Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Assessing the Market Potential of Network-Enabled 3G M-Business Services
Figure 1: M-Business and E-Business Distinctions Viewed in an Experience/ Function Framework
Figure 2: A Progressive Model of M-Business Value Addition
Figure 3: Illustrative Constellation of M-Business Solution Concepts
Figure 4: Core Dimensions for Comparing Network-Enabled M-Services
Figure 5: Enhancing M-Business Offerings via Experience/Function Improvements
Figure 6: Scenarios for Rising and Sinking ARPU Potentials for M-Business Offerings
Chapter 3: Mobile E-Commerce and the Wireless Worldwide Web: Strategic Perspectives on the Internet's Emerging Model
Figure 1: Japan's M-Commerce
4
Figure 2: World Internet Usage
4
Picture 1: Dual Slot Mobile Phone
3
Picture 2: Smart Card
3
Figure 3: Worldwide Mobile Commerce Use
Figure 4: Worldwide Handset Sales
Figure 1: Worldwide Internet Access by Device (1999–2004)
Chapter 4: Opportunities and Limitations in M-Commerce
Figure 1: Frequency Reuse
Figure 2: Overview of the Complete GSM System
Figure 3: The Wired and Mobile Web Server
Figure 4: The Architecture of i-Mode
Figure 5: Challenges in M-Commerce
Figure 6: M-Commerce Applications
Chapter 5: Understanding Emergent M-Commerce Services by using Business Network Analysis: The Case of Finland
Figure 1: Generic Model of ICT-Cluster
Figure 2: The Mobile Value-Web in Finland
Figure 3: The Distance/Magnitude Value Network of the Core Actors in the Finnish Mobile Cluster
Figure 4: Factors Influencing the Development of Mobile Services in Finland
Figure 5: Generic Content Creation Process
Figure 6: Mobile Telecommunications Business Field
Figure 7: Mobile Telecommunications Business Network
Chapter 6: Understanding the Mobile Consumer
Figure 1: Evolution of Wireless Networks (Adapted from ITU, 2001)
Figure 2: A Consumer-Centric M-Commerce Model (Coursaris & Hassanein, 2002)
Figure 3: M-Commerce Value Network (Coursaris & Hassanein, 2002)
Figure 4: Global Subscriber Base for Wires and Wireless Internet Access (Morrison, 2001)
Chapter 7: Intelligent Product Brokering and User Preference Tracking
Figure 1: Screenshot of Product Ontology
Figure 2: Agent GUI
Figure 3: Screenshot of the Monitoring Tool
Figure 4: Screenshot of an Agent's Database after Sorting
Figure 5: Evolution Process
Figure 6: Recommended List of Products
Figure 7: User Selection
Figure 8: Recommended List after Feedback
Figure 9: New Products Recommended by the Agents
Figure 10: Tracking Gradual Changes in User Preferences
Figure 11: Screenshot of a PDA with the Implemented GUI
Chapter 8: Directions in Wireless Telecommunications: Analytical and Operational Pathfinders
Figure 1: The Telecommunications Market—A Return to Normalcy
Figure 2: State, Gap and Trend Analysis
Figure 3: Hanging up on the Bells—Technology Elasticity and Service Substitution
Figure 4: Technology Adoption Rates
Figure 5: Typical Third-Party Market Study Slopes
Figure 6: Slope Analysis
Figure 7: Average Price/Minute for Mobile Telephone Service
Figure 8: Converging and Diverging Gross Margins
Figure 9: Inflection Point
Chapter 9: Wireless Middleware
Figure 1: Middleware in Distributed System Construction
Figure 2: Two-Way Message Queuing
Figure 3: X/Open XTP DTPM Model - 1991
Figure 4: The JMS Programming Model
Figure 5: The iBus/Mobile Architecture
Previous page
Table of content
Next page
Wireless Communications and Mobile Commerce
ISBN: 1591402123
EAN: 2147483647
Year: 2004
Pages: 139
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Run Charts
Modeling Process
Reliability Growth Models
Measuring and Analyzing Customer Satisfaction
Concluding Remarks
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Scope Risk
Identifying Project Schedule Risk
Quantifying and Analyzing Activity Risks
Managing Activity Risks
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Introduction to Kanban
Conduct Data Collection
Improving the Kanban
Appendix C Two-Bin Kanban Systems
Appendix G Intra-Cell Kanban
Adobe After Effects 7.0 Studio Techniques
Optimizing After Effects
Understanding and Optimizing Keylight
Conclusion
Billowing Smoke
Wind
Programming .Net Windows Applications
The .NET Framework
CommonDialog Classes
Other Basic Controls
Class Hierarchy
Managed Providers
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
The Oracle Network Architecture
Triggers
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies