Sei sulla pagina 1di 133

Diffusion of Mobile Commerce Application in the Market

ABSTRACT

The rapid growth of mobile applications has given rise to a new term—
mobile commerce, or m-commerce. Due to the fact that m-commerce is still at its
initial stage, there is no unified definition of it. Any transaction or economic values
managed through at least one kind of mobile terminal equipment on the mobile
telecommunication network are considered a part of mobile commerce. In general
mobile commerce is defined as the application of wireless communications
networks and devices to the execution of transactions with monetary value either
direct or indirect.

Mobile applications have become especially valued in an age where time is


precious and the weight attached to convenience is high. Also, the rapid
proliferation of wireless devices, including mobile phones, personal digital
assistants (PDAs), and other handheld devices, has made mobile commerce a
major driving force for the next wave of electronic commerce. In addition, mobile
commerce is expected to have an even greater impact on organizations, as wireless
technologies and application begin to challenge the existing process, strategies,
structures, roles of individuals, and even cultures of organizations.

Many scholars and analysts have asserted that there is a huge market
potential for mobile commerce applications. It is becoming one of the major topics
of interest for the IS research community and a key priority for many business
organizations. The eyes of scholars and industry representatives are now on the
Diffusion of Mobile Commerce Application in the Market

opportunities offered by wireless media, envisaging that the next –or the real phase
of e-business growth will be in the area of mobile commerce.

Nowadays, our world is characterized by the development of communication


technologies. World of information is a reality through the evolution of the Internet
and people can have access to a vast amount of data by just clicking on their
personal computer. Moreover, as the standard of living becomes higher, people
want efficient and effective access of information anytime and anywhere. Mobile
phones and other mobile devices contribute to the effective and efficient access to
information. People can call a call center and get informed about what they want.
However, handling routine phone requests can consume a substantial amount of
staff time and money. For this reason many companies have replaced live operators
with an automated system which is based on IVR (interactive voice response)
technology. More advanced IVR systems allow callers to retrieve customized
information. A system with text-to-speech recognition can read aloud information
that is stored in a database. Banks and credit card companies use IVR systems as
well, so that their customers can receive up-to-date account information instantly
and easily without having to speak directly to a person. IVR technology is also
used to gather information, as in the case of telephone surveys in which the user is
prompted to answer questions by pushing the numbers on a touch-tone telephone.
VoiceXML is a substantial element for the implementation of IVR systems. The
typical VoiceXML browser runs on a specialized voice gateway node that is
connected both to the public switched telephone network and to the Internet. These
voice gateways extend the power of the web to the world’s 1,300,000,000 phones.
Diffusion of Mobile Commerce Application in the Market

Here a web based application, in particular a dynamic voice portal which


allows users to access dynamic cultural content that is stored in a database. This
application is based on IVR systems and is designed with VoiceXML and JSP.
Diffusion of Mobile Commerce Application in the Market

CONTENTS

1. Introduction

2. Literature Survey

2.1. Classification of Mobile Commerce Application

2.2. Diffusion of Mobile Commerce Application

3. Project Description

3.1. Job Hunting

3.2. Mobile Voting

3.3. Programming Modules

4. System Specification

4.1. Hardware Specification

4.2. Software Specification

5. Architecture

5.1. Architecture for Job Hunting

5.2. Architecture for Mobile Voting

6. Code

6.1 .Job Hunting

6.2 .Mobile Voting

7. Implementation

7.1. Implementation of job hunting

7.2. Data flow diagram for job hunting


Diffusion of Mobile Commerce Application in the Market

7.3. Use case diagram for job hunting

7.4. Implementation of mobile job hunting

7.5. Mobile voting speech process

7.6. Data flow diagram for vote casting

7.7. Use case diagram for voter login

8. Testing

8.1. Testing for mobile system

9. Snapshot

9.1. Snapshot for job hunting

9.2. Snapshot of mobile voting

10. Performance analysis

10.1. Building the house of quality model mobile commerce to


improve performance

10.2. performance analysis of mobile voting

11. Future Enhancement

11.1. Wireless use equipment and system

11.2 .radio frequency Identification

11.3. Location determination

11.4. Software defined radio

11.5. Adaptive modulation and coding

11.6. Digital signal compression

11.7. Biometrics

12. Conclusion

13. Bibliography
Diffusion of Mobile Commerce Application in the Market

CHAPTER 1

INTRODUCTION

The rapid growth of mobile applications has given rise to a new


term—mobile commerce, or m-commerce. Due to the fact that m-
Diffusion of Mobile Commerce Application in the Market

commerce is still at its initial stage, there is no unified definition


of it. Any transaction or economic values managed through at
least one kind of mobile terminal equipment on the mobile
telecommunication network are considered a part of mobile
commerce. In general mobile commerce is defined as the
application of wireless communications networks and devices to
the execution of transactions with monetary value either direct or
indirect.

Mobile applications have become especially valued in an age


where time is precious and the weight attached to convenience is
high. Also, the rapid proliferation of wireless devices, including
mobile phones, personal digital assistants (PDAs), and other
handheld devices, has made mobile commerce a major driving
force for the next wave of electronic commerce. In addition,
mobile commerce is expected to have an even greater impact on
organizations, as wireless technologies and application begin to
challenge the existing process, strategies, structures, roles of
individuals, and even cultures of organizations.

Many scholars and analysts have asserted that there is a


huge market potential for mobile commerce applications. It is
becoming one of the major topics of interest for the IS research
community and a key priority for many business organizations.
The eyes of scholars and industry representatives are now on the
opportunities offered by wireless media, envisaging that the next
Diffusion of Mobile Commerce Application in the Market

–or the real phase of e-business growth will be in the area of


mobile commerce.

Nowadays, our world is characterized by the development of


communication technologies. World of information is a reality
through the evolution of the Internet and people can have access
to a vast amount of data by just clicking on their personal
computer. Moreover, as the standard of living becomes higher,
people want efficient and effective access of information anytime
and anywhere. Mobile phones and other mobile devices
contribute to the effective and efficient access to information.
People can call a call center and get informed about what they
want. However, handling routine phone requests can consume a
substantial amount of staff time and money. For this reason many
companies have replaced live operators with an automated
system which is based on IVR (interactive voice response)
technology. More advanced IVR systems allow callers to retrieve
customized information. A system with text-to-speech recognition
can read aloud information that is stored in a database. Banks
and credit card companies use IVR systems as well, so that their
customers can receive up-to-date account information instantly
and easily without having to speak directly to a person. IVR
technology is also used to gather information, as in the case of
telephone surveys in which the user is prompted to answer
questions by pushing the numbers on a touch-tone telephone.
VoiceXML is a substantial element for the implementation of IVR
Diffusion of Mobile Commerce Application in the Market

systems. The typical VoiceXML browser runs on a specialized


voice gateway node that is connected both to the public switched
telephone network and to the Internet. These voice gateways
extend the power of the web to the world’s 1,300,000,000
phones.

Here a web based application, in particular a dynamic voice


portal which allows users to access dynamic cultural content that
is stored in a database. This application is based on IVR systems
and is designed with VoiceXML and JSP.
Diffusion of Mobile Commerce Application in the Market

CHAPTER 2

LITERATURE SURVEY

Several applications based on VoiceXML have been developed in


following different approaches. Many companies have invested in
this technology. We present some of them. One popular company
which is one of the prevalent companies in the world and is based
on IVR systems is Nuance. Nuance is one of many providers of
speech and imaging solutions for businesses and consumers
around the world. Nuance 8.5 supports voice automation services
that are built using VoiceXML 2, the open, standards-based voice
application programming language. With the VoiceXML 2.0
standard and Nuance 8.5 speech recognition software, carriers
and enterprises can leverage their existing expertise and
investments in Web infrastructure to reduce the cost and effort of
deploying voice-driven services. Hearsay is a non-visual Web
browser developed at Stony Brook University in collaboration with
the Helen Keller Services for the Blind in Hempstead, NY. hearsay
features a flexible dialog interface and innovative context-
directed browsing not used by any existing screen - readers.
HearSay helps visually impaired and blind users browse the Web
more efficiently and quickly by identifying relevant information on
Web pages. The technology underlying hearsay brings together
Diffusion of Mobile Commerce Application in the Market

the fields of content analysis, natural language processing, and


machine learning.

In the past, voice-enabled applications were based upon


prerecorded audio. New information models and speech synthesis
tools have boosted the development of voice enabled
applications. The text-to-speech synthesis feature of advanced
VoiceXML tools has opened new perspectives in the fields of e-
commerce and e-learning too. We are no longer restricted to
prerecorded audio but can bring any text to the ear of the user - a
user that could be visually impaired and needs a voice channel to
communicate - or a user who can read but who prefers to listen.
Voice-enabled applications can support e-learning in many ways.
They can open e-learning systems to visually impaired users.

A bank can let its customers access their account balances,


obtain information on interest rates and mortgages, calculate loan
payments, or transfer funds, all using voice response applications.
Using a voice response application, brokerage firms can make
current stock prices, quotations, and portfolio balances available
over the telephone. Clients can perform complex transactions
without the intervention of a broker. The design of the Voice XML
dialogues which enable the interaction is informed by the
experience of workers on the Age Resource Desk at Age concern
Oxford shire and comments from their clients who experimented
with a VoiceXML system. A synthesis of work was carried out by
Diffusion of Mobile Commerce Application in the Market

tutors at Age Concern Oxford shire and research work from the
Speech Project at Oxford Brookes University. It describes the
Voice Access Booking System (VABS) which enables clients at Age
Concern Oxford shire to organize their IT taster session by
booking, cancelling or rearranging them using a speech dialogue
over the telephone from their own homes.

2.1 CLASSIFICATION OF MOBILE COMMERCE APPLICATION

There are potentially an unlimited number of mobile commerce


applications, which leads to a demand for classification, since
currently, it is almost impossible to cover the whole range of
potential mobile commerce application. To help understand
mobile commerce, we reviewed the classification of mobile
commerce application. It will allow developers and providers to
strategize and effectively design and implement mobile
commerce applications.

In general, mobile commerce applications have two major


attributes: mobility and reachability. According these attributes,
mobile commerce application can be classified into the following
six categories: Time critical services (e.g. SMS-based notifications
or alerts);

Location-aware and location-sensitive service (e.g. mobile


advertising, product location tracking); Identity enacted service
(e.g. mobile bank, mobile micropayments); Ubiquitous
communications and content delivery services (e.g. video-on-
Diffusion of Mobile Commerce Application in the Market

demand, interactive game); Business process streamlining; Mobile


office. Senn classified mobile commerce applications into three
main categories: transaction management (e.g. payment,
shopping), digital content delivery (e.g. E-mail, short messages)
and telemetry services (e.g. status monitoring, smart messaging).
Varshney and Vetter developed a more detailed class of mobile
commerce applications roughly categorized by mobile commerce
models based on mobile characteristics. The applications are
classified into 11 categories, including mobile financial
applications, mobile advertising, mobile inventory management,
locating and shopping for products, proactive service
management, wireless re-engineering, mobile auctions or reverse
auctions, mobile entertainment services and games, mobile
offices, mobile distance education, and wireless data centers
.Yuan and Zhang argue that value propositions in mobile
commerce which define the relationship between seller offerings
and buyer purchases by identifying how the seller achieves the
buyer’s needs originate from mobility and location awareness and
are contrary to Internet-based ecommerce. Therefore, they group
various mobile commerce applications based on these value
propositions into six categories (Ubiquitous communication,
Emergency and time critical information services, Location-
sensitive service, Pocket e-wallet, portable entertainment,
Improving productivity of mobile workforce).
Diffusion of Mobile Commerce Application in the Market

From the perspective of marketing, Nysveen, Pedersen, and


Thorbjornsen propose a grid of mobile Internet service
classification that employs four primary axes: person-interactive
versus machine interactive, and goal-oriented versus experiential
service. “Person interactivity” occurs between people through a
medium, while “machine interactivity” refers to the interaction
between people and the medium. In the latter, users can freely
modify the content and form of a mediated environment. A goal-
oriented process is defined by utilitarian benefits, while an
experiential process provides hedonic benefits. From the
perspective of market, we could perceive the diffusion trend of
mobile commerce application in market, from communication
service, information service to transaction service and interaction
service. In this paper, we incorporated the diffusion of mobile
commerce application with perspective of marketing as a new
analytic framework (Figure 2.1).

Fig 2.1: Diffusion of m-commerce application in market


Diffusion of Mobile Commerce Application in the Market

2.2 DIFFUSION OF MOBILE COMMERCE APPLICATION

To promote mobile commerce, there should be less focus on


increasing the speeds of wireless data networks now and more on
developing compelling applications. With an increasingly mobile
society, more and more people are one the move. Many
interesting services can be offered to these people through
mobile device and wireless networks. This includes mobile
communication service, mobile information service, mobile
transaction service, and mobile interaction service.

2.2.1 Mobile Communication Services

Mobile communications facilitate personal contact anytime,


anywhere. While voice and short messages are currently the
primary form of mobile communication, future mobile devices
such as 3G phones are capable of handling much more
information and providing broader bandwidth. As a result,
ubiquitous communications can become an important application
in m-commerce.

Some researchers seem to agree that e-mail services will


become an initial killer wireless application for mobile commerce.
Gordon Xu.et.al carried out a Delphi survey and the result
indicated that short message service (SMS) was most likely killer
application of m-commerce. They also identified four features of
SMS and the critical success factors in m-commerce.

2.2.2 Mobile Information Services


Diffusion of Mobile Commerce Application in the Market

Since people have different information needs and preferences,


one of the challenges for mobile information systems is to take
advantage of the convenience of handheld devices and provide
personalized information to the right person in a preferred format.
Dongsong Zhang proposed a generic framework for delivering
personalized and adaptive content to mobile users. It introduced
a variety of enabling technologies and highlights important

issues in this area.

Finding the geographic location of a person is commercially


valuable because, in a mobile society, people and goods are in
motion, and tend to become lost in this mobile environment. If a
service could help pinpoint the location of a mobile device to the
degree of precision appropriate for different applications,
significant value could be added.

Location–based services (LBS) are services that generate


commercial activity by using geographic location (i.e., place-
related) information of the mobile devices, along with information
about services and products available in (certain degree of)
physical proximity. LBS include locate-info service, mobile
advertising, product location tracking service, locate-a friend
service, mobile inventory management, and patient monitoring
service. These services generated great interest among
researchers and developers, primarily due to the presumed
Diffusion of Mobile Commerce Application in the Market

potential for: (1) user empowerment, (2) the estimated market for
location based advertising, (3) and the ability to handle many
emergency situations(e.g., airline flight schedule changes, stock
price alerts and quotations, home burglar alarms).

Varshney presented integrated location management


architecture to support the diverse location requirements of m-
commerce applications. The proposed architecture is capable of
supporting a range of location accuracies, wider network
coverage, wireless multicast, and infrastructure dependability for
m-commerce applications. Varshney (2005) also identified and
discussed several vehicular mobile commerce applications as well
as wireless and networking challenges. He presented possible
solutions for vehicular mobile commerce and defined several
research problems that should be undertaken.

Mobile adverting can also be a very important part of mobile


commerce applications. Using demographic information collected
by wireless service providers and the information on the current
location of mobile users, much targeted advertising can be done.
The advertisements sent to a user can also be location sensitive
to inform a user about various on-going specials (shops, malls,
and restaurants) in surrounding areas.

2.2.3 Mobile Transaction Services


Diffusion of Mobile Commerce Application in the Market

The power of mobile commerce is primarily due to the anytime-


anywhere connectivity of wireless devices, which provides
enormous opportunities for business process innovation. Mobile
services can also be used to enhance the efficiency of business
processes and reduce transaction costs or improve service
quality.

Mobile financial applications are likely to be one of the most


important components of mobile commerce. These could involve
a variety of applications such as mobile banking and brokerage
service, mobile money transfer, and mobile micro-payment.
These services could turn a mobile device into a business tool,
replacing bank, ATM, and credit cards by mobile money. Certainly
more work is needed in providing transaction support in the
applications and network infrastructure. Secure transactions are
required before any of these applications are widely deployed.

Herzberg believed the use of secure and convenient mobile


personal devices could revolutionize the payment, banking, and
investment industries worldwide. He also discussed some of the
challenges and opportunities involved in their use for making
secure payments and authorizing banking transactions.
Clayton.et.al presented a classification scheme of m-commerce,
examined the relative strengths and weaknesses of the models,
and discussed developing trends and their implications for mobile
commerce in the brokerage industry. Niina.et.al investigated
some mobile financial applications, including both mobile
Diffusion of Mobile Commerce Application in the Market

payments and banking services, showing how the new financial


services can be deployed in mobile networks and identifying the
main players in the mobile financing value chain. They used
examples from the European context to highlight the features of
the new services as they explored the players’ particular
strengths and weaknesses in providing the services.

2.2.4 Mobile Interaction Services

Entertainment is an important interactive service that mobile


commerce could provide. It includes mobile games, mobile music,
video-on-demand and other services. The convergence of
entertainment, Internet and telecommunication industries has
taken steps towards creating completely new ways to spend time,
so mobile games are revolutionizing entertainment. Mobile games
are interactive in nature and it allows players to experience
virtual worlds far more exciting than everyday life. In Japan the
downloadable wireless entertainment is become extremely
popular. It has changed the way people wait for transportation or
just kill time. This development has begun also in western world
and China.

Kleijnen.et.al published an interesting study of mobile


gaming adoption in the Netherlands. They applied a series of
sophisticated multivariate analyses to examine mobile gamers’
profiles. Pavlos and Adam investigated customers’ preferences
and attitudes towards mobile music services in Europe through an
exploratory research approach. Their findings suggested mobile
Diffusion of Mobile Commerce Application in the Market

music providers should design tailored marketing mix programs


towards sufficiently meeting the needs of customers in the
emerging mobile music industry.
Diffusion of Mobile Commerce Application in the Market

CHAPTER 3

PROJECT DESCRIPTION

Our project’s ideal goal is to enable the mobile phone to Vote and
hunt for a job Mobile communication systems of today provide
increased availability, miniaturization and enhanced data rates.
This emergence is expected to enhance the deployment of mobile
systems in many services.

3.1 JOB HUNTING

In India all earlier job Hunt the employer and the jobseeker need
to depend fully on the website and text based information display
is there. In this voice based job hunt the job seekers can easily
get the information through the landline or mobile with the help
of IVRS based system through voice xml.

3.1.1 Existing System

Job Hunter can get the job information only if they have internet
connection or only through newspaper and its fully text based
information system.
Diffusion of Mobile Commerce Application in the Market

3.1.2 Drawbacks of Existing System

 If internet is not available say some remote area the job


hunters won’t get the correct information at correct time. So
there is a major chance of losing their interviews.
 The job hunter cannot always read all the papers which and
displaying all job related rules.
 There are lot web site and newspapers are available so they
cannot predict in which paper or in which website they may
get the correct information.

3.1.3 Proposed System

Our system is purely based on voice and it can be transmitted to


both mobile and landline phones. Existing systems were mainly
based on text but in the proposed system the main aim is to
deliver the service through speech.

3.1.4 Features of the Proposed System

 Nowadays Telecommunication is the basic for all people.


 Delivering a job hunt based on IVRS through
telecommunication will easily reach the jobseeker.

3.1.5 Advantages of the Proposed System

 The jobseeker can easily get the information only if they


have a mobile or landline.
Diffusion of Mobile Commerce Application in the Market

 This increases the number of candidates attending interview


so it will be helpful for the company to get the right
candidate.

3.2 MOBILE VOTING

In this Project, Mobile technology-IVR is used for election polling.

3.2.1 Existing System

Voting is done in voting stations where voters cast their votes


using electronic voting device.

3.2.2 Drawbacks of Existing System

 Voting station might be far and the voters cannot go there.


 Voters will have to stand in long queues to cast their votes.

3.2.3 Proposed System

A Person needs to call a Number authorized by the Election


Committee. First the person will be evaluated asking for the
biometric election card number. An algorithm is implemented for
security reasons. Once the person is authorized, he can continue
with the polling process. After that, IVR will play the various
parties contesting in elections. Based on the User inputs, polling
will be recorded. User inputs can either be DTMF or Speech
Recognition.

3.2.4 Features of Proposed System

 If voters want to vote through Mobile, they have to be


registered in Election Commission or they can register online
Diffusion of Mobile Commerce Application in the Market

provided they must have a unique identification number like


pan card number, license number etc.
 This means that the voters have already registered their real
names and addresses by presenting their eligible credentials
at the time of subscription.
 The mobile users have to dial a designated phone number
and follow the instructions using a password already
provided.
 Privacy: All votes remain secret while voting takes place and
each individual

3.2.5 Advantages of Proposed System

 Mobile Voting can be used in cases where it is physically


impossible for the voter to travel to the polling station to
vote.
 Mobile Voting for persons who are physically disabled or who
cannot come to the polling station for other
valid reasons.
1. Blind peoples.

2. Handicapped peoples.

 To achieve democracy, Voters need to be properly registered


and authenticated, and then there should be a convenient
way for them to cast their votes, for example, availability of
different language choices, special aid for disabled voters,
and proper ways for absentee voting and early voting.
 Voters can also choose not to vote.
Diffusion of Mobile Commerce Application in the Market

3.3 PROGRAM MODULES

3.3.1 Sip Phone

Sip phone is an emulator with the help of which user can call
IVRS. Here there is more than one line. So based on their
application which they want to contact, the customer can call that
particular line. In this, emulator is used to receive the user input
in the format of DTMF or Speech and it also delivers the output to
the user in the form of speech.

3.3.2 Call Routing

You may have one or many inbound telephone numbers. Set up a


call route to specify which application to play when a call is
placed to a specific telephone number or DID. You can also
define a default application to play when an unassigned number
is dialed. Here in our application we have set the routing by giving
our default local server URL.

3.3.3 Voice Browser

Voice Browser is a web Browser in which the voice xml (VXML) is


embedded in Java Server Pages(JSP) and its is ready to get the
user input in the format of DTMF or Speech mode and it analyze
the user input and based on that it will deliver the output in the
format of voice.
Diffusion of Mobile Commerce Application in the Market

CHAPTER 4
SYSTEM SPECIFICATION

4.1 HARDWARE SPECIFICATION

Processor : Pentium IV

Processor Speed : 1.8 GHz

Hard Disk Capacity : 40 GB

Clock Speed : 650 MHz


Diffusion of Mobile Commerce Application in the Market

RAM Capacity : 1GB

4.2 SOFTWARE SPECIFICATION

Operating System : Windows XP

Front End : JSP, VXML, SIP Phone Emulator

Back End : MYSQL SERVER

CHAPTE
R5

ARCHITECTURE

5.1 ARCHITECTURE FOR JOB HUNT

The Architecture for job hunt is as per the figure 5.1 shown below.

The customer can call IVRS using a mobile or a Landline


phone which connects to the host IVRS server with the help of
PSTN (public switched telephone network). In the server there will
Diffusion of Mobile Commerce Application in the Market

be an option to route more than one call with the call Router. This
helps to run more than one IVRS application simultaneously in
time sharing basis.

Fig 5.1: Architecture for Job Hunt

In the IVRS server, our server program containing jsp and


voice xml will be embedded and it is useful for getting the input
from the user as well as delivering output to the user through sip
phone emulator. Our server application will contact the particular
database and it will get all the resources and deliver to the end
user in the form of voice.

5.1.1 Interactive Voice Response System (IVRS)


Diffusion of Mobile Commerce Application in the Market

IVRS is a technology that allows a computer to detect voice and


Dual Tone Multi Frequency signaling (DTMF) keypad inputs. IVR
technology is used extensively in telecommunication, but is also
being introduced into automobile systems for hands-free
operation. Current deployment in automobiles revolves around
satellite navigation, audio and mobile phone systems. In
telecommunications, IVR allows customers to access a company’s
database via a telephone keypad or by speech recognition, after
which they can service their own inquiries by following the
instructions.

IVR systems can respond with pre-recorded or dynamically


generated audio to further direct users on how to proceed. IVR
systems can be used to control almost any function where the
interface can be broken down into a series of simple menu
choices. In telecommunications applications, such as customer
support lines, IVR systems generally scale well to handle large call
volumes.

5.1.2 Public Switched Telephone Network (PSTN)

The PSTN is the network of the world's public circuit switched


telephone networks. Originally a network of fixed-line analog
telephone systems, the PSTN is now almost entirely digital in
its PSTN operators.

Regulation of the PSTN


Diffusion of Mobile Commerce Application in the Market

In most countries, the government has a dedicated to monitoring


the provision of PSTN services in that country. Their tasks may be
for example to ensure that end customers are not over-charged
for services where monopolies may exist. They may also regulate
the prices charged between the operators to carry each other’s
traffic.

Technology in the PSTN

 Network Topology

The PSTN network architecture had to evolve over the years to


support increasing numbers of subscribers, calls, connections to
other countries, direct dialing and so on. The model developed by
the US and Canada was adopted by other nations, with
adaptations for local markets.

The original concept was that the telephone exchanges are


arranged into hierarchies, so that if a call cannot be handled in a
local cluster, it is passed to one higher up for onward routing. This
reduced the number of connecting trunks required between
operators over long distances and also kept local traffic separate.

However, in modern networks the cost of transmission and


equipment is lower and, although hierarchies still exist, they are
much flatter, with perhaps only two layers.

 Digital channels

Most automated telephone exchanges now use digital switching


rather than mechanical or analog switching. The trunks
connecting the exchanges are also digital, called circuits or
channels. However analog two-wire circuits are still used to
Diffusion of Mobile Commerce Application in the Market

connect the last mile from the exchange to the telephone in the
home (also called the local loop). To carry a typical phone call
from a calling party to a called party, the analog audio signal is
digitized at an 8 kHz sample rate using 8-bit pulse code
modulation (PCM). The call is then transmitted from one end to
another via telephone exchanges. The call is switched using a call
set up protocol (usually ISUP) between the telephone exchanges
under an overall routing strategy.

The call is carried over the PSTN using a 64 Kbit/s channel,


originally designed by Bell Labs. The name given to this channel
is Digital Signal 0 (DS0). The DS0 circuit is the basic granularity of
circuit switching in a telephone exchange. A DS0 is also known as
a timeslot because DS0s are aggregated in time-division
multiplexing (TDM) equipment to form higher capacity
communication links. A Digital Signal 1 (DS1) circuit carries 24
DS0s on a North American or Japanese T-carrier (T1) line, or 32
DS0s (30 for calls plus two for framing and signaling) on an E-
carrier (E1) line used in most other countries. In modern
networks, the multiplexing function is moved as close to the end
user as possible, usually into cabinets at the roadside in
residential areas, or into large business premises.

These aggregated circuits are conveyed from the initial


multiplexer to the exchange over a set of equipment collectively
known as the access network. The access network and inter-
Diffusion of Mobile Commerce Application in the Market

exchange transport use synchronous optical transmission, for


example, SONET and Synchronous Digital Hierarchy (SDH)
technologies, although some parts still use the older PDH
technology. Within the access network, there are a number of
reference points defined. Most of these are of interest mainly to
ISDN but one – the V reference point – is of more general interest.
This is the reference point between a primary multiplexer and an
exchange. The protocols at this reference point were standardized
in ETSI areas as the V5 interface core and includes mobile as well
as fixed telephones.

5.1.3 Dual Tone Multi Frequency Signals (DTMF)

DTMF signals (entered via the telephone keypad) and natural


language speech recognition interpret the caller's response to
voice prompts. Other technologies include the ability to speak
complex and dynamic information, such as an e-mail, news report
or weather information using Text-To-Speech (TTS). TTS is
computer generated synthesized speech that is no longer the
robotic voice generally associated with computers. Real voices
create the speech in fragments (phonemes) that are spliced
together (concatenated) before being played to the caller.

An IVR can be utilized in several different ways:

1. Equipment installed on the customer premise

2. Equipment installed in the PSTN (Public Switched Telephone


Network)

3. Application service provider (ASP).

4. Hosted IVR
Diffusion of Mobile Commerce Application in the Market

A simple voice mail system is different from IVR in that it is


person-to-person, whereas an IVR is person to computer. IVR
voice forms can be used to provide a more complex voice mail
experience to the caller. For example, the IVR could ask if the
caller wishes to hear, edit, forward or remove a message that was
just recorded.

An automatic call distributor (ACD) is often the first point of


contact when calling many larger businesses. An ACD uses digital
storage devices to play greetings or announcements, but typically
routes a caller without prompting for input. An IVR can play
announcements and request an input from the caller. This
information can be used to profile the caller and route the call to
an agent with a particular skill set. (A skill set is a function applied
to a group of call-center agents with a particular skill.)

Interactive voice response can be used to front-end a call


center operation by identifying the needs of the caller.
Information can be obtained from the caller such as account
numbers. Answers to simple questions such as account balances
or pre-recorded information can be provided without operator
intervention. Account numbers from the IVR are often compared
to caller ID data for security reasons and additional IVR responses
are required if the caller ID data do not match the account record.

IVR call flows are created in a variety of ways. A traditional


IVR depended upon proprietary programming or scripting
languages, whereas modern IVR applications are structured
Diffusion of Mobile Commerce Application in the Market

similar to Web pages, using VoiceXML, CCXML, SRGS, SALT or T-


XML languages. The ability to use XML developed applications
allows a Web server to act as an application server, freeing the
developer to focus on the call flow. It was widely believed that
developers would no longer require specialized programming
skills; however this has been proven to be misguided as IVR
applications need to understand the human reaction to the
application dialog. This is the difference between a good user
experience and IVR hell. Higher level IVR development tools are
available in recent years to further simplify the application
development process. A call flow diagram can be drawn with a
GUI tool and the application code (VoiceXML or SALT) can be
automatically generated. In addition, these tools normally provide
extension mechanisms for software integration, such as HTTP
interface to Web site and Java interface for connecting to a
database.

In telecommunications, an audio response unit (ARU) is a


device that provides synthesized voice responses to DTMF key
presses by processing calls based on (a) the call-originator input,
(b) information received from a database, and (c) information in
the incoming call, such as the time of day. ARUs increase the
number of information calls handled and to provide consistent
quality in information retrieval.

5.1.4 VoIP
Diffusion of Mobile Commerce Application in the Market

The increased usage of VoIP in voice networks is likely to affect


how IVR will be used in voice networks, this is due to the
introduction of protocols such as Session Initiation Protocol (SIP).
The introduction of SIP means that point to point communications
is no longer restricted to voice calls but can now be extended to
multimedia technologies such as video. This will bring a new
meaning to automated services as IVR extends its reach to video
calls. Many IVR manufacturers are currently working on IVVR
(Interactive Voice and Video Response) systems, especially for
the mobile phone networks.

The use of video will give IVR systems the ability to use
graphical and video information to assist the caller. The
introduction of video IVR may allow systems in the future the
ability to read emotions and facial expressions. It may be used to
identify the caller, using technology such as Iris scan or other
biometric means. Recordings of the caller may be stored to
monitor certain transactions, and may be used to reduce identity
fraud.

 Unified communications in the SIP contact center

With the introduction of SIP contact centers, automation has


finally come of age. Calls arriving at a SIP contact center must
now be queued against a SIP IVR system. Call control in a SIP
contact center is controlled by VXML scripting which is an
extension of the language used to write modern IVR Applications.
As calls are queued in the SIP contact center, the IVR system can
Diffusion of Mobile Commerce Application in the Market

provide treatment, automation, wait for a fixed period, or play


music. Inbound calls to a SIP contact center must be queued or
terminated against a SIP end point. In addition SIP IVR systems
can be used to replace agents directly by the use of BBUA (Back
to Back User Agents).

 Interactive Messaging Response (IMR)

As communications have migrated to multimedia so has


Automation. The introduction of Instant Messaging (IM) in Contact
Centers is starting to take off. Agents can handle up to 6 different
IM conversations at the same time and so agent productivity is
increasing. IVR systems are now starting to handle IM
conversations using existing Speech Recognition Technology. This
is different from email handling as email automated response is
based on key word spotting. IM conversations are different to
email as IM is conversational. The use of text messaging
abbreviations and simile’s requires different grammars than those
currently used for speech recognition. IM is also starting to
replace text messaging on Multimedia Mobile handsets and is
expected to become more widely used.

5.1.5 Virtual Private Network (VPN)

VPN is a computer network that is layered on top of an underlying


computer network. The private nature of a VPN means that the
data travelling over the VPN is not generally visible to, or is
encapsulated from, the underlying network traffic. Similarly, the
Diffusion of Mobile Commerce Application in the Market

traffic within the VPN appears to the underlying network as just


another traffic stream to be passed. A VPN connection can be
envisioned as a "pipe within a pipe", with the outer pipe being the
underlying network connection.

The term VPN can be used to describe many different


network configurations and protocols. As such, it can become
complex when trying to generalize about the characteristics of a
VPN. Some of the more common uses of VPNs are described
below, along with more detail about the various classification
schemes and VPN models.

Fig 5.2: Virtual Private Network

Mobile VPNs handle the special circumstances when an


endpoint of the VPN is not fixed to a single IP address, but instead
roams across various networks such as data networks from
cellular carriers or between multiple Wi-Fi access points. Mobile
VPNs have been widely used in public safety, where they give law
enforcement officers access to mission-critical applications, such
as computer-assisted dispatch and criminal databases, as they
Diffusion of Mobile Commerce Application in the Market

travel between different subnets of a mobile network. They are


also used in field service management and by healthcare
organizations, among other industries.

Increasingly, mobile VPNs are being adopted by mobile


professionals and white-collar workers who need reliable
connections. They allow users to roam seamlessly across
networks and in and out of wireless-coverage areas without losing
application sessions or dropping the secure VPN session. A
conventional VPN cannot survive such events because the
network tunnel is disrupted, causing applications to disconnect,
time out, or fail, or even cause the computing device itself to
crash.

Instead of logically tying the endpoint of the network tunnel


to the physical IP address, each tunnel is bound to a permanently
associated IP address at the device. The mobile VPN software
handles the necessary network authentication and maintains the
network sessions in a manner transparent to the application and
the user. The Host Identity Protocol (HIP), under study by the
Internet Engineering Task Force, is designed to support mobility
of hosts by separating the role of IP addresses for host
identification from their locator functionality in an IP network.
With HIP a mobile host maintains its logical connections
established via the host identity identifier while associating with
different IP addresses when roaming between access networks.

5.1.6 Hypertext Transfer Protocol (HTTP)


Diffusion of Mobile Commerce Application in the Market

HTTP is an Application Layer protocol for distributed,


collaborative, hypermedia information systems. HTTP is a
request-response standard typical of client-server computing. In
HTTP, web browsers or spiders typically act as clients, while an
application running on the computer hosting the web site acts as
a server. The client, which submits HTTP requests, is also referred
to as the user agent. The responding server, which stores or
creates resources such as HTML files and images, may be called
the origin server. In between the user agent and origin server
may be several intermediaries, such as proxies, gateways, and
tunnels.

HTTP is not constrained in principle to using TCP/IP, although


this is its most popular implementation platform. Indeed HTTP can
be "implemented on top of any other protocol on the Internet, or
on other networks." HTTP only presumes a reliable transport; any
protocol that provides such guarantees can be used.

5.1.7 Transmission Control Protocol (TCP)


TCP is one of the core protocols of the Internet Protocol Suite. TCP
is one of the two original components of the suite (the other being
Internet Protocol, or IP), so the entire suite is commonly referred
to as TCP/IP. Whereas IP handles lower-level transmissions from
computer to computer as a message makes its way across the
Internet, TCP operates at a higher level, concerned only with the
two end systems, for example a Web browser and a Web server.
Diffusion of Mobile Commerce Application in the Market

In particular, TCP provides reliable, ordered delivery of a stream


of bytes from a program on one computer to another program on
another computer. Besides the Web, other common applications
of TCP include e-mail and file transfer. Among its other
management tasks, TCP controls segment size, flow control, the
rate at which data is exchanged, and network traffic congestion.

TCP provides a communication service at an intermediate


level between an application program and the Internet Protocol
(IP). That is, when an application program desires to send a large
chunk of data across the Internet using IP, instead of breaking the
data into IP-sized pieces and issuing a series of IP requests, the
software can issue a single request to TCP and let TCP handle the
IP details.

IP works by exchanging pieces of information called packets.


A packet is a sequence of bytes and consists of a header followed
by a body. The header describes the packet's destination and,
optionally, the routers to use for forwarding until it arrives at its
final destination. The body contains the data which IP is
transmitting.

Due to network congestion, traffic load balancing, or other


unpredictable network behavior, IP packets can be lost,
duplicated, or delivered out of order. TCP detects these problems,
Diffusion of Mobile Commerce Application in the Market

requests retransmission of lost packets, rearranges out-of-order


packets, and even helps minimize network congestion to reduce
the occurrence of the other problems. Once the TCP receiver has
finally reassembled a perfect copy of the data originally
transmitted, it passes that datagram to the application program.
Thus, TCP abstracts the application's communication from the
underlying networking details.

TCP is used extensively by many of the Internet's most


popular applications, including the World Wide Web (WWW), E-
mail, File Transfer Protocol, Secure Shell, peer-to-peer file sharing,
and some streaming media applications.

TCP is optimized for accurate delivery rather than timely


delivery, and therefore, TCP sometimes incurs relatively long
delays (in the order of seconds) while waiting for out-of-order
messages or retransmissions of lost messages. It is not
particularly suitable for real-time applications such as Voice over
IP. For such applications, protocols like the Real-time Transport
Protocol (RTP) running over the User Datagram Protocol (UDP) are
usually recommended instead.

TCP is a reliable stream delivery service that guarantees


delivery of a data stream sent from one host to another without
duplication or losing data. Since packet transfer is not reliable, a
technique known as positive acknowledgment with retransmission
is used to guarantee reliability of packet transfers. This
fundamental technique requires the receiver to respond with an
Diffusion of Mobile Commerce Application in the Market

acknowledgment message as it receives the data. The sender


keeps a record of each packet it sends, and waits for
acknowledgment before sending the next packet. The sender also
keeps a timer from when the packet was sent, and retransmits a
packet if the timer expires. The timer is needed in case a packet
gets lost or corrupted.

TCP consists of a set of rules: for the protocol, that are used
with the Internet Protocol, and for the IP, to send data "in a form
of message units" between computers over the Internet. At the
same time that IP takes care of handling the actual delivery of the
data, TCP takes care of keeping track of the individual units of
data transmission, called segments that a message is divided into
for efficient routing through the network. For example, when an
HTML file is sent from a Web server, the TCP software layer of
that server divides the sequence of bytes of the file into segments
and forwards them individually to the IP software layer (Internet
Layer).

The Internet Layer encapsulates each TCP segment into an


IP packet by adding a header which includes (among other data)
the destination IP address. Even though every packet has the
same destination address, they can be routed on different paths
through the network. When the client program on the destination
computer receives them, the TCP layer (Transport Layer)
reassembles the individual segments and ensures they are
Diffusion of Mobile Commerce Application in the Market

correctly ordered and error free as it streams them to an


application.

5.2 ARCHITECTURE FOR MOBILE VOTING


The Architecture for Mobile Voting is as shown in figure 5.3.

Fig.5.3: Architecture for Mobile Voting

5.2.1 Server Module Description

Voting Device (Mobile/Land Phone)

In our scheme, the voting device corresponds to the mobile


equipment (ME), which consists of a SIM card. The device needs
to provide a platform to run the voting application, which consists
Diffusion of Mobile Commerce Application in the Market

of the candidate information, the key storage and generation


functions.

Authentication Centre (AC)

AC is an entity within the GSM network. AC generates the


authentication parameters and authenticates the mobile
equipment. Apart from authenticating the mobile equipment, AC
is also an important information distribution server in the
proposed scheme. AC needs to be trusted to transfer the
messages as required.

Verification Server (VS)


VS belong to the voting authority, who organizes the voting event.
It verifies the legitimacy of the voter and issues a voting token to
the voter. VS also publish a list of voter information.

Collecting and Counting Server (CS)


CS is the server that collects and counts the votes to give the final
result. CS’s action need to be audited by all candidate parties.
Diffusion of Mobile Commerce Application in the Market

CHAPTER 6
CODE
6.1 JOB HUNT

DTMF Mode

//Main.jsp

<?xml version="1.0" encoding="UTF-8" ?>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you


please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please


try that again?

<reprompt />

</noinput>

<menu id="menu">

<property name="inputmodes" value="dtmf"/>


Diffusion of Mobile Commerce Application in the Market

<prompt bargein="false">Welcome to mobile. Job Hunting.

select the category of job. from the following options.

Please press the related number. to choose the job category.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<choice
next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp"
dtmf="1">

.Computers and I T.

</choice>

<choice
next="http://localhost:8080/jobHunt/jobCategory/Medical.jsp"
dtmf="2">

.Medical.

</choice>

<choice
next="http://localhost:8080/jobHunt/jobCategory/Sales.jsp"
dtmf="3">
Diffusion of Mobile Commerce Application in the Market

.Sales and Marketing.

</choice>

<choice
next="http://localhost:8080/jobHunt/jobCategory/BPO.jsp"
dtmf="4">

.B.P.O.

</choice>

<choice
next="http://localhost:8080/jobHunt/jobCategory/Accounting.jsp"
dtmf="5">

.Accounting and Tax.

</choice>

<choice
next="http://localhost:8080/jobHunt/jobCategory/HR.jsp"
dtmf="6">

.H. R and Top management.

</choice>

</menu>

</vxml>

//ComputerIT.jsp
Diffusion of Mobile Commerce Application in the Market

<?xml version="1.0" encoding="UTF-8" ?>

<%@ page language="java"


import="java.sql.*,java.util.*,com.matrix.*" %>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you


please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please


try that again?

<reprompt />

</noinput>

<menu id="menuCategory">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

..please press the related number. to choose the job role.


from the following list.

</prompt>

<prompt>

<enumerate>
Diffusion of Mobile Commerce Application in the Market

<value expr="_prompt"/> press <value


expr="_dtmf"/>,

</enumerate>

</prompt>

<choice next="#hardware" dtmf="1">Hardware and


Networking.</choice>

<choice next="#web" dtmf="2">Web Designing and


Graphics.</choice>

<choice next="#software" dtmf="3">Software


Development and Programming.</choice>

<choice next="#testing" dtmf="5">Software


Testing.</choice>

</menu>

<%

String driver = "com.mysql.jdbc.Driver";

Class.forName(driver).newInstance();

Connection con = null;

ResultSet rst = null;

Statement stmt = null;

String dbUname = "root";

String dbPass = "root";

try {

String url = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";
Diffusion of Mobile Commerce Application in the Market

con = DriverManager.getConnection(url);

stmt = con.createStatement();

rst = stmt.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM
networking");

while (rst.next()) {

%>

<form id="hardware">

<block>

<prompt>...Date...<%=rst.getString(1)%></prompt>

<prompt>...Company...<
%=rst.getString(2)%></prompt>

<prompt>...Position...<%=rst.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst.getString(4)%></prompt>

<prompt>...Location...<%=rst.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst.close();

con.close();

stmt.close();
Diffusion of Mobile Commerce Application in the Market

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver1 = "com.mysql.jdbc.Driver";

Class.forName(driver1).newInstance();

Connection con1 = null;

ResultSet rst1 = null;

Statement stmt1 = null;

try {

String url1 = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";

con1 = DriverManager.getConnection(url1);

stmt1 = con1.createStatement();

rst1 = stmt1.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM web");

while (rst1.next()) {

%>

<form id="web">

<block>

<prompt>...Date...<%=rst1.getString(1)%></prompt>

<prompt>...Company...<
%=rst1.getString(2)%></prompt>
Diffusion of Mobile Commerce Application in the Market

<prompt>...Position...<%=rst1.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst1.getString(4)%></prompt>

<prompt>...Location...<
%=rst1.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst1.close();

con1.close();

stmt1.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver2 = "com.mysql.jdbc.Driver";

Class.forName(driver2).newInstance();

Connection con2 = null;

ResultSet rst2 = null;

Statement stmt2 = null;


Diffusion of Mobile Commerce Application in the Market

try {

String url2 = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";

con2 = DriverManager.getConnection(url2);

stmt2 = con2.createStatement();

rst2 = stmt2.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM software");

while (rst2.next()) {

%>

<form id="software">

<block>

<prompt>...Date...<%=rst2.getString(1)%></prompt>

<prompt>...Company...<
%=rst2.getString(2)%></prompt>

<prompt>...Position...<%=rst2.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst2.getString(4)%></prompt>

<prompt>...Location...<
%=rst2.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst2.close();
Diffusion of Mobile Commerce Application in the Market

con2.close();

stmt2.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver3 = "com.mysql.jdbc.Driver";

Class.forName(driver3).newInstance();

Connection con3 = null;

ResultSet rst3 = null;

Statement stmt3 = null;

try {

String url3 = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";

con3 = DriverManager.getConnection(url3);

stmt3 = con3.createStatement();

rst3 = stmt3.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM testing");

while (rst3.next()) {

%>

<form id="testing">

<block>
Diffusion of Mobile Commerce Application in the Market

<prompt>...Date...<%=rst3.getString(1)%></prompt>

<prompt>...Company...<
%=rst3.getString(2)%></prompt>

<prompt>...Position...<%=rst3.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst3.getString(4)%></prompt>

<prompt>...Location...<
%=rst3.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst3.close();

con3.close();

stmt3.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<menu id="gotomenu">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

.Goto.

</prompt>

<prompt>
Diffusion of Mobile Commerce Application in the Market

<enumerate>

<value expr="_prompt"/> press <value


expr="_dtmf"/>,

</enumerate>

</prompt>

<!--<choice
next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml"
dtmf="1">-->

<choice
next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp"
dtmf="7">

Previous Menu.

</choice>

<!--<choice
next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml"
dtmf="1">-->

<choice next="http://localhost:8080/jobHunt/Main.jsp"
dtmf="8">

Main Menu.

</choice>

</menu>

</vxml>

//HR.jsp

<?xml version="1.0" encoding="UTF-8" ?>


Diffusion of Mobile Commerce Application in the Market

<%@ page language="java"


import="java.sql.*,java.util.*,com.matrix.*" %>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you


please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please


try that again?

<reprompt />

</noinput>

<menu id="menuCategory">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

..please press the related number. to choose the job role.


from the following list.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value


expr="_dtmf"/>,

</enumerate>
Diffusion of Mobile Commerce Application in the Market

</prompt>

<choice next="#hardware" dtmf="1">Admin


Excecutive.</choice>

<choice next="#web" dtmf="2">H.R.manager.</choice>

<choice next="#software" dtmf="3">payroll.</choice>

</menu>

<%

String driver = "com.mysql.jdbc.Driver";

Class.forName(driver).newInstance();

Connection con = null;

ResultSet rst = null;

Statement stmt = null;

String dbUname = "root";

String dbPass = "root";

try {

String url = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";

con = DriverManager.getConnection(url);

stmt = con.createStatement();

rst = stmt.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM admin");

while (rst.next()) {

%>
Diffusion of Mobile Commerce Application in the Market

<form id="hardware">

<block>

<prompt>...Date...<%=rst.getString(1)%></prompt>

<prompt>...Company...<
%=rst.getString(2)%></prompt>

<prompt>...Position...<%=rst.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst.getString(4)%></prompt>

<prompt>...Location...<%=rst.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst.close();

con.close();

stmt.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver1 = "com.mysql.jdbc.Driver";


Diffusion of Mobile Commerce Application in the Market

Class.forName(driver1).newInstance();

Connection con1 = null;

ResultSet rst1 = null;

Statement stmt1 = null;

try {

String url1 = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";

con1 = DriverManager.getConnection(url1);

stmt1 = con1.createStatement();

rst1 = stmt1.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM hr");

while (rst1.next()) {

%>

<form id="web">

<block>

<prompt>...Date...<%=rst1.getString(1)%></prompt>

<prompt>...Company...<
%=rst1.getString(2)%></prompt>

<prompt>...Position...<%=rst1.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst1.getString(4)%></prompt>

<prompt>...Location...<
%=rst1.getString(5)%></prompt>

<goto next="#gotomenu"/>
Diffusion of Mobile Commerce Application in the Market

</block>

</form>

<%}

rst1.close();

con1.close();

stmt1.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver2 = "com.mysql.jdbc.Driver";

Class.forName(driver2).newInstance();

Connection con2 = null;

ResultSet rst2 = null;

Statement stmt2 = null;

try {

String url2 = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";

con2 = DriverManager.getConnection(url2);

stmt2 = con2.createStatement();
Diffusion of Mobile Commerce Application in the Market

rst2 = stmt2.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM payroll");

while (rst2.next()) {

%>

<form id="software">

<block>

<prompt>...Date...<%=rst2.getString(1)%></prompt>

<prompt>...Company...<
%=rst2.getString(2)%></prompt>

<prompt>...Position...<%=rst2.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst2.getString(4)%></prompt>

<prompt>...Location...<
%=rst2.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst2.close();

con2.close();

stmt2.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>
Diffusion of Mobile Commerce Application in the Market

<menu id="gotomenu">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

.Goto.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value


expr="_dtmf"/>,

</enumerate>

</prompt>

<!--<choice
next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml"
dtmf="1">-->

<choice
next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp"
dtmf="7">

Previous Menu.

</choice>

<!--<choice
next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml"
dtmf="1">-->

<choice next="http://localhost:8080/jobHunt/Main.jsp"
dtmf="8">

Main Menu.
Diffusion of Mobile Commerce Application in the Market

</choice>

</menu>

</vxml>

//Medical.jsp

<?xml version="1.0" encoding="UTF-8" ?>

<%@ page language="java"


import="java.sql.*,java.util.*,com.matrix.*" %>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you


please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please


try that again?

<reprompt />

</noinput>

<menu id="menuCategory">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">
Diffusion of Mobile Commerce Application in the Market

..please press the related number. to choose the job role.


from the following list.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value


expr="_dtmf"/>,

</enumerate>

</prompt>

<choice next="#hardware" dtmf="1">general


nursing.</choice>

<choice next="#web" dtmf="2">lab technician.</choice>

<choice next="#software"
dtmf="3">orthopaedist.</choice>

<choice next="#testing" dtmf="5">Surgeon.</choice>

</menu>

<%

String driver = "com.mysql.jdbc.Driver";

Class.forName(driver).newInstance();

Connection con = null;

ResultSet rst = null;

Statement stmt = null;

String dbUname = "root";

String dbPass = "root";


Diffusion of Mobile Commerce Application in the Market

try {

String url = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";

con = DriverManager.getConnection(url);

stmt = con.createStatement();

rst = stmt.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM general");

while (rst.next()) {

%>

<form id="hardware">

<block>

<prompt>...Date...<%=rst.getString(1)%></prompt>

<prompt>...Company...<
%=rst.getString(2)%></prompt>

<prompt>...Position...<%=rst.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst.getString(4)%></prompt>

<prompt>...Location...<%=rst.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst.close();
Diffusion of Mobile Commerce Application in the Market

con.close();

stmt.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver1 = "com.mysql.jdbc.Driver";

Class.forName(driver1).newInstance();

Connection con1 = null;

ResultSet rst1 = null;

Statement stmt1 = null;

try {

String url1 = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";

con1 = DriverManager.getConnection(url1);

stmt1 = con1.createStatement();

rst1 = stmt1.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM lab");

while (rst1.next()) {

%>

<form id="web">

<block>

<prompt>...Date...<%=rst1.getString(1)%></prompt>
Diffusion of Mobile Commerce Application in the Market

<prompt>...Company...<
%=rst1.getString(2)%></prompt>

<prompt>...Position...<%=rst1.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst1.getString(4)%></prompt>

<prompt>...Location...<
%=rst1.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst1.close();

con1.close();

stmt1.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver2 = "com.mysql.jdbc.Driver";

Class.forName(driver2).newInstance();

Connection con2 = null;

ResultSet rst2 = null;

Statement stmt2 = null;


Diffusion of Mobile Commerce Application in the Market

try {

String url2 = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";

con2 = DriverManager.getConnection(url2);

stmt2 = con2.createStatement();

rst2 = stmt2.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM ortho");

while (rst2.next()) {

%>

<form id="software">

<block>

<prompt>...Date...<%=rst2.getString(1)%></prompt>

<prompt>...Company...<
%=rst2.getString(2)%></prompt>

<prompt>...Position...<%=rst2.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst2.getString(4)%></prompt>

<prompt>...Location...<
%=rst2.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst2.close();
Diffusion of Mobile Commerce Application in the Market

con2.close();

stmt2.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<%

String driver3 = "com.mysql.jdbc.Driver";

Class.forName(driver3).newInstance();

Connection con3 = null;

ResultSet rst3 = null;

Statement stmt3 = null;

try {

String url3 = "jdbc:mysql://localhost:3306/jobhunt?


user=root&password=root";

con3 = DriverManager.getConnection(url3);

stmt3 = con3.createStatement();

rst3 = stmt3.executeQuery("SELECT
DATE_FORMAT(date,'%e-%m-
%Y'),companyname,position,eligibility,location FROM surgeon");

while (rst3.next()) {

%>

<form id="testing">

<block>
Diffusion of Mobile Commerce Application in the Market

<prompt>...Date...<%=rst3.getString(1)%></prompt>

<prompt>...Company...<
%=rst3.getString(2)%></prompt>

<prompt>...Position...<%=rst3.getString(3)%></prompt>

<prompt>...Elegibility...<
%=rst3.getString(4)%></prompt>

<prompt>...Location...<
%=rst3.getString(5)%></prompt>

<goto next="#gotomenu"/>

</block>

</form>

<%}

rst3.close();

con3.close();

stmt3.close();

} catch (Exception e) {

System.out.println(e.getMessage());

}%>

<menu id="gotomenu">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

.Goto.

</prompt>

<prompt>
Diffusion of Mobile Commerce Application in the Market

<enumerate>

<value expr="_prompt"/> press <value


expr="_dtmf"/>,

</enumerate>

</prompt>

<!--<choice
next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml"
dtmf="1">-->

<choice
next="http://localhost:8080/jobHunt/jobCategory/ComputerIT.jsp"
dtmf="7">

Previous Menu.

</choice>

<!--<choice
next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml"
dtmf="1">-->

<choice next="http://localhost:8080/jobHunt/Main.jsp"
dtmf="8">

Main Menu.

</choice>

</menu>

</vxml>

//sales.jsp

<?xml version="1.0" ?>


Diffusion of Mobile Commerce Application in the Market

<vxml version="2.0">

<form id="Pharmacist">

<var name="reqType" expr="'it'"/>

<block>

<prompt>

Sales Executive Keysoft Solutions Private Ltd.

Experience.1 to 3 years.

Location. Bangalore...

Marketing/Sales Manager (Female)

Ecole Solitalre .

Experience.3 to 5 years,

Location.Delhi.

Proactive R P O. and Staffing Solutions Private Limited .

Experience.11 to 16 years.

Location.Mumbai.

</prompt>

<goto next="#gotomenu"/>

</block>

</form>

<menu id="gotomenu">

<property name="inputmodes" value="dtmf"/>


Diffusion of Mobile Commerce Application in the Market

<prompt bargein="false">

.Goto.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value


expr="_dtmf"/>,

</enumerate>

</prompt>

<!--<choice
next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml"
dtmf="1">-->

<choice
next="http://localhost:8084/jobHunt/jobCategory/ComputerIT.jsp"
dtmf="7">

Previous Menu.

</choice>

<!--<choice
next="http://localhost:8084/jobHunt/JRole/trainingCIT.vxml"
dtmf="1">-->

<choice next="http://localhost:8084/jobHunt/Main.jsp"
dtmf="8">

Main Menu.

</choice>

</menu>

</vxml>
Diffusion of Mobile Commerce Application in the Market

Entering Job Openings into the Database

<%@ page import="java.sql.*" %>

<html>

<head>

</head>

<body>

<form method="post" action="jobhunt">

<table>

<tr>Enter the values for Job Search.</tr>

<tr><td ><b>Job Date:</b></td><td>

<input type="text" name="jobdate"


value=""></input></td></tr>

<tr><td><b>Company:</b></td><td>

<textarea type="text" name="companyname"


value=""></textarea></td></tr>

<tr><td ><b>Position:</b></td><td>

<textarea type="text" name="position"


value=""></textarea></td></tr>

<tr><td><b>Eligibility:</b></td><td>

<textarea type="text" name="eligibility" id="ename"


value=""></textarea></td></tr>

<tr><td ><b>Location:</b></td><td>
Diffusion of Mobile Commerce Application in the Market

<textarea type="text" name="location"


value=""></textarea></td></tr>&nbsp;&nbsp;&nbsp;&nbsp;&n
bsp;&nbsp;

<tr><td><input type="submit"
name="EnterDetailsHW" value="Submit"></input></td>

<td><input type="button" name="jobdate"


value="Cancel"></input></td></tr>

</table>

</form>

</body>

</html>

6.2 MOBILE VOTING

//login using user name and password

<?xml version="1.0" ?>

<vxml version="2.0">

<var name="reqType" expr="'login'"/>

<form id="init">

<block>Welcome to Mobile Voting.</block>

<field name="username" type="digits?length=8">

<prompt>Please enter your 8 digit Bio.metric


Card number.</prompt>
Diffusion of Mobile Commerce Application in the Market

<noinput>I am sorry. You have not given any


input try connecting again at a later time.<exit/></noinput>

<nomatch>I am sorry. This is an invalid voter ID


number.<reprompt/></nomatch>

</field>

<field name="password" type="digits?length=4">

<prompt>Please enter the last 4 digits of the


Voter ID .</prompt>

<filled>

<!--<submit next= "mainpage.vxml"/>-->

<submit next="http://localhost:8080/MobilVoting/VServer"
namelist = "username password reqType" method="post"/>

</filled>

<noinput>I am sorry. You have not given any


input try connecting again at a later time.<exit/></noinput>

<nomatch>I am sorry. This is an invalid


passcode.<reprompt/></nomatch>

</field>

</form>

</vxml>

//login using name and pincode of city

<?xml version="1.0" ?>

<vxml version="2.0">

<var name="reqType" expr="'login2'"/>


Diffusion of Mobile Commerce Application in the Market

<form id="init">

<block></block>

<field name="age" type="digits?length=4">

<prompt>Please enter 4 digit year of Birth


.</prompt>

<noinput>I am sorry. You have not given any


input try connecting again at a later time.<exit/></noinput>

<nomatch>I am sorry. This is an invalid voter ID


number.<reprompt/></nomatch>

</field>

<field name="pincode" type="digits?length=6">

<prompt>Please enter your 6 pincode


number.</prompt>

<filled>

<!--<submit next= "mainpage.vxml"/>-->

<submit next="http://localhost:8080/MobilVoting/VServer"
namelist = "age pincode reqType" method="post"/>

</filled>

<noinput>I am sorry. You have not given any


input try connecting again at a later time.<exit/></noinput>

<nomatch>I am sorry. This is an invalid


passcode.<reprompt/></nomatch>

</field>

</form>

</vxml>
Diffusion of Mobile Commerce Application in the Market

//No match of given input

<?xml version="1.0" encoding="ISO-8859-1"?>

<vxml version="2.0" lang="en">

<form>

<block>

<prompt bargein="false">sorry you have entered wrong


information.</prompt>

</block>

</form>

</vxml>

//multi.jsp

<%@ page language="java"%>

<%@ page import = "java.io.*,java.util.*,java.net.*,java.sql.*"%>

<%

String appName = request.getContextPath().substring(1);

String appHost = request.getServerName() + ":" +


request.getLocalPort();

%>

<?xml version="1.0" ?>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">
Diffusion of Mobile Commerce Application in the Market

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you


please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please


try that again?

<reprompt />

</noinput>

<menu id="menu">

<prompt bargein="false">

you have successfully logged in.

Press 1 for vote in Keypad Mode.

say 2 for vote in Speech Recognition Mode.

</prompt>

<choice next="http://<%=appHost%>/<%=appName
%>/dtmf/Success.jsp" dtmf="1"/>

<choice next="http://<%=appHost%>/<%=appName
%>/speech/Success.jsp" > two </choice>

</menu>

</vxml>
Diffusion of Mobile Commerce Application in the Market

6.2.1 DTMF Mode

//success.jsp

<%@ page language="java"%>

<%@ page import = "java.io.*,java.util.*,java.net.*,java.sql.*"%>

<%

String appName = request.getContextPath().substring(1);

String appHost = request.getServerName() + ":" +


request.getLocalPort();

%>

<?xml version="1.0" ?>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you


please try that again?

<reprompt />

</nomatch>

<noinput>

No Input! I'm sorry, I didn't hear anything. Could you please


try that again?

<reprompt />

</noinput>
Diffusion of Mobile Commerce Application in the Market

<menu id="menu">

<property name="inputmodes" value="dtmf"/>

<prompt bargein="false">

you have chosen DTMF mode.

</prompt>

<prompt>

<enumerate>

<value expr="_prompt"/> press <value expr="_dtmf"/>,

</enumerate>

</prompt>

<choice next="http://<%=appHost%>/<%=appName
%>/dtmf/VotePollJDS.jsp" dtmf="1">

vote for JANATADALA

</choice>

<choice next="http://<%=appHost%>/<%=appName
%>/dtmf/VotePollJDU.jsp" dtmf="2">

vote for JDU

</choice>

<choice next="http://<%=appHost%>/<%=appName
%>/dtmf/VotePollCongress.jsp" dtmf="3">
Diffusion of Mobile Commerce Application in the Market

vote for Congress.

</choice>

<choice next="http://<%=appHost%>/<%=appName
%>/dtmf/VotePollBJP.jsp" dtmf="4">

vote for BJP.

</choice>

</menu>

</vxml>

//VotePoll BJP.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance"
version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");
Diffusion of Mobile Commerce Application in the Market

Connection connection =
DriverManager.getConnection("jdbc:mysql://localhost:3306/mobil
evoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO VotePollBJP (bjp) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

connection.close();

catch(Exception e) {

out.println(e.toString());

%>

<form id="insertAdmk">

<block>

<prompt>Thank u .your vote has been succesfully polled for the


party BJP.</prompt>

</block>
Diffusion of Mobile Commerce Application in the Market

<exit/>

</form>

</vxml>

//VotePoll Congress.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance"
version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection =
DriverManager.getConnection("jdbc:mysql://localhost:3306/mobil
evoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO VotePollCongress (congress) VALUES


('"+i+"')";

int res = st.executeUpdate(sql);


Diffusion of Mobile Commerce Application in the Market

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

connection.close();

catch(Exception e) {

out.println(e.toString());

%>

<form id="insertAdmk">

<block>

<prompt>Thank u .your vote has been succesfully polled for the


party congress.</prompt>

</block>

<exit/>

</form>

</vxml>

//JDU.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"
Diffusion of Mobile Commerce Application in the Market

xmlns:conf="http://www.w3.org/2002/vxml-conformance"
version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection =
DriverManager.getConnection("jdbc:mysql://localhost:3306/mobil
evoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO votePollJDU (jdu) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

connection.close();

catch(Exception e) {
Diffusion of Mobile Commerce Application in the Market

out.println(e.toString());

%>

<form id="insertJdu">

<block>

<prompt>Thank u .your vote has been succesfully polled for the


party JDU.</prompt>

</block>

<exit/>

</form>

</vxml>

//Vote Poll JDS.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance"
version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {
Diffusion of Mobile Commerce Application in the Market

Class.forName("com.mysql.jdbc.Driver");

Connection connection =
DriverManager.getConnection("jdbc:mysql://localhost:3306/mobil
evoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO votePollJDS(jds) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

connection.close();

catch(Exception e) {

out.println(e.toString());

%>

<form id="insertJds">

<block>

<prompt>Thank u .your vote has been succesfully polled for the


party JDS.</prompt>
Diffusion of Mobile Commerce Application in the Market

</block>

<exit/>

</form>

</vxml>

6.2.2 Speech Mode

//success.jsp

<%@ page language="java"%>

<%@ page import = "java.io.*,java.util.*,java.net.*,java.sql.*"%>

<%

String appName = request.getContextPath().substring(1);

String appHost = request.getServerName() + ":" +


request.getLocalPort();

%>

<?xml version="1.0" ?>

<%@ page import="java.io.*,java.util.*,java.net.*,java.sql.*"%>

<vxml version="2.0">

<nomatch>

No Match! I'm sorry, I didn't understand you. Could you


please try that again?

<reprompt />

</nomatch>

<noinput>
Diffusion of Mobile Commerce Application in the Market

No Input! I'm sorry, I didn't hear anything. Could you please


try that again?

<reprompt />

</noinput>

<menu id="menu">

<property name="inputmodes" />

<prompt>

you have Choosen speech recognition mode.

say one to vote for JDS.

say two to vote for JDU.

say three to vote for CONGRESS.

say four to vote for BJP.

</prompt>

<choice
next="http://localhost:8084/MobilVoting/speech/VotePollJDS.jsp">

one.

</choice>

<choice next="http://<%=appHost%>/<%=appName
%>/speech/VotePollJDU.jsp">

two.
Diffusion of Mobile Commerce Application in the Market

</choice>

<choice
next="http://localhost:8084/MobilVoting/speech/VotePollCongress
.jsp">

three.

</choice>

<choice
next="http://localhost:8084/MobilVoting/speech/VotePollBJP.jsp">

four.

</choice>

</menu>

</vxml>

// VotePollBJP.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance"
version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%
Diffusion of Mobile Commerce Application in the Market

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection =
DriverManager.getConnection("jdbc:mysql://localhost:3306/mobil
evoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO VotePollBJP (bjp) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

connection.close();

catch(Exception e) {

out.println(e.toString());

%>

<form id="insertBjp">

<block>
Diffusion of Mobile Commerce Application in the Market

<prompt>Thank u .your vote has been succesfully polled for the


party B.J.P.</prompt>

</block>

</form>

<exit/>

</vxml>

//VotePollCongress.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance"
version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection =
DriverManager.getConnection("jdbc:mysql://localhost:3306/mobil
evoting", "root", "root");

Statement st = connection.createStatement();
Diffusion of Mobile Commerce Application in the Market

int i = 1;

String sql = "INSERT INTO VotePollCongress (congress) VALUES


('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

connection.close();

catch(Exception e) {

out.println(e.toString());

%>

<form id="insertCongress">

<block>

<prompt>Thank u .your vote has been succesfully polled for the


party congress.</prompt>

</block>

<exit/>

</form>

</vxml>
Diffusion of Mobile Commerce Application in the Market

//VotePoll JDU.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance"
version="2.0"

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection =
DriverManager.getConnection("jdbc:mysql://localhost:3306/mobil
evoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO VotePollJdu (JDU) VALUES ('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {
Diffusion of Mobile Commerce Application in the Market

out.println("Records Added Failed!");

connection.close();

catch(Exception e) {

out.println(e.toString());

%>

<form id="insertJdu">

<block>

<prompt>Thank u .your vote has been successfully polled for the


party JDU.</prompt>

</block>

<exit/>

</form>

</vxml>

//VotePoll JANATADALA.jsp

<?xml version="1.0" ?>

<vxml xmlns="http://www.w3.org/2001/vxml"

xmlns:conf="http://www.w3.org/2002/vxml-conformance"
version="2.0"
Diffusion of Mobile Commerce Application in the Market

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xsi:schemaLocation="http://www.w3.org/2001/vxml

http://www.w3.org/TR/voicexml20/vxml.xsd">

<%@ page language="java" import="java.sql.*" %>

<%

try {

Class.forName("com.mysql.jdbc.Driver");

Connection connection =
DriverManager.getConnection("jdbc:mysql://localhost:3306/mobil
evoting", "root", "root");

Statement st = connection.createStatement();

int i = 1;

String sql = "INSERT INTO votePollJANATADALA (jds) VALUES


('"+i+"')";

int res = st.executeUpdate(sql);

if (res == 1) {

out.println("Records Updated!");

} else {

out.println("Records Added Failed!");

connection.close();

catch(Exception e) {

out.println(e.toString());
Diffusion of Mobile Commerce Application in the Market

%>

<form id="insertJds">

<block>

<prompt>Thank u .your vote has been succesfully polled for the


party JDS.</prompt>

</block>

<exit/>

</form>

</vxml

CHAPTER 7

IMPLEMENTATION

7.1 IMPLEMENTATION OF JOB HUNT

7.1.1 Calling IVRS to Get Job Information

The customer can call IVRS using mobile or a Landline phone and
this connects to the host IVRS server with the help of PSTN public
switched telephone network).

7.1.2 Getting Information from the Server

In the server itself there will be option to route more than one call
with the call Router option this helps to run more than one IVRS
Diffusion of Mobile Commerce Application in the Market

application simultaneously in time sharing basis. In the IVRS


server our server program containing jsp and voice xml will
embedded and it is useful for getting the input from the user as
well as delivering output to the user through sip phone emulator.
Our server application will contact the particular database it will
get all the resources and deliver to the end user in the form of
voice.

7.1.3 Delivering the Information to the Job Seeker

If the server finds any job openings related to qualification of the


job seeker, the information is given which contains the details
about the company name, interview location and the interview
time.

7.2 DATA FLOW DIAGRAM FOR JOB HUNTING

Job Hunting process is explained using the data flow diagram. It


depicts the data flow between various entities. When the user
calls the ivr, he will be prompted to choose touch tone mode or
speech recognition mode.

Once he entered into a mode he will be asked for his Job


category with respect to the mode he chose. Depends on the job
category he chooses, the user will be asked to enter the sub
category within the selected job category. For example, if the
user chooses computer science as his job category the he will be
asked to enter his field of interest in the sub categories such as
Networking, testing, development and so on.
Diffusion of Mobile Commerce Application in the Market

Once this information is obtained, the sever will provide the


information about job openings in various companies if the field of
interest provided matches with that present in the server.

Fig.7.1: Data Flow Diagram for Job Hunt


Diffusion of Mobile Commerce Application in the Market

7.3 USE CASE DIAGRAM FOR JOB HUNT

Fig.7.2: Use case diagram for Job Hunt


Diffusion of Mobile Commerce Application in the Market

7.4 IMPLEMENTATION OF MOBILE VOTING

In this section, we outline our mobile voting scheme.

7.4.1 Voters Authentication Phase

In this phase Election commission is responsible to verify the


authenticity of the voters. If the voter is authentic then only he
will be allowed to participate in the next steps of voting.

7.4.2 Voting Phase

In this phase, the voter dial a designated phone number and


follow the instructions using a password already provided.

• The voter selects the appropriate option to vote the particular


party.

• The voter checks the signature and retrieves the VS- signed
voter, voter ID

• The voter sends the voting token along with voter ID and the
public key correspond to this particular voter ID to AC,
these three items keep the privacy of the voter.
Diffusion of Mobile Commerce Application in the Market

• Upon receiving the encrypted key and the voting token, CS


keeps its safe till counting start as per the predefined
schedule.

7.4.3 Counting Phase

Counting Phase At the scheduled time of counting CS decrypts


the ballot and checks whether the voting token is valid or not. If it
is valid it will be counted else it will be rejected. In entire process
describe above it is strongly require that whenever AC is sending
data to VS. Sender Identification will not be revealed at any time.
So even if somebody track a ballot can be identified with the
particular AC but not with the particular User and a single AC can
have number of users

7.4.4 Security Analysis

In this section, we discuss how and to what extent the security


requirements is to be

Authenticate: only the authorized voters can vote.

 First, voters are authenticated through Voter ID, which


assures that voters are who they claim to be.
 Second, the eligibility of voters is checked by VS. This
prevents voters from voting more than once.
Privacy: All votes remain secret while the voting takes place and
each individual vote cannot be linked to the voter who casts it.
The proposed scheme is divided into three phases, and they are
separated in time. In the voting phase, a signature is applied to
the vote in a way that vote is not linkable with voter and is signed
Diffusion of Mobile Commerce Application in the Market

by the AC without revealing the vote and in the same way it is


signed by the VS. In the next step the communication between
voters and CS achieves anonymity with the help of AC. Hence, for
all the components of the voting system, if the Voters cannot be
linked with the vote, the privacy of the voter is protected.

7.5 MOBILE VOTING SPEECH PROCESS

In the below diagram voter authentication process is


diagrammatically explained about how the speech recognition
software loads the grammar from the database and matches it
with the user input. The system will prompt the user for his voter
Id and simultaneously loads the grammar from the database to
the speech recognition system. Once the grammar is loaded, the
speech recognizer starts to look for the exact utterance from the
user so that it can find a match in the grammar. Interaction with
the users will be handled by voiceXML documents. The dynamic
behavior of the user interaction like loading grammar from the
database, responding user queries based on the user input will be
handled by java server pages.

After it finds voter id match, the system now prompts the


user for his password. If his voter id and password matches then
the user will be asked some security questions to provide voter
authentication. Finally he will be allowed to cast his vote in two
different modes via touch tone or speech recognition.
Diffusion of Mobile Commerce Application in the Market

Fig.7.3: Speech Recognition Process in Mobile Voting

7.6 DATA FLOW DIAGRAM FOR VOTE CASTING

Vote casting process is explained using the data flow diagram. It


depicts the data flow between various entities. Once the user is
authenticated to cast his vote he will be prompted to choose
touch tone mode or speech recognition mode. Once he entered
into a mode he will be asked for his constituency name or
constituency number with respect to the mode he chose. For
example, he has to know his constituency number if he chooses
to vote in touch tone mode.
Diffusion of Mobile Commerce Application in the Market

Depends on the Constituency he chose, the ballot will be


generated with the list of candidates contesting in the
constituency and their respective symbols. The ballot will be
generated with the help of information available in the tables
Party Details and Candidate Details. He can vote for the candidate
by saying the symbol of the candidate or saying the candidate
number. The system will check his vote validity like duplicate
votes and illegal votes before accepting his vote. If the system
finds anything wrong with his validation of vote, his vote will be
rejected.

Cast Vote

Prompt User For DTMF or


Voice Input Mode

DTMF Input Voice Input

Recognize
Recognize
Touch Tone
Voice Input
Input

Party_Details
Generate
Ballot to
Validate User Successful
Cast Vote
Vote Validation

Unsuccessful Accept Vote


Validation Casting

Constituency_D No Match
etails End User
Check Election Session
ID

Election_Details Match
Reject Vote
Diffusion of Mobile Commerce Application in the Market

Fig.7.4: Data Flow Diagram for Vote Casting

7.7 USE CASE DIAGRAM FOR VOTER LOGIN

Use case diagram captures the user interaction with the system.
The diagram depicts the system overview of how the user
interacts with the system and external entities, the system have
to depend upon. When the user enters the system he will be
asked whether he wants to vote or know results. Once the user
selects his choice he will be directed accordingly.

If the user chooses to vote he has to go through various


processes like voter authentication and vote validation as
explained in the above diagram. The system restricts the user
from casting his vote second time for a particular election and
also do not accept illegal votes like forcing someone to cast his
vote against their wish.

If the user chooses result he will be asked to select overall


result or constituency wise results. Selecting overall result notifies
the user about the winner of the current election and his margin
of victory with respect to other parties. If he chooses Constituency
wise result he has to provide the system with constituency name.
The system notifies the user with the winner of the constituency,
Diffusion of Mobile Commerce Application in the Market

total votes secured and his margin of victory with respect to other
candidate.

V o te C o u n ti n g

V o te r R e g i stra ti o n

V o t e V a l i d a ti o n G e n e ra te R e p o rt s
V o i ce X m l V o t i n g S y st e m
M o b ile C lie n t A p p l ica tio n

< < i n cl u d e > >


Ca st Vo t e

U se r A u th e n ti ca ti o n

Fi
g.7.5: Use Case Diagram for Voter Login
Diffusion of Mobile Commerce Application in the Market

CHAPTER 8
TESTING

8.1 TESTING OF MOBILE SYSTEM

The software, which has been developed, has to be tested to


prove its validity. Testing is considered to be the least creative
phase of the whole cycle of system design. In the real sense it is
the phase, which helps to bring out the creativity of the other
phases, and makes it shine. The “Mobile System” was tested
along the following guidelines to prove its validity. It was tested
using the following two techniques of software testing.

8.1.1 White Box Testing


 By using this technique it was tested that all the individual
logical paths were executed at least once.
 All the logical decisions were tested on both their true and
false sides.
 All the loops were tested with data in between the ranges
and especially at the boundary values.

8.1.2 Black Box Testing


 By the use of this technique the missing functions were
identified and placed in their positions.
Diffusion of Mobile Commerce Application in the Market

 The errors in the interfaces were identified and corrected.


 This technique was also used to identify the initialization and
termination errors and correct th

CHAPTER 9

SNAPSHOTS
9.1 Snapshots of Job Hunt

Fig 9.1 : Voxeo SIP Soft phone


Diffusion of Mobile Commerce Application in the Market

Fig 9.2 :Call Routing for Job Hunt


Diffusion of Mobile Commerce Application in the Market

9.2 Snapshots of Mobile Voting

Fig 9.3 : Voxeo SIP Soft phone


Diffusion of Mobile Commerce Application in the Market

Fig 9.4: Directory Listing for Mobile Voting


Diffusion of Mobile Commerce Application in the Market

Fig
9.5 : Call Routing for Mobile Voting
Diffusion of Mobile Commerce Application in the Market

CHAPTER 10

PERFORMANCE ANALYSIS
10.1 BUILDING THE HOUSE OF QUALITY MODEL OF MOBILE
COMMERCE TO IMPROVE PERFORMANCE

In the Fig., Ii (where i=1…n, n is the number of the number of


quality requirements) is the degree of importance for customer
quality requirements ith. Ii can be assigned from1 meaning the
least importance to 5 meaning the most importance. Rij is the
ratings of the relationship between quality requirements ith and
technical requirements jth, it can be assigned 0, 1, 3 or 5, 0
represents no relationship between them, 1 represents weak
relationship, 3 represents medium relationship, and 5 represents
strong relationship. Xj (where j=1…m, m is the number of the
number of technical requirements) is the technical importance
rating for technical requirements jth. It’s given by the weighted
column sum of each quality requirement by the quantified
relationship values of technical requirements ith. Consequently, Xj
can be calculated by the flowing formulation.
Diffusion of Mobile Commerce Application in the Market

According to the value of Xj, we can distinguish the priority of


technical requirements, so that we can develop a more robust
service system of mobile commerce, to reduce or eliminate the
service quality gaps, and assure the service quality in mobile
commerce. Figure 10.1 . QFD calculation of compositor’s .

TABLE 10.1: QFD CALCULATION OF COMPOSITORS


Diffusion of Mobile Commerce Application in the Market
Diffusion of Mobile Commerce Application in the Market

10.2 PERFORMANCE ANALYSIS OF MOBILE VOTING

We have analyzed the percentage of voting in the past 3 years in


Bangalore.

aised to 55% and in 2010 it reduced to 45%. By using mobile for


voting we can increase the percentage of voting to 65%.

The expected increase in voting is calculated due to the various


advantages of our proposed system such as-

• Voters do not have to wait in long queues.

• Handicapped people who cannot go the


voting stations can vote conveniently
Diffusion of Mobile Commerce Application in the Market

Percentage

70%

60%

50%

40%

30%

20%

10%

Year

2008 2009 2010 expected


Fig 10.1: Statistics of Voting
Diffusion of Mobile Commerce Application in the Market

CHAPTER 11

FUTURE ENHANCEMENTS

As a measure of security features mobile devices allows the user


to make use of biometric information’s which are unique to
individuals. For example voice biometrics can be used with
voiceXML to authenticate a user. Similarly finger prints can also
be used with mobiles that provide those options. Scalability is
another important feature to be addressed.

Future enhancements for mobile commerce can be done in


the following systems. This improves the service quality in the
below systems.

11.1 WIRELESS USER EQUIPMENT AND SYSTEMS

Today’s communication-centric and computing-centric devices


are becoming a single intelligent wireless device. The future user
wireless devices, dubbed as universal wireless handheld devices,
Diffusion of Mobile Commerce Application in the Market

will have numerous functionalities, all aiming to establish


communications, enhance education, furnish entertainment,
provide information, and conduct

transactions for mobile users. Few of the device features are


already available in handheld devices, but many of them, yet to
be incorporated, will need to increase the device size, weight,
complexity, power, memory, and processing requirements. To this
end, engineering design trade-offs will be required to form the
right balance between devices’ capabilities and their constraints.

With low-power requirements and long-lasting batteries, the


universal wireless handheld devices will be small, low cost, light-
weight, easy-to-use, and IC-card-reader equipped. They can be
attached to desk-/lap-top computers and their peripherals,
including keyboards, printers, scanners, loud speakers, and fax
machines. They will have high-resolution color screens to present
pin-point information, thus minimizing the burden on users’
attention. The wireless devices and networks will employ intrusion
detection systems to detect cracking attempts in real time and to
take effective protective measures based on the information it
has. These devices include anti-virus software to handle malicious
code and to support for authenticating users, servers, and
applications.

11.2 RADIO FREQUENCY IDENTIFICATION (RFID)


Diffusion of Mobile Commerce Application in the Market

RFID is a generic term for technologies that use radio waves to


automatically identify individual items or some of their attributes.
RFID possesses several benefits over bar codes. First, it does not
need to meet line-of-sight requirements as long as the RFID tags
are within the range of a reader. Second, quite many number of
RFID tags can be read simultaneously. Third, every unique item
can have its own RFID tags. The mobile consumer will use RFID
readers in their mobile phones to scan RFID tags, say in the
packaging of products on store shelves, to pay for tolls and
access fees, to purchase at vending machines and points of sales,
to access secure rooms, buildings, and other partitioned areas,
and to control home and office appliances.

With RFID, a scanner can read the encoded information even


when the tag is concealed. For example, it may be embedded in a
product’s casing, or sewn into an item of clothing, or sandwiched
between a banknote’s layered paper. The stealthy nature of RFID
technology has raised concerns among privacy advocates that
RFID tags could be tracked beyond their intended use. For
example, security agencies might use them to covertly monitor
individuals or their belongings. Lower frequencies (LF and MF)
usually are cheaper, use less power, are better able to penetrate
non-metallic substances, and are ideal for scanning objects with
high-water content.
Diffusion of Mobile Commerce Application in the Market

On the other hand, higher frequencies (HF and UHF) typically


offer a better range and can transfer data faster; they tend to be
more directed and, thus, require a clearer path. Active tags can
have a farther read range than passive tags, but passive tags are
less expensive and require no maintenance. RFID will play a
critical role in emerging wireless access and monitoring
applications, especially in today’s security-aware era.

11.3 LOCATION DETERMINATION

Location determination is seen to be an indispensable feature for


mobile commerce. Network-based positioning is carried out by
terrestrial systems through various techniques,

such as cell of origin, time of arrival, angle of arrival, and


enhanced observed time difference. The device-based positioning
is carried out by satellite systems typically using

three or four MEO satellites, also known as GPS. However, a


hybrid approach delivering the accuracy of device-centric option,
while avoiding a line-of-sight requirement as well as increased
cost, size, and power consumption, is also used. Though FCC does
not require the mobile network operators to use a specific
technology, it has indicated specific performance metrics for
location-enabled technology. For network-based technology,
location information accuracy is required to be within 100 meters
67% of the time and within 300 meters 95% of the time . But for
the device-centric technology, these distances must be halved. In
view of possible launches of LEO satellites and the significant
increase in the processing capabilities of the wireless devices, as
Diffusion of Mobile Commerce Application in the Market

well as the fact that the cell sizes are shrinking from macro to
micro to pico, the location-based technologies are expected to
become more accurate and less costly in the future

11.4 SOFTWARE DEFINED RADIO (SDR)

SDR enables reconfigurable system architectures for wireless


networks and user devices. To provide users with m-commerce
services under an array of heterogeneous networks, certain
design problems (such as limitations in device size, cost, power
consumption, and backward compatibilities to systems) must all
be overcome. The most viable way of implementing these types
of wireless devices is to adopt a software radio approach. The
received analog signal is processed by a reprogrammable
baseband digital signal processor in accordance with the wireless
environment. However, certain problems then need to be
addressed—such as an analog radio interface with multiple
antennas and amplifiers and very fast high-speed analog-to digital
conversions and DSP functions—which can all, in turn, add to the
circuit complexity and high-power consumption and dissipation.
SDR can provide the user with a single piece of scalable hardware
that is at once compatible

at a global scale

11.5 ADAPTIVE MODULATION AND CODING (AMC)

AMC is one of the most viable and effective means to dynamically


combat wireless channel degradation and meet performance
requirements. In AMC, for the same symbol rate (i.e., occupied
Diffusion of Mobile Commerce Application in the Market

bandwidth), the signal power, the modulation technique, the


information rate, and the channel-coding rate, can all be adjusted
in accordance with instantaneous variations in channel conditions
(such as multi-path and proximity to the base station) and quality
of service requirements. Forward-error correcting (FEC) codes
(whose rates may range from 1/2 to 5/6) and digital modulation
techniques (ranging from QPSK to 64 QAM) will be dynamically
adapted for every single 5 individual, giving rise to up to a six-fold
spectral efficiency (bits per second per Hz)

11.6 DIGITAL SIGNAL COMPRESSION

Digital signal compression also known as source coding, is


employed to reduce the bit rate requirements (bandwidth
demands). It is widely applied to all sources of modality. Both
proprietary and standard techniques are widely available and are
constantly being improved upon. Texts, software, and faxes
generally employ lossless compression techniques, such

as the Lempel-Ziv and Huffman codes. On the other hand, MPEG


video, JPEG image, and MP3 audio coding standards employ lossy
compression, where known limitations of the human visual and
audio systems are exploited to introduce losses but in a controlled
manner. With advances in compression, a wider array of feature-
rich m-commerce applications and/or lower service costs can be
provided.

11.7 BIOMETRICS
Diffusion of Mobile Commerce Application in the Market

Biometrics as an essential security measure will play an


imperative role in the next-generation m-commerce services.
Traditionally, most security systems authenticate the user

based on something that he/she knows, such as a password.


However, where security really matters, it makes sense to add a
second layer, which could be something that he/she has (e.g., a
smartcard). Also, as a third option, and probably the most
authentic method, could be something that he/she is, something
that, at least theoretically, would be virtually impossible to forge.
Biometric control measuring physical characteristics and
behavioral patterns will be widely employed to allow the user to
access his/her own wireless device, to enable the user to access
certain places, and to allow the user to monitor assets. Of course,
depending on

their effectiveness, cost, intrusiveness, and accuracy, more than


one biometric controls may be simultaneously employed.
Biometric control may include finger imaging, palm print, hand
geometry, iris and retina vascular pattern, facial recognition and
thermography, signature and

handwriting, key stroke dynamics, and voice recognition and


speech pattern
Diffusion of Mobile Commerce Application in the Market

CHAPTER 12

CONCLUSION

The project consists of two applications: Job Hunt and Mobile


Voting.

Regarding job hunt, m-commerce has attracted the attention of


both practitioners and academics. Research activities on m-
commerce have increased significantly. Here we have attempted
to provide a general picture of the main characteristics of mobile
commerce application in the market. Through review the research
literatures of m-commerce, we can find that current research is
heavily skewed toward consumer issues. It seems that the most
popular m-commerce application is that supporting financial
activities. Mobile banking and payments are issues that have
been widely discussed by researchers.

On the aspect of methodology, the existing body of research


on mobile business has a disproportionately high level of
secondary research studies. So there should be an increase of
empirically-based studies (surveys, interviews, experiments,
action research, ethnography, and so on) as well as simulation. In
addition to the above conclusions, we would like to offer the
following suggestions for further research in mobile commerce
Diffusion of Mobile Commerce Application in the Market

applications: Firstly, Mobile commerce researchers should begin


to focus their efforts more carefully.

Among the applications, m-commerce entertainment


services and games have a great deal of market potential and will
dominate global m-commerce revenues in the future. Additional
research is required in other related areas such as mobile
education, mobile supply chain management, and so forth.

Secondly, since the bright prospect for mobile commerce,


many industries have sought to join this arena. The mobile
commerce value chain is thus formed, and new business
opportunities are created for the participants. Among the
participants, telecommunication operators are the most critical
and dominant. So it is necessary to exploit a game-theoretic
approach of based on mobile commerce value chain for analyzing
relation between the participants.

Lastly, as application of RFID technology grows, they are


bound to offer new opportunities in the future. Therefore, the
combination of RFID and mobile commerce, which can be called
mobile RFID, becomes a new focus of future business. An
important research that should be pursued is suitable models for
the adoption of RFID in organizations, and the RFID’s impact on
supply chains.
Diffusion of Mobile Commerce Application in the Market

The major limitations of m-commerce, as viewed today, are


small screens on wireless devices, limited processing power,
modest memory, restricted power consumption, poor voice
quality, low-speed data transmission, non-ubiquitous coverage,
unproven security, scarce bandwidth, and possible health
hazards.

In case of mobile voting, the system allows the user to cast


his vote with high level of confidentiality and keep voters away
from the possible threats like booth capturing and it may increase
the voter turnouts in remote areas and even in urban areas.
People, who are uncomfortable to wait in queues, like physically
challenged persons, can use this alternative solution. Since the
system operates on IVR platform the voter session will be
interactive and user friendly which makes the user to feel in a
very comfortable zone. The system provides security features like
checking the unique identification number of the voter.
Diffusion of Mobile Commerce Application in the Market

BIBILIOGRAPHY

[1] S.J. Barnes, The mobile commerce value chain: analysis and
future developments, International Journal of Information
Management 22 (2) (2002) 91– 108.

[2] I. Clarke III, Emerging value propositions for m commerce,


Journal of Business Strategies 18 (2) (2001) 133–148.

[3] Ting-Peng Liang, Chih-Ping Wei, Introduction to the Special


Issue: Mobile Commerce Applications, International Journal of
Electronic Commerce, Vol. 8, No. 3(2004), 7–17.

[4] Senn, J.A.. The emergence of m-commerce, Computer, 33(12)


(2000),148-150.
Diffusion of Mobile Commerce Application in the Market

[5] Varshney, U., &Vetter, R.. Mobile commerce: Framework,


applications and networking support., Mobile Networks and
Applications, 7(3) (2002), 185-198.

[6] Yuan, Y., Zhang, J.J., Towards an appropriate business model


for m-commerce, International Journal of Mobile Communications,
1(1/2) (2003), 35-56.

[7] Nysveen, H., P.E. Pedersen, and H. Thorbjornsen, Intentions to


Use Mobile Services: Antecedents and Cross Service Comparisons,
Journal of the Academy of Marketing Science, 33(3)(2005), 330
346.

[8] Gordon Xu, Jairo A. Gutiérrez, An Exploratory Study of Killer


Applications and Critical Success Factors in Mcommerce, Journal
of Electronic commerce in Organizations, 4(3)(2006), 63-79.

[9] Dongsong Zhang, Delivery of Personalized and Adaptive


Content to Mobile Devices: A Framework and Enabling
Technology, Communications of the AIS , 12(2003),183-202.

[10] Karlene Cousins, Upkar Varshney, A product location


framework for mobile commerce environment, Proceedings of the
1st international workshop on Mobile commerce, July 2001, Rome,
Italy, 43-48.

[11] U. Varshney, Location management for mobile commerce


applications in wireless Internet environment, ACM Transactions
on Internet Technology, 3 (3) (2003),

236– 255.
Diffusion of Mobile Commerce Application in the Market

[12] U. Varshney, Vehicular Mobile Commerce: Applications,


Challenges, and Research Problems, Communications of the
Association for Information Systems,16 (2005), 329-339.

[13] A. Herzberg, Payments and banking with mobile personal


devices, Communications of the ACM 46 (5) (2003) 53– 58.

[14] Clayton A. Looney, Leonard M. Jessup, and Joseph S.


Valacich, Emerging Business Models for Mobile Brokerage
Services, Communications of the ACM, 47(6)(2004), 71-77.

[15] Niina Mallat, Matti Rossi, and Virpi Kristiina Tuunainen,


Communication of the ACM May 47(5)(2004), 42-46.

[16] Kleijnen, M.H.P., K. de Ruyter, and M.G.M. Wetzels,


“Consumer Adoption of Wireless Services: Discovering the rules,
While Playing the Game”, Journal of Interactive

Marketing, 18(2)(2004), 51-61.

[17] Pavlos Vlachos, Adam Vrechopoulos, ICEC'04, Sixth


International Conference on Electronic Commerce. New
York:ACM.2004: 566-574.

Potrebbero piacerti anche