wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is M-commerce and how it's work

profile
Bhavika Barvadia
Aug 29, 2022
0 Likes
0 Discussions
67 Reads

 M-Commerce, short for Mobile Commerce, is a branch of commerce that deals with the digital transactions made from the smartphone. It doesn’t require physical contact between two people for sending or receiving the money.

In other words, we can say that M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets. As a form of e-commerce, m-commerce enables users to access online shopping platforms without needing to use a desktop computer

Examples of M-commerce –  

In-app purchasing

Mobile banking

Virtual marketplace apps like the Amazon mobile app or a digital wallet such as Apple Pay, Android Pay, and Samsung Pay.

Mobile ticketing.

How M-Commerce Works?

With most m-commerce enabled platforms, the mobile device is connected to a wireless network that can be used to make online product purchases.

For those in charge of developing an M-commerce application, important KPIs to monitor include the total mobile traffic, the total amount of traffic on the application, average order value, and the value of orders over time.

Similarly, tracking the mobile add to cart rate will help developers examine, if visitors are becoming customers. M-commerce developers may also be interested in logging average page loading times, mobile cart conversion rates and SMS subscriptions.

Some of the applications of mobile commerce are-

1. M-Commerce for finance

2. M-Commerce for Retail and After sale Services

3. M-commerce & Mobile ticketing

4. M-commerce & Mobile marketing

 

 

 


Comments ()


Sign in

Read Next

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Virtual Machine

Blog banner

Evolution of Operating system

Blog banner

Wiretapping

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

computer security

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Ethical Hacking

Blog banner

What is OS Fingerprinting?

Blog banner

Linux Memory Management

Blog banner

Security Issues

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Modern Operating System

Blog banner

Digital Marketing

Blog banner

Key to success in Sports

Blog banner

RAID

Blog banner

Cache Memory

Blog banner

Operating System

Blog banner

Security in Operating Systems

Blog banner

INTERNET

Blog banner

?How long does wisdom tooth pain last?

Blog banner

Man In The Middle Attack

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

IoT Evolution

Blog banner

Virtual memory

Blog banner

Fault Tolerance in an Operating System

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

TEAMWORK

Blog banner

File management

Blog banner

IP Address

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

5 Common Faults In Construction Tenders

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Know your Processors!

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Memory Management

Blog banner

Functions of operating system

Blog banner

Service design process in ITSM

Blog banner

Memory Management

Blog banner

Network Security Risks

Blog banner