Turban Online W9

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 1

ONLINE FILE W9.1


WASHINGTON TOWNSHIP FIRE DEPARTMENT
GOES WIRELESS
The Washington Township Fire Department (WTFD) is located data entry screens with drop-down menus containing vital
just north of Columbus, Ohio. WTFD responds to more than information such as diagnoses, treatments rendered, drugs
4,500 emergency medical services (EMS) calls every year. administered, and even street names. It also includes a
Time is critical when WTFD is responding to emergencies, signature-capture feature that allows EMTs to document a
which range from heart attacks to fire injuries to highway patients refusal of treatment as well as transfer of care to
accidents. The service is run by emergency medical techni- the hospital.
cians (EMTs). Once the incident data are entered into the systems
Rushing victims to the hospital is only part of the ser- embedded SQL database, printing reports is simple. The tech-
vice offered by these dedicated technicians. Providing first nician beams the information from MobilEMS to the hospital
aid at the scene of an accident and during transport of the printers infrared port, and a clear document is produced.
injured in the ambulances is the other part. When a patient Back at the station, the EMTs synchronize the data in their
arrives at the hospital, the EMTs must provide information on handheld computers with the department computer systems
what treatments and medications were administered and by placing the MobilEMS in a docking station.
what health-related signs they observed in the patient. Such According to McCoy, it takes about 15 seconds to move
patient-care reports are critical to the continuance of treat- the data into the system. This is a significant improvement
ment in the hospital, and they become a permanent part of over manual rekeying; using MobilEMS has reduced costs by
the medical record. The information also is used to keep EMS more than 90 percent. Also, by eliminating handwriting and
records for planning, budgeting, training, and reporting to mandating the completion of required data fields that
the state of Ohio. previously could have been skipped, accuracy has increased
In the past, the department had problems using significantly.
8-by-14-inch, multipart, multicopy paper forms. According Finally, the system is customizable. Fields can be
to Jack McCoy, using paper forms caused several problems. added and additional information can be stored. Thus,
First, not everyones handwriting is legible, so it often was additional applications are leading to a completely paper-
difficult for hospital personnel, as well as the WTFD office less environment.
staff, to decipher the information. Second, on many occa-
sions the information was incomplete or even inaccurate.
To restore the information took considerable, valuable time. Questions
Office staff at WTFD had to spend almost 1,800 hours a year 1. The system uses a mobile device with a docking station
processing information after the completion of the patient- for data synchronization, but no remote wireless con-
care report. In fact, 85 percent of one full-time office nection is used. Would you recommend adding wire-
employees time was required just to reenter data that were less? What for? Why or why not?
already entered on the paper reports. But the major prob-
2. What are the potential legal issues presented by this
lem was the time EMTs spent filling out the forms because
case?
this prevented them from returning quickly to the station
to respond to other emergency calls. 3. The MobilEMS system is based on electronic forms with
A solution to the paperwork problems was a mobile data checkmarks. Why not use a similar set of paper forms?
collection device (MobilEMS of Clayton I.D.S. Corp. powered 4. What are the benefits of the mobile system to the
by SQL Anywhere Studio from Sybase Corp.). The device patient, to the hospital, and to the employees?
allows EMTs to collect patient information quickly, easily, and 5. What are the benefits of the MobilEMS system to
accurately at the scene and to deliver that information to WTFD?
the hospital in a printout. This is done through a series of

REFERENCES FOR ONLINE FILE W9.1


iAnywhere.com. Success Story: Clayton I.D.S. 2006. Sybase. Clayton I.D.S and Washington/Norwich Township
ianywhere.com/success_stories/clayton_ids.html Fire Departments. sybase.com/detail?id=1023367
(accessed November 2006). (accessed November 2006).
2 Part 4: Other EC Models and Applications

Online File W9.2 War Driving and War Chalking

Why would anyone pay $8 a day or $30 a month for Wi-Fi access when it is readily available in many locations for free? Because
it is relatively inexpensive to set up a wireless access point that is connected to the Internet, a number of businesses offer cus-
tomers Wi-Fi access without charging them for the service (Richtel 2004). In fact, one organization, FreeNetworks.org
(freenetworks.org) was founded to support the creation of free community wireless network projects around the globe.
In other cases, spillover signals and poor security measures allow users to surreptitiously make a connection to a WLAN. How?
First, to ensure adequate coverage throughout a building or home, a strong signal strength may be set. For example, if a wireless
access point is installed in the front of a home and the signal range is set to reach upper bedrooms and the back yard, the signal
will also be detectable from the street. Second, although Wi-Fi does have a built-in security system known as Wireless Encryption
Protocol (WEP), many small business owners and homeowners with WLANs never turn it on. Similarly, for their own convenience or
via an oversight, many WLAN owners do not employ password protection. As a result, they sponsor an open and free network
connection to anyone who happens to be in the range of connecting with a wireless device that can pick up the signal.
Knowing this, a small number of people have made a hobby out of war driving. War driving is the act of locating open
(unsecured) WLANs while driving around a city or other geographic area (see wardriving.com). To war drive, a person needs a
vehicle, a computer or PDA with a wireless card running in promiscuous mode (monitoring for unsecured wireless LAN signals),
software that will probe for access points, and an antenna that can be mounted on top of or positioned inside the car. A knowl-
edgeable war driver is able to detect a signal, intrude into the network, obtain a free Internet connection, and possibly gain
access to important data and other resources of the legal owner. The term war driving is derived from the term war dialing, a
technique in which a hacker programs his or her computer to call hundreds of phone numbers until a modem answers, which
indicates a dial-up connection to a computer. War dialing is demonstrated in the movie War Games, which features Matthew
Broderick performing the technique.
A related practice is war chalking. Once an open Wi-Fi connection is found, it can be identified by symbols on a sidewalk
or wall to indicate nearby wireless access. The term war chalking was inspired by the practice of hobos during the Great
Depression who used chalk marks to indicate which homes offered food or shelter.
One of the primary aims of people engaged in war driving is to highlight the lax security of Wi-Fibased networks. This
motivation seems warranted. In November 2003, Toronto police investigated a parked car and found that the driver was naked
from the waist down with a laptop computer on the front seat, playing a child pornography video that was being streamed from
an insecure residential hotspot. An attorney speculated that if homeowners are negligent in setting up proper security, they
could be held accountable for activities carried out on their networks, including criminal activities such as launching spam, dis-
tributing viruses, stealing data, or downloading child pornography (Shim 2003).
In Douglas County, Colorado, the Sheriffs department is establishing a Wi-Fi patrol; police cars will be equipped to war
drive and note down open Wi-Fi access points, with the goal of alerting owners (if they can be found) that they should lock
down their Wi-Fi networks.

REFERENCES FOR ONLINE FILE W9.2


Shim, R. Wi-Fi Arrest Highlights Security Dangers. Techdirt.com. Car 802.11b Where Are You? June 29,
CNET News, November 28, 2003. znet.com.com/ 2006. techdirt.com/articles/20060629/1843240.shtml
210011055112000.html (accessed January 2004). (accessed October 2006).
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 3

Online File W9.3 WI-FI Mesh Networks, Google Talk, and Interoperability

Researchers in India have developed a protocol that will enable wide area coverage of Wi-Fi networks, which are called Wi-Fi
mesh networks. With the conventional Wi-Fi networks that are common in Internet cafes and airports, radio signals are
exchanged between portable devices and the base station, which has a wired connection to the Internet. Their range is only
100 meters or less. With a Wi-Fi mesh network, several nodes can exchange radio signals with each other as well as with the
devices. The range of a Wi-Fi mesh network is up to 40 kilometers and at speeds up to 20 times faster than traditional Wi-Fi.
This arrangement provides wider geographical Wi-Fi coverage at lower cost than a series of conventional Wi-Fi networks because
not all of the nodes have to be wired to the Internet.
Another development is Googles Google Talk service, which allows for voice connections and IM. In May 2006, Google
and Nokia launched a handheld Internet browsing device that contained Google Talk, which relies on Wi-Fi instead of cell phone
networks. As many as 300 municipalities, including San Francisco, Philadelphia, Suffolk County in Long Island, New York, and
the entire state of Connecticut plan to offer the Wi-Fi service free of charge. Initially, because of the different protocols, the
device cannot call regular phones. However, cell phone equipment manufacturers, including Avaya, Cisco Systems, and Motorola,
are testing devices that have both Wi-Fi and cell phone network capabilities. For example, Motorola partnered with eBays VoIP
provider, Skype. Customers with Wi-Fi-enabled mobile phones will have the option of using Skypes service in place of a landline
service as long as they are within range of a Wi-Fi signal. Once out of Wi-Fi range, the phone switches to cellular technology.
Sales of mobile phones with both cellular and Wi-Fi capability will be booming by 2010, according to a study by market
research company In-Stat.

REFERENCES FOR ONLINE FILE W9.3


Fleetwood, C. New Nokia, Google Partnership Highlights Technology Review. Long-Distance Wi-Fi. October 2005.
WiFi Trend. CNNMoney.com, May 12, 2006.

ONLINE FILE W9.4 Classes of M-Commerce Applications


Class of Application Examples
Mobile financial applications (B2C, B2B) Banking, brokerage services, and payments for mobile users
Mobile advertising (B2C) Sending user-specific and location-sensitive advertisements to users
Mobile inventory management (B2C, B2B) Location tracking of goods, boxes, troops, and people
Proactive service management (B2C, B2B) Transmission of information related to distributing components to vendors
Product locating and shopping (B2C, B2B) Locating/ordering certain items from a mobile device
Wireless reengineering (B2C, B2B) Improvement of business services
Mobile auctions or reverse auctions (B2C) Services for customers to buy or sell certain items
Mobile entertainment services (B2C) Video-on-demand and other services to a mobile user
Mobile office (B2C) Working from traffic jams, airports, and conferences
Mobile distance education (B2C) Taking a class using streaming audio and video
Wireless data center (B2C, B2B) Information can be downloaded by mobile users/vendors
Mobile music/music-on-demand (B2C) Downloading and playing music using a mobile device
Mobile location-based services In business from workforce management to asset tracking; personal use from
family tracking to social networking; and in the public sector from
emergency communications to backing-up existing systems
4 Part 4: Other EC Models and Applications

REFERENCES FOR ONLINE FILE W9.4


Varshney, U., and R. Vetter. Recent Advances in Wireless directionsmag.com/article.php?article_id=2111&trv=1
Networking. IEEE Computer, 33, no. 6 (2001): 100103. (accessed January 2007).
Williams, D. H. The Outlook for Location-Based
Services, Directions Magazine, February 23, 2006.

Online File W9.5 Nordeas WAP Solo Banks Portal

EXHIBIT W9.5.1

Solo Services
Solo Services
14.03 53.00-
Accounts 13.03 1700.00-
Transfer 13.03 2456.55-
Solo New Payment 12.03 467.90-
Customer number Falling Due (2) 10.03 42.00-
(..) Abroad 10.03 567.05-
Tervenuloa Password Investments 9.03 15,411.00-
(..) Visa Inquiry 8.03 979.25
Merita Accept Mastercard Inquiry 5.03 54.55
Mail
Merita Bank Options Back Solo News 07.05 Options Back
Solo Instructions and terms
Solo Market Exit Solo
1abc 2abc 3 def
In English
4ghi 5 jklPa 6Svenska
mno Options Back
Solo Investments Solo Transfer
7 pq
rs 9 wx
8 tuvSupmeksl
yz

NORDEA From Account


* 0 #
Options Highest even 6,90 [234156-983]
Latest end 6,85 To account
Solo Visa Inquiry
[133690-672-11]
Amount (..) 10.03 ESP 50000.00 Amount
Limit Price(..) Credit Bank Andoma [...]
Validity (..) ESCALDES 1,806.24 MK/EURO
[MK]
Give Code N (..) 11.03 FIM 346.85 Accept
Confirm Purchase SUPERMARKET/HKI Home Page

Options Back Options Back Options Back

Source: Norrdeas WAP Solo from M-Commerce, 2002, Figure 1.4. Reprinted by permission of John Wiley & Sons, Inc.
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 5

Online File W9.6 Wireless Advertising in Action

The following are a few examples of wireless advertisement campaigns or trials currently underway.
Vindigo (vindigo.com) has a large database of customers (over a million as of May 2004) who are willing to accept promo-
tional materials on their wireless devices. This is known as permission marketing. The users download special software to their
PDAs that enables Vindigo to deliver timely, accurate information about places to go and things to do in their area. Along with
every listing, the company can deliver a customized message to the users at a time and place where it is of most interest to
them and they are most likely to act on it.
The company targets ads by city (New York, San Francisco, Los Angeles, etc.) and channel (Eat, Shop, or Play). Vindigo
tracks which ads a user sees and selects, and even allows a user to request information from an advertiser via e-mail.
Vindigo determines a users location through GPS or by asking which neighborhoods the user wants to be matched with.
For example, an Italian restaurant chain could use Vindigo to send a message to anyone looking for Italian food within a few
blocks of one of its locations. The restaurant could provide the user with directions to the restaurant and even offer a list of
specials on the menu.
MyAvantGo (avantgo.com) has several thousand content channels and over 8 million registered users (AvantGo 2004).
The content is delivered to PDAs and handsets running Palm or PocketPC operating systems. MyAvantGo offers an m-business
channel and direct promotions, delivering advertising from some of the worlds top brands, including American Airlines, Chevy
Trucks, the Golf Channel, CNN, the New York Times, and Yahoo!
Hoping to become the king of location-based Web domains, Go2 (go2online.com) helps mobile travelers find everything
from lodging (choose go2hotels) to Jiffy Lube stations. Partnering with Sprint, Nextel, Verizon, and BellSouth, Go2 makes its
services available on every Web-enabled phone, Palm i705, and BlackBerry RIM pager in America. Entering JiffyLube or
hundreds of other brand names into the Go2 system will bring up the nearest location where a shopper can find that product
or service.
Another aspect of wireless advertising is getting paid to listen to advertising. As in the wireline world, some consumers
are willing to be paid for exposure to advertising. In most places where it was offered in the United States, this service was a
flop and was discontinued.
In Singapore, though, getting paid to listen to advertising works very well. Within a few months of offering the ads, more
than 100,000 people subscribed to the free minutes in exchange for listening to the ads offered by SingTel Mobile (Eklund
2001). Subscribers to SingTels service fill out a personal questionnaire when they sign up. This information is fed into the
Spotcast database and encrypted to shield subscribers identitiesSpotcast cannot match phone numbers with names, for
example. To collect their free minutes1 minute per call, up to 100 minutes a monthsubscribers dial a four-digit code, then
the phone number of the person they want to talk to. The code prompts SingTel to forward the call to Spotcast and, in an
instant, Spotcasts software finds the best ad to send to the subscriber based on the subscribers profile.

REFERENCES FOR ONLINE FILE W9.6


Avantgo.com. avantgo.com (accessed November 2006). Go2online.com. go2online.com (accessed November 2006).
Eklund, B. Wireless Advertisings Home of the Free. Red Vindigo.com. vindigo.com (accessed November 2006).
Herring, March 6, 2001. redherring.com/mag/issue94/
650018065.html (no longer available online).
6 Part 4: Other EC Models and Applications

ONLINE FILE W9.7


I-MODE
i-mode is to mobile portals what eBay is to auction sites, the one-price-for-unlimited-access model used in most other
Amazon.com is to online retailing, and Google is to search countries. Both factors favor wireless communications ser-
engines. It has been extremely successful in the large vices over wired rivals in the Japanese market. Third, NTTs
Japanese cellular phone market and closely scrutinized for DoCoMo has partnered with official outside providers to
keys to its success. deliver content and services to customers. This is a win-win
i-mode was developed by Japans telecommunications arrangement for both DoCoMo and the content providers.
giant Nippon Telegraph and Telephone (NTT) and is con- NTTs DoCoMo makes its profits from the traffic on its
trolled by NTTs DoCoMo (DoCoMo means everywhere in network and the 9 percent commission from transaction
Japanese). As of September 2004, there were 42 million charges on its billing system. Partners get privileged access
i-mode users in Japan and 3 million in other countries, to a large customer base and do not need to build a billing
mostly Europe. system. Fourth, in addition to a small monthly fee (US$2.70
i-mode users can send and receive e-mail as well as SMS as of November 2004), users pay for network traffic based on
text messages. i-mode users also have access to the Web and the number of packets they send, not for the amount of time
can visit Web sites that offer video games, news and weather spent online. In addition, i-mode users pay through what is
reports, train schedules, city maps, ringtone melodies, event perhaps the worlds first successful implementation of a
ticketing, and much, much more. Entertainment services have micropayments system. Fifth, the handsets are well designed
proven to be the most popular; downloadable wallpaper and easy to use, with special appeal to the Japanese audi-
images and ringtones for mobile phones have been the most ence. Sixth, cultural factors, such as the Japanese love for
profitable for content providers (Krishnamurthy 2001). gadgets, has contributed to i-modes success.
One aspect of i-mode that has drawn considerable In recent years NTTs DoCoMo has started to expand the
interest from other mobile portal operators is the distinction i-mode service model beyond Japan. Investments and
between official and unofficial Web sites. Official Web sites, partnerships have been arranged with telecommunications
as approved by DoCoMo, are easily accessible to users; any providers in Hong Kong (service started in May 2000),
charges incurred when visiting or using the site appear on Europe, South Korea, Taiwan, and Brazil. In 2002, a partner-
the individuals monthly i-mode bill. Unofficial sites can only ship between NTTs DoCoMo and AT&T Wireless led to the
be accessed if the user hears about them from outside introduction of mMode, a mobile Internet service similar to
i-mode; the URL must be entered manually; and these sites i-mode, in the United States.
must establish separate payment arrangements or make Initial indications are that NTTs DoCoMo has not experi-
money in other ways. The official i-mode Web sites, 83,000 enced the same degree of success in these markets as i-mode
of them as of September 2004, are a large revenue generator has in Japan. As the list of success factors presented earlier
for DoCoMo; thus, the strong interest of other mobile portal indicates, i-mode owes much of its success to the particular
operators. circumstances and nature of the Japanese market. The ability
What are the reasons for i-modes success? First is its of NTTs DoCoMo to replicate a formula for success outside
strong connection with NTT. NTT owns an advanced packet- the Japanese market has yet to be determined.
switched network that was made available to DoCoMo. NTT
has a strong brand position in Japan, and its NTT connec-
tions gave DoCoMo the clout it needed to form partnerships Questions
with handset manufacturers. Second is the nature of the 1. Why is i-mode considered to be a mobile portal?
wired versus wireless Internet access market in Japan. Japan
2. What factors have led to i-modes success in Japan?
has a relatively low level of PC penetration and a high level
of mobile phone penetration. Also, PC-based Internet access 3. What is the win-win situation for NTTs DoCoMo and
is billed by the minute, making it much more expensive than official site content providers?

REFERENCES FOR ONLINE FILE W9.7


Krishnamurthy, S. NTT DoCoMos I-Mode Phone: A Case nttdocomo.com (accessed January 2007).
Study, 2001. swlearning.com/marketing/krishnamurthy/
first_edition/case_updates/docomo_final.pdf (accessed
November 2006).
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 7

ONLINE FILE W9.8


U.S. FLEET SERVICES AND WIRELESS NETWORKING
Started in 1997, U.S. Fleet Services has grown to be the shift by downloading the route and schedule over the
leading provider of mobile, onsite fueling in the United companys Wi-Fi network into a handheld. When the driver
States, with customers such as FedEx, Home Depot, Coca- reaches a customer stop, the handheld is used to scan a
Cola, Nabisco, Office Max. It has over 3,000 facilities barcode attached to the customers truck. This provides the
throughout the United States and Canada. Using trucks that driver with the type of fuel required by the truck. After the
resemble home fuel-delivery vehicles, U.S. Fleet travels to its truck is fueled, a meter on the delivery truck sends a wireless
customers, refueling the customers vehicles onsite, usually signal to the handheld. The handheld then syncs with the
during off hours. U.S. Fleet had considered building a wire- meter, capturing the type and quantity of fuel delivered. The
less network for its drivers but decided against it. Managers data are stored on the handhelds CompactFlash memory
considered the project to be too hard and too expensive card. When the driver returns to the home base, the data are
given the expected ROI. However, toward the end of 2001, unloaded over the Wi-Fi network to the central database. At
they changed their minds. this point, the data are available for U.S. Fleet and its
Although a mobile wireless solution was the end goal, customers to analyze.
the first step in the project actually involved the imple- Before the handheld computers were deployed, drivers
mentation of an ERP system. This was followed by a Web- would record the data manually. The data were then faxed
based application built on top of the ERP that provided from the branch offices to headquarters and entered by hand
customers with information about their fuel consumption into the system. Not only were there delays, but the data
and taxes, enabling them to do better fleet management. were also subject to entry errors at both ends of the line. The
Finally, U.S. Fleet equipped its drivers with handheld company and its customers now have accurate data in a
devices that could communicate with the companys timely fashion, which provides the company with faster
intranet using Wi-Fi. invoicing and cash flow. On average, the new system has also
The handheld device U.S. Fleet selected was the enabled drivers to service six to seven more stops per shift.
Intermec 710 (intermec.com). According to the architect of
the U.S. Fleet system, this device was selected for a number
of reasons. Besides having a built-in bar-code scanner, it also Questions
runs Microsofts Pocket PC operating system, supports Visual 1. What systems did U.S. Fleet have to put in place
Basic programs, handles CompactFlash cards, and has an inte- before implementing its wireless solution?
grated wireless radio for short range Wi-Fi communications.
2. Why did U.S. Fleet select the Intermec 710 handheld
The device is fairly lightweight with a drop resistant case that
device? How does the device communicate with the
is sealed to protect against harsh weather conditions.
companys intranet?
The system works as follows: Branch managers enter a
delivery route and schedule for each driver into a centralized 3. What are the major benefits that U.S. Fleet has
database via the companys intranet. Each driver starts the realized by combining handheld devices with Wi-Fi?

REFERENCES FOR ONLINE FILE W9.8


Ludorf, C. U.S. Fleet Services and Wireless Networking. usfleet.com (accessed November 2006).
Transportation Technology Today, August 2002, pp. 1215.
8 Part 4: Other EC Models and Applications

ONLINE FILE W9.9


WEARABLE DEVICES FOR BELL CANADA WORKERS
For years mobile employees who had to climb trees, electrical practitioners, aircraft mechanics, and contractorsare using
poles, or tall buildings were unable to enjoy the new tech- or testing such devices.
nologies designed to make employees more productive. That So far, only a few companies make and sell wearables for
is beginning to change. mobile workers. Bell Canadas system was developed by
On a cold, damp November day in Toronto, Chris Holm- Xybernaut, a U.S. company that in 2002 had more than a thou-
Laursen, a field technician with Bell Canada (bell.ca), is out sand of its units in use around the world, some in operation
and about as usual, but this time with a difference: A small and others in pilot programs (see xybernaut.com). Meanwhile,
but powerful computer sits in a pocket of his orange mesh Bell Canada was impressed with the initial results and is equip-
vest, a keyboard is attached to the vests upper-left side, and ping most of its technicians with wearable computing devices.
a flat-panel display screen hangs by his waist. A video cam- Of course, a practical problem of wearable devices in
era attached to his safety hat enables him to take pictures many countries is the weather: What happens when the tem-
without using his hands and send them immediately to the perature is minus 50 degrees or the humidity is 99 percent?
office. A cell phone is attached as well, connected to the Other potential problems also exist: If a worker is wearing
computer. A battery pack to keep everything going sits thick gloves, how can he or she use a keyboard? If it is
against his back. pouring rain, will the battery short circuit? Various solutions
Holm-Laursen and 18 other technicians on this pilot are being developed, such as voice input, tapping on a
project were equipped like this for 10 weeks during fall 2000. screen instead of typing, and rainproof electrical systems.
By summer 2003, an increasing number of Bell Canadas
employees were equipped with similar devices. The wearable
devices enable workers to access work orders and repair man- Questions
uals wherever they work. 1. What are some other industrial applications of similar
These workers are not typical of employees usually wearable devices? (Use google.com to find additional
using computers, that is, white-collar workers. The hands- applications.)
free aspect and the ability to communicate anytime,
2. How do you think wearable devices could be used in
anywhere, represent major steps forward for these utility
entertainment?
workers. A wide variety of employeestechnicians, medical

REFERENCES FOR ONLINE FILE W9.9


Guernsey, L. Wearable Computers for the Working Class. xybernaut.com (accessed November 2006).
New York Times, December 14, 2000. nytimes.com/
2000/12/14/technology/14wear.htm (no longer available
online).
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 9

ONLINE FILE W9.10


MOBILE WORKPLACE APPLICATIONS
FOR SALES AND CUSTOMER SUPPORT
The following are two scenarios of wireless applications for time-critical maintenance and support for the companys
mobile employees. customers electromechanical control systems. To do so, he
needs to know immediately when a customers system is
Sales Support
faltering, what is malfunctioning, and what type of service
Linda is a member of the field sales team at Theru Tools
contract is in effect.
(a fictitious company). Each day she drives out to her
Michael does not need to carry all of this information
customers in a van stocked with products. For each sale, she
in his head but instead has it in the palm of his hand. With
has to note the customer name, the number and type of
only a few taps of a stylus, Michael accesses the mysap.com
products sold, and any special discounts made. This record
Mobile Workplace for all the data he requires, including the
keeping used to be done manually, and many errors were
name and address of the next customer he should visit,
made, leading to customer complaints and lost sales.
equipment specifications, parts inventory data, and so
Theru implemented a system using low-cost but power-
forth.
ful handheld wireless devices. Using Mobile Sales (an appli-
Once he has completed the job, he can report back on
cation for handhelds), accessed via the mysap.com Mobile
the time and materials he used, and these data can be
Workplace, Linda and her coworkers in the field now have
employed for timely billing and service quality analysis. In
information at their fingertips, including updates on new
addition, his company is able to keep track of his progress
products and special promotions. Linda can place orders
and monitor any major fluctuations in activities. As a result,
without delay and get immediate feedback on product
both Michael and his supervisors are better informed and
availability and delivery times. Whats more, the system can
better able to serve their customers.
prompt Linda as she enters orders, and it also can make
plausibility checks on the orders, eliminating many of the
errors associated with the manual process. It also checks to
see if she is giving the right discounts to the right customer Questions
and immediately triggers the invoicing process or prints out 1. How has the introduction of handheld wireless devices
a receipt on the spot. changed sales support at Theru tools?
Customer Service Support 2. What benefits does Euroblast receive from Mobile
Michael works for Euroblast, Inc. (another fictitious Workplace? How does Michael benefit? What are the
company) as a service engineer. It is his job to provide benefits for Euroblasts customers?

REFERENCES FOR ONLINE FILE W9.10


SAP. CRM and the mySAP.com Mobile Workplace mobilebusiness/mobileser vice/index.epx.com
(a publicly available brochure from SAP). 2000. (accessed November 2006).
sap.com. SAP xApps for Mobile Business: SAP xApp
Mobile Service, 2006. sap.com/solutions/xapps/
10 Part 4: Other EC Models and Applications

Online File W9.11 Mobile Entertainment: Music, Pictures, and Videos

The availability of portable MP3 players has led to the development of cell phones with music devices integrated into them. All
of the major handset vendors offer MP3 phones, including Samsung (SPH-M100), Nokia (5510), Ericsson (MP3 Handsfree), and
Audiovox (CMP3). All of these handsets enable music titles to be stored and played locally on the mobile device.
With higher bandwidth, music vendors will be able to offer instant delivery of songs from their music libraries for online
purchase. Location-based services can even be integrated to target subscribers with location-sensitive streaming content such
as audio jingles promoting offers at retail outlets in the vicinity or movie trailers for films showing at the nearest theater.
The same handset vendors also have produced a new generation of cell phones that enable users to send pictures from one
device to another. The Nokia 9300, Samsung SCH-1730, Sony Ericsson T300, and Treo G650 all have built-in digital cameras.
These and a number of other cell phones can send and receive pictures through their MMP (multimedia messaging protocol)
capabilities. In addition, GPS is available on the iPaq hw9320.
As 3G handsets hit the market, mobile devices will begin to support the downloading and real-time playback of audio and
video clips. The U.S.based Packet Video Corporation (packetvideo.com) is a pioneer in this area. The company already has
demonstrated its new mobile-media software on Nokias EG2 and 9300 phones. This software enables content to be captured by
the mobile phone, viewed via streaming video, and shared via messaging and e-mail. Users can utilize the software to encode
live video from the built-in device camera; stream favorite videos and other multimedia content across the wireless network to
the handset; view news, sports, music videos, movie trailers, and other content; download content to the mobile device for for-
warding to friends or storage for later retrieval; and view live cameras for travel, entertainment, security, and child or elderly
monitoring.

REFERENCES FOR ONLINE FILE W9.11


Mobile-ent.biz. mobile-ent.biz/ (accessed November 2002. emailwire.com/news/tel3170.shtml (accessed
2006). November 2006).
PacketVideo Corporation. PacketVideo Demonstrates
Mobilemedia on Nokia Series 60 Devices. November
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 11

Online File W9.12 Location-Based Technologies

Providing location-based services requires the following location-based and network technologies:
GPS locator. A GPS locator is included in the mobile device to determine the location of the person carrying the mobile device.
Position-determining equipment (PDE). This equipment identifies the location of the mobile device (either through GPS or
by locating the nearest base station). The position information is sent to the mobile positioning center.
Mobile positioning center (MPC). The MPC is a server that manages the location information sent from the PDE.
Location-based technology. This technology consists of groups of servers that combine the position information with geographic-
and location-specific content to provide a service. For instance, location-based technology could present a list of addresses of
nearby restaurants based on the position of the caller, local street maps, and a directory of businesses organized by location.
Geographic content. Geographic content consists of streets, road maps, addresses, routes, landmarks, land usage, zip codes,
and the like. This information must be delivered in compressed form for fast distribution over wireless networks.
Location-specific content. Location-specific content is used in conjunction with the geographic content to provide the location
of particular services. Yellow-page directories showing the location of specific business and services exemplify this type of content.
The accompanying diagram shows how these technologies are used in conjunction with one another to deliver location-
based services.

GPS System

GPS

GPS Location
Handset Server
Cellular Phone Station

Internet

Service Contents
Center Center

Source: MapInfo Corporation. MapInfo EnvinsaTM mapinfo.com/industries/mobile (accessed June 2003). Used
with permission.

REFERENCES FOR ONLINE FILE W9.12


MapInfo Corporation. MapInfo Envinsa. extranet. MobileIN.com. Location-Based Services. 2004. mobilein.
mapinfo.com/products/overview.cfm?productid=1825 com/location_based_services.htm (accessed November
(accessed November 2006). 2006).
12 Part 4: Other EC Models and Applications

Online File W9.13 NextBus: A Superb Customer Service

The Problem
Buses in certain parts of San Francisco have difficulty keeping up with the posted schedule, especially during rush hours.
Generally, buses are scheduled to arrive every 20 minutes, but at times passengers may have to wait 30 to 40 minutes. The
scheduled times become meaningless and passengers are unhappy because they waste time.

The Solution
San Francisco bus riders carrying an Internet-enabled wireless device, such as a cell phone or PDA, can quickly find out when a
bus is likely to arrive at a particular bus stop. The NextBus (nextbus.com) system tracks public transportation buses in real time.
Knowing where each bus is and factoring in traffic patterns and weather reports, NextBus calculates the estimated arrival time of
the bus to each bus stop on the route. Arrival times also are displayed on the Internet and on a public screen at each bus stop.
The NextBus system has been used successfully in several other cities around the United States, in Finland, and in several
other countries. The exhibit below shows how the NextBus system works. The core of the NextBus system is the set of GPS
satellites that let the NextBus information center know where a bus is located. Based on a buss location, the scheduled arrival
time at each stop can be calculated.
Currently, NextBus is an ad-free customer service, but in the near future advertising may be added. Because the system
knows exactly where riders are when they request information and how much time they have until their next bus, in the future,
the system may send riders to the nearest Starbucks for a cup of coffee, giving them an electronic discount coupon.

The Results
Passengers in San Francisco are happy with the system; worries about missing the bus are diminished. A similar system is used
in rural areas in Finland, where buses are infrequent and the winters are very cold; passengers can stay in a warm coffeehouse
not far from the bus stop rather than wait in the cold for a bus that may be an hour late. A bus company can also use the sys-
tem to improve scheduling, arrange for extra buses when needed, and improve its operations.

NextBus Operational Model


GPS Satellites
Real-Time
Arrival
NextBus Predictions 0100100
Wireless Information 1010110
1100100
1011010
Communication Center 1001010

Location and 0100100


Real-Time
Bus ID reported 1010110
1100100
1011010
Passenger
to Automatic 1001010
Messages
Vehicle Location 0100100
1010110
1100100
(AVL) at NextBus 1011010

Information Center
1001010
World
Transit Wide Web
Management
Information

Wireless Phone
and Mobile Devices

Wireless 22 Fillmore Shelter Signs


Communication 7 min & 12 min and Public Displays

Pole Signs

Source: Used with permission of NextBus Information Systems, Inc. Copyright 2005.
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 13

REFERENCES FOR ONLINE FILE W9.13


ITS America. NextBus Expands Real-Time Transit enn-features-archive/1999/09/090799/nextbus_
Information in the Bay Area with AC Transit. ITS 4692.asp (no longer available online).
America, August 9, 2001. nextbus.com/corporate/ Nextbus.com. nextbus.com (accessed November 2006).
press/#actransitExpansion (accessed November 2006).
Murphy, P. Running Late? Take the NextBus. Environ-
mental News Network, September 7, 1999. enn.com/

Online File W9.14 OnStar

OnStar is a subscription-based communication, monitoring, and tracking service for safety and security operated by General
Motors (onstar.com). As of 2005, it is a standard feature for several General Motors vehicles, and it will be standard on all new
GM vehicles sold in North America by 2007. It also is available on the Acura RL and MDX. Other manufacturers offering OnStar
include Audi, Subaru, and Volkswagen. The service is available for all vehicles that have the factory-installed OnStar hardware.
The service consists of both communication through mobile phone networks and tracking by GPS technology. Drivers and
passengers can use its audio interface to contact OnStar representatives for concierge-like and emergency services that can
initiate an action when vehicle telemetry indicates an emergency (for instance airbag deployment). OnStars innovative three-
button system offers:
24-hour access to expertly trained, caring advisors
A connection to emergency assistance
Access to OnStar Hands-Free Calling
When a driver presses the red OnStar Emergency button or blue OnStar button, current vehicle data and the users GPS
location are immediately gathered. This information is then sent to OnStar. OnStar Emergency calls are routed to the OnStar
Center with the highest priority. As of 2006, three OnStar centers existed, located in Michigan, North Carolina, and Toronto.

GM Advanced Automatic Crash Notification System


The GM advanced automatic crash notification (AACN) system uses front and side sensors as well as the sensing capabilities of
the Sensing and Diagnostic Module (SDM) itself. The accelerometer located within the SDM measures the crash severity. In the
event of a moderate to severe front or side-impact crash, data are transmitted from the affected sensors to the SDM. The SDM
sensor also can identify a rear impact of sufficient severity. Regardless of whether the airbags deploy, the SDM transmits crash
information to the vehicles OnStar module.
Within seconds of a moderate to severe crash, the OnStar module will send a message to the OnStar Call Center (OCC)
through a cellular connection, informing an OCC advisor that a crash has occurred. A voice connection between the advisor and
the vehicles occupants is established. The advisor then can conference in 911 dispatch or a public safety answering point
(PSAP) to determine if emergency services are necessary. If the vehicles occupants do not respond, the OCC advisor can provide
the emergency dispatcher with crash information from the SDM, and the dispatcher can identify what emergency services may
be appropriate. Using the GPS satellite, OnStar advisors are able to tell emergency workers the location of the vehicle. The
number and location of sensors and SDM may vary depending on vehicle models.

REFERENCES FOR ONLINE FILE W9.14


How Stuff Works. OnStar. 2007 howstuffworks.com/ Wikipedia. OnStar. 2007 en.wikipedia.org/wiki/OnStar
onstar.htm (accessed January 2007). (accessed January 2007).
14 Part 4: Other EC Models and Applications

ONLINE FILE W9.15

SECURITY APPROACHES FOR MOBILE COMPUTING


WEP
WEP (wired equivalent privacy) is a security protocol for Wi-Fi networks that encrypts the
communications between a mobile device (e.g., a laptop, tablet PC, PDA) and the wireless
access point. WEP provides weak encryption, meaning that it is secured against casual hacking
as long as the person setting up the network turns on the encryption. Unfortunately, many small
business owners and homeowners operating a WLAN fail to do just that.
Although WEP offers a measure of security, the tradeoff is inconvenience. In order to
employ WEP, all Wi-Fi users must be educated on how it works, their computers must be
reconfigured to connect to the network, and the encryption code must be changed frequently.
Additionally, every authorized user must be given the encryption key, which means that a lot
of people will be carrying around the keys to the network. In larger companies, if a hacker can
gain access to the encryption key or can get through the WEP security in some other way
which is easily done with readily available software, such as AirSnort (airsnort.shmoo.com) or
WEPCrack (wepcrack.sourceforge.net)the damage is often greater because companies
have a habit of installing their wireless access points behind their firewalls.
There are alternatives to WEP. If a company is concerned about the security of wire-
less data communications, it can use VPN technology to create a secure connection over
the wireless link. Also, a new Wi-Fi security standardWi-Fi Protective Access
(WPA)is under development. This standard has the backing of the Wireless Fidelity
Alliance and the Institute of Electrical and Electronics Engineers (IEEE). WPA provides
enhanced encryption and supports user authentication, something that was missing from
WEP. The alliance has already begun certifying Wi-Fi products with WPA security. This
enhanced security may encourage more businesses to experiment with Wi-Fi over the
coming years. For details, see Fikes (2003).

SIM-BASED AUTHENTICATION
GSM and its 2.5G and 3.0G counterparts all include a subscriber identification module.
This module is usually implemented as a smart card that contains an authentication key
along with other vital information about the subscriber. The authentication key also is stored
on a home location registry, which can be thought of as a database that is part of the mobile
network. When the phone is turned on, the user is asked to enter a PIN number. This pro-
tects the cell phone against illegal use if it happens to be stolen or lost. If the PIN is correct,
the cell phone and the network engage in a challenge-response process of authentication. A
network authentication center sends a random number to the cell phones SIM. The SIM
computes a signed response by combining the random number with its authentication key.
The signed response is sent over the network to the authentication center, which performs
the same computation using a copy of the authentication key stored on the home-location
registry. If the signed response matches the value computed by the authentication center,
then the cell phone is authenticated. After that, communication takes place through sym-
metric encryption, using a key generated by both the authentication center and the SIM.
Although SIM cards protect against unauthorized use of a particular subscribers
account, they do not prevent the use of a stolen cell phone. If a thief steals a phone, the thief
can simply replace the existing SIM card with another one and sell it on the open market.
The police in Amsterdam employed an interesting method to thwart this practice. Using a
cell phones International Mobile Equipment Identity number, the police are able to track
down the mobile phone number being used on the stolen phone. Once the number is known,
the police employ a special computer program to send out an SMS message to the stolen
phone every 3 minutes. The message reads, This handset was nicked [stolen]; buying or
selling it is a crime. The Police. Obviously, this makes the stolen phone a lot less attractive to
prospective buyers (Evers 2001).
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 15

WTSL AND WIM


The transmissions between the WAP gateway and the Web server can be secured through
the wired Internet security protocols discussed in Chapter 11 (e.g., PKI, SSL, and TSL).
These protocols cannot be used on the mobile side of the gateway. Instead, WAP relies on
the Wireless Transport Layer Security (WTLS). Like its wired counterpart (TSL), WTLS
enables encrypted communications between a mobile device and the WAP gateway.
Additionally, WTLS supports the key elements of PKIpublic and private encryption keys,
digital certificates, digital signatures, etc.
A wireless identity module (WIM) can be used in combination with WTLS. A WIM is a
smart card device, much like a SIM (and, in fact, can be implemented on a SIM). It is designed
to hold the security keys and digital certificates used by the gateway and the Web server to
encrypt/decrypt communications. One of the advantages of a WIM is that can be issued by a
bank or other financial institution to handle m-commerce payments and transactions.

REFERENCES FOR ONLINE FILE W9.15


Evers, J. Dutch Police Fight Cell Phone Theft with SMS Fikes, B. Unguarded Wireless Networks a Snap for
Bombs. IDG News Service, March 27, 2001. Stumbling. Californian North County Times, January
archives.cnn.com/2001/TECH/ptech/03/28/SMS. 12, 2003. nctimes.net/news/2003/20030112/53511.
bomb.idg/ (accessed November 2006). html (no longer available online).

ONLINE FILE W9.16


WIRELESS COMPUTING CONCEPTS
EXHIBIT W9.16.1

Pervasive Ubiquitous
High computing computing

Degree of
Embeddedness

Desktop Mobile
Low computing computing

Low High

Degree of Mobility

Source: Lyytinen, K., and Y. Yoo Issues and Challenges in Ubiquitous Computing. Communications of the
ACM 45, no. 12 (2002): 6365. 2002 ACM, Inc. Used with permission.
16 Part 4: Other EC Models and Applications

Online File W9.17 Technical Foundations of Pervasive Computing

Being invisible is only one of the properties of pervasive computing. The following is a short list of its major characteristics
(Amor 2001):
Invisible devices. Numerous and casually accessible, these devices often are invisible.
Embedded microchips. Microchip intelligence is embedded into everyday devices and objects.
Always on. Users have continuous access to information, entertainment, and communication with anyone, anytime, anywhere.
Pervasive network. Everyone and everything is connected to an increasingly pervasive network structure.
Life-enhancing applications. The technology will penetrate the mainstream mass market through a variety of life-enhancing
applications.
Consumer-centric solutions. The technology offers gadgetry for simple and practical consumer-centric solutions.
Increasing productivity. The technology offers mainstream-market value propositions that enable consumers to save time or
money and enhance leisure and entertainment.
Long-term vision. In the long-term, the technology will enable people to work, live, and play more effectively.
As the list suggests, three major technical requirements underlie pervasive computing. First, everyday objects will have to
contain embedded microprocessors. Second, a pervasive network is needed to connect these microprocessors. Finally, the micro-
processors must be able to communicate with the pervasive network. The day when these technical requirements all meet is not
that far off.
According to Harbor Research (Edgington 2001), approximately 5 billion microprocessors were sold in 2000, and only
120 million of them (roughly 2.5 percent) were intended for PCs. It is estimated that in 5 years, the number of processors in
the average home could grow from 40 to 280, the number of processors in the average car (now about 20) will increase sub-
stantially over the same time period, and the number of embedded chips sold to support increasingly intelligent devices could
grow to over 9 billion (Edgington 2001). Intelligence and connectivity will be designed into almost every electronic device. The
pervasive network environment over which these devices will communicate will, for the foreseeable future, be the Internet.
The way in which embedded devices will attach to or communicate with the Internet will vary. Some will be wired into the
Internetthrough broadband or dial-upin the same way that the average desktop computer is connected. Others will con-
nect through mobile or wireless networks in the same way that a cellular phone does. Finally, others, such as the RFID tags
used by Prada, will link in through small antennas that can send and receive messages in a wireless environment (e.g., Wi-Fi or
Bluetooth).
Like most areas of new technological development, pervasive computing has been accompanied by a great deal of hype. In
the last few years, people have talked about refrigerators that can tell a person when to order milk, TVs that provide entertain-
ment on demand, gas pumps with Web connections, and a whole array of amazing gadgets. For instance, 3COM promoted
Audrey, a small, wireless Internet appliance for the entire family. This tablet-like device offered e-mail, Web access, and calen-
daring. Despite a $20-million marketing campaign, Audrey was a resounding flop that was pulled from the market. The same has
been true for most of the other ideas that cropped up during the dot-com heyday. Instead of looking at solutions to problems,
many manufacturers have focused on connectivity as an end in itself, and so have not yet produced commercially successful
products.

REFERENCES FOR ONLINE FILE W9.17


Amor, D. Internet Future Strategies: How Pervasive 2001. tnty.com/newsletter/futures/technology.html
Computing Services Will Change the World. Upper Saddle (accessed November 2006).
River, NJ: Prentice Hall, 2001.
Edgington, C. How Internet Gateways and Smart
Appliances Will Transform Our Homes. TNTY Futures,
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 17

ONLINE FILE W9.18


CONTEXT-AWARE ENVIRONMENT AT CARNEGIE
MELLON UNIVERSITY
Carnegie Mellon University (CMU) is known for its advanced the student is in a certain place and/or time; others will
science projects, especially those dealing with robotics not be shown at all.
and artificial intelligence. At CMU, students participate in a A users context information can be accessed by a
context-awareness experiment in the following manner: collection of personal agents, each in charge of assisting
Participating students are equipped with a PDA from which with different tasks, while locating and invoking relevant
they can access Internet services via the campus Wi-Fi net- Internet services identified through services registries
work. The students operate in a context-aware environment, (see the figure).
the architecture of which is shown in the figure below. An example of a simple agent is a restaurant concierge
A students context (left of figure) includes his or her: that gives suggestions to students about places to have
Calendar information lunch, depending on their food preferences, the time they
Current location (position), which is regularly updated have available before their next class, their location on
using location-tracking technology campus, and the weather. For example, when it is raining,
Weather information, indicating whether it is sunny, rain- the agent attempts to find a place that does not require
ing, or snowing, and the current outside temperature going outside of the building where the student is located.
(environment) The recommendation (usually several choices) appears on
Social context information, including the students friends, the PDA, with an overall rating and a click for details
teachers, classmates, and so forth possibility.

Each students preferences are solicited and entered


into the system, creating a personal profile, shown as Questions
Preferences and Permissions in the figure. The contextual
1. Does the usefulness of such a service justify the need
information helps the system to filter incoming messages
to disclose private preferences?
and determine what to show a particular student. For
example, while attending classes the student may block all 2. Can such a system be developed for consumers who are not
messages. That is, certain messages will be shown only if members of a defined community, such as a university?

Carnegie Mellons Context-Awareness System


Content
Servers
Calendar Position
JANUARY
1 2 3
4 5 6 7 8 9 10 Service
11 12 13 14 15 16 17
10 19 20 21 22 23 24 Registry
25 26 27 28 29 30 31

Social Environment Internet


Context

Context Server
Preferences and
Permission Profile Wired LAN Wireless
LAN

Task Specific Filtering Service


Personal Agents Agent Registry

Content
Servers

Source: Sadeh (2002).


18 Part 4: Other EC Models and Applications

REFERENCES FOR ONLINE FILE W9.18


Banavaar, G., et al. Driving Long-Term Value from Context- Sadeh, N. M-Commerce. New York: Wiley, 2002.
Aware Computing. Information Systems Management, Fall
2005.

ONLINE FILE W9.19


THE HIGHWAY 91 PROJECT
Route 91 is a major eight-lane, eastwest highway near Los Surveillance cameras record the license numbers of cars
Angeles. Traffic is especially heavy during rush hours. without AVIs. These cars can be stopped by police at the
California Private Transportation Company (CPT) built six exit or fined by mail.
express toll lanes along a 10-mile stretch in the median of Video cameras along the tollway also enable managers to
the existing Highway 91. The express lane system has only keep tabs on traffic; for example, sending a tow truck to
one entrance and one exit, and it is totally operated with EC help a stranded car. Also, through knowledge of the traffic
technologies. The system works as follows: volume, pricing decisions can be made. Raising the price
Only prepaid subscribers can drive on the road. Subscribers as traffic increases ensures that the tollway will not be
receive an automatic vehicle identification (AVI) device jammed.
(based on RFID technology) that is placed on the rearview The system saves commuters between 40 and 90 minutes
mirror of the car. The device, about the size of a thick each day, so it is in high demand.
credit card, includes a microchip, an antenna, and a bat- An interesting extension of the system is the use of the
tery. A large sign over the tollway tells drivers the current same AVIs for other purposes. For example, they can be used in
fee for driving in the express lanes. In a recent year, it has paid parking lots. Someday you may even be recognized when
varied from $0.50 during slow-traffic hours to $3.25 during you enter the drive-through lane of McDonalds, and a voice
rush hours. will ask you, Mr. Smart, do you want your usual meal today?
Sensors in the pavement let the tollway computer know For similar wireless highway applications, see Dizikes
that a car has entered; the car does not need to slow or (2006).
stop. The AVI makes radio contact with a transceiver
installed above the lane. The transceiver relays the cars
identity through fiber-optic lines to the control center, Questions
where a computer calculates the fee for that days trip. 1. What is the role of the wireless component of
The system accesses the drivers prepaid account, and the this system?
fare is automatically deducted. A monthly statement is
2. What are the advantages of the system to commuters?
sent to the subscribers home.

REFERENCES FOR ONLINE FILE W9.19


91expresslanes.com (accessed November 2006).
Dizikes, P. Wireless Highway. Technology Review,
MarchApril 2006.
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 19

Online File W9.20 Examples of RFID Use

The following are some illustrative examples of RFID use:


Circuit City is embedding RFID tags into its loyalty cards. When customers enter a Circuit City location, their card is scanned
by a reader. A coupon dispenser at the door then dispenses specific coupons based on their past buying habits. Going further,
when the customers card is read, the store automatically knows that he or she was on the Circuit City Web site recently eval-
uating plasma TVs. So, when the customers card is read in the plasma TV section, Circuit City could offer the customer a $500
coupon right on the spot. For further details, see Schuman (2005) and Ulanoff (2005).
RFID in Federal Government/U.S. Department of Defense (DoD). Inventory tracking is a logistical challenge throughout the
armed services and federal agencies. At the same time, there is an urgent need to ensure the safety of military personnel and
improve security worldwide. The end result is that RFID-based applications in the federal government and defense sectors are
growing exponentially. RFID technology offers a viable solution with reliable, secure identification and tracing that integrates
into existing enterprise mobility systems. For example, the U.S. Marines Corps uses RFID to improve flows in its supply chains
(Ferguson 2004).
Tracking moving vehicles. The E-Z Pass prepay toll system uses RFID, as does Singapores Electronic Road Pricing system,
which charges different prices to drive on different roads at different times. IT at Work 6.3 provides an example of the use of
RFID technology for toll collection on a Los Angeles highway.
Tracking people. In some Japanese schools, tags in backpacks or clothes track students entry and departure from school
buildings. In Denmark, the Legoland amusement park offers parents a child-tracking system that combines RFID and Wi-Fi.
Beginning in 2006, all new U.S. passports contain an RFID tag that can be scanned upon entry and departure from the United
States (see attached photo).

U.S. Passport with RFID Chip

(continued)
20 Part 4: Other EC Models and Applications

Online File W9.20 (continued)

RFID in health care. IBM developed a system to prevent counterfeiting of drugs. The tags are attached to the drug containers.
MedTrack offers inventory tracking for hospitals. Next GENeSYS specializes in e-pharmacy and RFID. An RFID chip with patient
information (called SurgiChip) that will go with a patient into surgery (to help prevent errors) has been approved by the FDA.
RFIDs are also used for patient identification in hospitals.
Bookseller boosts sales. A Dutch book seller (Boekhandels Group) tags all books in its stores. Time spent taking inventory has
been reduced from 4 minutes per box to just seconds. Misplaced books are found quickly. The system also links to in-store
kiosks. Sales have increased by 12 percent.
Protecting secure areas. FedEx uses RFID-tagged wristbands to give drivers access to their vehicles, reducing theft and speed-
ing delivery time. The New York Police Department uses RFID tags embedded in ID tags to track visitors.
Improving supply chains. This is probably one of the most promising uses of RFID, as is illustrated in Chapter 7 and Fitzgerald
(2005).
Financial applications. RFID-embedded cell phones will soon replace your credit cards, cash, train passes, keys to your car and
home, business cards, and more (see Kharif 2006). DoCoMo of Japan introduced such a cell phone in 2004 (see Mann 2004).

REFERENCES FOR ONLINE FILE W9.20


Engadget.com. US Issues First RFID Passports. technology/content/mar2006/tc20060316_117677.
Engadget.com, March 13, 2006. engadget.com/2006/ htm (accessed June 2006).
03/13/us-issues-first-rfid-passports (accessed Mann, C. C. A Remote Control for Your Life. Technology
December 2006). Review, JulyAugust 2004.
Ferguson, R. B. Marines Deploy RFID. eWeek, November Schuman, E. Circuit Citys New Approach to Customer
15, 2004. eweek.com/article2/ 0,1759,1723353,00.asp Service. eWeek, January 17, 2005.
(accessed June 2006). Ulanoff, L. Bargain Hunting Online. PC Magazine,
Fitzgerald, M. True Believers (The Story of Kimberly- November 17, 2004.
Clark Corp.). CIO Insight, December 2005.
Kharif, O. Whats Lurking in that RFID Tag? Business-
Week Online, March 16, 2006. businessweek.com/
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 21

Online File W9.21 RFID Concerns

A major privacy concern regarding the use of RFIDs is that when individual items are tagged and then taken by customers from
the store it will be possible to track the customers movement (i.e., remote surveillance). Some consumer advocates recommend
that RFID tags be removed before a sale is recorded. However, this increases the cost to the store. It is currently very difficult
to track customers with RFID-tagged merchandise because the RFID readers have a very limited range from which they can
be read.
Neumann and Weinstein (2006) reviewed the potential dangers of RFID to privacy and examined other RFID-related con-
cerns regarding data integrity, personal well-being, and privacy. They claim that RFID tags may be counterfeited, duplicated,
swapped, damaged, intentionally disabled, or otherwise misused. The encryption protocols may be weak. In addition to the tags
themselves, their supporting databases can be misused, providing an opportunity for identity theft, fraud, harassment, and
blackmail. All these must be considered prior to implementation of an RFID system. For an RFID failure story, see Reda (2004).
RFID vendors already include a number of security features designed to address issues of consumer privacy. For example:
In most applications, RFID safety tags placed on cargo pallets or ID cards contain nothing more than a unique identifying num-
ber, much like a license plate on a car. Sensitive information is maintained in a separate database and protected by firewalls
and other security features.
To guard against unauthorized access, transmissions between RFID readers and safety tags can be protected by encryption and
authentication protocols. Generally, transmissions between an RFID reader and a back-end database also are encrypted to pro-
tect confidential and personal information.
Numerous states have pending legislation regarding privacy issues about RFID tags in retail goods. Most legislation is
RFID right to know. Such legislation requires disclosure of the use of RFID devices and personal information that is
gathered; labeling of retail products or packages containing RFID tags; point-of-sale removal of RFID tags; restrictions on
the aggregation and disclosure of personal information; and provisions for enforcement by a legal agency (RFID Public
Information Center, 2006).

REFERENCES FOR ONLINE FILE W9.21


Neumann, P. G., and L. Weinstein. Risks of RFID. RFID Public Information Center. RFID and Privacy.
Communications of the ACM, May 2006. rfidprivacy.mit.edu/access/happening_legislation.
Reda, S. Pradas Pratfall. Stores, June 2004. html (accessed June 2006).
22 Part 4: Other EC Models and Applications

ONLINE FILE W9.22


EMPOWERING ASSISTED-LIVING PATIENTS
Elderly residents in assisted-living facilities have various Frequency of trips to the bathroom (indicating medical
needs that require differing levels of care. Some residents problems such as infection)
require minimal assistance; others have short-term memory Length of absence from bed (indicating that the patient
problems and other health issues; and others have more may have fallen or be incapacitated in other ways)
severe problems, such as Alzheimers disease. At Elite Cares General location (indicating whether the resident is in an
Estates Cluster Residential Care Facility in Milwaukie, Oregon, acceptable area of the facility)
pervasive computing is being used to increase the autonomy One of the initial concerns with these monitors is that the
of all of its residents, regardless of their individual needs. privacy of the residents will be unnecessarily invaded. To alleviate
Elite Care (elite-care.com) is a family-owned business. this concern, residents and their families are given the choice of
It has been built from the ground up with the intent of participating or not. Most of them choose to participate because
providing high-tech, high-touch programs. Members of the the families believe that these monitors provide better tracking
facilitys advisory committee, which includes representatives and care. The monitors also increase the autonomy of all the
from the Mayo Clinic, Harvard University, the University of patients because it reduces the need for staff to constantly monitor
Michigan, the University of Wisconsin, and Sandia National residents in person, especially those with more acute care needs.
Laboratory, have contributed a number of ideas that have All of these sensors and systems are connected through
been put into practice. a high-speed Ethernet. The data produced by the sensors and
The entire facility is wired with a network of unobtru- systems are stored in an SQL database and can be used to
sive sensors that include biosensors (e.g., weight sensors) alert the staff in real-time if necessary. Although the data
attached to each residents bed; movement sensors embed- are not being used at the present time for analytical pur-
ded in badges worn by the residents and staff; panic buttons poses or to develop individualized programs, the facility
used to call for help; Internet access via touch screens in plans to work on these sorts of applications in the future.
each room; and climate control, lights, and other regulated
appliances. The biosensors and movement sensors enable the
staff to determine the following conditions and activities in Questions
caring for patients:
1. What are some of the pervasive devices used in the Elite
Weight loss (indicating conditions such as impending Care facility? What types of data do these devices provide?
congestive heart failure)
2. In what ways do these devices encroach upon the pri-
Restlessness at night (indicating conditions such as
vacy of the residents?
insufficient pain medication)

REFERENCES FOR ONLINE FILE W9.22


Elite Care. elite-care.com (accessed November 2006).
Stanford, J. Using Technology to Empower Assisted
Living Patients. Healthcare Review, July 2, 2002.
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 23

Online File W9.23 Smart Appliances and Clothes

Smart Appliances
One of the key components of the smart home initiative is the smart appliance, an Internet-ready appliance that can be con-
trolled by a small handheld device or desktop computer via a home intranet or the Internet.
One organization that is setting standards for smart appliances is the Internet Home Alliance (caba.org/iha). The alliances
mission is to accelerate the process of researching, developing, and testing new home products and services that require a
broadband or persistent connection to the Internet.
Appliance companies also are interested in capturing more information about the service life of the appliances they manu-
facture. In most cases, when an appliance is purchased and taken home, the manufacturer loses touch with the appliance
unless the customer registers the product for warranty purposes. A networked appliance potentially could provide the manufac-
turer, as well as the owner of the appliance, with information that could be used to monitor the appliances operation, perfor-
mance, and usage. In addition, the networked appliance could provide information for diagnostic purposes, such as for repairs
and troubleshooting (Lai 2006).
To date, however, consumers have shown little interest in smart appliances. As a result, manufacturers of these appliances
are focusing on improving peoples lives by eliminating repetitive, low-attention tasks.
Whether offerings of this sort will prove any more successful than the earlier generations of smart appliances is an open
question. In the near term, one of the biggest technical barriers to widespread adoption of smart appliances will continue to be
the fact that most homes lack a broadband connection to the Internet. The following example describes the commercial use of
smart appliances.
Imagine hooking up your washer and dryer to the Internet. To most homeowners, this would make as much sense as net-
working their refrigerators or microwaves. But what about hooking up washers and dryers in a laundromat? Would the payoff or
acceptance be any greater? For a few Internet laundry companies, the answer is yes.
USA Technologies (usatech.com) has teamed up with IBM to create a system called eSuds.net that eliminates a number of
the hassles and tedium associated with doing laundry. The system was tested at Boston College in 2002 and is currently avail-
able at Carnegie Mellon University, Cedarville University, and others. eSuds.net provides students with the following services:
Coin-free transaction options. Washing and drying can be paid for with a student ID or PIN card and charged to the students
account.
E-mail cell phone, PDA, or pager notification. When the washing or drying is done, the system notifies the student. Students
also can request notification when a specific washer and/or dryer becomes available.
A virtual view of the laundry room. Students can access a Web site that indicates which machines are available and the
status of each machine (i.e., number of minutes remaining).
Detergent and fabric softener injectables. Students do not need to provide detergent or fabric softener. These can be
purchased as part of the washing/drying service and injected directly from the machines into the students wash.
The e-Suds.net system also eliminates a number of the maintenance headaches encountered by the owner and operator of
a laundromat. With e-Suds.net, the laundromat operator can conduct virtually coin-free transactions (eliminating jammed
machines and reducing vandalism), monitor machine usage and performance, and service machines on an as-needed basis,
reducing service costs and machine down time. In addition, operators can better control costs by holding service employees
accountable for cash and inventory and can boost revenue by selling injected detergent and fabric softener as part of a wash.
Washing machine manufacturers are now offering similar services. Wash Alert (marketed by Alliance Laundry Systems for
Speed Queen machines) is being used at the Illinois Institute of Technology, Ohio University, and Ball State University.
LaundryView (marketed by Mac-Gray for Maytag machines) is being used at the University of Massachusetts and Morgan State
University (see a demonstration at demo.laundryview.com). All three companies are planning to market their systems to large
apartment complexes, a much larger but not as technologically sophisticated, market.
Some in the industry are skeptical as to just how successful these programs can be. They wonder, for example: What real,
perceivable benefits will the technology provide? Will consumers see smart washing machines as a justification for price
increases? According to Bonnema (2004), it has to be a benefit beyond the gee whiz factor that were seeing today.

Smart Clothes
Wearable computer devices were discussed in Section 9.6. In those examples, mobile computing devices were attached to cloth-
ing and safety gear. But what happens when computing technology is embedded in clothing?
One technique to make clothes smarter is to use RFID. For example, RFID tags are attached to clothing items for sale at
Pradas Epicenter stores in New York, San Francisco, and Los Angeles (Duan 2002). If a customer wants to know about a particu-
lar item, she can take the item toward one of the displays in the store. The RFID reader installed in the display automatically
reads the ID information on the tag and provides sketches, video clips of models wearing the item, and information about the
item (color, cut, fabric, materials, and availability). If a customer takes a garment into one of the dressing rooms, the tag is
(continued)
24 Part 4: Other EC Models and Applications

Online File W9.23 (continued)

automatically scanned and, again, information about the item will be displayed on an interactive touch screen in the dressing
room. The dressing rooms also have a video-based Magic Mirror. When the customer tries on the garment and turns around in
front of the mirror, images are captured and played back in slow motion. Incidentally, RFID tags attached to clothes can be
washed, ironed, and pressed (ITWorld.com 2006).
A similar application of RFID technology in clothes is on display at the Microsoft Home, a demonstration home in
Redmond, Washington. An RFID tag in a shirt can be read by a smart mirror and complementary ties and pants in the
wardrobe are identified. For children, the suitability of the item for a school dress code or a parental code can be displayed. On
laundry day, the tag provides cleaning instructions (Barron 2004).
Other initiatives are embedding the technology in the clothes rather than simply putting an RFID tag on the item. A wire-
less jacket from German clothier Rosner GmbH includes an MP3 player and hands-free cell phone with headphones and a micro-
phone built into the collar and a fabric control panel on the left sleeve. Other ideas recently introduced or under development
include smart socks (conductive wire in wool socks to warm up cold toes), electrotextiles (antennas sewn into soldiers vests for
communication), and body-sensing fabrics (a cotton T-shirt that can monitor the wearers heart rate, body temperature, and
other vital signs) (Eisenberg 2003).

REFERENCES FOR ONLINE FILE W9.23


Barron, J. Speak Clearly and Carry a Manual. New York Eisenberg, A. For the Smart Dresser, Electric Threads
Times, October 21, 2004. nytimes.com/2004/10/21/ that Cosset You. New York Times, February 6, 2003.
garden/21SOFT.html (accessed October 2004). nytimes.com/2003/02/06/technology/circuits/06next
Bonnema, L. How Smart Will Laundry Be? Appliance .html (accessed March 2005).
Magazine.com, September 2004. appliancemagazine. eSuds. esuds.net (accessed November 2006).
com/zones/consumer/04_laundry/editorial.php? ITWorld.com. Fujitsu Puts RFID Tags through the
article=577&zone=4&first=1 (no longer available Washer. May 18, 2006. wireless.itworld.com/4985/
online). 060518fujitsu/ (accessed November 2006).
Cabrera, A. Checking Laundry via the Internet. InfoTech Lai, E. Microsoft: Future Homes to Use Smart Appliances,
Tuesday, April 13, 2004. ksu.edu/InfoTech/news/ Interactive Wallpaper, ComputerWorld, September 29,
tuesday/archive/2004/0413.html#gem (accessed 2006.
November 2006). USA Technologies. High Tech Laundry and Leading-
Duan, M. Enhancing the Shopping Experience, One Edge Payment System Combine to Improve Laundry
$2,000 Suit at a Time. Mpulse, November 2002. Experience, May 24, 2006. usatech.com/ company_info/
cooltown.hp.com/cooltown/mpulse/1102-prada.asp news/usa_2006_05_24.php (accessed November 2006).
(accessed March 2005). Archived.

You might also like