CINXE.COM

Search results for: mobile web-based

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: mobile web-based</title> <meta name="description" content="Search results for: mobile web-based"> <meta name="keywords" content="mobile web-based"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="mobile web-based" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="mobile web-based"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1657</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: mobile web-based</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1657</span> Toward a Re-Definition of Mobile Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mirna%20Diab">Mirna Diab</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile learning, or M-learning, drives the development of new teaching, learning, and assessment strategies in schools and colleges. With initiatives across states, districts, and institutions, the United States leads mobile learning, significantly impacting education. Since 2010, over 2,3 million American pupils have received their education via mobile devices, demonstrating its rapid expansion. Nonetheless, mobile learning lacks a consistent and explicit definition that helps educators, students, and stakeholders grasp its essence and implement it effectively. This article addresses the need for a revised definition by introducing readers to various mobile learning concepts and understandings. It seeks to raise awareness, clarify, and encourage making well-informed decisions regarding its incorporation as a potent learning tool. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title="mobile learning">mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20pedagogy" title=" mobile pedagogy"> mobile pedagogy</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20technological%20devices" title=" mobile technological devices"> mobile technological devices</a>, <a href="https://publications.waset.org/abstracts/search?q=learner%20mobility" title=" learner mobility"> learner mobility</a> </p> <a href="https://publications.waset.org/abstracts/169586/toward-a-re-definition-of-mobile-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169586.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1656</span> The Effect of Mobile Technology Use in Education: A Meta-Analysis Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=%C5%9Eirin%20K%C3%BC%C3%A7%C3%BCk">Şirin Küçük</a>, <a href="https://publications.waset.org/abstracts/search?q=Ay%C5%9Fe%20K%C3%B6k"> Ayşe Kök</a>, <a href="https://publications.waset.org/abstracts/search?q=%C4%B0smail%20%C5%9Eahin"> İsmail Şahin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile devices are very popular and useful tools for assisting people in daily life. With the advancement of mobile technologies, the issue of mobile learning has been widely investigated in education. Many researches consider that it is important to integrate pedagogical and technical strengths of mobile technology into learning environments. For this reason, the purpose of this research is to examine the effect of mobile technology use in education with meta-analysis method. Meta-analysis is a statistical technique which combines the findings of independent studies in a specific subject. In this respect, the articles will be examined by searching the databases for researches which are conducted between 2005 and 2014. It is expected that the results of this research will contribute to future research related to mobile technology use in education. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title="mobile learning">mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=meta-analysis" title=" meta-analysis"> meta-analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20technology" title=" mobile technology"> mobile technology</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a> </p> <a href="https://publications.waset.org/abstracts/20062/the-effect-of-mobile-technology-use-in-education-a-meta-analysis-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20062.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">720</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1655</span> Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stephen%20Wheat">Stephen Wheat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20app%20management" title="mobile app management">mobile app management</a>, <a href="https://publications.waset.org/abstracts/search?q=governance" title=" governance"> governance</a>, <a href="https://publications.waset.org/abstracts/search?q=distribution" title=" distribution"> distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a> </p> <a href="https://publications.waset.org/abstracts/61884/accelerating-mobile-innovation-adoption-and-translational-science-within-a-large-research-enterprise-and-healthcare-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61884.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1654</span> Mobile Agent Security Using Reference Monitor Based Security Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sandhya%20Armoogum">Sandhya Armoogum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20agents" title=" mobile agents"> mobile agents</a>, <a href="https://publications.waset.org/abstracts/search?q=reference%20monitor" title=" reference monitor"> reference monitor</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a> </p> <a href="https://publications.waset.org/abstracts/31788/mobile-agent-security-using-reference-monitor-based-security-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31788.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1653</span> A Proposal to Mobile Payment Implementing 2AF+</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nael%20Hirzallah">Nael Hirzallah</a>, <a href="https://publications.waset.org/abstracts/search?q=Sana%20Nseir"> Sana Nseir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Merchants are competing to offer the use of mobile payment to encourage shopping. many mobile payment systems were made available in various locations worldwide; however, they have various drawbacks. This paper proposes a new mobile payment system that discusses the main drawbacks of these systems, namely security and speed of transaction. The proposal is featured by being simple to use by customers and merchants. Furthermore, the proposed system depends on a new authentication factor that is introduced in this paper and called by Two-Factors Authentication Plus, (2FA+). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20commerce" title="electronic commerce">electronic commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=payment%20schemes" title=" payment schemes"> payment schemes</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20payment" title=" mobile payment"> mobile payment</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication%20factors" title=" authentication factors"> authentication factors</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title=" mobile applications"> mobile applications</a> </p> <a href="https://publications.waset.org/abstracts/1572/a-proposal-to-mobile-payment-implementing-2af" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1572.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">286</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1652</span> Mobile Payment over NFC: The M-Check System Case</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Karima%20Maazouz">Karima Maazouz</a>, <a href="https://publications.waset.org/abstracts/search?q=Habib%20Benlahmer"> Habib Benlahmer</a>, <a href="https://publications.waset.org/abstracts/search?q=Naceur%20Achtaich"> Naceur Achtaich</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The realization of mobile payments will make possible new and unforeseen ways of convenience and m-commerce. Mobile payment today benefit from technology and trends. NFC technology is creating a new era of contactless mobile payment. the “M-check” is a mobile payment system provides a new way facilitating transaction with high valued payment and enable new m-commerce. The objective of the paper is to propose a new solution for m-payment. The proposed combination of m-check system and NFC offers acceptable security for payment mobile, client’s satisfaction, and simplifies the process payment between clients and merchants. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=M-payment" title="M-payment">M-payment</a>, <a href="https://publications.waset.org/abstracts/search?q=NFC" title=" NFC"> NFC</a>, <a href="https://publications.waset.org/abstracts/search?q=M-check" title=" M-check"> M-check</a>, <a href="https://publications.waset.org/abstracts/search?q=M-commerce" title=" M-commerce"> M-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/20466/mobile-payment-over-nfc-the-m-check-system-case" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20466.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">596</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1651</span> Secure Mobile E-Business Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hala%20A.%20Alrumaih">Hala A. Alrumaih</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-business" title="e-business">e-business</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title=" mobile applications"> mobile applications</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20mitigations" title=" risk mitigations"> risk mitigations</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20assurance" title=" security assurance"> security assurance</a> </p> <a href="https://publications.waset.org/abstracts/16632/secure-mobile-e-business-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16632.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1650</span> Behavioral Pattern of 2G Mobile Internet Subscribers: A Study on an Operator of Bangladesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Azfar%20Adib">Azfar Adib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Like many other countries of the world, mobile internet has been playing a key role in the growth of internet subscriber base in Bangladesh. This study has attempted to identify particular behavioral or usage patterns of 2G mobile internet subscribers who were using the service of the topmost internet service provider (as well as the top mobile operator) of Bangladesh prior to the launching of 3G services (when 2G was fully dominant). It contains some comprehensive analysis carried on different info regarding 2G mobile internet subscribers, obtained from the operator’s own network insights.This is accompanied by the results of a survey conducted among 40 high-frequency users of this service. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20internet" title="mobile internet">mobile internet</a>, <a href="https://publications.waset.org/abstracts/search?q=Symbian" title=" Symbian"> Symbian</a>, <a href="https://publications.waset.org/abstracts/search?q=Android" title=" Android"> Android</a>, <a href="https://publications.waset.org/abstracts/search?q=iPhone" title=" iPhone"> iPhone</a> </p> <a href="https://publications.waset.org/abstracts/66690/behavioral-pattern-of-2g-mobile-internet-subscribers-a-study-on-an-operator-of-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66690.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">438</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1649</span> Managers’ Mobile Information Behavior in an Openness Paradigm Era</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abd%20Latif%20Abdul%20Rahman">Abd Latif Abdul Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Zuraidah%20Arif"> Zuraidah Arif</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Faizal%20Iylia"> Muhammad Faizal Iylia</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Ghazali"> Mohd Ghazali</a>, <a href="https://publications.waset.org/abstracts/search?q=Asmadi%20Mohammed%20Ghazali"> Asmadi Mohammed Ghazali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile information is a significant access point for human information activities. Theories and models of human information behavior have developed over several decades but have not yet considered the role of the user’s computing device in digital information interactions. This paper reviews the literature that leads to developing a conceptual framework of a study on the managers mobile information behavior. Based on the literature review, dimensions of mobile information behavior are identified, namely, dimension information needs, dimension information access, information retrieval and dimension of information use. The study is significant to understand the nature of librarians’ behavior in searching, retrieving and using information via the mobile device. Secondly, the study would provide suggestions about various kinds of mobile applications which organization can provide for their staff to improve their services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20information%20behavior" title="mobile information behavior">mobile information behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20behavior" title=" information behavior"> information behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20information" title=" mobile information"> mobile information</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a> </p> <a href="https://publications.waset.org/abstracts/45724/managers-mobile-information-behavior-in-an-openness-paradigm-era" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1648</span> Instruction and Learning Design Consideration for the Development of Mobile Learning Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Sarrab">M. Sarrab</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Elbasir"> M. Elbasir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Most of mobile learning applications currently available are developed for the formal education and learning environment. Those applications are characterized by the improvement of the interaction process between instructors and learners to provide more collaboration and flexibility in the learning process. Despite the long history and large amount of research on Instruction design model and mobile learning there is no complete and well defined set of steps to follow in designing mobile learning applications. Based on this scenario, this paper focuses on identifying instruction design phases considerations and influencing factors in developing mobile learning application. This set of instruction design steps includes analysis, design, development, implementation, evaluation and continuous has been built from a literature study with focus on standards for learning and mobile application software quality and guidelines. The effort is part of an Omani-funded research project investigating the development, adoption and dissemination of mobile learning in Oman. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=instruction%20design" title="instruction design">instruction design</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title=" mobile learning"> mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20application" title=" mobile application"> mobile application</a> </p> <a href="https://publications.waset.org/abstracts/24386/instruction-and-learning-design-consideration-for-the-development-of-mobile-learning-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24386.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">603</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1647</span> Mobile Application Testing Matrix and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bakhtiar%20Amen">Bakhtiar Amen</a>, <a href="https://publications.waset.org/abstracts/search?q=Sardasht%20Mahmood"> Sardasht Mahmood</a>, <a href="https://publications.waset.org/abstracts/search?q=Joan%20Lu"> Joan Lu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The adoption of smartphones and the usages of mobile applications are increasing rapidly. Consequently, within limited time-range, mobile Internet usages have managed to take over the desktop usages particularly since the first smartphone-touched application released by iPhone in 2007. This paper is proposed to provide solution and answer the most demandable questions related to mobile application automated and manual testing limitations. Moreover, Mobile application testing requires agility and physically testing. Agile testing is to detect bugs through automated tools, whereas the compatibility testing is more to ensure that the apps operates on mobile OS (Operation Systems) as well as on the different real devices. Moreover, we have managed to answer automated or manual questions through two mobile application case studies MES (Mobile Exam System) and MLM (Mobile Lab Mate) by creating test scripts for both case studies and our experiment results have been discussed and evaluated on whether to adopt test on real devices or on emulators? In addition to this, we have introduced new mobile application testing matrix for the testers and some enterprises to obtain knowledge from. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20app%20testing" title="mobile app testing">mobile app testing</a>, <a href="https://publications.waset.org/abstracts/search?q=testing%20matrix" title=" testing matrix"> testing matrix</a>, <a href="https://publications.waset.org/abstracts/search?q=automated" title=" automated"> automated</a>, <a href="https://publications.waset.org/abstracts/search?q=manual%20testing" title=" manual testing "> manual testing </a> </p> <a href="https://publications.waset.org/abstracts/23955/mobile-application-testing-matrix-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23955.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">478</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1646</span> Mobile Cloud Middleware: A New Service for Mobile Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Akherfi">K. Akherfi</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Harroud"> H. Harroud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud Computing (CC) and Mobile Cloud Computing (MCC) have advanced rapidly the last few years. Today, MCC undergoes fast improvement and progress in terms of hardware (memory, embedded sensors, power consumption, touch screen, etc.) software (more and more sophisticated mobile applications) and transmission (higher data transmission rates achieved with different technologies such as 3Gs). This paper presents a review on the concept of CC and MCC. Then, it discusses what has been done regarding middleware in CC and MCC. Later, it shows the architecture of our proposed middleware along with its functionalities which will be provided to mobile clients in order to overcome the well-known problems (such as low battery power, slow CPU speed and, little memory etc.). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=context-aware" title="context-aware">context-aware</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=middleware" title=" middleware"> middleware</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20cloud%20computing" title=" mobile cloud computing"> mobile cloud computing</a> </p> <a href="https://publications.waset.org/abstracts/5233/mobile-cloud-middleware-a-new-service-for-mobile-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5233.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">448</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1645</span> Determinants of Mobile Payment Adoption among Retailers in Ghana</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ibrahim%20Masud">Ibrahim Masud</a>, <a href="https://publications.waset.org/abstracts/search?q=Yusheng%20Kong"> Yusheng Kong</a>, <a href="https://publications.waset.org/abstracts/search?q=Adam%20Diyawu%20Rahman"> Adam Diyawu Rahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile payment variously referred to as mobile money, mobile money transfer, and mobile wallet refers to payment services operated under financial regulation and performed from or via a mobile device. Mobile payment systems have come to augment and to some extent try to replace the conventional payment methods like cash, cheque, or credit cards. This study examines mobile payment adoption factors among retailers in Ghana. A conceptual framework was adopted from the extant literature using the Technology Acceptance Model and the Theory of Reasoned action as the theoretical bases. Data for the study was obtained from a sample of 240 respondents through a structured questionnaire. The PLS-SEM was used to analyze the data through SPSS v.22 and SmartPLS v.3. The findings indicate that factors such as perceived usefulness, perceived ease of use, perceived security, competitive pressure and facilitating conditions are the main determinants of mobile payment adoption among retailers in Ghana. The study contributes to the literature on mobile payment adoption from developing country context. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20payment" title="mobile payment">mobile payment</a>, <a href="https://publications.waset.org/abstracts/search?q=retailers" title=" retailers"> retailers</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20equation%20modeling" title=" structural equation modeling"> structural equation modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance%20model" title=" technology acceptance model"> technology acceptance model</a> </p> <a href="https://publications.waset.org/abstracts/108564/determinants-of-mobile-payment-adoption-among-retailers-in-ghana" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108564.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">178</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1644</span> Sharing Experience in Authentic Learning for Mobile Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kai%20Qian">Kai Qian</a>, <a href="https://publications.waset.org/abstracts/search?q=Lixin%20Tao"> Lixin Tao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20computing" title="mobile computing">mobile computing</a>, <a href="https://publications.waset.org/abstracts/search?q=Android" title=" Android"> Android</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=labware" title=" labware"> labware</a> </p> <a href="https://publications.waset.org/abstracts/7212/sharing-experience-in-authentic-learning-for-mobile-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7212.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">406</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1643</span> Research on Load Balancing Technology for Web Service Mobile Host</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yao%20Lu">Yao Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiuguo%20Zhang"> Xiuguo Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhiying%20Cao"> Zhiying Cao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, Load Balancing idea is used in the Web service mobile host. The main idea of Load Balancing is to establish a one-to-many mapping mechanism: An entrance-mapping request to plurality of processing node in order to realize the dividing and assignment processing. Because the mobile host is a resource constrained environment, there are some Web services which cannot be completed on the mobile host. When the mobile host resource is not enough to complete the request, Load Balancing scheduler will divide the request into a plurality of sub-requests and transfer them to different auxiliary mobile hosts. Auxiliary mobile host executes sub-requests, and then, the results will be returned to the mobile host. Service request integrator receives results of sub-requests from the auxiliary mobile host, and integrates the sub-requests. In the end, the complete request is returned to the client. Experimental results show that this technology adopted in this paper can complete requests and have a higher efficiency. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dinic" title="Dinic">Dinic</a>, <a href="https://publications.waset.org/abstracts/search?q=load%20balancing" title=" load balancing"> load balancing</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20host" title=" mobile host"> mobile host</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20service" title=" web service"> web service</a> </p> <a href="https://publications.waset.org/abstracts/63208/research-on-load-balancing-technology-for-web-service-mobile-host" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63208.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1642</span> Using Mobile Phones for M-Learning in Higher Education: A Comparative Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islam%20Elsayed%20Hussein%20Ali">Islam Elsayed Hussein Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Stefan%20M.%20Wagner"> Stefan M. Wagner</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Smartphone and tablet computers, as well as other ultra portable devices, have already gained enough critical mass to be considered mainstream devices, being present in the daily lives of millions of higher education students. Many universities throughout the world have already adopted or are planning to adopt mobile technologies in many of their courses as a better way to connect students with the subjects they are studying. These new mobile platforms allow students to access content anywhere/anytime to immerse himself/herself into that content (alone or interacting with teachers or colleagues via web communication forms) and to interact with that content in ways that were not previously possible. This paper plans to provide a thorough overview of the possibilities and consequences of m-learning in higher education environments as a gateway to ubiquitous learning – perhaps the ultimate form of learner engagement, since it allows the student to learn, access and interact with important content in any way or at any time or place he might want so the objective of the study is to examine how the usage of mobile phones for m-learning differs between heavy and light mobile phone users at TU Braunschweig. Heavy mobile phone users are hypothesized to have access to/subscribe to one type of mobile content than light mobile phone users, to have less frequent access to, subscribe to or purchase mobile content within the last year than light mobile phone users, and to pay less money for mobile learning, its content and mobile games than light mobile phone users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title="mobile learning">mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=technologies" title=" technologies"> technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=applications" title=" applications"> applications</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title=" higher education"> higher education</a> </p> <a href="https://publications.waset.org/abstracts/36822/using-mobile-phones-for-m-learning-in-higher-education-a-comparative-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36822.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">415</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1641</span> Mobile Phones and Language Learning: A Qualitative Meta-Analysis of Studies Published between 2008 and 2012 in the Proceedings of the International Conference on Mobile Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lucia%20Silveira%20Alda">Lucia Silveira Alda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research aims to analyze critically a set of studies published in the Proceedings of the International Conference on Mobile Learning of IADIS, from 2008 until 2012, which addresses the issue of foreign language learning mediated by mobile phones. The theoretical review of this study is based on the Vygotskian assumptions about tools and mediated learning and the concepts of mobile learning, CALL and MALL. In addition, the diffusion rates of the mobile phone and especially its potential are considered. Through systematic review and meta-analysis, this research intended to identify similarities and differences between the identified characteristics in the studies on the subject of language learning and mobile phone. From the analysis of the results, this study verifies that the mobile phone stands out for its mobility and portability. Furthermore, this device presented positive aspects towards student motivation in language learning. The studies were favorable to mobile phone use for learning. It was also found that the challenges in using this tool are not technical, but didactic and methodological, including the need to reflect on practical proposals. The findings of this study may direct further research in the area of language learning mediated by mobile phones. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=language%20learning" title="language learning">language learning</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title=" mobile learning"> mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20phones" title=" mobile phones"> mobile phones</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/52586/mobile-phones-and-language-learning-a-qualitative-meta-analysis-of-studies-published-between-2008-and-2012-in-the-proceedings-of-the-international-conference-on-mobile-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52586.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1640</span> A Pathway to Financial Inclusion: Mobile Money and Individual Savings in Uganda</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Musa%20Mayanja%20Lwanga">Musa Mayanja Lwanga</a>, <a href="https://publications.waset.org/abstracts/search?q=Annet%20Adong"> Annet Adong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study provides a micro perspective on the impact of mobile money services on individual’s saving behavior using the 2013 Uganda FinScope data. Results show that although saving through the mobile phone is not a common practice in Uganda, being a registered mobile money user increases the likelihood to save with mobile money. Saving using mobile is more prevalent in urban areas and in Kampala and Central region compared to other regions. This can be explained by: first, rural dwellers tend on average to have lower incomes and thus have lower to saving compared to the urban counterpart. Similarly, residents of Kampala tend to have higher incomes and thus high savings compared to residents of other regions. Secondly, poor infrastructure in rural areas in terms of lack of electricity and poor telecommunication network coverage may limit the use of mobile phones and consequently the use of mobile money as a saving mechanism. Overall, the use of mobile money as a saving mechanism is still very low and this could be partly explained by limitations in the legislation that does not incorporate mobile finance services into mobile money. The absence of interest payments on mobile money savings may act as a disincentive to save through this mechanism. Given the emerging mobile banking services, there is a need to create more awareness and the need for enhanced synergies between telecom companies and commercial banks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=financial%20inclusion" title="financial inclusion">financial inclusion</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20money" title=" mobile money"> mobile money</a>, <a href="https://publications.waset.org/abstracts/search?q=savings" title=" savings"> savings</a>, <a href="https://publications.waset.org/abstracts/search?q=Uganda" title=" Uganda"> Uganda</a> </p> <a href="https://publications.waset.org/abstracts/45630/a-pathway-to-financial-inclusion-mobile-money-and-individual-savings-in-uganda" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45630.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1639</span> Customer Adoption and Attitudes in Mobile Banking in Sri Lanka</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prasansha%20Kumari"> Prasansha Kumari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper intends to identify and analyze customer adoption and attitudes towards mobile banking facilities. The study uses six perceived characteristics of innovation that can be used to form a favorable or unfavorable attitude toward an innovation, namely: Relative advantage, compatibility, complexity, trailability, risk, and observability. Collected data were analyzed using Pearson Chi-Square test. The results showed that mobile bank users were predominantly males. There is a growing trend among young, educated customers towards converting to mobile banking in Sri Lanka. The research outcomes suggested that all the six factors are statistically highly significant in influencing mobile banking adoption and attitude formation towards mobile banking in Sri Lanka. The major reasons for adopting mobile banking services are the accessibility and availability of services regardless of time and place. Over the 75 percent of the respondents mentioned that savings in time and effort and low financial costs of conducting mobile banking were advantageous. Issue of security was found to be the most important factor that motivated consumer adoption and attitude formation towards mobile banking. Main barriers to mobile banking were the lack of technological skills, the traditional cash‐carry banking culture, and the lack of awareness and insufficient guidance to using mobile banking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=compatibility" title="compatibility">compatibility</a>, <a href="https://publications.waset.org/abstracts/search?q=complexity" title=" complexity"> complexity</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20banking" title=" mobile banking"> mobile banking</a>, <a href="https://publications.waset.org/abstracts/search?q=observability" title=" observability"> observability</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a> </p> <a href="https://publications.waset.org/abstracts/40999/customer-adoption-and-attitudes-in-mobile-banking-in-sri-lanka" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40999.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1638</span> Analysis of Security Vulnerabilities for Mobile Health Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuli%20Paola%20Cifuentes%20Sanabria">Yuli Paola Cifuentes Sanabria</a>, <a href="https://publications.waset.org/abstracts/search?q=Lina%20Paola%20Beltr%C3%A1n%20Beltr%C3%A1n"> Lina Paola Beltrán Beltrán</a>, <a href="https://publications.waset.org/abstracts/search?q=Leonardo%20Juan%20Ram%C3%ADrez%20L%C3%B3pez"> Leonardo Juan Ramírez López</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mHealth%20apps" title="mHealth apps">mHealth apps</a>, <a href="https://publications.waset.org/abstracts/search?q=OWASP" title=" OWASP"> OWASP</a>, <a href="https://publications.waset.org/abstracts/search?q=protocols" title=" protocols"> protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20vulnerabilities" title=" security vulnerabilities"> security vulnerabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20factors" title=" risk factors"> risk factors</a> </p> <a href="https://publications.waset.org/abstracts/38169/analysis-of-security-vulnerabilities-for-mobile-health-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38169.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">517</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1637</span> The Effects of Mobile Communication on the Nigerian Populace</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chapman%20Eze%20Nnadozie">Chapman Eze Nnadozie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Communication, the activity of conveying information, remains a vital resource for the growth and development of any given society. Mobile communication, popularly known as global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM, which is a wireless technology, remains the fastest growing communication means worldwide. Indeed, mobile phones have become a critical business tool and part of everyday life in both developed and developing countries. This study examines the effects of mobile communication on the Nigerian populace. The methodology used in this study is the survey research method with the main data collection tool as questionnaires. The questionnaires were administered to a total of seventy respondents in five cities across the country, namely: Aba, Enugu, Bauchi, Makurdi, and Lagos. The result reveals that though there is some quality of service issues, mobile communication has very significant positive efforts on the economic and social development of the Nigerian populace. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=effect" title="effect">effect</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20communication" title=" mobile communication"> mobile communication</a>, <a href="https://publications.waset.org/abstracts/search?q=populace" title=" populace"> populace</a>, <a href="https://publications.waset.org/abstracts/search?q=GSM" title=" GSM"> GSM</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20technology" title=" wireless technology"> wireless technology</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20phone" title=" mobile phone"> mobile phone</a> </p> <a href="https://publications.waset.org/abstracts/72087/the-effects-of-mobile-communication-on-the-nigerian-populace" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72087.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1636</span> Mobile App Architecture in 2023: Build Your Own Mobile App</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mounir%20Filali">Mounir Filali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Companies use many innovative ways to reach their customers to stay ahead of the competition. Along with the growing demand for innovative business solutions is the demand for new technology. The most noticeable area of demand for business innovations is the mobile application industry. Recently, companies have recognized the growing need to integrate proprietary mobile applications into their suite of services; Companies have realized that developing mobile apps gives them a competitive edge. As a result, many have begun to rapidly develop mobile apps to stay ahead of the competition. Mobile application development helps companies meet the needs of their customers. Mobile apps also help businesses to take advantage of every potential opportunity to generate leads that convert into sales. Mobile app download growth statistics with the recent rise in demand for business-related mobile apps, there has been a similar rise in the range of mobile app solutions being offered. Today, companies can use the traditional route of the software development team to build their own mobile applications. However, there are also many platform-ready "low-code and no-code" mobile apps available to choose from. These mobile app development options have more streamlined business processes. This helps them be more responsive to their customers without having to be coding experts. Companies must have a basic understanding of mobile app architecture to attract and maintain the interest of mobile app users. Mobile application architecture refers to the buildings or structural systems and design elements that make up a mobile application. It also includes the technologies, processes, and components used during application development. The underlying foundation of all applications consists of all elements of the mobile application architecture, developing a good mobile app architecture requires proper planning and strategic design. The technology framework or platform on the back end and user-facing side of a mobile application is part of the mobile architecture of the application. In-application development Software programmers loosely refer to this set of mobile architecture systems and processes as the "technology stack". <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title="mobile applications">mobile applications</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture" title=" architecture"> architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/163887/mobile-app-architecture-in-2023-build-your-own-mobile-app" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163887.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1635</span> Fundamentals of Mobile Application Architecture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mounir%20Filali">Mounir Filali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Companies use many innovative ways to reach their customers to stay ahead of the competition. Along with the growing demand for innovative business solutions is the demand for new technology. The most noticeable area of demand for business innovations is the mobile application industry. Recently, companies have recognized the growing need to integrate proprietary mobile applications into their suite of services; Companies have realized that developing mobile apps gives them a competitive edge. As a result, many have begun to rapidly develop mobile apps to stay ahead of the competition. Mobile application development helps companies meet the needs of their customers. Mobile apps also help businesses to take advantage of every potential opportunity to generate leads that convert into sales. Mobile app download growth statistics with the recent rise in demand for business-related mobile apps, there has been a similar rise in the range of mobile app solutions being offered. Today, companies can use the traditional route of the software development team to build their own mobile applications. However, there are also many platform-ready "low-code and no-code" mobile apps available to choose from. These mobile app development options have more streamlined business processes. This helps them be more responsive to their customers without having to be coding experts. Companies must have a basic understanding of mobile app architecture to attract and maintain the interest of mobile app users. Mobile application architecture refers to the buildings or structural systems and design elements that make up a mobile application. It also includes the technologies, processes, and components used during application development. The underlying foundation of all applications consists of all elements of the mobile application architecture; developing a good mobile app architecture requires proper planning and strategic design. The technology framework or platform on the back end and user-facing side of a mobile application is part of the mobile architecture of the application. In-application development Software programmers loosely refer to this set of mobile architecture systems and processes as the "technology stack." <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title="mobile applications">mobile applications</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture" title=" architecture"> architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/164261/fundamentals-of-mobile-application-architecture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164261.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">105</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1634</span> People Abandoning Mobile Social Games: Using Candy Crush Saga as an Example</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pei-Shan%20Wei">Pei-Shan Wei</a>, <a href="https://publications.waset.org/abstracts/search?q=Szu-Ying%20Lee"> Szu-Ying Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hsi-Peng%20Lu"> Hsi-Peng Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jen-Chuen%20Tzou"> Jen-Chuen Tzou</a>, <a href="https://publications.waset.org/abstracts/search?q=Chien-I%20Weng"> Chien-I Weng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile social games recently become extremely popular, spawning a whole new entertainment culture. However, mobile game players are fickle, quickly and easily picking up and abandoning games. This pilot study seeks to identify factors that influence users to discontinue playing mobile social games. We identified three sacrifices which can prompt users to abandon games: monetary sacrifice, time sacrifice and privacy sacrifice. The results showed that monetary sacrifice has a greater impact than the other two factors in causing players to discontinue usage intention. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=abandon" title="abandon">abandon</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20social%20games" title=" mobile social games"> mobile social games</a>, <a href="https://publications.waset.org/abstracts/search?q=perceived%20sacrifice" title=" perceived sacrifice"> perceived sacrifice</a> </p> <a href="https://publications.waset.org/abstracts/15547/people-abandoning-mobile-social-games-using-candy-crush-saga-as-an-example" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15547.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">495</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1633</span> Enhancement of Learning Style in Kolej Poly-Tech MARA (KPTM) via Mobile EEF Learning System (MEEFLS)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20E.%20Marwan">M. E. Marwan</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20R.%20Madar"> A. R. Madar</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Fuad"> N. Fuad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile communication provides access to the outside world without borders everywhere and at any time. The learning method that related to mobile communication technology is known as mobile learning (M-learning). It is a method that communicates learning materials with mobile device technology. The purpose of this method is to increase the interest in learning among students and assist them in obtaining learning materials at Kolej Poly-Tech MARA (KPTM) in order to improve the student’s performance in their study and to encourage educators to diversify the teaching practices. This paper discusses the student’s awareness for enhancement of learning style using mobile technologies and their readiness to apply the elements of mobile learning in learning to improve performance and interest in learning among students. An application called Mobile EEF Learning System (MEEFLS) has been developed as a tool to be used as a pilot test in KPTM. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=awareness" title="awareness">awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title=" mobile learning"> mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=MEEFLS" title=" MEEFLS"> MEEFLS</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching%20and%20learning" title=" teaching and learning"> teaching and learning</a>, <a href="https://publications.waset.org/abstracts/search?q=readiness" title=" readiness"> readiness</a> </p> <a href="https://publications.waset.org/abstracts/11289/enhancement-of-learning-style-in-kolej-poly-tech-mara-kptm-via-mobile-eef-learning-system-meefls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11289.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">379</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1632</span> Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Sarrab">Mohamed Sarrab</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadj%20Bourdoucen"> Hadj Bourdoucen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20application" title="mobile application">mobile application</a>, <a href="https://publications.waset.org/abstracts/search?q=run-time%20verification" title=" run-time verification"> run-time verification</a>, <a href="https://publications.waset.org/abstracts/search?q=usable%20security" title=" usable security"> usable security</a>, <a href="https://publications.waset.org/abstracts/search?q=direct%20information%20flow" title=" direct information flow"> direct information flow</a> </p> <a href="https://publications.waset.org/abstracts/2363/runtime-monitoring-using-policy-based-approach-to-control-information-flow-for-mobile-apps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2363.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">381</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1631</span> Mobile Systems: History, Technology, and Future</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shivendra%20Pratap%20Singh">Shivendra Pratap Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Rishabh%20Sharma"> Rishabh Sharma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The widespread adoption of mobile technology in recent years has revolutionized the way we communicate and access information. The evolution of mobile systems has been rapid and impactful, shaping our lives and changing the way we live and work. However, despite its significant influence, the history and development of mobile technology are not well understood by the general public. This research paper aims to examine the history, technology and future of mobile systems, exploring their evolution from early mobile phones to the latest smartphones and beyond. The study will analyze the technological advancements and innovations that have shaped the mobile industry, from the introduction of mobile internet and multimedia capabilities to the integration of artificial intelligence and 5G networks. Additionally, the paper will also address the challenges and opportunities facing the future of mobile technology, such as privacy concerns, battery life, and the increasing demand for high-speed internet. Finally, the paper will also provide insights into potential future developments and innovations in the mobile sector, such as foldable phones, wearable technology, and the Internet of Things (IoT). The purpose of this research paper is to provide a comprehensive overview of the history, technology, and future of mobile systems, shedding light on their impact on society and the challenges and opportunities that lie ahead. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20technology" title="mobile technology">mobile technology</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=networking" title=" networking"> networking</a>, <a href="https://publications.waset.org/abstracts/search?q=iot" title=" iot"> iot</a>, <a href="https://publications.waset.org/abstracts/search?q=technological%20advancements" title=" technological advancements"> technological advancements</a>, <a href="https://publications.waset.org/abstracts/search?q=smartphones" title=" smartphones"> smartphones</a> </p> <a href="https://publications.waset.org/abstracts/168769/mobile-systems-history-technology-and-future" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168769.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">92</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1630</span> Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdolghader%20Pourali">Abdolghader Pourali</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20V.%20Malakooti"> Mohammad V. Malakooti</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Hussein%20Yektaie"> Muhammad Hussein Yektaie </a> </p> <p class="card-text"><strong>Abstract:</strong></p> A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reliability" title="reliability">reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=colored%20Petri%20net" title=" colored Petri net"> colored Petri net</a>, <a href="https://publications.waset.org/abstracts/search?q=assessment" title=" assessment"> assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=payment%20models" title=" payment models"> payment models</a>, <a href="https://publications.waset.org/abstracts/search?q=m-commerce" title=" m-commerce "> m-commerce </a> </p> <a href="https://publications.waset.org/abstracts/16315/reliability-evaluation-of-a-payment-model-in-mobile-e-commerce-using-colored-petri-net" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16315.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1629</span> Combining Mobile Intelligence with Formation Mechanism for Group Commerce</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lien%20Fa%20Lin">Lien Fa Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Yung%20Ming%20Li"> Yung Ming Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Hsin%20Chen%20Hsieh"> Hsin Chen Hsieh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rise of smartphones brings new concept So-Lo-Mo (social-local-mobile) in mobile commerce area in recent years. However, current So-Lo-Mo services only focus on individual users but not a group of users, and the development of group commerce is not enough to satisfy the demand of real-time group buying and less to think about the social relationship between customers. In this research, we integrate mobile intelligence with group commerce and consider customers&#39; preference, real-time context, and social influence as components in the mechanism. With the support of this mechanism, customers are able to gather near customers with the same potential purchase willingness through mobile devices when he/she wants to purchase products or services to have a real-time group-buying. By matching the demand and supply of mobile group-buying market, this research improves the business value of mobile commerce and group commerce further. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=group%20formation" title="group formation">group formation</a>, <a href="https://publications.waset.org/abstracts/search?q=group%20commerce" title=" group commerce"> group commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20commerce" title=" mobile commerce"> mobile commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=So-Lo-Mo" title=" So-Lo-Mo"> So-Lo-Mo</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20influence" title=" social influence"> social influence</a> </p> <a href="https://publications.waset.org/abstracts/46954/combining-mobile-intelligence-with-formation-mechanism-for-group-commerce" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46954.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">414</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1628</span> Cryptocurrency-Based Mobile Payments with Near-Field Communication-Enabled Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marko%20Niinimaki">Marko Niinimaki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cryptocurrencies are getting increasingly popular, but very few of them can be conveniently used in daily mobile phone purchases. To solve this problem, we demonstrate how to build a functional prototype of a mobile cryptocurrency-based e-commerce application the communicates with Near-Field Communication (NFC) tags. Using the system, users are able to purchase physical items with an NFC tag that contains an e-commerce URL. The payment is done simply by touching the tag with a mobile device and accepting the payment. Our method is constructive: we describe the design and technologies used in the implementation and evaluate the security and performance of the solution. Our main finding is that the analysis and measurements show that our solution is feasible for e-commerce. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title="cryptocurrency">cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title=" e-commerce"> e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=NFC" title=" NFC"> NFC</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a> </p> <a href="https://publications.waset.org/abstracts/96702/cryptocurrency-based-mobile-payments-with-near-field-communication-enabled-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96702.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=55">55</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=56">56</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20web-based&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10