SlideShare a Scribd company logo
1 of 23
M-COMMERCE
MADE BY-
RHITIK (BCA 1st year)
WHAT
IS
M-COMMERCE?
The term mobile commerce was originally
coined in 1997 by Kevin Duffey at the
launch of the Global Mobile Commerce
Forum, to mean "the delivery of electronic
commerce capabilities directly into the
consumer’s hand, anywhere, via wireless
technology."
IN
SIMPLE
TERMS
E-COMMERCE
+
WIRELESS WEB
=
M-COMMERCE
HISTORY
 M-Commerce Services were first delivered in 1997,
when the first two mobile-phone enabled Coca Cola
vending machines were installed in the Helsinki area
in Finland. The machines accepted payment via SMS
text messages. The first mobile phone-based
banking service was launched in 1997 by Merita
Bank of Finland, also using SMS.
 The M-Commerce server developed in late 1997 by
Kevin Duffey at Logica.
 Since the launch of the iPhone, mobile Commerce
has moved away from SMS systems and into actual
applications.
E-COMMERCE
v/s
M-COMMERCE
 M-commerce stands for Mobile Commerce while E-
commerce stands for Electronic Commerce.
 M-commerce uses mobile devices for commercial
transactions while E-commerce uses Computers.
 M-commerce is available anyplace you go, even if there
is no cable Internet. For E-commerce, you still need to go
to a place where there is Internet to access your online
transactions.
 M-commerce is very handy and easy to carry while
E-commerce you cannot
always bring with you ,your
computer or laptop
anywhere.
 M-commerce however is
costly compared to E-
commerce.
ATTRIBUTES
OF
M-COMMERCE
 Ubiquity
 Convenience
 Interactivity
 Personalization
 Localization
PLAYERS
IN
M-COMMERCE
User:-
User is defined as a person who is authorized to use his Personal
Trusted Device (PTD). Every user of M-Commerce is associated
one or more PTDs. Users of m-commerce can be divided into two
main categories:
End users or system users:
Retail subscribers of mobile phone services who uses mobile
phones for commercial activity comes under this category. Here the
benefit or the end-result is received by the subscriber.
Suppliers:
In this category the end-result or benefit is obtained by an
organization that utilizes M-Commerce for increasing the
productivity and efficiency of its activities.
M-COMMERCE LIFE CYCLE
SERVICES
AND
APPLICATIONS
 Mobile Ticketing
 Mobile Money Transfer
 Content purchase and delivery
 Information services
 Mobile Banking
 Mobile Browsing
 Mobile Purchase
 Mobile Marketing and Advertising
 Payment through E-Wallets
EMERGING
ISSUES
IN
M-COMMERCE
Security:-
There are security issues at several levels:-
Data Security:
One of the concerns is the data security among the different entities.
There are no standard interfaces which have been defined till now.
This has slowed down the developments in these areas.
Device Security:
A Personal Trusted Device has limited liability for a subscriber. The
question is, if a user can use someone else’s phone but pays for the
purchase of goods/services. SIM is a legal identity, as the subscriber
signs a contract with the operator. The operator owns the card. If the
equipment cannot be legally used by multiple people, then this would
put a restriction on the popularity.
EMERGING
ISSUES
IN
M-COMMERCE
Service Security:
Additional security features apart from what is provided
by the standard protocols are needed for commercial
organizations and other entities to entrust their
applications on mobiles.
Usability Problem:
oSmall size of mobile devices (screens, keyboards, etc).
oLimited storage capacity of devices.
oHard to browse sites.
Technical Limitation:
oSlack of a standardized security protocol.
oInsufficient bandwidth.
FUTURE
TRENDS
IN
M-COMMERCE
TECHNOLOGY
GROWTH
Perceived Security:
Perceived security is important for success of M-
Commerce. People are willing to give a credit card in a
restaurant but will not pay by card over internet.
However, mobile phone is more secure than a PC and
hence require lesser security systems.
Security Overhead for M-Commerce security:
Initial systems must be highly conservative in terms of
security overheads for transactions. The Telenor
solution uses SMS or a data call as a bearer to send
authentication (PKI certificates) from a mobile to a
server.
VARIATIONS
IN
SECURITY
POLICIES
Different security policies have to be formulated
according to scenarios. For e.g., for “small
payments” using a mobile device, an user would
not like to tolerate a long authentication
procedure. For large payments (e.g. airline
tickets), a more comprehensive security system
would be appropriate.
M-COMMERCE
USING
WIRELESS
TECHNOLOGY
There is an increasing tendency to associate M-
commerce with mobile technology alone. There
is a definite roll for fixed wireless systems like
WLAN and also short-range communication
systems like a Bluetooth protocol device.
DEVELOPMENT
OF
APPLICATIONS
 Hence applications needs
to be created for two categories
of users:
o Users having low bit rate connectivity or narrow band
connectivity:
All 2G mobile users would come in this category. For e.g., a
GSM end-user can obtain a data rate of upto9.6kbps.
o Broadband mobile connectivity:
This category would involve all 2.5G and 3G users. The data
rate of this category of users would vary between 20kbps to
365kpbs depending on the technology and network.
OPPORTUNITIES
 Network Operators:
With increase in data traffic, there would be increased efficiency in the
network. This can be catered to by the current systems. Mobile
operators can also provide technical support for financial services
across their network.
 Equipment Vendors:
With increase in data traffic there is more demand for upgrade and
next generation products. This would trigger development of more
innovative products which could handle data traffic more efficiently.
 Service Providers:
M-commerce provides an opportunity for service providers to move up
the value chain by providing data and commerce applications. This
also opens up a new value chain for service providers.
 Financial Sector:
There is increased for financial institutions and banks that
can provide additional services and also expand their
reach. It also give more opportunities for other related
organizations to assume additional roles of a Commerce
mediator.
 Billing and Customer care vendors:
New billing systems and customer care systems are
required for the new systems developed. There is a
Herculean task of developing highly efficient billing
systems for the equipments.
 Other wireless equipment vendors:
WLAN and short term wireless vendors can find new
applications for their products. This would increase the
usage and hence boost the industry.
REFERENCES
 https://en.wikipedia.org/wiki/Mobile_commerce
 https://www.businessinsider.in/finance/news/rise-of-m-
commerce-mobile-ecommerce-shopping-stats-trends-in-
2020/articleshow/72860972.cms
 https://www.retaildive.com/news/mobile-powers-76-of-large-
fashion-retailers-web-visits/549116/
 https://www.bigcommerce.com/blog/mobile-commerce/
THANKYOU

More Related Content

What's hot

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructureRaj vardhan
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3Habib Ullah Qamar
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceVinay Chaithanya
 
Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain SecurityITU
 
Future of m commerce services in india
Future of m commerce services in indiaFuture of m commerce services in india
Future of m commerce services in indiaHiMangi PatEl
 
Lesson 2 - Benefits of E-Commerce
Lesson 2 - Benefits of E-CommerceLesson 2 - Benefits of E-Commerce
Lesson 2 - Benefits of E-CommerceJamie Hutt
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
E-com, E-payment & EDI
E-com, E-payment & EDIE-com, E-payment & EDI
E-com, E-payment & EDIAkhil Kaushik
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network SecurityMithilDoshi1
 
#FinTech Regulation Overview co-presented
#FinTech Regulation Overview co-presented #FinTech Regulation Overview co-presented
#FinTech Regulation Overview co-presented CFTE
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commercemc aa
 

What's hot (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructure
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
E - Commerce
E - CommerceE - Commerce
E - Commerce
 
Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
Understanding Blockchain Security
Understanding Blockchain SecurityUnderstanding Blockchain Security
Understanding Blockchain Security
 
M Commerce
M CommerceM Commerce
M Commerce
 
Future of m commerce services in india
Future of m commerce services in indiaFuture of m commerce services in india
Future of m commerce services in india
 
Lesson 2 - Benefits of E-Commerce
Lesson 2 - Benefits of E-CommerceLesson 2 - Benefits of E-Commerce
Lesson 2 - Benefits of E-Commerce
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Blockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptxBlockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptx
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
E-com, E-payment & EDI
E-com, E-payment & EDIE-com, E-payment & EDI
E-com, E-payment & EDI
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
 
#FinTech Regulation Overview co-presented
#FinTech Regulation Overview co-presented #FinTech Regulation Overview co-presented
#FinTech Regulation Overview co-presented
 
Edge computing
Edge computingEdge computing
Edge computing
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 

Similar to M commerce

Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
 
Protocols in Mobile Electronic Commerce
Protocols in Mobile Electronic CommerceProtocols in Mobile Electronic Commerce
Protocols in Mobile Electronic CommerceIJERA Editor
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India? Ranjit Kumar
 
Introduction to IBM MessageSight
Introduction to IBM MessageSightIntroduction to IBM MessageSight
Introduction to IBM MessageSightAndrew Schofield
 
Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014Arnaud Mathieu
 
Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...IAEME Publication
 
H imanshu final mcs ppt 20147
H imanshu final mcs ppt 20147H imanshu final mcs ppt 20147
H imanshu final mcs ppt 20147Himanshu Phatnani
 
H imanshu final mcs ppt 20147
H imanshu final mcs ppt 20147H imanshu final mcs ppt 20147
H imanshu final mcs ppt 20147Himanshu Phatnani
 
Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2CMR WORLD TECH
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionPaul Van Doorn
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online bankingAbhilash Kallayil
 

Similar to M commerce (20)

Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
MIS 11 M-Commerce
MIS 11 M-CommerceMIS 11 M-Commerce
MIS 11 M-Commerce
 
Cmsc666 Mc
Cmsc666 McCmsc666 Mc
Cmsc666 Mc
 
Protocols in Mobile Electronic Commerce
Protocols in Mobile Electronic CommerceProtocols in Mobile Electronic Commerce
Protocols in Mobile Electronic Commerce
 
WK9.pptx
WK9.pptxWK9.pptx
WK9.pptx
 
Mobile Commerce
Mobile CommerceMobile Commerce
Mobile Commerce
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?
 
Introduction to IBM MessageSight
Introduction to IBM MessageSightIntroduction to IBM MessageSight
Introduction to IBM MessageSight
 
Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
E-Mobile
E-Mobile E-Mobile
E-Mobile
 
M-Commerce
M-CommerceM-Commerce
M-Commerce
 
Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...Efficient m commerce marketing application based internet of things using nea...
Efficient m commerce marketing application based internet of things using nea...
 
H imanshu final mcs ppt 20147
H imanshu final mcs ppt 20147H imanshu final mcs ppt 20147
H imanshu final mcs ppt 20147
 
H imanshu final mcs ppt 20147
H imanshu final mcs ppt 20147H imanshu final mcs ppt 20147
H imanshu final mcs ppt 20147
 
Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
E commerce
E commerce E commerce
E commerce
 
Mobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosionMobile Enterprise, the coming explosion
Mobile Enterprise, the coming explosion
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online banking
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

M commerce

  • 2. WHAT IS M-COMMERCE? The term mobile commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum, to mean "the delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology."
  • 4. HISTORY  M-Commerce Services were first delivered in 1997, when the first two mobile-phone enabled Coca Cola vending machines were installed in the Helsinki area in Finland. The machines accepted payment via SMS text messages. The first mobile phone-based banking service was launched in 1997 by Merita Bank of Finland, also using SMS.  The M-Commerce server developed in late 1997 by Kevin Duffey at Logica.  Since the launch of the iPhone, mobile Commerce has moved away from SMS systems and into actual applications.
  • 5. E-COMMERCE v/s M-COMMERCE  M-commerce stands for Mobile Commerce while E- commerce stands for Electronic Commerce.  M-commerce uses mobile devices for commercial transactions while E-commerce uses Computers.  M-commerce is available anyplace you go, even if there is no cable Internet. For E-commerce, you still need to go to a place where there is Internet to access your online transactions.  M-commerce is very handy and easy to carry while E-commerce you cannot always bring with you ,your computer or laptop anywhere.  M-commerce however is costly compared to E- commerce.
  • 6. ATTRIBUTES OF M-COMMERCE  Ubiquity  Convenience  Interactivity  Personalization  Localization
  • 7. PLAYERS IN M-COMMERCE User:- User is defined as a person who is authorized to use his Personal Trusted Device (PTD). Every user of M-Commerce is associated one or more PTDs. Users of m-commerce can be divided into two main categories: End users or system users: Retail subscribers of mobile phone services who uses mobile phones for commercial activity comes under this category. Here the benefit or the end-result is received by the subscriber. Suppliers: In this category the end-result or benefit is obtained by an organization that utilizes M-Commerce for increasing the productivity and efficiency of its activities.
  • 9. SERVICES AND APPLICATIONS  Mobile Ticketing  Mobile Money Transfer  Content purchase and delivery  Information services  Mobile Banking  Mobile Browsing  Mobile Purchase  Mobile Marketing and Advertising  Payment through E-Wallets
  • 10. EMERGING ISSUES IN M-COMMERCE Security:- There are security issues at several levels:- Data Security: One of the concerns is the data security among the different entities. There are no standard interfaces which have been defined till now. This has slowed down the developments in these areas. Device Security: A Personal Trusted Device has limited liability for a subscriber. The question is, if a user can use someone else’s phone but pays for the purchase of goods/services. SIM is a legal identity, as the subscriber signs a contract with the operator. The operator owns the card. If the equipment cannot be legally used by multiple people, then this would put a restriction on the popularity.
  • 11. EMERGING ISSUES IN M-COMMERCE Service Security: Additional security features apart from what is provided by the standard protocols are needed for commercial organizations and other entities to entrust their applications on mobiles. Usability Problem: oSmall size of mobile devices (screens, keyboards, etc). oLimited storage capacity of devices. oHard to browse sites. Technical Limitation: oSlack of a standardized security protocol. oInsufficient bandwidth.
  • 13. TECHNOLOGY GROWTH Perceived Security: Perceived security is important for success of M- Commerce. People are willing to give a credit card in a restaurant but will not pay by card over internet. However, mobile phone is more secure than a PC and hence require lesser security systems. Security Overhead for M-Commerce security: Initial systems must be highly conservative in terms of security overheads for transactions. The Telenor solution uses SMS or a data call as a bearer to send authentication (PKI certificates) from a mobile to a server.
  • 14. VARIATIONS IN SECURITY POLICIES Different security policies have to be formulated according to scenarios. For e.g., for “small payments” using a mobile device, an user would not like to tolerate a long authentication procedure. For large payments (e.g. airline tickets), a more comprehensive security system would be appropriate.
  • 15. M-COMMERCE USING WIRELESS TECHNOLOGY There is an increasing tendency to associate M- commerce with mobile technology alone. There is a definite roll for fixed wireless systems like WLAN and also short-range communication systems like a Bluetooth protocol device.
  • 16. DEVELOPMENT OF APPLICATIONS  Hence applications needs to be created for two categories of users: o Users having low bit rate connectivity or narrow band connectivity: All 2G mobile users would come in this category. For e.g., a GSM end-user can obtain a data rate of upto9.6kbps. o Broadband mobile connectivity: This category would involve all 2.5G and 3G users. The data rate of this category of users would vary between 20kbps to 365kpbs depending on the technology and network.
  • 18.  Network Operators: With increase in data traffic, there would be increased efficiency in the network. This can be catered to by the current systems. Mobile operators can also provide technical support for financial services across their network.  Equipment Vendors: With increase in data traffic there is more demand for upgrade and next generation products. This would trigger development of more innovative products which could handle data traffic more efficiently.  Service Providers: M-commerce provides an opportunity for service providers to move up the value chain by providing data and commerce applications. This also opens up a new value chain for service providers.
  • 19.  Financial Sector: There is increased for financial institutions and banks that can provide additional services and also expand their reach. It also give more opportunities for other related organizations to assume additional roles of a Commerce mediator.  Billing and Customer care vendors: New billing systems and customer care systems are required for the new systems developed. There is a Herculean task of developing highly efficient billing systems for the equipments.  Other wireless equipment vendors: WLAN and short term wireless vendors can find new applications for their products. This would increase the usage and hence boost the industry.
  • 20.
  • 21.
  • 22. REFERENCES  https://en.wikipedia.org/wiki/Mobile_commerce  https://www.businessinsider.in/finance/news/rise-of-m- commerce-mobile-ecommerce-shopping-stats-trends-in- 2020/articleshow/72860972.cms  https://www.retaildive.com/news/mobile-powers-76-of-large- fashion-retailers-web-visits/549116/  https://www.bigcommerce.com/blog/mobile-commerce/