Present market reality, however, seems to be less optimistic, therefore, the current study explores the factors contributing to the adoption of mobile services in a context of wireless finance" (p. 206).
Organization of the Study
Chapter two will consist of the literature review of published works and research studies on the subject of mobile commerce. There are many points-of-view and definitions of m-commerce and this chapter will attempt to examine the data as it relates to what is also referred to wireless e-commerce.
Chapter three through chapter five will substantiate and provide the details of the research methodology utilized for collecting the data. The collected data will be used to answer the research questions.
The author will discuss the analyses of the research data and its results in chapter three. The analyses will focus on the technological challenges, characteristics, and quality of service of mobile commerce. Financial institutions appear to be at the forefront technically than other retailers and organizations. This chapter will analyze the development of reliable infrastructures, which is necessary to administer m-commerce consumers.
Consumer acceptance, behaviors, and trustworthiness of m-commerce are also analyzed in chapter four. M-commerce is categorized by many researchers as an extension of electronic commerce, but consumers may not view m-commerce the same. This chapter will follow the Technology Acceptance Model to determine the consumer's usefulness of m-commerce, its perceived ease of use, and perceived value; in addition to examine consumers' adoption of m-commerce.
Chapter five will explore the factors that influence consumers' behavior for using m-commerce. The author will gather and analyze demographic data to include age, gender, social status/income, race/ethnicity, and household population.
Chapter six will conclude the study by compiling the data and results gathered in the previous chapters. The author's results will offer insight into implications on why or why not adopt mobile commerce. Finally, this chapter will summarize the findings and determine if the study presented limitations and may need further research.
CHAPTER II:
REVIEW of LITERATURE
Mobile commerce, also known as m-commerce, is described as a form of electronic commerce where at least part of the transaction is conducted via a mobile device, most often with a mobile telephone (Bhatti, 2007, p.2; Mallat & Tuunainen, 2008, p.24). The term m-commerce was adopted by marketers in the late 1990s, and predictions were made of rapid growth in the volume of commerce conducted through mobile devices (Clarke, 2008, p.63). Bhatti's study (2007) assumed mobile commerce applications are becoming an important area of electronic commerce generating substantial profits. Rapidly developing technology capabilities and mobile device adoptions have increasingly led to the expectations of a mobile commerce, similar in scale to the first wave of electronic commerce experienced in the late 1990s (p.2). A report from Boston Consulting Group predicted that "global m-commerce sales" would rise rapidly to $20 billion in 2001, $60 billion in 2002 and $100 billion in 2003 (Clarke, 2008, p.63).
Mention mobile commerce in North America and the common response is a roll of the eyes. it's not hard to guess why. Back in the early days of the Internet dot-com bubble, m-commerce was one of the many buzz words connected with e-commerce whose promise failed to materialize because the hype was premature. Today's landscape is much different. Several trends are helping to drive momentum for consumer purchases over mobile phones. They include the growth in mobile data services, advances in handsets and operator networks, consumer acceptance of the Internet as a purchasing and payment vehicle, and growing consumer interest in mobile banking" (Vyas, 2008, p.14).
Technology Acceptance Model: The Conceptual Framework
In the Information Systems (IS) field, the importance of technology acceptance as the precursor to the use of technology has attracted much attention (Kim, Koo & Song, 2007, p.15). The TAM model proposes that beliefs about usefulness and ease-of-use of a new system are essential elements in determining a user's attitude to using a technology (Bhatti, 2007, p.2; de Ruyter, Kleijnen & Wetzels, 2004, p.207; Kim, Koo & Song, 2007, p.15). TAM is based upon, and has been compared with, the theory of reasoned action and the theory of planned behavior. TAM has been applied to different technologies' acceptance such as voice mail, e-mail, micro-computer, Word, Excel, data systems, and information retrieval (Kim, Koo & Song, 2007, p.16). It has been argued that TAM is an appropriate theory to use in m-commerce contexts as well. It was argued that predicting users' behavior in a wireless context would be similar to that of an e-commerce context (Kim, Koo & Song, 2007, p.16).
A de Ruyter, Kleijnen & Wetzels (2004) studied perceived costs, perceived system quality and social influence had been incorporated as antecedents considering the relevance of these constructs for...
They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and
virtual environment has become more and more populated with devices and mechanisms that allow people to become increasingly more mobile. There has been a constant increase in the way in which people tend to act in their day-to-day activities by using their personal computers, laptops, tablets, mobile phones and all kind of technology developments that allows them to be in contact with the rest of the world by the
Security in Healthcare The recent advances in technology -- databases that store personal medical records and information -- are bringing tools to patients, doctors and other healthcare professionals that were simply not available just a few years ago. There is hope that eventually, a doctor in Hawaii that is treating a medical emergency for a tourist from Florida, will be able to access the digitally kept medical and healthcare records
home control system using mobile commerce -- or, how your cell phone can connect you to your home when you are away from home For better or for worse, the cell phone technology has changed modern communication and modern life. Mobile communication systems have undoubtedly made modern human beings more 'connected' to one another, or at least more able to talk to, or to reach one another, at any point
Chapter 1: Introduction Wireless communications are, to any extent, the most rapidly growing section of the communications sector. For this reason, it has seized the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communications systems have faced exponential growth and development and there exist billions of users all over the globe. Statistics indicate that by the culmination
Airport Security System The secure operation of the aviation system across the globe is one of the most significant factors in the security and economic development of the United States. The use of the world's airspace should also be secured because aviation has become a major target for criminals. Actually, criminals, terrorists, and hostile nations increasingly consider aviation as a major target for exploitation and attack. An example of the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now