logo image

Easier to manage

Another issue associated with broadband is cost. This refers to both set up costs for the consumer and the provider. For the general consumer, before considering to get broadband, they have to consider two main costs. Firstly there’s the cost of purchasing the modem, which can cost from i?? 60 up to 100 (various internet sites). Secondly subscription fees can be quite expensive, they can range from around i?? 15 up to around  70. Another blow to the wallet is the fact that when signed up, apart from a seven day cooling period, the consumer has to stay with the provider for a twelve month period.

Consider all this as compared with having a dial-up connection. With dial-up, subscription costs can range from  6. 99 (AOL – light user) to i?? 14. 99 (BT Openworld) and unlike broadband, instead of imposing a 12 month contract on the user, ISP’s offer a dial-up service on a month to month basis (various internet sites). For businesses who need a decent high speed connection, a T1 line is the most commonly one used (E1 in Europe).

To begin with, the company has to pay for the installation of the T1 line which can cost in the region of  5,000. Then subscription charges can be quite immense, normally ranging from i?? 5,00 to around i?? 1,100 (Cambridge 2001). For providers broadband is also a very expensive business. According to Sprint, to fit a mile of two way hybrid fiber coaxial cable or fiber optic cable can cost in the region of $25,000 to $3 million. Again with dial-up the advantage is although at a slower connection, anyone with a phone line can connect to the internet (Cambridge, 2001). Finally security can play a heavy hand on the budget.

Need essay sample on "Easier to manage"? We will write a custom essay sample specifically for you for only $13.90/page

Click to see the full text

As mentioned before, there are some major security issues associated with broadband. The larger the business, the more complex security systems they require, this equals higher costs. This will probably involve calling in consultants to evaluate and produce the required security measures. This could run into i?? 100’s if not i?? 1000’s (Robson, 2000) Traffic According to Plunkett Research Ltd, the growth in selected online activities performed by consumers in the US grew from 240 million in 2000 to 386 million in 2002. A list of the activities surveyed is included in the appendix.

The research also indicated that banking online experienced the greatest growth rate over the two years, 164% followed closely by buying or making a reservation, which experienced a 90% growth (Plunkett Research, 2004). This indicates that internet traffic is rising steeply and the advent of broadband with features like high bandwidth, high speed and an always on connection will only be a catalyst to this trend and due to this always on feature, internet traffic can last for hours. (Krueger, 2001). The Future of broadband The advent of broadband has been heralded as big leap in communications technology.

The development of DSL and Cable broadband has brought the possibility of bringing a national fiber network to the general consumer one step closer. Broadband technologies such as ADSL will allow them to foresee any issues that will arise from the implementation of a fiber optic network. Also as the demand for high speed connections will rise, broadband will provide the financial incentive for providers to bring ‘fiber to the door’. However, experts say that it will be at least a decade before a fiber network is widely available to subscribers (Krueger, 2001).

M-Commerce Although e-commerce is mobile in a sense that a user can perform e-commerce from any PC that has internet access, m-commerce allows the users to perform e-commerce from anywhere, for example, purchasing CD’s while on the toilet. A good definition of m-commerce can be found in Laudon and Traver’s book; “M-commerce is the use of wireless digital devices to enable transaction on the web” Much like Broadband, m-commerce has had big expectations. A consulting firm known as Telecom Trends predicted that revenues gained from m-commerce would rise from $6.

8billion in 2003 to an astonishing $554 billion in 2008 and in the UK it is estimated that by 2005 the m-commerce industry will be worth i?? 2. 8 billion (Dano, 2003; Shullman, 2003). Issues with M-Commerce A survey conducted by Paybox (a service provider) found the reason for this was because the majority (65%) of the respondents had a low interest in m-commerce because of the lack of interest by consumers and 33% said m-commerce’s decline was due to a bad business model (Thomas, 2003). However there are other issues that m-commerce has to contend with. Open architecture

One of the main issues of m-commerce is maintaining an open architecture. Unlike e-commerce there are a variety of different types of devices, these can range from PDA’s, mobile phones to handheld terminals. In the context of J. Sainsbury’s, an open architecture is important to allow the passing of information between various devices, for example passing a shopping list from a PDA to PC. Although 802. 11 is the current wireless standard, new developments are being made such as 802. 11b (for faster connection), which could hinder the concept of an open architecture.

It is also important for retailers, as an open architecture will allow them to add their applications, whether it be through their own staff or externalising such processes (Shullman, 2003). Privacy As new mobile phones are being fitted with location detection facilities, so that the user could be easily found in the event of an emergency. This is seen as an opportunity as an application for the m-commerce industry. For example, when in town centre a user could be alerted to an offer being made by a department store which just happens to be round the corner.

This could go two ways, the consumer could find this facility very useful or more seriously, they could perceive it as an invasion of privacy. (Dano, 2003; Shullman 2003). Interoperability and user statistics This is particularly problematic for the advertising segment of m-commerce. M-commerce is a good marketing tool. For example, a beer company could distribute promotional coasters with registration codes on them. With these codes, consumers can sign up for trivia games and sweepstakes contests. This would allow the company to promote their brand and collect information such as addresses and phone numbers.

“the biggest hurdle is some consistent way to track all this” says Robert Griffin of Media Planning Group. There is no central database of wireless users that would allow the marketers to find out what types of consumer they are reaching. An issue related to interoperability is that of payment. There is no industry-wide mobile payment platform. Currently there is no universal way to pay in m-commerce, so in essence not everything is available to buy in m-commerce, right now the case is that if a consumer is with a certain operator then they can make certain purchases, e. g. only o2 customers can buy from their WAP site.

However, Simpay, backed by Vodafone, Orange, T-Mobile and Telefonica Moviles aims to alleviate this. It offers open standards and an interoperable framework for m-payments. “Open standards and interoperability between operators will help m-commerce to achieve real growth, says Jim Wadsworth of Simpay. However Simpay could end up being a number of proposed standards, hence bringing us back to the original issue (Dano 2003; Thomas 2003). Cost Contradicting to what had been predicted by Forester Research, there wasn’t an m-commerce boom in 2002.

In fact the industry has gone a bit downhill since then. Alex Kwiatkowski of Ovum has attributed this ‘change in mood’ to a general tightening of I. T. budgets and not issues with the technology. “The technology has not changed but budgets have” he then said “companies need a compelling reason to go through with projects – return on investment (ROI) is absolutely critical” (Thomas, 2003). Security As mobile devices and the internet develops, providers are offering new services such as online banking. Such new services require the provider to gain the consumer’s trust by providing adequate security measures.

However advancements in security systems are beginning to achieve this. The development of a Public Key Infrastructure (PKI) enables the four critical aspects of security- privacy, authentication, integrity and non-repudiation. For added security the PKI is facilitated by the provision of security certificates, registration and validation systems. The combination of these facilities help to ensure tight security for a majority of m-commerce transactions. However, the issue for service providers, is in the implementation of a PKI.

In selecting the right one to use the provider must take into account these factors: Scalability – the design of the system must allow the infrastructure to grow with demand End-to-end security – e. g. from the bank to the user. Compatibility – with functions other PKI’s (e. g. wired), mobile devices and open industry standards. Open architecture – for both forward and backward compatibility (Kinsella, 2002). Future of M-commerce Raddicho, a not for profit company is developing a system that will create a cross-industry platform for trusted wireless transactions.

Backed by Vodafone, Visa and BT. Raddicho are developing a system known as The Trusted Transaction Roaming System (T2R). According to Stefan Engel-Flechsig of Raddicho, the system will allow the consumer to buy products and services via m-commerce regardless of the network they are on. The system will have three levels of security. For micro payments (up to i?? 5) will require a password for authentication. For macro payments (up to i?? 100) will use PKI. For any payment larger than i?? 100, there would be some sort of encryption technology (Thomas, 2002). Wireless broadband

This is when broadband access is provided to the consumer via a wireless network. The consumer normally has a satellite receiver on their roof which is connected to a digital modem, which in turn is connected to the users computer. The consumer receives the broadband signal from a signal tower rented or owned by the provider. These towers are designed to service a large number of users which usually approximate in the range of a 35 mile radius. It can also be used by mobile devices (e. g. PDA) through wireless standards such as 802. 11b+. (Cambridge, 2000; Lim, 2003).

Wireless broadband is a growing business, Len Laur of Sprint Global Markets Group has predicted that wireless subscribers would grow from 100,000 in 2002 to more than 5 million in 2005. And AT&T reported that their subscribership rose to 768,000 in the third quarter of 2002 (Mannion, 2001). There are various advantages and disadvantages to this technology. Advantages Wireless broadband has advantages over traditional broadband (e. g. DSL) in factors such as cost, manageability and security. These and other advantages of this technology are explained in detail below. Security

Wireless broadband has the edge over traditional broadband in security. As it is signalled through the air, it could be assumed that a wireless broadband user would be more susceptible to unauthorized attacks. However, due to the Spread Spectrum technology that is being used in wireless broadband, anyone intercepting a signal would simply receive ‘unintelligible blips’. (Cambridge, 2000). Speed Wireless broadband can be installed much faster than laying a traditional line. Businesses such as Regent Broadcasting are increasingly turning to wireless as it can be available to them much earlier than a wireline connection.

Wireless providers such as Leap Frog have estimated to have installations lead times over their wireline counterparts of over 60 days (Annie Lindstrom, 2003). On top of the fast installation times, wireless connections can be considerably fast as well. The Waverider equipment, installed by North Rock not only takes about two days to install but also the connection is at a blistering 6 Mbps. This, when compared to ISDN’s maximum of 128 Kbps and T1’s 1. 54 Mbps connections, wireless seems awfully fast (Cambridge, 2000).

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.
Please, specify your valid email address
We can't stand spam as much as you do
No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
We can't stand spam as much as you do
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy