SERVICE AND BUSINESS MODEL FOR MOBILE APPLICATION SUPERNETWORKING

Size: px
Start display at page:

Download "SERVICE AND BUSINESS MODEL FOR MOBILE APPLICATION SUPERNETWORKING"

Transcription

1 SERVICE AND BUSINESS MODEL FOR MOBILE APPLICATION SUPERNETWORKING Timo Koskela, Kimmo Kuusipalo 1, Mika Ylianttila, Junzhao Sun MediaTeam Oulu Group, Department of Electrical Engineering, Erkki Koiso-Kanttilankatu 3, FIN University of Oulu, Finland 1 University of Oulu Faculty of Economics and Business Administration P.O. BOX 4600, University of Oulu ABSTRACT This paper examines service provisioning and business models for peer-to-peer technologies on mobile cell telephones. Service provisioning refers to providing the service, managing digital rights, licensing, billing and updating of the service. In other words, functionalities such as service discovery, service registration, service adaptation and service billing must be implemented for revenue-creating application super-networking scenarios. In addition, business aspects for these functionalities and defined application service scenarios must be considered along with the technology. These aspects are analysed and discussed in this paper with case examples. supported by the network to customers. To be as simple as possible provisioning can be divided into resource and service provisioning. In this paper we examine service provisioning only. Service provisioning covers aspects related to service discovery, service downloading, service registration, service adaptation and service billing. Also service selection and personalization can be included. Service model is closely related to business model as well. I. INTRODUCTION The first peer-to-peer (P2P) technologies emerged more than decade ago and during the recent years they have been developed and become increasingly popular among the users at home and at office all around the world. Functionalities such as service discovery, service registration, service adaptation and service billing must be implemented for revenue-creating application supernetworking scenarios [1]. Though P2P is often related to spreading illegal material, it is still very promising and important technology, which has opened a completely new field of possibilities. Technologies such as DRM (Digital Rights Management) have been developed to protect against the misuses [2]. The next giant step for P2P technologies will inevitably be the conquest of mobile networks. To speed up the development of mobile P2P, common framework, independent on any device, underlying network or system platform, is required. JXTA is an emerging technology for implementing P2P applications. It is a set of simple open peer-to-peer protocols that enable any device to communicate, collaborate and share resources. By using open technologies, service providers are able focus more on creating new services and developing their service provisioning methods than inventing - or re-inventing - P2P infrastructure [3]. The terms provisioning and service provisioning have to be first specified and defined. Provisioning refers to providing the necessary resources to the telecommunication network as well as providing services Figure 1. Mobile file sharing as provisioned service. In this paper the service and business model for application supernetworking in mobile P2P network is discussed. Especially, mobile file sharing scenario is considered, discussed in section 2. Service model is discussed in section 3, followed by detailed business analysis given in section 4. Discussion and analysis provides analytical information on the relations of technology and business for research and development of mobile P2P applications. Conclusions are given at the end. II. MOBILE PEER-TO-PEER SERVICE SCENARIO Next we will introduce one practical service scenario in order to visualize the vast possibilities provided by P2P. A. Service provisioning for mobile file sharing As illustrated in Fig.1., user A has a mobile cell phone equipped with a memory card and GPRS - connection. A has determined a folder containing files to be shared with his peer group. Mentioned group can consist e.g. of A's work colleagues or friends. Other users not included in the peer group have no access to those resources. Every time, when user A shares new files he can determine whether a notification message about the new content is sent to his peer group. User B, having a mobile cell phone with required capabilities, can make a query within the peer group in order to search for desired files or just to browse the shared contents of his/her peer group members.

2 This proposed service has value for the private users, but most of all for the enterprises. Urgent pieces of information for employees or project group members can be very easily shared wherever and whenever without contacting everyone personally. To improve the service, notification message can be parameterized with a priority number and message type identifier in order to describe the importance and type of the new downloadable files. B. Peer Group Management Term Peer-Group-Management (PGM) refers to operations related to creating, managing and terminating peer groups. Managing peer groups contains tasks such as definition of the characteristics and rules of a group, definition of the shared content and peer authentication. Instead of traditional password-based authentication, the possibility that a user could be identified simply by mobile phone numbers should be considered. In this case authentication would be carried out by the service system, while the definition of the shared content and group characteristics are performed by the users. That freedom also brings responsibilities, because e.g. copyrighted material shouldn t be delivered to any other than registered users. DRM technologies mentioned in the introduction can be used to protect certain files, folders or even the whole content available to a certain peer group. To illustrate the peer groups they could be categorised into four different sections. The first group, called personal peers, contains all P2P capable devices belonging to a single user. This group enables the user e.g. to synchronize the data between his/her different devices. The second group covers all communities containing family members or friends. Within these groups e.g. photos taken during the holiday trip could be easily shared. The third group, called enterprise peers, consists of work groups or leisure time sport groups. These groups act as a fast channel to deliver important material such as meeting agendas etc. The last group, public peers, highlights also the commercial side of our service scenario. This group is discussed more detailed in the next chapter. Before a peer group can start to function, it is necessary to determine who has the rights to invite new members, kick out the ones behaving inappropriately and modify the settings of the group. Should the user also be able to list all peers he/she is willing to give access to the shared files without belonging to a certain group or should the common group be created? Finally, where is the management of these peer groups situated? One possible way is provided by JXTA, where common peer groups are created by any peer and maintained by its rendezvous peer [1]. These peer groups can not be deleted, but are instead automatically terminated, when they become obsolete. III. SERVICE MODEL We are developing a service model (Fig. 2), which utilizes our service scenario in order to provide certain services or information e.g. about company's operation. Mentioned information can contain casual advertisements, short company presentations, special offers etc. An example of a service, in turn, could be a music store offering new downloadable hit songs. In addition to full versions, protected by DRM, short samples could be offered in order to contribute the buying process. To extend our service scenario to cover peers all around the world, we are coming closer to current situation in today's P2P networks. In that case many aspects of service and service provisioning have to be examined in-depth. The following section discusses some challenges service provisioning has to face in P2P mobile networks. Figure 2. Prototype service model. The basic requirements today for the services are easy installation and usability. Especially in the mobile world, services have to be able to adapt, without bothering the user, to different devices equipped with different platforms like mentioned in the introduction. The capabilities of different devices form a significant limitation, which have to be carefully examined. From the service provider's point of view services have to be simple and not too resource consuming to maintain. A. Service profile Before registering to the service or downloading the application enabling the service, the user should be shown a standardized service profile, which identifies the functionality and the features of the service [5]. Also at this point the user could be offered a chance to describe his/her computing skills e.g. by selecting a value from 1-3. This information could be taken into consideration during the installation and personalization process. B. Mobile and Licensing After the application enabling the service (or later on content) has been downloaded, licensing or registering is usually required. Licensing (or registering) process has to be straightforward and, if payments are included, secured. Control points where various functions related to billing, licensing etc. need consideration. Mobile world does have some special features and restrictions (differing from traditional Internet). First of all, heterogeneous terminals mean that achieving a critical mass of service users is challenging. Also network access done via mobile telecom means relatively high s. Rights management must be persuasive to encourage commercial content. Open Mobile Alliance (OMA) has released descriptions for enablers of usage rights (OMA DRM) that are currently being widely adopted. While OMA DRM v1.0 mainly implements forward-lock, OMA DRM v2.0 enables true content

3 superdistribution, for example file sharing of protected content. methods, too, are more restricted in mobile world. We have listed below current Internet and mobile payment methods where 1 to 3 are mostly used in Internet and 4 to 5 in mobile network. 1. Bank account payment 2. User account systems i.e. 3rd party prepaid virtual wallet 3. Credit card 4. Invoiced in the monthly mobile bill 5. Dual chip or one chip solution (SIM+WIM or SWIM) Wireless IP based services makes Internet payment methods (1-3) available for mobile devices. Still there remain some usability problems with them. For instance bank accounts and credit cards systems can not be used by person under age in many countries including Finland. Third party user account systems are a bit complicated when users initially need to money to be able to use credits for purchases. There have also been plans to install a separate money chip to mobile phones but they have not been progressed at the moment. Will monthly mobile bill invoice still be the most valid one then? So far it has been very popular at least with smaller payments. From content provider s point of view revenue sharing might bee a minor problem using telecom mobile bill invoice. For example in Finland high-priced s of telecom have not been incentive to provide services especially of micro-payment [6] size. There would obviously be a win-win situation in agreeing an every way satisfactory revenue sharing. C. Authentication Finding the best and the most flexible ways for authentication in the integrated mobile and fixed P2P environment need research work. Authentication and also billing at the mobile end might be carried out by exploiting SIM card properties. Also an interesting point of view to authentication process is to connect mobile phone numbers to peer groups. In that case authentication could be carried out automatically without bothering the user. D. Service personalization Theme service personalization discussed in [4] offers possibilities to create more flexible services satisfying the needs of different kind of customers. Service personalization should offer guidance and easy-to-use interface for inexperienced users and at same time possibilities for professional users to adjust the service features to correspond to their needs. In a nutshell service personalization gives a chance to modify the service to mirror its user. E. Security Security aspect has a wider role in mobile P2P networks than in the traditional ones, because the access to user resources on the phone and outside has to be more limited. Security and legislation must have means against the violation of privacy. Still, the main problems in the current P2P systems have been concentrated around the malicious peers delivering tampered material. In order to handle the problem with peers delivering files containing viruses and trojan horses, a reputation-based system has been suggested, where every resource and peer has been evaluated by plenty of users [7]. However, mobile and P2P security deserves more attention, as also the recently appeared first Symbian S60 virus illustrates. F. Privacy Considering privacy there are some open questions. At first we have to determine the parties who can access the licensing information. Secondly, who will control that such information can't be accessed without the permission and in the worst case misused against the user. It is also important to make sure that the user is able to block the service offers, temporarily or permanently. While these issues remain essential for building a fully functional and reliable service model, we move in the following to analyze the business implications of our model. IV. BUSINESS ANALYSIS While technology changes, economic laws do not. The forth-coming rich content mobile services will certainly be based on value chains; several companies produce different pieces in the service process with the help of joint standards. For instance the key technology vendors, mobile operators and the leading mobile content retailers are extremely well positioned to design a standardised commerce infrastructure. To find an extensive payment method and a comfortable digital rights management (DRM) are on top of the list. Royalty Fee for the content, Commission system and Rights management less financing Content and copyright A copy of content Subscription fee Data Content / licensing File Terminal File download Figure 3. Value chain, downloading mobile content In Fig. 3 first the content flows from content owner to end-user through several parties. flows back from end-user to content aggregator through a financing party less financing. Subsequently the content aggregator divides the rest of the revenue to parties involved according to agreements concluded. Also, if telecom network is used for file, end-user has to pay the tele-operator for s. End-user might be

4 needed to cover a subscription fee to the content aggregator for accessing a portal, too. With business models there is basically no need for new tricks: models and content successful in traditional digital world and Internet are a good starting point. A good example of this are the games that were successful in the early personal computing days (10-15 years ago) are now successfully red into mobile devices. Below are listed some primary business models. Sales (sales of goods, information or services) Transaction Fee (fees for executing a transaction) Subscription (fees in exchange for access to content or services) Advertising (fees from advertisers) Affiliate (fees for business referrals) The simplest case of a value chain would be that content flows directly from content retailer to customer. Actually this is how the service should be visible to end-users. The simple value chain must be disaggregated to see the parties involved in mobile service provisioning. First you need a service provider to hook up your terminal to network. Even the type of network connection may vary - WLAN, GPRS or UMTS for example. Before viewing the content, you need a system for secure identification and payment handling. Once located in the terminal, we face the problem of digital rights management again. May the content be copied? How many times or how long may it be viewed or executed? Can the content be forwarded or distributed via supernetworking? Will that and does one get for distribution back to payment handling again? How will the rights and payment management be handled, is it hard-coded by terminal manufacturer or is it done with a 3rd party software or with a middleware? increases network traffic nevertheless the file is shared via BlueTooth or radio network since telecom always gets transaction s for notifications and licensing/payment traffic. This happens especially with commercial content. Also supernetworking and superdistribution remind network marketing business where end-users store up, market, find the right target group and distribute the content. Lastly, rewarding is totally new business: if sharing commercial content, a content provider may give a reward or to the end-user that distributed the content. Content aggregator Content Telecom Music store Commercial Peer (3 rd party) Fee (fixed, transaction based or initial fee) P2P file GPRS Data less financing Terminal User (Private Peer) system and Rights management Terminals Licensing server Bluetooth (GPRS) / Licensing Figure 5. Value chain and peer relations in mobile file sharing case. As illustrated in Fig.5., User (Private Peer) has a mobile cell phone equipped with a memory card and both Bluetooth and GPRS connections. User s friend group s end-terminals are also provided with the same functionalities. In this business model example a music store (could be a national chain) is acting as an aggregator and offering services to customers via Commercial Peer, which is run by a telecom, who has access to mobile networks. Friend group Superdistribution PAYMENT / LICENSING System and DRM Commission less financing Content provider Reward Access provider transaction s END- USER download In this scenario and Rights management is carried out by a 3rd party in cooperation with the music store, but could also be handled by a telecom. Content owner and content provider are not mentioned, but they get their share from the content aggregator. Telecom, which possibly runs the Commercial Peer and certainly provides the network access, benefits from every GPRS and from the aggregator for offering the Commercial Peer functionalities. The 3rd party taking care of and Rights management gets a profit for each made by the customers. PEER GROUP Figure 4. Value chain for file sharing. As illustrated in Fig. 4, peer group networking and superdistribution brings new business compared to traditional file downloading. First of all, file sharing The Commercial Peer, run by a telecom and controlled by a music store, offers priced music material (mainly songs) protected by DRM. In order to use the services, User has opened an account protected by a password in the music store. Account is based on credits, which can be loaded by VISA electron, debit and credit cards, bank, cash etc. Because of the possibility of cash loading, younger people are also potential customers and able to benefit from the service.

5 User can connect to Commercial Peer anytime and anywhere, browse the content and download the files desired. After downloading e.g. music files, they have to be licensed and paid for. When the user opens the file for the first time, a payment agent connects her/him to a licensing server (like in the pc world), which carries out the whole licensing and payment operation as following: 1) User logs on by entering her/his account name and password. 2) User accepts the payment using her/his account credits or possibly e.g. a credit card if the account does not contain the sufficient amount of credits 3) User receives the license from the server and is able to use the content License is only valid in a single device and its properties can vary. Instead of unlimited ones, the use rights can be e.g. time or instance of use-limited. Naturally prices have to be set according to use rights. Now the User is a holder of nice music file, which she/he wishes to share with other users in her/his private peer group. Friend group s peers could use the mobile file to get the file from the User (Private Peer) or Commercial Peer, but the easiest, the fastest and the cheapest way would be to use Bluetooth. The use of short range equipment is based on an assumption that young people tend to see each other very often and spend a lot of time together in big groups. After User s friends have obtained the content, they also need to pay for it in order to acquire a license. In order to do that, they also have to have an account on the music store. According to affiliate business model, small s could be offered for users, who independently distribute the content to other users e.g. via GPRS or Bluetooth. This sharing process occurring without any intervention from the commercial parties is called superdistribution. In order to make file sharing more attractive and increase the value of this use case, mentioned s are needed. Commission could be paid every time, when a new user licenses the content acquired from another user. In that case it is required that the shared files are marked with some kind of stamp, which is checked and changed to point the new user during the licensing process. In a credit based system the for successful distribution event could be % of value of the content to be attractive. Commissions would be paid in credits and automatically added into user s account. If (distributive) users would get a for every file shared whether or not it was licensed, the would have to be much smaller. V. CONCLUSIONS This paper has examined service provisioning of peer-topeer technologies on mobile cell telephones. Functionalities such as service discovery, service downloading, service registration, service profile and service billing were discussed. In addition, business aspects for these functionalities and defined application service scenarios were discussed. Especially, scenario for mobile file sharing was considered. Value chain for content superdistribution was discussed as a case example. Case studies illustrated the new emerging potential of mobile P2P applications that has both technological and economical dimensions. Discussion and analysis provides analytical information on the relations of technology and business for research and development of mobile P2P applications. Future work includes experimentation of service model in a virtual operator test environment to analyse and develop the service and application life-cycle management. ACKNOWLEDGMENTS The acknowledgments are due to the project team of Application Supernetworking/All-IP project. The authors would like to thank TEKES, Nokia, Elektrobit, TeliaSonera, Serv-IT and IBM for supporting this project financially. REFERENCES [1] J. Ala-Kurikka, et. al, Empirical Aspects on Implementing Application Supernetworking, in the proceedings of NRS/FWCW conference 2004,Oulu, Finland, August, [2] F. Hartung; F. Ramme, Digital rights management and watermarking of multimedia content for m-commerce applications, IEEE Communications Magazine, Vol. 38, Issue: 11, Nov. 2000, pp [3] W. Yeager, J. Williams, Secure peer-to-peer networking: the JXTA example IT Professional, Vol. 4, Issue: 2, March-April 2002, pp [4] S. Panagiotakis, A. Alonistioti,, Intelligent service mediation for supporting advanced location and mobility-aware service provisioning in reconfigurable mobile networks, Wireless Communications, IEEE, Vol. 9, Issue: 5, Oct. 2002, pp [5] F. Shen, A. Clemm, Profile-based subscriber service provisioning, Network Operations and Management Symposium, NOMS IEEE/IFIP, April 2002, pp [6] B. Yang, H. Garcia-Molina, PPay: Micropayments for Peer-to-Peer Systems, CCS'03, 2003, October 2003, pp [7] E. Damiani, S. Paraboschi, et. al., A Reputation- Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks, Proceedings of the 9th ACM conference on Computer and communications security, CCS2002, pp

Digital Rights Management for the Online Music Business

Digital Rights Management for the Online Music Business Digital Rights Management for the Online Business Sai Ho Kwok Digital rights management has become a pressing concern for the online music business. Existing digital rights management systems are backed

More information

Trusted Computing in Mobile Platforms

Trusted Computing in Mobile Platforms Schwerpunkt Trusted Computing in Mobile Platforms Players, Usage Scenarios, and Interests Evgenia Pisko, Kai Rannenberg, Heiko Roßnagel Trusted Computing for mobile platforms is considered important, and

More information

Empirical Evaluation of Mobile Peer-to-Peer Wellness Group Communication Application for Symbian OS

Empirical Evaluation of Mobile Peer-to-Peer Wellness Group Communication Application for Symbian OS Empirical Evaluation of Mobile Peer-to-Peer Wellness Group Communication Application for Symbian OS *Timo Koskela *Otso Kassinen **Jussi Ala-Kurikka *Mika Ylianttila MediaTeam, University of Oulu, Oulu,

More information

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

MOBILE SOLUTIONS IN BUSINESS PROCESS

MOBILE SOLUTIONS IN BUSINESS PROCESS MOBILE SOLUTIONS IN BUSINESS PROCESS Maija-Kerttu Sarvas Helsinki University of Technology Telecommunications Software and Multimedia Laboratory P.O. Box 5400, FIN-02015 HUT FINLAND Abstract The aim of

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Extending E-Ticketing Service with Mobile Transactions

Extending E-Ticketing Service with Mobile Transactions 1 Extending E-ing Service with Mobile Transactions Shirley Siu, Zhen Sheng Guo, Simon Fong and Sofia Zhuang Abstract The emerging technology in mobile devices presents new business potential to Internet

More information

Mobile TV with DVB-H. Markus Lindqvist Director, Server & Network Solutions Multimedia, Nokia. 1 2005 Nokia Nseries

Mobile TV with DVB-H. Markus Lindqvist Director, Server & Network Solutions Multimedia, Nokia. 1 2005 Nokia Nseries Mobile TV with DVB-H Markus Lindqvist Director, Server & Network Solutions Multimedia, Nokia 1 2005 Nokia Nseries MobileTV & Video User Paradigms Multiple ways to receive, download and play TV and video

More information

Electronic Commerce and E-wallet

Electronic Commerce and E-wallet International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: abhayu@rediffmail.com

More information

STATE-OF-THE-ART SIP FOR MOBILE APPLICATION SUPERNETWORKING

STATE-OF-THE-ART SIP FOR MOBILE APPLICATION SUPERNETWORKING STATE-OF-THE-ART SIP FOR MOBILE APPLICATION SUPERNETWORKING Douglas Howie, Mika Ylianttila, Erkki Harjula, Jaakko Sauvola MediaTeam Oulu Group, Department of Electrical Engineering, Erkki Koiso-Kanttilankatu

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile s Maria Koutsopoulou, Spyridon Panagiotakis, Athanassia Alonistioti, Alexandros

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Dell NetReady Mobile Broadband Service User's Guide

Dell NetReady Mobile Broadband Service User's Guide Dell NetReady Mobile Broadband Service User's Guide Introduction Quick Start Service Coverage Frequently Asked Questions Glossary Information in this document is subject to change without notice. Introduction:

More information

EVALUATION OF A CONTEXT-AWARE MOBILE PEER-TO-PEER NAVIGATION APPLICATION

EVALUATION OF A CONTEXT-AWARE MOBILE PEER-TO-PEER NAVIGATION APPLICATION EVALUATION OF A CONTEXT-AWARE MOBILE PEER-TO-PEER NAVIGATION APPLICATION Juuso Ohtonen Timo Koskela Nonna Kostamo Mika Ylianttila University of Oulu University of Oulu University of Oulu University of

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

11 emerging. trends for DIGITAL MARKETING FINANCIAL SERVICES. By Clifford Blodgett. Demand Generation and Digital Marketing Manager

11 emerging. trends for DIGITAL MARKETING FINANCIAL SERVICES. By Clifford Blodgett. Demand Generation and Digital Marketing Manager 11 emerging DIGITAL MARKETING trends for FINANCIAL SERVICES By Clifford Blodgett Demand Generation and Digital Marketing Manager Exploiting your Technology Vendors Customer Engagement and Maintaining a

More information

Mobile Plug-and-Play Architecture for Collaborative Hybrid Peer-to-Peer Applications

Mobile Plug-and-Play Architecture for Collaborative Hybrid Peer-to-Peer Applications 2008 IEEE Congress on Services Part II Mobile Plug-and-Play Architecture for Collaborative Hybrid Peer-to-Peer Applications Mika Ylianttila, Erkki Harjula, Timo Koskela MediaTeam Oulu Research Group University

More information

Towards Music Download and Radio Broadcast Convergence in Mobile Communications Networks

Towards Music Download and Radio Broadcast Convergence in Mobile Communications Networks Towards Music Download and Radio Broadcast Convergence in Mobile Communications Networks Sandro Grech and Sakari Luukkainen Wireless Telecommunications Symposium 27-29.04.2005 1 Towards Music Download

More information

User s Guide Your Personal Profile and Settings Creating Professional Learning Communities

User s Guide Your Personal Profile and Settings Creating Professional Learning Communities User s Guide Your Personal Profile and Settings Creating Professional Learning Communities Table of Contents Page Welcome to edweb.net 3 Your Personal Profile and Settings 4 Registration 4 Complete Your

More information

m Commerce Working Group

m Commerce Working Group m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking

More information

Nokia Mobile Software Strategy

Nokia Mobile Software Strategy Nokia Mobile Software Strategy Pertti Korhonen Senior Vice President Nokia Mobile Software Agenda Open Mobile Architecture initiative Nokia Mobile Software strategy & Offering Developer community Summary

More information

Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions

Privacy Policy. Introduction. Scope of Privacy Policy. 1. Definitions Privacy Policy Introduction This Privacy Policy explains what information TORO Limited and its related entities ("TORO") collect about you and why, what we do with that information, how we share it, and

More information

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience.

1.4 To overcome this biasness, this Policy is in place to ensure all Maxis customers have a good experience. MAXIS FAIR USAGE POLICY 1. Introduction 1.1 This Fair Usage Policy ("Policy") sets out an acceptable level of conduct between Maxis Broadband Sdn Bhd or Maxis Mobile Services Sdn Bhd (both shall be referred

More information

Music and the Internet. A guide for parents and teachers

Music and the Internet. A guide for parents and teachers Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,

More information

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

Three Kinds of E-wallets for a NetPay Micro-payment System

Three Kinds of E-wallets for a NetPay Micro-payment System Three Kinds of E-wallets for a NetPay Micro-payment System Xiaoling Dai 1 and John Grundy 2, 3 Department of Mathematics and Computing Science The University of the South Pacific, Laucala Campus, Suva,

More information

Copyright, standards and the internet

Copyright, standards and the internet Copyright, standards and the internet In brief The Internet has made it easier to find and obtain ISO and IEC International Standards. The purpose of this brochure is to help users and customers of ISO

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Developing Vietnam s Infrastructure

Developing Vietnam s Infrastructure Developing Vietnam s Infrastructure Creating investment opportunities by including interoperability in deployment plans Jari Alvinen Chairman of the Board, Open Mobile Alliance www.openmobilealliance.org

More information

SwanLink: Mobile P2P Environment for Graphical Content Management System

SwanLink: Mobile P2P Environment for Graphical Content Management System SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes

More information

Peer to Peer File Sharing and Copyright Infringement Policy

Peer to Peer File Sharing and Copyright Infringement Policy Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct

More information

Intellectual Property Rights: Potential of Digital Rights Management for Digital Content

Intellectual Property Rights: Potential of Digital Rights Management for Digital Content Intellectual Property Rights: Potential of Digital Rights Management for Digital Content Marc Fetscherin August 2003 Digital Rights Management Currently only 3 books worldwide including in the title Digital

More information

Ingenious Systems. Evolute System's. Mobile Payment. Initiative

Ingenious Systems. Evolute System's. Mobile Payment. Initiative Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial

More information

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All

More information

A conceptual model of public medical service system based-on cell phone mobile platform

A conceptual model of public medical service system based-on cell phone mobile platform A conceptual model of public medical service system based-on cell phone mobile platform Hongjiao Fu 1, Yue Zhao 1 1 Department of Economic Information Management, School of Information, Renmin University

More information

EMPLOYEE BEHAVIOR & EXPECTATIONS CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES 4.08 INFORMATION TECHNOLOGIES

EMPLOYEE BEHAVIOR & EXPECTATIONS CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES 4.08 INFORMATION TECHNOLOGIES CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES EMPLOYEE BEHAVIOR & EXPECTATIONS Purpose The City of Portland provides information technologies to its employees to use in the course of doing their

More information

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document. Privacy Policy This Privacy Policy explains what information Fundwave Pte Ltd and its related entities ("Fundwave") collect about you and why, what we do with that information, how we share it, and how

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

DailyMailz may collect and process the following personal information about you:

DailyMailz may collect and process the following personal information about you: Privacy Policy DailyMailz is committed to preserving the privacy of all visitors to its website www.dailymailz.nl ("Website"). This privacy policy along with DailyMailz s terms and conditions of use and

More information

SOLITEC products or services for which a separate privacy policy is provided.

SOLITEC products or services for which a separate privacy policy is provided. 1 of 9 Privacy Policy This Privacy Policy explains what information SOLITEC Software Solutions GesmbH and its related entities ( SOLITEC ) collect about you and why, what we do with that information, how

More information

VIUS Reports 9.2. Faculty Focus Group on LionShare August 2003 Michael J. Dooris. Introduction

VIUS Reports 9.2. Faculty Focus Group on LionShare August 2003 Michael J. Dooris. Introduction VIUS Reports 9.2 Faculty Focus Group on LionShare August 2003 Michael J. Dooris Introduction The Visual Image User Study (VIUS) team held a demonstration of the Penn State LionShare prototype for selected

More information

STUDENT S INFORMATION SECURITY GUIDE

STUDENT S INFORMATION SECURITY GUIDE STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

A Novel Internet Radio Service for Personal Communications; The Private Channel Service

A Novel Internet Radio Service for Personal Communications; The Private Channel Service A Novel Internet Radio Service for Personal Communications; The Private Channel Service Kensuke Arakawa Faculty of Software and Information Science Iwate Prefectural University araken@comm.soft.iwate-pu.ac.jp

More information

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014 david@strom.com

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014 david@strom.com How Lastline Has Better Breach Detection Capabilities By David Strom December 2014 david@strom.com The Internet is a nasty place, and getting nastier. Current breach detection products using traditional

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

Aito CEA Product Overview

Aito CEA Product Overview Aito CEA Product Overview Aito Customer Experience Analytics Introduction Communications Service Providers (CSPs) such as mobile operators face a critical challenge. The information that they possess is

More information

MoB: A Mobile Bazaar for Wide area Wireless Services

MoB: A Mobile Bazaar for Wide area Wireless Services MoB: A Mobile Bazaar for Wide area Wireless Services R. Chakravorty, S. Agarwal, S. Banerjee, I. Pratt T 110.7190 Research Seminar on Telecom Software 28.09.2005 Yrjö Raivio 28916V T 110.7190 Research

More information

City of Grand Rapids ADMINISTRATIVE POLICY

City of Grand Rapids ADMINISTRATIVE POLICY City of Grand Rapids ADMINISTRATIVE POLICY NUMBER: 84-02 DATE: 7/23/84 REVISIONS: 6/17/88; 11/7/00 (replaces old #84-02, #95-07, & #95-08); 6/13/08; 11/26/13 ISSUED BY: City Manager SIGNED: SUBJECT: ELECTRONIC

More information

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical

More information

How We Use Your Personal Information On An Afinion International Ab And Afion International And Afinion Afion Afion

How We Use Your Personal Information On An Afinion International Ab And Afion International And Afinion Afion Afion AFFINION INTERNATIONAL AB COMPANY PRIVACY AND COOKIES POLICY The privacy and cookies policy sets out how we use any personal information that you give to us, or that we may collect or otherwise process

More information

A secure mobile payment system *

A secure mobile payment system * Jun. 2007, Volume 1, No.1 (Monthly) Computer Technology and Application, ISSN1934-7332, USA A secure mobile payment system * LI Xi, HU Han-ping (Institute of Pattern Recognition and Artificial Intelligence,

More information

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices O.O. Abiona 1, A. I. Oluwaranti 2, T. Anjali 3, C. E. Onime 4, E.O. Popoola 5, G.A. Aderounmu 6, A. O Oluwatope

More information

Inside the Mobile Wallet: What It Means for Merchants and Card Issuers

Inside the Mobile Wallet: What It Means for Merchants and Card Issuers Inside the Mobile Wallet: What It Means for Merchants and Card Issuers Welcome to the age of Universal Commerce commerce that is integrated, personalized, secure, open, and smart. The lines between in-store

More information

How To Monitor The Internet In Idaho

How To Monitor The Internet In Idaho Idaho Technology Authority (ITA) ENTERPRISE POLICY P1000 GENERAL POLICIES Category: P1050 EMPLOYEE INTERNET USE, MONITORING AND FILTERING CONTENTS: I. Authority II. Abstract III. Definitions IV. Policy

More information

Alexander Nikov. 7. ecommerce Marketing Concepts. Consumers Online: The Internet Audience and Consumer Behavior. Outline

Alexander Nikov. 7. ecommerce Marketing Concepts. Consumers Online: The Internet Audience and Consumer Behavior. Outline INFO 3435 E-Commerce Teaching Objectives 7. ecommerce Marketing Concepts Alexander Nikov Identify the key features of the Internet audience. Discuss the basic concepts of consumer behavior and purchasing

More information

A License Aware P2P Client with URM

A License Aware P2P Client with URM A License Aware P2P Client with URM Helge Hundacker, Verena Liesenfeld, and Rüdiger Grimm University of Koblenz-Landau 56070 Koblenz, Germany {hundacker vliesen grimm}@uni-koblenz.de Abstract. This paper

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

ETSI TR 102 071 V1.2.1 (2002-10)

ETSI TR 102 071 V1.2.1 (2002-10) TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,

More information

Quorum Privacy Policy

Quorum Privacy Policy Quorum Privacy Policy Quorum Analytics Inc. ( Quorum") has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics

More information

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used? TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

Business Models in Wireless Internet Service Engineering Päivi Kallio 3rd Software Architecture Seminar, 3-4 October 2002, Oulu, Finland

Business Models in Wireless Internet Service Engineering Päivi Kallio 3rd Software Architecture Seminar, 3-4 October 2002, Oulu, Finland Business Models in Wireless Internet Service Engineering Päivi Kallio 3rd Software Architecture Seminar, 3-4 October 2002, Oulu, Finland 1 Introduction s of the Third Generation (3G) services will reach

More information

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless

More information

User Experience in the Cloud: Towards a Research Agenda

User Experience in the Cloud: Towards a Research Agenda User Experience in the Cloud: Towards a Research Agenda Kaisa Väänänen-Vainio-Mattila Tampere University of Technology, Human-Centered Technology Korkeakoulunkatu 6, 33720 Tampere, Finland kaisa.vaananen-vainio-mattila@tut.fi

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

An Oracle White Paper May 2012. Oracle Database Cloud Service

An Oracle White Paper May 2012. Oracle Database Cloud Service An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing

More information

Cloud Computing. Security Practices for General User. Examples of Popular Cloud Service Providers

Cloud Computing. Security Practices for General User. Examples of Popular Cloud Service Providers Cloud Computing Security Practices for General User T he cloud is composed of an extensive bulk of computers owned by a third-party in remote location(s). The Internet provides a bridge between personal

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

Performance monitoring and analysis of wireless communication protocols for mobile devices

Performance monitoring and analysis of wireless communication protocols for mobile devices Performance monitoring and analysis of wireless communication protocols for mobile devices Almudena Díaz, Pedro Merino, F. Javier Rivas Departamento de Lenguajes y Ciencias de la Computación, University

More information

Secure Architecture for the Digital Rights Management of the M-Content

Secure Architecture for the Digital Rights Management of the M-Content Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 196 Secure Architecture for the Digital Rights Management of the M-Content ION IVAN,

More information

Century Commons' Internet Use

Century Commons' Internet Use Century Commons' Internet Use Please Note: Even though you are unable to access the Internet, the sites below are always available. Open up Internet Explorer and type any of these in your address bar to

More information

General Terms and Conditions

General Terms and Conditions General Terms and Conditions These General Terms and Conditions (hereinafter referred to as GTC) establish the relationship for service providing between: till3am s.r.o. IČ 60193336, DIČ (VAT) CZ60193336,

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

UNESCO-IHE Code of Conduct regarding Information Technology (IT)

UNESCO-IHE Code of Conduct regarding Information Technology (IT) UNESCO-IHE Code of Conduct regarding Information Technology (IT) Introduction The use of computers within all the domains of UNESCO-IHE (education, research, administration, projects and marketing & communications)

More information

Integration of Learning Management Systems with Social Networking Platforms

Integration of Learning Management Systems with Social Networking Platforms Integration of Learning Management Systems with Social Networking Platforms E-learning in a Facebook supported environment Jernej Rožac 1, Matevž Pogačnik 2, Andrej Kos 3 Faculty of Electrical engineering

More information

A Middleware-Based Approach to Mobile Web Services

A Middleware-Based Approach to Mobile Web Services Abstract A Middleware-Based Approach to Mobile Web Services Pampa Sadhukhan, Pradip K Das, Rijurekha Sen, Niladrish Chatterjee and Arijit Das Centre for Mobile Computing and Communication (CMCC), Jadavpur

More information

Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan

Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan WWW.JOURNALOFCOMPUTING.ORG 85 New Quantitative Study for Dissertations Repository System Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan Abstract In the age of technology,

More information

Superdistribution revisited empirical evidence from a music filesharing

Superdistribution revisited empirical evidence from a music filesharing Fakultät für Betriebswirtschaft Munich School of Management Superdistribution revisited empirical evidence from a music filesharing network ODRL - Virtual Goods Conference Sophie Ahrens Institut für Wirtschaftsinformatik

More information

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used

More information

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY

More information

Marion County School District Computer Acceptable Use Policy

Marion County School District Computer Acceptable Use Policy Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through

More information

Version 2.3. Operations Manual for Users, Agents and Merchants

Version 2.3. Operations Manual for Users, Agents and Merchants SETECS SAFE System Secure Mobile Transactions System Version 2.3 Operations Manual for Users, Agents and Merchants (for Smart Phone Applications) ~~~~~~~~~~~~~~~~ December 2011 Copyright 2009 2011 SETECS

More information

Savannah Telecom Wi-Fi Terms and Conditions

Savannah Telecom Wi-Fi Terms and Conditions Savannah Telecom Wi-Fi Terms and Conditions Preamble These are the Terms and Conditions on which the Savannah Telecom wireless internet access services ("WiFi Service") will be provided to you (the "Contract").By

More information

How To Use Quantum Rbs Inc. Small Business Backup

How To Use Quantum Rbs Inc. Small Business Backup Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology

More information

ResNet Guide. Information & Learning Services. Here to support your study and research

ResNet Guide. Information & Learning Services. Here to support your study and research ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,

More information

Table Of Contents. Code of Practice regarding customer affairs

Table Of Contents. Code of Practice regarding customer affairs Code of Practice Code of Practice regarding customer affairs Table Of Contents 1: The purpose of this Code of Practice... 2 2: About Etisalat... 2 3: Our Contact Details... 2 4: Services Terms and Conditions,

More information

Clixsense - World Best Site and Best way to Earn for life

Clixsense - World Best Site and Best way to Earn for life Clixsense - World Best Site and Best way to Earn for life Clixsense Offer Its Members to Earn Money in 8 Ways Join for FREE, Read it and Follow the Guide step by step Still not a member of Clixsene - Click

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

Mobile Wallet Platform. Next generation mobile wallet solution

Mobile Wallet Platform. Next generation mobile wallet solution Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator

More information