M-commerce and Its Applications in Business Success: An Analysis

Verified

Added on  2021/04/21

|14
|3318
|54
Essay
AI Summary
This essay delves into the multifaceted world of M-commerce, examining its applications and impact on business success. It highlights the growing trend of businesses leveraging mobile commerce and mobile applications to enhance their operations and reach consumers. The essay focuses on the critical role of information system management in M-commerce, exploring both the positive and negative impacts of this technology. A key area of focus is the security challenges associated with M-commerce, including data breaches and consumer trust issues. The essay discusses the importance of addressing these security concerns to achieve commercial success. Furthermore, the essay analyzes real-world examples of M-commerce implementations, such as the Flipkart Big Billion Day, and the challenges faced, such as security and usability issues. The essay concludes by emphasizing the need for businesses to adopt appropriate information system strategies and security measures to maximize the benefits of M-commerce.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: M-COMMERCE
M-commerce and its applications in business successes
Name of the student:
Name of the university:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1M-COMMERCE
Abstract
This essay reflects the importance of identifying appropriate M-commerce management issues
and their respective solution to gain measurable success in the organizational operations. In
addition to this, this essay is focused on how the businesses are negatively impacted by M-
Commerce applications. Besides the negative impacts, there are different technical and
behavioral approaches also for the implementation of the appropriate Information management
system. Security is defined as one of the significant issues that are needed to be resolved by the
business organizations for gaining measurable success. Thus, it can be said that in order to
achieve commercial success in the businesses the companies should adopt Mobile apps besides
the E-commerce websites.
Keywords: Information system, mobile application, M-commerce, security
Document Page
2M-COMMERCE
Introduction and context
Currently, the growing application of Mobile commerce (referred to as sales of goods and
services through mobile devices) is bringing success in many old as well as startup businesses. In
other words, M-commerce Information System is referred to as a combination of E-commerce
application and Wireless Web. This technology is both positively and negatively impacting the
businesses. The widespread usage of Mobile phones has provided a dramatic transaction to
Mobile apps thus this particular topic has been chosen for evaluation.
Due to the proliferation of mobile devices usability currently most of the large to medium
business activities are focusing on information system management regarding M-commerce
application along with the E-commerce. In order to deliver better service to the consumers most
of the business organizations are concentrating on developing their mobile app.
Usage of M-commerce is beneficial from the business perspectives but at the same time
business can also be negatively impacted by M-commerce Information System. This particular
essay reflects the issues associated with M-commerce Information System (IS) that interrupts the
business success. In the current technology era, this is one of the significant concerns of
business. Thus, immediately after the identification of different issues to M-Commerce (IS),
proper strategies are needed to be implemented.
Information system management issue
Security is referred to as an enabling factor in M-commerce. While turning on any
handset, GSM gives a comparatively secured connection through the help of Personal
Identification Number (PIN). The adoption of the M-commerce application moderates
individualism, collectivism regardless of gender of the consumers (Faqih and Jaradat 2015). Not
Document Page
3M-COMMERCE
only this but also GSM gives an accurate authentication approach protocol between the network
and Mobile device through the SSL encryption of both data and voice. Mobile commerce is
referred to as a particular type of daunting task that pays active role in consumer’s decision
making (Nilashi et al. 2015). Different effects may occur during the application of M-commerce
Information System in the business organizations. The significant issues that the business
organizations widely face after adopting M-commerce Information System in their businesses
are as follows:
Security issues of Mobile Commerce
Issues in location management
Ethics and privacy issues
Wireless infrastructure and usability issues
Regulatory challenges and legal issues
Consumer trust level issues
Problems with interoperability and compatibility
However, among all these above mentioned issues the most highlighted issue is a security
threat with the M-commerce IS application in business. It has been found that wireless
communication is referred to as a much vulnerable. In case of personal innovativeness adequate
amount of attention is required to be paid by the M- Commerce service providers (Lu 2014). It
helps to improve business environment because the security has become one of the foremost
concerns with high end mobile devices within the business environment. The trust of the
consumers transforms through a set of dynamic process (Lin et al. 2014). During the usage of
Mobile commerce Information System in the business environment, many issues are found to
exist with this application while conducting the different transaction such as:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4M-COMMERCE
Data can be lost from the server and mobile terminal
Data can be misplaced or theft due to the limitation in size and stored content
Lack of proper data authentication technique, data can be hijacked y the
unauthorized users
Different aspects are there to be considered for the Information System Security including
physical security, risk assessment, secured access, malware attack and secured wireless data
transmission. However, there is certain build in security approaches exist such as keypad
locking, password etc., that are used by the majority of the wireless IS users. The value of M-
commerce or mobile business considers the impact on sales and marketing, organizational
internal operation and other measureable procurements (Picoto, Bélanger and Palma-dos-Reis
2014). On the other hand, information transformation over the wireless medium is much
vulnerable to making attacks. An information system can be identified as intercepted and if it is
not accurately encrypted with the flawed protocol then; all confidential data will be exploited as
a known data rater then confidential.
However, in order to convince user, this security approach does not stand as enough. In
order to gain access to a particular security system, application of smart card is found to be as the
most preferred one.
The usability of social media marketing and its adoption like an advanced communication
tool in increasing globally and also eventually offering valuable opportunities to the business
organizations. The way of interaction and work is changing accordingly with the help of Mobile
Business or M-commerce (Gurtner, Reinhardt and Soyez 2014). In order to ensure the
Document Page
5M-COMMERCE
confidentiality of M-commerce Information system, an accurate encryption approach should be
used with the proper secret private key. The encryption key helps to scramble the confidential
information during its transmission over a channel from the sender to the recipient. However, the
individual key must keep secret to keep the confidentiality and security of the system (Lu et al.
2015). In addition to this, the secret code must not be shared with the outsiders over the sender
and the recipient parties. If the secret code is divided among the third parties, then the data will
be easily accessed by the external attackers. The research of Information System will help to
keep the researchers updated on the IS management issues and challenges that most of the IT
industries and management are widely facing (Kavanagh, and Johnson 2017). From the full
range of M-commerce IS application it has been found that security is the most significant threat
that most of IS using business organizations are widely facing. Over the radio frequency
platform which is prone to different passive attacks such as snooping, spoofing etc. This is quite
difficult to estimate the extent of M-commerce IS usage and it’s utility during the usage of the
internet over the mobile devices. Thus, it can be said that compromised security function can
affect not only the network but also can lead an entire business towards major commercial loss.
Discussion and arguments
There are many online shopping centers such as Flipkart, Amazon, Myntra, Jabong etc.
which use an M-Commerce app for selling their products. It also gives online payment
opportunity to the buyers from anywhere and anytime.
Though due to lack of security and management the buyers of Flipkart (on the Big
Billion day, 2016) faced severe problems. The event Big Billion Day was promoted by Flipkart
in 2016 that has an exclusive deal with all their products offering many discounts on home
Document Page
6M-COMMERCE
appliances, electronic goods and fashion accessories also. The consumers highlighted substantial
operational and technical errors in the pricing scams to lack of product variety. Once the site was
also crashed, and due to glitches, the order placements were affected. In addition to this, for
some of the products, the review and rating options were also missed those days. This real-life
case implies that dealing with huge consumers and products through E-commerce and M-
commerce is not beneficial every time.
There are significant differences between the handheld device and desktops considering
several ways. Due to smaller screen size and minimum amount of input capabilities users face
problems during its application in the business environment (Shaukat et al. 2016). For different
wireless applications, due to lack of security systems in the implementation of wireless
protocols, security is not at all measured as adequate. Handheld devices have another issue
associated with it such as it shows a few text lines and does not have any traditional board. At the
expense of battery life more substantial screen and also the color can be identifiably enhanced.
The recent design efforts are also thus driving positively with the help of the classic trade-off.
The vendors are trying to bring measurable changes in the field of both features, and design
outlines of the M-Commerce IS application (Ferreira 2014). Another issue that is going to be
faced by the users is the increasing demand for bandwidth for application of both the new as well
as existing networks. Interference may be occurring because different standards like Bluetooth,
IEEE802.11 are also willing to use the similar range of frequency for their application. Mobile
Commerce provides extended business opportunities to the consumers (Shah, Ahmed and
Soomro 2016). Laudon and Laudon (2016) stated that security is the most highlighted issues that,
most of the information system users are currently facing in their business application. In case of
M-commerce application, the users are allowed to book for their desired services and products
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7M-COMMERCE
from the Mobile apps. The process of payment gateway also differs in this case. If proper
security assumptions are not undertaken then, a company may face serious security issues. With
lack of security approaches, unauthenticated users can also access the business servers without
taking permission even from the owners. In order to encrypt the confidential information, two
different methods such as asymmetric and symmetric are widely used by the Information system
business owners. Not only during the application of M-commerce Information system but also
while adopting the Information System the companies may face significant issues as well that
interrupts the business success instead put the negative impact on the business.
Conclusion
From the overall discussion, it can be concluded that most of the large business
organizations are currently investing a lot of resources to build information system regarding an
E-commerce mobile based application. However, some businesses are also there identified, who
have terminated their operation in websites and are running their businesses only through the
mobile apps Information system. Based on the type and background of business including their
operational features an organization should adopt the necessary information system that has to be
applied to it. The essence of the essay is wholly focused on the issues associated with the
Information system (M-commerce) and its negative impact on the business organization. From
the wide area technology-based survey it has been found that approximately 52% of total
consumers are recently using the M-commerce Information system application in their business
for commercial success. However, the consumers are simultaneously facing both safeties as well
as security issues with the application of Information system (M-commerce and E-commerce) in
their business. It can be said that not only after use but also during the adoption of the IS also
Document Page
8M-COMMERCE
companies are facing major barriers. In order to gain competitive advantages and measurable
success from the business after identifying the IS issues proper mitigation approaches are also
required to be highlighted.
Critical reflection
Different approaches such as near field communication, direct communication or E-
commerce governance and Printed display barcode based symbols are there, available in the field
of Information System (in term of M-commerce) application in the business organization. I have
learned that based on the background of the business the most appropriate approach should be
adopted by the project team members or business owners.
Firstly, in order to obtain competitive advantages from the market, most of the large
businesses are developing E-commerce based websites. However, to make it more efficient, E-
commerce websites are improving by promoting it in M-commerce based Mobile app. It helps to
govern the E-commerce based businesses. I have learned, M-commerce allows the consumers to
access the desired portal from anywhere and anytime. Therefore, users are not required to wait in
any queue for product and service booking.
The second approach implies that M-commerce gives displayed bar code symbols to the
consumers that can encode the emblem which directs the users to the websites. At the sites, the
users are headed towards where the information is displayed. In some cases, resolution of the
display may interrupt the users, but this approach can be eventually termed as a helpful one.
On the other hand, it can be said that contemporary approaches are the most valuable
approaches those are necessary to be adopted by the business organizations to avoid commercial,
operational and business functional challenges. After studying multiple perspectives on the
Document Page
9M-COMMERCE
information system, I have found that for Information system it shows that Information System is
a multidisciplinary field. I think that no single theory can dominate others. The major
disciplinarians of contemporary approaches for the study of an Information system are technical
approach and behavioral approach. I have learned that the major discipline of these approaches
consists of the following attributes such as contributed problems, issues and its respective
solution as well. The entire operation which is known as managing information system has six
different domains such as computer science, sociology, operation research, economics,
management science, and psychology. The information system is a socio-technical system,
which is composed of mechanics, devices and also hard physical technologies. It requires
substantial social, organizational, intellectual investments to ensure all the activities work
appropriately. I think in order to study the details of the Information system management, its
application abilities and issues of IS that are continuously interrupting the commercial success of
any business proper contemporary approach is needed to be adapted accordingly. I think that
both of these approaches are helpful, but at the same time, technical approach is somewhere a
little beneficial to gain measurable business success. In order to study the application and
operational activities of an information system, the professional approach provides mathematics
based modules. Besides M-commerce and E-commerce application there are some additional
technologies such as project management approaches, outsourcing, ICT governance, ERP,
Business Intelligence (BI), Knowledge Management (KM) etc. are available the project
managers for commercial success can apply those. I think M-commerce app should be integrated
with these approaches to take effective organizational decisions.
I have also learned that the discipline which contributes to the technical approaches
include computer science, management science and operation management. I have realized that
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10M-COMMERCE
computer science is much concern about the computability and computation methods and data
storage and access abilities whereas; the management science is focused on decision making
models and other best management practices during the implementation and management if
Information system in the business organizations. I think that the business owners who are using
M-commerce application in their business should adopt the most suitable approach to gain
competitive advantages and commercial success as well.
Document Page
11M-COMMERCE
Bibliography
Chen, Y.F. and Lan, Y.C., 2014. An empirical study of the factors affecting mobile shopping in
Taiwan. International Journal of Technology and Human Interaction (IJTHI), 10(1), pp.19-30
Cui, M. and Pan, S.L., 2015. Developing focal capabilities for e-commerce adoption: A resource
orchestration perspective. Information & Management, 52(2), pp.200-209.
Dahnil, M.I., Marzuki, K.M., Langgat, J. and Fabeil, N.F., 2014. Factors influencing SMEs
adoption of social media marketing. Procedia-social and behavioral sciences, 148, pp.119-126.
Faqih, K.M. and Jaradat, M.I.R.M., 2015. Assessing the moderating effect of gender differences
and individualism-collectivism at individual-level on the adoption of mobile commerce
technology: TAM3 perspective. Journal of Retailing and Consumer Services, 22, pp.37-52.
Ferreira, S.C., 2014. The M-Commerce In The Retail Industry: Exploring consumers and
retailers perspectives of features in a mobile app for supermarkets.
Gurtner, S., Reinhardt, R. and Soyez, K., 2014. Designing mobile business applications for
different age groups. Technological Forecasting and Social Change, 88, pp.177-188.
Kavanagh, M.J. and Johnson, R.D. eds., 2017. Human resource information systems: Basics,
applications, and future directions. Sage Publications.
Laudon, K.C. and Laudon, J.P., 2016. Management information system. Pearson Education
India.
Document Page
12M-COMMERCE
Lin, J., Wang, B., Wang, N. and Lu, Y., 2014. Understanding the evolution of consumer trust in
mobile commerce: a longitudinal study. Information Technology and Management, 15(1), pp.37-
49.
Lu, J., 2014. Are personal innovativeness and social influence critical to continue with mobile
commerce?. Internet Research, 24(2), pp.134-159.’
Nilashi, M., Ibrahim, O., Mirabi, V.R., Ebrahimi, L. and Zare, M., 2015. The role of Security,
Design and Content factors on customer trust in mobile commerce. Journal of Retailing and
Consumer Services, 26, pp.57-69.
Palacios-Marqués, D., Soto-Acosta, P. and Merigó, J.M., 2015. Analyzing the effects of
technological, organizational and competition factors on Web knowledge exchange in
SMEs. Telematics and Informatics, 32(1), pp.23-32.
Picoto, W.N., Bélanger, F. and Palma-dos-Reis, A., 2014. An organizational perspective on m-
business: usage factors and value determination. European Journal of Information
Systems, 23(5), pp.571-592.
Shah, M.H., Ahmed, J. and Soomro, Z.A., 2016. Investigating the Identity Theft Prevention
Strategies in M-Commerce. International Association for Development of the Information
Society.
Shaukat, U., Ahmed, E., Anwar, Z. and Xia, F., 2016. Cloudlet deployment in local wireless
networks: Motivation, architectures, applications, and open challenges. Journal of Network and
Computer Applications, 62, pp.18-40.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13M-COMMERCE
Turban, E., Outland, J., King, D., Lee, J.K., Liang, T.P. and Turban, D.C., 2017. Electronic
Commerce 2018: A Managerial and Social Networks Perspective. Springer.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]