wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

M commerce

profile
Pratham Pratham
Aug 30, 2022
0 Likes
0 Discussions
126 Reads

M commerce 

The term mobile commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum, to mean "the delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology 

 

M-Commerce is the buying and selling of goods and services through wireless handheld devices such as cellular phones and personal digital assistants (PDAs).

 

M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets. 

 

M-commerce is a form of e-commerce that enables users to access online shopping platforms without the use of a desktop computer.

 

M-commerce helps the users to access the Internet easily through cell phones and PDAs Now-a-days cell phones are equipped with Micro browser, Bluetooth technology, E-mail

 

Examples of m-commerce use in specific industries include the following:

 

•Financial services. Mobile banking and brokerage transactions are done from mobile devices.

•Telecommunications. Handheld devices are used to make service changes and bill payments, and to do account reviews.

• Service and retail. Consumers place and pay for orders on-the-fly through online stores.

•Information services. Financial, sports, traffic, weather and many other news updates are accessed through mobile devices.

 

capabilities.

 

The technology behind m-commerce is based on Wireless Application Protocol (WAP),

 

IBM and other companies are experimenting with speech recognition software as a way to ensure security for M-commerce transactions.

 

Wireless Markup Language (WML) is used to create Web pages that can be displayed on small format Web-enabled devices such as cell phones 


Comments ()


Sign in

Read Next

Data Warehousing

Blog banner

Big Data Architecture

Blog banner

GIS in Disaster Management

Blog banner

Concept and definition of m-commerce

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Memory management

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Financial Fraud Detection

Blog banner

I/O Buffering

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Threats To Computer System

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Types of email

Blog banner

Busted : Common Web Security Myths

Blog banner

RAID

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

MySQL

Blog banner

What is process

Blog banner

How Cyber Forensics use in AI

Blog banner

Street foods

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Introduction my self

Blog banner

Emailing the merger document

Blog banner

What is Network Security?

Blog banner

Linux Memory Management

Blog banner

VIRTUAL MACHINES

Blog banner

Virtual memory in Operating System

Blog banner

Virtual machine and virtualizing

Blog banner

Music

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Functions Of Operating Systems

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Advantage of freedom

Blog banner

Data Visualization

Blog banner

Modern operating systems (OS)

Blog banner

Topic: Sessions in Operating system

Blog banner

PYTHON

Blog banner

Internet of Things and cyber security

Blog banner

12 Principles of Animation

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner