wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

M commerce

profile
Pratham Pratham
Aug 30, 2022
0 Likes
0 Discussions
126 Reads

M commerce 

The term mobile commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum, to mean "the delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology 

 

M-Commerce is the buying and selling of goods and services through wireless handheld devices such as cellular phones and personal digital assistants (PDAs).

 

M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets. 

 

M-commerce is a form of e-commerce that enables users to access online shopping platforms without the use of a desktop computer.

 

M-commerce helps the users to access the Internet easily through cell phones and PDAs Now-a-days cell phones are equipped with Micro browser, Bluetooth technology, E-mail

 

Examples of m-commerce use in specific industries include the following:

 

•Financial services. Mobile banking and brokerage transactions are done from mobile devices.

•Telecommunications. Handheld devices are used to make service changes and bill payments, and to do account reviews.

• Service and retail. Consumers place and pay for orders on-the-fly through online stores.

•Information services. Financial, sports, traffic, weather and many other news updates are accessed through mobile devices.

 

capabilities.

 

The technology behind m-commerce is based on Wireless Application Protocol (WAP),

 

IBM and other companies are experimenting with speech recognition software as a way to ensure security for M-commerce transactions.

 

Wireless Markup Language (WML) is used to create Web pages that can be displayed on small format Web-enabled devices such as cell phones 


Comments ()


Sign in

Read Next

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Electronic data interchange

Blog banner

Every body is beautiful

Blog banner

What is thread and multithreading ?

Blog banner

You'll get to know about Pankaj Negi

Blog banner

GIS REMOTE SENSING

Blog banner

Pipedrive

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Memory heirchy

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Functions of operating system

Blog banner

Memory Management

Blog banner

HR Automation : Need of the hour

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Memory management and virtual memory

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

GIS

Blog banner

IT RISK

Blog banner

Challenges and risks in service operations

Blog banner

E-security systems | CCTV

Blog banner

Introduction my self

Blog banner

Power of words

Blog banner

ZOHO

Blog banner

Service Strategy In ITSM

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Subnet Masking

Blog banner

Lucidchart

Blog banner

Fitness regime by Deepesh

Blog banner

CSI and Organizational Change

Blog banner

Os(Computer security threats)

Blog banner

MYNTRA

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Mumbai Metro 3

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

File management -disha parekh

Blog banner

security requirements for safe e-payment

Blog banner

Virtual Machine's

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Best password managers: Reviews of the top products

Blog banner

Software

Blog banner