Database Reference
In-Depth Information
do not require a synchronous communication, but they are likely to be attended to as
soon as possible due to most people's proximities to their phones.
Regarding social interactions, mobile phones lack certain elements of human
interaction such as tone of voice, body language, facial expression, and touch, which
results in a loss of communication quality. People have also integrated mobile
phones in the “culture of lying,” using text messages pretending to have a meeting
while dating, or staying at work while socializing. In certain situations, mobile
phones are seen as a disruptive technology, such as when someone is using a
bewildering ring tone, shouting and pacing in public places while on the phone, or
answering the phone while talking with others, or at a meeting, or attending a lecture.
11.3.2 Commercial Identity
In recent years, several technologies concerning commercial identity using the
mobile phone have been developed. Mobile payment is one of the most rapidly
adopted alternative payment methods, especially in Asia and Europe, where credit
cards are not so used for small and daily payments. There are four primary mobile
payment models:
l Premium SMS-based transactional payments
l Direct mobile billing
l Mobile Eeb payments
l Contactless NFC
According to Gartner [ 65 ], there were 74.4 million mobile payment users in
2009, which is expected to increase and exceed 190 million users by 2012,
representing more than 3% of all mobile device users. According to that report,
“the most profound impact of mobile payment services is that they provide the non-
banking population with access to modern financial services, providing tools to
improve their living standards.”
In addition to mobile payments, mobile phones allow users to access other
financial services such as bank transactions, be notified when charged with large
payments, transfer money, etc.
11.3.3 Protecting Privacy
Mobile phones in our everyday lives have also given rise to privacy issues, as they
are a perfect tool for tracking others. As mobile phones are used for the storing of
private information (contacts, e-mails, and personal documents), they are susceptible
to theft. The inclusion of cameras on almost every last generation phone has
become a threat to personal privacy and intellectual property and has changed the
way we behave in certain situations.
Search WWH ::




Custom Search