M_Commerce Means Mobile Computing
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1
Abstract
Many technologies and applications have appeared recently which are directed at mobile computing and the wireless Web. Wireless (or mobile) e-commerce is concerned with conducting transactions and other business activity with these new technologies and applications. This research looks at some of the relevant technologies, applications, and issues in wireless e-commerce. Mobile computing and mobile communications in order to provide a large number of advanced services to mobile users. The potentials of mobile e-commerce are enormous while related technical, business and legal issues become more complicated. The goal of this paper is to present and discuss problems associated with the trading and billing of tangible and intangible goods in an environment, where mobile handheld devices are used to conduct transactions and to identify requirements for these.
Determinants of Knowledge of Emergency Contraception in a Socially and Economically Developed states of India: A study of Kerala and Punjab
In general contraceptive use has been accepted by the couples in developing countries. However, the major contraceptive adopted was sterilization due to fears about temporary contraceptives like acceptability and knowled...
Impact of Positive and Negative Experience on Life Satisfaction in High School Students
"The last two decades were characterized by increasing pressure to improve student achievements through high academic accountability emphasis. As a result, curriculum goals have become more academic and skill-oriented, a...
Influence of Government Policy, Legal Policy and Social Infrastructure on the E-Adoption: A Cross Country Analysis
"This study explores the influence of three macro environmental factors - government policies, legal policies and social infrastructure – on the e-adoption in the selected countries. For this study the three independent...
The Detection of Sybil Attack by Location Based Privacy System
In this system Sybil attack is detected by localization of nodes by using the infrastructures. Privacy and security are the two important issues in VANETs. Sybil attack is an attack that the malicious user pretends to be...
Simulation and Analysis of the Effect of Change of Different Parameters on the Characteristics of PV Cell Using LTspiceIV
This paper presents the effect of change of temperature, solar irradiance, series resistance and shunt resistance on Photovoltaic (PV) cell. To observe these phenomena models of PV system are constructed using LTspice IV...