wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is M-commerce and how it's work

profile
Bhavika Barvadia
Aug 29, 2022
0 Likes
0 Discussions
67 Reads

 M-Commerce, short for Mobile Commerce, is a branch of commerce that deals with the digital transactions made from the smartphone. It doesn’t require physical contact between two people for sending or receiving the money.

In other words, we can say that M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets. As a form of e-commerce, m-commerce enables users to access online shopping platforms without needing to use a desktop computer

Examples of M-commerce –  

In-app purchasing

Mobile banking

Virtual marketplace apps like the Amazon mobile app or a digital wallet such as Apple Pay, Android Pay, and Samsung Pay.

Mobile ticketing.

How M-Commerce Works?

With most m-commerce enabled platforms, the mobile device is connected to a wireless network that can be used to make online product purchases.

For those in charge of developing an M-commerce application, important KPIs to monitor include the total mobile traffic, the total amount of traffic on the application, average order value, and the value of orders over time.

Similarly, tracking the mobile add to cart rate will help developers examine, if visitors are becoming customers. M-commerce developers may also be interested in logging average page loading times, mobile cart conversion rates and SMS subscriptions.

Some of the applications of mobile commerce are-

1. M-Commerce for finance

2. M-Commerce for Retail and After sale Services

3. M-commerce & Mobile ticketing

4. M-commerce & Mobile marketing

 

 

 


Comments ()


Sign in

Read Next

The Power of Cyber Forensic in Solving Crimes

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

File Management In OS

Blog banner

RAID

Blog banner

GIS REMOTE SENSING

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

File management

Blog banner

Deadlock in operating system

Blog banner

virtual machines and virtualization

Blog banner

Social Media.

Blog banner

PHISHING

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Veg Mix Pickle

Blog banner

PPT methodology

Blog banner

Memory Management

Blog banner

Data Warehousing

Blog banner

Article on team management software

Blog banner

VIRTUAL MEMORY

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Operating system and overviews

Blog banner

(Input/Output) in os

Blog banner

Online Games

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Firewall

Blog banner

The application udemy

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

What if COVID does not exist!

Blog banner

 " Healing of Yoga "

Blog banner

Malware Defense

Blog banner

IT Service Continuity Management

Blog banner

Internet of Things and cyber security

Blog banner

Uniprocessor scheduling

Blog banner

How to grow followers on Instagram business account?

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Modern Operating system

Blog banner

Privacy in Social Media and Online Services

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Paging

Blog banner

I/O Management and Disk Scheduling

Blog banner

Types of Hackers.

Blog banner

KASHMIR TRIPS

Blog banner