Skip to main content

Mobile Commerce

weitere Zeitschriftenartikel


ACTNET: End-to-End Learning of Feature Activations and Multi-stream Aggregation for Effective Instance Image Retrieval

We propose a novel CNN architecture called ACTNET for robust instance image retrieval from large-scale datasets. Our key innovation is a learnable activation layer designed to improve the signal-to-noise ratio of deep convolutional feature maps.

Syed Sameed Husain, Eng-Jon Ong, Miroslaw Bober


OMBM-ML: efficient memory bandwidth management for ensuring QoS and improving server utilization

As cloud data centers are dramatically growing, various applications are moved to cloud data centers owing to cost benefits for maintenance and hardware resources. However, latency-critical workloads among them suffer from some problems to fully …

Hanul Sung, Jeesoo Min, Donghun Koo, Hyeonsang Eom


A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment

Internet of Things (IoT) is a novel paradigm that connects several physical devices and the cyber world over the Internet. IoT technology is growing rapidly and soon will have an enormous innovation in our daily lives. With the increasing number …

Mohd Shariq, Karan Singh


26 years left behind: a historical and predictive analysis of electronic business research

This article reviews 26 years (1994–2020) of research on electronic business published in reputable journals of the field. The basic aim behind this study is to define the growth potential of electronic business and marketing as a theoretical …

Tuğçe Ozansoy Çadırcı, Ayşegül Sağkaya Güngör

18-01-2021 | Survey Article

Edge computing: current trends, research challenges and future directions

The edge computing (EC) paradigm brings computation and storage to the edge of the network where data is both consumed and produced. This variation is necessary to cope with the increasing amount of network-connected devices and data transmitted …

Gonçalo Carvalho, Bruno Cabral, Vasco Pereira, Jorge Bernardino


Should the assembly system with direct omnichannel introduce integrated management service? A game-theoretical modelling study

Against the background of omnichannel retailing, this paper tries to explore the incentive conditions/regions of adopting integrated management service (IMS) and the operational strategies/performance for the assembly system with direct …

Zhisong Chen, Jianhui Peng


Investigation of information sharing via multiple social media platforms: a comparison of Facebook and WeChat adoption

This study evaluates different antecedents affecting information sharing via multiple social media platforms on a large scale. In doing so, this research compares the effects of information sharing behavior factors via Facebook and WeChat …

Muhammad Riaz, Sherani

01-12-2020 | Research | Issue 1/2020 Open Access

Wi-Fi indoor positioning and navigation: a cloudlet-based cloud computing approach

Wi-Fi-based indoor positioning for determining accurate wireless indoor location information has become crucial in meeting increasing demands for location-based services by leveraging the Internet of Things (IoT) and ubiquitous connectivity. Most …

Tran Trong Khanh, VanDung Nguyen, Xuan-Qui Pham, Eui-Nam Huh


An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework

The purpose of this research is to assess the impact of trust, when balanced with risk and benefit, on consumer intention to adopt mobile payment systems. A research model is created to assess intent based on perceived trust, along with three …

Amita Goyal Chin, Mark A. Harris, Robert Brookshire


Influence of Habits on Mobile Payment Acceptance: An Ecosystem Perspective

With the increase in the use of various mobile devices, mobile payments have become a crucial driver for commerce success. However, the percentage of consumers who use or continue using mobile payments in the US is low. This study adopts …

Lin Jia, Xiuwei Song, Dianne Hall

20-10-2020 | Original Paper Open Access

Scoping the ethical principles of cybersecurity fear appeals

Fear appeals are used in many domains. Cybersecurity researchers are also starting to experiment with fear appeals, many reporting positive outcomes. Yet there are ethical concerns related to the use of fear to motivate action. In this paper, we …

Marc Dupuis, Karen Renaud


Mobile Data Science and Intelligent Apps: Concepts, AI-Based Modeling and Research Directions

Artificial intelligence (AI) techniques have grown rapidly in recent years in the context of computing with smart mobile phones that typically allows the devices to function in an intelligent manner. Popular AI techniques include machine learning …

Iqbal H. Sarker, Mohammed Moshiul Hoque, Md. Kafil Uddin, Tawfeeq Alsanoosy

11-09-2020 | Theoretical article | Issue 4/2020

Customers’ acceptance intention of self-service technology of restaurant industry: expanding UTAUT with perceived risk and innovativeness

This study validates the unified theory of acceptance and use of technology (UTAUT) model, extended to include risk and innovativeness as additional factors, to identify antecedents that influence customers’ intention to adopt self-service …

Hyeon Mo Jeon, Hye Jin Sung, Hyun Young Kim

31-07-2020 | Regular Paper | Issue 11/2020

An efficient projection-based method for high utility itemset mining using a novel pruning approach on the utility matrix

High utility itemset mining is an important extension of frequent itemset mining which considers unit profits and quantities of items as external and internal utilities, respectively. Since the utility function has not downward closure property …

Mohammad Karim Sohrabi

21-07-2020 Open Access

Building Consumers’ Trust in Electronic Retail Platforms in the Sub-Saharan Context: an exploratory study on Drivers and Impact on Continuance Intention

Lack of trust can have a negative influence on consumers’ willingness to use electronic retail (e-tail) platforms especially in countries with weak regulations and poor consumer rights. This paper examined factors that can be employed to build …

Kayode Odusanya, Olu Aluko, Banita Lal

17-06-2020 | Issue 6/2020

Investigating the drivers and barriers to MOOCs adoption: The perspective of TAM

Massive Open Online Courses (MOOCs) are emerging as the new trend for modern higher education institutions. Student acceptance is viewed as the key determinant for the success of MOOCs. This study intends to examine factors influencing higher …

Ahmad Samed Al-Adwan

20-05-2020 | Methodologies and Application | Issue 21/2020

Optimized channel allocation in emerging mobile cellular networks

The task of optimizing service quality in wireless networks is a continuous research that requires the design of efficient channel allocation schemes. The problem is how limited channel resources can be maximally utilized, to guarantee seamless …

Daniel Asuquo, Moses Ekpenyong, Samuel Udoh, Samuel Robinson, Kingsley Attai

13-05-2020 | Methodologies and Application | Issue 22/2020

Deep learning-based sequential pattern mining for progressive database

Sequential pattern mining (SPM) is one of the main application areas in the field of online business, e-commerce, bioinformatics, etc. The traditional approaches in SPM are unable to accurately mine the huge volume of data. Therefore, the proposed …

Aatif Jamshed, Bhawna Mallick, Pramod Kumar

06-05-2020 | Issue 3/2020

New challenges in sport entrepreneurship for value creation

Sport entrepreneurship has rapidly gained popularity in the entrepreneurship, management and sports fields due to the way it balances practice with theory. Despite the increased interest in sport entrepreneurship there is still much to know about …

Vanessa Ratten, Paul Jones

14-04-2020 | Original Paper | Issue 5/2020

An empirical investigation of the adoption of mobile health applications: integrating big data and social media services

With the advancement of digital technologies, the mobile healthcare industry aims to enhance health intelligence through delivering transformational digital services. This study integrates knowledge derived from three models of innovation …

Tahereh Saheb

13-04-2020 | Issue 1/2021

Exploring the website object layout of responsive web design: results of eye tracking evaluations

Due to the increasing dependence on mobile devices worldwide, web designers are starting to design websites that are suitable for mobile devices such as smartphones and tablets. The aim of this paper is to find out which structures of interface …

Jason C. Hung, Chun-Chia Wang

01-03-2020 | Betriebspraxis & Führung | Issue 3/2020

Was ist Pflicht, was die Kür?

Der B2B-E-Commerce wächst - und das stärker als der Onlinehandel im B2C. Kann sich Ihr Unternehmen deswegen zurücklehnen und abwarten, bis die Umsätze sprudeln? Selbstverständlich nicht!

Matthias Eckert


Targeted reminders of electronic coupons: using predictive analytics to facilitate coupon marketing

Electronic coupon (e-coupon) is one of the most important marketing tools in B2C e-commerce. To improve the e-coupon redemption rate and reduce marketing costs, it is crucial to retarget customers who have received e-coupons and have higher …

Li Li, Xiaotong Li, Wenmin Qi, Yue Zhang, Wensheng Yang


Adoption and Performance of Mobile Sales Channel for e-Retailers: Fit with M-Retail Characteristics and Dependency on e-Retailing

While the Internet drives the first transition of sales channels from physical stores to web storefronts, it is mobile devices like smartphones that provide the mobility and ubiquity wired desktop computers lack and that enable the second …

Yen-Chun Chou, Benjamin B. M. Shao

07-01-2020 | Schwerpunkt | Issue 1/2020

IT-Outsourcing im E-Commerce: Ein schwerwiegender Managementfehler?

Unternehmen betrachten ihre IT bis heute überwiegend als Kostenfaktor. Der Trend zum Outsourcing ist daher auch im E‑Commerce-Umfeld ungebrochen. Zwar lassen sich kurzfristig Einsparungen erzielen. Dass mittel- bis langfristig jedoch …

Martin Menz

11-12-2019 | Original Article | Issue 1/2020

Service quality factors affecting customer attitudes in online-to-offline commerce

In an online-to-offline (O2O) environment, a company operates multiple channels: online, mobile, and offline. A company attracts customers and triggers payments online or via mobile, and then leads customers to an offline store to receive the …

Yunji Moon, Deborah J. Armstrong

01-12-2019 | Research | Issue 1/2019 Open Access

The effect of mobile technology on self-employment in Kenya

This study examines the effect of mobile technologies on the choice of self-employment in Kenya. The study used the 2016 household FinAccess retail survey data, which was collected using stratified multi-stage sampling to ensure representativeness …

Eliud Dismas Moyi

01-12-2019 | Research | Issue 1/2019 Open Access

Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage

Due to the increasing popularity of recent advanced features and context-awareness in smart mobile phones, the contextual data relevant to users’ diverse activities with their phones are recorded through the device logs. Modeling and predicting …

Iqbal H. Sarker, A. S. M. Kayes, Paul Watters

01-12-2019 | Research | Issue 1/2019 Open Access

Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification

Mobile contactless payment (MCP) is the future technology that is used for mobile payments, mobile wallet, transportation, and for mobile coupons. Existing solutions in this realm do not ensure end-to-end communication, information privacy, and …

Shaik Shakeel Ahamad, Al-Sakib Khan Pathan

01-12-2019 | Original article | Issue 1/2019 Open Access

Evaluation of e-commerce location and entry to China – implications on shipping and trade

E-commerce is experiencing strong global growth, and leading market is nowadays that of China, whether it is evaluated from the perspective of domestic market size or cross-border volumes. In this research work further understanding and knowledge …

Yulia Panova, Albert Tan, Olli-Pekka Hilmola, M. H. Puvindran, Xu Hongsheng, Weidong Li


The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical Investigation

This study develops a scale to measure individual differences in the centrality of visual website aesthetics (CVWA) and then examines the impact of the CVWA on users’ responses. Drawing on the concept of individual differences in the centrality of …

Supavich Fone Pengnate, Rathindra Sarathy, Todd J. Arnold


The value of offline channel subsidy in bricks and clicks: an O2O supply chain coordination perspective

This paper aims to explore a rarely studied mutual promotional effects, operational strategies and cross-channel subsidy policies in a two-stage/two-player online-to-offline (O2O) supply chain. The centralized, decentralized and coordination …

Zhisong Chen, Li Fang, Shong-Iee Ivan Su

22-10-2019 | Original Article | Issue 2-4/2019

The impact of mobility, risk, and cost on the users’ intention to adopt mobile payments

With the development of mobile communication technology and the wide application of intelligent devices, mobile payments with great commercial potential have been born. However, the penetration rate of mobile payment is not satisfactory. In order …

Yong Liu, Meng Wang, Danyu Huang, Qiang Huang, Hua Yang, Zhigang Li


Four generational cohorts and hedonic m-shopping: association between personality traits and purchase intention

In retailing, it is recognized that prominent differences exist between generational cohorts. As such, analysis of varying patterns of personality traits and their effects between generations is essential for understanding consumer behaviors. This …

Sabina Lissitsa, Ofrit Kol

07-09-2019 | Theoretical article | Issue 1/2020

“Untact”: a new customer service strategy in the digital age

The Industry 4.0 era has brought a shift in consumers’ purchasing behaviors from traditional retailing to online and/or mobile channels, triggered by advanced digital technologies and an easy access to the global market. Smart digital devices and …

Sang M. Lee, DonHee Lee


Adaptive Security for Self-Protection of Mobile Computing Devices

Mobile computing has emerged as a pervasive technology that empowers its users with portable computation and context-aware communication. Smart systems and infrastructures can exploit portable and context-aware computing technologies to provide …

Aakash Ahmad, Asad Waqar Malik, Abdulrahman Alreshidi, Wilayat Khan, Maryam Sajjad

13-08-2019 | Methodologies and Application | Issue 7/2020

The influences of channel subsidy on consumers in a dual-channel supply chain

This paper examines the influence of subsidies provided by traditional (e.g., a bricks-and-mortar retail mall) and electronic (e.g., Alibaba and Amazon) retail platforms to consumers. We look at the competition between traditional retailers, who …

Zhang Zhao, Ming-Hsiang Chen, Hua Ke, Alberto Sa Vinhas

05-08-2019 | Review Paper | Issue 4/2020 Open Access

Technology readiness: a meta-analysis of conceptualizations of the construct and its impact on technology usage

The technology readiness (TR) index aims to better understand people’s propensity to embrace and use cutting-edge technologies. The initial TR construct considers four dimensions—innovativeness, optimism, insecurity, and discomfort—that …

Markus Blut, Cheng Wang

22-07-2019 | Issue 3/2019

End-to-middle-to-end solution for IMS media plane security

IP multimedia subsystem (IMS) is becoming the prevailing candidate for managing future mobile multimedia communications, including critical communications such as public safety, emergency professionals and corporate networks. IMS security and …

Jose Oscar Fajardo, Fidel Liberal, Fudong Li, Nathan Clarke, Is-Haka Mkwawa

02-07-2019 | Long Paper | Issue 3/2020

A confirmatory factor analysis of the behavioral intention to use smart wellness wearables in Malaysia

Wearable technology refers to the next generation of the digital revolution that connects items with embedded sensors to the Internet so as to enhance the quality of human life. Wearables have shifted the focus of the healthcare sector toward …

Naghmeh Niknejad, Ab Razak Che Hussin, Imran Ghani, Fatemeh Ashraf Ganjouei

01-07-2019 | Survey | Issue 4/2019

Moving Objects with Transportation Modes: A Survey

In this article, we survey the main achievements of moving objects with transportation modes that span the past decade. As an important kind of human behavior, transportation modes reflect characteristic movement features and enrich the mobility …

Jian-Qiu Xu, Ralf Hartmut Güting, Yu Zheng, Ouri Wolfson

07-06-2019 | Issue 6/2020

Investigating the Impact of Personality Traits of Social Network Sites Users on Information Disclosure in China: the Moderating Role of Gender

Social network sites (SNS) are a very popular method of online communication among university students, where users are willing to share personal and private information with other users. The purpose of this research is to investigate the possible …

Samar Mouakket, Yuan Sun

08-05-2019 | Issue 3/2019

A Novel Protocol for Security of Location Based Services in Multi-agent Systems

Multi-agent systems are automated form of software technology to enhance many applications in our life. However, this technology does not come along with embedded security features which hindering its widespread usage in commercial systems such as …

Hussam Al-Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh, Yousof Al-Hammadi, Ernesto Damiani

07-05-2019 | Issue 2/2019

Estimation of Distribution Algorithm for Joint Resource Management in D2D Communication

Device to device (D2D) communication technique is one of the established means to enhance data rate in next generation wireless systems. Use of same resource of cellular users by D2D pairs creates interference problem among users. Simultaneous …

Mushtaq Ahmad, Muhammad Naeem, Muhammad Iqbal

30-04-2019 | Focus | Issue 11/2020

Recognizing important factors of influencing trust in O2O models: an example of OpenTable

Online-to-offline/offline-to-online (O2O) business models have attracted lots of enterprisers to enter this market. In such a fast-growing competition, some studies indicated that lack of trust will bring a great damage to O2O business. Related …

Jing-Rong Chang, Mu-Yen Chen, Long-Sheng Chen, Wan-Ting Chien

10-04-2019 | ORIGINAL ARTICLE | Issue 5-8/2019

An advanced IoT system for assisting ubiquitous manufacturing with 3D printing

An advanced Internet-of-things (IoT) system for assisting ubiquitous manufacturing with three-dimensional (3D) printing was designed. The system receives orders from customers on the move online and then distributes the required pieces to nearby …

Toly Chen, Yu-Cheng Wang

01-04-2019 | Schwerpunkt | Issue 4/2019

Digitale Identität als Fundament der vertrauenswürdigen Transformation

eID-Systeme im internationalen Überblick

Die elektronische Identität (eID) zählt zu den Schlüsseltechnologien für eine erfolgreiche Digitalisierung – und das nicht nur in Deutschland, sondern in ganz Europa und darüber hinaus. Der vorliegende Beitrag skizziert die aktuelle …

Dr. Dipl.-Ing. Detlef Houdeau, Tina Hühnlein, Dipl. Math. Klaus-Dieter Wolfenstetter

21-03-2019 | Regular Paper | Issue 1/2020

Mining maritime traffic conflict trajectories from a massive AIS data

The growing volume of maritime traffic is proving a hindrance to navigational safety. Researchers have sought to improve the safety of maritime transportation by conducting statistical analysis on historical collision data in order to identify the …

Po-Ruey Lei


Scenario based e-commerce recommendation algorithm based on customer interest in Internet of things environment

With the development of mobile commerce, situational awareness and Internet of things, the boundaries of e-commerce have been greatly expanded, and it has entered a big data era of business information. However, customers are faced with the …

Xiao-qiang Wu, Lei Zhang, Song-ling Tian, Lan Wu

27-02-2019 | Research Paper | Issue 4/2020

How Do Market Standards Inhibit the Enactment of Digital Capabilities?

A Case Study of Airline Pricing

Digital capabilities can improve organizations’ performance by supporting complex decision-making processes. However, when market standards constrain their enactment, the potential benefits promised by digital capabilities do not realize. The …

Daniel Fürstenau, Catherine Cleophas, Natalia Kliewer

01-02-2019 | Issue 1/2019

Users Intention for Continuous Usage of Mobile News Apps: the Roles of Quality, Switching Costs, and Personalization

Mobile news apps have emerged as a significant means for learning about latest news and trends. However, in light of numerous news apps and information overload, motivating users to adopt one app is a major concern for both the industry and …

Qiongwei Ye, Yumei Luo, Guoqing Chen, Xunhua Guo, Qiang Wei, Shuyan Tan

22-01-2019 | Research Article | Issue 5/2019

Privacy-preserving edge-assisted image retrieval and classification in IoT

Internet of Things (IoT) has drawn much attention in recent years. However, the image data captured by IoT terminal devices are closely related to users’ personal information, which are sensitive and should be protected. Though traditional …

Xuan Li, Jin Li, Siuming Yiu, Chongzhi Gao, Jinbo Xiong

02-01-2019 | Issue 4/2019

Self-Reported and Computer-Recorded Experience in Mobile Banking: a Multi-Phase Path Analytic Approach

Mobile banking (MB) has emerged as a strategic differentiator for financial institutions. This study explores the limitations associated with using subjective measures in MB studies that solely rely on survey-based approaches and traditional …

Mousa Albashrawi, Hasan Kartal, Asil Oztekin, Luvai Motiwalla

19-12-2018 | Issue 3/2019

A comprehensive look at luxury brand marketing research from 2000 to 2016: a bibliometric study and content analysis

The purpose of this study is to examine how scholarly research on luxury brand marketing has evolved in the twenty-first century. This literature review focuses on 242 articles related to luxury marketing. The contributions of these articles are …

Farhad Aliyev, Taylan Urkmez, Ralf Wagner

01-12-2018 | Research | Issue 1/2018 Open Access

CrashSafe: a formal model for proving crash-safety of Android applications

Each software application running on Android powered devices consists of application components that communicate with each other to support application’s functionality for enhanced user experience of mobile computing. Application components inside …

Wilayat Khan, Habib Ullah, Aakash Ahmad, Khalid Sultan, Abdullah J. Alzahrani, Sultan Daud Khan, Mohammad Alhumaid, Sultan Abdulaziz

01-12-2018 | Sales & Science | Issue 12/2018

Wie Big Data gewinnsteigerndes Preismanagement fördert

Die Digitalisierung wirkt sich auf Pricingprozesse und neue Geschäfts- und Preismodelle aus und birgt große Gewinnpotenziale für das Pricing. Dennoch nutzen viele B2B- und B2C-Unternehmen die Möglichkeiten des digitalisierten Preismanagements …

Markus B. Hofer, Thomas Weiber

12-11-2018 | Conceptual/Theoretical Paper | Issue 4/2019

Driving growth of Mwallets in emerging markets: a retailer’s perspective

The technology growth and evolving customer expectations in emerging markets have led firms to search for strategic tools to engage customers. The digital payment industry has seen the emergence of a new mobile-based service called Mwallet: a …

V. Kumar, Nandini Nim, Amalesh Sharma

23-10-2018 | Issue 2/2019

IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics

Object tracking is a fundamental problem in Supply Chain Management (SCM). Recent innovations eliminate the difficulties in traditional approach such as manual counting, locating the object, and data management. Radio Frequency Identification …

S. Anandhi, R. Anitha, Venkatasamy Sureshkumar

19-09-2018 | Issue 3/2018

Factors Affecting Retailer’s Adopti on of Mobile Payment Systems: A SEM-Neural Network Modeling Approach

The development of mobile commerce depends on extensively accepted mobile payment (MP) systems. Even though new MP methods have been gradually induced in the market, but their adoption has stayed modest. Little research has been conducted to …

Ali Nawaz Khan, Ahsan Ali

17-09-2018 | Empirical article | Issue 2/2019

Understanding shopping routes of offline purchasers: selection of search-channels (online vs. offline) and search-platforms (mobile vs. PC) based on product types

With the advent of the Internet and mobile technologies, shopping behavior has become increasingly complex due to the variety of channels providing consumers with various options to search and buy. However, contrary to our common belief, offline …

Eunhye Kim, Christian Fernando Libaque-Saenz, Myeong-Cheol Park

18-08-2018 | Issue 3/2020

The Digital Divide and Older Adult Population Adoption, Use and Diffusion of Mobile Phones: a Quantitative Study

Due to the changing demographics of societies around the world, ageing has become a major concern for governments and policy makers alike. What has also become clear is that the older adult consumer group and the factors affecting this age group …

Jyoti Choudrie, Sutee Pheeraphuttranghkoon, Soheil Davari

02-06-2018 | Issue 7-8/2018

Multi-agent cognitive architecture-enabled IoT applications of mobile edge computing

Mobile edge computing (MEC) offers cloud capabilities and service environment for Internet-of-Things (IoT) applications at the edge of the mobile network. New services for a specific set of IoT application programming interfaces (APIs) of …

Vikas S. Shah

30-05-2018 | Issue 1/2020

An empirical study of consumers’ intention to use ride-sharing services: using an extended technology acceptance model

Ride-sharing has received great attention recently and is considered to be a sustainable transportation mode. Understanding the determinants of the consumers’ intention to use ride-sharing services is critical to promote such services. In this …

Yu Wang, Shanyong Wang, Jing Wang, Jiuchang Wei, Chenglin Wang

25-05-2018 | Transportation Engineering | Issue 9/2018

Evolutionary Game Model of Private Capital Investment in Urban Public Transportation

To address the previous researches’ shortcomings on private capital investment in public transportation, a new private capital investment method in public transportation considering passenger value is proposed. An Evolutionary Game Model (EGM) is …

Yunqiang Xue, Hongzhi Guan, Jonathan Corey, Heng Wei

12-05-2018 | Regular Paper | Issue 2/2019

DMHUPS: Discovering Multiple High Utility Patterns Simultaneously

High utility pattern mining in transaction databases has emerged to overcome the limitation of frequent pattern mining where only frequency is taken as the measure of importance without considering the actual importance of items. Among existing …

Bijay Prasad Jaysawal, Jen-Wei Huang

30-04-2018 | Issue 2/2019

Transfer of electronic commerce trust between physical and virtual environments: experimental effects of structural assurance and situational normality

Although there is a considerable body of empirical evidence on the subject of electronic commerce trust, most of it is correlational evidence based on field surveys, and very little attention has been given to causal effects of how participants in …

Stephen C. Wingreen, Natasha C. H. L. Mazey, Stephen L. Baglione, Gordon R. Storholm

03-04-2018 | Issue 3/2019

Measuring e-service quality and its importance to customer satisfaction and loyalty: an empirical study in a telecom setting

The important influence of e-service quality (e-SQ) on customer satisfaction and loyalty has been demonstrated in many contexts, but has not been examined in telecom settings yet. The current study aimed to construct a measurement scale for e-SQ …

Ronggang Zhou, Xiaorui Wang, Yuhan Shi, Renqian Zhang, Leyuan Zhang, Haiyan Guo

23-03-2018 | Methodologies and Application | Issue 20/2018

Identity-based undetachable digital signature for mobile agents in electronic commerce

To enable mobile agents signing securely on potentially malicious hosts in electronic commerce and other applications, we proposed the definition and security notion of identity-based undetachable digital signature schemes. More importantly, we …

Yang Shi, Jingxuan Han, Jiangfeng Li, Guoyue Xiong, Qinpei Zhao

01-03-2018 | Strategie | Issue 4/2018

Sofortzahlungen kommen nur langsam an

Bei deutschen Geldhäusern sind Realtime-Überweisungen noch kaum verbreitet. Bislang bietet lediglich die Hypovereinsbank ihren Kunden diesen Service an. Noch wissen die Institute nicht, wie sie die hohen Kosten für die notwendige Infrastruktur wieder hereinholen sollen. 

Stefan Terliesner

24-02-2018 | Regular Contribution | Issue 1/2019 Open Access

Deployment and performance evaluation of mobile multicoupon solutions

Mobile commerce (m-commerce) represents an important area of business with a huge potential revenue for merchants and great opportunities for customers to achieve better offers. One of the topics within m-commerce that needs important improvements …

M. Francisca Hinarejos, Andreu-Pere Isern-Deyà, Josep-Lluís Ferrer-Gomila, Llorenç Huguet-Rotger

23-02-2018 | Issue 5/2018

Neural network approach to predict mobile learning acceptance

The proliferation of mobile computing technologies is playing major role in the growth of mobile learning (M-learning) market around the globe. The purpose of this paper is to develop a research model in the lines of commonly used models the …

Hafedh Al-Shihi, Sujeet Kumar Sharma, Mohamed Sarrab

16-02-2018 | Special Issue 2/2019

WFCM based big sensor data error detection and correction in wireless sensor network

In WSN the requested data is collected from the initial node i.e. sender and the information are uploaded on a cloud platform. Only numeric Data type is considered in this error detection and correction technique. Map Reduce algorithm is applied …

R. Sheeba, G. Jiji, T. Ajith Bosco Raj

01-02-2018 | Special Issue 5/2019

Wireless network confidence level improvement via fusion adaptive resonance theory

One of the main hazards for the current internet community is the distributed denial of service attack (DDoS). Moreover, with the DDoS mechanisms being implicit in nature, the identification of it is very hard due to the unique characteristics of …

K. Chandraprabha, B. G. Geetha

18-01-2018 | Issue 4/2018

Knowledge mapping of social commerce research: a visual analysis using CiteSpace

Social commerce has rapidly developed as a new area in electronic commerce field and has risen the attention of both researchers and practitioners. This paper investigated the intellectual structure, development, and evolution of social commerce …

Yi Cui, Jian Mou, Yanping Liu

01-12-2017 | Research | Issue 1/2017 Open Access

A novel lightweight URL phishing detection system using SVM and similarity index

The phishing is a technique used by cyber-criminals to impersonate legitimate websites in order to obtain personal information. This paper presents a novel lightweight phishing detection approach completely based on the URL (uniform resource …

Mouad Zouina, Benaceur Outtaj

01-12-2017 | Research | Issue 1/2017 Open Access

Community clouds within M-commerce: a privacy by design perspective

The paper establishes the link between community clouds and m-commerce. The research questions attempt to provide an understanding of the various shopping domains and their convergence through mobile devices. In addition, insight is provided into …

Farid Shirazi, Amna Iqbal

01-12-2017 | Issue 5/2019

Privacy and Personalization in Continued Usage Intention of Mobile Banking: An Integrative Perspective

Over the last decade, bank industry has made a significant investment on mobile banking (MB) as an innovative tool with an expectation that MB services increase customer satisfaction. While the focus has been increasingly on MB adoption, banking …

Mousa Albashrawi, Luvai Motiwalla

29-11-2017 | Issue 1/2019

GTTracker: Location-aware hierarchical model for identifying M-commerce business opportunities

The increased adoption of electronic commerce for selling products and services creates a new channel between consumers and vendors. Commonly, e-commerce platforms are assembled as proprietary and centralized solutions. This method has a high …

Paulo Henrique Cazarotto, Cristiano André da Costa, Rodrigo da Rosa Righi, Jorge Luis Victória Barbosa

22-11-2017 | Research Article - Computer Engineering and Computer Science | Issue 12/2018

A Sensor Cloud for the Provision of Secure and QoS-Aware Healthcare Services

Nowadays, the integration of wireless sensor networks (WSN) with cloud computing is of great interest to healthcare research and industry. In this context, the design and development of sensor clouds enables the integration of several WSNs to …

Mohamed Jacem Guezguez, Slim Rekhis, Noureddine Boudriga

10-10-2017 | Issue 2/2019

A novel user behavior analysis and prediction algorithm based on mobile social environment

For service behavior prediction, if merely depending on behavior history of a target user, the quantity and category of samples are quite limited; if utilizing correlated users’ samples by means of result fusion, the predicted results are very …

Hui Zhang, Min Wang, Longxiang Yang, Hongbo Zhu

03-10-2017 | Original Article | Issue 2/2018

Comparing factors affecting attitudes toward LBA and SoLoMo advertising

This study compares the effectiveness of location-based advertising (LBA) and social-local-mobile (SoLoMo) advertising. The results show that SoLoMo advertising is more effective than LBA. Consumers perceive a higher level of brand interaction …

Ya-Ching Lee

19-09-2017 | Issue 2/2018

Distributed QoS-aware scheduling optimization for resource-intensive mobile application in hybrid cloud

In the paper, the distributed scheduling optimization model for resource-intensive mobile application is proposed. Lagrangian method is applied to achieve distributed scheduling optimization in hybrid cloud. By decomposing the Kuhn–Tucker …

Li Chunlin, Tang Jianhang, Luo Youlong

29-08-2017 | Issue 3/2018

Women Entrepreneurs and Family Firm Heterogeneity: Evidence from an Emerging Economy

Family firms add to the economic and social well-being of countries. While research on heterogeneity of family firms is gaining momentum, it has mostly been gender-neutral. The study fills this gap by examining heterogeneity of family firms owned …

Dianne H. B. Welsh, Eugene Kaciak, Silvana Trimi, Emerson Wagner Mainardes

28-08-2017 | Issue 3/2018

Engineering doc2vec for automatic classification of product descriptions on O2O applications

In this paper, we develop an automatic product classifier that can become a vital part of a natural user interface for an integrated online-to-offline (O2O) service platform. We devise a novel feature extraction technique to represent product …

Hana Lee, Young Yoon

10-07-2017 | Review Article | Issue 10/2017

A survey of context recognition in surgery

With the introduction of operating rooms of the future context awareness has gained importance in the surgical environment. This paper organizes and reviews different approaches for recognition of context in surgery. Major electronic research …

Igor Pernek, Alois Ferscha

10-06-2017 | Issue 4/2019

Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network modeling

Higher penetration of smartphones and 3G and 4G mobile networks have led to the higher usage of smartphones for mobile banking activities. This paper identifies key antecedents influencing the mobile banking acceptance. The research extends the …

Sujeet Kumar Sharma

07-06-2017 | Issue 2/2018

Radio resource management with QoS guarantees for LTE-A systems: a review focused on employing the multi-objective optimization techniques

The increasing number of subscribers’ demand has led to the evolution of future wireless networks that support multimedia applications and require ensuring the quality of services it provides. As the radio resource is becoming scarce, it is …

Ayesha Haider Ali, Mohsin Nazir

20-05-2017 | Original Article | Issue 1/2018

The moderation effects of mobile technology advancement and system barrier on m-commerce channel preference behavior

Mobile commerce, or m-commerce, has quickly become a powerful, indispensable approach for diverse business to consumer (B2C) industries to secure technology-oriented, risk-taking N-generation customers. However, their behavioral preferences have …

Nina Shin, Donghui Kim, Sangwook Park, Jungsuk Oh

19-05-2017 | Issue 3/2017

Relating personality (Big Five) to the core constructs of the Unified Theory of Acceptance and Use of Technology

The aim of this study was to enrich the Unified Theory of Acceptance and Use of Technology with personality as defined by the Big Five model, and to examine the relationship of the five factors of personality to the important variables regarding …

Sawsen Lakhal, Hager Khechine

20-03-2017 | Regular Paper | Issue 2/2017

Distributed and scalable sequential pattern mining through stream processing

Scalability is a primary issue in existing sequential pattern mining algorithms for dealing with a large amount of data. Previous work, namely sequential pattern mining on the cloud (SPAMC), has already addressed the scalability problem. It …

Chun-Chieh Chen, Hong-Han Shuai, Ming-Syan Chen

18-03-2017 | Issue 2/2018

A peer-to-peer transaction authentication platform for mobile commerce with semi-offline architecture

Trusted third-party (TTP) based transaction authentication is traditionally applied to authenticate mobile commerce transactions. However, several issues can arise with this, including seller fraud, TTP performance bottlenecks, and the risk of …

Wei-Hsun Lee, Char-Shin Miou, Yeou-Fuh Kuan, Tung-Lung Hsieh, Chien-Ming Chou

24-02-2017 | Issue 1/2018 Open Access

Adaptive Service Management in Mobile Cloud Computing by Means of Supervised and Reinforcement Learning

Since the concept of merging the capabilities of mobile devices and cloud computing is becoming increasingly popular, an important question is how to optimally schedule services/tasks between the device and the cloud. The main objective of this …

Piotr Nawrocki, Bartlomiej Sniezynski

08-02-2017 | Empirical article | Issue 1/2018

A global approach to the analysis of user behavior in mobile payment systems in the new electronic environment

Mobile devices and social media have led to a profound revolution of modern society, obliging many companies to reorient their sales systems towards more successful commercial formats (mobile commerce and social commerce). The mobile payment, for …

Francisco Liébana-Cabanillas, Francisco Muñoz-Leiva, J. Sánchez-Fernández

03-02-2017 | Issue 4/2017

Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework

With the increased popularity of mobile devices, hotels and online travel agencies have started focusing on mobile hotel booking (MHB) in recent years. However, there has been limited research on users” loyalty intentions toward MHB technology.

Ahmet Bulent Ozturk, Khaldoon Nusair, Fevzi Okumus, Dipendra Singh

12-01-2017 | Issue 6/2018

Green information systems use in social enterprise: the case of a community-led eco-localization website in the West Midlands region of the UK

This study examines the intention of environmentally-oriented social enterprises to continue using Green IS (an eco-localization website here) in Herefordshire located in the West Midlands region of the United Kingdom. The Herefordshire Greenlinks …

Roya Gholami, Alemayehu Molla, Suparna Goswami, Christopher Brewster

09-01-2017 | Issue 6/2017

Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues

The incessant spurt of research activities to augment capabilities of resource-constrained mobile devices by leveraging heterogeneous cloud resources has created a new research impetus called mobile cloud computing. However, this rapid relocation …

Tarunpreet Bhatia, A. K. Verma

01-12-2016 | Rubriken | Issue 6/2016

Effektiver Einsatz von Predictive Analytics im Vertrieb

Mit Big Data lassen sich unterschiedliche Prognosen erstellen. Diese als Predictive Analytics bekannten Verfahren ermöglichen eine an Kennzahlen orientierte Vertriebssteuerung. Die Umsatzpotenziale sowohl von Bestands- als auch von Neukunden …

Dr. Parsis Dastani

04-11-2016 | Issue 2/2018

Design of electronic payment system based on authenticated key exchange

This paper proposes an electronic payment system based on authenticated key exchange protocol. In this scheme, an effective owner tracing mechanism is introduced to identify a malicious customer. Moreover, every participant can mutually …

Susmita Mandal, Sujata Mohanty, Banshidhar Majhi

01-11-2016 | Long paper | Issue 4/2016

Culture and HCI: a review of recent cultural studies in HCI and social networks

Studies on culture in HCI have always drawn the attention of academics. A comprehensive literature review of recent HCI studies on culture becomes a necessity. This study followed a systematic approach to review and create taxonomy of recent …

Leantros Kyriakoullis, Panayiotis Zaphiris

01-11-2016 | Issue 6/2016

MiCa: Lightweight and mobile collaboration across a collaborative editing service in the cloud

Nowadays, we assist to an explosion of mobile applications due to the rapid development of mobile devices, which are becoming the device of choice for people to collaborate with family members, friends and business colleagues and/or customers.

Moulay Driss Mechaoui, Nadir Guetmi, Abdessamad Imine

01-11-2016 | Regular Paper | Issue 6/2016

Combined Cloud: A Mixture of Voluntary Cloud and Reserved Instance Marketplace

Voluntary cloud is a new paradigm of cloud computing. It provides an alternative selection along with some well-provisioned clouds. However, for the uncertain time span that participants share their computing resources in voluntary cloud, there …

Wei Shen, Wan-Chun Dou, Fan Wu, Shaojie Tang, Qiang Ni

02-09-2016 | Regular Paper | Issue 2/2017

EFIM: a fast and memory efficient algorithm for high-utility itemset mining

In recent years, high-utility itemset mining has emerged as an important data mining task. However, it remains computationally expensive both in terms of runtime and memory consumption. It is thus an important challenge to design more efficient …

Souleymane Zida, Philippe Fournier-Viger, Jerry Chun-Wei Lin, Cheng-Wei Wu, Vincent S. Tseng

01-09-2016 | Issue 3/2016

Mobile commerce and device specific perceived risk

This study examines the role of perceived risk and access device type on consumers’ on-line purchase decisions. We use a two-step hurdle approach to estimate consumer behavior. In the first step, the decision of whether to engage in eCommerce is …

Brian P. Cozzarin, Stanko Dimitrov

01-09-2016 | Issue 3/2016

Investigating the impact of customer stochasticity on firm price discrimination strategies using a new Bayesian mixture scale heterogeneity model

In this paper, we study the impact of customer stochasticity on firm price discrimination strategies. We develop a new model termed the Bayesian Mixture Scale Heterogeneity (BMSH) model that incorporates both parameter heterogeneity and customer …

Joseph Pancras, Xia Wang, Dipak K. Dey

01-09-2016 | Issue 3/2016

HDCache: A Distributed Cache System for Real-Time Cloud Services

Providing a real-time cloud service requires simultaneously retrieving a large amount of data. How to improve the performance of file access becomes a great challenge. This paper first addresses the preconditions of dealing with this problem …

Jing Zhang, Qianmu Li, Wei Zhou

31-08-2016 | Empirical article | Issue 3/2017

The evaluation factors of adopting SoLoMo services: the hybrid fuzzy MCDM approach

SoLoMo services are emerging mobile services, which combine different software and hardware techniques, enabling users to obtain location-based information at any time and place as well as exchange, interact, and communicate messages with other …

Heng-Li Yang, Shiang-Lin Lin

01-08-2016 | Original Research | Issue 2/2016 Open Access

Distribution systems in omni-channel retailing

The growing importance of online sales means that traditional bricks-and-mortar retailers need to create new distribution systems to serve customers through multiple channels. Building an effective and efficient omni-channel (OC) distribution …

Alexander Hübner, Andreas Holzapfel, Heinrich Kuhn

01-08-2016 | Issue 4/2016

SIMSec: A Key Exchange Protocol Between SIM Card and Service Provider

Mobile technology is so popular and overdosed adoption is inevitable in today’s world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure data communication …

Kerem Ok, Vedat Coskun, Siddik Binboga Yarman, Cem Cevikbas, Busra Ozdenizci

03-06-2016 | Issue 3/2016

Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography

Mobile technology and its applications now a day are considered to be a key note in banking sector. This has become possible due to mobile phone based suitable banking solution with multi-purpose transaction facilities. A number of banks are …

Sangram Ray, G. P. Biswas, Mou Dasgupta

01-06-2016 | State-of-the-Art | Issue 3/2016

Location-based advertising on mobile devices

A literature review and analysis

Location-based advertising (LBA) allows the delivery of advertising messages to consumers in places that are known for their particular high and positive advertising effect. While LBA is recognized for static roadside billboards and the Web, LBA …

Christine Bauer, Christine Strauss

01-06-2016 | Long paper | Issue 2/2016

Predicting older adults’ perceptions about a computer system designed for seniors

Although computer technology may be particularly useful for older adults (e.g., for communication and information access), they have been slower adopters than their younger counterparts. Perceptions about computers, such as perceived usefulness …

Tracy L. Mitzner, Wendy A. Rogers, Arthur D. Fisk, Walter R. Boot, Neil Charness, Sara J. Czaja, Joseph Sharit

01-06-2016 | Research Article | Issue 3/2016

An efficient trust negotiation strategy towards the resource-limited mobile commerce environment

Automated trust negotiation (ATN) offers an attractivemeans for trust establishments, which establishesmutual trust among strangers wishing to share resources or conduct business, but it comes at the cost of non-trivial computation and …

Bailing Liu, Yanhui Li, Bing Zeng, Chao Lei

01-06-2016 | Issue 2/2016

Exploring continued use of mobile shopping channel in China: the effects of active coping and its antecedents

Online B2C retailers in China rely heavily on exclusive promotions for mobile shopping to attract new consumers and to promote their mobile shopping channels. However, it is unknown what factors may drive new consumers to continuously do mobile …

Xue Yang, Yan Li, Qinyu Liao

01-06-2016 | State-of-the-Art | Issue 3/2016

Location-based advertising on mobile devices

A literature review and analysis

Location-based advertising (LBA) allows the delivery of advertising messages to consumers in places that are known for their particular high and positive advertising effect. While LBA is recognized for static roadside billboards and the Web, LBA …

Christine Bauer, Christine Strauss

02-05-2016 | Long paper | Issue 2/2017

Comparing and evaluating the effectiveness of mobile Web adequacy evaluation tools

The number of Web sites is growing exponentially and so are the people who are accessing them on mobile devices including people with special abilities. Mobile-friendly Web sites further increase traffic to the Web site, customer participation …

Arvinder Kaur, Diksha Dani

01-05-2016 | Original Article | Issue 2/2016

Determinants of users’ intention to adopt m-commerce: an empirical analysis

The fast-growing penetration of mobile devices and recent advances in mobile technologies have led to the development of increasingly sophisticated services such as m-shopping for goods or services and m-payment. However, although the number of …

Zoran Kalinic, Veljko Marinkovic

01-05-2016 | Original Article | Issue 2/2016

An analysis of the relationship between quality and user acceptance in smartphone apps

This study investigates consumer intentions within the smartphone app environment. More specifically, it studies the factors influencing the intention to use banking apps based on the smartphone by employing the information system success model …

Mi Jin Noh, Kyung Tag Lee

14-04-2016 | Issue 3/2017

Educational data mining acceptance among undergraduate students

The acceptance of Educational Data Mining (EDM) technology is on the rise due to, its ability to extract new knowledge from large amounts of students’ data. This knowledge is important for educational stakeholders, such as policy makers …

Muslihah Wook, Zawiyah M. Yusof, Mohd Zakree Ahmad Nazri

08-04-2016 | Issue 3/2016

Der Mobile Analyst: Ein neues Berufsbild im Bereich von Business Analytics als Ausprägungsform von Big Data

In den letzten Jahren hat Mobile Analytics als eine Erscheinungsform von Big Data auf Grund der zunehmenden Nutzung von mobilen Endgeräten und mobilen Applikationen an Bedeutung gewonnen. Die Analyse mobiler Daten ist daher aus verschiedenen …

Claudia Brauer, Andreas Wimmer

01-04-2016 | Regular Paper | Issue 1/2016

A framework for anomaly detection in maritime trajectory behavior

Rapid growth in location data acquisition techniques has led to a proliferation of trajectory data related to moving objects. This large body of data has expanded the scope for trajectory research and made it applicable to a more diverse range of …

Po-Ruey Lei

01-03-2016 | Original Empirical Research | Issue 2/2016

Does relationship marketing matter in online retailing? A meta-analytic approach

Building on the meta-analytic model suggested by Palmatier et al. Journal of Marketing, 70, 136–153, (2006), this study extends the relationship marketing framework to the domain of online retailing to identify what strategies help build …

Varsha Verma, Dheeraj Sharma, Jagdish Sheth

01-03-2016 | Issue 2/2016

Cooperative Intelligence of Vehicles for Intelligent Transportation Systems (ITS)

The aim of Intelligent Transportation Systems (ITS) is to automate the interactions among vehicles and infrastructure to accomplish high levels of safety measures, comfort, and competence in vehicular communication. To utilize the future trends of …

Alfred Daniel, Anand Paul, Awais Ahmad, Seungmin Rho

29-02-2016 | Issue 2/2017

An ultra-lightweight RFID authentication scheme for mobile commerce

With the popularity of mobile social network, more and more people are willing to use a mobile device to accomplish some social activities, such as payment when shopping, product information inquiries, where RFID is a technology which can be good …

Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li, Ruidan Su, Yintang Yang

23-02-2016 | HAUPTBEITRAG | Issue 2/2016

Vertrauensbildung durch soziale Empfehlungen

Zur Rolle von Empfehlungssystemen im M-Commerce

Mobile Endgeräte stellen Funktionen bereit, die es Unternehmen ermöglichen, ihren Kunden passgenaue, standortspezifische Dienstleistungen anzubieten. Im Vergleich zum klassischen Onlinehandel oder zu Einkäufen in Ladengeschäften werden …

Antonia Köster, Christian Matt, Larissa Torremante, Thomas Hess, Jörg Heinze

12-02-2016 | Issue 7/2017

A shortest path planning algorithm for cloud computing environment based on multi-access point topology analysis for complex indoor spaces

Due to the increasing complexity of internal spaces and dynamic change in certain specific partitions in large indoor areas, indoor navigation has become more important as it is useful to help people find their destination or evacuate from …

Yan Li, Jong-Hyuk Park, Byeong-Seok Shin

01-02-2016 | Original Article | Issue 1/2016

Role of transfer-based and performance-based cues on initial trust in mobile shopping services: a cross-environment perspective

Building initial trust with consumers is critical for e-retailers. Drawing on the elaboration likelihood model, this study examines the factors affecting initial trust in mobile shopping services by focusing on transfer-based and performance-based …

Shuiqing Yang

01-01-2016 | Original Empirical Research | Issue 1/2016

Adaptive personalization using social networks

This research provides insights into the following questions regarding the effectiveness of mobile adaptive personalization systems: (1) to what extent can adaptive personalization produce a better service/product over time? (2) does adaptive …

Tuck Siong Chung, Michel Wedel, Roland T. Rust

10-12-2015 | Issue 3/2017

Integrating switching costs to information systems adoption: An empirical study on learning management systems

When evaluating a new information system, users’ experiences with the prior system, as well as characteristics of the new system, may influence their adoption behavior. However, most existing research either focuses solely on assessment of the new …

Yan Mandy Dang, Yulei Gavin Zhang, James Morgan

01-12-2015 | Research | Issue 1/2015 Open Access

Platform business Eco-model evolution: case study on KakaoTalk in Korea

Platform business is often regarded as notable examples of successful businesses model in the mobile industry. The purpose of this study is to find the determinants of successful platform business, through the case study of KakaoTalk, a …

Junghee Han, Okjoo Cho

23-11-2015 | Issue 3/2017

Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation

User adoption of mobile payment (m-payment) is low compared to the adoption of traditional forms of payments. Lack of user trust has been identified as the most significant long-term barrier for the success of mobile finances systems. Motivated by …

Lingling Gao, Kerem Aksel Waechter

01-11-2015 | Methodologies and Application | Issue 11/2015

A multi-criteria recommendation system using dimensionality reduction and Neuro-Fuzzy techniques

Multi-criteria collaborative filtering (MC-CF) presents a possibility to provide accurate recommendations by considering the user preferences in multiple aspects of items. However, scalability and sparsity are two main problems in MC-CF which this pa…

Mehrbakhsh Nilashi, Othman Bin Ibrahim, Norafida Ithnin, Rozana Zakaria

01-11-2015 | Issue 1/2015

P2PM-pay: Person to Person Mobile Payment Scheme Controlled by Expiration Date

In this paper, we propose P2PM-pay scheme which provides two key points. The first key point is related with the mobile cash. In P2PM-pay scheme, the mobile cash is controlled by the expiration date. The expiration date is embedded into the mobile …

Rafael Martínez-Peláez, Homero Toral-Cruz, Joel Ruiz, Pablo Velarde-Alvarado

29-10-2015 | Research Article - Systems Engineering | Issue 9/2016

An Entropy-Robust Optimization of Mobile Commerce System Based on Multi-agent System

Today, mobile commerce is very popular, but all kinds of risks or uncertainties may result in very serious impacts in its development because of its open environment. Therefore, the robust operation and optimization of the mobile commerce system are …

Zhengying Cai, Yu Zhang, Mengyang Wu, Dawei Cai

07-10-2015 | Issue 4/2018

MobileCDP: A mobile framework for the consumer decision process

The consumer decision process is a widely accepted model covering consumer activities, and accordingly contains five interrelated stages: problem recognition, information search, evaluation of alternatives, purchase, and post-purchase evaluation.

Suleyman Ozarslan, P. Erhan Eren

01-10-2015 | Issue 4/2015

From GPS and virtual globes to spatial computing - 2020

Spatial computing is a set of ideas, solutions, tools, technologies, and systems that transform our lives with a new prospect of understanding, navigating, visualizing and using locations. In this community whitepaper, we present a perspective on …

Shashi Shekhar, Steven Feiner, Walid G. Aref

01-10-2015 | Methodologies and Application | Issue 6/2017

Modeling and predicting the user next input by Bayesian reasoning

We focus on enhancing the user experience by predicting entries when a form is filled, according to past interactions. The purpose of having a predictive model of form filling is to reduce the amount of time required to fill a form, and thus to reduc…

Luigi Troiano, Cosimo Birtolo, Roberto Armenise

01-10-2015 | Issue 10/2015

Towards NFC payments using a lightweight architecture for the Web of Things

The Web (and Internet) of Things has seen the rapid emergence of new protocols and standards, which provide for innovative models of interaction for applications. One such model fostered by the Web of Things (WoT) ecosystem is that of contactless …

Tor-Morten Grønli, Pardis Pourghomi, Gheorghita Ghinea

01-10-2015 | Issue 5/2015

Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service

The interbank mobile payment service (IMPS) is a very recent technology in India that serves the very critical purpose of a mobile wallet. To account for the adoption and use of IMPS by the Indian consumers, this study seeks to compare three …

Kawaljeet Kaur Kapoor, Yogesh K. Dwivedi, Michael D. Williams

01-10-2015 | Issue 2/2015

The Impact of Choice Architecture on Sustainable Consumer Behavior: The Role of Guilt

Companies often encourage consumers to engage in sustainable behaviors using their services in a more environmentally friendly or green way, such as reusing the towels in a hotel or replacing paper bank statements by electronic statements. Sometimes,

Aristeidis Theotokis, Emmanouela Manganari

01-09-2015 | Empirical article | Issue 3/2015

Exploring mobile banking services for user behavior in intention adoption: using new hybrid MADM model

Mobile banking services are one of the most promising recent technological innovations. In this study, we developed a conceptual model to explore mobile banking services for user behavior in the financial banking industry in intention adoption.

Ming-Tsang Lu, Gwo-Hshiung Tzeng, Hilary Cheng, Chih-Cheng Hsu

01-09-2015 | Issue 3/2015

Student and in-service teachers’ acceptance of spatial hypermedia in their teaching: The case of HyperSea

The aim of this study was to use the Technology Acceptance Model (TAM) in order to investigate the factors that influence student and in-service teachers’ intention to use a spatial hypermedia application, the HyperSea, in their teaching. HyperSea is…

George Koutromanos, Georgios Styliaras, Sotiris Christodoulou

01-09-2015 | Issue 1/2015

DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks

In real-life applications, ensuring secure transmission of data over public network channels to prevent malicious eavesdropping of the data is an important issue in distributed network environment. There are several potential security risks in …

Vanga Odelu, Ashok Kumar Das, Adrijit Goswami

01-09-2015 | Einflussfakt oren auf die Nutzung von Cloud-Speicherdiensten | Issue 3/2015

Einflussfaktoren auf die Nutzung von Cloud-Speicherdiensten

Nach dem IS Success Model sind die Nutzung und die Nutzungsabsicht zentral für den Erfolg von Informationssystemen (DeLone/McLean 1992, 2003). Besonders bei Cloud Computing-Diensten hängt der wirtschaftliche Erfolg von deren Nutzung ab, da viele …

Lysann Gebauer, M.A. Michael Marcin Gierczak, Dr. Matthias Söllner, Prof. Dr. Jan Marco Leimeister

01-08-2015 | Original Article | Issue 3/2015

A new data mining methodology for generating new service ideas

To survive in today’s market, decision makers including investors and their managerial teams should continuously attempt to realize the customers’ unspoken needs and requirements by discovering their behavioral patterns. Discovering customers’ …

Amir-Mohsen Karimi-Majd, Masoud Mahootchi

01-07-2015 | Issue 4/2015

The biometric signature delegation scheme to balance the load of digital signing in hybrid P2P networks

With the wide spread use of smart phones and high-speed networks, the demands for video contents are growing rapidly, for which broad bandwidth is needed. Generally, the client–server model is used to stream video contents to customers. The …

Sunghyun Yun, Heuiseok Lim, Kyungyong Chung

01-06-2015 | Schwerpunkt | Issue 3/2015

Kundenpräferenzen im Mobile-Location-Based-Couponing

Typischerweise durchläuft der Kunde beim MLBC sechs Phasen (vergleiche

Abbildung 1

). In der ersten Phase (1) wird er über die Kommunikationskanäle des Unternehmens oder Mundpropaganda auf den mobi

Prof. Dr. Matthias Schulten, Silvia Rudigier, Prof. Patricia Stolz

01-06-2015 | Issue 3/2015

Cost Adaptive VM Management for Scientific Workflow Application in Mobile Cloud

In this paper, to guarantee Service Level Agreement composed of the deadline and budget given by users for workflow application services in mobile cloud, we propose the two-phases algorithm with a cost adaptive VM management. Firstly, the greedy …

Woo-Joong Kim, Dong-Ki Kang, Seong-Hwan Kim, Chan-Hyun Youn

03-05-2015 | Research Article - Computer Engineering and Computer Science | Issue 2/2016

Preventive Policy Enforcement with Minimum User Intervention Against SMS Malware in Android Devices

In this paper, we propose MinDroid, a user-centric preventive policy enforcement system against SMS malware in Android devices. The design of MinDroid takes into consideration the user’s little understanding of the Android permission system. This can…

Abdelouahid Derhab, Kashif Saleem, Ahmed Youssef, Mohamed Guerroumi

01-04-2015 | Special Issue Paper | Issue 2/2015

Clustering and aggregating clues of trajectories for mining trajectory patterns and routes

In this paper, we propose a new trajectory pattern mining framework, namely Clustering and Aggregating Clues of Trajectories (CACT), for discovering trajectory routes that represent the frequent movement behaviors of a user. In addition to spatial …

Chih-Chieh Hung, Wen-Chih Peng, Wang-Chien Lee

01-04-2015 | Issue 2/2015

E-Commerce: Megatrend „Social, Local, Mobile“

Mit der Gründung des sozialen Netzwerks Facebook sowie der Einführung des iPhones wurde mit Ausprägungen wie Social und Mobile Commerce der E-Commerce revolutioniert. Geolokationstechnologien, die im Zuge der Erfolgsgeschichte des Smartphones massent…

Johannes Huber

01-04-2015 | Research Paper | Issue 2/2015

Legal Compatibility as a Characteristic of Sociotechnical Systems

Goals and Standardized Requirements

Legal compatibility as a characteristic of sociotechnical systems aims at the greatest possible compliance with higher-order legal goals for minimizing social risks of technical systems and extends legality, which refers to the prevention of lawlessn…

Dr. Axel Hoffmann, Thomas Schulz, Julia Zirfas, PD Dr. Holger Hoffmann, Prof. Dr. Alexander Roßnagel, Prof. Dr. Jan Marco Leimeister

01-04-2015 | Issue 2/2015

Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors

Location-based services (LBS) can present the personalized information and services to users based on their positions and contexts. This may improve users’ experience and bring a positive utility to them. However, their privacy concern may be …

Tao Zhou

01-03-2015 | Issue 1/2015

e-souvenir appification: QoS web based media delivery for museum apps

The advent and recent proliferation of applications, created for smartphones and tablets, has altered the way users interact with information that is available online. Appification has been recently introduced to describe the rapidly widening …

Evangelos Sakkopoulos, Mersini Paschou, Yannis Panagis, Dimitris Kanellopoulos, Georgios Eftaxias, Athanasios Tsakalidis

01-01-2015 | Strategie + Management | Issue 1/2015

Wann boomt Mobile Payment endlich in Deutschland?


Erfolgreiche Geschäftsmodelle kommen vor allem in Asien und in Entwicklungsländern, die überwiegend von Telekommunikationsunternehmen betrieben werden, voran. Europa hinkt dagegen bei der Verbreitung von Mobile Payment noch hinterher. V

Thomas Lerner

01-12-2014 | Issue 4/2014

Anonymous proximity mobile payment (APMP)

The growth of wireless networks and the increasing popularity of mobile devices present an significant opportunity to empower them as a payment device. Unfortunately, several problems hinder the widespread acceptance of mobile payments, for …

Sadiq Almuairfi, Prakash Veeraraghavan, Naveen Chilamkurti, Doo-Soon Park

01-12-2014 | Issue 4/2014

An anonymous mobile payment protocol based on SWPP

Regarding the development of mobile technology, it seems essential to have a payment protocol which provides the required security features along with an acceptable efficiency in mobile environment. This article introduces an anonymous payment …

Samaneh Layeghian Javan, Abbas Ghaemi Bafghi

01-12-2014 | Issue 4/2014

Difference in the adoption of internet open markets between transition and established market economies

Open market is defined as a market or place where prices are determined by supply and demand. The study proposes and tests an integrated model of consumers’ purchase intentions toward open markets and investigates the differences in the adoption …

Sung Ho Ha, Mi Jin Noh, Suk Bong Choi

01-12-2014 | Research | Issue 1/2014 Open Access

Optimal multi-dimensional dynamic resource allocation in mobile cloud computing

In this paper, we propose a model for mobile application profiles, wireless interfaces, and cloud resources. First, an algorithm to allocate wireless interfaces and cloud resources has been introduced. The proposed model is based on the wireless …

Shahin Vakilinia, Dongyu Qiu, Mustafa Mehmet Ali

01-12-2014 | Original Article | Issue 7-8/2014

RFID-based intelligent shopping environment: a comprehensive evaluation framework with neural computing approach

This research proposes a radio frequency identification (RFID)-based intelligent shopping environment and its distributed reading capability to raise quality of service through improving the automation of product presentation, inventory monitor …

Chia-Chen Chen

01-12-2014 | Original Article | Issue 7-8/2014

A group decision classifier with particle swarm optimization and decision tree for analyzing achievements in mathematics and science

Group decision making is a multi-criteria decision-making method applied in many fields. However, the use of group decision-making techniques in multi-class classification problems and rule generation is not explored widely. This investigation …

Ping-Feng Pai, Chen-Tung Chen, Yu-Mei Hung, Wei-Zhan Hung, Ying-Chieh Chang

01-11-2014 | Long paper | Issue 4/2014

On accepting smart environments at user and societal levels

This paper studies beliefs which predict acceptance of smart environments at the user level and the preconditions for acceptance at the societal level. The authors use a thorough literature survey and eight in-depth expert interviews based on four …

Sari Walldén, Erkki Mäkinen

01-10-2014 | Schwerpunkt | Issue 5/2014

„Das Nutzer- und Konsumentenverhalten treibt die technologische Entwicklung“

Carla Thaper

01-10-2014 | Schwerpunkt | Issue 5/2014

Apps as Crucial Value Components and their Impact on the Customer Experience

Almost every value creation process of organizations that is realized via mobile services can be summarized under the term mobile business. Closely connected to mobile business is mobile commerce, which can be seen as a subcategory and

Dipl.-Kfm. Moritz Asche, Prof. Dr. Henning Kreis

01-09-2014 | Issue 3/2014

Improving the performance of data center with real-time service image placement in mobile cloud environment

Mobile Cloud Computing (MCC) is broadening the ubiquitous market for mobile devices. Because of the hardware limitation of mobile devices, the heavy computing tasks should be processed by service images (SIs) on the cloud. Due to the scalability …

Tien-Dung Nguyen, Mui Van Nguyen, Eui-Nam Huh

01-09-2014 | Focus | Issue 9/2014

Case-based context ontology construction using fuzzy set theory for personalized service in a smart home environment

To provide context-based personalized services utilizing smart appliances in a smart home environment, we propose a framework for PersonAlized Service disCovery Using FuZZY-based CBR and Context Ontology (PASCUZZY). Basically, the PASCUZZY framework …

Mye Sohn, Sunghwan Jeong, Hyun Jung Lee

01-08-2014 | Issue 2/2014

Integrating user interface and personal innovativeness into the TAM for mobile learning in Cyber University

This study aims to add new variables, namely user interface, personal innovativeness, and satisfaction in learning, to Davis’s technology acceptance model and also examine whether learners are willing to adopt mobile learning. Thus, this study …

Young Ju Joo, Hyeon Woo Lee, Yookyoung Ham

01-08-2014 | Schwerpunkt | Issue 4/2014

„Der Außendienst bleibt unsere Hauptschlagader — auch in Zukunft”

Springer Fachmedien Wiesbaden

01-07-2014 | Issue 7/2014

Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model

Many mobile payment systems have emerged in the last few years which allow payments for services and goods from mobile devices. However, most of them have been based on a scenario where all the entities are directly connected to each other …

Jesús Téllez Isaac, Sherali Zeadally

01-07-2014 | Issue 7/2014

Energy efficiency on location based applications in mobile cloud computing: a survey

The constrained battery power of mobile devices poses a serious impact on user experience. As an increasingly prevalent type of applications in mobile cloud environments, location-based applications (LBAs) present some inherent limitations …

Lian Wang, Yong Cui, Ivan Stojmenovic, Xiao Ma, Jian Song

01-06-2014 | Empirical Article | Issue 2/2014

Performance effects of aligning service innovation and the strategic use of information technology

In the current dramatically changing business environment, innovation capability is the key to attaining competitive advantages for firms. Drawing on the concept of alignment, the present research proposes a service innovation alignment model …

Hui-Ling Huang

01-06-2014 | Regular Papers | Issue 3/2014

Comprehensive approach to semantic similarity for rapid data integration

It is greatly significant to combine data with diverse structures and supply a unified view of these data for the user, especially for sharing data residing in heterogeneous data sources via the internet. This paper introduces a fast and novel method…

Jue-Bo Wu, Zong-Ling Wu

01-06-2014 | Issue 3/2014

Mining regional co-location patterns with kNNG

Spatial co-location pattern mining discovers the subsets of features of which the events are frequently located together in geographic space. The current research on this topic adopts a distance threshold that has limitations in spatial data sets …

Feng Qian, Kevin Chiew, Qinming He, Hao Huang

01-06-2014 | Spektrum | Issue 6/2014

Die Folgen der Digitalisierung für den Einzelhandel

Nach dem HDE-Handelskonjunkturindex des Monats August 2013, der vom Kölner Institut für Handelsforschung (IFH) erhoben wird, haben klassische Werbeformen im stationären Handel immer noch Vorrang. Demnach nutzen 60 Prozent personalisiert

Prof. Dr. Aydın Fındıkçı

01-04-2014 | Research Article | Issue 2/2014

Entity attribute discovery and clustering from online reviews

The rapid increase of user-generated content (UGC) is a rich source for reputation management of entities, products, and services. Looking at online product reviews as a concrete example, in reviews, customers usually give opinions on multiple …

Qingliang Miao, Qiudan Li, Daniel Zeng, Yao Meng, Shu Zhang, Hao Yu

01-04-2014 | Issue 2/2014

Mobile Cloud Computing: A Survey, State of Art and Future Directions

In the recent years, cloud computing frameworks such as Amazon Web Services, Google AppEngine and Windows Azure have become increasingly popular among IT organizations and developers. Simultaneously, we have seen a phenomenal increase in the usage …

M. Reza Rahimi, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos, Nalini Venkatasubramanian

01-01-2014 | Issue 1/2014

Effective mix-zone anonymization techniques for mobile travelers

Mix-zones are recognized as an alternative and complementary approach to spatial cloaking based location privacy protection. Unlike spatial cloaking techniques that perturb the location resolution through location k-anonymization, mix-zones break …

Balaji Palanisamy, Ling Liu

01-12-2013 | Issue 6/2013

In-vehicle display HMI safety evaluation using a driving simulator

Recently, telematics services and in-vehicle display devices such as the CNS (Car Navigation System) have become new causes of traffic accidents. These accidents are caused by ‘Inattention’ from the increase of the driver’s mental workload while he/s…

C. Jeong, B. Kim, S. Yu, D. Suh, M. Kim, M. Suh

01-11-2013 | Issue 4/2013

Consumer shopping behaviour on the Internet: insights from Malaysia

Shopping on the Internet enables consumers to search for information on products or services and make purchases through direct interaction with online retailers. This study investigates consumer shopping behaviour on the Internet based on four …

Norazah Mohd Suki

01-11-2013 | Regular Paper | Issue 2/2013

Efficient algorithms for discovering high utility user behavior patterns in mobile commerce environments

Mining user behavior patterns in mobile environments is an emerging topic in data mining fields with wide applications. By integrating moving paths with purchasing transactions, one can find the sequential purchasing patterns with the moving …

Bai-En Shie, Hui-Fang Hsiao, Vincent S. Tseng

01-11-2013 | Regular Paper | Issue 6/2013

Automatic and personalized recommendation of TV program contents using sequential pattern mining for smart TV user interaction

Due to the excessive number of TV program contents available at user’s side, efficient access to the preferred TV program content becomes a critical issue for smart TV user interaction. In this paper, we propose an automatic recommendation scheme …

Shinjee Pyo, Eunhui Kim, Munchurl Kim

01-10-2013 | ORIGINAL ARTICLE | Issue 1-4/2013

Warehouse management with lean and RFID application: a case study

This research presents the integration of lean production and radiofrequency identification (RFID) technology to improve the efficiency and effectiveness of warehouse management. More than ten million parts belonging to around 10,000 types in a distr…

James C. Chen, Chen-Huan Cheng, PoTsang B. Huang, Kung-Jen Wang, Chien-Jung Huang, Ti-Chen Ting

01-09-2013 | Issue 2/2013

An Efficient Algorithm for Optimizing Base Station Site Selection to Cover a Convex Square Region in Cell Planning

It is gradually more significant to optimally select base stations in the design of cellular networks, as the customers stipulate cheaper and better wireless services. From a set of prospective site locations, a subset needs to be preferred which …

Williamjeet Singh, Jyotsna Sengupta

01-08-2013 | Research Article - Computer Engineering and Computer Science | Issue 8/2013

An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments

To ensure secure communications in public network environments, various three-party authenticated key exchange (3PAKE) protocols were proposed to provide the transaction confidentiality and efficiency. In 2009, Yang et al. proposed an efficient …

Debiao He, Yitao Chen, Jianhua Chen

01-08-2013 | Issue 3/2013

A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks

A multi-server authentication scheme is a useful authentication mechanism in which a remote user can access the services of multiple servers after registering with the registration center (RC). This study shows that the password-based multi-server …

Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu

01-06-2013 | Issue 5-6/2013

Modeling the user acceptance of long-term evolution (LTE) services

With an integrated framework, this paper aims to analyze user perception and acceptance toward long-term evolution (LTE) services, focusing on factors that may influence the intention to use. We conducted a web-based survey of 1,192 users to test …

Eunil Park, Angel P. del Pobil

01-06-2013 | Issue 5-6/2013

Modeling the user acceptance of long-term evolution (LTE) services

With an integrated framework, this paper aims to analyze user perception and acceptance toward long-term evolution (LTE) services, focusing on factors that may influence the intention to use. We conducted a web-based survey of 1,192 users to test …

Eunil Park, Angel P. del Pobil

01-06-2013 | Original Article | Issue 2/2013

User adoption and purchasing intention after free trial: an empirical study of mobile newspapers

Marketing stimuli such as free trial has been widely used to increase user acceptance and intention to purchase information services. Information technology (IT) acceptance theories, such as the technology acceptance model and the unified theory …

Ting Wang, Lih-Bin Oh, Kanliang Wang, Yufei Yuan

01-05-2013 | Issue 5/2013

Efficient and secure three-party authenticated key exchange protocol for mobile environments

Yang and Chang (2009) proposed a three-party authenticated key exchange protocol for securing communications in mobile-commerce environments. Their protocol reduces computation and communication costs by employing elliptic curve cryptosystems.

Chih-ho Chou, Kuo-yu Tsai, Tzong-chen Wu, Kuo-hui Yeh

01-05-2013 | Issue 2/2013

Design of trustworthy smartphone-based multimedia services in cultural environments

Smartphone is a dynamic new media that faces high popularity due to its versatile services and the friendliness of its usage. It can be used in many activities of everyday life from e-commerce to e-tourism. In this work, we study smartphone’s …

Dimitrios Koukopoulos, Georgios Styliaras

01-05-2013 | Mobilität & Reise | Issue 5-6/2013

Die Kaufentscheidung fördern

Springer Fachmedien Wiesbaden

01-05-2013 | Issue 2/2013

Secure Transmission of Mobile Agent in Dynamic Distributed Environments

Huang et al. has recently proposed an efficient key management and access control scheme for mobile agent environments based on Elliptic Curve Cryptosystem (ECC). Although their scheme provides superior efficiency in comparison with the previous …

Ali Zakerolhosseini, Morteza Nikooghadam

01-04-2013 | Produkte & Tools | Issue 4/2013

Von Cross-Channel-Effekten profitieren

wie sich Onlineshops und Vertrieb sinnvoll ergänzen,

Achim Reupert

01-04-2013 | Märkte & Expansion | Issue 4/2013

Wer die Wahl hat, hat die Qual

welche Aspekte bei der Vertriebswegewahl entscheidend sind,

Eva-Susanne Krah

01-03-2013 | Issue 1/2013

An empirical examination of user adoption of location-based services

Location-based services (LBS) can present the optimal information and services to users based on their locations. This will improve their experience. However, this may also arouse users’ privacy concern and increase their perceived privacy risk.

Tao Zhou

01-03-2013 | Issue 1/2013

Examining continuous usage of location-based services from the perspective of perceived justice

Due to the privacy risk associated with using location-based services (LBS), users are often reluctant to adopt and use them. Drawing on the justice theory, this research identified the factors affecting continuous usage of LBS. Perceived justice …

Tao Zhou

01-02-2013 | State-of-the-Art | Issue 1/2013

State of the Art der Forschung zum Interkulturellen Konsumentenverhalten. Eine Analyse der Literatur von 2005 bis 2010

Unternehmen, die mehrere Ländermärkte bearbeiten, stehen vor der Herausforderung, ihren Marketing-Mix an Kunden mit unterschiedlichen Wertvorstellungen anzupassen. Die interkulturelle Konsumentenforschung soll diesen Anpassungsprozess unterstützen …

Stefan Hoffmann, Sophia Fischer, Uta Schwarz, Robert Mai

01-02-2013 | Issue 1/2013

Mobile Decentralized Search and Retrieval Using SMS and HTTP

Events over the past year have demonstrated the utility of mobile devices for coordinating mass gatherings and organizing protests in support of social change. However, governments have countered by censoring or disabling centralized search …

Isaí Michel Lombera, L. E. Moser, P. M. Melliar-Smith, Yung-Ting Chuang

01-02-2013 | State-of-the-Art | Issue 1/2013

State of the Art der Forschung zum Interkulturellen Konsumentenverhalten. Eine Analyse der Literatur von 2005 bis 2010

Unternehmen, die mehrere Ländermärkte bearbeiten, stehen vor der Herausforderung, ihren Marketing-Mix an Kunden mit unterschiedlichen Wertvorstellungen anzupassen. Die interkulturelle Konsumentenforschung soll diesen Anpassungsprozess unterstützen …

Stefan Hoffmann, Sophia Fischer, Uta Schwarz, Robert Mai

01-02-2013 | Issue 2/2013

The study of behavioral intention for mobile commerce: via integrated model of TAM and TTF

Mobile commerce systems allow customers to purchase products over the Internet without using a pc. It also creates a new mobile business model and change e-commerce paradigms, having an especially significant effect on the medical and insurance indus…

Ya-Yueh Shih, Chi-Yuan Chen

01-01-2013 | Issue 1/2013

Hardware design of a localization system for staff in high-risk manufacturing areas

In this paper, we propose a hardware design for an effective real time indoor localization system for staff working in high-risk manufacturing areas. Because of the special requirements of our system, the chirp spread spectrum (CSS) is the most …

Rui-rong Wang, Rong-rong Ye, Cui-fei Xu, Jian-zhong Wang, An-ke Xue
Image Credits