Monday, December 30, 2019
How Does Stevenson Portray the Duality of Man in the...
How does Stevenson portray the duality of man in the opening chapters of ââ¬ËThe Strange Case of Dr. Jekyll and Mr. Hydeââ¬â¢? Stevenson writes ââ¬ËThe Strange Case of Dr. Jekyll and Mr. Hydeââ¬â¢ with the intention of showing the reader the duality of man and explores this through the juxtaposition of Dr. Jekyll and Mr. Hyde. In this novella, Stevenson also uses the environment and setting of the story to represent the contrast between Dr. Jekyll and Mr. Hyde. In the opening chapters of ââ¬ËThe Strange Case of Dr. Jekyll and Mr. Hydeââ¬â¢, the Soho area of Victorian London is described negatively and disapprovingly, compared to other areas of Victorian London An example of this is in the chapter of ââ¬ËThe Carew Murder Caseââ¬â¢, where the Soho area isâ⬠¦show more contentâ⬠¦In the opening chapters of ââ¬ËThe Strange Case of Dr. Jekyll and Mr. Hydeââ¬â¢, not only does Stevenson portray Mr. Hyde through his descriptions, but he also creates juxtaposition between Mr. Hyde and his descriptions, making the reader feel confused about the character of Mr. Hyde as is Mr. Utterson during the first few chapters. For example, in ââ¬ËThe Carew Murder Caseââ¬â¢, the interior of Mr. Hydeââ¬â¢s house is described as ââ¬Å"... furnished with luxury and good taste.â⬠This shows juxtaposition between Mr. Hydeââ¬â¢s house and himself, as Mr. Hyde would never be described as ââ¬Ëluxuriousââ¬â¢ or a man with â â¬Ëgood tasteââ¬â¢. Also, I think that Stevenson wrote this intending to give the reader a feeling of annoyance towards Mr. Hyde just as Mr. Utterson would be feeling at this point. The fact that Mr. Hydeââ¬â¢s house is being described as ââ¬Ëluxuriousââ¬â¢ makes the reader feel that itââ¬â¢s unjust that someone as horrid as Mr. Hyde could be so easily concealed by the interior of his house to a stranger. Stevensonââ¬â¢s intentions here were to have the reader feel more resent and hate for Mr. Hyde and to, again, show a different form and method of mankindââ¬â¢s dual personality being concealed. There is a saying that keeping your secrets or real thoughts bottled up for too long will only cause agitation and will result in the bottle exploding and leaving nothing but destructionShow MoreRelatedThe View of Human Nature Presented in Dr. Jekyll and Mr. Hyde3064 Words à |à 13 Pagesnature does Stevenson present in the novel The strange case of Dr. Jekyll and Mr. Hyde? The strange case of Dr. Jekyll and Mr. Hyde Question: What view of human nature does Stevenson present in the novel ââ¬Å"The strange case of Dr. Jekyll and Mr. Hydeâ⬠? Throughout Stevensonââ¬â¢s life he experienced things by looking at them in two different perspectives. He later went on to exhibit his experiences by writing a novel about split personality called ââ¬Å"The strange case of Dr. Jekyll and Mr. Hydeâ⬠Read More How Does Robert Louis Stevenson use literary techniques to illustrate2496 Words à |à 10 PagesHow Does Robert Louis Stevenson use literary techniques to illustrate the social, historical and moral points he is trying to make in Dr Jekyll and Mr Hyde? Throughout the Novella, ââ¬ËDr Jekyll and Mr Hydeââ¬â¢, the author Robert Louis Stevenson uses a wide range of literary techniques in a skilful and sophisticated way to help achieve his effects and put his points across. Stevensonââ¬â¢s unique use of language is vital to the success of the Novella, with the structural and linguistic devices playing
Saturday, December 21, 2019
Anthropology The Field Of Linguistic Anthropology
Originally, linguistics was my intended major. Recently, I decided to switch my major to anthropology, and more specifically, the field of linguistic anthropology. For the linguistics major, one of my requirements for transferring to a university was to take a language and culture class. Several of the first lectures focused on the history of linguistics and anthropology. I was introduced to the idea that language, thought, and culture all influence each other. This meant that studying language, when divorced from the concept of culture, creates a myopic view of linguistics. It had never occurred to me that linguistic does not occur in a vacuum and needs to be examined alongside the culture it is associated with. Seeds of change were then sown in my mind. As the class progressed, I found myself growing more interested in the subject as a whole, and so anthropology became my major. Previously, I chose biological anthropology for one of my general education science requirements . As a class project, the professor gave us the incredible opportunity to study the primates at the San Diego Zoo. The assignment was to choose two primate species to focus on: one species from the old world and one from the new world. I decided to observe the tufted Capuchins and the Bornean and Sumatran orangutans. My classmates and I were to describe the primatesââ¬â¢ appearances, behaviors, eating patterns, and to paint a picture of specific encounters that occurred during the time of ourShow MoreRelatedEssay about Cultural Studies 1st Exam1573 Words à |à 7 Pagesterminology or name in the space provided by each statement. Some terms may not be used. Anthropology Human Race Orthopraxy Arbitrariness Informants Paralanguage Christianity Language Phonology Cultural Hybridization Language Family Pidgin Culture Language Ideology Priests Diachronic Langue Primatologists Dogma Linguistic Competence Revitalization Enculturation Linguistic Performance Secularism Fieldwork Monograph Shaman Fundamentalist Multisited FieldworkRead MoreAnthropology Essay : The Importance Of Anthropology1622 Words à |à 7 PagesThe Importance of Anthropology Anthropology is a scientific field that seems to be largely misunderstood by the general public. Many people hear the word ââ¬Å"anthropologyâ⬠and think of an old man with a magnifying glass looking at some dusty old fossils. In reality, anthropology is much more broad than archaeology, which people normally associate with it. Forms of anthropology are used in many aspects of daily life from advertising to law enforcement. Anthropology is difficult to define, as it is extremelyRead MoreHow Technology has Changed Anthropology872 Words à |à 4 PagesHow technology has changed Anthropology ââ¬Å"Anthropology is the most humanistic of the sciences and the most scientific of the humanitiesâ⬠ââ¬â Alfred L. Kroeber Anthropology is holistic. Humans are social beings more than anything, but with underlying psychological, biological and cultural connotations. The field of anthropology encompasses everything and anything having to do with humankind throughout history. Anthropology attempts to answer the tough questions about the human condition. What influencesRead MoreEssay on Linguistics in Anthropology634 Words à |à 3 PagesLinguistics in Anthropology When we begin to dive into the study of humans, also known as Anthropology, there are so many subdivisions we can learn about. One very interesting clump within the study of Anthropology can be classified as Linguistic Anthropology. In this instance, anthropologists study language and how the development and its use can be studied to understand culture. According to the department of Anthropology at California State University Long beach, Anthropologists are interestedRead MoreAnthropology and Its Branches1728 Words à |à 7 PagesAnthropology is the study of human beings, in particular the study of their physical character, evolutionary history, racial classification, historical and present-day geographic distribution, group relationships, and cultural history. Anthropology can be characterized as the naturalistic description and interpretation of the diverse peoples of the world. Modern-day anthropology consists of two major divisions: cultural anthropology, which deals with the study of human culture in all its aspects;Read MoreThe Full Scope Of Human Life871 Words à |à 4 Pagesstrong need humans have to fully understand what it truly means to be human. Many fields such as history, psychology, and sociology all offer a perspective in the study of humanity, but there are distinguishable from anthropology. Anthropology differs from other humanities fields due to its holistic nature, comparative research methods, and the strong emphasis on fieldwork and participant interaction. Anthropology is the study of people throughout the world, their evolutionary history, how they behaveRead MoreAnthropology : A Study Of Humanity1202 Words à |à 5 PagesGenerally, anthropology can be defined as the study of humanity. This includes every aspect of the human condition: language, history, culture, biology, past and present. Anthropology is all encompassing and due to i ts breadth, it can be considered both a study in humanities and science. However, anthropology is easily distinguishable from both hard sciences and humanities. The aspects that distinguish anthropology lie mostly in the methodology that anthropologists use to study human beings. MethodologyRead MoreCultural Anthropology : Anthropology And Behavioral Patterns907 Words à |à 4 PagesJordonnia Scarlett Professor Ellen Hamrick Cultural Anthropology March 5, 2015 As I sat down to write this paper I was a bit disoriented. The topic of anthropology/anthropologist seemed simple, yet boring. Subsequent researching the prompt questions, my friend called. Without allowing him to speak, I said, ââ¬Å"writing a paper on anthropologists, canââ¬â¢t talk.â⬠Before I could hang up, responded quickly saying ââ¬Å"if I were an anthropologist I would be a linguistic anthropologist.â⬠Immediately I realized my ignoranceRead MoreAnthropology Relation with Other Social Sciences2821 Words à |à 12 PagesAnthropology (from the Greek word á ¼âà ½Ã ¸Ã Ãâ°Ãâ¬Ã ¿Ãâ, human or person) consists of the study of humanity (see genus Homo). The discipline is a holistic study, concerned with all humans, at all times, in all humanitys dimensions. Anthropology is traditionally distinguished from other disciplines by its emphasis on cultural relativity, in-depth examination of context, and cross-cultural comparisons. Anthropology is methodologically diverse, using both qualitative and quantitative methods, such as firsthandRead MoreReview of Conrad Kottaks Anthropology: The Exploration of Human Diversity2863 Words à |à 11 PagesConrad Kottaks Anthropology: The Exploration of Human Diversity (12th ed. New York: McGraw-Hill, 2008), having gone through 12 editions since its first publication in 1974, deserves its reputation as a widely-used comprehensive introduction for undergraduates to the field of anthropology. As with other recently published textbooks, it is a multifaceted, colorful production that includes an ebook version, a CD-ROM, and supplementary Website material. With this extensive array of material it applies
Friday, December 13, 2019
Driving Forces for M-Commerce Success Free Essays
Driving Forces for M-commerce Success Jason J. Zhang, Yufei Yuan, and Norm Archer Michael G. DeGroote School of Business McMaster University Hamilton, Ontario, Canada Abstract Is m-commerce just an extension or a subset of e-commerce? Will it turn out to be just more hype? In this paper we discuss the realities of m-commerce and the major differences between mobile commerce and Internet-based e-commerce. We will write a custom essay sample on Driving Forces for M-Commerce Success or any similar topic only for you Order Now Based on this understanding, we identify key factors that must be taken into consideration in order to design valuable m-commerce applications. We emphasize that the success of m-commerce relies on the synergy of three driving forces: technology innovation, evolution of a new value chain, and active customer demand. Key words m-commerce, e-commerce, wireless communication networks Jason J. Zhang is currently a Ph. D. student in Information Systems at Michael G. DeGroote School of Business, McMaster University, Canada. He received his M. E. degree in Information System Engineering at the School of Management, Dalian University of Technology, and B. E. degree in Computer Science Engineering at North China Institute of Technology, P. R. C. He once worked as an IT consultant for Office Automation (OA) for the Chinese government. His research interests include e-commerce, e-government, supply chain management, m-commerce, and agent-facilitated decision support systems. Yufei Yuan is currently a Professor of Information Systems at Michael G. DeGroote School of Business, McMaster University, Canada. He received his Ph. D. in Computer Information Systems from The University of Michigan in U. S. in 1985. His research interests are in the areas of web-based negotiation support system, business models in electronic ommerce, approximate reasoning with fuzzy logic, matching problems, and decision support in health care. He has published more than 30 papers in professional journals such as International Journal of Electronic Markets, Internet research, Fuzzy Sets and Systems, European Journal of Operational Research, Management Sciences, Academic Medicine, Medical Decision Making, International Journal of Human-Computer Sys tems, and others. Norm Archer holds the Wayne C. Fox Chair in Business Innovation, and is a Professor of Management Science and Information Systems in the Michael G. DeGroote School of Business at McMaster University. His research interests are in topics that relate to eBusiness, including business-to-business implementations, intelligent agents, and the human-computer interface. He has published in a number of journals, including Internet Research, International Journal of Management Theory and Practice, IEEE Transactions on Systems, Man, and Cybernetics, International Journal of Human-Computer Studies, International Journal of Technology Management, and others. 1. Introduction What is mobile commerce? Is it just hype? Almost every company in telecommunications is trying to figure out what m-commerce really is, and how to exploit it. From the marketersââ¬â¢ vision, in the new world presented by m-commerce, consumers can use their cell phones and other wireless devices to purchase goods and services just as they would over the Internet using their personal computers (PCs). Specifically, m-commerce is about content delivery (notification and reporting) and transactions (purchasing and data entry) on mobile devices (Leung and Antypas, 2001). Unfortunately, in reality, m-commerce is often a highly frustrating experience. Industry observers attribute this drawback to the immaturity of mobile technology, but they believe 3G (third generation wireless digital cellular telephone technology) networks could change the situation (Cohn, 2001). While m-commerce is still in its infancy, enhanced devices and networks are irrelevant unless m-commerce applications are compelling and user friendly. Most often m-commerce is understood as mobile e-commerce (Donegan, 2000; Schwartz, 2000; Liebmann, 2000). M-commerce is supposed to enable us to buy everything from anywhere over the Internet without the use of a PC. Internet access and Web browsing is assumed to be the key to extending m-commerce to customers (Harter, 2000). In many ways, m-commerce is the continuation of e-commerce with the palm handheld, wireless laptops and a new generation of Web-enabled digital phones already on the market (Keen, 2001). Thus it was once believed that if you brought together mobile communications and the Internet, two of the biggest things in telecommunications, there would be an almighty explosion of growth. However, it has not happened yet. In many ways, m-commerce and the wireless Internet have been the victims of over-excited speculation (Darling, 2001). Among 1,700 people surveyed in Spring 2000 by Jupiter Communications, the majority said that they would not use nor pay for the wireless Web (Lindsay, 2000). WAP (Wireless Application Protocol) services were disappointing, particularly in Northern Europe countries, where mobile communications are most advanced and consumers know well the limitations of the wireless Web (Monica, 2000). Consequently, the enthusiasm that originally greeted the concept of the mobile Internet has waned. Contrary to conventional perspectives on m-commerce, forward-thinking marketers should not view m-commerce as e-commerce with limitations, but rather as wireless in its own unique medium, with its own unique benefits (Cotlier, 2000). Even though wireless technology is sometimes regarded as an enhancement tool rather than a brand new medium (Ramakrishnan, 2001), successful players in the m-commerce market space must take a much broader view of the technology, the market, and potential consumers. M-commerce is not simply a new distribution channel, a mobile Internet or a substitute for PCs. Rather, it is a new aspect of consumerism and a much more powerful way to communicate with customers. Obviously, people will not shop with their phones in the same way they shop with PCs. Unleashing the value of m-commerce requires understanding the role that mobility plays in peopleââ¬â¢s lives today. That calls for a radical shift in thinking (Nohria and Leestma 2001). In this paper, we will identify driving forces for the success of m-commerce. To clarify the nature of m-commerce, we discuss several fundamental differences between m-commerce and Internet-based e-commerce. Based on this new perspective of m-commerce, we identify a set of key factors that should be considered by marketers as well as consumers in making decisions concerning m-commerce applications. Finally, we propose that the synergy of three driving forces will lead to a greater likelihood of success for m-commerce. 2. Key differences between m-commerce and e-commerce As we argued, m-commerce is not simply an extension or a subset of e-commerce. In fact, there exist fundamental differences between m-commerce and e-commerce in terms of their origins, technologies and the nature of the services they can offer. 2. 1 Origin The emergence and development of e-commerce was due to the rapid growth of the Internet. The Internet originated from several U. S. government-sponsored programs (ARPANET, CSNET and NSFNET, etc) aimed at providing a networked computing environment for researchers (Kalakota and Whinston, 1996). Starting from the early 1990s, the Internet was extended to business community applications. With such great business potential and rapid growth to millions of users, the term ââ¬Å"electronic commerceâ⬠was coined, and e-commerce applications expanded rapidly (Turban et al. , 1999). Because of widely-expanding networks and nearly free access to the Internet, e-commerce bridges distances and enables companies to display and sell goods and services cheaply to consumers and businesses around the world. In the Internet world, much is given away free or at a discount in the hope that a way will eventually be found (presumably through advertising income) to turn traffic into profits. Contrarily, m-commerce is rooted in paid-for service in the private mobile phone industry where business competition is stiff. In the telecom world, users pay for airtime, by the size of the data packet transmitted, and by the service used for what they get (Fox, 2000). Global wireless networks are segmented and owned by different mobile operators such as ATT, Pacific Bell Wireless, Vodafone, Orange, Deutsche, NTT DoCoMo, etc. Compared to almost free Internet access, high cost has been seen as a major characteristic of m-commerce (Shim and Rice, 2001). Mobile communication through cell phones is costly, and any additional services will attract extra charges. The reason is that establishing a mobile communication network requires heavy business investment with no government support (Ramakrishnan, 2001). M-commerce carriers therefore must look for a great deal of business activity to generate revenues that justify the huge infrastructure investments (Lamont, 2001). Due to their different origins, the customer bases of m-commerce and e-commerce are quite different. Researchers and university educators were the early users of the Internet. The Internet user population was originally dominated by highly educated people. As Internet household penetration increases, the demographics of users continue to shift closer to those of the population at large (Pastore, 1999). This growth pattern is clear in U. S. and tends to be repeating in the rest of the world (http://cyberatlas. internet. com/ big_picture/demographics). In contrast, other than business users, most cell phone users are young people or relatively less well-educated consumers. Over the next decade, billions of people will gain access to mobile devices, but many of them will be functionally illiterate and technologically unsophisticated users (Feldman, 2000; Barnett et al. 2000). Because of their differences in background, consumers tend to have quite different expectations for m-commerce, compared to e-commerce. For example, one reason for the low uptake of the wireless Internet in the U. S. is that most Americans already are familiar with the wired Internet and expect to pay for wireless Internet access as they do for wired access: unlimited access for a flat monthly fee (Fox, 2000). 2. 2 Technology The Internet, the fundamental infrastructure of e-commerce, adopted a well-established protocol, TCP/IP (Transmission Control Protocol/Internet Protocol), which solves the global internetworking problem and ensures that computers communicate with one another in a reliable fashion. Over the past everal years, the World Wide Web (WWW) has come to dominate Internet traffic, and the vast majority of e-commerce applications are Web-based. It is also easy to connect the Internet with existing business information systems. Uniform Internet standards significantly reduced e-commerce entry costs and helped fuel the rapid growth of e-commerce. In contrast, m-commerce services are constrained by a variety of wireless media communication standards ranging from global (Satellite), reg ional (3G, IEEE 802. 11a/b, DoCoMo I-mode), to short distance (Bluetooth) (Shim and Rice, 2001). Cellular carriers use different systems and standards such as GSM (Global Service for Mobile), TDMA (Time Division Multiple Access), and CDMA (Code Division Multiple Access) to compete with each other (Leung and Antypas, 2001). M-commerce applications tend to be device and carrier dependent. The wireless applications today primarily use two technologies: WAP and SMS. WAP (Wireless Application Protocol) is the display language designed for cellular handhelds. It was created by Motorola, Ericsson, Nokia and Phone. com in 1997 when they founded the WAP Forum. WAP is a derivative of the XML/HTML language family, but it is designed to operate without a keyboard or mouse. SMS (Short Message Systems/Services) is a derivative of the old numeric paging network, with additional functionality for two-way communication and support for text and attachments. There are more users of SMS today than of WAP, thanks to cheaper service and the widespread availability of low-cost, two-way paging devices from companies such as Motorola (Leung and Antypas, 2001). Until now, there has been no generic world-wide framework and standard for application development using universal mobile connection and access. In fact, wireless technology is still in its infancy and hindered by limited coverage and a smorgasbord of competing standards, which can explain the slower-than-expected adoption of m-commerce in the United States (Shim and Rice, 2001). Choosing from conflicting standards, products and features, gives even hardened technophiles a headache. The pyramid of m-commerce applications thereby presents a much more complicated process, in which many pieces must fall into place before the mobile phone can be seen as a real revenue generator. In addition to underlying networking infrastructure and standards, it is the client devices that actually determine what specific services can be delivered. The boom in e-commerce applications is actually due to the widespread use of PCs, which have a complete text input keyboard, large screen, substantial memory, and high processing power. Contrarily, various m-commerce applications rely on the use of handheld devices. These devices range from pagers, cell phones, and palmtops, to pocket PCs. Mobile devices such as cell phones and PDAs (Personal Digital Assistants) have tiny screens, some of which display only three lines of text at once (Lucas, 2001). The displays are black and white with low resolution; there are no QWERTY keyboards, and no support for animation (Leung and Antypas, 2001). Although WAP devices support a limited graphics format called Wbitmap, because mobile devices have limited bandwidth and small screens, any application that is heavily graphic or animation driven would not be suitable at this time. In addition, software applications are relatively crude. There are no cookies or session controls, meaning that if the connection is lost, the application will restart rather than continue from previous screens (Leung and Antypas, 2001). Web browsers and drop-down menus are unavailable, so companies must plan on character-based terminal applications with cursors and key entry forms. Long selection lists or deep menu layers will wear out the fingers of even the most patient users (Moustafa, 2000; Jainschigg and Grigonis 2001). However, in contrast to PCs, cell phones do have their own unique features: mobile, portable (small size), smooth voice communication, and connected to persons (primarily because of portability) rather than to home or office. 2. 3 The Nature of Services The wide accessibility of the Internet makes any e-commerce service globally available. The Web enables search and delivery of rich information, and sophisticated electronic transaction processes can be integrated easily with backend enterprise information systems. In contrast, the delivery of m-commerce applications relies on private wireless communication carriers. These services are usually delivered to a specific region, and are rather simple, more personalized, location-specific and time-sensitive. Since a mobile device usually accompanies a person wherever he or she goes, mobile services can be delivered to a person anywhere and anytime rather than to a fixed office or home. M-commerce therefore creates more of a perception of enhanced intimacy with consumers than other office-based distribution channels. Time sensitive, simple transactions such as movie ticket purchases, banking, and travel reservations are believed to be the key applications that will stimulate m-commerce (Lucas, 2001; Swartz, 2001-2). Other key drivers to m-commerce growth are location-based applications such as traveler navigation, emergency response, etc. (Secker, 2001; Rockhold, 2001; Swartz, 2001-1). Finally, in general we categorize Internet based e-commerce into B2C (business to consumer) and B2B (business to business). The rapid growth of e-commerce started from the booming of dot. com companies aimed at online shopping and customer services. Gradually, the emphasis shifted to B2B, and more recently e-business, to take advantage of the real business value of the Internet. In contrast, mobile commerce started from person to person communication, and gradually more services were introduced through interactions between people and systems: checking the weather, finding a local restaurant, etc. M-commerce applications can be used to serve both consumers and business people. Rather than apply B2C and B2B classifications to m-commerce, P2P (Person to Person) and P2S (Person to System) would be more appropriate to address the nature and trend of m-commerce applications. The details of m-commerce applications will be discussed in the next section. The major differences between m-commerce and e-commerce are summarized in Table 1. Table 1. Major Differences Between M-commerce and E-commerce | | | | | |E-commerce |M-commerce | | | | |ORIGIN | | | |Sponsorship |Government-sponsored Internet |Private mobile phone industry | |Business entry cost |Low |High | |Customer access cost |Free or low cost Internet access |High mobile service charge | |Customer base |Highly educated computer users |Less educated cell phone customers | | | | | |TECHNOLOGY | | | |Message transmission |Packet-switched data transmission |Circuit switched for streamlined voice | | | |communication | |Protocol |TCP/IP, HTTPML |GSM, TDMA, CDMA, 3G | |Standardization |Highly standardized |Multiple incompatible standards | |Connectivity |Global |Mainly regional | |Bandwidth |High |Low | |Identity |URL with IP and domain name |Phone number | |Application development |General computer appli cations |Device-specific applications | |Interface device |Personal computers |Cell phones and PDAs | |Mobility |Fixed location |Mobile | |Display |Big screen |Small screen | |Main input mode |Keyboard for full text input |Voice with small key pad | |Main output mode |Text and graphics |Voice with small text display | |Local rocessing power |Powerful CPU with large memory and disk space |Limited processing power with small memory chip | |Software and Programming |Support a variety of programming languages |Java or specific script languages | |Trend |Towards sophistication |Towards minimization | | | | | |SERVICES | | | |Service range |Global |Regional | |Delivery destination |PC in office connected to the Internet |Person accompanied by a mobile device | |Transaction complexity |Complete and complex transactions |Simple transactions | |Information provided |Rich information |Simple and short messages | |Timing |Less time-critical |Time critical | |Location-based service |No |Yes | |Target mobility |Service to a fixed point |Service to a moving target | |Backend business connection |Strong connection to backend business information |Weak connection to backend business information | | |systems |systems | |Service classification |B2C (business to consumer) and B2B (business to |P2P (person to person) and P2S (person to system)| | |business) | | 3. Key Factors in Designing M-Commerce Applications Once we have identified the major differences between wireless mobile communication based m-commerce and Internet based e-commerce, we can identify the key factors that must be taken into consideration in designing useful m-commerce applications. 3. 1 Mobility M-commerce opportunities can be very significant, if investors understand consumer groups intimately and develop ubiquitous solutions that recognize the role that mobility plays in consumersââ¬â¢ lives (Nohria and Leestma, 2001). In business services, not being forced to be hardwired enables a companyââ¬â¢s employees to remain connected while moving from office to office, or state to state; they can tap into the corporate network from airport lounges and hotel lobbies. For individual consumers, mobile devices basically allow them to keep in touch with their friends and families anywhere and anytime. For instance, videophone users can take pictures wherever they go and send them attached with short notes to friends while shopping, traveling, or simply hanging out (Kunii, 2001). Beyond person to person mobile communication, additional value can be generated by linking mobile consumers and existing services. Mobile consumers can access various services anytime and anywhere, presenting new marketing channels for businesses. While traveling, a user may use a mobile phone to control a home burglar or fire alarm system and to turn lights on or off as if at home (Fox, 2000). 3. 2 Personal identity and built in payment mechanisms Since mobile devices, particularly cell phones, are registered by their subscribers and normally accompany the person, it becomes possible to identify and deliver personalized services to the user. A cell phone with additional security information such as a PIN number or biometric identification technology can be used to identify a person. A payment mechanism may also be built into the cell phone system. It is then possible to allow consumers to use their wireless phones as devices to make or trigger a payment (bus ticket, vendor machine etc. ), similar to the use of a smart card or an ATM machine. And there are even a few vending machines that let users pay for soft drinks using their cell phones (Fox, 2000). Credit card numbers could also be replaced by cellular phone numbers for wireless transactions. Relying on a third party payment mechanism is always a big hurdle for Internet-based e-commerce because an IP address cannot identify a person. However, this difficulty could be easily overcome in m-commerce with the use of an identifiable mobile device. Hence, cell phones naturally support e-Wallet applications in m-commerce, which is crucial to the success of other applications. Certainly, systematic security solutions involving PKI (Public Key Infrastructure) and biometric services should be adopted as well (Young, 2001). As an example Obongo has modified its e-wallet software for use on wireless devices. A so-called m-wallet contains the cardholderââ¬â¢s account data, name, and mailing address, and is accessed with the push of a button. Once opened, the data within the wallet are transferred to the merchant to complete the payment (Lucas, 2001). M-wallets make micro-payments easier and help carriers charge for advanced services such as digital media and game applications that consumers cannot get any other way (Swartz, 2001-2). Besides financial services, personalization in m-commerce can migrate into entertainment (music and games, etc), content services and even personalized marketing. Since mobile operators maintain personal information on subscribers, a CD vendor, for example, could simply ask customers to verify payment information and a shipping address through their cell phone displays rather than have them fill out forms each time from scratch (Barnett, et al. 2000). Good potential applications of the content revolution are personalized software that deliver highly targeted offers for large- or small-ticket items that consumers can act upon, even while waiting in line (Lucas, 2001). 3. 3 Location-Based Services To date location-based services have been regarded as key enablers of m-commerceââ¬â¢s future success, according to the current hype (Swartz, 2001-1). Portable geographic positioning systems (GPS) are becoming smaller and more affordable, at costs in the neighborhood of only about U. S. $200. These systems can be used not only to identify locations, but also for business to deliver location-sensitive services to users. The ability to target rich and relevant information to end-users provides great potential value in location-based applications. For instance, it would be quite useful to provide driving directions and local commercial services where users happen to be, such as near specific restaurants, movie shows, bus schedules, weather reports and guided tours in museums (Shaffer, 2000; Taaffe, 2001). Hence, one of the selling points of m-commerce applications is proximity. Go2Systems, in Irvine, Calif. , one of a swarm of vendors eyeing the uses of ALI (automatic location identification) data, linked with Coca-Cola to steer wireless customers to stores selling Coke products (Jones, 2000). Coca-Cola, the worldââ¬â¢s best-known brand, has ventured into the wireless world by providing its fountain clients (McDonalds, Burger King and more than 800,000 U. S. estaurants) with the opportunity to attract additional business by placing their names on Go2 Systemsââ¬â¢ wireless services. Their 5-year, U. S. $30-million deal will allow customers to find the nearest Coke fountain location through their cellular phones with Go2 l ocation-based direction services, which include addresses, turn-by-turn directions and one-click calling (Swartz, 2001-1). CT Motion, a location-based services developer, provides an m-coupon application, by which the mobile user can receive an electronic coupon from a retailer in his or her specific location (Secker, 2001). Imagine that a young teenager is riding his skateboard through the park on a Saturday afternoon, when his cell phone beeps. It is a message from the Soda X portal that the local professional soccer team is playing tonight, and the store that he is approaching is offering him half-price tickets for the game if he buys a pair of jeans today. Privacy concerns are critically important while implementing location-based advertising. Pull mode may resolve the issue of privacy, when a mobile user requests information and is willing to receive an advertisement (Secker, 2001). However, many location-based applications are still to be developed; few carriers have a strategy, let alone a business model (Swartz, 2001-1). Location-based services would have to be targeted extremely well, in order to avoid damaging trusted relationships that merchants already have with customers. Location can be traced not only for people but also for other objects. Cellpoint, a supplier of location-based services (LBS) software, provides the applications used to track remote assets such as fleet vehicles and construction equipment, and also provides telemetric products that allow remote machine-to-machine communications (Secker, 2001). It is also possible to trace a stolen car or a missing child that is carrying a specially designed radio device. 3. 4 Time-critical impulse purchasing Mobile phones are carried by their owners almost everywhere and kept switched on most of the time, especially in Europe, where mobile users are not charged for incoming calls. Consumers can thus not only gain access to wireless services wherever there is a network presence but also keep tabs on time-critical information such as stock market reports or urgent messages. Time-sensitive and simple transactions are another key to stimulate m-commerce. For some applications of m-commerce such as scanning news or purchasing books or other retail items, real-time transactions are not necessary. Nonetheless, there is a great deal of value in being able to monitor dynamic information through wireless handheld devices, such as aircraft flight status, shipping status, seat reservations or stock prices, and to alert the user when the information is updated (Shaffer, 2000; Schwartz, 2000; Leung and Antypas, 2001). There will be even more value in emergency situations such as medical care, traffic accidents, emergency road service, and crime reporting. Particularly with the mandatory ALI (automatic location identification) data supplied by a few key vendors such as Xypoint, U. S government emergency systems like E911 (Enhanced 911) could be improved (Jones, 2000). The United Statesââ¬â¢ FCC (Federal Communications Commission) mandates that the location of wireless callers be identified during a 911 emergency call. The MapInfoà ® (www. mapinfo. com) Location Management Platform (LMP) is used to enhance a carrierââ¬â¢s 911 service by automatically routing 911 calls to an appropriate Public Safety Answering Point (PSAP) for handling and dispatch. 3. 5 Special Market Niches Mass-market consumers will be the really big users of m-commerce applications. And the customer base is large enough for potential revenue in the medium to long term (Sweeney, 2001). A single killer application would not work for everybody and there is going to be a whole set of niche applications that are relevant to each target audience. The mobile industry believes that location-based service advertising will have stimulated m-commerce so much that operators would eventually offer free phone charges to subscribers who are prepared to have advertising on their screens on a permanent basis. In particular, youth has a very powerful influence on this market (Secker, 2001). Actually, young people have been a major target of various m-commerce applications, particularly SMS and DoCoMo iMode services (Herman, 2000). Besides focusing on youth, mobile operators also suggest marketing future mobile data technology much more aggressively to business users (Parsons, 2000). In any case, for new m-commerce opportunities, carriers should be cautious about implementing applications that require changes in consumer behavior. If many technology hurdles are to be overcome, along with a corresponding unreasonable change in behavior, the application is unlikely to succeed. Additionally, price marketing is by far the most important in creating m-commerce value (Lamont, 2001). Mobile carriers therefore need to develop unique offerings for each target market segment or services targeted, according to geographical location and demographics (Schneiderman, 2001). Learning about and analyzing customer psychology, and taking marketer perspectives would help carriers segment the mass-market and target specific to m-commerce applications. We actually need to shift our way of thinking to exploit the uniqueness of m-commerce applications that can be brought to bear in our lives, rather than to be confined to thinking within the limitations of mobile devices. The factors that need to be considered for m-commerce applications are summarized in Table 2. Table 2. Key Design Factors and Typical Applications | | | |Factors |Typical Applications | | |Mobile communications (for business and personal contacts) | |Mobility |Scheduling and coordination (: e. g. appointment arrangements, reminders, | | |teleconferencing, etc. ) | | | |Location-sensitive |Travel navigation (driving or walking directions) | | |Local tours (exhibitions, shopping malls, etc) | | |Locating local services (restaurants, gas stations, etc) | | |Locating moving objects (missing children, stolen cars, etc) | | |Short Message Services (SMS) | |Time-critical |Time-critical information (flight schedules, weather reports, traffic information, stock| | |prices) | | |Emergency services (medical care, accident and rescue services, crime stoppers) | | |Personal identification (secure entrance with biometrics check) | |Personal identity |Electronic payments (e-Wallet) | | |Personalized location-aware advertisement | | |Language-specific services (automatically switch to or t ranslate to desired language) | | |Demographic segmentation (oriented to young people or business people). | |Special market niche-targeted |Country segmentation (tailored to specific country) | | | | 4. Synergy of Three Driving Forces For m-commerce growth we identify three major forces that impel its growth: technology innovation, evolution of new value chains, and active customer demand. We propose that the synergy of these three forces will eventually lead to the success of m-commerce applications. 4. 1 Technology Innovation Technological progress is likely to bring about some novel applications for m-commerce. Here we identify several major technologies, improvements in which are expected to have a significant influence on m-commerce. The primary concern is with the capabilities of handhelds, the fundamentals of mobile networks, the accuracy of geographic location information, and security solutions. (1) Handhelds Low-cost, truly pervasive devices that present multi-modal information and perform transactions naturally can dramatically change what many people do and how they do it (Feldman, 2000). In the next several years, wireless devices will improve in interface design and information presentation. In countries like China and Japan, where the written language has never fit well with a Western keyboard, handhelds that employ handwriting or speech recognition seem ideal (Herman, 2000). Wireless keypad mnemonics can also make the entry of data easier for consumers (Young, 2001). Subscriber identity modules (SIMs) may take over due to their competitive advantage over voice or keystroke activation (Chanay, 2001). Newer devices will use expandable color screens capable of displaying up to 12 lines of text, more user-friendly keypads, and higher communication bandwidth (Lucas, 2001). Smart card memory capacity will reach 1MB by 2005. The processing capability of smart cards has increased and has given users the ability to enjoy more computationally intensive, high-value, transaction-based operations that require such features as digital signing and encryption (Moustafa, 2000). For those who crave the cutting edge, there are DoCoMoââ¬â¢s (in Japan) impressive third-generation handhelds, which can capture and send high-quality color movies almost in real time (Kunii, 2001). By using a DoCoMo camera-phone, it is possible to imagine being in a store shopping for a gift for a child and calling your spouse to show her what you are thinking of buying. Besides improvements in user interfaces, applications and underlying middleware configurations will allow for interactions to switch communication modes smoothly without losing clarity or the thread of conversation. The Java Card Forum has developed specifications for implementing Java on smart cards. Support of Java on SIMs will allow wireless terminals to reach the Java developer community, simplifying the development of new services (Carrara, 2000). Overall, next-generation devices are expected to combine the functions of Personal Digital Assistants or PDAs (data exchange) and cell phones (verbal communication). (2) Network infrastructure The current (second) generation of wireless networks and handhelds supports data rates of only 9. 6 kilobits per second, far below the 64 Kbps capabilities of landline copper wires. GSM (Global System for Mobile Communication), the most common cellular standard, is being extended by the GPRS (General Packet Radio System), which can support data rates of 112 Kbps, almost twice the rate of a standard computer modem and enough to support high-quality streaming audio. True third-generation (3G) networks, based on the UMTS (Universal Mobile Telephone System) standard, are predicted to raise the maximum rate to 2 Mbps ââ¬â one-fifth of the bandwidth available on the standard Ethernet in todayââ¬â¢s offices (Barnett et al. 2000) According to Ovum, 3G will first take hold in Asia and Europe, with the rest of the world trailing a year or two behind (Fitchard, 2001). Currently, the leader in the field is Japanââ¬â¢s existing second-generation, or 2G, digital networks that provide always-on connections for data transmission and support a wide range of online services ââ¬â from news, weather, and ticket-booking to downloads of games and ring tones (Kunii, 2001). Therefore, in the next several years, hybrid elements of 2G, 2. 5G and 3G will be in play simultaneously on wireless operator infrastructure. Bluetooth is a short-distance, radio-based, point-to-point technology that, theoretically, can go up to 1 Mbps, and has already entered the market (Herman, 2000). It will be very useful for enabling location-based applications. It allows a wireless device to exchange data with PCs, laptop computers, point-of-sale devices and other wired devices without being physically connected by wires or adapters. Bluetooth is supported by more than 1,400 telecommunications and technology companies, including Motorola, Intel, and Lucent Technologies (Lucas, 2001). (3) Geographic location technology Location-based personalized services have been heavily touted as a major application for m-commerce. In order to deliver such services, mobile devices (particularly cell phones) should be able to keep track of an individualââ¬â¢s physical location as he or she moves about. Some companies are focusing on underlying technologies or services such as radio-based methods for determining where users are calling from, or software and systems that blend location data with other information (Shaffer, 2000). The FCC (Federal Trade Commission) has stringent requirements for location services, in which carriers have to offer network-based systems that deliver location information with an accuracy of 300 meters for 95% of calls and 100 meters for 67% of calls (Brewin, 2001). For instance, an FCC ruling requires all wireless carriers to find a way to pinpoint the location of the users dialing 911 emergency services. Although the requirements are meeting resistance from various carriers that say they cannot reach that level of accuracy or at least need more time to do so, some can meet the requirements with the portion of their networks that uses the GSM (Global System for Mobile Communications) standard. (4) Security technology The lack of security is said to be one of largest barriers in delaying m-commerce implementation. In particular, security is a vital issue that affects the use of mobile technology in financial services, when account details and other confidential information move across the networks (Dezoysa, 2001-2). With regard to securing transactions, PKI (public key infrastructure) is believed to be the best method to secure end-to-end transactions (Moustafa, 2000). Besides securing wireless transactions from the cell phone to the m-commerce provider, the phone must also be secured from fraudulent use. Traditionally, the SIM card that stores the subscriberââ¬â¢s account information is used for identifying and authenticating the subscriber to the network. There are industry standards for SIMs used in digital wireless phones that help ensure that all SIM-based terminals can support any SIM applications and services a provider develops (Carrara, 2000). Dual chip phones even have an additional SIM-size slot for an independent multi-application chip card targeted at payment, such as a bank-issued WIM card (wireless identification module) or EMV card (a payment standard defined by Europay, Mastercard, and Visa International) and other banking solution applications (Dezoysa, 2001-2). In the near future, wireless biometric services will emerge as a common solution (Young, 2001). A biometric is a unique physical or behavioral characteristic of the human body, which may be checked automatically. The absolute verification of a user makes biometrics the highest security level. Biometrics come in many forms. In 2000, fingerprints were the most widely used biometric, accounting for 50% of the market, followed by hand geometry (15%), face recognition (12%), voice recognition (10%), handwritten signature recognition (8%), and iris scan (4%) (Biometric Industry Report, 2001). In recent years, biometrics have gone digital, and modern electronic systems are capable of distilling the arches, loops and whorls of conventional fingerprints into a numerical code. As an example, Champion Technology, a Hong Kong company, has launched a fingerprint recognition system, which takes only a few seconds to accomplish recognition (Leary, 2001). Biometric authentication offers some promise of strong and convenient security for cell phones, in which the subscriberââ¬â¢s signature or fingerprint can be thought of (mathematically) as a large random number (Crowe, 2001). These are easy for the owner to present to a machine but difficult for others to fake, and they cannot be lost, stolen or borrowed. The growing m-commerce industry eventually will settle on a set of solutions to all of the different security problems, building end-to-end solutions that are secure, cost effective and easy for consumers to use. However, successfully implementing good quality solutions relies upon the acceptance of standards (either de facto or negotiated) within the highly interdependent functions of this industry. 4. 2 Value Chain Evolution As we discussed above, m-commerce is primarily rooted in the cash-rich mobile phone industry. Therefore, equipment vendors and network operators have been dominant in the m-commerce world. And in some sense, the mobile operators own virtually all of the value chains (Donegan, 2000). Unfortunately, this operator-dominated value chain is not able to successfully deliver flawlessly integrated personalized services for mobile phone users, which is crucial to the success of m-commerce (Swartz, 2001-2). In theory, mobile operators could compete at all levels of the m-commerce value chain, from the provision of basic technical services to the supply of lucrative, customer-facing content, but this is simply not possible, since this will spread their skills and resources too thin. This has been abundantly demonstrated in the e-commerce marketplace, where different companies tend to invest and to focus on their specific expertise at particular levels of the value chain. There are some exceptions, where dominant companies such as Microsoft and General Electric attempt to extend their reach vertically. Companies normally should concentrate on areas in which they naturally hold a competitive advantage. In m-commerce, mobile communication operators thus need to make difficult decisions about which parts of the value chain to compete in ââ¬â and how ââ¬â and which parts to avoid. There are many critical roles that they may be able to play and a number of business models that may be suitable in these roles (Tsalgatidou and Pitoura, 2001). Some mobile data industry observers believe that, although Europe has a more advanced mobile communication infrastructure, the European approach to the m-commerce market will fail (Darling, 2001). They suggest that many European service providers want to own the customers and to support all the applications that customers want to perform. Some mobile operators may even want to become banks or content providers in their own right but, even though carriers have all the critical capabilities in place, including location, shopping, e-wallets, promotion and personalization, without partnerships with knowledgeable merchants and intermediaries, prospective customers will have nothing to access. Therefore, partnerships between -commerce providers, interested content providers, and other businesses are critical to the success of m-commerce. Providing complex data services is a very different business from running a voice network, so carriers have to choose partners to provide content, and dec ide which services to offer their customers. In pursuing value-added services, more entrepreneurial companies have the products and capability to get them integrated and delivered to handhelds (Goldman, 2000). Also, since capitalizing on the promise of m-commerce requires an in-depth understanding of consumer behavior, significant opportunities arise not just for providers of telecommunications services, but also for companies that have a rich and thorough knowledge of consumer behavior. However, from the merchantsââ¬â¢ point of view, building m-commerce applications will present huge challenges, so companies need to leverage superior consumer insights to develop powerful branded solutions with value outside their traditional markets, particularly when forging alliances with telecommunications carriers (Nohria and Leestma, 2001). In a value chain, each party plays its specific role and gets its own benefits. Customer service charges depend on how much value the user receives, so there will be different pricing and business models for individual services (Secker, 2001; Darling, 2001). Revenue sharing in m-commerce value chains, particularly in those of location-based services (LBS), involving mobile operators, equipment vendors and application developers, will require a significant amount of negotiation. As an example, CT Motion is an LBS application developer and equipment vendor, providing operators with a platform to enable deploying and managing LBS. CT Motion licenses its platform to operators, with an initial fee to cover basic hardware costs and licensing. Additional payments to CT Motion depend on the revenue stream from application users. Thus, revenue share will essentially depend on the value of the application. For example, a company delivering a car theft recovery service is doing most of the work and so it might receive 95 percent of the revenue. For a simple application, the majority of the revenue will go to the operator and the platform enabler (Secker, 2001). In Table 3, we list the roles in an m-commerce value chain, the major players, and their corresponding sources of revenue. Table 3. Roles and Profit Sharing in the Value Chain | | | | |Role |Tasks |Major players |Sources of revenue | |Equipment Supplier |Manufacturing innovative handhelds and |Nokia, Ericsson, Motorola, etc |Selling phones, equipment, or | | |equipment | |sharing revenue with network | | | | |operators for discounted cell | | | | |phones | |Net work Operator |Developing and maintaining |Traditional carriers such as |Charges from increased network | | |infrastructure to support mobile data |Vodafone, Orange, Deutsche |traffic | | |communication |Telekom, AT and NTT DoCoMo | | |Service Hosting |Providing basic enabling services such |Existing Web-hosting companies |Shared revenue with application | | |as server hosting, data backup, systems|and system integrators such as |providers | | |integration and security control |Oracle | | |Portal Provider |Offering simple, categorized |Internet portal service providers|Fees charged to application | | |information search facilities crucial |such as Freeserve, AirFlash, |carriers and advertisers | | |to m-commerce applications. |Room33, Microsoft, Yahoo, AOL | | | | |Excite@Home. | | |Billing |Handling various sophisticated illing |Network operators such as |Transaction fees or interest | |Facilitator |mechanisms such as air-time-based, user|Vodafone, Orange, Deutsche |charged to merc hants or consumers | | |patterns-based, specific |Telekom, AT, NTT DoCoMo and | | | |application-based, location-based, etc |banks and credit card companies | | |Application Provider |Providing various end-user services |Existing Internet content |Revenue from customers for | | |such as ticket booking, e-mail |providers such as Yahoo, AOL and |services or products purchased | | |checking, news scanning, and |retail merchants (Coca-Cola, | | | |location-based services (LBSs) |PepsiCo, Procter Gamble, etc) | | To help observe the maturity of the various value chain components of m-commerce outlined in Table 3, and to understand where further development must occur, it is informative to consider the inter-corporate linkages of m-commerce. This can be done according to corporate contributions to required infrastructure, associated support services, and delivery of these services to customers. To this end, we have adapted the well-known University of Texas e-commerce model of Internet Economy Indicators (Whinston et al, 2001). In their model, there are four layers (Internet infrastructure, Internet applications infrastructure, Internet intermediary, and Internet commerce). M-commerce differs significantly from e-commerce, as we have pointed out, although there is some overlap in the functional nature of both. In our m-commerce value chain model, we also propose four layers: 1) Communications Infrastructure, 2) Applications Infrastructure, 3) M-commerce Intermediary, and 4) Mobile Commerce. Reading from the top of Table 3, the Communications Infrastructure layer includes equipment suppliers and network operators. The Applications Infrastructure includes service hosting, portal providers, and software companies that develop related software products and platforms. The M-commerce Intermediary layer includes billing facilitators, content providers, brokers, and market makers. Finally, the Mobile Commerce layer includes application providers that sell goods and services to customers. The interconnected and interdependent nature of these four layers of the value chain cannot be over-emphasized. Thus evolution in one layer will affect the other layers. For example, advances in the communications infrastructure, such as the widespread implementation of G3, will support new developments such as wireless video and bring more potential retail applications of mobile commerce that may be both time and location sensitive. But services to support these will require further evolution in both applications infrastructure and intermediaries. 4. 3 Active Customer Demand What is missing from m-commerce is compelling content that will make people want to use their handhelds to buy something. Consumers remain unconvinced about the wireless Web and user apathy towards wireless data services is believed to be one of the main factors delaying m-commerce implementation (Kelly, 2001). We propose that it is current narrowly-focused m-commerce applications (mainly on mobile Web systems) but not the fundamental nature of m-commerce, that frustrates consumers. The great advantage to people of eliminating fixed attachments to physical space, allows more strategic, creative, and flexible decisions and actually getting things accomplished (Kalakota and Whinston, 1996). Instead of waiting for killer applications to stimulate passive consumers, we propose that fundamental consumer demand is the active force that can improve the chance of m-commerce success. The success of the cell phone industry has already proved the significance of this active driving force. Today there are an estimated 115 million cellular phone users in the U. S. (Schooler, 2001). Market growth has been quite encouraging. Compared to the U. S, in Asia and Europe mobile telephony adoption is even more advanced (Herman, 2000). In Japan, the number of cell-phone users has already reached 66 million (Kunii, 2001). 64% of the people in Finland have a mobile phone, while the rate in Sweden stands at 55. 2% (Kruger, 2000). In China, the enthusiasm for mobile phones has exceeded all forecasts, and the mobile subscriber base will probably reach 250 to 300 million in 2005, up from 68 million in 2000 (Sliwa, 2001). Recently, the population of cell phone users in China has reached 135 million, making it the world leader. Beyond enjoying the basic service of mobile verbal communication, consumers are beginning to demand much more from their cell phones. Two-thirds of Japanââ¬â¢s cell-phone users subscribe to one of many mobile data services offered by the countryââ¬â¢s three cellular operators. Even though the actual demands vary according to different geographical locations and demographics, consumers have played a decisive role in the success or failure of m-commerce efforts. Most potential m-commerce successes will arise from consumer demand for additional value in their daily lives, and there is unlikely to be a single killer application that can spark m-commerce success. What consumers need is an adaptable package that can accommodate various m-commerce services (personalized location-specific and time-sensitive). It is the variety of cost justification criteria adopted by consumers (in turn determined by demographics, regional cultures, current fashions, etc. ) that fundamentally affect their decisions concerning specific m-commerce services. According to a Nokia research study that focused on m-commerce services in the U. K. South Korea, Italy, USA, Brazil and Finland, the proportion of respondents that would carry out a transaction of more than U. S. $25 using a mobile device, ranged from 24 to 54 percent (Dezoysa, 2001-1). Also, 90 per cent of all end-users surveyed that would consider using m-commerce, either now or some time in the future, would be willing to pay for its use. However, this is on the assumption that the mobile device is free. It is still uncertain whether the cost of next generation phones can be subsidized by operators and, if they are not, how the added cost of paying over $150 for a mobile phone might well affect this figure (Dezoysa, 2001-1). DoCoMo recently sold about 10,000 videophones at a U. S. $500 price, with service limited to Tokyo (Kunii, 2001). In Europe, the cost of providing advanced handhelds equipped with high tech features is also likely to be in the neighborhood of $500 or more (Carrigan, 2001). For the additional cost of high tech handhelds to be acceptable, consumers will expect to be able to access many additional services that are of value to them. In Europe, where mobile users are not charged for incoming calls, consumers can thus not only gain access to wireless services wherever there is a network presence but also keep tabs on time-critical information such as stock market reports or other urgent messages (Barnett et al. 2000). Such consumers are more likely to take advantage of these services. The focus in m-commerce needs to be on delivering simple, time-sensitive, and compelling applications that do not require a lot of training. If it takes too much time (e. g. more than 5 minutes) to conduct an m-commerce transaction, it might as well be done with a PC. One example is notification about tickets to entertainment and sporting events. A consumer can contact a ticketing agency, such as TicketMaster, to request notification of availability of tickets for sale for an upcoming concert. When tickets meeting the consumerââ¬â¢s criteria become available, TicketMaster sends a message to the consumerââ¬â¢s wireless device and asks if the consumer wants to buy them or not. This is a simple yes-or-no transaction (Lucas, 2001). Any applications that require consumers to input much information will not work, because of keyboard limitations. For example, a visit to Barnes Nobleââ¬â¢s WAP site to enter credit card number, address, and shipping information requires more than 100 keystrokes (Swartz, 2001-2). 4. 4 Synergy of three driving forces The success of m-commerce relies on the synergy of three driving forces: technology innovation, value chain evolution and active customer demand. Technology innovation provides more useful functions with lower prices, creating value for customers and stimulating customer demand. Technology innovation also demands high-level collaboration through the value chain. Active customer demand provides rich revenue sources for the value chain and stimulates technology innovation and the development of new applications. Value chain evolution ensures the collaboration of multiple parties through appropriate profit sharing, which in turn supports more technology innovation. Through positive interaction loops the three driving forces will eventually contribute to the success of m-commerce. This synergy is graphically illustrated in Figure 1. 5. Conclusions Are we ready for m-commerce? Differing perspectives of m-commerce may lead us to opposite answers. But our research into the nature of m-commerce shows that m-commerce applications are fundamentally different from those delivered in the Internet- based e-commerce environment. Simply transforming e-commerce services to cell phones or PDAs will merely expose the limitations of wireless handhelds and result in frustrating end-user experiences. Therefore, as we examine any speculation about m-commerce applications, we must attempt to exploit the unique features of mobile devices as well as to avoid their weaknesses. Furthermore, the eventual success of any m-commerce strategy depends on the synergy of the three driving forces we have identified: technology innovation, value chain evolution, and active customer demand. Acknowledgement: This research was sponsored by the research grant from Natural Science and Engineering Research Council of Canada. The authors are grateful for the anonymous refereesââ¬â¢ constructive comments and valuable suggestions on the improvement of earlier version of the manuscript. References: Barnett et al. (2000), Nick Barnett, Stephen Hodges, Michael J. Wilshire, ââ¬Å"M-commerce: an operatorââ¬â¢s manualâ⬠, The McKinsey Quarterly; New York; 2000, No. 3, pp. 162-173 Biometric Industry Report (2001), ââ¬Å"2000 Market Reviewâ⬠, Biometric Technology Today, Jan. , pp. 9-11. Brewin, (2001), Bob Brewin, ââ¬Å"M-commerce hits snag as cell carriers balkâ⬠, Com How to cite Driving Forces for M-Commerce Success, Essay examples
Thursday, December 5, 2019
Budgeting as a Tool for Planning and Control free essay sample
A budget is one of your best tools for reaching your goals ââ¬â whatever your age or stage in life. Itââ¬â¢s a plan of what money you expect to receive and how you expect to spend it. * Who should have a budget? * How to make a budget * Use the money planner * Things you need * Getting help * Tracking your spending * Making the most of your income Who should have a budget? Tip: A tight budget is harder to stick to. Be realistic. Everyone can benefit from a budget. Itââ¬â¢s not just for people who are having trouble making ends meet. If youââ¬â¢re spending less than you earn, use your budget to work out how much you can put aside each pay to improve your financial position. We call this ââ¬Ëpaying yourself firstââ¬â¢. If youââ¬â¢re spending more than you earn, use your budget to see where your money is going. We will write a custom essay sample on Budgeting as a Tool for Planning and Control or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Then see if there are any ways you can cut your spending or increase your income. Rick and Heather Mawby The Mawby family makes sure their money goes a long way. Read more Back to top How to make a budget Add up how much money is coming into your household (your income), and how much is going out (your spending), then work out the difference. The result is either money left over (a surplus) or not enough money to cover your spending (a deficit). Aim for a surplus so you have some money to save for your goals or pay off debt faster. Back to top Use the money planner Making a budget is easy with our money planner. Once youââ¬â¢ve set your budget you can save it in My Sorted to review later. You can save more than one budget and even share it with friends and family. The NZ Federation of Family Budgeting Services also has a free budget worksheet you can download. Back to top Things you need Your budget needs to be accurate or it wonââ¬â¢t work. Give yourself time to get all the information youââ¬â¢ll need, including: * A record of your day-to-day spending. Keep receipts from your shopping, and gather up bank statements and bills from the last three months. These will show regular expenses like rent, mortgage, hire purchase, credit cards, phone, power and insurance. * A list of annual costs. Think about things you pay for less regularly like vehicle licensing, medical expenses, gifts and holidays. * Your income details. A list of any money you get such as your pay, benefits or allowances, NZ Super or interest earned on savings. * Savings. Details of any regular savings you make. Back to top Getting help If you need help making a budget, or if you are having trouble making ends meet, contact a budget adviser. Back to top Tracking your spending Once youââ¬â¢ve set a budget you need to see how itââ¬â¢s working in reality. Keep a spending diary or use an online tool. Find out more about money tracking. Back to top Making the most of your income Budgeting isnââ¬â¢t just about watching your spending. How much you earn also affects whether you have money left over for saving or paying off debt. Why you need to grow your income If your income doesnt grow youââ¬â¢ll effectively earn less each year just because of inflation. So when youre planning your finances, dont forget to include goals for growing your income. Know what youââ¬â¢re worth Do you know what someone in your position with your experience and skills should be earning? Does your employer? To find out what youre worth, read the situations vacant in your local paper or check out the online job sites. You could even contact some recruitment agencies to find out what a similar job to yours is currently paying. You can also find broad salary information for different types of jobs on the Careers New Zealand website.
Thursday, November 28, 2019
The effects of trauma on patients and counselors
Trauma is an emotional reaction to a terrible event like rape, earthquake, floods, and accidents among others (Schein, 2006). Traumatic events can be divided into three major subdivisions; man-made disasters, natural disasters, and violence, crime, and terrorism (Schein, 2006).Advertising We will write a custom research paper sample on The effects of trauma on patients and counselors specifically for you for only $16.05 $11/page Learn More This research paper will discuss the effects of trauma on patients and counselors. Traumatic events such as earthquake and rape shall also be discussed in this research paper. Earthquake is a natural disaster that has claimed many lives including the recent 2011 Japan earthquake. Earthquake causes destruction of properties, displacement of people, and deaths. Earthquake causes human suffering and devastation among the directly affected individuals. On the hand, rape is a form of violence and a form of psychological tra uma (Baum and Contrada, 2009). In most cases, rape victims incur disturbance of emotions, physical, cognitive, and interpersonal characteristics (Schein, 2006). Rape victims experience Rape Trauma Syndrome (RTS), which occurs immediately and months or years after the event (Baum and Contrada, 2009). Generally, traumatic events have major heath effects to the directly and indirectly affected people. However, how we process emotions after such traumatic events is distinctive to different people. Most victims develop Post-Traumatic Stress Disorder especially when they loose family members or friends. Indirectly affected people face acute stress after reading or watching traumatic events on the television and newspapers. Children are most affected because they develop phobias (Schein, 2006). In case natural disaster like floods or earthquake, the survivors may have distressing dreams while children become excessively frightened. Individuals have illusions, hallucinations, and they exper ience flashbacks (Baum and Contrada, 2009).Advertising Looking for research paper on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More The victims are unable to have loving feelings, they feel detached from others, and they experience a sense of foreshortened future because they do not have ambitions any more (Schein, 2006). Some of the most persistent symptoms may occur and the victims cannot concentrate, become angry, and experience sleepless nights (Baum and Contrada, 2009). At this point, a counselor may help the victim to overcome the traumatic event. Counselors play the following role. First, counselors make the victims recollect the traumatic events by providing an environment for the victim to share their experience in an honest manner and this is the first step towards healing (Thompson, 2003). Secondly, counselors help the survivor to make decisions about their future based on past and present situation. The counselor also helps the victim to interpret what they are going through since it is the counselorââ¬â¢s responsibility to clarify what the survivor is experiencing without interrogating the victim (Thompson, 2003). As such, a counselor must give the victim time to rest to enable recollection of thoughts. Finally, counselors provide an appropriate solution concerning the traumatic event. In case of an earthquake, the counselor helps the victim to understand that the event did not happen because of their fault (Thompson, 2003). The survivors of the earthquake have to understand that they still have a bright future. The counselors also assist the victim to acquire an emergency shelter in case of displacement. Moreover, the counselor helps the victims come to terms with losing their loved ones by creating an environment to grieve. In addition, the counselor helps the victims to accept what has happened to them in order to start a new life. In case of rape, the counselor should explain to the vict im that they did not do anything to warrant what happened. As such, the counselor helps the victim understand that not all men are going to rape them. This will help the victim to trust other men.Advertising We will write a custom research paper sample on The effects of trauma on patients and counselors specifically for you for only $16.05 $11/page Learn More Massive disasters such as floods and tsunami cause vicarious reaction (Schein, 2006). The victims of such events experience anxiety and depression among other emotions including shock, anger, nightmares, grief, and confusion. In such as situation, the victims should go to seek counseling services. Notably, after and during counseling session most counselors experience secondary traumas such as anger, stress and other post-traumatic stress (Thompson, 2003). According to Thompson (2003), counselors with large numbers of victims experience disrupted beliefs and work related stress. Generally, counselo rs who work with survivors of traumas have increased chances of experiencing change in the psychological functioning (Thompson, 2003). The counselors may experience horrors, guilt, rage, grief, and may even lead to burnout (Pearlman and MacIan, 1995). At some point, the relationship between the counselor and victim may be affected. Due to secondary traumas, the counselors may say things that the victim may not be ready to hear. To overcome secondary traumas, the counselors should do the following. Counselors should attend seminars to be educated concerning potential dangers of dealing with victims of trauma events (Pearlman and MacIan, 1995). Secondly, affected counselors should go for training on the signs of secondary traumatic stress and treatment techniques (Thompson, 2003). To solve this, special training should be offered to counselors on how to avoid secondary traumatic stress and other related symptoms. It is also important to educate the student counselors on the nature of their job and potential dangers before they become counselors. In summary, traumatic events have adverse effects to both the client and the counselor. To reduce such cases advanced training is required to all counselors enable them help primary victim and become aware of their emotional state to help in dealing with secondary stress (Pearlman and MacIan, 1995).Advertising Looking for research paper on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Reference List Baum, A., Contrada, R. (2009). The Handbook of Stress Science: Biology,à Psychology, and Health. New York: Springer Publishing Company. Pearlman, L., MacIan, P. (1995). Vicarious traumatization: An empirical study of theà effects of trauma work on trauma therapists. Professional Psychology: Research and Practice, 26, 558-565. Schein, L. (2006). Psychological effects of catastrophic disasters: groupà approaches to treatment. New York: Routledge. Thompson, R. (2003). Counseling techniques: improving relationships with others,à ourselves, our families, and our environment. Philadelphia: Psychology Press. This research paper on The effects of trauma on patients and counselors was written and submitted by user Kaleb E. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Sunday, November 24, 2019
How to Withdraw from a Class
How to Withdraw from a Class While you know how to register for classes, knowing how to withdraw from a class can be a little more challenging. After all, your school probably didnt go over how to drop a class during orientation week; everyone is too busy planning and preparing for the start of a new semester. Sometimes, however, your awesome start-of-the-semester plans dont work out and you need to drop one or more classes. So just where do you begin? Talk to Your Academic Adviser Talking with your academic adviser is an absolute necessity, so start there. Be prepared, however; your adviser will likely want to ask you a few questions about why youre dropping and, if applicable, talk about whether or not you should drop the class. If you both decide that dropping the course is the best option, however, your adviser will have to sign off on your forms and approve the decision. He or she can also help you plan out how youre going to make up the course content and/or units that youll need to graduate. Talk to Your Professor You likely cant just drop the class without talking to the professor (even if theyre a bad one) or at least the TA. They are accountable for your progress in the class and for turning in your final grade at the end of the semester. Make an appointment or stop in during office hours to let your professor and/or TA know that youre dropping the class. If youve already talked to your academic adviser, the conversation should go pretty smoothly- and quickly. And given that youll likely need your professors signature on a form or approval to drop, this step is a requirement as well as a courtesy. Head to the Registrar's Office Even if your academic adviser and your professor know that youre going to drop the class, you have to officially let your college know. Even if you can do everything online, check in with your registrar to make sure you have submitted everything they need and that youve submitted it on time. Additionally, follow-up to make sure everything goes through okay. While you may have submitted your materials, they may not have received them for whatever reason. You dont want your withdrawal to turn into a ââ¬â¹fail on your transcript, and its much easier to confirm now that your drop went through okay than it is to correct things in several months when you realize an error was made. Tie up Any Loose Ends Make sure to let any lab partners know that youve dropped the class, for example. Similarly, return any equipment you may have checked out and remove yourself from the list of students who have a music rehearsal space reserved on a rotation basis. You dont want to needlessly be using resources that other students need or, even worse, be charged for their use when you dont need them any longer.
Thursday, November 21, 2019
Killing Us Softly 4 - movie review Essay Example | Topics and Well Written Essays - 750 words
Killing Us Softly 4 - movie review - Essay Example According to Hook, black women positively responded to Sapphire film which negated black female representation by showing how frustrated and violent black women are as well as terming black women as bitches? Interestingly, the black females instead responded to the movie by saying that it exactly portrayed what their characters and behavior are (Hooks 120-121) Women tend to copy perfection shown on the advertisements yet these flawless are not real and cannot be achieved by the advertisers themselves. Advantages portray models as people with slim perfect look hence making the audience to try to lose weight and gain smooth skin just like the image seen in the advertisement. It is interesting to note that failure for the audience to achieve or resemble the image of the celebrity is treated as let down (Kilbourne Film). The message Kilbourne communicates is that no matter how much we try to idolize other people, we can never be perfect at all. Women should just accept their normal looks without imitating others. Advertisement and the media do not show us reality and this is even evident when the celebrities portrayed as beautiful also dispute the media imaging. There is no photograph of a woman that is not photo shopped and beauty is depicted by a white ideal that includes light skin and straight hair (Kilbourne Film). Advertisements normally dismember women bodies by focusing only one part of the body such as breast, unlike men whose bodies are not scrutinized and criticized.
Subscribe to:
Posts (Atom)