Information Technology and Management

, Volume 13, Issue 2, pp 91–111 | Cite as

Context management for m-commerce applications: determinants, methodology and the role of marketing

  • Poulcheria Benou
  • Costas Vassilakis
  • Adam Vrechopoulos
Article

Abstract

Studying consumer behaviour and usage of environmental determinants in the mobile services domain contributes to the identification of context information which is critical for the effective operation of mobile commerce applications. Exploiting this information towards providing enhanced and innovative mobile services offers a competitive advantage within the highly demanding domain of m-commerce applications. However, in order to effectively exploit such context information, there is a need to design the necessary methods, software tools and information systems that will be employed for collecting, processing and disseminating this information. In this paper we develop a theoretical framework which defines the context information necessary for m-commerce applications, taking into account relevant marketing dimensions as well as privacy protection perspectives. Then, this framework is operationalized through the design of an appropriate software architecture which enables the standardization and management of context information.

Keywords

Mobile commerce Consumer behaviour Innovative services Context-awareness Adaptivity Privacy Mobile business 

References

  1. 1.
    Alanen J, Autio E (2002) Mobile business services: a strategic perspective. In: Mennecke BE, Strader TJ (eds) Chapter in Mobile commerce: technology, theory, and applications, Idea Group 2002. ISBN: 1591400449Google Scholar
  2. 2.
    Avery C, Zeckhauser R (1997) Recommender systems for evaluating computer messages. Commun ACM 40(3):88–89CrossRefGoogle Scholar
  3. 3.
    Badrinath B, Fox A, Kleinrock L, Popek G, Reiher P, Satyanarayanan M (2000) A conceptual framework for network and client adaptation. IEEE Mobile Netw Appl (MONET) 5(4):221–231CrossRefGoogle Scholar
  4. 4.
    Benou P, Bitos V (2008) Developing mobile commerce applications. J Electron Commer Organ 6(1):63–78CrossRefGoogle Scholar
  5. 5.
    Benou P, Vassilakis C (2010) The conceptual model of context for mobile commerce applications. Electron Commer Res 10(2):139–165CrossRefGoogle Scholar
  6. 6.
    Blount M, Davis J, Ebling M, Jerome W, Leiba B, Xuan L, Misra A (2008) Privacy engine for context-aware enterprise application services. In Proceedings of IEEE/FIP international conference on embedded and ubiquitous computing, pp 94–100Google Scholar
  7. 7.
    Brown J, Bovey J, Chen X (1997) Context-aware applications: from the laboratory to the marketplace. IEEE Pers Commun 4(5):58–64CrossRefGoogle Scholar
  8. 8.
    Brown R, Ryu H, Parsons D (2006) Mobile helper for university students: a design for a mobile learning environment. In: Proceedings of the 18th Australia conference on computer-human interaction: design activities, artefacts and environments, pp 297–300Google Scholar
  9. 9.
    Bulander R, Decker M, Schiefer G, Kolmel B (2005) Comparison of different approaches for mobile advertising. In: Proceedings of the 2005 second IEEE international workshop in mobile commerce and services, pp 174–182Google Scholar
  10. 10.
    Butter T, Deibert S, Rothlauf F (2006) Using private and public context—an approach for mobile discovery and search services. In: Kirste T, Koenig-Ries B, Pousttchi K, Turowski K (eds) Mobile Informationssysteme—Potentiale, Hindernisse, Einsatz im Rahmen der Multikonferenz Wirtschaftsinformatik (MKWI), pp 144–155Google Scholar
  11. 11.
    Camponovo G, Pigneur Y (2003) Business model analysis applied to mobile business. In: Proceedings of the 5th international conference on enterprise information systems (ICEIS 2003), AngersGoogle Scholar
  12. 12.
    Churchill EF, Munro AJ (2001) Work/place: mobile technologies and arenas of activity. SIGGROUP Bull 22:3–9Google Scholar
  13. 13.
    Cranor L, Langheinrich M, Marchiori M (2002) A P3P preference exchange language 1.0 (APPEL1.0) W3C working draftGoogle Scholar
  14. 14.
    Cranor L et al (2004) The platform for privacy preferences 1.1 (P3P1.1) specification W3C working draftGoogle Scholar
  15. 15.
    Dey A, Abowd G (1999) Towards a better understanding of context and context-awareness. Technical report 99-22, Georgia Institute of TechnologyGoogle Scholar
  16. 16.
    Dunlop M, Brewster S (2002) The challenge of mobile devices for human computer interaction. Pers Ubiquitous Comput 6(4):235–236CrossRefGoogle Scholar
  17. 17.
    Eldin A, Wagenaar R (2006) A privacy preferences architecture for context aware applications. In: Proceedings of IEEE international conference on computer systems and applications, pp 1110–1113Google Scholar
  18. 18.
    European Commission, Data Protection Directive 95/46/EC, http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
  19. 19.
    Evans ND (2001) Business agility: strategies for gaining competitive advantage through mobile business solutions. FT Press. ISBN: 9780130668370Google Scholar
  20. 20.
    Fahy P, Clarke S (2004) Cass - middleware for mobile context-aware applications. In: Proceedings MobiSys workshop on context awarenessGoogle Scholar
  21. 21.
    FIPA Gateways TC (2001) FIPA device ontology specification. http://www.fipa.org/specs/fipa00091/PC00091A.html
  22. 22.
    Giaglis G (2005) Mobile business: technologies, applications, and markets. Butterworth-Heinemann, ISBN:0750659130Google Scholar
  23. 23.
    Good M, Whiteside J, Wixon D, Jones S (1984) Building a user-derived interface. Commun ACM 27(10):1032–1043CrossRefGoogle Scholar
  24. 24.
    Gray P, Salber D (2001) Modelling and using sensed context in the design of interactive applications. In: 8th IFIP conference on engineering for human-computer interaction, TorontoGoogle Scholar
  25. 25.
    Gruhn V, Köhler A (2007) Modeling and analysis of mobile business processes. J Enterp Inf Manag 20(6):657–676. doi:10.1108/17410390710830718 Google Scholar
  26. 26.
    Gu T, Pung HK, Zhang DQ (2004) A middleware for building context-aware mobile services. In: Proceedings of IEEE vehicular technology conferenceGoogle Scholar
  27. 27.
    Henricksen K, Indulska J, Rakotonirainy A (2002) Modeling context information in pervasive computing systems. In: Mattern F, Naghsineh M (eds) 1st international conference on pervasive computing (pervasive), LNCS, vol 2414. Springer, New York, pp 167–180Google Scholar
  28. 28.
    Hofer T, Schwinger W, Pichler M, Leonhartsberger G, Altmann J (2002) Context-awareness on mobile devices—the hydrogen approach. In: Proceedings of the 36th Hawaii international conference on system sciencesGoogle Scholar
  29. 29.
    Hoffer J, Prescott M, McFadden F (2004) Modern database management, 7th edn. Prentice Hall, CambridgeGoogle Scholar
  30. 30.
    Honle N, Kappeler P, Nicklas D, Schwarz T, Grossmann M (2005) Benefits of integrating meta data into a context model. In: 3rd IEEE international conference on pervasive computing and communications workshops, pp 25–29Google Scholar
  31. 31.
    Jendricke U, Markotten D (2000) Usability meets security—the identity-manager as your personal security assistant for the internet. In: Proceedings of the 16th annual computer security applications conference, pp 344–353Google Scholar
  32. 32.
    Kaikkonen A, Kallio T, Kekäläinen A, Kankainen A, Cankar E (2005) Usability testing of mobile applications: a comparison between laboratory and field testing. J Usability Stud 1(1):4–16Google Scholar
  33. 33.
    Kakihara M, Sørensen C (2002) Mobility: an extended perspective. In: Proceedings of the 35th Hawaii international conference on system sciences, IEEEGoogle Scholar
  34. 34.
    Kalakota R, Robinson M (2001) E-business 2.0: roadmap for success. Addison-Wesley Professional. ISBN: 0201721651Google Scholar
  35. 35.
    Kalloniatis C, Kavakli E, Gritzalis S (2005) Dealing with privacy issues during the system design process. In: Proceedings of the fifth IEEE international symposium on signal processing and information technology, Athens, GreeceGoogle Scholar
  36. 36.
    Kalloniatis C, Kavakli E, Gritzalis S (2008) Addressing privacy requirements in system design: the PriS method. Requir Eng 13:241–255. doi:10.1007/s00766-008-0067-3 CrossRefGoogle Scholar
  37. 37.
    Kim H, Chan HC, Gupta S (2007) Value-based adoption of mobile internet: an empirical investigation. Decis Support Syst 43(1):111–126CrossRefGoogle Scholar
  38. 38.
    Köhler A, Gruhn V (2004) Analysis of Mobile Business Processes for the design of mobile information systems. E-Commerce and web technologies, Lecture Notes in Computer Science, vol 3182/2004, pp 109–130. doi: 10.1007/978-3-540-30077-9_24
  39. 39.
    Korpipää P, Mäntyjärvi J (2003) An ontology for mobile device sensor-based context awareness. In: Proceedings of CONTEXT, Lecture Notes in Computer Science, vol 2680, pp 451–458Google Scholar
  40. 40.
    Korpipää P, Mäntyjärvi J, Kela J, Keränen H, Malm EJ (2003) Managing context information in mobile devices. IEEE Pervasive Comput 2(3):42–51CrossRefGoogle Scholar
  41. 41.
    Koukia S, Rigou M, Sirmakessis S (2006) The role of context in m-commerce and the personalization dimension. In: Proceedings of the 2006 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology, pp 267–276Google Scholar
  42. 42.
    Koutsiouris V, Vlachos P, Vrechopoulos A (2004) Developing and evaluating mobile entertainment applications: the case of the music industry. In: Rauterberg M (ed) Proceedings: Lecture Notes in Computer Science LNCS, vol 3166, International conference of entertainment computingGoogle Scholar
  43. 43.
    Koutsiouris V, Vrechopoulos A (2009) Consumer behaviour in location-based mobile retail services: a multidisciplinary approach. European association of education and research in commercial distribution (EAERCD) 15th international conferenceGoogle Scholar
  44. 44.
    Koutsiouris V, Vrechopoulos A (2009) Developing a user typology in the context of location based mobile services: a multidisciplinary research approach. Mediterranean Conference on Information SystemsGoogle Scholar
  45. 45.
    Koutsiouris V, Polyxronopoulos K, Vrechopoulos A (2007) Developing 3G location based services: the case of an innovative entertainment guide application. In: 6th international conference on mobile businessGoogle Scholar
  46. 46.
    Kurkovsky S, Harihar K (2006) Using ubiquitous computing in interactive mobile marketing. Pers Ubiquitous Comput 10(4):227–240CrossRefGoogle Scholar
  47. 47.
    Love S (2005) Understanding Mobile Human-Computer Interaction, Elsevier Information Systems Series (ISS). Butterworth-Heinemann, NewtonGoogle Scholar
  48. 48.
    MacDonald D (2003) NTT DoCoMo´s i-mode: developing win–win relationships for mobile commerce. In: Mennecke BE, Strader T (eds) Mobile commerce: technology, theory, and applications, pp 1–25Google Scholar
  49. 49.
    Malhotra A, Kubowicz Malhotra C (2009) A relevancy-based services view for driving adoption of wireless web services in the U.S. Commun ACM 52(7):130–134CrossRefGoogle Scholar
  50. 50.
    Malhotra A, Segars AH (2005) Investigating wireless web adoption patterns in the U.S. Commun ACM 48(10):105–110CrossRefGoogle Scholar
  51. 51.
    Miles R, Hamilton K (2006) Learning UML 2.0. O’Reilly Media Inc, CambridgeGoogle Scholar
  52. 52.
    Munawar H (2006) A collection of privacy design pattern. In: Proceedings of the 2006 conference on Pattern languages of programs (PLoP ‘06)Google Scholar
  53. 53.
    Myles G, Friday A, Davies N (2003) Preserving privacy in environments with location-based applications. IEEE Pervasive Comput 2(1):56–64CrossRefGoogle Scholar
  54. 54.
    Oyomno W, Jäppinen P, Kerttula E (2009) Privacy implications of context-aware services. In: Proceedings of the fourth international ICST conference on communication system software and middlewareGoogle Scholar
  55. 55.
    Pascoe J (1998) Adding generic contextual capabilities to wearable computers. In: 2nd international symposium on wearable computers, pp 92–99Google Scholar
  56. 56.
    Pearson S, Shen Y (2010) Context-aware privacy design pattern selection. In: Katsikas S, Lopez J, Soriano M (eds) Trust, privacy and security in digital business, LNCS, vol 6264/2010, pp 69–80. doi:10.1007/978-3-642-15152-1_7
  57. 57.
    Rao B, Minakakis L (2003) Evolution of mobile location based services. Commun ACM 16(12):61–65CrossRefGoogle Scholar
  58. 58.
    Reichle R, Wagner M, Khan M, Geihs K, Lorenzo J, Valla M, Fra C, Paspallis N, Papadopoulos G (2008) A comprehensive context modeling framework for pervasive computing systems. In: Proceedings of the 8th IFIP international conference on distributed applications and interoperable systems (DAIS’08), LNCS, vol 5053. Springer, Oslo, Norway, pp 281–295Google Scholar
  59. 59.
    Schilit B, Adams N, Want R (1994) Context-aware computing applications. In: 1st international workshop on mobile computing systems and applications, pp 85–90Google Scholar
  60. 60.
    Schmidt A (2005) Interactive context-aware systems interacting with ambient intelligence. In: Chapter in the ambient intelligence: the evolution of technology, communication and cognition towards the future of human-computer interaction. IOS Press, Amsterdam, pp 159–178Google Scholar
  61. 61.
    Schmidt A, Van Laerhoven K (2001) How to build smart appliances? IEEE Pers Commun 8(4):66–71CrossRefGoogle Scholar
  62. 62.
    Scornavacca E, Barnes J, Huff L (2006) Mobile business research published in 2000-2004: emergence, current status, and future opportunities. Communications of the association for information systems: vol 17, Article 28, Available at http://aisel.aisnet.org/cais/vol17/iss1/28
  63. 63.
    Strang T, Linnhoff-Popien C (2004) A context modeling survey. In: 1st international workshop on advanced context modelling, reasoning and managementGoogle Scholar
  64. 64.
    Tarasewich P (2003) Designing mobile commerce applications. Commun ACM 46(12):57–60CrossRefGoogle Scholar
  65. 65.
    Tatli EI, Stegemann D, Lucks S (2005) Security challenges of location-aware mobile business. In: Proceedings of the second IEEE international workshop on mobile commerce and services (WMCS ‘05), pp 84 –95Google Scholar
  66. 66.
    Tatlı E, Stegemann D, Stefan L (2005) Dynamic anonymity. In: Proceedings of the 4th world Enformatika conference: international conference on information security, WEC’05Google Scholar
  67. 67.
  68. 68.
    Ting Y, Li N, Antón AI (2004) A formal semantics for P3P. ACM workshop on secure web services, October 29, 2004, Fairfax VA, USAGoogle Scholar
  69. 69.
    Tombs A, Kennedy J (2003) Social-servicecape conceptual model. Market Theory 3(4):447–475CrossRefGoogle Scholar
  70. 70.
    Torsten J. Gerpott (2002) Wettbewerbsstrategische Positionierung von Mobilfunknetzbetreibernim Mobile Business (in German). In: Silberer, Günter/Wohlfahrt, Jens/Wilhelm, Torsten (Hrsg.), Mobile Commerce. Grundlagen, Geschaftsmodelle, Erfolgsfaktoren, pp 43–63Google Scholar
  71. 71.
    Trimi S, Sheng H (2008) Emerging trends in M-government. Commun ACM 51(5):53–58Google Scholar
  72. 72.
    UK Government, Data Protection Act 1998, http://www.legislation.gov.uk/ukpga/1998/contents
  73. 73.
    Valiente P, van der Heijden H (2002) A method to identify opportunities for mobile business processes. Stockholm school of economics, SSE/EFI working paper series in business administration, 10, (2002). Available at http://swoba.hhs.se/hastba/papers/hastba2002_010.pdf
  74. 74.
    Venkatesh V, Ramesh V (2006) Web and wireless site usability: understanding differences and modeling use. MIS Q 30(1):181–205Google Scholar
  75. 75.
    Venkatesh V, Ramesh V, Massey AP (2003) Understanding usability in mobile commerce. Commun ACM 46(12):53–56CrossRefGoogle Scholar
  76. 76.
    Vuolle M, Tiainen M, Kallio T, Vainio T, Kulju M, Wigelius H (2008) Developing a questionnaire for measuring mobile business service experience. In: Proceedings of MobileHCI 2008, September 2–5, Amsterdam, the Netherlands, pp 53–62Google Scholar
  77. 77.
    Wamba F, Bendavid Y, Lefebvre A, Lefebvre E (2006) RFID technology and the EPC network as enablers of mobile business: a case study in a retail supply chain. Int J Netw Virtual Organ 3(4):450–462CrossRefGoogle Scholar
  78. 78.
    Weiser M (1991) The computer of the 21st century. Sci Am 265:66–75CrossRefGoogle Scholar
  79. 79.
    Westin A (1967) Privacy and freedom. Atheneum, New YorkGoogle Scholar
  80. 80.
    White I (1994) Rational rose essentials: using the Booch method. Benjamin-Cummings Publishing Company; Har/Dis editionGoogle Scholar
  81. 81.
    Wirth N (1971) Program development by stepwise refinement. Commun ACM 14(4):221–227Google Scholar
  82. 82.
    Zeimpekis V, Giaglis G, Lekakos G (2003) A taxonomy of indoor and outdoor positioning techniques for mobile location services. ACM SIGECOM Exch 3(4):9–27Google Scholar
  83. 83.
    Zhou T (2008) The impact of privacy concern on m-commerce user acceptance. In: Proceedings of the 3rd international conference on grid and pervasive computing, pp 245–249Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  • Poulcheria Benou
    • 1
  • Costas Vassilakis
    • 1
  • Adam Vrechopoulos
    • 2
  1. 1.Department of Computer Science and TechnologyUniversity of PeloponneseTripoliGreece
  2. 2.Department of Management Science and Technology, ELTRUN-IMES (Interactive Marketing and Electronic Services) Research Group, ELTRUN-The E-Business Research CenterAthens University of Economics and BusinessAthensGreece

Personalised recommendations