HOME > Detail View

Detail View

Mobile commerce and wireless computing systems

Mobile commerce and wireless computing systems

Material type
단행본
Personal Author
Elliott, Geoffrey , 1964-. Phillips, Nigel 1956-
Title Statement
Mobile commerce and wireless computing systems / Geoffrey Elliott and Nigel Phillips.
Publication, Distribution, etc
Harlow, England ;   New York :   Pearson/Addison Wesley ,   2004.  
Physical Medium
xviii, 532 p. : ill. ; 24 cm.
ISBN
0201752409 (alk. paper) 9780201752403
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Mobile computing. Mobile commerce. Wireless communication systems.
000 00995pamuu22003014a 4500
001 000045334550
005 20070308140537
008 030416s2004 enka b 001 0 eng
010 ▼a 2003051276
020 ▼a 0201752409 (alk. paper)
020 ▼a 9780201752403
035 ▼a (KERIS)REF000007286400
040 ▼a DLC ▼c DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.59 ▼b .E45 2004
082 0 0 ▼a 004.165 ▼2 22
090 ▼a 004.165 ▼b E46m
100 1 ▼a Elliott, Geoffrey , ▼d 1964-.
245 1 0 ▼a Mobile commerce and wireless computing systems / ▼c Geoffrey Elliott and Nigel Phillips.
260 ▼a Harlow, England ; ▼a New York : ▼b Pearson/Addison Wesley , ▼c 2004.
300 ▼a xviii, 532 p. : ▼b ill. ; ▼c 24 cm.
504 ▼a Includes bibliographical references and index.
650 0 ▼a Mobile computing.
650 0 ▼a Mobile commerce.
650 0 ▼a Wireless communication systems.
700 1 ▼a Phillips, Nigel ▼d 1956-
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 004.165 E46m Accession No. 121142383 Availability Available Due Date Make a Reservation Service B M
No. 2 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 004.165 E46m Accession No. 121142384 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents


CONTENTS
Preface = xv
Acknowledgements = xvii
1 Mobile commerce(M-commerce) : definitions and context = 1
 1.1 Defining M-commerce = 3
 1.2 A short history of wireless computing = 4
  1.2.1 First generation wireless communication = 4
  1.2.2 Second generation wireless communication = 5
  1.2.3 Third generation wireless communication = 7
 1.3 Diffusion of M-commerce innovation = 10
 1.4 Obstacles to M-commerce = 11
 1.5 The Mobile Internet and mobile information assets = 12
 1.6 The untethered Mobile Internet = 15
 1.7 M-commerce versus E-commerce = 20
 1.8 The wireless world = 21
 1.9 Pervasive computing systems, theory and practice = 23
 1.10 Trends in mobile and pervasive computing = 24
 1.11 Applications of M-commerce = 26
 1.12 The trend towards mobile working = 27
  1.12.1 Wireless telemetry and wireless telematics = 28
  1.12.2 Tracking and monitoring the mobile workforce = 29
  1.12.3 Customer-focused products and services = 30
 1.13 Effectiveness and efficiency in mobile domains = 32
 1.14 The M-commerce value chain = 33
 1.15 Networked wireless business systems = 37
 1.16 Bluetooth technology = 37
 1.17 Factors determining M-commerce innovation and adoption in the 21st century = 38
  1.17.1 Five characteristics of innovation = 40
  1.17.2 The socio-technical perspective of technology innovation and adoption = 41
 1.18 Conclusions = 44
 Short self-assessment questions and Group activity = 45
 References and Bibliography = 47
2 Commercial communications and networks = 49
 2.1 Introduction = 51
 2.2 The nature of commercial communication = 54
 2.3 Communication and language complexity = 55
 2.4 Information and meaning = 58
  2.4.1 Information as channel capacity = 60
  2.4.2 Information as a measure of variety = 60
  2.4.3 Information as a means of reducing uncertainty = 62
  2.4.4 Information as a measure of an agent's ability to estimate a parameter = 62
 2.5 Data and knowledge = 63
 2.6 Shared meaning = 64
 2.7 Communication and information theory = 66
  2.7.1 Source = 66
  2.7.2 Transmitter = 66
  2.7.3 Channel = 67
  2.7.4 Noise = 67
  2.7.5 Receiver = 67
  2.7.6 Destination = 67
  2.7.7 Channels and transportation = 68
 2.8 Telecommunications and networks = 69
 2.9 Media types in telecommunications = 72
  2.9.1 Bound media = 72
  2.9.2 Unboud media = 73
 2.10 Modulation and digitization = 75
  2.10.1 Modulation = 75
  2.10.2 Digitization = 75
 2.11 Communication network infrastructures = 76
 2.12 Types of channel = 79
  2.12.1 Circuit switching = 79
  2.12.2 Packet switching = 79
  2.12.3 Protocols and protocol stacks = 80
 2.13 The International Standards Organization reference Model = 81
  2.13.1 Application Layer = 83
  2.13.2 Presentation Layer = 84
  2.13.3 Session Layer = 84
  2.13.4 Transport Layer = 85
  2.13.5 Network Layer = 86
  2.13.6 Data Link Layer = 86
  2.13.7 Physical Layer = 87
 2.14 Transport Control Protocol/Internet Protocol(TCP/IP) = 87
 2.15 Communications network devices = 89
  2.15.1 Transceivers = 89
  2.15.2 Repeaters = 89
  2.15.3 Bridges = 90
  2.15.4 Hubs = 90
  2.15.5 Routers = 90
  2.15.6 Switches = 90
  2.15.7 Gateways = 90
  2.15.8 Wireless access points = 90
  2.15.9 Mobile terminal = 91
 2.16 Network topologies = 91
  2.16.1 Mesh topology = 91
  2.16.2 Bus topology = 92
  2.16.3 Star topology = 92
  2.16.4 Star bus = 92
  2.16.5 Hierarchical star = 93
  2.16.6 Ring = 93
  2.16.7 Ad hoc wireless = 94
  2.16.8 Infrastructure wireless = 94
  2.16.9 Piconet = 94
  2.16.10 Network addresses = 95
 2.17 Conclusions = 96
 Short self-assessment questions and Group activity = 97
 References and Bibliography = 98
3 Wireless protocols : context and usage = 101
 3.1 Introduction = 103
 3.2 Wireless cellular phone networks = 105
  3.2.1 History and development of cellular radio networks = 106
  3.2.2 Current and future cellular communication networks = 109
  3.2.3 Cellular radio networks = 113
  3.2.4 Cellular mobility management = 115
  3.2.5 Wireless operational features = 116
 3.3 The Wireless Applications Protocol(WAP) = 117
 3.4 WAP architecture layers = 122
  3.4.1 The Wireless Application Environment(WAE) layer = 124
  3.4.2 The Wireless Session Protocol(WSP) layer = 124
  3.4.3 The Wireless Transaction Protocol(WTP) layer = 125
  3.4.4 The Wireless Transport Layer Security(WTLS) = 126
  3.4.5 The Wireless Datagram Protocol(WDP) layer = 126
 3.5 WAP functionality and adaptation = 127
 3.6 Service bearer adaptation = 129
 3.7 Comparison of wireless and wired network Internet protocols = 130
 3.8 The integration of WAP and TCP/IP within the OSI architecture model = 132
 3.9 The Mobile Internet = 135
  3.9.1 Mobile Internet network operators = 135
  3.9.2 Wireless Internet portal providers = 136
 3.10 The Mobile Internet - services and products = 139
 3.11 Other wireless Internet providers = 142
 3.12 A case study of iMode = 143
  3.12.1 iMode service operation = 145
  3.12.2 Characteristics of iMode = 147
 3.13 A comparison of WAP and iMode = 148
 3.14 WAP and iMode billing models = 149
 3.15 Conclusions = 151
 Short self-assessment questions and Group activity = 152
 References and Bibliography = 154
4 Wireless programming for mobile devices : context and usage = 157
 4.1 Introduction = 159
 4.2 The development and use of the xHTML = 161
 4.3 WML and xHTML convergence = 162
 4.4 A comparison of WML and xHTML transmission protocols = 164
 4.5 Creating an Internet WAP site = 165
  4.5.1 Step 1 - Downloading an emulator = 165
  4.5.2 Step 2 - Creating and building the WAP or xHTML site = 168
  4.5.3 Step 3 - Registering and publishing a WAP site = 169
 4.6 Developing a basic WAP site using WML = 170
 4.7 WML and WML Script = 172
 4.8 The WML language basics - elements and attributes = 173
 4.9 WML deck navigation - event and task handling = 177
 4.10 Push and pull browsing = 182
 4.11 WML option menus and variables = 183
 4.12 Passwords and security in WML = 190
 4.13 Handling text formatting, tables and images in WML = 192
 4.14 Capturing and sending information within the WAP environment = 194
 4.15 Application and web server access security = 196
 4.16 WML Scripting within the WAP environment = 196
  4.16.1 Variables = 197
  4.16.2 Functions = 199
  4.16.3 Pragmas = 199
 4.17 WML Script libraries = 201
 4.18 WML Script statements = 202
 4.19 WML site usability issues = 205
 4.20 Hosting WAP sites = 206
 4.21 Conclusions = 207
 Short self-assessment questions and Group activities = 208
 References and Bibliography = 210
 Appendix 4.1 Commonly used WML tags = 211
 Appendix 4.2 Commonly used HTML tags = 215
5 Operating systems : micro and macro devices = 217
 5.1 Introduction = 219
 5.2 Target devices = 219
 5.3 Mobile-specific operating systems requirements = 222
  5.3.1 Wireless networking = 222
  5.3.2 Location independent computing = 223
  5.3.3 Physical constraints of devices = 223
  5.3.4 Increased levels of uncertainty in the environment = 223
  5.3.5 Differences in psychological affordance of small devices = 224
 5.4 Operating systems basics for wireless understanding = 224
 5.5 Operating system abstractions = 227
  5.5.1 Systems processes = 228
  5.5.2 Multi-processing environments = 228
  5.5.3 Memory management = 229
  5.5.4 Virtual memory = 231
 5.6 Information protection and security = 231
 5.7 Scheduling and resource management = 232
 5.8 Dividing to rule = 234
 5.9 Modern operating system concepts = 236
  5.9.1 The kernel = 236
  5.9.2 Multi-threading = 237
  5.9.3 Object-oriented programming = 238
 5.10 Operating systems requirements for mobile devices = 239
  5.10.1 Wireless networks and telephony = 239
  5.10.2 Processing power = 240
  5.10.3 Computing and computation = 241
  5.10.4 Mobile memory = 241
  5.10.5 Mobile network security = 241
  5.10.6 Multimedia = 243
 5.11 Mobile applications = 244
  5.11.1 vCard = 244
  5.11.2 vCalendar = 245
  5.11.3 Messaging = 246
  5.11.4 Subscriber Identity Module(SIM) = 246
 5.12 The Java Virtual Machine(JVM) = 247
  5.12.1 Java 2 Micro Edition = 249
  5.12.2 Configuration and profiles = 250
  5.12.3 Java Connected Device Configuration(CDC) = 250
  5.12.4 Java Connected, Limited Device Configuration(CCDC) implementation = 251
  5.12.5 JavaPhone = 251
  5.12.6 JavaCard - smart cards = 251
 5.13 Mobile device operating systems = 252
  5.13.1 Palm OS = 252
  5.13.2 Embedded Microsoft Windows = 255
  5.13.3 Symbian = 257
 5.14 Comparisons of mobile device platforms = 260
 5.15 Conclusions = 262
 Short self-assessment questions and Group activities = 263
 References and Bibliography = 265
6 Personal area and mobile networking = 267
 6.1 Introduction = 269
 6.2 The development of area networks = 270
  6.2.1 Personal Operating Space(POS) = 271
  6.2.2 Personal Area Networks(PANs) = 273
  6.2.3 Personal information appliances = 275
 6.3 Wireless-enabled domestic appliances = 276
 6.4 Environment characteristics = 277
  6.4.1 Mobile wireless environments = 278
  6.4.2 Static wireless environments = 278
  6.4.3 Smart spaces = 278
  6.4.4 Biddable spaces = 279
 6.5 Local Area Networks(LANs) = 279
  6.5.1 The network backbone = 279
  6.5.2 Fibre Distributed Data Interface(FDDI) = 279
  6.5.3 Ethernet 802.3 = 280
  6.5.4 Carrier Sense Multiple Access with Collision Detection(CSMA/CD) = 280
 6.6 Wireless networks = 281
  6.6.1 Power, range and data rate = 281
  6.6.2 IEEE 802.11b wireless Ethernet = 282
  6.6.3 CSMA/CA = 282
  6.6.4 802.11a = 284
  6.6.5 HiperLAN2 = 284
 6.7 Personal area network intelligent gateways = 285
 6.8 Bluetooth technology = 287
 6.9 Bluetooth radio frequency channels = 289
 6.10 Bluetooth piconets = 290
  6.10.1 Network master and slaves = 290
  6.10.2 Scatternets = 291
 6.11 Establishing and maintaining wireless connections = 292
  6.11.1 Wireless operating modes = 293
  6.11.2 Creating network connections = 294
 6.12 The physical connection = 296
  6.12.1 Time-slots = 296
  6.12.2 Frequency-hopping = 297
  6.12.3 Security = 298
  6.12.4 IEEE 802.15 = 299
 6.13 Wireless surveillance = 300
 6.14 Wireless service discovery and use = 301
  6.14.1 JINI = 302
  6.14.2 Universal Plug and Play(UPnP) = 304
  6.14.3 Salutation = 304
 6.15 Conclusions = 305
 Short self-assessment questions and Group activity = 306
 References and Bibliography = 307
7 Wireless applications : push and pull services and products = 311
 7.1 Introduction = 313
 7.2 WAP push and pull messaging = 314
 7.3 The Short Message Service(SMS) = 316
 7.4 SMS pricing = 318
 7.5 Push profiling = 318
 7.6 Profiling cookies = 319
 7.7 Base platform services = 320
  7.7.1 Digital content services = 322
  7.7.2 Digital content products = 323
 7.8 M-commerce services for consumers = 324
 7.9 Electronic cash(e-cash) = 326
 7.10 Mobile electronic banking(e-banking) = 327
 7.11 Mobile alerts = 330
 7.12 Mobile gambling = 330
 7.13 M-commerce services for business = 331
  7.13.1 Wireless business-to-business = 331
  7.13.2 Mobile collaboration = 333
  7.13.3 Wireless business-to-consumer = 334
 7.14 Wireless Internet business model = 335
 7.15 Mobility and location = 338
  7.15.1 Global Positioning Systems(GPSs) = 338
  7.15.2 Mobile network location = 340
  7.15.3 Location triangulation = 341
 7.16 Mobile systems thinking = 343
 7.17 Wireless business applications = 345
  7.17.1 Static mobile environments = 346
  7.17.2 Location-response mobile environments = 346
  7.17.3 Dedicated-embedded mobile environments = 346
  7.17.4 Wireless systems connectivity = 346
  7.17.5 Wireless systems flexibility = 348
 7.18 The economics of wireless Internet data = 353
 7.19 Mobile Multimedia Portals(MMPs) = 356
 7.20 Conclusions = 357
 Short self-assessment questions and Group activity = 357
 References and Bibliography = 359
 Appendix 7.1 SMS texting = 361
8 Pervasive and embedded mobile systems = 363
 8.1 Defining pervasive computing = 365
 8.2 Technologies within the pervasive computing domain = 368
 8.3 Networked pervasive computing = 370
  8.3.1 First generation pervasive computing = 371
  8.3.2 Second generation pervasive computing(and beyond) = 372
 8.4 Embedded systems ergonomics = 373
 8.5 Wearable computing = 374
 8.6 Biometric systems = 380
  8.6.1 Fingerprints = 381
  8.6.2 Hand geometry = 381
  8.6.3 Facial features = 382
  8.6.4 Eye features = 382
  8.6.5 Voice features = 382
  8.6.6 Signature features = 383
 8.7 Biometric issues and systems security = 383
 8.8 Biometric systems applications = 386
 8.9 Biometric systems integration = 388
 8.10 Digital signatures = 389
 8.11 Automobile telematics and vehicle telemetry = 391
 8.12 In-vehicle user interfaces and applications = 393
  8.12.1 Voice-activated interfaces = 394
  8.12.2 Internet applications = 394
 8.13 Universal Information Appliances(UIAs) = 397
 8.14 Obstacles in pervasive computing = 399
 8.15 Conclusions = 400
 Short self-assessment questions and Group activity = 401
 References and Bibliography = 403
 Appendix 8.1 : MEMS - Big ideas for Small Devices = 404
9 Security in a mobile world = 409
 9.1 Introduction = 411
 9.2 Aspects of security = 412
  9.2.1 General security issues = 413
  9.2.2 General security threats = 413
  9.2.3 Mundane threats = 414
  9.2.4 Policy = 415
 9.3 Wireless network security = 415
  9.3.1 Network environments = 415
  9.3.2 Communication channel threats = 416
  9.3.3 Misappropriation and misuse threats = 418
 9.4 Access control = 418
 9.5 Encryption = 420
  9.5.1 Codes = 421
  9.5.2 Code breaking = 422
 9.6 The Diffie-Hellman key agreement method = 424
 9.7 Security aspects of wireless networks = 425
 9.8 Wide area wireless network security - 3G = 426
  9.8.1 User domain roles = 428
  9.8.2 Infrastructure domain roles = 429
  9.8.3 Network traffic = 430
  9.8.4 Network intruders = 430
  9.8.5 Off-line parties = 430
  9.8.6 Mobile terminals and UICC = 430
  9.8.7 Radio interface = 431
  9.8.8 Wired interfaces = 431
  9.8.9 Home environments and users = 432
  9.8.10 Requirements to reduce or avoid vulnerabilities = 432
 9.9 Wireless Local Area Network(WLAN) security features = 433
  9.9.1 IEEE 802.11b = 434
  9.9.2 Service Set Identifier(SSID) = 435
  9.9.3 The authentication protocol = 436
  9.9.4 Wired Equivalent Privacy(WEP) = 437
 9.10 Bluetooth and Personal Area Network(PAN) security = 438
  9.10.1 Ad hoc network vulnerabilities = 439
 9.11 Bluetooth baseband security = 440
 9.12 Bluetooth security profiles = 443
 9.13 The headset security model = 444
 9.14 Securing small devices = 447
 9.15 Conclusions = 448
 Short self-assessment questions and Group activity = 449
 References and Bibliography = 450
10 Enabling the mobile workforce : extending enterprise applications = 453
 10.1 The agile and mobile workforce = 455
 10.2 Supporting the mobile workforce = 457
  10.2.1 Device and technology maintenance = 457
  10.2.2 Integrating killer apps = 458
  10.2.3 The cost of mobile worker access = 459
 10.3 Mobile systems development = 460
 10.4 Issues in M-commerce = 462
 10.5 Privacy = 463
 10.6 Social, ethical and legal issues = 463
 10.7 Ethical business behaviour = 465
 10.8 Ethical issues = 466
 10.9 Ethical dilemmas in wireless business systems = 467
 10.10 Rights and duties, and privileges and responsibilities = 468
  10.10.1 Duties = 468
  10.10.2 Rights = 469
  10.10.3 Privileges = 469
  10.10.4 Responsibilities = 469
 10.11 Trust and control = 470
  10.11.1 Confidentiality = 471
  10.11.2 Freedom and capabilities = 472
  10.11.3 Freedom and constraint = 472
  10.11.4 Freedom to participate = 473
 10.12 Surveillance = 474
 10.13 Data protection = 475
  10.13.1 Data protection principles = 475
  10.13.2 Monitoring at work = 477
 10.14 Impact analysis using a real-world case study = 481
 10.15 Conclusions = 483
 Short self-assessment questions = 483
 References and Bibliography = 483
 Appendix 10.1 Impact analysis using a real-world case study = 485
M-commerce glossary = 511
Index = 523


New Arrivals Books in Related Fields

김종원 (2020)