1-Introduction
With the increasing of wireless revolution and Mobile Commerce, evident that mobile devices are becoming a critical component of the new digital economy. Mobile commerce consists of two various words one is mobile and other is commerce. It is the type of commerce which is done by using any mobile device such as mobile phone, a smart phone or a Personal Digital Assistant (PDA). According to Wikipedia it is transaction of any product or service which is delivered it from one party to another by using mobile phone or any other electronic device. M-Commerce defined by (Angsana, 2002) mobile Commerce can be between two person (P2P), it can be business to customer (B2C) or business to business (B2B). Eight major M-Commerce services are M-Commerce, M-Shopping, Dynamics Information management, Entertainment, Information Services, M-Advertising, M-Security &Emergency at the end Personal Interaction services. All these eight mediators are play very important role in the M-Commerce services.
Benefits of M-commerce
As we know M-commerce market grows rapidly now a days, the numbers of Smartphone users are increasing regularly. M-commerce helps to works easily and smoothly in life schedule. Its benefits are as follows:-
User Friendly: – Now web design is a lot of user friendly. The search option in predictions helps you to find a product more quickly and easily. Different classification of diversified products helps consumers more than exclusively among products.
Easy to carry mobile device: – Mobile device is easy to carry by user, It helps to avoid user to go to any shop as well as it also helps to user for avoid once of use of computer /laptops.
Low internet connectivity area: – M-commerce is also efficiently used where the internet connectivity is less and website is taking more time to upload or hit. Through mobile devices less internet data will be used, so it is also economical with comparison of using internet via computer devices
Secure transactions: – M-commerce also gives an assurance of secure transactions, for the transaction, confirmation code is sent on the e-mail and mobile phone. And after filling this code the transaction will be processed, So that chances of wrong transactions are very less and unsecure transitions can be eliminated
. • This increases the trustiness level for websites and increases the number of customers. As we know mobile devices are becoming a part of our daily routine life, People use internet for various purposes which include: email, academic and financial information search, music and video on internet, chatting, online job search, gaming, booking tickets, hotel reservation, online news, internet telephony/video chat/voice chat, and online banking. E-commerce has touched every field of human life from information search to entertainment
(Gupta & Vyas, 2014)
Perceived behavioral control
Perceived behavioral control refers to individuals’ perceptions of their ability to perform a particular behavior, and it is compatible with the concept of self-efficacy (Ajzen, 2002),In other words, an individual’s confidence in performing a specific task significantly influences behavior (Ajzen, 1991)
Facilitating conditions
Facilitating conditions are defined as external environments of serving individuals to remove barriers and difficulties to use a new technology (Gu, et al., 2009). Faciliting Condition factor consists of two dimensions: resource factors (time and money), and technology factors (technology supports) relating to compatibility issues that contain the usage (Lu, et al., 2008)It has been viewed that IT usage will be less likely if less money, less time, and less technological support exist. Prior studies have pointed out the significance of facilitating conditions on attitude and behavioral intention (Crabbe, et al., 2009) In addition, when individuals feel the availability of resources, the availability of knowledge and the presence of facilitating conditions, it could develop a positive attitude and it is expected to increase the intention
Self-control
Self-control refers to the mental processes that allow people to override their thoughts, emotions, and behaviors to keep them in line with overarching goals (Baumeister, 2007)
advantages of m-commerce
Ubiquity : the end user device is mobile ,so that the user can access m-commerce application in real time at any place .
Accessibilty: the end user is accessible anywhere,at any time . accessibilty is related to ubiquity. It is probably the greatest advantage over e-commerce application involving a wired end user device.
Security :depending on specific end user device,the device offers a certain level of inherent security.for example,the card commonly employed in mobile phone is a smart card that stores confidential user information, such as user’s secret authentication key . such as ,the mobile phone can be regarded as a smartcard reader with smartcard.
Localisation : anetwork operator can localise registered users by using a positioning system,such as GPS (Global positioning System), or Via GSM (Global System for Mobile )or UMTS (Universal Mobile Telecommunication System) network technology,and offer location-dependent services these services include providing local information about hotels,restaurants,and and amenities,travel information ,emergency calls and mobile office facilities .
Convenience : the size and weight of mobile devices and their ubiquity and accessibilty make them an idea tool for performing personal tasks.
Personalisation :mobile devices are usually not shared between users, this makes it possible to adjust amobile device to the user’s needs and wishes (starting with mobile phone housing and ring tones). On the other hand ,amobile operator can offer personalised services to its users ,depending on specified user characteristics
Disadvantages of m-commerce
Mobile devices offer limited capabilities (such as limited display). Between mobile devices these capabilites vary so much that end user services will need to be customised accordingly.
The heterogeneity of devices,operation systems ,and network technologies is a challenge for uniform end user platform .for this reason ,standardisation bodies consisting of telecommunication companies ,device manufacturers, their work. For example,many current mobile devices implement an IP (Internet Prorocol) stack to provide standard network connectivity.
Mobile devices are more prone to theft and destruction. According to a government report ,more than 700000 mobile phones are stolen in the UK each 3 year . since mobile phones are highly personalised and contain confidential user information ,they need to be protected according to the highest security standards.
Communication over the air interface between the mobile device and the network introduces additional security threats (e.g. eavesdaropping )
(Schwiderski-Grosche & Knospe, 2002)