listselection and navigation among cards. In M. D. Dunlop & S. A. Brewster (ed.), Proceedings of Mobile HCI2001: Third International Workshop on Human Computer Interaction with Mobile Devices.

Colafigli, C., Inverard, P., and Martriccian, R. (2001). InfoParco: An experience in designing an informationsystem accessible through WEB and WAP interfaces. Proceedings of the 34th Hawaii InternationalConference on System Science, Los Alamitos, CA: IEEE Computer Society Press.

Ebling, M., John, B., & Satyanarayanan, M. (2002). The importance of translucence in mobile computingsystems. ACM Transactions on Computer-Human Interaction, 9 (1), 42–67.

Ernst & Young (2001). Global online retailing: An Ernst & Young special report. Cap Gemini Ernst &Young.

Gartner Group (2002). Conference on wireless access, mobile business solutions, March 11–13, 2002,Chicago.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (253)

Henderson, R., Rickwood, D., & Roberts, P. (1998). Beta test of an electronic supermarket. Interactingwith Computers, 10, 385–399.

Hurst, M., & Gellady, E. (2000). White paper one: Building a customer experience to develop brand,increase loyalty and grow revenues. Unpublished report.

Hurst, M., & Terry, P. (2000). The dotcom survival guide. Unpublished report.

Jacko, J. A., Salvendy, G., & Koubek, R. J. (1995). Modelling of menu design in computerized work.Interacting with Computers, 7 (3), 304–330.

Jacko, J. A., & Salvendy, G. (1996). Hierarchical menu design: Breadth, depth and task complexity.Perceptual & Motor Skills, 82 (3), 1187–1201.

Jarvenpaa, S. (2001). Developing mobile commerce capabilities. Presentation to the SIM AdvancedPractices Council, May 7–8.

Johnson, P. (1998). Usability and mobility: Interactions on the move. In C. Johnson (ed.), Proceedings ofthe First Workshop on Human Computer Interaction with Mobile Devices.

Jones, M., Marsden, G., Mohd-Nasir, N., Boone, K., & Buchanan, G. (1999). Improving Web interactionon small displays. Computer Networks: The International Journal of Distributed Informatique, (31),1129–1137.

Jones, M., Marsden, G., Mohd-Nasir, N., Boone, K., & Buchanan, G. (1999). Improving Web interactionon small displays. Computer Networks: The International Journal of Distributed Informatique, (31),1129–1137.

Kaasinen, E., Aaltonen, M., Kolari, J., Melakoski, S., & Laakko, T. (2000). Two approaches to bringingInternet services to WAP devices. Computer Networks: The International Journal of DistributedInformatique, (33), 231–246.

Kalakota, R. & Robinson, M. (2001). M-Business: The Race to Mobility. New York: McGraw-Hill.

Kannan, P., Chang, A., & Whinston, A. (2001). Wireless commerce: Marketing issues and possibilities.Proceedings of the 34th Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEEComp Soc.

Keen, P. & Mackintosh, R. (2001). The Freedom Economy. Berkeley, CA: Osborne/McGraw-Hill.

Kim, J. & Moon, J. (2000). Designing towards emotional usability in customer interfaces - Trustworthinessof cyber-banking system interfaces. Interacting with Computers, (10), 1–29.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (254)

Kim, K., Kim, J., Lee, Y., Chae, M., & Choi, Y. (2002). An empirical study of the use contexts and usabilityproblems in mobile Internet. Proceedings of the 35th Annual Hawaii International Conference on SystemSciences. Los Alamitos, CA: IEEE Computer Society Press.

Kim, J., & Yoo, B. (2000). Toward the optimal link structure of the cyber shopping mall. InternationalJournal of Human-Computer Studies, (52), 531–551.

Lehner, F., & Watson, R. (2001). From e-commerce to m-commerce: Research directions. Unpublishedpaper.

Mennecke, B., and Strader, T. (2001). Where in the world on the Web does location matter? A frameworkfor location based services in m-commerce. Proceedings of the Seventh Americas Conference onInformation Systems, 450–455.

Nelson, M. (2001). For UPS, wireless technology has become a tradition. Informationweek.com, June 11,2001. Available at http://www.informationweek.com/841/ups_side.htm.

Nielsen, J. (2000). Designing Web Usability: The Practice of Simplicity. Indianapolis, IA: New Riders.

Nielsen, J. (2001). What is usability? Available athttp://www.zdnet.com/devhead/stories/articles/0,4413,2137671,00.html.

Nielsen, J., Farrell, S., Snyder, C., & Molich, R. (2000a). E-commerce user experience: Category pages.Unpublished report. Nielsen/Norman Group.

Nielsen, J., Farrell, S., Snyder, C., & Molich, R. (2000b). E-commerce user experience: Checkout &registration. Unpublished report. Nielsen/Norman Group.

Nielsen, J., Farrell, S., Snyder, C., & Molich, R. (2000c). E-commerce user experience: Product pages.Unpublished report. Nielsen/Norman Group.

Nielsen, J., Farrell, S., Snyder, C., & Molich, R. (2000d). E-commerce user experience: Trust.Unpublished report. Nielsen/Norman Group.

Palen, L. & Salzman, M. (2002). Beyond the handset: Designing for wireless communications usability.ACM Transactions on Computer-Human Interaction, 9 (2), 125–151.

Perry, M., O'hara, K., Sellen, A., Brown, B., & Harper, R. (2001). Dealing with mobility: Understandingaccess anytime, anywhere. ACM Transactions on Computer-Human Interaction, 8 (4), 323–347.

Ramsay, M. & Nielsen, J. (2000). WAP usability: Déjà vu, 1994 all over again. Unpublished report.Nielsen/Norman Group.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (255)

Reinhardt, A. (2001). Wireless Web woes. Available athttp://www.businessweek.com/magazine/content/01_23/b3735602.htm.

Rehman, A. (2000). Holiday 2000 e-commerce. Unpublished report. New York, NY: Creative Good.

Rodden, T., Chervest, K., & Davies, N. (1998). Exploiting context in HCI design for mobile systems. In C.Johnson (ed.), Proceedings of the First Workshop on Human Computer Interaction with Mobile Devices.

Roth, J. (2001). Patterns of mobile interaction. In M. D. Dunlop & S. A. Brewster (eds.), Proceedings ofMobile HCI 2001: Third International Workshop on Human Computer Interaction with Mobile Devices.

Ruuska-Kalliokulju, S., Schneider-Hufschmidt, M., Väänänen-Vainio-Mattila, K., & Von Niman, B. (2001).Shaping the future of mobile devices: Results of the CHI2000 workshop on future mobile device userinterfaces. In M. D. Dunlop & S. A. Brewster (eds.), Proceedings of Mobile HCI 2001: Third InternationalWorkshop on Human Computer Interaction with Mobile Devices.

Scholtz, J. (1998). WebMetrics: A methodology for producing usable websites. Proceedings of the HumanFactors Society 1998 Annual Meeting, 1612. Santa Monica, CA: HFES.

Sears, A. & Arora, R. (2001). An evaluation of gesture recognition for PDAs. In M. Smith, G. Salvendy, D.Harris, and R. Koubek, (eds.), Proceedings of the 9th International Conference on Human-ComputerInteraction. Mahwah, NJ: LEA.

Schenkman, B. & Joensson, F. (2000). Aesthetics and preferences of Web pages. Behaviour &Information Technology, 19 (5), 367–377.

Sepenzis, T., Pfau, D., & Lum, E. (2000). Wireless Internet: Overview and outlook. Unpublished report.CIBC World Markets, Inc.

Sharma, S. & Deng, X. (2002). An empirical investigation of factors affecting the acceptance of personaldigital assistants by individuals. Proceedings of the Eighth Americas Conference on Information Systems,1829–1834.

Shim, J. P., Bekkering, E., & Hall, L. (2002). Empirical findings on perceived value of mobile commerce asa distributed channel. Proceedings of the Eighth Americas Conference on Information Systems,1835–1837.

Sugimoto, M. (1999). Application of Single Hand Keys Input Scheme to Pocket Computer. Fujitus ScienceTechnology Journal, 35 (2), 181–190.

Siau, K., Lim, E., & Shen, Z. (2001). Mobile commerce: Promises, challenges, and research agenda.Journal of Database Management, 12 (3), 4–13.

Tarasewich, P., Nickerson, R., & Warkentin, M. (2002). Issues in mobile e-commerce. Communications of

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (256)

the Association for Information Systems, 8, 41–64.

United Airlines, Inc. (2002). Wireless applications. Available athttp://www.ual.com/site/primary/0,10017,1972,00.html.

Väänänen-Vainio-Mattila, K., & Ruuska, S. (1998). User needs for mobile communication devices:Requirements gathering and analysis through contextual inquiry. In C. Johnson (ed.), Proceedings of theFirst Workshop on Human Computer Interaction with Mobile Devices.

Varshney, U. & Vetter, R. (2001). A framework for the emerging mobile commerce applications.Proceedings of the 34th Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEEComp Society.

Waters, R. (2000). Rival views emerge of wireless Internet. Financial Times FT-IT Review, March 1, 2000,1.

Wells, J. & Fuerst, W. (2000). Domain-oriented interface metaphors: Designing Web interfaces foreffective customer interaction. Proceedings of the Hawaii International Conference on System Sciences2000, 155. Los Alamitos, CA: IEEE Comp Society.

Zha, Y. & Sears, A. (2001). Data entry for mobile devices using soft keyboards: Understanding the effectof keyboard size. In M. Smith, G. Salvendy, D. Harris, & R. Koubek (eds), Proceedings of the 9th

International Conference on Human-Computer Interaction. Mahwah, NJ: LEA.

Zhu, W., Nah, F., & Zhao, F. (2002). Factors influencing adoption of mobile computing. Proceedings of the2002 Information Resources Management Association Conference: Issues & Trends of InformationTechnology Management in Contemporary Organizations, 536–539.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (257)

Chapter 12: Using Continuous Voice ActivationApplications in Telemedicine to Transform Mobile

Commerce

James A. RodgerIndiana University of Pennsylvania, USA

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

Abstract

This chapter is designed to relate the rationale used by the Department of Defense (DoD), for the military toadapt the principles of Mobile and Voice Commerce to meet increasing global crises and to find ways to moreeffectively manage manpower and time. A mobile Telemedicine package has been developed by theDepartment of Defense to collect and transmit near-real-time, far- forward medical data and to assess howthis Web-based capability enhances management of the battlespace. Telemedicine has been successful inresolving uncertain organizational and technological military deficiencies and in improving medicalcommunications and information management. The deployable, mobile teams are the centerpieces of thistelemedicine package. These teams have the capability of inserting essential networking and communicationscapabilities into austere theaters and establishing an immediate means for enhancing health protection,collaborative planning, situational awareness, and strategic decision making through Web-based internetapplications. In order to supplement this mobile commerce aspect of telemedicine, U.S. Navy ships have beenutilized to integrate voice commerce interactive technologies to improve medical readiness and mobility. Anexperimental group was tasked to investigate reporting methods in health and environmental surveillanceinspections to develop criteria for designing a lightweight, wearable computing device with voice interactivecapability.

This chapter is also designed to relate the rationale used by the Department of Defense and the Test andEvaluation (T&E) Integrated Product Team, in order to determine the military utility of the Joint MedicalOperations— Telemedicine Advanced Concept Technology Demonstration (JMO-T ACTD) and continuousvoice activation applications. Voice interactive computing devices are used to enhance problem solving,mobility and effectiveness in the battlespace. It improves efficiency through automated user prompts,enhanced data analysis, presentation, and dissemination tools in support of preventive medicine. The deviceis capable of storing, processing, and forwarding data to a server. The prototype devices have enabled quick,efficient, and accurate environmental surveillance. In addition to reducing the time needed to completeinspections, the device supported local reporting requirements and enhanced command-level intelligence.

This chapter further focuses on developing a holistic model of implementing a strategy for mobiletelemedicine. The model synthesizes current thinking on transformation into a holistic model and also explainsthe integrative influence of vision on the other four model components: environment, people, methodology,and IT perspective. The model was tested by Testing and Evaluating (T&E) the JMO-T ACTD. JMO-T ACTDhas developed a very successful training program and is very aware of the importance of planned change.Top military officials, such as the Commander in Chief (CINC), are actively involved in change and arecommitted to people development through learning. The model served an applied purpose by allowing insightsinto how well the military organization fit current theory. The model also fit a theoretical purpose by organizinga holistic, comprehensive framework. Accordingly, we have organized and synthesized the literature into fiveinterrelated components that act as a fundamental guide for research. The model also helped to identify a

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (258)

theoretical link and apply it to the internal operations of the military and its adaptation of mobile e-commerceprinciples to more effectively deliver telemedicine benefits to military personnel.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (259)

Introduction to Telemedicine, Mobile and Voice Commerce Issues

Telemedicine is an approach of providing care for patients that are geographically separated from a doctor.Telemedicine allows a doctor and a patient to interact with each other using computer networks. Telemedicine,when used in military, has a potential to heal patients in the war zone where doctors may not be readilyavailable. The U.S. national strategy for military preeminence is based on technological superiority. Throughnew discoveries in advanced science and technology, the goal of the Department of Defense under JointVision 2010 (JV 2010) is to develop the ability to directly and decisively influence events ashore and at sea-anytime, anywhere-to meet current and future challenges.

To successfully counter these challenges, the DoD must continue to move forward in its effort to incorporatetelemedicine into its prime mission-to keep every service member healthy and on the job, anywhere in theworld, to support combat operations, as well as humanitarian, peacekeeping, and disaster relief missions.Telemedicine supports the DoD's goal by electronically bringing the specialist to the primary provider whodirectly cares for service members in austere, remote, and isolated environments (Floro, Nelson, andGarshnek, 1998). Telemedicine also creates an opportunity to provide rapid, accurate diagnosis andtherapeutic recommendations (Garshnek and Burkle, 1998). The end result is that telemedicine helps tomaintain the health of service personnel and their ability to quickly return to duty, minimizing logisticallyburdensome, inconvenient, and expensive transportation to distant specialty care (Bangert, Doktor, andWarren, 1998).

For telemedicine methods to be successful, however, their operational effectiveness, suitability, andimportance to the warfighters' mission must continuously be tested, evaluated, and proven (Oliver, Sheng,Paul and Chih, 1999). In 1997, the U.S. Army, in partnership with the Navy and Air Force, was tasked todevelop exercises to explore the integration of advanced technologies with existing systems and architecturesto meet the requirements established under JV2010.

These technologies are all aligned with the Joint Vision 2010 concepts of Dominant Maneuver, PrecisionEngagement, Focused Logistics and Full Dimensional Protection. The technology initiatives utilize dedicated,small mobile teams, with a sophisticated IT infrastructure, to provide telemedicine capabilities wherever theyare needed in the medical battlespace (Mann, 1997). This IT Infrastructure includes novel Medical EquipmentSets (MES) with digital capture devices such as digital cameras, digital scopes, digital blood and urinelaboratories, physiological monitors, advanced digital radiography, and digital ultrasound (Perednia and Allen,1995). Other, associated items of equipment include novel software, such as the Pacific Virtual Health CareSystem. This package offers electronic medical record archiving capability that enables automated,standardized teleconsultation by forward medics to higher echelon physicians (Rodger and Pendharkar, 2000).

The Joint Medical Operations-Telemedicine Advanced Concept Technical Design (JMO-T ACTD) has chargeditself with operating within the concept of Focused Logistics and Full Dimensional Protection. It is, therefore,pertinent to understand just how this ACTD can accomplish its missions/objectives and meet the operationalconcepts of JV2010. This operationalization is embodied in the following quote: "To protect the force, the Armywill rely on a technically advanced, operationally simple network of multicomponent intelligence sourcescapable of detecting and locating forces, active and passive obstacles, in-flight aircraft, ballistic and cruisemissiles and their launch sites, chemical and biological agents, electronic jamming sources and a host of still-developing threats."

One technology that is mentioned in the document that applies to this ACTD is the use of "advanced soldiertechnologies." It is necessary for this ACTD to fit within this concept and provide the warfighter withinformation that identifies, early on, those countermeasures that can be used to defeat medical threats(Dardelet, 1998). It is also important to recognize other action that may be used to defeat enemy deploymentof weapons of mass destruction (WMD), especially biological agent dispersal. Focused Logistics makes only

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (260)

one mention of "telemedicine." "For the Army, Focused Logistics will be the fusion of logistics and informationtechnologies, flexible and agile combat service support organizations, and new doctrinal support concepts toprovide rapid crisis response to deliver precisely tailored logistics packages directly to each level of militaryoperation." The document portrays medical support to Focused Logistics in the form of "Internet triage" and"telemedicine" in order to enhance the survivability of the joint force (Zajtchuk, 1995).

Achieving 21st century medical support capability demands significant advances in the military's ability toprovide force health care and medical protection and to deploy medical communications and informationmanagement in tactical operations (Institute of Medicine, 1996). The broad mission of Telemedicine in themilitary is to assess advanced mobile applications that can potentially meet such demands (Paul, Pearson,and McDaniel, 1999).

U.S. military has adapted a suite of software, databases, and architecture standards to provide deployablemedical information management (Tanriverdi and Venkatraman, 1998). The Theater Medical Core Services(TMCS) is a database that stores data locally and is capable of sending encrypted e-mail to several redundantdatabase servers via store-and-forward (Rasberry, 1998). The database servers aggregate information andstore it in databases for distribution. Web servers supply data to medical personnel as customized encryptedreports.

The Medical Workstation (MeWS) is a network-based workstation equipped with portable medical devices,clinical support capabilities, medical information support, and a graphical user interface. The MeWS willsupport multipatient monitoring, interface with the patient's clinical record, and provide access to a searchabledatabase. It will also provide full Personal Information Carrier (PIC) read and write implementation. MeWS willcollect, store, and forward medical device data and images. By utilizing a Global Positioning System (GPS),MeWS has the capability to enter the patient's geographical location. The various software components of theMeWS help to facilitate clinical data entry, acquisition and retrieval. MeWS enables the generation of medicalfacility status reports, the monitoring of disease surveillance, the updating of supplies, and tracking ofevacuation requirements.

The Field Medical Surveillance System (FMSS) is an expert system that systematically detects and monitorsepidemiological trends and profiles patient populations. FMSS integrates patient information into the GlobalInfectious Disease and Epidemiology Network (GIDEON) knowledge base. Demographic and symptomaticinformation is used to arrive at a presumptive diagnosis or classify the patient using discriminate analysis.FMSS is also capable of providing incidence and prevalence trends for infectious diseases.

The Libretto is a commercial-off-the-shelf (COTS) handheld computer, manufactured by Toshiba. It has thecapability to automate field medic Personal Identification Card (PIC) card software by reading servicemember's demographic information from the PIC into the software on the Libretto. It can also write GPSmedical encounter information to the PIC and store the information as a pre formatted message fortransmission. Tactical medical communications require updating of the existing IT infrastructure. Thepreviously mentioned novel hardware, software, and interfaces were implemented in order to enable thischange and facilitate the transmission of medical unique information over the existing communicationshardware and command, control, communication, computers, intelligence, surveillance, and reconnaissance(C4ISR) networks. However, telecommunications from the operational area of responsibility (AOR) to themedical sustaining base uses the existing Defense Information Systems Network (DISN) that has been set upby the military in conjunction with the existing C4ISR.

The technologies described above have been assembled into an exportable capability that is specificallytailored to meet the medical Information Management (IM) and Information Technology (IT) needs of the unit itis supporting. This assemblage of technologies is referred to as the Capability Package. The capabilitypackage technologies must work in concert with the unit's infrastructure, communications, tactical situation,and logistical constraints if the military is to realize its full potential in meeting today's global crises. For suchtechnologies to be successful, however, their operational effectiveness, suitability, and importance to the

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (261)

Telemedicine mission must continuously be tested, evaluated, and proven. To perform this task, the militaryestablished a Test and Evaluation Integrated Product Team (T&E) to evaluate candidate mobile models andarchitectures. These technologies are examined in a rigorous test and evaluation (T&E) environment withextensive user participation as a means of assessing their mobile applications. The T&E-IPT have leveragedand optimized existing communications technologies to transmit medical data. Database technologies formobile technologies are utilized for epidemiological and trend analyses utilizing data mining of these datawarehouses.

The initial concept of operations (CONOPS) was to employ a tailored Joint Task Force (JTF) to accomplishmissions in controlled environment demonstrations. The first series of demonstrations was used to testcommunication methodologies, functionality, and the field utility of collecting and sending patient data from theforward edge of the battlefield. By allowing data and commands to be entered into a computer without theneed for typing, computer understanding of naturally spoken languages frees human hands for other tasks.Speech recognition by computers can also increase the rate of data entry, improve spelling accuracy, permitremote access to databases utilizing wireless technology, and ease access to computer systems by those wholack typing skills.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (262)

Speech Recognition Applications

Since 1987, the National Institute of Standards and Technology (NIST) has provided standards to evaluatenew voice interactive technologies (Pallett, Garofolo, & Fiscus, 2000). In a 1998 broadcast news test, NISTprovided participants with a test set consisting of two 1.5-hour subsets obtained from the LinguisticDataConsortium. The task associated with this material was to implement automatic speech recognition technologyby determining the lowest word error rate (Herb & Schmidt, 1994; Fiscus, 1997; Greenberg, Chang, &Hollenback, 2000; Pallett, 1999). Excellent performance was achieved at several sites, both domestic andabroad (Przybocki, 1999). For example, IBM-developed systems achieved the lowest overall word error rate of13.5%. The application of statistical significance tests indicated that the differences in performance betweensystems designed by IBM, the French National Laboratories' Laboratoire d'Informatique pour la Mechanique etles Sciences de l'Ingenieur, and Cambridge University's Hidden Markov Model Toolkit software were notsignificant (Pallett, Garfolo, and Fiscus, 2000). Lai (2000) also reported that no significant differences existedin the comprehension of synthetic speech among five different speech-to-text engines used. Finally, speakersegmentation has been used to locate all boundaries between speakers in the audio signal. It enablesspeaker normalization and adaptation techniques to be used effectively to integrate speech recognition (Bikel,Miller, Schwartz, & Weischedel, 1997).

The seamless integration of voice recognition technologies creates a human machine interface that has beenapplied to consumer electronics, Internet appliances, telephones, automobiles, interactive toys, and industrial,medical, and home electronics and appliances (Soule, 2000). Applications of speech recognition technologyare also being developed to improve access to higher education for persons with disabilities (Leitch & Bain,2000). Although speech recognition systems have existed for two decades, widespread use of this technologyis a recent phenomenon. As improvements have been made in accuracy, speed, portability, and operation inhigh-noise environments, the development of speech recognition applications by the private sector, federalagencies, and armed services has increased.

Some of the most successful applications have been telephone-based. Continuous speech recognition hasbeen used to improve customer satisfaction and the quality of service on telephone systems (Charry,Pimentel, & Camargo, 2000; Goodliffe, 2000; Rolandi, 2000). Name-based dialing has become moreubiquitous, with phone control answer, hang-up, and call management (Gaddy, 2000a). These applicationsuse intuitive human communication techniques to interact with electronic devices and systems (Shepard,2000). BTexact Technologies, the Advanced Communications Technology Centre for BritishTelecommunications (Adastral Park, Suffolk, England), uses the technology to provide automated directoryassistance for 700 million calls each year at its U.K. bureau (Gorham & Graham, 2000). Studies in such callcenters have utilized live customer trials to demonstrate the technical realization of full speech automation ofdirectory inquiries (McCarty, 2000; Miller, 2000). Service performance, a study of customer behavior, and ananalysis of service following call-back interviews suggest user satisfaction with the application of speechautomation to this industry (Gorham & Graham, 2000).

Speech recognition technologies could expand e-commerce into v-commerce with the refinement of mobileinteractive voice technologies (McGlashan, 2000; Gaddy, 2000b; Pearce, 2000). As an enabler of talkingcharacters in the digital world, speech recognition promises many opportunities for rich media applications andcommunications with the Internet (Zapata, 2000). Amid growing interest in voice access to the Internet, a newVoice-extensible Markup Language (VoiceXML™, VoiceXML Forum) has surfaced as an interface for providingWeb hosting services (Karam & Ramming, 2000). VoiceXML promises to speed the development and expandthe markets of Web-based, speech recognition/synthesis services as well as spawning a new industry of"voice hosting." This model will allow developers to build new telephone-based services rapidly (Thompson &Hibel, 2000). The voice-hosting service provider will lease telephone lines to the client and voice-enable aspecific URL, programmed in VoiceXML by the client. This model will make it possible to build speech andtelephony services for a fraction of the time and cost of traditional methods (Larson, 2000).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (263)

Haynes (2000) deployed a conversational Interactive Voice Response system to demonstrate site-specificexamples of how companies are leveraging their infrastructure investments, improving customer satisfaction,and receiving quick return on investments. Such applications demonstrate the use of speech recognition bybusiness. The investigation of current customer needs and individual design options for accessing informationutilizing speech recognition is key to gaining unique business advantages (Prizer, Thomas, & Suhm, 2000;Schalk, 2000).

A long-awaited application of speech recognition, the automatic transcription of free-form dictation fromprofessionals such as doctors and lawyers, lags behind other commercial applications (Stromberg, 2000). Dueto major developments in the Internet, speech recognition, bandwidth and wireless technology, this situation ischanging (Bourgeois, 2000; Pan, 2000).

Internationalizing speech recognition applications has its own set of problems (Krause, 2000). One suchproblem is that over-the-phone speech applications are more difficult to translate to other languages than Webapplications or traditional desktop graphic user interface applications (Head, 2000). Despite the problems,internationalizing speech applications brings with it many benefits. Internationalization of an application helpsto reveal some of the peculiarities of a language, such as differences in dialects, while providing insight on thevoice user interface design process (Scholz, 2000; Yan, 2000). Furthermore, speech comprehension can workeffectively with different languages; studies have documented both English and Mandarin word error rates of19.3% (Fiscus, Fisher, Martin, Przybocki, & Pallett, 2000).

Speech technology has been applied to medical applications, particularly emergency medical care thatdepends on quick and accurate access of patient background information (Kundupoglu, 2000). The U.S.Defense Advance Research Projects Agency organized the Trauma Care Information Management System(TCIMS) Consortium to develop a prototype system for improving the timeliness, accuracy, and completenessof medical documentation. One outcome of TCIMS was the adoption of a speech-audio user interface for theTCIMS Consortium prototype (Holtzman, 2000).

The Federal Aviation Administration conducted a demonstration of how voice technology supports a facilitiesmaintenance task. A voice-activated system proved to be less time consuming to use than the traditionalpaper manual approach, and study participants reported that the system was understandable, easy to control,and responsive to voice commands. Participants felt that the speech recognition system made themaintenance task easier to perform, was more efficient and effective than a paper manual, and would bebetter for handling large amounts of information (Mogford, Rosiles, Wagner, & Allendoerfer, 1997).

Speech recognition technology is expected to play an important role in supporting real-time interactive voicecommunication over distributed computer data networks. The Interactive Voice Exchange Applicationdeveloped by the Naval Research Lab, Washington, DC, has been able to maintain a low data rate throughputrequirement while permitting the use of voice communication over existing computer networks without causinga significant impact on other data communications, such as e-mail and file transfer (Macker & Adamson,1996).

Pilots must have good head/eye coordination when they shift their gaze between co*ckpit instruments and theoutside environment. The Naval Aerospace Medical Research Lab, Pensacola, FL, has investigated usingspeech recognition to support the measurement of these shifts and the type of coordination required to makethem (Molina, 1991). Boeing Company, Seattle, WA, has investigated ways to free pilots from certain manualtasks and sharpen their focus on the flight environment. The latest solution includes the use of a rugged,lightweight, continuous-speech device that permits the operation of selected co*ckpit controls by voicecommands alone. This technology is being applied in the noisy co*ckpit of the Joint Strike Fighter (Bokulich,2000).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (264)

Existing Problems-Limitations of Speech Recognition Technology

Even though applications of speech recognition technology have been developed with increased frequency,the field is still in its infancy, and many limitations have yet to be resolved. For example, the success ofspeech recognition by desktop computers depends on the integration of speech technologies with theunderlying processor and operating system and the complexity and availability of tools required to deploy asystem. This limitation has had an impact on application development (Markowitz, 2000; Woo, 2000).

Use of speech recognition technology in high-noise environments remains a challenge. For speech recognitionsystems to function properly, clean speech signals are required, with high signal-to-noise ratio and widefrequency response (Albers, 2000; Erten, Paoletti, & Salam, 2000; Sones, 2000; Wickstrom, 2000). Themicrophone system is critical in providing the required speech signal, and, therefore, has a direct effect on theaccuracy of the speech recognition system (Andrea, 2000; Wenger, 2000). However, providing a clean speechsignal can be difficult in high-noise environments. Interference, changes in the user's voice, and additivenoise- such as car engine noise, background chatter, and white noise-can reduce the accuracy of speechrecognition systems. In military environments, additive noise and voice changes are common. For example, inmilitary aviation, the stress resulting from low-level flying can cause a speaker's voice to change, reducingrecognition accuracy (Christ, 1984).

The control of the speech recognition interface poses its own unique problems (Gunn, 2000; Taylor, 2000).The inability of people to remember verbal commands is even more of a hindrance than their inability toremember keyboard commands (Newman, 2000). The limited quality of machine speech output also affectsthe speech recognition interface. As human-machine interaction becomes increasingly commonplace,applications that require unlimited vocabulary speech output are demanding text-to-speech systems thatproduce more human-sounding speech (Hertz, Younes, & Hoskins, 2000).

The accuracy of modeling has also limited the effectiveness of speech recognition. Modeling accuracy can beimproved, however, by combining feature streams with neural nets and Gaussian mixtures (Ellis, 2000). Theapplication of knowledge-based speech analysis has also shown promise (Komissarchik & Komissarchik,2000). Pallett, Garofolo, and Fiscus (1999) pointed out that potential problems associated with the search andretrieval of relevant information from databases have been addressed by the Spoken Document Retrievalcommunity. Furthermore, standards for the probability of false alarms and miss probabilities are set forth andinvestigated by the Topic Detection and Tracking program (Doddington, 1999). Decision Error Trade-off plotsare used to demonstrate the trade-off between the miss probabilities and false alarm probabilities for a topic(Kubala, 1999). Security issues and speech verification are major voids in speech recognition technology(Gagnon, 2000). Technology for the archiving of speech is also undeveloped. It is well recognized that speechis not presently valued as an archival information source because it is impossible to locate information in largeaudio archives (Kubala, Colbath, Liu, Srivastava, and Makhoul, 2000).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (265)

Strengths of NVID

To ensure the health and safety of shipboard personnel, naval health professionals-including environmentalhealth officers , industrial hygienists, independent duty corpsmen (IDCs), and preventive medicine technicians-perform clinical activities and preventive medicine surveillance on a daily basis. These inspections include, butare not limited to, water testing, heat stress, pest control, food sanitation, and habitability surveys. Chief ofNaval Operations Instruction 5100.19D, the Navy Occupational Safety and Health Program Manual for ForcesAfloat, provides the specific guidelines for maintaining a safe and healthy work environment aboard U.S. Navyships. Inspections performed by medical personnel ensure that these guidelines are followed.

Typically, inspectors enter data and findings by hand onto paper forms and later transcribe these notes into aword processor to create a finished report. The process of manual note taking and entering data via keyboardinto a computer database is time consuming, inefficient, and prone to error. To remedy these problems, theNaval Shipboard Information Program was developed, allowing data to be entered into portable laptopcomputers while a survey is conducted (Hermansen & Pugh, 1996). However, the cramped shipboardenvironment, the need for mobility by inspectors, and the inability to have both hands free to type during aninspection make the use of laptop computers during a walk-around survey difficult. Clearly, a hands-free,space-saving mode of data entry that would also enable examiners to access pertinent information during aninspection was desirable. The NVID project was developed to fill this need. The NVID project was developedto replace existing, inefficient, repetitive survey procedures with a fully automated, voice interactive system forvoice-activated data input. In pursuit of this goal, the NVID team developed a lightweight, wearable, voice-interactive prototype capable of capturing, storing, processing, and forwarding data to a server for easyretrieval by users. The voice interactive data input and output capability of NVID reduces obstacles to accurateand efficient data access and reduces the time required to complete inspections. NVID's voice interactivetechnology allows a trainee to interact with a computerized system and still have hands and eyes free tomanipulate materials and negotiate his or her environment (Ingram, 1991). Once entered, survey and medicalencounter data can be used for local reporting requirements and command-level intelligence. Improved dataacquisition and transmission capabilities allow connectivity with other systems. Existing printed andcomputerized surveys are voice activated and reside on the miniaturized computing device. NVID has beendesigned to allow voice prompting by the survey program, as well as voice-activated, free-text dictation. Anenhanced microphone system permits improved signal detection in noisy shipboard environments. All of thesecapabilities contribute to the improved efficiency and accuracy of the data collection and retrieval process byshipboard personnel. Shipboard medical department personnel regularly conduct comprehensive surveys toensure the health and safety of the ship's crew. Currently, surveillance data are collected and stored viamanual data entry, a time-consuming process that involves typing handwritten survey findings into a wordprocessor to produce a completed document.

This prototype system is a compact, mobile computing device that includes voice interactive technology, stylusscreen input capability, and an indoor readable display that enables shipboard medical personnel to completeenvironmental survey checklists, view reference materials related to these checklists, manage tasks, andgenerate reports using the collected data. The system uses Microsoft Windows NT®, an operatingenvironment that satisfies the requirement of the IT-21 Standard to which Navy ships must conform. The majorsoftware components include initialization of the NVID software application, application processing, databasemanagement, speech recognition, handwriting recognition, and speech-to-text capabilities. The power sourcefor this portable unit accommodates both DC (battery) and AC (line) power options and includes the ability torecharge or swap batteries to extend the system's operational time. As the information and results wereobtained the CONOPS was expanded to use additional activities. These activities are as follows:

The deployment of mobile technologies and agents, called TheaterTelemedicine Teams (TTTs), tomedical treatment facilities (MTFs) toestablish and conduct telemedicine operations; coordinate withsignal andCommand, Control, Communications, Computers, and Intelligence (C4I) assets to establish and

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (266)

maintain tactical medical networks; receive, verify, and log Command information provided from lowerechelons.

The use of advanced mobile information management models and technologies, such as software,databases, and architecture standards, that were adapted to provide deployable medical informationmanagement foradvanced mobile applications.

Two radio frequency (RF) networking technologies that were enhanced for user interface design in abattlefield setting.

Modeling and simulation (M&S) capabilities provided through advancedmobile application software duringtraining exercises.

The validation of NVID project objectives and system descriptions by assessing the feasibility of voiceinteractive environmental tools and the NVID prototype's ease of use.

All of these capabilities are being evaluated by the military. The goal of this evaluation is to first establisheffective, interoperable mobile communications in the early stages of the exercises and to then implementmore robust mobile database technology capabilities as the application matures.

Mobile application.

Types of mobile technologies that were identified and tested as potential candidates for enhancingTelemedicine capabilities

Objectives of each mobile agent in the field

Methods and applications of these mobile technologies

Performance results of these mobile database technologies

Recommendations, lessons learned, and feedback received from actualmobile users

Overall findings and results of Telemedicine mobile field agents.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (267)

Holistic Model

For this project, the author applied a holistic model to the DoD's mobile e-commerce re-engineering strategy.Strong evidence from prior case studies shows that holism offers a viable management model for successfultransformation, or reengineering (Clark, et. al., 1997). Our model consists of five interdependent components-environment, people, methodology, information technology (IT) perspective, and vision (Paper, Rodger, andPendharkar, 2000).

Environment

Basic environmental factors that lead to structural change include top management support, risk disposition,organizational learning, compensation, information sharing, and resources (Amabile, 1997; Lynn, 1998;O'toole, 1999). Innovation can come from any level of an organization, but environmental change originates atthe top (Paper, 1999; Cooper, and Markus, 1995). When employees actually see top managers initiatingprocess improvement changes, they perceive that their work is noticed and that it is important to theorganization (Paper, and Dickinson, 1997; Paper, 1999).

It has been argued that the fear of failure must be limited and risk taking promoted for innovation to thrive(Nemeth, 1997). Many organizations make the mistake of trying to manage uncertainty with creative projectsby establishing social control; however, it is the freedom to act that provokes the desire to act (Sternberg etal., 1997).

The ability to learn as an organization dictates whether and how fast it will improve (Harkness et al., 1996).Knowledge exchange between and among teams appears to give some organizations a distinctive competitiveadvantage (Lynn, 1998). Learning as part of the environment enables top management to disseminate itschange message to the people who do the work (Gupta et al., 1999). Compensation has been attributed as ameans of motivating employees to perform better (Pfeffer, 1998). Being rewarded for one's work sends themessage to employees that their contributions to the organization are valued. It seems logical to conclude thatpeople who are well compensated for risk taking, innovation, and creativity will continue that behavior (Paper,Rodger, and Pendharkar, 2000).

Information sharing enables people to better understand the business and what it requires to be successful(Paper, and Dickinson, 1997; Harkness, et al., 1996). Restricting information, on the other hand, inhibitschange. Resources can be viewed as a source for providing a variety of services to an organization'scustomers (Kangas, 1999). According to Barney (1991), an organization's resources can include all assets,capabilities, organizational processes, attributes, information, and knowledge that enable the organization todevelop and implement strategies that improve its efficiency and effectiveness.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (268)

People

Transformation success hinges on people and their knowledge, creativity, and openness to change (Cooper,and Markus, 1995). Real change will not occur without mechanisms in place to help people transformprocesses. Such mechanisms include training and education, challenging work, teamwork, and empowerment."Education and training is the single most powerful tool in cultural transformation." (Wong, 1998) It raisespeople's awareness and understanding of the business and customer (Wong, 1998). Training helps developcreativity, problem solving, and decision-making skills in people previously isolated from critical roles inprojects that potentially impact the entire enterprise. Business education is equally important in that peopleneed to know how the business works in order to add value to business processes (Paper, 1999; Paper, andDickinson, 1997). When work is challenging, people are more motivated, satisfied, and often more productive(Hackman et al., 1975). Challenge allows people to see the significance of and exercise responsibility for anentire piece of work (Cummings, and Oldham, 1997). Challenge stimulates creativity in people and gives thema sense of accomplishment (Amabile, 1997). People cannot reach their creative potential unless they aregiven the freedom to do so (Pfeffer, 1998). Management, therefore, needs to be sensitive to and aware of theirrole in creating a workplace that allows people freedom to act on their ideas.

Methodology

Methodology keeps people focused on the proper tasks and activities required at a specific step of atransformation project. It acts as a rallying point for cross-functional teams, facilitators, and managers as itinforms them about where the project is and where it is going (Paper and Dickinson, 1997). It allows people tochallenge existing assumptions, recognize resistance to change, and establish project buy-in (Kettinger et al.,1998). Of critical importance in the beginning stages is the buy-in and direction from top management, whichis essential to identifying information technology opportunities, informing stakeholders, setting performancegoals, and identifying BPR opportunities. Direction is important because large-scale reengineering spansfunctional boundaries in which people from across the organization are involved (Paper, 1998).

Information Technology (IT) Perspective

The perspective of IT professionals toward change is critical because technology implementation is anorganizational intervention (Markus, and Benjamin, 1996). As such, IT can either strengthen or weaken anorganization's competitiveness (Kangas, 1999).

As introduced by Markus and Benjamin (1996), the three fundamental models of IT change agentry aretraditional, facilitator, and advocate. Each model offers the dominant belief system or perspective of ITprofessionals toward the goals and means of work that shape what they do and how they do it. ITprofessionals with the traditional perspective believe that technology causes change. IT professionals with thefacilitator perspective believe that people create change. IT professionals with the advocate perspective alsobelieve that people create change. However, they believe that the advocate and the team are responsible forchange and performance improvements. The facilitator perspective best characterizes the philosophy adoptedat the DoD Telemedicine project.

Consistent with the change-agency theory, IT perspective is categorized rather than measured. IT perspectivecannot really be measured because one has one belief system or another. The facilitator perspective viewschange as influenced by the people who do the work. Managers facilitate and guide the process. However,they do not control the process in any way. People control the processes, set their own goals, and areresponsible for the consequences. However, managers share goal-setting tasks with the group, champion theeffort, and are jointly responsible for the consequences. Mata et al.'s (1995) findings reinforce the facilitatormodel and suggest that two factors effectively contribute to an organization's competitive advantage: 1)

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (269)

Developing methods for strategy generation involving information resources management that emphasizesand enforces the learning of these skills across the entire organization, and 2) developing shared goals withinthe entire organization. This facilitator attitude toward common business processes and systems has beenadopted by many organizations, including General Motors (Schneberger and Krajewski, 1999).

Transformation (Change) Vision

Vision offers a means of communicating the re-engineering philosophy to the entire organization and to pushstrategic objectives down through the process level and align the project with business goals. If the changevision is holistic, work is viewed as part of the whole system (Teng, et al., 1998). The underlying goal of aholistic change vision is to align employee goals with those of the organization and vice versa (Drucker, 1989).Change management, however, is very difficult because people tend to react negatively to it (Topchick, 1998).Hence, a top-down vision is imperative because it helps people understand the reasons for change. If peoplebelieve that change will benefit them or the organization, negativity is reduced. Top management has in itspower the ability to influence how the organization perceives environment, people, IT, and methodology.

The vision can help open communication channels between IT and top management. One cannot besuccessful without frequent interactions between top management and IT change advocates (Markus, andBenjamin, 1996). Open communication can help inform top management of political obstacles, training issues,and budget problems before they stymie the project. It can also help top management disseminate informationabout the business and BPR progress across the organization. The more informed people are about thebusiness, the better they feel about what they do. It is well known that organizations need information in orderto compete (Ives and Jarvenpaa, 1993). The source for the following comments is the briefing Army Vision2010. (Briefing is on the Web at URL www.army.mil/2010/introduction.htm.) This document and the effortsunderway to achieve its objectives shape the Army's vision for the year 2010 and beyond. In the aggregate,the Army is seeking to "lighten up the heavy forces" and to "heavy up the capabilities of the light forces." Frommission receipt through deployment, operations and transition to follow-on operations, Army elements willexecute their responsibilities through a deliberate set of patterns of operation. These patterns are:

Project the Force,

Protect the Force,

Shape the Battlespace,

Conduct Decisive Operations,

Sustain the Force, and

Gain Information Dominance.

These patterns are all aligned with the Joint Vision 2010 concepts of Dominant Maneuver, PrecisionEngagement, Focused Logistics and Full Dimensional Protection. The technology initiatives utilize dedicated,small mobile teams, with a sophisticated IT infrastructure, to provide telemedicine capabilities wherever theyare needed in the medical battlespace (Mann, 1997). This IT infrastructure includes novel Medical EquipmentSets (MES) with digital capture devices such as digital cameras, digital scopes, digital blood and urinelaboratories, physiological monitors, advanced digital radiography, and digital ultrasound (Perednia and Allen,1995). Other, associated items of equipment include novel software, such as the Pacific Virtual Health CareSystem. This package offers electronic medical record archiving capability that enables automated,standardized teleconsultation by forward medics to higher echelon physicians. This ACTD has charged itselfwith operating within the concept of Focused Logistics and Full Dimensional Protection. It is, therefore,pertinent to understand just how this ACTD can accomplish its missions/objectives and meet the operationalconcepts of JV2010. This operationalization is embodied in the following quote. "To protect the force, the Armywill rely on a technically advanced, operationally simple network of multicomponent intelligence sources

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (270)

capable of detecting and locating forces, active and passive obstacles, in-flight aircraft, ballistic and cruisemissiles and their launch sites, chemical and biological agents, electronic jamming sources, and a host of still-developing threats."

One technology that is mentioned in the document that applies to this ACTD is the use of "advanced soldiertechnologies." It is necessary for this ACTD to fit within this concept and provide the warfighter withinformation that identifies, early on, those countermeasures that can be used to defeat medical threats. It isalso important to recognize other action that may be used to defeat enemy deployment of weapons of massdestruction (WMD), especially biological agent dispersal.

Focused Logistics makes only one mention of "telemedicine." "For the Army, Focused Logistics will be thefusion of logistics and information technologies, flexible and agile combat service support organizations, andnew doctrinal support concepts to provide rapid crisis response to deliver precisely tailored logistics packagesdirectly to each level of military operation." The document portrays medical support to Focused Logistics in theform of "Internet triage" and "telemedicine" in order to enhance the survivability of the joint force (Zajtchuk,1995). This ACTD will best support this concept by demonstrating the ability to:

capture the data,

see the data,

use the data,

use decision tools to plan and prioritize,

model and simulate, and

utilize the GSSS strategy to accomplish the above.

That strategy is to develop the hardware, software, database, and network solutions that impact the computer-based patient record, medical threat identification, and command and control of medical units. This will beaccomplished through management of information and information technologies, deployed throughout thebattlespace. Most logisticians consider medical under their purview. Therefore, logistics organizations will bestreamlined and "right-sized" to allow the delivery of service in a balance between "just in time" and "just incase = just enough." The operatives in the impact of Focused Logistics are "reduced footprint" and "tailoringon the fly" of units. This will provide for rapid crisis response, the tracking and shifting of assets while en route,and the delivery of tailored logistics packages and sustainment directly at the operational and tactical levels ofoperation. The JMO-T ACTD will tailor forces using novel modeling and simulation packages.

The most important facet of all of the JV2010 concepts is that the enablers and technologies will empowersoldiers and not replace them. The enablers listed for Focused Logistics are germane to this ACTD as well.These are:

Integrated Maneuver & Combat Service Support Systems Command and Control

Total Asset Visibility

Modular Organization

Movement Tracking System

Coupling computer recognition of the human voice with a natural language processing system that makesspeech recognition by mobile computers possible

Wireless Information Management Systems

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (271)

Measurement of Issues and Findings

A series of measurements were conducted to test mobile communications methodologies and functionality.The field utility or application of mobile communications to field conditions consisted of collecting andtransmitting near-real-time, farforward medical data. It was examined and assessed as to how this improvedcapability enhanced medical management of the battlespace. This phase was also used to expand andimprove the techniques for testing and evaluating the proposed mobile technologies and softwareenhancements.

The medical play in several of the demonstrations was robust enough to provide a rich opportunity to observehow these mobile technologies provided support to the user in an operational setting. These results were thenused as a baseline for follow-on demonstrations and exercises.

Both the WaveLAN and JINC demonstrated their primary intended functions of mobile tactical networkingcapacity. The WaveLAN system provided superior bandwidth and full wireless local area network (LAN)capabilities, and the JINC provided tactical networking over low bandwidth military radio systems. Among theoutcomes, it was found that mobile technologies could successfully replace wired LANs with wireless LANsand that mobile database technology software development and refinement should be continued.

The field exercises demonstrated the following capabilities:

Theater Medical Core Services (TMCS) system—a mobile database application used to provide medicalreports.

Medical workstation (MeWS) —a mobile, functionally configured, network-based workstation designed tosupport the clinical and information support requirements of forward echelon providers ashore and afloat

Toshiba Libretto end-user terminal (EUT) —a lightweight, handheldcomputer capable of reading, storing,and transmitting the soldiers'demographic information in the field.

Desert Care II (DC II) Theater Clinical Encounter Application (TCEA) —a Web-based application thatfacilitates the user interface design, on thebrowser workstation, for mobile providers or medicaltechnicians to record, view, and report patient encounter information in the field.

Personal information carrier (PIC) —a small, portable storage device containing demographic and medicalinformation pertaining to the soldier who is wearing or carrying the device.

Theater Telemedicine Prototype Program (T2P2) —a Web-based delivery system of consultive care thatgives healthcare providers from remotelocations the ability to access the expertise of a regional facility formedical specialty consultations.

Theater Telemedicine Team (TTT) —a mobile team composed of a leader with a clinical background, avisual systems operator, and an information systems operator who provide telemedicine capability toselect, deployed MTFs.

Aeromedical Evacuation (AE) Suitcase—a mobile system that provides critical voice and datacommunications to the AE mission of the U.S. Air Force (USAF) Air Mobility Command (AMC).

The tasks needed to achieve the objectives of the demonstration were carried out. These included the abilityto collect and forward healthcare data in DC II and TMCS Lightweight Data Entry Tool (LDET), transmit it overexisting communications (high frequency (HF) and International Maritime Satellite (INMARSAT)), extract it to amedical situational awareness system (TMCS), view those data in a Web environment on the TMCS server atSystems Center, San Diego (SSC SD), and conduct long-range clinical consultations. Although technicaldifficulties were experienced, the lessons learned from these exercises were evaluated, and solutions to theseproblems were incorporated into the next exercise. One good example of a lesson learned was the use of the

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (272)

wireless LAN to track patients within the MTF.

The exercises also indicated that essential data transport requirements of these mobile technologies can bemet consistently, reliably, and cost effectively. Specific technologies were examined relative to each other forspecific operational requirements of data throughput, transmission distance, time to setup, time to train, andactual costs to acquire, maintain and dispose. Among the significant achievements was the employment of thefive-person mobile TTT, which successfully conducted clinical reachback capability.

Several parameters were not measured directly by the field exercise. These parameters can be determinedthrough future exercises and battle laboratory testing and evaluation methods. For example, analysis still isnot complete on the availability of mobile HF and very high frequency (VHF) radios, the overall reliability of themobile laptops demonstrated, the software reliability of several of the communication modules, and thesustainability of several of the software database applications, hardware components, networks, anddatabases used in the exercise. As new data becomes available through future exercises and battle laboratorytesting, a more complete picture of these advanced mobile applications of telemedicine will evolve.

Testing and evaluation of mobile Telemedicine applications have produced tangible evidence for the militaryutility of these technologies. Results from the field indicate that the essential data collection and disseminationrequirements of these mobile technologies can be met consistently, reliably, and cost effectively. The mobilemodels and architectures demonstrate the potential to enhance data collection and dissemination ofinformation through the use of quality database software and robust, mobile communications infrastructure.Through its efforts, these mobile agents have developed a consistent pattern of progression. From an initialstate of uncoordinated, service-unique solutions to the building of an overall mobile framework, thisarchitectural solution is being developed and refined by several different technological concepts. Theseconcepts have been and will continue to be assessed for operational and technical feasibility. The results fromthese operational and technical assessments will ultimately lead to the development and insertion of anemerging architecture, which will encompass these advanced mobile applications. This first series ofexercises was conducted to test communications methodologies, functionality, and the field utility of collectingand transmitting near-real-time, far-forward medical data and to assess how this improved capability enhancedmedical management of the battlespace. This phase was also used to expand and improve the techniques fortesting and evaluating the proposed technologies and software enhancements specified in the exercises.

Wireless WaveLAN

The WaveLAN system was developed and maintained from commercial off-the-shelf (COTS) wirelessnetworking capabilities for the exercise. All JMO-T participation in this exercise was predicated on the workaccomplished by the engineers to enhance the Lucent WaveLAN II system for military applications. In thisregard, the WaveLAN represented an extension of a LAN via wireless means at data rates in excess of 2million bits per second (Mbps).

Joint Internet Converter (JINC)

The JINC system is a tailored set of software and firmware that is geared toward providing lower bandwidth(i.e., 2.4–64 kilobytes per second (Kbps) data networking capabilities to existing military field radio systems).The basic concept behind JINC system development was to field a "programmable," mobile tactical networkingsystem capable of exchanging digital data between ships, aircraft, combat vehicles, and individual soldiers inthe field. The JINC system was enhanced from an existing COTS product to allow data connectivity betweenany two existing military radio systems without reliance on satellite communications (SATCOM). The intentbehind this configuration was to avoid having the ACTD become involved in procuring and installing newgeneration radio systems. The JINC is composed of three elements operating together—the host computer,Team Care Automation System (TCAS) software, and a Micro-INC data controller device.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (273)

TCAS

The TCAS software installed on the JINC computer host provided automated network connectivity fordistributed facilities, remote users, and individual units all interconnected using existing militarycommunications media. TCAS software is based on object-oriented technology to enhance data exchange atlow bandwidths. Fundamentally, TCAS software operates in two basic modes. The first mode emulates anyspecified data package as an "object" in an object-oriented database structure. Using a common databasedistributed throughout the entire JINC network, the software takes the "objects" and compresses them using aproprietary compression scheme and then transmits the "object" across the RF network. At the receiving node,the object is decompressed and translated back into its original protocol stack prior to delivery; thus, hosts oneither end of a JINC-supported RF network see the expected data format in the form it was transmitted. Usingthis object compression scheme, JINC is able to deliver near full use of available low-bandwidth data links withvery little administrative network overhead.

Micro-INC Data Controller

The Micro-INC (MINC) data controller provided the conversion from RS-232 serial data to a synchronous MIL-STD-1880-114 data stream. Each Micro-INC data controller can support up to two radio systemssimultaneously. This data controller is normally located near the Single-Channel Ground and Airborne RadioSystem (SINCGARS) radio installation to reduce the length of the synchronous cable run. The controllerrequires no external or manual operation to function. All MINC functions are controlled by TCAS software.

Technologies Demonstrated

For this demonstration, a Mobile Medical Monitor (B) (M3B) computer system simulating a MeWS wasconnected to a SINCGARS via the TCAS. A Libretto system running TCAS was connected to a secondLibretto via the WaveLAN Personal Computer Memory Card International Association (PCMCIA) wirelessnetworking devices. Abbreviated discharge summary documents in Microsoft Word format were prepared onthe M3B based on input from the various sensors attached to the M3B. This message was transmitted as a fileattachment to a TCAS freetext email from the M3B to the first Libretto via SINCGARS. The Libretto thenported the data, via preset forwarding rules, from the SINCGARS net over the WaveLAN net to the secondLibretto using the socket interface.

The computer systems selected for the exercise consisted of Libretto 110CTNT computers, which were similarto the 100CT Libretto EUTs. The principal difference was that JMO-T Librettos required the Windows NT 4.0operating system to support the TMCS system. The Librettos used in the exercise generally used Windows95/98. In addition to the basic computer system, each JMO-T EUT was provided with a Quatech four-portserial expander PCMCIA card, which allowed the connection of the PIC reader along with the Garmin 12XLGlobal Positioning System (GPS) device. The second PCMCIA slot on the Libretto was occupied by theWaveLAN II 803.11 PCMCIA wireless network card.

During this exercise, far-forward Hospital Corpsman (HM) transmitted medical information from four far-forward first responder sites to the medical command onboard the USS Coronado. Data was entered via theLibretto 110CT-NT, which was equipped with a PIC Reader and TMCS LDET software. Three stationary siteswere located at Area 41 in Camp Pendleton, California, and one mobile platform, a High-Mobility, MultipurposeWheeled Vehicle (HMMWV), traveled to Yuma, Arizona. Because no specific medical exercise took placeduring the ELB phase, each user was given a set of preprogrammed PICs to scan into the system. The datawere then periodically transmitted.

Initially, the Joint Medical Semi-Automated Forces (JMedSAF) simulation was to be used in conjunction withthe scenario played out on the ground to give the staff onboard the USS Coronado a more robust "picture" ofthe battlespace; however, early in the exercise, it became apparent that bandwidth was at a premium on the

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (274)

network. The demonstration manager, therefore, elected to "shut down" the JMedSAF feed to the USSCoronado to keep essential data feeds open to the Enhanced Combat Operations Center (ECOC). As a result,very little data generated from the simulation runs eventually made its way to the TMCS database. Further-more, the scenario of the "real" battlespace was disconnected from the "virtual" battlespace.

The NVID project was developed and tested to demonstrate proof of concept for replace existing, inefficient,repetitive survey procedures with a fully automated, voice interactive system for voice-activated data input. Inpursuit of this goal, the NVID team developed a lightweight, wearable, voice-interactive prototype capable ofcapturing, storing, processing, and forwarding data to a server for easy retrieval by users. The voiceinteractive data input and output capability of NVID reduces obstacles to accurate and efficient data accessand reduces the time required to complete inspections.

Results

JMO-T operations consisted of sending over 120 patient encounters via the TMCS LDET to the TMCS serverlocated in the ECOC on the USS Coronado. Three nodes were operated by JMO-T personnel during ELB:

HMMWV Mobile Node

Area 41 Node

Yuma Node

Two basic WaveLAN modes of operation were used. The first (and most commonly used) was the "standard"mode, which allowed the EUTs to communicate with the rest of the WaveLAN network via a WavePoint routerconnection, which translated the packets for use by the rest of the network. Because the power output of theindividual WaveLAN card was only 25 milliwatts, the JMO-T EUT had to be located within 1,000 feet of aWavePoint in order to access the network. In practice, this range was extended to as much as 2,000 feet atArea 41, but this was due primarily to a high antenna mast (about 40 feet) for the Area 41 WavePoint antenna.

The other method of operation was called the "ad hoc demo" mode, which was accessed by selecting anoption on the WaveLAN card "properties" window. When activated, this allowed the EUTs to communicatewith each other (i.e., for training) without the need for a WavePoint.

Yuma Node

JMO-T participation at Yuma demonstrated far-forward message reach-back capability. JMO-T was assignedto operate from a WavePoint assigned to a Naval Research Lab (NRL) mobile commercial SATCOM systemmounted in a HMMWV. This SATCOM link provided a 2-Mbps relay directly back to Area 41 at CampPendleton. EUT operational modification only required an IP change. As in Area 41, all JMO-T messaging washandled by a 1/5 Marines corpsman. The system was operated from the back of a vehicle within 200 feet ofthe NRL SATCOM HMMWV. Individual patient encounter messages were transmitted within 5–10 seconds.The ECOC TMCS server was able to be browsed to confirm delivery. Five additional images, including two1.35-MB images, were transmitted via File Transfer Protocol (FTP). Small files were transmitted in 10–20seconds, and large files took 2:20 each. The only operational problem noted was a tendency for the GlobalPositioning System unit to stop sending position information when requested. This was traced to a loose cableon the Quatech serial port card; however, the cable was tightened, and the system returned to normaloperation.

ELB technology provided a number of excellent options for medical communications. When the network wasnot overwhelmed by the demands of Video conferencing, it provided an excellent method of collecting medicaldata—both TMCS textual data and images. During these times, Engineering Integrated Product Team (E-IPT)personnel working with data senders reported that TMCS data was sent in milliseconds, and the large files

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (275)

were transmitted in no more than 5 seconds. Data senders were able to use the handheld computers withease. JMO-T participated in the longest leg of the exercise network by successfully sending TMCS and largedata files from Yuma, Arizona.

The Libretto systems running Windows NT using 64 MB RAM performed satisfactorily; however, when theLDET, TCAS, Serial TCAS, and Medical Messaging Service (MMS) server were all running on one computer,the operation slowed significantly. One solution was to allow TCAS to speak TMCS (or Wave or any othermedical software) in its native mode as a C++ object. Based on this experience, a more effective device forEchelon I use is a Windows CE computer, which weighs less than one pound, can easily fit into a Battle DressUtilities (BDU) pocket, and provides resident software, a user-friendly screen, and a long-life, inexpensivebattery.

Shipboard Node

The NVID node-established criteria for developing a lightweight, wearable, voice-interactive computer capableof capturing, storing, processing, and forwarding data to a server for retrieval by users. The prototype metmany of these expectations. However, limitations in the current state of voice-recognition technologies createchallenges for training and user interface. Integration of existing technologies, rather than development of newtechnology, was the intent of the design. A state-of the-art review of existing technologies indicated thatcommercial, off-the-shelf products cannot yet provide simultaneous walk-around capability and accuratespeech recognition in the shipboard environment. Adaptations of existing technology involved trade-offsbetween speech recognition capabilities and wearability. Specific challenges and problems of the NVIDprototype system that were examined and tested included:

Shipboard operation in tight spaces

Operation in high-noise environments

Data gathering and checklist navigation

Report generation

Access to reference materials

Comment capture capability

Access to task schedule and survey data

User system training

Prototype effectiveness

Shipboard operation in tight spaces. Space and resource constraints on Navy ships make it necessary tocomplete surveys in enclosed, tight spaces. Ease of use, portability, and wearability of the NVID unit whenmaneuvering through these areas were validated based on surveys of military users. A study of theergonomics associated with the use of an NVID computer was also performed. The human factors evaluatedincluded, but were not limited to, the following parameters:

Safety equipment compatibility

Work clothing, including gloves, glasses, and hard hats

Sound suppressors/hearing protection

Respirators

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (276)

Data input comparison and user acceptance (voice command vs. touchscreen) based on the opinions ofNavy personnel aboard ship

User interface evaluation (ease of use)

User comfort

User adjustability

Subcomponent connection procedure

Assessment of mean time to proficiency

Data gathering and checklist navigation. NVID prototype system users were capable of navigating throughsurvey checklists by using voice commands, as well as other computer navigational tools, such as a mouse,touch pad, and stylus. The data collected were then automatically stored in an on-system database. Todetermine whether the system could successfully open each checklist and allow entry and storage of therequired data, a script was developed that thoroughly tested the functionality of the hardware and software.

Report generation. The ability to generate reports and save them as files for downloading or printing wasverified. Tests were performed to verify that the data were captured during inspection procedures and properlyrendered into a usable working report.

Access to reference materials. Users may require access to survey reference materials, schedules, previoussurvey results, or discrepancies found during the survey process. Tests were performed to verify that theapplication software enabled access to designated reference material as specified within each checklist.

Comment capture capability. The NVID application provides the ability to document the inspector's notes viahandwriting recognition, voice dictation, and a touchscreen keyboard. Verification of all three methods of datacapture was performed using a predefined script of repeatable voice commands.

Access to task schedule and survey data. The NVID application software provides the ability to schedule tasksand review past reports. Verification of the software was performed using both voice command andtouchscreen technologies.

User system training. To evaluate the effectiveness of user system training, the amount of training timerequired to achieve the desired level of voice recognition accuracy was first determined. Minimum training forthe voice recognition software was conducted, and the length of time required to complete the training wasdocumented. The system was then operated using a scripted, repeatable set of voice commands, and thenumber of errors was recorded. This process was repeated with additional training until the desired level ofvoice recognition accuracy was achieved.

Recommendations

Based on achievement of the stated objectives, the following recommendations are provided for continuedwireless networking development:

WaveLAN technology appears sufficiently mature to warrant use as a replacement for wired networking atfield MTFs.

A prototype network configuration to support an SC should be devised and prepared for testing.

The following recommendations are provided for continued TCAS software development:

As demonstrated in the exercise, TCAS was based on a C++ Windows 95/98/ NT executable program.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (277)

Operational experience with the Libretto NT system at Echelon I showed the need for a smaller, lightercomputingsystem to support this highly mobile group. The Windows CE operating environment appearsmost suited to this requirement. Port TCAS software into the CE environment is recommended.

The greatest asset (and liability) of the TCAS/J software is its flexibility.

Programming the various communications servers, forwarding rules, and message formats is similar toprogramming a full-featured network router. This implies that a TCAS operator must be both computer literateand network knowledgeable. Simplification of the user interface, perhaps with more graphical networkconnection screens, appears necessary. In addition, the software should feature some type of "system lock"that will keep all settings under a password-controlled environment so that an inexperienced operator cannotchange them by accident.

Continued developmental work is needed to incorporate the full range of medical database-specificmessages into TCAS. Message delivery in the exercise was achieved via a complicated process involvingmultiple serial port data exchange and encoding. This process can be streamlined by the provision of amedical system communications server to the TCAS software developers so that they can test theirmessage servers directly. The following recommendations are provided for continued NVID continuousvoice recognition software development:

Although users reported positive responses to the NVID prototype tested, the device exhibited thelimitations of current speech recognition technologies. The processors in lightweight, wearable deviceswere not fast enough to process speech adequately. Yet, larger processors added unwelcome weight tothe device, and inspectors objected to the 3.5 pounds during the walk-around surveys. In addition, throatmicrophones used in the prototype to limit interference from background noise also limited speechrecognition. These microphones pick up primarily guttural utterances, and thus tended to miss thosesounds created primarily with the lips, or by women's higher voice ranges. Heavier necks also impededthe accuracy of throat microphones.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (278)

Discussion

The following are several of the lessons learned from each of the components of the BPR model:

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (279)

People Lesson

Military commanders, such as the CINC, should be knowledgeable and interact with the operations of JMO-TACTD. The T&E members believe that all of the functional areas have a hands-on approach to IT. JMO-TACTD used IT to redefine its business processes and adopt mobile e-commerce principles to telemedicine.They found that it is much easier to teach the CINC and top military commanders the fundamentals oftechnology than it is to teach technology people about strategic management of the battlespace. In addition,JMO-T ACTD also serves the medical needs of the military's internal personnel. Despite current limitations inspeech recognition technology, the NVID prototype was successful in reducing the time needed to completeinspections, in supporting localreporting requirements, and in enhancing command-level intelligence. Attitudesof the end users toward the device were favorable, despite these restrictions. Users believed that theprototype would save time and improve the quality of reports.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (280)

Environment Lesson

If business processes are dependent on timely, accurate, and complete information, business re-engineeringshould be approached with a strategy that includes information re-engineering. In the contemporary militaryenvironment, information is especially important because it is very information intensive; hence, T&E choose adual strategy of business and information re-engineering as JMO-T ACTD's ideological approach to BPR.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (281)

Methodology Lesson

BPR should be adopted based on a military need and not because "everyone else is doing it." T&E chose toredesign JMO-T ACTD processes because they were concerned about JMO-T ACTD's reputation with the topmilitary commanders and the Senate Committees that fund their operations. Before re-engineering, no methodfor tracking soldiers' medical care in the field or during medical evacuation existed. The costs associated withmedical evacuations was prohibitive, both in terms of lives and money. Reengineering the methodologiesutilized to improve the processes through which the JMO-T ACTDs adopted mobile e-commerce technologiesallows for on-site medical treatment without the fear of helicopter medical evacuations under enemy fire and/orduring poor weather conditions.

Medical evacuations lead to a long cycle time from receipt of the wounded in the field until they could reachproper medical care. Long cycle times translate into increased mortality and morbidity for military personnel.Because JMO-T ACTD allows "real-time" treatment, T&E feels that telemedicine and mobile e-commercetechnologies provide an edge for treating casualities. T&E believes that BPR has given the military that edgeby decreasing cycle times and improving information sharing.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (282)

Information Lesson

T&E believes that it is important to choose a project that must work, so that its success can be sold to the restof the company. Success is hard to resist. If a project is very successful, it will be much easier to get otherdepartments and operational areas involved in BPR. Because the JMO-T ACTD project worked, it allowed themilitary to decentralize its information processing. Medical information processing was taking too long andnegatively impacting soldier well-being; therefore, T&E took action and decided to embark on a major BPRproject to rethink the existing medical information and inventory system and to decentralize medical treatmentin the battlespace. This was a critical process and a risky venture, but the military had no choice. The JMO-TACTD project succeeded because the potential for excellent results far outweighed the risk.

T&E believes that JMO-T ACTD must develop an independent JTF capability package in order to lead the ITre-engineering effort. JMO-T ACTD clients are the entire military. Because the IT capability package managesinformation flow throughout the military battlespace, it must be able to work with military commanders and endusers to "show them the way." In other words, IT people in the JTF give a data view of the entire militaryorganization. They know how the information is distributed to all departments and operational areas and are inan ideal position to work with information users as changes in business processes occur. This is a full-time jobthat requires individuals who are dedicated to carrying out this mission.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (283)

Vision Lesson

BPR projects require support from top commanders and those involved along the process path to succeed. Iftop military management does not formulate a vision for success and visibly support the BPR effort of JMO-TACTD, politics will destroy the project. Most people are afraid of change, and given the opportunity to resistchange, many will do just that. Moreover, changing the way that business is conducted will not be toleratedwithout top-level approval because top military officials are in charge. T&E believes that if those involved in theprocess are not part of the project, they will resist changes and most likely sabotage the BPR effort. After all,they are the ones who will most likely be affected by these changes.

T&E found that very few military personnel or officers know the overall military operational process; however,T&E believes that the JTF capability package must support an innovative approach to telemedicineimprovement projects if it to serve all members of the military. T&E concluded, therefore, that top militarymanagement should form a JTF department and help it to gain knowledge about the military operations that itserves. The best strategy is to assign top military officers into the JTF department to add operational andstrategic knowledge and experience.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (284)

Overall Model Evaluation

The re-engineering project with mobile telemedicine provided many insights into how the military actually dealswith BPR on an enterprise-wide basis. The project uncovered the ideological methodologies used to guideBPR efforts and the technologies used to help implement mobile e-commerce applications for telemedicine.The military radically redesigned T&E processes to improve overall performance. At the same time, they usedtechnology and data warehouse methods to decentralize data management for increased information sharing,to more easily access data by those who need it, and to deliver data, products, and services in a more timelymanner. Thus, their BPR strategy uses an approach to process improvement with information technology andmobile e-commerce applications as a complementary support mechanism.

It is realized that JMO-T ACTD must continue to provide telemedicine service to its military personnel, improvestrategic awareness of the battlespace, and provide excellent information services to commanders and endusers during times of both peace and war. The literature in BPR has not helped in this regard. In addition, itprovides little insight into the complexities of dealing with military re-engineering and information re-engineering simultaneously. Each branch of the armed forces has a different set of problems to deal with.Books and periodicals can only provide basic ideas; therefore, I believe that a new methodology must bedeveloped for dealing with change and process improvement.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (285)

Conclusions

Testing and evaluation of the JMO-T ACTD have produced tangible evidence for the military utility of mobiletelemedicine. Results from Demonstration I indicate that the essential data collection and disseminationrequirements of JMO-T can be met consistently, reliably, and cost effectively. This research focused ondeveloping a holistic model of transformation. The model synthesizes current thinking on transformation into aholistic model and also explains the integrative influence of vision on the other four components of the model.The model was tested by T&E on the JMO-T ACTD. JMO-T ACTD has developed a very successful trainingprogram and is very aware of the importance of planned change. Top military officials are actively involved inchange and are committed to people development through learning. The model served an applied purpose byallowing us to see how well the military organization fit current theory. The model also fit a theoretical purposeby organizing a holistic, comprehensive framework. Accordingly, we have organized and synthesized theliterature into five interrelated components that act as a fundamental guide for research. The model alsohelped us to identify a theoretical link and apply it to the internal operations of mobile e-commerce andtelemedicine in the military.

The ACTD promises the potential to demonstrate technology-enhanced data collection and dissemination ofinformation, through the use of quality software, and robust communications infrastructure. Through its efforts,the JMO-T ACTD has developed a consistent pattern of progression. From an initial state of uncoordinated,service-unique solutions to the building of an overall architectural framework, this architectural solution isbeing developed and refined by several different concepts. Accuracy of speech recognition depended on thetime a user committed to training the device to recognize his or her speech and changes in voice quality dueto environmental or physical conditions. Accuracy rates varied from 85-98% depending on the amount of timeusers took to train the software. Optimal training time appeared to be 1 hour for Dragon Naturally Speakingsoftware and 1 hour for NVID software. In addition, current software interprets utterances in the context of anentire sentence, so users had to form complete utterances mentally before speaking for accurate recognition.As speech recognition technologies evolve, many of these limitations should be addressed.

The views expressed in this paper are those of the author and do not reflect the official policy or position of theDepartment of the Army, Department of the Navy, Department of Defense, or the U.S. Government.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (286)

References

Albers, J. (2000). Successful speech applications in high noise environments. SpeechTEK Proceedings,147–154.

Amabile, T. M. (1997). Motivating creativity in organizations: On doing what you love and loving what youdo. California Management Review, 1, 39–58.

Andrea, D. (2000). Improving the user interface: Digital far-field microphone technology. SpeechTEKProceedings, 155–160.

Bangert, D., Doktor, R., & Warren, J. (1998). Introducing telemedicine as a strategic intent. Proceedingsof the 31st Hawaii International Conference on System Sciences (HICSS-31), Maui, Hawaii.

Barney, J. B. (1991). Firm resources and sustained competitive advantage. Journal of Management,99–120.

Batt, R. (1996). Outcomes of self-directed work groups in telecommunications services. In Paula B. Voos(ed.), Proceedings of the Forty-Eighth Annual Meeting of the Industrial Relations Research Association (p.340). Madison, WI: Industrial Relations Research Association.

Bikel, D., Miller, S., Schwartz, R., & Weischedel, R. (1997). Nimble: A high performance learning namefinder. Proceedings of the Fifth Conference on Applied Natural Language Processing, Association forComputational Linguistics, Washington, DC, 194–201.

Bokulich, F. (2000). JSF [Joint Strike Fighter] voice recognition. Aerospace Engineering Online [online].Available at http://www.sae.org/aeromag/techupdate_5-00/03.htm.

Bourgeois, S. (2000). Speech-empowered mobile computing. SpeechTEK Proceedings, 223–228.

Caron, J. R., Jarvenpaa, S. L., and Stoddard, D. B. (1994). Business re-engineering at CIGNACorporation: Experiences and lessons learned from the first five years. MIS Quarterly, September,233–250.

Charry, M., Pimentel, H., & Camargo, R. (2000). User reactions in continuous speech recognitionsystems. AVIOS Proceedings of the Speech Technology & Applications Expo, 113–130.

Christ K. A. (1984). Literature review of voice recognition and generation technology for Army helicopterapplications (Army Report No. HEL-TN-11-84). Aberdeen Proving Ground, MD: Human Engineering Lab.

Clark, C. E., Cavanaugh, N. C., Brown, C. V., and Sambamurthy, V. (1997). Building change-readinesscapabilities in the IS organization: Insights from the Bell Atlantic experience. MIS Quarterly, 4, 21,

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (287)

425–454.

Cooper, R., and Markus, M. L. (1995). Human Re-engineering. Sloan Management Review, 4, 39–50.

Cummings, A., and Oldham, G. R. (1997). Managing work contexts for the high-potential employee.California Management Review, 1, 22–38.

Dardelet, B. (1998). Breaking the wall: The rise of telemedicine as the new collaborative interface.Proceedings of the 31st Hawaii International Conference on System Sciences (HICSS-31), Maui, Hawaii.

Davenport, T. H. (1993). Process Innovation: Re-engineering Work Through Information Technology.Boston, MA: Harvard Business Press.

Davenport, T. H., and Short, J. E. (1990). The new industrial engineering: Information technology andbusiness process redesign. Sloan Management Review (Summer), 11–27.

Davenport, T. H., and Stoddard, D. B. (1994). Re-engineering: Business change of mythic proportions.MIS Quarterly, 18 (2), +121–127.

Department of Health and Human Services (1989). International classification of diseases (9th revision),clinical modification (3rd ed.). Washington, DC: Government Printing Office.

Doddington, G. (1999). Topic detection and tracking: TDT2 overview and evaluation results. Proceedingsof DARPA Broadcast News Workshop. Herndon, VA.

Drucker, P. F. (1989). What businesses can learn from non-profits. Harvard Business Review,July–August, p. 89.

Ellis, D. (2000). Improved recognition by combining different features and different systems. AVIOSProceedings of the Speech Technology & Applications Expo., 236–242.

Erten, G., Paoletti, D., & Salam, F. (2000). Speech recognition accuracy improvement in noisyenvironments using clear voice capture (CVC) technology. AVIOS Proceedings of the Speech Technology& Applications Expo, 193–198.

Fiscus, J. G. (1997). A post-processing system to yield reduced word error rates: Recognizer output votingerror reduction (ROVER). Proceedings, 1997 IEEE Workshop on Automatic Speech Recognition andSpeech.

Fiscus, J. G., Fisher, W. M., Martin, A. F., Przybocki, M. A., & Pallet, D. S. (2000). 2000 NIST evaluationof conversational speech recognition over the telephone: English and Mandarin performance results.Proceedings of DARPA Broadcast News Workshop, February–March.

Floro, F. C., Nelson, R., & Garshnek, V. (1998). An overview of the AKAMAI telemedicine project: APacific perspective. Proceedings of the 31st Hawaii International Conference on System Sciences

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (288)

(HICSS-31), Maui, Hawaii.

Gaddy, L. (2000a). The future of speech I/O in mobile phones. SpeechTEK Proceedings, 249–260.

Gaddy, L. (2000b). Command and control solutions for automotive applications. SpeechTEK Proceedings,187–192.

Gagnon, L. (2000). Speaker recognition solutions to secure and personalize speech portal applications.SpeechTEK Proceedings, 135–142.

Garshnek, V., & Burkle, F. M. (1998). Telemedicine applied to disaster medicine and humanitarianresponse: History and future. HICSS, 10 (6).

Goodliffe, C. (2000). The telephone and the Internet. AVIOS Proceedings of the Speech Technology &Applications Expo, 149–151.

Gorham, A., & Graham, J. (2000). Full automation of directory enquiries. A live customer trial in the UnitedKingdom. AVIOS Proceedings of the Speech Technology & Applications Expo, 1–8.

Greenberg, S., Chang, S., & Hollenback, J. (2000). An introduction to the diagnostic evaluation ofswitchboard-corpus automatic speech recognition systems. Proceedings of DARPA Broadcast NewsWorkshop, February–March.

Gunn, R. (2000). "Voice": The ultimate in user-friendly computing. SpeechTEK Proceedings, 161–178.

Gupta, B., Nemati, H. R., and Harvey, J. D. (1999). Organizational factors affecting successfulimplementation of decision support systems: The case of fuel management systems at Delta Airlines.Journal of Information Technology Cases and Applications, 1 (3), 4–25.

Hackman, J. R., Oldham, G., Janson, R., and Purdy, K. (1975). A new strategy for job enrichment.California Management Review, pp. 4, 17, 57–71.

Hammer, M. (1990). Re-engineering work: Don't automate, obliterate. Harvard Business Review(July–August), 18–25.

Hammer, M., and Champy, J. (1993). Re-engineering the Corporation. New York, NY: Harper CollinsBooks.

Harkness, W. L., Kettinger, W. J., and Segars, A. H. (1996). Sustaining process improvement andinnovation in the information services function: Lessons learned at the Bose Corporation. MIS Quarterly,pp. 3, 20, 349–368.

Haynes, T. (2000). Conversational IVR: The future of speech recognition for the enterprise. AVIOS

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (289)

Proceedings of the Speech Technology & Applications Expo, 15–32.

Head, W. (2000). Breaking down the barriers with speech. SpeechTEK Proceedings, 93–100.

Herb, G., & Schmidt, M. (1994). Text independent speaker identification. Signal Processing Magazine,October, 18–32.

Hermansen, L. A., & Pugh, W. M. (1996). Conceptual design of an expert system for planning afloatindustrial hygiene surveys. Technical Report No. 96-5E. San Diego, CA: Naval Health Research Center.

Hertz, S., Younes, R., & Hoskins, S. (2000). Space, speed, quality, and flexibility: Advantages of rule-based speech synthesis. AVIOS Proceedings of the Speech Technology & Applications Expo, 217–228.

Holtzman, T. (2000). Improving patient care through a speech-controlled emergency medical informationsystem. AVIOS Proceedings of the Speech Technology & Applications Expo, 73–81.

Hutzell, K. (2000). Voice Interactive Display (VID) Contract Summary Report: Apr 98-May 2000.Johnstown, PA: MTS Technologies, Inc.

Ingram, A. L. (1991). Report of potential applications of voice technology to armor Training. Final Report:Sep 84-Mar 86. Cambridge, MA: Scientific Systems, Inc.

Institute of Medicine. (1996). Telemedicine: A Guide to Assessing Telecommunications in Health Care.National Academy Press: Washington, D.C.

Ives, B., & Jarvenpaa, S. L. (1993). Competing with information: Empowering knowledge networks withinformation technology. The Knowledge Economy Institute for Information Studies, 53–87.

Kangas, K. (1999). Competency and capabilities-based competition and the role of informationtechnology: The case of trading by a Finland-based firm to Russia. Journal of Information TechnologyCases and Applications, 1 (2), 4–22.

Karam, G., & Ramming, J. (2000). Telephone access to information and services using VoiceXML. AVIOSProceedings of the Speech Technology & Applications Expo, 159–162.

Kettinger, W. J., Weng, J. T. C., and Guha, S. (1998). Business process change: A study ofmethodologies, techniques, and tools. MIS Quarterly, 1, 21, 55–81.

Komissarchik, E., & Komissarchik, J. (2000). Application of knowledge-based speech analysis tosuprasegmental pronunciation training. AVIOS Proceedings of the Speech Technology & ApplicationsExpo, 243–248.

Kotter, J. P. (1995). Leading change: Why transformation efforts fail. Harvard Business Review

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (290)

(March–April), 59–67.

Krause, B. (2000). Internationalizing speech applications. AVIOS Proceedings of the Speech Technology& Applications Expo, 10–14.

Kubala, F. (1999). Broadcast news is good news. Proceedings of DARPA Broadcast News Workshop,Herndon, VA, Feb.

Kubala, F., Colbath, S., Liu, D., Srivastava, A., & Makhoul, J. (2000) Integrated technologies for indexingspoken language. Communications of the ACM, 43 (2), 48–56.

Kundupoglu, Y. (2000). Fundamentals for building a successful patent portfolio in the new millennium.AVIOS Proceedings of the Speech Technology & Applications Expo, 229–234.

Lai, J. (2000). Comprehension of longer messages with synthetic speech. AVIOS Proceedings of theSpeech Technology & Applications Expo, 207–216.

Larson, J. (2000). W3C voice browser working group activities. AVIOS Proceedings of the SpeechTechnology & Applications Expo, 163–174.

Leitch, D., & Bain, K. (2000). Improving access for persons with disabilities in higher education usingspeech recognition technology. AVIOS Proceedings of the Speech Technology & Applications Expo,83–86.

Macker J. P., & Adamson R. B. (1996). IVOX—The Interactive VOice eXchange application. Report No.NRL/FR/5520—96-980. Washington, DC: Naval Research Lab.

Mann, S. (1997). Wearable computing. Computer, 30 (2), 25–32.

Markowitz, J. (2000). The value of combining technologies. AVIOS Proceedings of the SpeechTechnology & Applications Expo, 199–206.

Markus, M. L., and Benjamin, R. I. (1996). Change Agentry—The next IS frontier. MIS Quarterly, pp. 4,20, 385–407.

Mata, F., Fuerst, W. F., Barney, J. B. (1995). Information technology and sustained competitivenessadvantage: A resource-based analysis. MIS Quarterly, pp. 487–506.

McCarty, D. (2000). Building the business case for speech in call centers: Balancing customer experienceand cost. SpeechTEK Proceedings, 15–26.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (291)

McGlashan, S. (2000). Business opportunities enabled by integrating speech and the Web. SpeechTEKProceedings, 281–292.

McKenney, J. L., Mason, R. O., and Copeland, D. G. (1997). Bank of America: The crest and trough oftechnological leadership. MIS Quarterly, pp. 3, 21, 321–353.

Miller, R. (2000). The speech-enabled call center. SpeechTEK Proceedings, 41–52.

Mogford, R. M., Rosiles, A., Wagner, D., & Allendoerfer, K. R. (1997). Voice technology study report.Report No. DOT/FAA/CT-TN97/2. Atlantic City, NJ: FAA Technical Center.

Molina, E. A. (1991). Continued performance assessment methodology (PAM) research (VORPET).Refinement and implementation of the JWGD3 MILPERF-NAMRL Multidisciplinary Performance TestBattery (NMPTB). Final Report: 1 Oct. 89–30 Sept. 91. Pensacola, FL: Naval Aerospace MedicalResearch Laboratory.

Morton, S. (1991). The Corporation of the 1990s: Information Technology and OrganizationalTransformation. New York: Oxford University Press.

Mott, D. (1972). Characteristics of effective organizations. San Francisco: Harper Collins, as reported byH. L. Tosi, Jr., and J. W. Slocum, Jr., Contingency theory: Some suggested directions. Journal ofManagement, (Spring, 1984). p. 11.

Newman, D. (2000). Speech interfaces that require less human memory. AVIOS Proceedings of theSpeech Technology & Applications Expo, 65–69.

Oliver, R., Sheng, L., Paul, J. H., & Chih, P. W. (1999). Organizational management of telemedicinetechnology: Conquering time and space boundaries in health care services. IEEE Transactions onEngineering Management, 46 (3), 279–288.

O'toole, J. (1999). Lead change effectively. Executive Excellence, p. 18.

Pallett, D. S., Garofolo, J. S., & Fiscus, J. G. (1999). 1998 broadcast news benchmark test results:English and non-English word error rate performance measure. Proceedings of DARPA Broadcast NewsWorkshop, Herndon, VA, Feb.

Pallett, D. S., Garofolo, J. S., & Fiscus, J. G. (2000). Measurements in support of researchaccomplishments. Communications of the ACM, 43 (2), 75–79.

Pan, J. (2000). Speech recognition and the wireless Web. SpeechTEK Proceedings, 229–232.

Paper, D. (1999). The enterprise transformation paradigm: The case of Honeywell's Industrial Automationand Control Unit. Journal of Information Technology Cases and Applications, 1 (1), 4–23.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (292)

Paper, D., Rodger, J., and Pendharkar, P. (2000). Development and initial testing of a theoretical model oftransformation. HICCS Conference, pp. 325–333.

Paul, D. L., Pearlson, K. E., & McDaniel, R. R. (1999). Assessing technological barriers to telemedicine:Technology-management implications. IEEE Transactions on Engineering Management, 46 (3), 279–288.

Pearce, D. (2000). Enabling new speech-driven services for mobile devices: An overview of the ETSIstandards activities for distributed speech recognition front-ends. AVIOS Proceedings of the SpeechTechnology & Applications Expo, 175–186.

Perednia, D. A., & Allen, A. (1995). Telemedicine technology and clinical applications. Journal of theAmerican Medical Association, 273 (6), 383–388.

Pfeffer, J. (1998). Seven principles of successful organizations. California Management Review, pp. 2, 40,96–124.

Prizer, B., Thomas, D., & Suhm, B. (2000). The business case for speech. SpeechTEK Proceedings,15–26.

Przybocki, M. (1999). 1998 broadcast news evaluation information extraction named entities. Proceedingsof DARPA Broadcast News Workshop, Herndon, VA, Feb.

Rasberry, M. S. (1998). The theater telemedicine prototype project: Multimedia e-mail in the Pacific.Proceedings of the 31st Hawaii International Conference on System Sciences (HICSS-31), Maui, Hawaii.

Rodger, J. A., & Pendharkar, P. C. (2000). Telemedicine and the Department of Defense.Communications of the ACM, 43 (2).

Rolandi, W. (2000). Speech recognition applications and user satisfaction in the imperfect world. AVIOSProceedings of the Speech Technology & Applications Expo, 153–158.

Schalk, T. (2000). Design considerations for ASR telephony applications. AVIOS Proceedings of theSpeech Technology & Applications Expo, 103–112.

Scherr, A. L. (1993). A new approach to business processes. IBM Systems Journal, 32 (1), 80–98.

Schneberger, S., and Krajewski, A. (1999). Common systems implementation at General Motors ofCanada. Journal of Information Technology Cases and Applications, 1 (3), 45–60.

Scholz, K. (2000). Localization of spoken language applications. AVIOS Proceedings of the SpeechTechnology & Applications Expo, 87–102.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (293)

Shepard, D. (2000). Human user interface HUI. SpeechTEK Proceedings, 262–270.

Sones, R. (2000). Improving voice application performance in real-world environments. SpeechTEKProceedings, 179–210.

Soule, E. (2000). Selecting the best embedded speech recognition solution. SpeechTEK Proceedings,239–248.

Sternberg, R. J., O'Hara, L. A., and Lubart, T. I. (1997). Creativity as investment. California ManagementReview, p. 40.

Stromberg, A. (2000). Professional markets for speech recognition. SpeechTEK Proceedings, 101–124.

Talwar, R. (1993). Business re-engineering—A strategy-driven approach. Long Range Planning, 26 (6),22–40.

Tanriverdi, H., & Venkatraman, N. (1998). Creation of professional networks: An emergent model usingtelemedicine as a case. Proceedings of the 31st Hawaii International Conference on System Sciences(HICSS-31), Maui, Hawaii.

Taylor, S. (2000). Voice enabling the Web_ modification or new construction. SpeechTEK Proceedings,69–76.

Teng, T. C., Jeong, S. R., and Grover, V. (1998). Profiling successful re-engineering projects.Communications of the ACM, pp. 6, 41, 96–102.

Thompson, D., & Hibel, J. (2000). The business of voice hosting with VoiceXML. AVIOS Proceedings ofthe Speech Technology & Applications Expo, 142–148.

Topchik, G. S. (1998). Attacking the negativity virus. Management Review, pp. 8, 61–64, 87.

URL: www.actd.tatrc.org

URL: www.actd.tatrc.org

URL: www.odusa-or.army.mil/TEMA/ref.htm).

URL: www.odusa-or.army.mil/TEMA/ref.htm).

Wenger, M. (2000). Noise rejection. The essence of good speech recognition. AVIOS Proceedings of theSpeech Technology & Applications Expo, 51–63.

Wickstrom, T. (2000). Microphone voice recognition performance in noise: A proposed testing standard.SpeechTEK Proceedings, 211–219.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (294)

Wong, W.Y.L. (1998). A holistic perspective on quality quests and quality gains: The role of environment.Total Quality Management, pp. 4, 9, 241–245.

Woo, D. (2000). Desktop speech technology: A MacOS perspective. AVIOS Proceedings of the SpeechTechnology & Applications Expo, 39–50.

Yan, Y. (2000). An introduction to speech activities at Intel China Research Center. SpeechTEKProceedings, 79–82.

Zajtchuk, R. S. (1995). Battlefield trauma care. Military Medicine, 160, 1–7.

Zapata, M. (2000). LIPSinc: We have ways of making you talk. SpeechTEK Proceedings, 273–280.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (295)

Appendix-Mobile Commerce AcronymsACTD Advanced Concept Technology Demonstration

AE Aeromedical Evacuation

AEF Air Expeditionary Force

AELT Aeromedical Evacuation Liaison Team

AFB Air Force Base

AFFOR Air Force Forces

ALE Automatic Link Establishment

AMAL Authorized Medical Allowance List

AMC Air Mobility Command

AoA Analysis of Alternatives

AOR Area of Responsibility

ARFOR Army Forces

ASMB Area Support Medical Battalion

ASTS Air Medical Staging Squadron

ATH Air Transportable Hospital

BAS Battalion Aid Station

BDU Battle Dress Utilities

BMET Biomedical Engineering Technology

BUMED Bureau of Medicine

CG-1 KB Prime

CIA Care in the Air

CINC Commander-in-Chief

CJTF Commander Joint Task Force

CNSP Commander Naval Surface Force Pacific

COA Course of Action

COE Common Operating Environment

COI Critical Operational Issue

COIC Critical Operational Issues Criteria

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (296)

COMPHIBGRU Commander, Amphibious Group

CONOPS Concept of Operations

COP Common Operating Picture

COTS Commercial-Off-the-Shelf

CPG-3 Commander, Amphibious Group-3

CPX Command Post Exercise

CRTS Casualty Receiving Treatment Ships

CSH Combat Support Hospital

CSI Command System, Incorporated

CSS Combat Service Support

C2 Command and Control

C4I Command, Control, Communications, Computers and Intelligence

DAMA Demand Assigned Multiple Access

DC Direct Current

DC II Desert Care II

DEPMEDS Deployable Medical Systems

DNBI Diseases and Non-Battle Injuries

DoD Department of Defense

DII Defense Information Infrastructure

ECOC Enhanced Combat Operations Center

E-IPT Engineering Integrated Product Team

ELB Extending the Littoral Battlespace

EMEDS Expeditionary Medical Service

EMT Emergency Medical Treatment

ENT Ear, Nose, and Throat

EUT End User Terminal

FBE-E Fleet Battle Experiment-Echo

FH Fleet/Field Hospital

FMC Fleet Medical Clinic

FMSS Field Medical Surveillance System

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (297)

FSMC Forward Support Medical Company

FST Forward Surgical Team

FTP File Transfer Protocol

FTX Field Training Exercise

FY Fiscal Year

GICOD Good Idea Cut-Off Date

GMO General Medical Officer

GOTS Government-off-the-Shelf

GPS Global Positioning System

GUI Graphical User Interface

HAZMAT Hazardous Material

HF High Frequency

HM Hospital Corpsman

HM3 Hospitalman Third Class

HMC Hospitalman Chief

HMCS Hospitalman Chief Senior

HMMWV High-Mobility Multipurpose Wheeled Vehicle

HQ Headquarters

ICU Intensive Care Unit

IM Information Management

ICD-9 International Classification of Diseases 9th Revision

IDC Independent Duty Corpsman

INMARSAT International Maritime Satellite

IPT Integrated Product Team

ISDN Integrated Services Digital Network

JHSS Joint Health Service Support

JINC Joint Internet Controller

JMedSAF Joint Medical Semi-Automated Forces

JMeWS Joint Medical Workstation

JMO-T Joint Medical Operations-Telemedicine

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (298)

JSIMS Joint Simulation Systems Acquisition Program

JTF Joint Task Force

JTTP Joint Tactics, Techniques, and Procedures

JV 2010 Joint Vision 2010

kb kilobyte

Kbps Kilobytes per second

KB 99 Kernel Blitz 99

LAN Local Area Network

LDET Lightweight Data Entry Tool

MARFOR Marine Forces

MASF Mobile Air Staging Facility

MB Megabyte

Mbps Million bits per second

MCM Military Command

MEDEVAC Medical Evacuation

MEF Marine Expeditionary Force

MES Medical Equipment Sets

MeWS Medical Workstation

MHS Military Health System

MHz Megahertz

MIEP Medical Information Engineering Prototype

MILNET Military Network

mm millimeters

MMS Medical Messaging Service

MOE Measures of Effectiveness

MOP Measures of Performance

MTF Medical Treatment Facility

M&S Modeling and Simulation

MSEL Master Scenario Events List

M3B Mobile Medical Monitor (B)

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (299)

NAVFOR Navy Forces

NAVHOSP Navy Hospital

NEC Navy Enlisted Classification

NEPMU-5 Navy Environmental Preventative Medicine Unit-5

NIPRNET Unclassified Internet Protocol Router Network

NRL Naval Research Lab

NSHS Naval School of Health Sciences

NVID Navy Voice Identification Device

OPNAV Operations Navy

OR Operating Room

OTH Over-the-Horizon

PACOM Pacific Command

PC Personal Computer

PCB Poly Chlorinated Biphenyls, Pentachlorobenzole

PCMCIA Personal Computer Memory Card International Association

PIC Personal Information Carrier

P-IPT Performance Integrated Product Team

PPE Personal Protective Equipment

PROFIS Professional Filler System

PM 99 Patriot Medstar 99

PW 99 Pacific Warrior 99

RF Radio Frequency

RFTA Reserve Forces Training Area

RSO Regional Supply Officer

SAIC Science Applications International Corporation

SATCOM Satellite Communications

SC Surgical Company

SINCGARS Single-Channel Ground and Airborne Radio System

SPAWAR Space and Warfare

SSC SD Systems Center, San Diego

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (300)

STP Shock Trauma Platoon

SURFPAC Surface Pacific

TAMC Tripler Army Medical Center

TCAS Team Care Automation System

TCEA Theater Clinical Encounter Application

TCP/IP Transmission Control Protocol/Internet Protocol

T&E Test and Evaluation

T&E-IPT Test and Evaluation Integrated Product Team

TMCS Theater Medical Core Services

TMIP Theater Medical Information Program

TTT Theater Telemedicine Team

T2P2 Theater Telemedicine Prototype Program

UHF Ultra-High Frequency

USAF U.S. Air Force

USFK U.S. Forces, Korea

UW Urban Warrior

VHF Very High Frequency

VTC Video Teleconference

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (301)

Chapter 13: Mobile Applications for Adaptive SupplyChains: A Landscape Analysis

Ravi Kalakota, Marcia Robinson, and Pavan GundepudiE-Business Strategies, Inc.

Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without writtenpermission of Idea Group Inc. is prohibited.

Abstract

Streamlining supply chains is a high priority for corporations. In a volatile economy, customer satisfaction,market share and revenue growth become dependent on getting the right product to the right place at the righttime. As a result, the notion of adaptive supply chains is emerging as the next competitive battlefield.Fulfillment velocity, inventory visibility, and supplier coordination versatility form the three pillars of adaptivesupply chains. To support these business objectives, traditional tethered computing models are inadequate.Untethered models, enabled by mobile computing, facilitate the improvement, management and re-design ofnext generation supply chains. In this chapter, we examine the different ways mobility is morphing supplychain applications. Specifically, we show how mobile technology and infrastructure is transforming the keyareas of procurement, supply execution, supply chain visibility and after-sales service management.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (302)

Introduction

Business is going mobile. In a fast-moving world, customers increasingly expect companies, suppliers anddistributors to provide:

Real-time information about their orders,

The location of the product as it moves through the logistics and transportation network, and

Accurate just-in-time delivery commitments.

These escalating customer demands are forcing corporations to adopt mobile technology to optimize andstreamline the information, product and financial flows in the supply chain.

Clearly, as traditional supply chains become faster and faster, management issues like real-time visibility,control and flexibility become germane. Supporting these management objectives through the traditionaltethered computing model is very difficult (if not impossible). As a result, leading companies are looking atinnovative mobile solutions to enable their next generation supply chains. In this chapter, we illustrate theemerging landscape of mobile supply chain applications.

However, before we get into the specifics of mobile supply chain solutions, it is necessary to provide thecontext by illustrating the broader economic trends that are shaping next-generation supply chains.

Adaptive Supply Chains—Enabling Visibility, Velocity and Versatility

Streamlined supply chains create business value in the form of increased efficiency, low prices, and broadproduct selection. However, uneven demand, more frequent and shorter order-to-shipment times, and strictercustomer compliance requirements are key variables that are shaping twenty-first-century business practices.Thus, modern supply chains must create value through their flexibility (Kalakota and Robinson, 2001). Theirdesign must accommodate a customer changing his or her mind after placing the order. This is the essence ofan emerging concept called adaptive supply chains.

As a result, a major trend today is the use of Internet and enterprise technology to increase supply chainvelocity—the fast and accurate collection and manipulation of information—while maximizing service levels.The basics of supply chains such as purchase orders, invoices, advanced ship notices (ASNs), and bills ofmaterial are still the same. They are just being handled more quickly, more cheaply, and more accuratelythrough the Internet.

Another trend is the replacement of inventory with information. The real-time transfer of inventory informationhelps companies create a more realistic demand picture. Under today's practices, order information is sent towarehouses, distribution centers, and retail stores in batches by telephone, fax, e-mail, or EDI. Since orderinformation isn't matched with demand in real time, manufacturers often get caught in the "bullwhip effect,"making too little product, then too much, in an attempt to keep up with the fluctuating market. The businesschallenge is to monitor demand effectively to able to synchronize actions along the supply chain.

The need for faster and more accurate fulfillment is also causing supply chain coordination problems. Forexample, as e-commerce became popular, JCPenney decided to minimize shipping time. So it askedmanufacturers to ship direct to the customer instead of its central warehouse. Consequently, eachmanufacturer's function had to begin shipping to several thousands customer locations instead of a fewwarehouses. Also, this meant that the manufacturer was looking at item picks, small package shipments, andpriority handling—all new processes they did not have to deal with before. Clearly, faster end-to-end orderprocessing is dramatically affecting product handling and logistics.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (303)

The three trends—fulfillment velocity, inventory visibility, and coordination versatility—are laying the foundationfor adaptive supply chains. Mobile applications are playing a central role in the enabling of that foundation.Supply chain processes in companies today are desktop-centric. That is, processes from the receiving dock,production, and shipping areas slowly make their way to a desktop before resuming their natural flow. Mobiledevices are deconstructing desktop-centric workflows. Figure 1 illustrates the application of different mobiledevice capabilities for different supply processes.

Figure 1: Mobile device capabilities

Trends Driving Mobile Applications in Supply Chains

Customers are impatient. The order-to-delivery time is often longer than the customer is prepared to wait.Several market trends are driving mobile investments to shorten lead-time.

Streamlining the order-to-cash process. Customer orders drive supply chains. The complexity of theordering process and the need for order information upstream to support supply chain planning hasresulted in unusual pressure to streamline the entire order-to-cash process.

Coordinating the order-fulfillment process. Customer demand for faster and more customized deliveryhas disrupted traditional inventory management policies and transportation models. Successful orderfulfillment requires local, regional, national, and global coordination, which itself requires sophisticatedsynchronization of multiple distribution channels.

Better asset tracking and utilization. Customers are demanding greater visibility into the supply chainexecution processes for real-time order status information. As a result, companies are investing more inreal-time asset tracking to achieve inventory reductions, eliminate sources of order-fulfillment variance,reduce leakage, and cause fewer returns.

More responsive service management. Lower profit margins to maintain and increase market share aretoday's mandate. In response, companies are redesigning post-sale service and support functions toeliminate unnecessary tasks and reduce process complexity. The benefits include reducing delays, errors,and cost. For example, reverse logistics is an area of increasing focus.

Figure 2 shows the four major segments where mobile solutions will significantly impact supply chains.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (304)

Figure 2: Supply chain framework

Mobile Procurement

Traditional paper- and fax-based processes do not provide real-time visibility into the order-to-cash cycle. Inretail, for example, the data on what was on the store shelves takes days or even weeks to make its way backto the manufacturers. This makes it difficult to match production schedule to actual demand. Three types ofmobile applications are enabling the order-to-cash cycle: order and transaction enablers, approval workflowenablers, and receiving and payment enablers.

Order and Transaction Enablers

Supply chains are increasingly market-driven, capable of reading and responding to real customer demand. Insupport of this trend, new mobile applications are changing the face of order taking.

Kroger, the largest grocery chain in the United States, with the help of PocketScript has built an electronic-prescription interchange (PR Newswire, Jan. 12, 2001). Using a handheld device, physicians send e-prescriptions directly to any Kroger-owned pharmacy. The system is expected to reduce the number of illegiblehandwritten prescriptions and thus decrease the time spent by the pharmacies in making callbacks tophysicians to verify prescriptions' contents.

Approval Workflow Enablers

Workflow applications such as document approval, expense reporting, payment, and purchase orders areanother area to which mobile innovations are bringing considerable benefit.

In particular, keeping track of orders being placed is a priority at many companies. But current e-procurementapplications require the approver to be at the office and by the desktop. Mobile applications relax the tetheredconstraint and allow the approving manager to authorize a requisition from anywhere, at anytime.

Critical purchase orders, such as those impacting important customers or projects, no longer must wait in aqueue until the manager returns or be expedited as an exception because the approval process is slow.Exception purchases often prove expensive because the purchase is rushed and a lower price or morefavorable shipping terms can't be negotiated with the supplier.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (305)

Receiving and Payment Workflow Enablers

While many companies are focusing their efforts on implementing mobile solutions to improve their orderworkflow, they are ignoring the need to bring the same types of solutions to two processes: receiving andaccounts payable. Most companies still work with 60- to 120-day payment cycles. Errors made during thereceipt of products can easily dissipate the efficiency gains from improvements to the front end of theprocurement process.

With the compression of the supply chain, receiving and inventory put-away processes are being reexaminedto save time, cut costs, reduce inventory, and speed up service to customers. To improve efficiency, corporatereceiving departments are using mobile scanners. Over the past twenty years, handheld technology hasadvanced well beyond simple scanning. For example, today's handhelds can download the original PO at thetime the shipment is received, allowing the checker to display each item and confirm its receipt. Verifying thereceipt of all purchase-order items initiates the accounts payable process.

Mobile Supply Chain Execution

Supply chain execution—the process of fulfilling customer-specific needs for goods and value-added servicesin a timely, efficient, and cost-effective manner— is a key differentiator in increasingly competitive markets.

Traditionally, mobile applications were used extensively in warehouse and transportation operations. Thefocus is now shifting to integrating these operations with corporate planning systems and other enterprisesoftware. The result of this trend is new applications of mobility in three key business functions: warehousingand inventory management, inbound logistics and transportation, and outbound finished-products distribution.

Mobility in Warehousing and Inventory Management

Warehousing and inventory management seek to minimize inventory risk and out-of-stock situations, andmaximize inventory turns. These strategies track and manage the movement of product from the supplier tothe customer. They focus on providing exceptional customer service and faster, more accurate order delivery.

Mobile solutions increase the efficiency of the warehouse operations. Bar code scanners are used to trackpallets of inventory that are shipped and received, providing an accurate, real-time count of on-hand amounts.For instance, when product comes into the receiving bay at the warehouse, the bar code tag containingproduct description, quantity, lot number, and pallet number is scanned. The information is then instantlytransmitted to a warehouse PC and corporate server. The PC processes the data and generates a put-awaylist, indicating the warehouse storage location. This put-away task is automatically downloaded to theappropriate forklift operator, who retrieves the pallet of product and places it in the required location.

Inventory management also occurs at the store level. It involves the counting of items on shelves twice a year.The cost of this exercise can be staggering for a grocery retailer like Kroger with more than 1,500 stores. Tospeed up the process and also make it more accurate, industrial handheld computers (HHC) with laserscanners are used. Important information is collected instantaneously, eliminating manual rekeying andvolumes of paperwork.

Mobility in Transportation and Logistics

Widely dispersed assets, tight delivery schedules, and minimal room for process error characterize today'slogistics and transportation industries. Mobile applications provide customers with the ability to track theirshipments across a network of multimodal transportation.

The USPS moves millions of parcels across international borders. Unlike UPS or FedEx, each of which has its

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (306)

own fleet of jets, it relies on a variety of third-party logistics (3PL) providers to move mail. USPS developed aperformance-tracking mobile system to monitor the airline carrier and shipment delivery performance. Usinghandheld scanners, ramp clerks automatically enter data for each mail container and synchronize, via anethernet connection, with corporate databases, eliminating manual data entry and the need to interprethandwriting. The system enables the tracking of any mail-handling irregularity, such as an airline's failure toload a bag of mail onto a plane.

Mobility in Distribution "Last Mile"

Distribution management oversees the end-to-end process of transporting goods from manufacturers todistribution centers to the consumer. Mobile applications give distributors faster access to shipping, tracking,and delivery data.

Kraft Foods uses handheld computers to capture delivery quantities for the products it sells. When deliveringan order to the back door receiving area of a local supermarket, a Kraft truck driver unloads the shipment andthen records any changes to the order in the handheld. In cases where the supermarket chain supports EDIback door receiving, the driver connects the handheld computer directly to the supermarket's computer systemand transfers the delivery data. When the driver returns to the distribution center, the daily transaction data isuploaded from the handheld into the company's back-end systems and any updated delivery information forthe next day's route is downloaded.

Global Positioning Satellites (GPS) and Automatic Vehicle Location (AVL) mobile technologies hold significantpotential for the delivery industry. They will allow firms to have continuous contact with their drivers and to mapdelivery routes. For example, Roadnet and Descartes routing systems use a satellite geocode to plotcustomers on a longitude and latitude grid and calculate the most logical delivery route. This tool also enablestruck dispatchers to know where drivers are at all times.

Supply Chain Visibility

To better monitor and optimize asset utilization, customers want visibility into inventory in motion and inventoryat rest, and a real-time view of their assets. Customers also want immediate notification when supply chainperformance fails to meet delivery terms and service agreements.

Supply chain visibility requires the technological ability to match a unique customer transaction with thatcustomer's products as they flow through the supply chain. This matching process is often done manually orthrough visual inspection and increases the potential for error. Today's companies are seeking technologiesthat, using either a customer serial number or pallet ID, enable the tracking of products from the originalproduct components to the product's receipt by the customer.

Bar Code

The need to improve supermarket efficiency has led to the bar code's creation in 1970. [1] The UniformProduct Code (UPC) system assigns each type of food or grocery product a unique code represented by asmall rectangle of black and white bars. Automated checkout stands contain technology capable of processingthe code. The system thus provides a standard product identifier for all packaged foodstuffs, regardless ofwhere the products were manufactured or sold.

The bar code has enabled the creation of important new applications ranging from tracking customer buyinghabits to managing inventory. For example, bar code technology was key to breakthroughs such as EfficientConsumer Response (ECR) and Quick Response (QR). These technologies capture on-demand data usingpoint-of-sale or point-of-use devices. ECR and QR transformed the retailer's ability to hear the voice of themarket and to respond directly to it. Bar codes are a case in which technology sought markets, markets found

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (307)

unappreciated properties, and retailers exerted themselves to translate properties into supply chaincapabilities that resulted in tremendous value.

RFID Tags and Auto-ID

In recent years, new applications have been developed that complement barcode functionality. Theseapplications permit the tagging and tracking of physical goods. For example, Radio Frequency ID (RFID) tagsalong with tag readers, known as "interrogators," allow companies to track products and materials. RFIDsystems use low-power wireless signals to read and update information on a "tagged" item or component.Unlike bar codes, the signals don't require line of sight or manual scanning.

Burlington Northern Santa Fe Corp., a railway line, used to employ an army of some 500 clerks armed withpencils and clipboards to walk up and down the tracks at its depots and switching stations to read numberspainted on the sides of its railway cars. The information was then handed to data entry personnel who wouldkey it in, so the company's mainframe systems could track cars.

Today, all of the company's rail cars are tagged, and it has 443 readers positioned at key junctures along33,500 miles of track in 28 states and two Canadian provinces. As a result, the company eliminated all of itstrackside clerks in 1997. Now, the system has paid for itself, and it reads 100,000 tags a day with virtually noerrors. Burlington can provide customers with more accurate data about where their shipments are. Thesystem has also dramatically reduced track delays. In the old days, when a car was out of place, people hadto spend hours trying to figure out where it should be, and that caused delays throughout the system. Today,that's almost never a problem (Roberti, 2002).

A recent extension of the RFID method is the Auto-ID technology. MIT's Auto-ID Center has developed anumbering scheme—the "Electronic Product Code"—that is embedded in a microchip with wireless antennas.The microchip transmits a unique item-level product code signal when exposed to energy from a reader. Thiscode identifies products individually, not just by product type, as today's UPC codes do. When the Auto-IDreaders lining warehouse or retail store shelves intercept a tag's radio signal, which contains the product code,they use the code to identify the product and track it as it flows through the supply chain. [2] Proctor & Gamblein collaboration with Wal-Mart is piloting this technology to track products from factory floor to store shelvesand prevent sudden out-of-stock shortages (Roberti, 2002).

The bar code, RFID, and Auto-ID technology extend visibility more deeply into supply chain performance.However, despite today's sophisticated technology, successfully managing supply chain visibility andperformance hinges on the accuracy of transaction data captured at the line level.

Supply Chain Event Management

Asset utilization and quality improvements are the focus of many supply process efforts to achieve sustainablegrowth. To reduce supply process defects, companies are increasingly focusing on Supply Chain EventManagement (SCEM) tools that enable better visibility through more real-time event monitoring and datacollection.

Savi Technology, a SCEM vendor, for example, enables every supply chain event across land, sea, and air tobe tracked and monitored in real time. The objective is to enable immediate responses to unexpected events,preventing time-critical, expensive catastrophes from occurring. The Savi platform collects data and translatesit into meaningful supply chain information about assets, inventory, shipments, and orders. The data collectionis done by leveraging existing EDI data and legacy interfaces, or tracking in real time via RFID or GPS/cellularlocating systems.

In 1990, the U.S. DoD was preparing for war. The Army shipped 40,000 containers to the Persian Gulf forOperation Desert Shield (later called Desert Storm), then had to open up 25,000 of them to see what was

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (308)

inside. The Army estimated that if an effective RFID way of tracking the location and content of the cargocontainers had existed at the time, the DoD would have saved roughly $2 billion. [3]

Mobile Service Management

Service delivery is the final task in a finished-goods supply chain. A variety of new mobile applications arecurrently being deployed to increase asset utilization and speed of service delivery functions.

Sears Roebuck, for example, wanted to maximize the time employees spent with the customer. It is giving itsstockroom staff and salesclerks handhelds for inventory tracking, shipping, receiving, and price checks, thusreducing the number of their trips to the stockroom for inventory checks. Also, the handhelds' simple interfacehelps compress new hire training time (Wagner, 2001), which is important because workforce turnover in theretail industry is high.

Service companies are positioning themselves to help meet customers' demand levels of product quality andservice performance by offering solutions in three primary service areas: reverse logistics, field forcemanagement, and mobile dispatch.

Reverse Logistics

Reverse logistics manages the movement of goods back through the supply chain from the customer to theirpoint of origin in the most efficient and cost-effective way possible. Generous product warranties have resultedin a growing trend of customers returning products. However, supply chains are designed for products andservices to flow in one direction only—downstream to the customer.

As a result, product returns, whether due to a product defect, spoilage, or a customer changing his or hermind, present significant challenges for a business process optimized to move products forward. In addition tothe strain they place on the supply chain, returns also impact company financials since they must bereconciled with the company books as the purchase transaction is reversed.

Webvan, the now defunct home delivery service, tried to deliver a high-quality customer experience by usinghandhelds to track deliveries, client accounts, and other information. When couriers went into the distributioncenter to pick up their deliveries for the day, all the information they needed was downloaded into a mobilehandheld. When the delivery person arrived at the customer's home with the order, the mobile handhelddisplayed the customer's name, address, phone number, and the items included in the order. During the drop-off, if the customer wished to return certain products, the delivery person entered the information into thedevice and generated an instant credit that is applied against the new bill. The driver also had a small printer,which printed out an updated customer receipt (Gonzales, 2001). The entire returns process was easy andconvenient. Result: high customer satisfaction.

Field Service and Service Parts Management

Field service companies, from small repair businesses to large corporations, are seeking to automate thecostly, unproductive and paper-intensive processes associated with performing field service. The improvementefforts focus on every major field service process, including communicating with company headquarters,receiving work assignments, completing work orders, submitting billing information to accounting, and orderingparts.

The primary goal of these efforts is to increase field technician productivity by removing mundane and time-consuming data-entry tasks. Immediate invoicing updates also greatly improve cash flow and enable billing tobe accomplished in hours or days rather than weeks. Billing clerks no longer waste time entering jobinformation. This reduces data-entry errors, further speeding up the billing process.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (309)

The American Automobile Association (AAA) is one of the largest providers of roadside assistance, with amembership of more than 45 million people. In the past, AAA used a two-way radio system to dispatch its fieldunits. However, only limited amounts of information could be transmitted to the company's fleet vehicles andfield contractors. Using two-way radios also resulted in recurrent miscommunications between dispatchers anddrivers, ultimately increasing customer waiting time.

AAA initiated a mobile strategy to reduce customer wait time by up to fifteen minutes per call in some regions.[4] Under the new mobile system, customer assistance calls are wirelessly routed over the Cingular Network tothe nearest call center. The call center verifies the caller's membership and obtains other incident information.Incident details are then forwarded to the RIM 950 Wireless Handheld of the closest available driver. Anestimated 2,100 AAA fleet vehicles are equipped with the service.

Field service processes can also be improved through the deployment of telemetry applications. Theseapplications use wireless modems installed in equipment assets from computers to elevators at the customer'slocation to replace expensive dial-up lines or private data networks. Many organizations can use telemetry tomonitor remote equipment such as vending machines, security systems, and meter readers. Telemetryapplications proactively monitor the status of equipment assets by sending an alarm when certain presetthreshold conditions are reached. The result is automatic dispatching in near real time, reduced field servicemanagement costs, and faster service.

Vehicle Dispatch Solutions

Vehicle dispatch and identification applications complement field service solutions. Mobile applications incivilian emergency, such as police, fire, and ambulance, allow officers to obtain real-time information fromlocal, state, and national databases. Onboard devices give law-enforcement officers remote access to filedincident reports and other paperwork. Ambulances are enabled with applications used to transmit patient databefore the vehicle arrives at the hospital, which reduces time and thus saves lives.

Mobile solutions for non-emergency service such as taxi, shuttle, private fleets, and couriers are also growing.BostonCoach, provider of high-quality luxury vehicle service with 935,000 rides a year in 450 cities, is entirelyreservation-based. The company uses the same computerized reservation systems that travel agents use andalso takes reservations via its website. BostonCoach passengers—typically corporate employees with a travelaccount—simply sign a voucher at the end of their ride. No payment is accepted or tipping allowed in aBostonCoach vehicle.

In its early years, BostonCoach used traditional methods—voice radio—for linking drivers and dispatchers. Butby 1993, there were simply too many drivers vying for the limited radio bandwidth space. Drivers trying to getan open channel to call dispatchers often experienced delays, and deciphering directions garbled by staticradio transmissions was frustrating. The problem became a major concern for the company's reputation as areliable, high-quality service.

To solve the problem, BostonCoach upgraded its communications technology by installing mobile dataterminals (MDTs) in each vehicle. The MDTs allowed drivers to communicate directly with a host computersystem, freeing dispatchers to devote more time to ensuring efficient use of the fleet. But they provedexpensive, limited in functionality, and used proprietary operating systems and hardware. The bulky terminalswere not portable, which was a major disadvantage at locations, particularly airports, where meet-and-greetdrivers needed to leave their cars.

To support the company's growth and improve efficiency, BostonCoach developed a new system usinghandhelds running Windows CE. [5] The system is small, mobile, and easily removed and operated, allowingdrivers to carry the unit with them when they are out of the vehicle greeting customers. It also functions on aubiquitous wireless network, not constrained by one wireless provider or mobile service with limited servicecoverage.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (310)

At the end of each ride, the trip's data is sent via a wireless modem to the dispatch office over the wirelessnetwork. It takes only a few seconds from the time the driver presses the "send" button until the systemacknowledges receipt of the data. Ride billing data is transferred directly from the driver's data terminal intothe back-office systems, which ensures that customer billing is done quickly and accurately.[1]For a comprehensive history of bar codes see Leibowitz, 1999, and Brown, 1997.

[2]For more information on Auto-ID, see the website: auto-id.mit.edu. For more on tagging technology see thewebsite: www.aimglobal.org.

[3]Source: www.savi.com/index.html

[4]For more specific details on the implementation see case study: AAA by Cingular Interactive Data Services(www.bellsouthwd.com).

[5]For more technical information on the Boston Coach solution see Dynamic Mobile Data(http://www.dmdsys.com/).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (311)

Conclusion

In today's hyper-competitive environment, management focus is shifting to streamlining supply chains. Asmarket share and revenue growth become dependent on getting the right product to the right place at the righttime, the notion of adaptive supply chains is emerging as the next competitive battlefield.

Adaptive supply chains represent the ability of supply chains to rapidly react and readjust to environmentalchanges and supply and demand fluctuations. Fulfillment velocity, inventory visibility, and coordinationversatility form the three principles of adaptive supply chains. Mobility represents a key enabler for designingand implementing real-time supply chains built on these principles. Automating customer and supplierrelationships means upgrading existing systems architecture, infrastructure, and applications from their currentPC-centric orientation to one that supports multidevice capabilities like handhelds, RFID devices and WirelessLANs.

However, research on the implications of mobile applications for supply chains today is nascent, almostnonexistent. We conclude by highlighting a few important research questions that need to be addressed:

Do emerging mobile technology innovations impact existing supply chain operational strategies such asVendor Managed Inventory (VMI), Continuous Replenishment, Cross-Docking, etc.?

How can mobile technology reduce or eliminate the "bullwhip effect" through better visibility?

What is the impact of mobile technology on inventory management? Will inventory buffers be significantlyaffected by the availability of information from mobile devices?

In summary, we expect that companies in many industries must evolve their supply chain strategies toaccommodate increasingly complex issues, including guaranteed delivery of products on a daily basis, thechallenge of globalization, and the ability to respond quickly to changes in market demand and competition. Itseems intuitively obvious that increasing the quality and speed of information along the supply chain is astrategy that most companies will adopt.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (312)

References

Adshead, A. (2001). E-supply chain savings are more than just dotcom hype. Computer Weekly, May, p.20.

Brown, S. A. (1997). Revolution at the Checkout Counter: The Explosion of the Bar Code. HarvardUniversity Press.

Gonzales, A. (2001). Electronics keep delivery services on right track. San Francisco Business Times, 15(33), 29.

Kalakota, R., and Robinson, M. (2001). M-Business: The Race to Mobility. McGraw-Hill.

Leibowitz, E. (1999). Bar codes: Reading between the lines. Smithsonian, 29, 130.

PR Newswire, Kroger and PocketScript to launch electronic prescription inter-change service for in-storepharmacies, January 12, 2001.

Roberti, M. (2002). RFID: From just-in-time to real-time, CIOInsight, April 12.

Wagner, M. (2001). Handhelds nudge PCs in the enterprise. InternetWeek, May 14.

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (313)

Endnotes

1 For a comprehensive history of bar codes see Leibowitz, 1999, and Brown, 1997.

2 For more information on Auto-ID, see the website: auto-id.mit.edu. For more on tagging technology see thewebsite: www.aimglobal.org.

3 Source: www.savi.com/index.html

4 For more specific details on the implementation see case study: AAA by Cingular Interactive Data Services(www.bellsouthwd.com).

5 For more technical information on the Boston Coach solution see Dynamic Mobile Data(http://www.dmdsys.com/).

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (314)

Index

Aabsence of killer application(s) 10

access time (AT) 78, 86

active models 199

adaptive supply chains 298

Advanced Forward Link Triangulation (AF-LT) 174

advanced ship notices (ASNs) 299

anomalous states of knowledge (ASK) 206

approval workflow enablers 302

architecture evolution 196

area of responsibility (AOR) 262

asymmetric cryptographic algorithm 22

Australasian Performing Right Association Limited 98

authentication 22

authentication of the merchant 20

auto-ID 305

automatic vehicle location (AVL) 304

avoidance of chronic starvation 83

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (315)

Index

Bbandwidth 242

bandwidth access 12

bar code 305

base stations 76

bill database 105

broadcast disks (BD) 93

broadcast manager 58, 59

broadcast structure 80

business models 157

business to business (B2B) 208

business to consumer (B2C) 208

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (316)

Index

Ccache invalidation report 117

cache manager 130

cascading style sheets (CSS) 210

categorization 239

CDMA (code-division multiple access) 12

cell of origin (COO) 174

central processing unit (CPU) 208

certificate authority (CA) 23

checkout and registration 239

CIR (Cache Invalidation Report) 126

circuit-switched service 5

commercial-off-the-shelf (COTS) 262

common gateway interface (CGI) 212

commutative operations 51

composite capability/preference profiles (CC/PP) 224

confidentiality 22

conflicts 51

constant broadcast size (CBS) 80, 83

constant broadcast size strategy 83

content adjustment 207

content database 105

content provider 10

conventional voice channel 107

current market 191

customer service 239

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (317)

Index

Ddata blocks 80

data cluster of interest (DCI) 81, 85

data integrator 60

database transactions 50

DCOM 114

decouple 54

Defense Information Systems Network (DISN) 262

delivery entity's terminal 40

digital libraries (DL) 217

digital rights management (DRM) 98

digital signature 22

doze (standby) mode 77

drop groups (DG) protocol 90

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (318)

Index

EeCyberPay 105

EDGE (Enhanced Data GSM Environment) 5

electronic data interchange (EDI) 156

electronic music management system (EMMS) 99

end-user terminal (EUT) 274

enhanced observed time difference (EOTD) 174

enterprise information architectures 196

eXtensible HyperText Markup Language (XHTML) 212

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (319)

Index

FFederal Communications Commission (FCC) 12

Field Medical Surveillance System (FMSS) 261

field service 307

fixed hosts 76

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (320)

Index

Ggeneral packet radio service (GPRS) 215

geographic mobility domain 76

geographical entity 157

global designer 146

Global Positioning Satellites (GPS) 304

Global Positioning System (GPS) 8, 261

Global System for Mobile Communication (GSM) 215

global transaction 53

Global Transaction Processing 64

group invalidation report (GIR) 117

GSM (Global System for Mobile communication) 28, 30

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (321)

Index

Hhandheld devices 235

high frequency (HF) 275

homepage 239

HyperText Markup Language (HTML) 167, 210

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (322)

Index

Iidle period downlink (IP-DL) 174

ignore factor (IF) 83

independent duty corpsmen (IDCs) 267

index segments 80

information access component 89

information and communication technology (ICT) 191

information delivery 89

information management (IM) 262

information retrieval systems (IRS) 217

information server 79

integrity 22

Intel software integrity system (ISIS) 99

interaction machine 195

interest groups 146

investment risk 12

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (323)

Index

JJoint Internet Converter (JINC) 276

Joint Task Force (JTF) 262

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (324)

Index

Kknowledge agent (KA) 220

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (325)

Index

Llegal bodies 146

license database 105

license management 102

limited storage and processing power 103

local transaction 56

location-dependent queries 47

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (326)

Index

Mm-commerce 105, 237

mechanical right 98

Medical Equipment Sets (MES) 260, 272

MetaTrust 99

Micro-INC Data Controller 277

micro-mobility 192

middlewares 114

mixed mode 83

mobile and voice commerce 258

mobile architecture 75

mobile commerce vi, 2, 258

mobile data terminals (MDTs) 309

mobile devices limitations 11

Mobile Electronic Transaction Forum 138, 164, 166

mobile environment 45

mobile network provider 10

mobile procurement 302

mobile search engine (MSE) 216

model-driven architectures (MDA) 200

monochronicity 193

Moving Picture Experts Group (MPEG) 99

MP3 channel 102

music sharing 107

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (327)

Index

NNational Institute of Standards and Technology 263

navigation 177, 239

nonrepudiation 22

Normalized Energy Expenditure (NEE) 87

NTT DoCoMo 103

NTT DoCoMo i-mode 104

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (328)

Index

Oobject invalidation report (OIR) 117

observed time difference of arrival (OTDOA) 174

open mobile architecture (OMA) 148, 166

optical character recognition (OCR) 213

order and transaction enablers 302

orientation header (OH) 91

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (329)

Index

Ppayment 103

payment workflow enablers 302

performing rights 99

periodicity 83

personal area network (PAN) 139

personal digital assistants (PDA) 138, 206

personal identification card (PIC) 262

personal information carrier (PIC) 261

personal trusted devices (PTD) 138, 151

personalization 195

pocket PCs 235

popularity consciousness 83

popularity factor (PF) 83

predicate match (P-Match) approach 124

Predictive cOmposition Based On eXample (POBox) 214

priority computation 84

product information 239

public-key cryptography standards (PKCS) 22

purchase orders 302

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (330)

Index

Rradio frequency ID (RFID) 305

ReadObject (ID) 123

Recording Industry Association of America (RIAA) 99

residence latency (RL) 77

RFID Tags 305

rights enforcement 103

rights insertion 103

rolling inventory 177

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (331)

Index

Sseamless integration 13

search engine (SE) 216

second-generation (2G) digital network 5

secure access control 79

Secure Digital Music Initiative (SDMI) 99

secure socket layer (SSL) 24

selective auto-tuning 79

selective dual-report cache invalidation scheme 117

self-answerability 49

self-locating 174

serializability 50

service delivery 307

service parts management 307

shipboard node 280

shopping cart 239

signatures 122

SIM application toolkit (SAT) 31

social mobility 192

spatial mobility 192

spheres of concern 143

standardization bodies 146

stateful server 77

strategy changes 11

subscriber identity module (SIM) 178

supply chain visibility 304

symbolic analysts 193

synchronisation right 98

syntactic elision 210

system architecture 55

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (332)

Index

TTCAS 276

TDMA (time-division multiple access) 12

technical domain 146

telemedicine vi, 258

test and evaluation (T&E) 259

text on 9 keys (T9) 214

Theater Medical Core Services (TMCS) 261

TheaterTelemedicine Teams (TTTs) 268

third generation mobile system (3G) 208

transaction controller 58, 59

transaction coordinator 58

transaction manager 57

transaction server 56

traveling 193

trusted third party (TTP) 37

tuning time (TT) 78

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (333)

Index

Uundesirable transactions 61

Unified Modeling Language (UML) 143

Uniform Product Code (UPC) 305

Uniform Resource Locator (URL) 211

Universal Mobile Telecommunication System (UMTS) 217

usability 236

user database 105

user distrust 11

user interface design 196

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (334)

Index

Vvalue-added applications 3

variable broadcast size (VBS) 80, 83

verification of the goods 20

Vitaminic 102

voice activation applications vi, 258

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (335)

Index

WWAP phones 235

weapons of mass destruction (WMD) 261

Windows Media Rights Manager 99

wired network 76

Wireless Application Protocol (WAP) 29

wireless applications 240

Wireless Location Industry Association (WLIA) 183

Wireless Markup Language (WML) 212

wireless PDAs 235

Wireless Telephone Spam Protection Act 184

Wireless WaveLAN 276

workflow applications 302

WriteObject (ID) 123

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (336)

Index

YYuma Node 279

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (337)

List of Figures

Chapter 1: Mobile Commerce: Current States and Future Trends

Figure 1: Applications of mobile technology

Figure 2: Evolution of wireless communication technology

Figure 3: Evolution of wireless technology

Figure 4: WAP Operation System

Figure 5: Players in mobile commerce value chain

Figure 6: Three market segments in mobile commerce

Chapter 2: Mobile E-Commerce on Mobile Phones

Figure 1: Commerce as a set of actions

Figure 2: Web shopping

Figure 3: An ideal mobile e-commerce system

Figure 4: The Wireless Application Protocol architecture

Figure 5: Mobile ePay role in user authentication

Figure 6: Payment from WAP 1.1 phones

Figure 7: Overview of current receipt systems

Figure 8: The mobile e-commerce receipt system

Figure 9: Mobile e-commerce with mobile receipt

Chapter 3: Transactional Database Accesses for M-Commerce Clients

Figure 1: A typical mobile environment for m-commerce

Figure 2: The broadcast disk and the cache hierarchy

Figure 3: Conventional versus semantic data chunk organization

Figure 4: Problems in the absence of database transactions

Figure 5: System architecture

Figure 6: Structure of a database system supporting global transactions

Figure 7: Structure of a regional server

Figure 8: An example of a consistent broadcast cache

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (338)

Figure 9: Structure of a base station server

Figure 10: Utilizing the consistent broadcast cache

Chapter 4: Techniques to Facilitate Information Exchange in MobileCommerce

Figure 1: A general architecture of a mobile platform

Figure 2: Access and tuning times

Figure 3: Broadcast structure

Figure 4: Experimental results- [A] AT curves for CBS and VBS hot clients; [B] AT curves for CBS andVBS cold clients

Figure 5: Experimental results- [A] NEE curves for CBS and VBS hot clients; [B] NEE curves for CBS andVBS cold clients

Figure 6: Detailed view of broadcast structure in DG

Chapter 5: Digital Rights Management for Mobile Multimedia

Figure 1: Major transactions in digital rights management- content creation, content distribution, andcontent usage

Figure 2: A general framework of DRM for m-commerce

Figure 3: Basic operations of the general DRM framework

Figure 4: The passive rights enforcement operation in the general DRM framework

Figure 5: Music sharing in the DRM framework

Chapter 6: Predicate Based Caching for Large Scale MobileDistributed On-Line Applications

Figure 1: An example of structure of invalidation reports (SDCI model)

Figure 2: Mobile computing environment

Figure 3: Caching system architecture

Figure 4: Barbara and Imilienski's TS/AT scheme (L- broadcast latency; W- window size (time betweeninvalidation reports); k<1 for the TS scheme and k=1 for the AT scheme)

Figure 5: The architecture of our caching scheme (where circled numbers represent the different steps inthe caching process)

Chapter 7: Modeling Static Aspects of Mobile Electronic CommerceEnvironments

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (339)

Figure 1: Wireless and wireline access networks and the global network infrastructure

Figure 2: The four spheres of concern

Figure 3: Regulatory frameworks

Figure 4: Enabling technologies

Figure 5: Global infrastructure

Figure 6: Business model and related concepts

Figure 7: Complete m-commerce model

Figure 8: Business protocol, taxi scenario

Chapter 8: Known by the Network: The Emergence of Location-BasedMobile Commerce

Figure 1: Key areas of application of location-based services

Figure 2: The value proposition model-value-added services for the train commuter

Figure 3: Catching the next train home using the Kizoom mobile site

Figure 4: Categorization of mobile services using the value proposition model

Figure 5: Benefits of LBS applications - Index Matrix

Chapter 10: Managing the Interactions between Handheld Devices,Mobile Applications, and Users

Figure 1: Main entities involved in the mobile computing scenario

Figure 2: Odysseus architecture

Figure 3: Tasks executed by Odysseus middleware server

Figure 4: Architecture of Odysseus and its modules

Figure 5: Visualization of interdocument similarities and document clustering

Figure 6: Visualization of relationships between results and query

Figure 7: Three-terms query and three results

Chapter 13: Mobile Applications for Adaptive Supply Chains: ALandscape Analysis

Figure 1: Mobile device capabilities

Figure 2: Supply chain framework

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (340)

List of Tables

Chapter 1: Mobile Commerce: Current States and Future Trends

Table 1: Mobile commerce business value chain

Chapter 3: Transactional Database Accesses for M-Commerce Clients

Table 1: Different mobile computing environments

Chapter 8: Known by the Network: The Emergence of Location-BasedMobile Commerce

Table 1: Three methods of location positioning

Table 2: Typical technology requirements for location services

Chapter 11: Mobile Commerce and Usability

Table 1: Projected market shares of different activities on mobile devices

Table 2: Wireless applications of United Airlines

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (341)

List of Examples, Definitions and Algorithms

Chapter 6: Predicate Based Caching for Large Scale MobileDistributed On-Line Applications

Example 1

Example 2

Definition 1: Attribute Mapping

Algorithm 1: Predicate matching algorithm (clients disconnection time is shorter than the serversbroadcast period)

Algorithm 2: Predicate matching algorithm (clients disconnection time is longer than the server's broadcastperiod)

(PDF) Advances in Mobile Commerce Technologies - &middot; PDF fileAdvances in Mobile Commerce Technologies Preface Part I - Overview of Mobile Commerce Chapter 1 - Mobile Commerce: ... Usable - DOKUMEN.TIPS (2024)
Top Articles
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 6131

Rating: 4.6 / 5 (46 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.