Documentos de Académico
Documentos de Profesional
Documentos de Cultura
144 146 1 PB
144 146 1 PB
Jouni Markkula
UNIVERSITY OF JYVASKYLA, INFORMATION TECHNOLOGY RESEARCH INSTITUTE
FINLANDIA
Resumen
Los avances en Internet y redes inalámbricas y el rápido crecimiento del número de
equipos móviles han resultado en el crecimiento acelerado del comercio móvil. Conside-
ramos el comercio móvil como un subconjunto del comercio electrónico en el que las
transacciones se realizan utilizando un terminal móvil y una red inalámbrica. El usuario
de equipos móviles y sus requerimientos juegan un rol en el desarrollo del comercio
móvil, en adición al desarrollo tecnológico y el desarrollo de los marcos regulatorios.
Este documento aborda los requerimientos para el comercio móvil de un modo sistemá-
tico. Primero, establece el escenario del comercio móvil revisando los conceptos y re-
querimientos básicos. Luego introduce un metamodelo publicado con anterioridad y
consistente en cuatro esferas de interés: marcos regulatorios, modelos de negocios, in-
fraestructura global y tecnologías de apoyo. Los requerimientos para el comercio móvil
se agrupan por estas esferas y son analizados en este contexto. El énfasis se pone en
aquellos requerimientos que han de persistir. Se muestra que, muchos de ellos se origi-
nan en una esfera y luego se propagan a otra esfera, de modo que con frecuencia toman
una forma más concreta. La esfera de tecnologías de apoyo se refiere a las tecnologías
futuras que están siendo desarrolladas ahora para responder a los requerimientos que
surjan en el futuro.
nications. Wireless technologies com- (e.g. WWW), and services specially de-
bined with Internet-enabled terminals con- signed for mobile users (e.g. WAP, I-
stitute an ideal platform for the realiza- Mode). Terminals run TCP/IP end-to-end
tion of new types of business transactions. over a wireless bearer, or a special WAP
The small and light, yet powerful, mobile protocol suite to the WAP-gateway (WAP
terminals are almost always carried by Forum, 2002). Further convergence of the
their owners (like wallets). They can also IP and wireless technologies is anticipat-
store electronic cash, credit card informa- ed so that the future devices will be seam-
tion, tickets, certificates of the Public Key lessly integrated with the IP infrastructure.
Infrastructure (PKI), etc. Thus, they can This development started with earlier ver-
assume the role of an e-wallet, as well as sions released by 3GPP and was finalized
function as authentication and authoriza- with Release 5 (Kaaranen et al. 2002,
tion devices in various contexts. In addi- 3GPP 2002, MITA 2002a-c).
tion, the terminals can be located either
by using satellite technologies (e.g. GPS), Concerning related work, there are
terrestrial network facilities, or indoor many papers, books and reports that
mechanisms, based on WLAN/PAN tech- present requirements for various, mostly
nologies. Recent developments in these technical, aspects of M-commerce (E-Fac-
areas seamlessly extend the positioning of tors 2002, Kalakota and Robinson 2002,
wireless devices into several environ- MITA 2002a-b, Sadeh 2002, Varshney and
ments. Thus, services based on the loca- Vetter 2002). These are relevant to our
tion of the terminals, referred to as loca- work, but we are not going to repeat all
tion-based services (LBS), have become possible individual requirements that have
widely possible. They are a new service been established thus far in the cited
class for mobile computing and open new sources. The main contribution of this
business opportunities. For these reasons, paper is to present a systematic framework
the telecom industry has begun to call for the most persistent M-commerce re-
portable terminals, with the above func- quirements and show their origin and re-
tionalities, Personal Trusted Devices lationships. Our goal is not only to strati-
(PTD). fy requirements vertically, but also to in-
vestigate their life span. Some of them are
Digital convergence of various sepa- more fundamental than others, which
rate technologies is continuing. As an im- means that they originate at the legal lev-
portant indication of this, a portable high- el or are dictated by, for example, the laws
end terminal can basically host any other of nature (bandwidth scarcity). Many re-
miniature device, such as a video camera. quirements are actually established at the
Game consoles combined with a terminal regulatory or business level and must find
are already on the market. These devel- their implementation at the technical lev-
opments will have considerable, yet large- el. These are usually more persistent than
ly unknown, effects on M-commerce in those emerging, for example, from the re-
the future. Another convergence path is strictions of a particular network or ter-
the emergence of common IP-based core minal generation.
networks. The Internet-enabled wireless
terminals are already able to access ser- The paper is organized as follows. In
vices designed for normal Internet users Section 2 we discuss the basic definitions
of M-business and related concepts, the this context is a statement that holds in-
definition of requirement, and introduce variably for an entity during its lifetime.
the framework model. In Sections 3, 4, 5, An entity can be a distributed system, a
and 6 we look at the requirements for the terminal, a company, a state, or even an
four spheres of concern. Section 7 presents international organization. We adopt a
our conclusions. rather general definition of the term re-
quirement.
Business Models
Regulatory
Frameworks Global Infraestructure
Enabling Technologies
We use the model introduced earlier of the world will progress at different
in Veijalainen and Weske (2003) as the paces.
framework to group requirements. Its ba-
sic structure is presented in Figure 1. • Enabling Technologies: This sphere
includes emerging technologies for
• Regulatory Frameworks: The organi- user terminals and network technolo-
zational and technical aspects of laws, gies, such as cryptography, privacy-
standards and recommendations, as protecting technologies, positioning
well as the bodies involved in their with high accuracy, and new batteries
definition. The main actors here are and other energy sources for the ter-
international organizations, such as minals. It also includes standardiza-
OECD and EU, governments, stan- tion and business interest groups and
dardization bodies (ISO, ANSI, ETSI), other organizations developing these
and interest groups formed by diverse emerging technologies. Typical exam-
industry sectors to develop standards, ples are 4G (and beyond) technolo-
such as 3GPP (3GPP 2002) and Open gies, that are currently being re-
Mobile Software Alliance (Open Mo- searched, and that will later move into
bile Software Alliance 2003). standardization.
go deeply into this area, although it is of llect VAT from its own citizens, no
outmost practical relevance. We pick some matter which channel they choose to
aspects mostly related with the require- use. Non-residents are basically exempt
ments from the Regulatory Frameworks from VAT. The USA has allowed E-
sphere. Thus, the possible BMs must be commerce to be tax-free since 1998.
compatible with the applicable law and Japan levies a 5% tax on E-commerce
code of conduct. As the rules are territo- transactions, as well as on other pur-
rial, heterogeneity between different re- chases by residents. Non-residents are
gions in the world is bound to appear, un- exempt. In the EU, the VAT varies
less deliberate countermeasures are taken. from country to country and it can be
different for different commodities in
General requirements for BMs are: the same country. Unless taxation is
uniformly handled for all customers,
• Support for IPR in the BM. One must it presents a problem for all players.
specify what rights are and are not
transferred to the customer when a M- The mobile technology makes possi-
commerce transaction is performed. ble anytime, anywhere access to M-com-
merce infrastructure. As above, this
• The authentication and authorization should be understood as a requirement at
of the customer and authentication of the BM level. The BMs applied in M-com-
the merchant. The authentication of merce should be such that the customer is
the merchant is primarily required for served at any time no matter where he re-
customer protection purposes. The au- sides or moves to. From this requirement
thentication of the customer is prima- and the free user movement stated above,
rily required for protection of both the one can deduce that:
merchant and the customer.
• Global coverage must be available for
• Support for consumer protection. This the global infrastructure (network) ser-
requirement begins at the Regulatory vices.
Framework level. It means that BMs
must take into consideration the rights • Primarily automated services at the
of a customer to return the goods pur- server (merchant) side are needed. This
chased, refuse to pay non-delivered requirement is valid for the entire M-
services and preserve privacy. In this commerce infrastructure. Without con-
respect the Automatic dispute resolu- tinuous accessibility, the M-commer-
tion mechanism suggested by the EU ce infrastructure is rather useless for
(European Union 2003a) is notewor- global operation.
thy. Consumer trust is interrelated with
protection. In addition, users must be able to ac-
cess the services with a single terminal,
• Support for appropriate taxation. This i.e. a PTD. One can further establish the
is important for roaming customers, following:
as they are often exempt from the Va-
lue Added tax (VAT) or similar con- • Roaming contracts between the net-
sumption taxes. The EU wants to co- work operators, making it possible for
users to access both the local services 5. Requirements for the Global
and their home network services or Infrastructure
Internet services irregardless of their
physical location. The global infrastructure changes over
time. Figure 2 presents a schematic, tech-
• Support for the global electronic pay- nology-oriented network view of the glo-
ment infrastructure so that the local bal infrastructure. The view corresponds
services can be reasonably acquired to the situation in a few years from now,
by roaming customers. after the backbone network has conver-
ged to the «ALL-IP» network envisaged
• A multilingual M-commerce service by 3G standardization (Kaaranen et al.
provision so that the roaming custo- 2002, 3GPP 2002).
mers can actually access the local ser-
vices and use them. The wireline infrastructure in Figure
2 that serves resource-rich terminals is
It is worth noticing that requirements also used by mobile terminals. The black
for a BM are different in different parts line separating the «ALL-IP» area into
of the M-commerce value network. In this two regions emphasizes the separation of
section, the emphasis is on the actors that the IP-networks from operator-control and
have a direct relationship with customers. from the «global Internet». Vertically, the
Wireless Wired
Access Networks Access Networks
Mobile Wired
terminals terminals
is not possible. At the higher protocol tection mechanism to the PKI objects
levels, WAP 1.x stack or TCP/ stored into the WIM module.
IP+HTTP(S) (i.e. WAP 2.x) should
run. Further, support for short-range 2G/3G terminals encrypt outgoing
wireless technologies (Infrared, Blue- voice and data traffic so that basic priva-
tooth) is required for payment and tic- cy and security protection are provided at
keting applications. At the highest ar- the air interface. But this is not sufficient
chitectural level, compliance with the for end-to-end message security and pri-
mobile Internet standards, specified vacy. The terminal must be able to encrypt
by OMA (Open Mobile Software and decrypt the wireless data traffic at the
Alliance 2003) and related bodies, application level using PKI and/or other
should be available. mechanisms, such as SSL or TSL
(HTTPS).
The requirements originating at the Re-
gulatory Framework sphere, such as An optional requirement for terminals
individual privacy and security, must is payment support, including credit card
find adequate technical support in ter- information stored into the handset, an
minals. Furthermore, the additional electronic wallet storing cash for micro-
requirements originating within the payments and support for tickets (Mobile
Business Models sphere must also be Electronic Transactions Forum 2002).
supported. These include:
Another set of requirements refers to
• Authentication and authorization su- LBS. The primary functionality required
pport. Terminal authentication is han- by a terminal is the capability to position
dled by the 2G/3G networks. For ba- itself. This can be based on satellite or
sic voice and data services that are network-based positioning (Kaaranen et
billed afterwards, this is a functio- al. 2002). The former requires that the ter-
ning option. But this is not enough minal be enhanced with a GPS receiver.
for M-commerce services in general, Most of the network positioning methods
because the servers providing servi- also require enhancements in the termi-
ces over Internet (cf. Figure 2), or nals’ functionality. Should terminal posi-
over a short-range wireless connec- tioning be possible, it is required that the
tion, cannot obtain the terminal iden- terminal provides adequate privacy pro-
tity. Besides, even if they could ob- tection means. These include the possibi-
tain it, the connection between the lity to prohibit tracking by an external
terminal identity and the identity of entity. Tracking of the terminal for emer-
the person using it remains unconfir- gency purposes should, however, always
med. Thus, there must be end-to-end be possible.
user authentication support at the
application level. This requires either
server-side login with password or use 6. Requirements for Emerging
of one of the PKI certificates stored Technologies
at the terminal. The latter option brings
up an extra requirement for the termi- The Enabling Technologies in the fra-
nal; it must offer an appropriate pro- mework model presented in Veijalainen
and Weske 2003 are the non-deployed ks are at the heart of this development.
existing and emerging technologies that Whereas wireless access technologies
have relevance for the M-commerce. shown in Figure 2 are currently separate
Which technologies are of relevance de- and not fully integrated with the «All-IP»
pends on many factors, including the re- backbone, the goal is to make them sea-
gulations in force within a certain geogra- mless. The number of access technologies
phic region, cultural issues, economic depicted in Figure 2 will not necessarily
situation of the users, etc. increase in the future, although new tech-
nologies, such as 4G, will emerge. At the
One of the most important factors in same time, networks based on older tech-
this respect seems to be terminal develo- nologies will disappear from the global in-
pment, which has made it possible to en- frastructure. It is extremely difficult to
hance the terminals’ functionality beyond predict when this will happen and what
voice traffic without sacrificing portabi- degree of heterogeneity (i.e. number of
lity. Steps in this development have been different wireless access and data trans-
miniaturization of the hardware in gene- mission technologies) the global infras-
ral. This has made possible large memo- tructure will exhibit at a certain time.
ries, faster processors the integration of
GPS hardware and software (e.g. Bene- One can argue that the technical requi-
fon), radio receivers, etc. On the other rements for the terminals and for the new
hand, the development of operating sys- global infrastructure will mainly arise
tems with small memory requirements from the convergence of different network
(e.g. Symbian) and advances in software technologies. This has been recognized by
platforms for small devices have vastly manufacturers that are working in diffe-
enhanced the application range usable on rent forums (e.g. OMA) to cater to this
those terminals. All these factors together need. There are also initiatives, such as
contribute to the proliferation of various Mobile Internet Technical Architecture
contents and, thus, of M-commerce. Fur- (MITA), being pursued by a single manu-
thermore, it is realistic to run the compli- facturing company (MITA 2002a, MITA
cated PKI and other encryption and de- 2002b, MITA 2002c).
cryption algorithms with long keys deve-
loped for resource-rich environments on Orthogonal to the above consideratio-
small terminals. ns, terminals should have a longer ope-
rating time than they currently do when
An important concept that drives te- concerning battery characteristics.
chnology and business development is
digital convergence. It means, firstly, that On the other hand, users tend to have
digital control and information processing phone numbers, e-mail addresses, etc. The
conquers new areas from car engines and convergence of networks raises the ques-
communication networks to tiny «proces- tion of whether one could have a single
sor dust» devices. Secondly, the previo- user identity at the technical level (MITA
usly separate technologies converge into 2002a-c). This idea would have many fur-
interoperable or even integrated seamless ther ramifications for privacy, security
technologies. Terminal development is an etc., as well as at the BM and the techno-
example of this. Communication networ- logy level.
References
AARNIO, A., et al. (2002). Policy and Regu- HEDMAN, J. and T. KALLING (2002). Be-
latory Guidelines for Mobile Commerce. hind the Scenes of E-business Construct.
MobiCom Project Report. In Proceedings of 4th International Con-
ference on Electronic Commerce, Hong-
DURLACHER RESEARCH LTD. (2000). Kong. Online at http://www.wayneyeung.
Mobile Commerce Report. Online at com/files/papers/FP-042.pdf.
http://www.durlacher.com.
JAPAN MINISTRY OF ECONOMY, TRADE
E-FACTORS, IST-2001-34868 (2003). Deli- AND INDUSTRY (METI) (2002). Inter-
verable 3.1. E-Factors Report Part 1: pretative Guidelines on Electronic
Overview and Current Trends on E-Busi- Commerce. Online at http://www.meti.
ness Models in Europe. Online at go.jp/english/information/data/
http://www.e-factors.net/. c0205EleCome.pdf.