Tuesday, May 5, 2020

M-Commerce And Its Applications In Business Successes †Free Samples

Question: Discuss about the M-Commerce And Its Applications In Business Successes. Answer: Introduction and context Currently, the growing application of Mobile commerce (referred to as sales of goods and services through mobile devices) is bringing success in many old as well as startup businesses. In other words, M-commerce Information System is referred to as a combination of E-commerce application and Wireless Web. This technology is both positively and negatively impacting the businesses. The widespread usage of Mobile phones has provided a dramatic transaction to Mobile apps thus this particular topic has been chosen for evaluation. Due to the proliferation of mobile devices usability currently most of the large to medium business activities are focusing on information system management regarding M-commerce application along with the E-commerce. In order to deliver better service to the consumers most of the business organizations are concentrating on developing their mobile app. Usage of M-commerce is beneficial from the business perspectives but at the same time business can also be negatively impacted by M-commerce Information System. This particular essay reflects the issues associated with M-commerce Information System (IS) that interrupts the business success. In the current technology era, this is one of the significant concerns of business. Thus, immediately after the identification of different issues to M-Commerce (IS), proper strategies are needed to be implemented. Information system management issue Security is referred to as an enabling factor in M-commerce. While turning on any handset, GSM gives a comparatively secured connection through the help of Personal Identification Number (PIN). The adoption of the M-commerce application moderates individualism, collectivism regardless of gender of the consumers (Faqih and Jaradat 2015). Not only this but also GSM gives an accurate authentication approach protocol between the network and Mobile device through the SSL encryption of both data and voice. Mobile commerce is referred to as a particular type of daunting task that pays active role in consumers decision making (Nilashi et al. 2015). Different effects may occur during the application of M-commerce Information System in the business organizations. The significant issues that the business organizations widely face after adopting M-commerce Information System in their businesses are as follows: Security issues of Mobile Commerce Issues in location management Ethics and privacy issues Wireless infrastructure and usability issues Regulatory challenges and legal issues Consumer trust level issues Problems with interoperability and compatibility However, among all these above mentioned issues the most highlighted issue is a security threat with the M-commerce IS application in business. It has been found that wireless communication is referred to as a much vulnerable. In case of personal innovativeness adequate amount of attention is required to be paid by the M- Commerce service providers (Lu 2014). It helps to improve business environment because the security has become one of the foremost concerns with high end mobile devices within the business environment. The trust of the consumers transforms through a set of dynamic process (Lin et al. 2014). During the usage of Mobile commerce Information System in the business environment, many issues are found to exist with this application while conducting the different transaction such as: Data can be lost from the server and mobile terminal Data can be misplaced or theft due to the limitation in size and stored content Lack of proper data authentication technique, data can be hijacked y the unauthorized users Different aspects are there to be considered for the Information System Security including physical security, risk assessment, secured access, malware attack and secured wireless data transmission. However, there is certain build in security approaches exist such as keypad locking, password etc., that are used by the majority of the wireless IS users. The value of M-commerce or mobile business considers the impact on sales and marketing, organizational internal operation and other measureable procurements (Picoto, Blanger and Palma-dos-Reis 2014). On the other hand, information transformation over the wireless medium is much vulnerable to making attacks. An information system can be identified as intercepted and if it is not accurately encrypted with the flawed protocol then; all confidential data will be exploited as a known data rater then confidential. However, in order to convince user, this security approach does not stand as enough. In order to gain access to a particular security system, application of smart card is found to be as the most preferred one. The usability of social media marketing and its adoption like an advanced communication tool in increasing globally and also eventually offering valuable opportunities to the business organizations. The way of interaction and work is changing accordingly with the help of Mobile Business or M-commerce (Gurtner, Reinhardt and Soyez 2014). In order to ensure the confidentiality of M-commerce Information system, an accurate encryption approach should be used with the proper secret private key. The encryption key helps to scramble the confidential information during its transmission over a channel from the sender to the recipient. However, the individual key must keep secret to keep the confidentiality and security of the system (Lu et al. 2015). In addition to this, the secret code must not be shared with the outsiders over the sender and the recipient parties. If the secret code is divided among the third parties, then the data will be easily accessed by the external attackers. The rese arch of Information System will help to keep the researchers updated on the IS management issues and challenges that most of the IT industries and management are widely facing (Kavanagh, and Johnson 2017). From the full range of M-commerce IS application it has been found that security is the most significant threat that most of IS using business organizations are widely facing. Over the radio frequency platform which is prone to different passive attacks such as snooping, spoofing etc. This is quite difficult to estimate the extent of M-commerce IS usage and its utility during the usage of the internet over the mobile devices. Thus, it can be said that compromised security function can affect not only the network but also can lead an entire business towards major commercial loss. Discussion and arguments There are many online shopping centers such as Flipkart, Amazon, Myntra, Jabong etc. which use an M-Commerce app for selling their products. It also gives online payment opportunity to the buyers from anywhere and anytime. Though due to lack of security and management the buyers of Flipkart (on the Big Billion day, 2016) faced severe problems. The event Big Billion Day was promoted by Flipkart in 2016 that has an exclusive deal with all their products offering many discounts on home appliances, electronic goods and fashion accessories also. The consumers highlighted substantial operational and technical errors in the pricing scams to lack of product variety. Once the site was also crashed, and due to glitches, the order placements were affected. In addition to this, for some of the products, the review and rating options were also missed those days. This real-life case implies that dealing with huge consumers and products through E-commerce and M-commerce is not beneficial every time. There are significant differences between the handheld device and desktops considering several ways. Due to smaller screen size and minimum amount of input capabilities users face problems during its application in the business environment (Shaukat et al. 2016). For different wireless applications, due to lack of security systems in the implementation of wireless protocols, security is not at all measured as adequate. Handheld devices have another issue associated with it such as it shows a few text lines and does not have any traditional board. At the expense of battery life more substantial screen and also the color can be identifiably enhanced. The recent design efforts are also thus driving positively with the help of the classic trade-off. The vendors are trying to bring measurable changes in the field of both features, and design outlines of the M-Commerce IS application (Ferreira 2014). Another issue that is going to be faced by the users is the increasing demand for bandwidth for application of both the new as well as existing networks. Interference may be occurring because different standards like Bluetooth, IEEE802.11 are also willing to use the similar range of frequency for their application. Mobile Commerce provides extended business opportunities to the consumers (Shah, Ahmed and Soomro 2016). Laudon and Laudon (2016) stated that security is the most highlighted issues that, most of the information system users are currently facing in their business application. In case of M-commerce application, the users are allowed to book for their desired services and products from the Mobile apps. The process of payment gateway also differs in this case. If proper security assumptions are not undertaken then, a company may face serious security issues. With lack of security approaches, unauthenticated users can also access the business servers without taking permission even from the owners. In order to encrypt the confidential information, two different meth ods such as asymmetric and symmetric are widely used by the Information system business owners. Not only during the application of M-commerce Information system but also while adopting the Information System the companies may face significant issues as well that interrupts the business success instead put the negative impact on the business. Conclusion From the overall discussion, it can be concluded that most of the large business organizations are currently investing a lot of resources to build information system regarding an E-commerce mobile based application. However, some businesses are also there identified, who have terminated their operation in websites and are running their businesses only through the mobile apps Information system. Based on the type and background of business including their operational features an organization should adopt the necessary information system that has to be applied to it. The essence of the essay is wholly focused on the issues associated with the Information system (M-commerce) and its negative impact on the business organization. From the wide area technology-based survey it has been found that approximately 52% of total consumers are recently using the M-commerce Information system application in their business for commercial success. However, the consumers are simultaneously facing both safeties as well as security issues with the application of Information system (M-commerce and E-commerce) in their business. It can be said that not only after use but also during the adoption of the IS also companies are facing major barriers. In order to gain competitive advantages and measurable success from the business after identifying the IS issues proper mitigation approaches are also required to be highlighted. Critical reflection Different approaches such as near field communication, direct communication or E-commerce governance and Printed display barcode based symbols are there, available in the field of Information System (in term of M-commerce) application in the business organization. I have learned that based on the background of the business the most appropriate approach should be adopted by the project team members or business owners. Firstly, in order to obtain competitive advantages from the market, most of the large businesses are developing E-commerce based websites. However, to make it more efficient, E-commerce websites are improving by promoting it in M-commerce based Mobile app. It helps to govern the E-commerce based businesses. I have learned, M-commerce allows the consumers to access the desired portal from anywhere and anytime. Therefore, users are not required to wait in any queue for product and service booking. The second approach implies that M-commerce gives displayed bar code symbols to the consumers that can encode the emblem which directs the users to the websites. At the sites, the users are headed towards where the information is displayed. In some cases, resolution of the display may interrupt the users, but this approach can be eventually termed as a helpful one. On the other hand, it can be said that contemporary approaches are the most valuable approaches those are necessary to be adopted by the business organizations to avoid commercial, operational and business functional challenges. After studying multiple perspectives on the information system, I have found that for Information system it shows that Information System is a multidisciplinary field. I think that no single theory can dominate others. The major disciplinarians of contemporary approaches for the study of an Information system are technical approach and behavioral approach. I have learned that the major discipline of these approaches consists of the following attributes such as contributed problems, issues and its respective solution as well. The entire operation which is known as managing information system has six different domains such as computer science, sociology, operation research, economics, management science, and psychology. The information system is a socio-technic al system, which is composed of mechanics, devices and also hard physical technologies. It requires substantial social, organizational, intellectual investments to ensure all the activities work appropriately. I think in order to study the details of the Information system management, its application abilities and issues of IS that are continuously interrupting the commercial success of any business proper contemporary approach is needed to be adapted accordingly. I think that both of these approaches are helpful, but at the same time, technical approach is somewhere a little beneficial to gain measurable business success. In order to study the application and operational activities of an information system, the professional approach provides mathematics based modules. Besides M-commerce and E-commerce application there are some additional technologies such as project management approaches, outsourcing, ICT governance, ERP, Business Intelligence (BI), Knowledge Management (KM) etc. are available the project managers for commercial success can apply those. I think M-commerce app should be integrated with these approaches to take effective organizational decisions. I have also learned that the discipline which contributes to the technical approaches include computer science, management science and operation management. I have realized that computer science is much concern about the computability and computation methods and data storage and access abilities whereas; the management science is focused on decision making models and other best management practices during the implementation and management if Information system in the business organizations. I think that the business owners who are using M-commerce application in their business should adopt the most suitable approach to gain competitive advantages and commercial success as well. Bibliography Chen, Y.F. and Lan, Y.C., 2014. An empirical study of the factors affecting mobile shopping in Taiwan.International Journal of Technology and Human Interaction (IJTHI),10(1), pp.19-30 Cui, M. and Pan, S.L., 2015. Developing focal capabilities for e-commerce adoption: A resource orchestration perspective.Information Management,52(2), pp.200-209. Dahnil, M.I., Marzuki, K.M., Langgat, J. and Fabeil, N.F., 2014. Factors influencing SMEs adoption of social media marketing.Procedia-social and behavioral sciences,148, pp.119-126. Faqih, K.M. and Jaradat, M.I.R.M., 2015. Assessing the moderating effect of gender differences and individualism-collectivism at individual-level on the adoption of mobile commerce technology: TAM3 perspective.Journal of Retailing and Consumer Services,22, pp.37-52. Ferreira, S.C., 2014. The M-Commerce In The Retail Industry: Exploring consumers and retailers perspectives of features in a mobile app for supermarkets. Gurtner, S., Reinhardt, R. and Soyez, K., 2014. Designing mobile business applications for different age groups.Technological Forecasting and Social Change,88, pp.177-188. Kavanagh, M.J. and Johnson, R.D. eds., 2017.Human resource information systems: Basics, applications, and future directions. Sage Publications. Laudon, K.C. and Laudon, J.P., 2016.Management information system. Pearson Education India. Lin, J., Wang, B., Wang, N. and Lu, Y., 2014. Understanding the evolution of consumer trust in mobile commerce: a longitudinal study.Information Technology and Management,15(1), pp.37-49. Lu, J., 2014. Are personal innovativeness and social influence critical to continue with mobile commerce?.Internet Research,24(2), pp.134-159. Nilashi, M., Ibrahim, O., Mirabi, V.R., Ebrahimi, L. and Zare, M., 2015. The role of Security, Design and Content factors on customer trust in mobile commerce.Journal of Retailing and Consumer Services,26, pp.57-69. Palacios-Marqus, D., Soto-Acosta, P. and Merig, J.M., 2015. Analyzing the effects of technological, organizational and competition factors on Web knowledge exchange in SMEs.Telematics and Informatics,32(1), pp.23-32. Picoto, W.N., Blanger, F. and Palma-dos-Reis, A., 2014. An organizational perspective on m-business: usage factors and value determination.European Journal of Information Systems,23(5), pp.571-592. Shah, M.H., Ahmed, J. and Soomro, Z.A., 2016. Investigating the Identity Theft Prevention Strategies in M-Commerce.International Association for Development of the Information Society. Shaukat, U., Ahmed, E., Anwar, Z. and Xia, F., 2016. Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges.Journal of Network and Computer Applications,62, pp.18-40. Turban, E., Outland, J., King, D., Lee, J.K., Liang, T.P. and Turban, D.C., 2017.Electronic Commerce 2018: A Managerial and Social Networks Perspective. Springer.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.