CINXE.COM
Search results for: mobile telecommunications services
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: mobile telecommunications services</title> <meta name="description" content="Search results for: mobile telecommunications services"> <meta name="keywords" content="mobile telecommunications services"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="mobile telecommunications services" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="mobile telecommunications services"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 5409</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: mobile telecommunications services</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5409</span> Investigating the Challenges and Opportunities for M-Government Implementation in Saudi Arabia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anan%20Alssbaiheen">Anan Alssbaiheen</a>, <a href="https://publications.waset.org/abstracts/search?q=Steve%20Love"> Steve Love</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Given the lack of research into potential opportunities and challenges which are likely to be associated with the implementation of mobile services in developing countries including Saudi Arabia, the research reported here investigated the challenges and opportunities which are associated with the implementation of mobile government services in Saudi Arabia. By collecting data through surveys from 103 Saudi citizens and 46 employees working at the Ministry of Communication and Information Technology Saudi Arabia, this study indicates that the high level of mobile penetration in the country offers an opportunity for Saudi Arabian government to offer mobile government services in the country. The results also suggest that though a large percentage of populations do not have access to mobile technologies, there is still a strong desire among users for the provision of mobile government services. Moreover, the results suggest that effective implementation of mobile government services would help to increase the technological development of Saudi Arabia. However, there are certain challenges which may prevent the effective implementation of such services. First, there does not appear to be a sufficient level of understanding among the Saudi Arabian population about the benefits which are associated with mobile government services. Secondly, the results suggest that the implementation of the services needs to be closely tailored and personalised to the individual needs of target users. Finally, the lack of access to mobile technologies would be a challenge to the successful introduction of these services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=challenges" title="challenges">challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=e-government" title=" e-government"> e-government</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20government" title=" mobile government"> mobile government</a>, <a href="https://publications.waset.org/abstracts/search?q=opportunities" title=" opportunities"> opportunities</a> </p> <a href="https://publications.waset.org/abstracts/5973/investigating-the-challenges-and-opportunities-for-m-government-implementation-in-saudi-arabia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5973.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">414</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5408</span> Secure Cryptographic Operations on SIM Card for Mobile Financial Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kerem%20Ok">Kerem Ok</a>, <a href="https://publications.waset.org/abstracts/search?q=Serafettin%20Senturk"> Serafettin Senturk</a>, <a href="https://publications.waset.org/abstracts/search?q=Serdar%20Aktas"> Serdar Aktas</a>, <a href="https://publications.waset.org/abstracts/search?q=Cem%20Cevikbas"> Cem Cevikbas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SIM%20card" title="SIM card">SIM card</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20financial%20services" title=" mobile financial services"> mobile financial services</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20data%20storage" title=" secure data storage"> secure data storage</a> </p> <a href="https://publications.waset.org/abstracts/54843/secure-cryptographic-operations-on-sim-card-for-mobile-financial-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54843.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">312</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5407</span> Survey on Fiber Optic Deployment for Telecommunications Operators in Ghana: Coverage Gap, Recommendations and Research Directions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francis%20Padi">Francis Padi</a>, <a href="https://publications.waset.org/abstracts/search?q=Solomon%20Nunoo"> Solomon Nunoo</a>, <a href="https://publications.waset.org/abstracts/search?q=John%20Kojo%20Annan"> John Kojo Annan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper "Survey on Fiber Optic Deployment for Telecommunications Operators in Ghana: Coverage Gap, Recommendations and Research Directions" presents a comprehensive survey on the deployment of fiber optic networks for telecommunications operators in Ghana. It addresses the challenges encountered by operators using microwave transmission systems for backhauling traffic and emphasizes the advantages of deploying fiber optic networks. The study delves into the coverage gap, provides recommendations, and outlines research directions to enhance the telecommunications infrastructure in Ghana. Additionally, it evaluates next-generation optical access technologies and architectures tailored to operators' needs. The paper also investigates current technological solutions and regulatory, technical, and economical dimensions related to sharing mobile telecommunication networks in emerging countries. Overall, this paper offers valuable insights into fiber optic network deployment for telecommunications operators in Ghana and suggests strategies to meet the increasing demand for data and mobile applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=survey%20on%20fiber%20optic%20deployment" title="survey on fiber optic deployment">survey on fiber optic deployment</a>, <a href="https://publications.waset.org/abstracts/search?q=coverage%20gap" title=" coverage gap"> coverage gap</a>, <a href="https://publications.waset.org/abstracts/search?q=recommendations" title=" recommendations"> recommendations</a>, <a href="https://publications.waset.org/abstracts/search?q=research%20directions" title=" research directions"> research directions</a> </p> <a href="https://publications.waset.org/abstracts/189425/survey-on-fiber-optic-deployment-for-telecommunications-operators-in-ghana-coverage-gap-recommendations-and-research-directions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/189425.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5406</span> 4G LTE Dynamic Pricing: The Drivers, Benefits, and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Rashad%20Harb%20Riad%20Ismail">Ahmed Rashad Harb Riad Ismail</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this research is to study the potential of Dynamic Pricing if deployed by mobile operators and analyse its effects from both operators and consumers side. Furthermore, to conclude, throughout the research study, the recommended conditions for successful Dynamic Pricing deployment, recommended factors identifying the type of markets where Dynamic Pricing can be effective, and proposal for a Dynamic Pricing stakeholders’ framework were presented. Currently, the mobile telecommunications industry is witnessing a dramatic growth rate in the data consumption, being fostered mainly by higher data speed technology as the 4G LTE and by the smart devices penetration rates. However, operators’ revenue from data services lags behind and is decupled from this data consumption growth. Pricing strategy is a key factor affecting this ecosystem. Since the introduction of the 4G LTE technology will increase the pace of data growth in multiples, consequently, if pricing strategies remain constant, then the revenue and usage gap will grow wider, risking the sustainability of the ecosystem. Therefore, this research study is focused on Dynamic Pricing for 4G LTE data services, researching the drivers, benefits and challenges of 4G LTE Dynamic Pricing and the feasibility of its deployment in practice from different perspectives including operators, regulators, consumers, and telecommunications equipment manufacturers point of views. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=LTE" title="LTE">LTE</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20pricing" title=" dynamic pricing"> dynamic pricing</a>, <a href="https://publications.waset.org/abstracts/search?q=EPC" title=" EPC"> EPC</a>, <a href="https://publications.waset.org/abstracts/search?q=research" title=" research"> research</a> </p> <a href="https://publications.waset.org/abstracts/6817/4g-lte-dynamic-pricing-the-drivers-benefits-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6817.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5405</span> Using Focus Group Method to Identify Citizen Requirements to Saudi Mobile Government Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Alotaibi">S. Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Roussinov"> D. Roussinov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile government services implementation faces several challenges in developing countries. This paper studies some of those challenges in the context of Saudi Arabia. The study aims to investigate factors affecting m-government acceptance in Saudi Arabia, including ease of use, usefulness, service quality, trust, intention to use and users’ satisfaction. Our investigation will help in integrating the m-government services in citizens’ everyday life. We collected and analyzed our data from focus groups. These focus groups are from King Saud University and Imam Muhammed Bin Saud University, so the samples size are five and seven participants, respectively. We found that there are some factors to identifying citizen requirements to Saudi mobile government services. These services should be easy to use and not require too much effort. Also, these services must be fully trusted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-government" title="e-government">e-government</a>, <a href="https://publications.waset.org/abstracts/search?q=m-government" title=" m-government"> m-government</a>, <a href="https://publications.waset.org/abstracts/search?q=focus%20group" title=" focus group"> focus group</a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20mobile%20government%20services" title=" Saudi mobile government services"> Saudi mobile government services</a> </p> <a href="https://publications.waset.org/abstracts/59830/using-focus-group-method-to-identify-citizen-requirements-to-saudi-mobile-government-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59830.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">297</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5404</span> A Pathway to Financial Inclusion: Mobile Money and Individual Savings in Uganda</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Musa%20Mayanja%20Lwanga">Musa Mayanja Lwanga</a>, <a href="https://publications.waset.org/abstracts/search?q=Annet%20Adong"> Annet Adong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study provides a micro perspective on the impact of mobile money services on individual’s saving behavior using the 2013 Uganda FinScope data. Results show that although saving through the mobile phone is not a common practice in Uganda, being a registered mobile money user increases the likelihood to save with mobile money. Saving using mobile is more prevalent in urban areas and in Kampala and Central region compared to other regions. This can be explained by: first, rural dwellers tend on average to have lower incomes and thus have lower to saving compared to the urban counterpart. Similarly, residents of Kampala tend to have higher incomes and thus high savings compared to residents of other regions. Secondly, poor infrastructure in rural areas in terms of lack of electricity and poor telecommunication network coverage may limit the use of mobile phones and consequently the use of mobile money as a saving mechanism. Overall, the use of mobile money as a saving mechanism is still very low and this could be partly explained by limitations in the legislation that does not incorporate mobile finance services into mobile money. The absence of interest payments on mobile money savings may act as a disincentive to save through this mechanism. Given the emerging mobile banking services, there is a need to create more awareness and the need for enhanced synergies between telecom companies and commercial banks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=financial%20inclusion" title="financial inclusion">financial inclusion</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20money" title=" mobile money"> mobile money</a>, <a href="https://publications.waset.org/abstracts/search?q=savings" title=" savings"> savings</a>, <a href="https://publications.waset.org/abstracts/search?q=Uganda" title=" Uganda"> Uganda</a> </p> <a href="https://publications.waset.org/abstracts/45630/a-pathway-to-financial-inclusion-mobile-money-and-individual-savings-in-uganda" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45630.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5403</span> Monitoring Cellular Networks Performance Using Crowd Sourced IoT System: My Operator Coverage (MOC)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bassem%20Boshra%20Thabet">Bassem Boshra Thabet</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Ibrahim%20Elsabagh"> Mohammed Ibrahim Elsabagh</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Adly%20Talaat"> Mohammad Adly Talaat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The number of cellular mobile phone users has increased enormously worldwide over the last two decades. Consequently, the monitoring of the performance of the Mobile Network Operators (MNOs) in terms of network coverage and broadband signal strength has become vital for both of the MNOs and regulators. This monitoring helps telecommunications operators and regulators keeping the market playing fair and most beneficial for users. However, the adopted methodologies to facilitate this continuous monitoring process are still problematic regarding cost, effort, and reliability. This paper introduces My Operator Coverage (MOC) system that is using Internet of Things (IoT) concepts and tools to monitor the MNOs performance using a crowd-sourced real-time methodology. MOC produces robust and reliable geographical maps for the user-perceived quality of the MNOs performance. MOC is also meant to enrich the telecommunications regulators with concrete, and up-to-date information that allows for adequate mobile market management strategies as well as appropriate decision making. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20performance%20monitoring" title="mobile performance monitoring">mobile performance monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=crowd-sourced%20applications" title=" crowd-sourced applications"> crowd-sourced applications</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20broadband%20performance" title=" mobile broadband performance"> mobile broadband performance</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20networks%20monitoring" title=" cellular networks monitoring"> cellular networks monitoring</a> </p> <a href="https://publications.waset.org/abstracts/46574/monitoring-cellular-networks-performance-using-crowd-sourced-iot-system-my-operator-coverage-moc" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46574.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5402</span> Effective Governance through Mobile Phones: Cases Supporting the Introduction and Implementation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Mudasir%20Shafi">Mohd Mudasir Shafi</a>, <a href="https://publications.waset.org/abstracts/search?q=Zafrul%20Hasan"> Zafrul Hasan</a>, <a href="https://publications.waset.org/abstracts/search?q=Talat%20Saleem"> Talat Saleem</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information and communication Technology (ICT) services have been defined as a route to good governance. Introduction of ICT into Governance has given rise to the idea of e-governance which helps in enhancing transparency, generating accountability and responsiveness in the system in order to provide faster and quality service to the citizen. Advancement in ICT has provided governments all over the world to speed up the delivery of information and services to citizens and businesses and increase their participation in governance. There has been varying degree of success over the past decade into providing services to the citizens using internet and different web services. These e-government initiatives have been extensively researched. Our research is aimed at the transition from electronic government to mobile government (m-government) initiatives implementing the mobile services and concerned to understand the major factors which will aid to adoption and distribution of these services. There must be some amount of research done in the integration process between e-government and m-government. There must also be enough amount of investigation done all the factors that could affect the transition process. Such factors differ between different places and the advancement in information and technology available there. In this paper, we have discussed why mobile communication system can be used for effective e-governance and the areas where m-governance can be implemented. The paper will examine some of the reasons as well as the main opportunities for improving effective governance through mobile phones. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-governance" title="e-governance">e-governance</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20phones" title=" mobile phones"> mobile phones</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=m-government" title=" m-government"> m-government</a> </p> <a href="https://publications.waset.org/abstracts/6279/effective-governance-through-mobile-phones-cases-supporting-the-introduction-and-implementation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6279.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">443</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5401</span> IACOP - Route Optimization in Wireless Networks Using Improved Ant Colony Optimization Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Vasundra">S. Vasundra</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Venkatesh"> D. Venkatesh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless networks have gone through an extraordinary growth in the past few years, and will keep on playing a crucial role in future data communication. The present wireless networks aim to make communication possible anywhere and anytime. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Since an ad hoc network may consist of a large number of mobile hosts, this imposes a significant challenge on the design of an effective and efficient routing protocol that can work well in an environment with frequent topological changes. This paper proposes improved ant colony optimization (IACO) technique. It also maintains load balancing in wireless networks. The simulation results show that the proposed IACO performs better than existing routing techniques. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20networks" title="wireless networks">wireless networks</a>, <a href="https://publications.waset.org/abstracts/search?q=ant%20colony%20optimization" title=" ant colony optimization"> ant colony optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=load%20balancing" title=" load balancing"> load balancing</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture" title=" architecture"> architecture</a> </p> <a href="https://publications.waset.org/abstracts/43366/iacop-route-optimization-in-wireless-networks-using-improved-ant-colony-optimization-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43366.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">421</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5400</span> Combining Mobile Intelligence with Formation Mechanism for Group Commerce</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lien%20Fa%20Lin">Lien Fa Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Yung%20Ming%20Li"> Yung Ming Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Hsin%20Chen%20Hsieh"> Hsin Chen Hsieh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rise of smartphones brings new concept So-Lo-Mo (social-local-mobile) in mobile commerce area in recent years. However, current So-Lo-Mo services only focus on individual users but not a group of users, and the development of group commerce is not enough to satisfy the demand of real-time group buying and less to think about the social relationship between customers. In this research, we integrate mobile intelligence with group commerce and consider customers' preference, real-time context, and social influence as components in the mechanism. With the support of this mechanism, customers are able to gather near customers with the same potential purchase willingness through mobile devices when he/she wants to purchase products or services to have a real-time group-buying. By matching the demand and supply of mobile group-buying market, this research improves the business value of mobile commerce and group commerce further. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=group%20formation" title="group formation">group formation</a>, <a href="https://publications.waset.org/abstracts/search?q=group%20commerce" title=" group commerce"> group commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20commerce" title=" mobile commerce"> mobile commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=So-Lo-Mo" title=" So-Lo-Mo"> So-Lo-Mo</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20influence" title=" social influence"> social influence</a> </p> <a href="https://publications.waset.org/abstracts/46954/combining-mobile-intelligence-with-formation-mechanism-for-group-commerce" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46954.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">414</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5399</span> Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aabiah%20Nayeem">Aabiah Nayeem</a>, <a href="https://publications.waset.org/abstracts/search?q=Fariha%20Shafiq"> Fariha Shafiq</a>, <a href="https://publications.waset.org/abstracts/search?q=Mustabshra%20Aftab"> Mustabshra Aftab</a>, <a href="https://publications.waset.org/abstracts/search?q=Rabia%20Saman%20Pirzada"> Rabia Saman Pirzada</a>, <a href="https://publications.waset.org/abstracts/search?q=Samia%20Ghazala"> Samia Ghazala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=embedded%20computing" title="embedded computing">embedded computing</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20computing" title=" mobile computing"> mobile computing</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20technologies" title=" wireless technologies"> wireless technologies</a> </p> <a href="https://publications.waset.org/abstracts/82889/comparison-of-security-challenges-and-issues-of-mobile-computing-and-internet-of-things" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">316</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5398</span> MGAUM—Towards a Mobile Government Adoption and Utilization Model: The Case of Saudi Arabia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Alonazi">Mohammed Alonazi</a>, <a href="https://publications.waset.org/abstracts/search?q=Natalia%20Beloff"> Natalia Beloff</a>, <a href="https://publications.waset.org/abstracts/search?q=Martin%20White"> Martin White</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a proposal for a mobile government adoption and utilization model (MGAUM), which is a framework designed to increase the adoption rate of m-government services in Saudi Arabia. Recent advances in mobile technologies such are Mobile compatibilities, The development of wireless communication, mobile applications and devices are enabling governments to deliver services in new ways to citizens more efficiently and economically. In the last decade, many governments around the globe are utilizing these advances effectively to develop their next generation of e-government services. However, a low adoption rate of m-government services by citizens is a common problem in Arabian countries, including Saudi Arabia. Yet, to our knowledge, very little research has been conducted focused on understanding the factors that influence citizen adoption of these m-government services in this part of the world. A set of social, cultural and technological factors have been identified in the literature, which has led to the formulation of associated research questions and hypotheses. These hypotheses will be tested on Saudi citizens using questionnaires and interview methods based around the technology acceptance model. A key objective of the MGAUM framework is to investigate and understand Saudi citizens perception towards adoption and utilization of m-government services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-government" title="e-government">e-government</a>, <a href="https://publications.waset.org/abstracts/search?q=m-government" title=" m-government"> m-government</a>, <a href="https://publications.waset.org/abstracts/search?q=citizen%20services%20quality" title=" citizen services quality"> citizen services quality</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance%20model" title=" technology acceptance model"> technology acceptance model</a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20Arabia" title=" Saudi Arabia"> Saudi Arabia</a>, <a href="https://publications.waset.org/abstracts/search?q=adoption%20framework." title=" adoption framework."> adoption framework.</a> </p> <a href="https://publications.waset.org/abstracts/89939/mgaum-towards-a-mobile-government-adoption-and-utilization-model-the-case-of-saudi-arabia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89939.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">311</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5397</span> Customer Adoption and Attitudes in Mobile Banking in Sri Lanka</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prasansha%20Kumari"> Prasansha Kumari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper intends to identify and analyze customer adoption and attitudes towards mobile banking facilities. The study uses six perceived characteristics of innovation that can be used to form a favorable or unfavorable attitude toward an innovation, namely: Relative advantage, compatibility, complexity, trailability, risk, and observability. Collected data were analyzed using Pearson Chi-Square test. The results showed that mobile bank users were predominantly males. There is a growing trend among young, educated customers towards converting to mobile banking in Sri Lanka. The research outcomes suggested that all the six factors are statistically highly significant in influencing mobile banking adoption and attitude formation towards mobile banking in Sri Lanka. The major reasons for adopting mobile banking services are the accessibility and availability of services regardless of time and place. Over the 75 percent of the respondents mentioned that savings in time and effort and low financial costs of conducting mobile banking were advantageous. Issue of security was found to be the most important factor that motivated consumer adoption and attitude formation towards mobile banking. Main barriers to mobile banking were the lack of technological skills, the traditional cash‐carry banking culture, and the lack of awareness and insufficient guidance to using mobile banking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=compatibility" title="compatibility">compatibility</a>, <a href="https://publications.waset.org/abstracts/search?q=complexity" title=" complexity"> complexity</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20banking" title=" mobile banking"> mobile banking</a>, <a href="https://publications.waset.org/abstracts/search?q=observability" title=" observability"> observability</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a> </p> <a href="https://publications.waset.org/abstracts/40999/customer-adoption-and-attitudes-in-mobile-banking-in-sri-lanka" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40999.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5396</span> Analysis and Performance of Handover in Universal Mobile Telecommunications System (UMTS) Network Using OPNET Modeller</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Latif%20Adnane">Latif Adnane</a>, <a href="https://publications.waset.org/abstracts/search?q=Benaatou%20Wafa"> Benaatou Wafa</a>, <a href="https://publications.waset.org/abstracts/search?q=Pla%20Vicent"> Pla Vicent</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Handover is of great significance to achieve seamless connectivity in wireless networks. This paper gives an impression of the main factors which are being affected by the soft and the hard handovers techniques. To know and understand the handover process in The Universal Mobile Telecommunications System (UMTS) network, different statistics are calculated. This paper focuses on the quality of service (QoS) of soft and hard handover in UMTS network, which includes the analysis of received power, signal to noise radio, throughput, delay traffic, traffic received, delay, total transmit load, end to end delay and upload response time using OPNET simulator. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=handover" title="handover">handover</a>, <a href="https://publications.waset.org/abstracts/search?q=UMTS" title=" UMTS"> UMTS</a>, <a href="https://publications.waset.org/abstracts/search?q=mobility" title=" mobility"> mobility</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=OPNET%20modeler" title=" OPNET modeler"> OPNET modeler</a> </p> <a href="https://publications.waset.org/abstracts/50846/analysis-and-performance-of-handover-in-universal-mobile-telecommunications-system-umts-network-using-opnet-modeller" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50846.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">321</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5395</span> Behavioral Pattern of 2G Mobile Internet Subscribers: A Study on an Operator of Bangladesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Azfar%20Adib">Azfar Adib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Like many other countries of the world, mobile internet has been playing a key role in the growth of internet subscriber base in Bangladesh. This study has attempted to identify particular behavioral or usage patterns of 2G mobile internet subscribers who were using the service of the topmost internet service provider (as well as the top mobile operator) of Bangladesh prior to the launching of 3G services (when 2G was fully dominant). It contains some comprehensive analysis carried on different info regarding 2G mobile internet subscribers, obtained from the operator’s own network insights.This is accompanied by the results of a survey conducted among 40 high-frequency users of this service. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20internet" title="mobile internet">mobile internet</a>, <a href="https://publications.waset.org/abstracts/search?q=Symbian" title=" Symbian"> Symbian</a>, <a href="https://publications.waset.org/abstracts/search?q=Android" title=" Android"> Android</a>, <a href="https://publications.waset.org/abstracts/search?q=iPhone" title=" iPhone"> iPhone</a> </p> <a href="https://publications.waset.org/abstracts/66690/behavioral-pattern-of-2g-mobile-internet-subscribers-a-study-on-an-operator-of-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66690.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">438</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5394</span> Challenges and Opportunities for M-Government Implementation in Saudi Arabia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Alssbaiheen">A. Alssbaiheen</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Love"> S. Love</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=awareness" title="awareness">awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=barriers" title=" barriers"> barriers</a>, <a href="https://publications.waset.org/abstracts/search?q=challenges" title=" challenges"> challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=government%20services" title=" government services"> government services</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20government" title=" mobile government"> mobile government</a>, <a href="https://publications.waset.org/abstracts/search?q=m-government" title=" m-government"> m-government</a>, <a href="https://publications.waset.org/abstracts/search?q=opportunities" title=" opportunities"> opportunities</a> </p> <a href="https://publications.waset.org/abstracts/11569/challenges-and-opportunities-for-m-government-implementation-in-saudi-arabia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11569.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">463</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5393</span> Succeeding through Disruption: Exploring the Factors Influencing the Adoption of Disruptive Technologies in the Mobile Telecommunications Industry in Zimbabwe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Africa%20Makasi">Africa Makasi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The research explored factors influencing the adoption of disruptive technologies in the mobile telecommunications industry in Zimbabwe. Data was gathered from the second biggest competitor in the industry with over 3 million subscribers as the main case of study. The survey was conducted by purposively selecting 70 respondents from a population of 3,000,000 (three million) active subscribers from the company’s database. A skip interval of 42,857 was used to randomly select the sample. Customer representatives were selected from the company’s five regional offices using a two-stage cluster sampling technique. Employee participants were purposively selected from the company’s head office. Self-administered questionnaires were used in the research. A pilot test was conducted and the assessment of the reliability of the research instruments used in the research performed. Results of the pilot study were analyzed to test for reliability using SPSS. The results confirmed that the style of leadership and its thrust may help speed up or reduce the adoption of disruptive technologies. This was reflected by a p–value of 0.01 which is less than 0.05. The null hypothesis was thus rejected and the strong relationship between leadership and adoption of disruptive technology is confirmed. Similar results were also obtained with respect to staff competence, availability of funding and the type of infrastructure available Future research should look at organizational ambidexterity as well as exploitation and exploration paradigms in organizations in the telecommunications industry and their impact on the adoption of disruptive technologies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=disruptive%20innovation" title="disruptive innovation">disruptive innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=adoption" title=" adoption"> adoption</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunication%20industry" title=" mobile telecommunication industry"> mobile telecommunication industry</a>, <a href="https://publications.waset.org/abstracts/search?q=exploration%20and%20exploitation" title=" exploration and exploitation"> exploration and exploitation</a> </p> <a href="https://publications.waset.org/abstracts/13651/succeeding-through-disruption-exploring-the-factors-influencing-the-adoption-of-disruptive-technologies-in-the-mobile-telecommunications-industry-in-zimbabwe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13651.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">369</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5392</span> Mobile Agent Security Using Reference Monitor Based Security Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sandhya%20Armoogum">Sandhya Armoogum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20agents" title=" mobile agents"> mobile agents</a>, <a href="https://publications.waset.org/abstracts/search?q=reference%20monitor" title=" reference monitor"> reference monitor</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a> </p> <a href="https://publications.waset.org/abstracts/31788/mobile-agent-security-using-reference-monitor-based-security-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31788.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5391</span> Secure Mobile E-Business Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hala%20A.%20Alrumaih">Hala A. Alrumaih</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-business" title="e-business">e-business</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title=" mobile applications"> mobile applications</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20mitigations" title=" risk mitigations"> risk mitigations</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20assurance" title=" security assurance"> security assurance</a> </p> <a href="https://publications.waset.org/abstracts/16632/secure-mobile-e-business-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16632.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5390</span> Analysis of Universal Mobile Telecommunications Service (UMTS) Planning Using High Altitude Platform Station (HAPS)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yosika%20Dian%20Komala">Yosika Dian Komala</a>, <a href="https://publications.waset.org/abstracts/search?q=Uke%20Kurniawan%20Usman"> Uke Kurniawan Usman</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuyun%20Siti%20Rohmah"> Yuyun Siti Rohmah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The enable technology fills up needs of high-speed data service is Universal Mobile Telecommunications Service (UMTS). UMTS has a data rate up to 2Mbps.UMTS terrestrial system has a coverage area about 1-2km. High Altitude Platform Station (HAPS) can be built by a macro cell that is able to serve the wider area. Design method of UMTS using HAPS is planning base on coverage and capacity. The planning method is simulated with 2.8.1 Atoll’s software. Determination of radius of the cell based on the coverage uses free space loss propagation model. While the capacity planning to determine the average cell through put is available with the Offered Bit Quantity (OBQ). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=UMTS" title="UMTS">UMTS</a>, <a href="https://publications.waset.org/abstracts/search?q=HAPS" title=" HAPS"> HAPS</a>, <a href="https://publications.waset.org/abstracts/search?q=coverage%20planning" title=" coverage planning"> coverage planning</a>, <a href="https://publications.waset.org/abstracts/search?q=capacity%20planning" title=" capacity planning"> capacity planning</a>, <a href="https://publications.waset.org/abstracts/search?q=signal%20level" title=" signal level"> signal level</a>, <a href="https://publications.waset.org/abstracts/search?q=Ec%2FIo" title=" Ec/Io"> Ec/Io</a>, <a href="https://publications.waset.org/abstracts/search?q=overlapping%20zone" title=" overlapping zone"> overlapping zone</a>, <a href="https://publications.waset.org/abstracts/search?q=throughput" title=" throughput"> throughput</a> </p> <a href="https://publications.waset.org/abstracts/19297/analysis-of-universal-mobile-telecommunications-service-umts-planning-using-high-altitude-platform-station-haps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19297.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">639</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5389</span> Managers’ Mobile Information Behavior in an Openness Paradigm Era</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abd%20Latif%20Abdul%20Rahman">Abd Latif Abdul Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Zuraidah%20Arif"> Zuraidah Arif</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Faizal%20Iylia"> Muhammad Faizal Iylia</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Ghazali"> Mohd Ghazali</a>, <a href="https://publications.waset.org/abstracts/search?q=Asmadi%20Mohammed%20Ghazali"> Asmadi Mohammed Ghazali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile information is a significant access point for human information activities. Theories and models of human information behavior have developed over several decades but have not yet considered the role of the user’s computing device in digital information interactions. This paper reviews the literature that leads to developing a conceptual framework of a study on the managers mobile information behavior. Based on the literature review, dimensions of mobile information behavior are identified, namely, dimension information needs, dimension information access, information retrieval and dimension of information use. The study is significant to understand the nature of librarians’ behavior in searching, retrieving and using information via the mobile device. Secondly, the study would provide suggestions about various kinds of mobile applications which organization can provide for their staff to improve their services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20information%20behavior" title="mobile information behavior">mobile information behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20behavior" title=" information behavior"> information behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20information" title=" mobile information"> mobile information</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a> </p> <a href="https://publications.waset.org/abstracts/45724/managers-mobile-information-behavior-in-an-openness-paradigm-era" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5388</span> SIM (Subscriber Identity Module) Banking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okanta%20Andrew">Okanta Andrew</a>, <a href="https://publications.waset.org/abstracts/search?q=Richmond%20Kweku%20Frempong"> Richmond Kweku Frempong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As mobile networks are upgraded with technologies like WAP, GPRS and UMTS to deliver next-generation multimedia services, so are the banks and other financial institutions also getting ready to unleash the financial products on the mobile platform to meet growing demand for mobile based application services. Hence, the onset of Unstructured Supplementary Services (USSD) Banking which would make banking services available at anywhere, anytime through a string of interactive SMS sessions between a mobile device and an application server of a service provider. The aim of this studies was to find out whether the public will accept the sim banking service when it is implemented. Our target group includes: Working class. E. g. Businessmen/women, office workers, fishermen, market women, teachers etc. Nonworking class. E. g. Students (Tertiary, Senior High School), housewives. etc. The survey was in the form of a questionnaire and a verbal interview (video) which was to investigate their idea about the current banking system and the yet to be introduced sim banking concept. Meanwhile, some challenges accompanied the progression of data gathering because some populace showed reluctance in freeing their information. One other suggestion was that government should put measures against foremost challenges obstructing sim banking in Ghana counter to computers hackers. Government and individual have a key role to undertake to give suitable support to facelift the sim banking industry in the country. It was also suggested that Government put strong regulations on the use of sim banking products and services to streamline all the activities and also create awareness of the need for sim banking and emphasize its relevance in the aspect of national GDP. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=banking" title="banking">banking</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20banking" title=" mobile banking"> mobile banking</a>, <a href="https://publications.waset.org/abstracts/search?q=SIM%20banking" title=" SIM banking"> SIM banking</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20banking%20in%20Ghana" title=" mobile banking in Ghana"> mobile banking in Ghana</a> </p> <a href="https://publications.waset.org/abstracts/30456/sim-subscriber-identity-module-banking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30456.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">484</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5387</span> Towards Reliable Mobile Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khaled%20Darwish">Khaled Darwish</a>, <a href="https://publications.waset.org/abstracts/search?q=Islam%20El%20Madahh"> Islam El Madahh</a>, <a href="https://publications.waset.org/abstracts/search?q=Hoda%20Mohamed"> Hoda Mohamed</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadia%20El%20Hennawy"> Hadia El Hennawy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing has been one of the fastest growing parts in IT industry mainly in the context of the future of the web where computing, communication, and storage services are main services provided for Internet users. Mobile Cloud Computing (MCC) is gaining stream which can be used to extend cloud computing functions, services and results to the world of future mobile applications and enables delivery of a large variety of cloud application to billions of smartphones and wearable devices. This paper describes reliability for MCC by determining the ability of a system or component to function correctly under stated conditions for a specified period of time to be able to deal with the estimation and management of high levels of lifetime engineering uncertainty and risks of failure. The assessment procedures consists of determine Mean Time between Failures (MTBF), Mean Time to Failure (MTTF), and availability percentages for main components in both cloud computing and MCC structures applied on single node OpenStack installation to analyze its performance with different settings governing the behavior of participants. Additionally, we presented several factors have a significant impact on rates of change overall cloud system reliability should be taken into account in order to deliver highly available cloud computing services for mobile consumers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20cloud%20computing" title=" mobile cloud computing"> mobile cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=availability" title=" availability"> availability</a>, <a href="https://publications.waset.org/abstracts/search?q=OpenStack" title=" OpenStack"> OpenStack</a> </p> <a href="https://publications.waset.org/abstracts/37013/towards-reliable-mobile-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">397</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5386</span> Key Concepts of 5th Generation Mobile Technology </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Magri%20Hicham">Magri Hicham</a>, <a href="https://publications.waset.org/abstracts/search?q=Noreddine%20Abghour"> Noreddine Abghour</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Ouzzif"> Mohamed Ouzzif</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The 5th generation of mobile networks is term used in various research papers and projects to identify the next major phase of mobile telecommunications standards. 5G wireless networks will support higher peak data rate, lower latency and provide best connections with QoS guarenty. In this article, we discuss various promising technologies for 5G wireless communication systems, such as IPv6 support, World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN), BEAM DIVISION MULTIPLE ACCESS (BDMA), Cloud Computing and cognitive radio technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=WWWW" title="WWWW">WWWW</a>, <a href="https://publications.waset.org/abstracts/search?q=BDMA" title=" BDMA"> BDMA</a>, <a href="https://publications.waset.org/abstracts/search?q=DAWN" title=" DAWN"> DAWN</a>, <a href="https://publications.waset.org/abstracts/search?q=5G" title=" 5G"> 5G</a>, <a href="https://publications.waset.org/abstracts/search?q=4G" title=" 4G"> 4G</a>, <a href="https://publications.waset.org/abstracts/search?q=IPv6" title=" IPv6"> IPv6</a>, <a href="https://publications.waset.org/abstracts/search?q=Cloud%20Computing" title=" Cloud Computing "> Cloud Computing </a> </p> <a href="https://publications.waset.org/abstracts/27718/key-concepts-of-5th-generation-mobile-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27718.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">514</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5385</span> Determinants of Mobile Payment Adoption among Retailers in Ghana</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ibrahim%20Masud">Ibrahim Masud</a>, <a href="https://publications.waset.org/abstracts/search?q=Yusheng%20Kong"> Yusheng Kong</a>, <a href="https://publications.waset.org/abstracts/search?q=Adam%20Diyawu%20Rahman"> Adam Diyawu Rahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile payment variously referred to as mobile money, mobile money transfer, and mobile wallet refers to payment services operated under financial regulation and performed from or via a mobile device. Mobile payment systems have come to augment and to some extent try to replace the conventional payment methods like cash, cheque, or credit cards. This study examines mobile payment adoption factors among retailers in Ghana. A conceptual framework was adopted from the extant literature using the Technology Acceptance Model and the Theory of Reasoned action as the theoretical bases. Data for the study was obtained from a sample of 240 respondents through a structured questionnaire. The PLS-SEM was used to analyze the data through SPSS v.22 and SmartPLS v.3. The findings indicate that factors such as perceived usefulness, perceived ease of use, perceived security, competitive pressure and facilitating conditions are the main determinants of mobile payment adoption among retailers in Ghana. The study contributes to the literature on mobile payment adoption from developing country context. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20payment" title="mobile payment">mobile payment</a>, <a href="https://publications.waset.org/abstracts/search?q=retailers" title=" retailers"> retailers</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20equation%20modeling" title=" structural equation modeling"> structural equation modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance%20model" title=" technology acceptance model"> technology acceptance model</a> </p> <a href="https://publications.waset.org/abstracts/108564/determinants-of-mobile-payment-adoption-among-retailers-in-ghana" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108564.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">178</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5384</span> Research on Load Balancing Technology for Web Service Mobile Host</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yao%20Lu">Yao Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiuguo%20Zhang"> Xiuguo Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhiying%20Cao"> Zhiying Cao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, Load Balancing idea is used in the Web service mobile host. The main idea of Load Balancing is to establish a one-to-many mapping mechanism: An entrance-mapping request to plurality of processing node in order to realize the dividing and assignment processing. Because the mobile host is a resource constrained environment, there are some Web services which cannot be completed on the mobile host. When the mobile host resource is not enough to complete the request, Load Balancing scheduler will divide the request into a plurality of sub-requests and transfer them to different auxiliary mobile hosts. Auxiliary mobile host executes sub-requests, and then, the results will be returned to the mobile host. Service request integrator receives results of sub-requests from the auxiliary mobile host, and integrates the sub-requests. In the end, the complete request is returned to the client. Experimental results show that this technology adopted in this paper can complete requests and have a higher efficiency. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dinic" title="Dinic">Dinic</a>, <a href="https://publications.waset.org/abstracts/search?q=load%20balancing" title=" load balancing"> load balancing</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20host" title=" mobile host"> mobile host</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20service" title=" web service"> web service</a> </p> <a href="https://publications.waset.org/abstracts/63208/research-on-load-balancing-technology-for-web-service-mobile-host" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63208.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5383</span> Surprise Fraudsters Before They Surprise You: A South African Telecommunications Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anson%C3%A9%20Human">Ansoné Human</a>, <a href="https://publications.waset.org/abstracts/search?q=Nantes%20Kirsten"> Nantes Kirsten</a>, <a href="https://publications.waset.org/abstracts/search?q=Tanja%20Verster"> Tanja Verster</a>, <a href="https://publications.waset.org/abstracts/search?q=Willem%20D.%20Schutte"> Willem D. Schutte</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Every year the telecommunications industry suffers huge losses due to fraud. Mobile fraud, or generally, telecommunications fraud is the utilisation of telecommunication products or services to acquire money illegally from or failing to pay a telecommunication company. A South African telecommunication operator developed two internal fraud scorecards to mitigate future risks of application fraud events. The scorecards aim to predict the likelihood of an application being fraudulent and surprise fraudsters before they surprise the telecommunication operator by identifying fraud at the time of application. The scorecards are utilised in the vetting process to evaluate the applicant in terms of the fraud risk the applicant would present to the telecommunication operator. Telecommunication providers can utilise these scorecards to profile customers, as well as isolate fraudulent and/or high-risk applicants. We provide the complete methodology utilised in the development of the scorecards. Furthermore, a Determination and Discrimination (DD) ratio is provided in the methodology to select the most influential variables from a group of related variables. Throughout the development of these scorecards, the following was revealed regarding fraudulent cases and fraudster behaviour within the telecommunications industry: Fraudsters typically target high-value handsets. Furthermore, debit order dates scheduled for the end of the month have the highest fraud probability. The fraudsters target specific stores. Applicants who acquire an expensive package and receive a medium-income, as well as applicants who obtain an expensive package and receive a high income, have higher fraud percentages. If one month prior to application, the status of an account is already in arrears (two months or more), the applicant has a high probability of fraud. The applicants with the highest average spend on calls have a higher probability of fraud. If the amount collected changes from month to month, the likelihood of fraud is higher. Lastly, young and middle-aged applicants have an increased probability of being targeted by fraudsters than other ages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=application%20fraud%20scorecard" title="application fraud scorecard">application fraud scorecard</a>, <a href="https://publications.waset.org/abstracts/search?q=predictive%20modeling" title=" predictive modeling"> predictive modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=regression" title=" regression"> regression</a>, <a href="https://publications.waset.org/abstracts/search?q=telecommunications" title=" telecommunications"> telecommunications</a> </p> <a href="https://publications.waset.org/abstracts/148124/surprise-fraudsters-before-they-surprise-you-a-south-african-telecommunications-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148124.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">120</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5382</span> Using Lean-Six Sigma Philosophy to Enhance Revenues and Improve Customer Satisfaction: Case Studies from Leading Telecommunications Service Providers in India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Senthil%20Kumar%20Anantharaman">Senthil Kumar Anantharaman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Providing telecommunications based network services in developing countries like India which has a population of 1.5 billion people, so that these services reach every individual, is one of the greatest challenges the country has been facing in its journey towards economic growth and development. With growing number of telecommunications service providers in the country, a constant challenge that has been faced by these providers is in providing not only quality but also delightful customer experience while simultaneously generating enhanced revenues and profits. Thus, the role played by process improvement methodologies like Six Sigma cannot be undermined and specifically in telecom service provider based operations, it has provided substantial benefits. Therefore, it advantages are quite comparable to its applications and advantages in other sectors like manufacturing, financial services, information technology-based services and Healthcare services. One of the key reasons that this methodology has been able to reap great benefits in telecommunications sector is that this methodology has been combined with many of its competing process improvement techniques like Theory of Constraints, Lean and Kaizen to give the maximum benefit to the service providers thereby creating a winning combination of organized process improvement methods for operational excellence thereby leading to business excellence. This paper discusses about some of the key projects and areas in the end to end ‘Quote to Cash’ process at big three Indian telecommunication companies that have been highly assisted by applying Six Sigma along with other process improvement techniques. While the telecommunication companies which we have considered, is primarily in India and run by both private operators and government based setups, the methodology can be applied equally well in any other part of developing countries around the world having similar context. This study also compares the enhanced revenues that can arise out of appropriate opportunities in emerging market scenarios, that Six Sigma as a philosophy and methodology can provide if applied with vigour and robustness. Finally, the paper also comes out with a winning framework in combining Six Sigma methodology with Kaizen, Lean and Theory of Constraints that will enhance both the top-line as well as the bottom-line while providing the customers a delightful experience. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emerging%20markets" title="emerging markets">emerging markets</a>, <a href="https://publications.waset.org/abstracts/search?q=lean" title=" lean"> lean</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20improvement" title=" process improvement"> process improvement</a>, <a href="https://publications.waset.org/abstracts/search?q=six%20sigma" title=" six sigma"> six sigma</a>, <a href="https://publications.waset.org/abstracts/search?q=telecommunications" title=" telecommunications"> telecommunications</a>, <a href="https://publications.waset.org/abstracts/search?q=theory%20of%20constraints" title=" theory of constraints"> theory of constraints</a> </p> <a href="https://publications.waset.org/abstracts/82355/using-lean-six-sigma-philosophy-to-enhance-revenues-and-improve-customer-satisfaction-case-studies-from-leading-telecommunications-service-providers-in-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82355.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">164</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5381</span> A Novel Approach to Design and Implement Context Aware Mobile Phone</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20S.%20Thyagaraju">G. S. Thyagaraju</a>, <a href="https://publications.waset.org/abstracts/search?q=U.%20P.%20Kulkarni"> U. P. Kulkarni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Context-aware computing refers to a general class of computing systems that can sense their physical environment, and adapt their behaviour accordingly. Context aware computing makes systems aware of situations of interest, enhances services to users, automates systems and personalizes applications. Context-aware services have been introduced into mobile devices, such as PDA and mobile phones. In this paper we are presenting a novel approaches used to realize the context aware mobile. The context aware mobile phone (CAMP) proposed in this paper senses the users situation automatically and provides user context required services. The proposed system is developed by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rough sets theory based decision table. Bayesian Network to classify the incoming call (high priority call, low priority call and unknown calls), fuzzy linguistic variables and membership degrees to define the context situations, the decision table based rules for service recommendation. To exemplify and demonstrate the effectiveness of the proposed methods, the context aware mobile phone is tested for college campus scenario including different locations like library, class room, meeting room, administrative building and college canteen. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=context%20aware%20mobile" title="context aware mobile">context aware mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20logic" title=" fuzzy logic"> fuzzy logic</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20table" title=" decision table"> decision table</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20probability" title=" Bayesian probability"> Bayesian probability</a> </p> <a href="https://publications.waset.org/abstracts/3671/a-novel-approach-to-design-and-implement-context-aware-mobile-phone" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3671.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">365</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5380</span> An Empirical Investigation of Mobile Banking Services Adoption in Pakistan </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aijaz%20A.%20Shaikh">Aijaz A. Shaikh</a>, <a href="https://publications.waset.org/abstracts/search?q=Richard%20Glavee-Geo"> Richard Glavee-Geo</a>, <a href="https://publications.waset.org/abstracts/search?q=Heikki%20Karjaluoto"> Heikki Karjaluoto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Adoption of Information Systems (IS) is receiving increasing attention such that its implications have been closely monitored and studied by the IS management community, industry and professional gatekeepers. Building on previous research regarding the adoption of technology, this paper develops and validates an integrated model of the adoption of mobile banking. The model originates from the Technology Acceptance Model (TAM) and the Theory of Planned Behaviour (TPB). This paper intends to offer a preliminary scrutiny of the antecedents of the adoption of mobile banking services in the context of a developing country. Data was collected from Pakistan. The findings showed that an integrated TAM and TPB model greatly explains the adoption intention of mobile banking; and perceived behavioural control and its antecedents play a significant role in predicting adoption Theoretical and managerial implications of findings are presented and discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=developing%20country" title="developing country">developing country</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20banking%20service%20adoption" title=" mobile banking service adoption"> mobile banking service adoption</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance%20model" title=" technology acceptance model"> technology acceptance model</a>, <a href="https://publications.waset.org/abstracts/search?q=theory%20of%20planned%20behavior" title=" theory of planned behavior"> theory of planned behavior</a> </p> <a href="https://publications.waset.org/abstracts/32655/an-empirical-investigation-of-mobile-banking-services-adoption-in-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">418</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=180">180</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=181">181</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20telecommunications%20services&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>