4 research outputs found

    The adoption of mobile commerce services by individuals: A Current State of the Literature

    Get PDF
    The lack of strong market growth in most Mobile Commerce markets indicates that improved functionality, affordability, and availability of mobile technology do not lead automatically to wide-spread adoption of these services. Therefore, developing an understanding of the factors that influence end-user (consumer) behaviour and acceptance of new mobile services is important at this early stage of the mobile evolution because consumer acceptance is a critical foundation for the continued expansion of the market for mobile services. In this paper we analyse and synthesise the existing literature which focuses on the factors that impact the adoption of mobile commerce services by individuals. We develop an innovative framework to guide this analysis and review 100 studies. Results show a clear imbalance in the existing literature and bias towards some types of adoption factors in favour of other equally important factors

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    WHAT DO USERS NEED? EXPLORING INFLUENCES ON THE ADOPTION OF MOBILE CONTENT AND THE DIFFERENCES AMONG CATEGORIES OF ADOPTERS

    Get PDF
    Businesses develop products and services with the goal of earning a satisfactory return on their original investment of time and capital. For their part, consumers seek out products and services that meet a recognized need. However, predicting the adoption rate of any new technology is an inexact science, and some businesses find themselves on the wrong side of the curve. The variables factoring into consumers’ purchasing decisions are manifold and contingent on a wider network of influences. This research suggests that a primary variable that influences consumers’ adoption of a technological innovation (in this case, mobile content) is the perception of 10 proposed Mobile Content Needs. The first goal of this research is to propose a framework for the relationships among the adoption of mobile content, users’ perception of their need for mobile content, and users’ innovativeness, which is a measure of the likelihood to adopt a new product. This research seeks to explore the differences among groups (categories) of adopters in the context of the perceived needs influencing their decision to adopt mobile content. In other words, it examines the prominence of particular mobile content needs for each of the five categories of adopters. This examination provides indirect evidence of how the mobile content adoption process evolves over time in relation to a specific innovation and within specific groups. This research is useful for those seeking to better understand the mobile content market in its totality, in particular the motivations driving different adopter groups. The results of this research may enable the development of more relevant, targeted content, with a surer knowledge of what a potential consumer needs at each stage of the adoption lifecycle. Similarly, this research offers a foundation for more extensive studies in the near future

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
    corecore