By Topic

Mobile Business, 2005. ICMB 2005. International Conference on

Date 11-13 July 2005

Filter Results

Displaying Results 1 - 25 of 118
  • International Conference on Mobile Business - Cover

    Publication Year: 2005 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (175 KB)  
    Freely Available from IEEE
  • International Conference on Mobile Business

    Publication Year: 2005
    Save to Project icon | Request Permissions | PDF file iconPDF (40 KB)  
    Freely Available from IEEE
  • International Conference on Mobile Business - Copyright Page

    Publication Year: 2005 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • Table of Contents - International Conference on Mobile Business. ICMB 2005

    Publication Year: 2005 , Page(s): v - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2005 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (21 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2005 , Page(s): xiv - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2005 , Page(s): xvi - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB)  
    Freely Available from IEEE
  • Organising Committee

    Publication Year: 2005 , Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (22 KB)  
    Freely Available from IEEE
  • Novel user-centric model for m-business transformation

    Publication Year: 2005 , Page(s): 3 - 8
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (720 KB) |  | HTML iconHTML  

    Current mobile business applications are generally device-centric, platform specific and infrastructure dependent. This paper presents a novel user-centric leading to the development of wireless on-demand systems and services independent of devices, networks and infrastructure. Our new m-business model differs from existing model by exploiting the synergies of wireless ad-hoc networks and heteroge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nomadic culture and its impact on organizational support for nomadic behaviors and employee job satisfaction

    Publication Year: 2005 , Page(s): 9 - 15
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (144 KB) |  | HTML iconHTML  

    Organizations are utilizing new technologies to mobilize their workforce in the quest to be flexible and responsive, expand globally, and achieve competitive advantages. While much research effort on nomadic computing focuses on technical issues, organizational issues, such as the enabling role of organizational culture, are often overlooked. This study examines a framework that links organization... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges in mobile transformations: a requirements modeling perspective for small and medium enterprises

    Publication Year: 2005 , Page(s): 16 - 22
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (304 KB) |  | HTML iconHTML  

    This paper outlines the challenges faced in mobile-transformations (m-transformation) of organisations. This paper builds on our existing knowledge of electronic-transformations of small and medium enterprises (SMEs). Hence the conceptual framework resulting from this work deals with m-transformations of SMEs. Our aim is to build a theoretical foundation resulting from investigations of those part... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPAM: secure protocol for authentication in mobile-communications

    Publication Year: 2005 , Page(s): 23 - 27
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (152 KB) |  | HTML iconHTML  

    The paper presents a secure protocol for authentication in mobile-communications. We analyse some existing works with their weaknesses. In our protocol we use a simple blinding-binding technique for users secret keys generation such that the base-station authentication center never comes to know users secret keys. Our protocol not only overcomes the weakness of existing works but also avoids the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-factor mobile authentication scheme for secure financial transactions

    Publication Year: 2005 , Page(s): 28 - 34
    Cited by:  Papers (1)  |  Patents (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (93 KB) |  | HTML iconHTML  

    Many authentication schemes are based on parties possessing cryptographic keys often held on smart cards or other tamper-proof devices. Modern portable devices (e.g. PDAs, Smartphones) are enriched with advanced functionalities and thus could soon become both the preferred portable computing device (thereby substituting laptop computers) and a personal trusted device. This paper presents a novel t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental study of a business domain independent application level and Internet access authentication and authorization concept

    Publication Year: 2005 , Page(s): 35 - 41
    Cited by:  Papers (1)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (168 KB) |  | HTML iconHTML  

    The movement of many business domains towards offering services via the Internet demands for convergent and extensible AAA (authentication, authorization and accounting) concepts. This paper introduces a convergent access and application level AAA framework that ports the concepts of IEEE 802.1x and EAP to the application layer and utilizes SOAP as the transport medium for EAP messages. The requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile customer relationship management: an explorative investigation of the Italian consumer market

    Publication Year: 2005 , Page(s): 42 - 48
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (152 KB) |  | HTML iconHTML  

    Mobile customer relationship management (CRM) services seem to have all the characteristics commonly associated with successful mobile services and have accordingly been predicted to be among the most promising. However, real development of this sector has not been well explored so far, especially in relation to the actual supply of mobile CRM services to the public. The purpose of this paper is t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of wireless field force automation on New Zealand trade services organizations

    Publication Year: 2005 , Page(s): 49 - 55
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (888 KB) |  | HTML iconHTML  

    Wireless and mobile technologies are changing the way that many organizations operate and do business. Mobile B2E solutions, especially field force automation, have been widely adopted throughout the planet. This paper investigates the impact of wireless field force automation on two New Zealand trade services organizations. The findings demonstrate that wireless technologies can enhance the benef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segments of the Mobile Internet Industry - Examples from Finland and Japan

    Publication Year: 2005 , Page(s): 56 - 62
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (137 KB) |  | HTML iconHTML  

    This paper proposes a framework for structuring the mobile Internet industry by discussing the different definitions of information and communication technologies (ICT) and information and communication (infocom) -industries. The model identifies five different segments inside the industry - networks, devices, operating systems, content services and applications, and support services and regulatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile phone-enhanced user interface of remote monitoring system

    Publication Year: 2005 , Page(s): 63 - 68
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2848 KB) |  | HTML iconHTML  

    An information server has been developed to work as the kernel of remote monitoring system. Web, mail, and database facilities are integrated in the server function. The picture information is obtained from the network camera, accumulated in the server, and distributed to its clients according to their requests. In addition to the remote monitoring function, our server can provide a service for ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using wireless personal digital assistants in a restaurant: impact and perceived benefits

    Publication Year: 2005 , Page(s): 69 - 74
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (296 KB) |  | HTML iconHTML  

    Applications of mobile technologies are diversifying. One area that is recently starting to exploit the benefits of using mobile technologies is the hospitality industry, more specifically restaurants. This research explores the perceived benefits of using personal digital assistants (PDAs) in a restaurant in a B2E context. The findings indicated that the most common perceptions are increased effi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emerging issues in location based tourism systems

    Publication Year: 2005 , Page(s): 75 - 81
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (120 KB) |  | HTML iconHTML  

    Location based tourism systems (LETS) are computerized systems that depend on the automated detection of the location of a target (e.g. a tourist on the move, a tour vehicle) to either deliver or collect information. Currently mobile phones are seen as the obvious (but not the only) means of information delivery/collection for LBTS. This technology has considerable potential for the Australian tou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing inter-organizational business processes using an architecture for M-business scenarios

    Publication Year: 2005 , Page(s): 82 - 88
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (952 KB) |  | HTML iconHTML  

    The mega-trends of the global economy evolve the necessity for enterprises to work together effectively and efficiently. These collaborative business scenarios depend on real-time processes in mobile settings where the interaction between partners is conducted. To support the planning and control of these mobile business processes is very complex. Thus a mobile device supported architecture is pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for integrating mobility into collaborative business processes

    Publication Year: 2005 , Page(s): 89 - 93
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (128 KB) |  | HTML iconHTML  

    Most collaborative systems assume that users have access to workspaces through which they can access the entire collaborative context. This is often not the case with mobile users in global environments. Such users are often disconnected from their contexts and cannot contribute in the best possible way to a business. Connection to contexts is essential for users to contribute usefully in collabor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving business processes with mobile workforce solutions

    Publication Year: 2005 , Page(s): 94 - 102
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (192 KB) |  | HTML iconHTML  

    Based on recent literature of mobile business, an analysis framework is presented that assesses important issues and the impact of mobile workforce solutions. Two exploratory cases based in the Netherlands were studied under the framework. Preliminary evidence shows that mobile workforce solutions have a direct impact on many aspects, though they are not radically changing the organizational struc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubitem: a framework for interactive marketing in location-based gaming environment

    Publication Year: 2005 , Page(s): 103 - 108
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    Mobile game and advertising are evolving rapidly and becoming the key of mobile contents market. More powerful mobile devices have enabled the creation of better and richer mobile games and advertising. This paper proposes a framework, called Ubitem, which addresses many of the issues that are characteristic of mobile gaming and advertising. Ubitem facilitates time and location-sensitive, interact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework with a peer fostering mechanism for mobile P2P game development

    Publication Year: 2005 , Page(s): 109 - 115
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    The design of ad-hoc, wireless, peer-to-peer applications for small mobile devices raises a number of challenges for the developer, with object synchronisation, network failure and device limitations being the most significant. In this paper, we introduce a framework for peer-to-peer application development that deals with those problems. In contrast to most current literature, we focus on small p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.