The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected ...The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future.展开更多
With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of...With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis.展开更多
The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem app...The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem approaches. An analytical framework is estab- lished for reviewing the structure of mobile Internet business ecosystem. Then the core value, key actors, and inter-firm relationships of the mobile Internet ecosystem in the past and in the present are compared. It is found that the ecosystem structure has shifted from an MNO-centric model to a polycentric one with highly expanded value sources and di- versified keystone players. Accordingly some suggestions for regulatory policy makers are provided in terms of the roles of mobile Inter- net in social welfare improvement, the call for a convergent regulatory system, and chal- lenges for information security regulation.展开更多
In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management...In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.展开更多
Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order ...Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.展开更多
A wireless search system was integrated on Windows 2000 server.Based on the communication principle between wireless data and Internet,the object expression of search file,the automatic query of document information,t...A wireless search system was integrated on Windows 2000 server.Based on the communication principle between wireless data and Internet,the object expression of search file,the automatic query of document information,the segment browsing of result information,and the receiving and sending of user information were realized by using Active Server Page 3.0,VB Script,WML Script insert languages and object orient database technology.The requirement querying information of material processing through Internet by GPRS,WAP mobile handset and so on was accomplished.展开更多
With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also...With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively.展开更多
In the mobile Internet environment, smart terminals should be multi-mode and multi-standby, and have smart open platform as well as rich client. However, consumption, radio frequency interference between two networks ...In the mobile Internet environment, smart terminals should be multi-mode and multi-standby, and have smart open platform as well as rich client. However, consumption, radio frequency interference between two networks and network cooperation issues emerge accordingly. This paper gives the solutions to the abovementioned problems: The video signal enhancer is used to improve the image quality and reduce power consumption; the radio frequency interference is reduced by avoiding interference caused by in-band leakage and by out-of-band block; and the effective cooperation between dual networks can be fulfilled by re-designing communication architecture, processor, service logic and User Interface (UI).展开更多
Mobile Internet will be the killer application of 3G. For the mobile Internet, the business model of telecom operators has to evolve to Teleco2.0. IP Multimedia Subsystem (IMS) will be used mainly for VIP and enterpri...Mobile Internet will be the killer application of 3G. For the mobile Internet, the business model of telecom operators has to evolve to Teleco2.0. IP Multimedia Subsystem (IMS) will be used mainly for VIP and enterprise customers. Mass-oriented entertainment and new media services will be based on the Intelligent Node Overlay Node (INON)/Distributed Service Network (DSN). The core network will be flat, with an evolution route from Internet High Speed Packet Access (I-HSPA) to System Architecture Evolution (SAE), and even the Internet can be used as the core network. The low-cost mobile phone can be accessed to HTTP Internet by using 'client end software + portal'model with cloud computing. Flat rate will be the only fee model to be accepted by customers, and cheap and reasonable prices will contribute to the development of mobile Internet.展开更多
This paper proposes that the business model of mobile Internet services is shifting from a walled garden to an open one. The service development model relies more on open Application Programme Interface (API); and the...This paper proposes that the business model of mobile Internet services is shifting from a walled garden to an open one. The service development model relies more on open Application Programme Interface (API); and the online application software store is becoming an important platform for service delivery. The terminal platform has been the commanding point of the layout and competition of the mobile Inernet in the world. Based on the smart terminal, the competition for platform system from the hardware platform to the operation system, the middleware and the applications platform have been in shape globally. The competition in the terminal platform of mobile Internet is moving from close to open, from uni-controlled by one company to open and cooperated by the whole industry. China should forge a terminal platform system and the ecosystem for the mobile Internet industry, and seek to achieve an overall breakthrough in the whole value chain of the industry based on the huge mobile user market and the productivity of the terminal. The breakthrough should start from the application software, stepping from the top to the bottom platform, to extend the industry chain.展开更多
Along with the deployment of 3G networks and the launch of diversified mobile Internet services, network service modes and operation modes have greatly changed, and now the smart phone plays a key role. Accordingly, t...Along with the deployment of 3G networks and the launch of diversified mobile Internet services, network service modes and operation modes have greatly changed, and now the smart phone plays a key role. Accordingly, the key technologies for the smart phone, such as the application security management framework, application software authentication mechanism, interoperating capability and dynamic power management should be paid much attention to. The mobile phone vendors are gradually transforming into platform providers who will offer the support for services, including hardware, protocol stacks and storage, instead of providing specific services. Meanwhile, operators and Internet service providers will become the main body of service development.展开更多
On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies, this paper presents the problems encountered during the research and points out some key points and ...On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies, this paper presents the problems encountered during the research and points out some key points and research goals in this field. It infers that it is necessary to perform research on issues such as new Internet routing theories and protocols, structural characteristics of changing networks, multicast theories in mobile Internet environment and IPv6-based wireless IP network theories.展开更多
The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three...The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.展开更多
With the enforcement of 3G network capabilities in the future, the mobile Internet will greatly change the service modes of traditional Internet, rather than simply combine the Internet with mobile networks. The devel...With the enforcement of 3G network capabilities in the future, the mobile Internet will greatly change the service modes of traditional Internet, rather than simply combine the Internet with mobile networks. The development of new technologies such as Mashup and mobile widgets will enable better service for users and new business models, bringing benefits for the industrial chain members including operators, vendors, Content Providers/Service Providers (CPs/SPs) and Internet application providers. The mobile Internet and the traditional Internet not only compete for contents and services, but also cooperate with each other; and the mobile Internet services should focus on mobile applications to avoid the homogenization with traditional Internet service.展开更多
The combination and application of the mobile internet techniques with the weather radar monitoring data and the numerical weather pre-diction data were introduced, and the smart phone weather routing application sof...The combination and application of the mobile internet techniques with the weather radar monitoring data and the numerical weather pre-diction data were introduced, and the smart phone weather routing application software for both land and aquatic traffic safety, which is equipped with the function of analysis and warning of disastrous weather, was developed to reduce potential weather risks encountered during the journey as much as possible.展开更多
Wideband Wireless Mobile Internet (WWMI) has become one of the most important technologies for Modern Service. The Modern Service information communication multi-access network can easily realize the new operation mod...Wideband Wireless Mobile Internet (WWMI) has become one of the most important technologies for Modern Service. The Modern Service information communication multi-access network can easily realize the new operation modes formed by various Modern Service support systems. We think that under the new operation modes, the charges on calling and information will become more negligible, while the charge on services provided by the direct service support of various Modern Service platforms will turn into a major revenue source. It is suggested that the operators build an operation service support platform with common services to cooperate with thousands of information websites, help clients to transform information into profit and carry out operations and services.展开更多
In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technolog...In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technology engines and carried out the interoperability test. From the perspective of fixed Internet, the World Wide Web Consortium (W3C) developed the technology standard based on basic Web applications, laying the foundation for Web-based mobile Internet applications. There are a number of important technology engines supporting mobile Internet services, including the engine for Internet access and download, the engine for providing status of mobile users and mobile terminals, the engine for community/group administration, the engine for mobile search, and the engine for classification-based content filtering.展开更多
In this paper, we conduct research on the service industry mobile marketing under the mobile Internet background. Marketing activities from scratch, never valued to the cherished, the Marketing Department in from scra...In this paper, we conduct research on the service industry mobile marketing under the mobile Internet background. Marketing activities from scratch, never valued to the cherished, the Marketing Department in from scratch, from the production of auxiliary department to the enterprise leading department of course have made indelible contribution to the development of the enterprise. Services marketing is not justfor external customers, at the same time also want to take a marketing gimmick to internal customers. External marketing is a pointer to a series of services provided by the customer, including all preferential foreign propaganda and sales promotion action plan, including personnel and more than the personnel communication skills, as well as the services provided by all service equipment. This paper analyzes this issue from theunique perspective that is meaningful.展开更多
In the mobile Internet era,the business model of new retail enterprises has changed greatly,so the audit mode needs to be innovated to adapt to the development of the times and improve the audit quality.Luckin Coffee ...In the mobile Internet era,the business model of new retail enterprises has changed greatly,so the audit mode needs to be innovated to adapt to the development of the times and improve the audit quality.Luckin Coffee has achieved rapid expansion relying on Internet technology,but the unsustainability of its business model leads to financial fraud by its management.In the mobile Internet era,the new retail enterprises,such as Luckin Coffee,are more suitable to adopt the data-based audit mode.In the audit process,the business model,original sales data,information system and transaction cycle are the key audit contents,and the key audit technologies such as field investigation,information technology and data analysis are adopted to realize the verification of financial information of new retail enterprises[1].展开更多
According to a recent study released by Kenya's e-commerce platform Jumia, 60 percent of the Kenyan population has now access to Internet. This is the highest proportion in Africa, where the average Intemet penetrati...According to a recent study released by Kenya's e-commerce platform Jumia, 60 percent of the Kenyan population has now access to Internet. This is the highest proportion in Africa, where the average Intemet penetration rate is only 18 percent. Kenyans' high connectivity is mostly due to the rapid development and increasing availability of mobile Internet, which is changing daily life in the country. ChinAffica reporter Ge Lijun sat down with Zi Ran, who is in charge of Palmchat,~the social networking platform of Chinese mobile phone manufacturer Tecno.展开更多
基金This manuscript has sponsored by(531-541009)from the Advanced Institute of Finance,Sun Yat-sen University.
文摘The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future.
基金partially supported by the Zhejiang Provincial Natural Science Foundation of China(No.LY16F020010)the Zhejiang Key Discipline Fund of Computer Applied Technology(No.pd2013457)the Hangzhou Science&Technology Development Project of China(No.20140533B13)
文摘With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis.
基金supported by the China Fundamental Research Funds for the Central Universities under Grant No.BUPT2012RC1011
文摘The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem approaches. An analytical framework is estab- lished for reviewing the structure of mobile Internet business ecosystem. Then the core value, key actors, and inter-firm relationships of the mobile Internet ecosystem in the past and in the present are compared. It is found that the ecosystem structure has shifted from an MNO-centric model to a polycentric one with highly expanded value sources and di- versified keystone players. Accordingly some suggestions for regulatory policy makers are provided in terms of the roles of mobile Inter- net in social welfare improvement, the call for a convergent regulatory system, and chal- lenges for information security regulation.
基金This work was supported by the National Natural Science Foundation of China(61772196,61472136)the Hunan Provincial Focus Social Science Fund(2016ZDB006)+2 种基金Hunan Provincial Social Science Achievement Review Committee results appraisal identification project(Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee(XSP 19ZD1005)The authors gratefully acknowledge the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology(2017TP1026).
文摘In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.
基金supported by the project"the Cross Layer Optimization Technique for IMT-Advanced " under Grant No.2010ZX03003-001-01-03
文摘Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.
基金Item Sponsored by Doctoral Program of Higher Education of China(97014515)
文摘A wireless search system was integrated on Windows 2000 server.Based on the communication principle between wireless data and Internet,the object expression of search file,the automatic query of document information,the segment browsing of result information,and the receiving and sending of user information were realized by using Active Server Page 3.0,VB Script,WML Script insert languages and object orient database technology.The requirement querying information of material processing through Internet by GPRS,WAP mobile handset and so on was accomplished.
基金supportedin part by Sub-project "Mobile Internet Architecture and Key Technology Research" of National Core Electronic Devices,High-end Generic Chips and Basic Software (CHBS) Project "Development Strategy and Planning ofMobile Internet System Hardware and Software Technology and Service" under Grant No.2012ZX01039003Sub-project "IPv6 Application and Demonstration of Mobile Internet inCampus Environment" of National Sci-Tech Major Special Item Project "IPv6 Applicationand Demonstration of Mobile Internet" under Grant No. 2012ZX03002015-003A New Network Architecture:Address Driven Network Architecture and Technology Research and Development under Grant No. CNGI-12-03-001
文摘With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively.
文摘In the mobile Internet environment, smart terminals should be multi-mode and multi-standby, and have smart open platform as well as rich client. However, consumption, radio frequency interference between two networks and network cooperation issues emerge accordingly. This paper gives the solutions to the abovementioned problems: The video signal enhancer is used to improve the image quality and reduce power consumption; the radio frequency interference is reduced by avoiding interference caused by in-band leakage and by out-of-band block; and the effective cooperation between dual networks can be fulfilled by re-designing communication architecture, processor, service logic and User Interface (UI).
文摘Mobile Internet will be the killer application of 3G. For the mobile Internet, the business model of telecom operators has to evolve to Teleco2.0. IP Multimedia Subsystem (IMS) will be used mainly for VIP and enterprise customers. Mass-oriented entertainment and new media services will be based on the Intelligent Node Overlay Node (INON)/Distributed Service Network (DSN). The core network will be flat, with an evolution route from Internet High Speed Packet Access (I-HSPA) to System Architecture Evolution (SAE), and even the Internet can be used as the core network. The low-cost mobile phone can be accessed to HTTP Internet by using 'client end software + portal'model with cloud computing. Flat rate will be the only fee model to be accepted by customers, and cheap and reasonable prices will contribute to the development of mobile Internet.
文摘This paper proposes that the business model of mobile Internet services is shifting from a walled garden to an open one. The service development model relies more on open Application Programme Interface (API); and the online application software store is becoming an important platform for service delivery. The terminal platform has been the commanding point of the layout and competition of the mobile Inernet in the world. Based on the smart terminal, the competition for platform system from the hardware platform to the operation system, the middleware and the applications platform have been in shape globally. The competition in the terminal platform of mobile Internet is moving from close to open, from uni-controlled by one company to open and cooperated by the whole industry. China should forge a terminal platform system and the ecosystem for the mobile Internet industry, and seek to achieve an overall breakthrough in the whole value chain of the industry based on the huge mobile user market and the productivity of the terminal. The breakthrough should start from the application software, stepping from the top to the bottom platform, to extend the industry chain.
基金funded by the National High Technology Research and Development Program of China ("863" Program) under Grant No.2002AA1Z2306
文摘Along with the deployment of 3G networks and the launch of diversified mobile Internet services, network service modes and operation modes have greatly changed, and now the smart phone plays a key role. Accordingly, the key technologies for the smart phone, such as the application security management framework, application software authentication mechanism, interoperating capability and dynamic power management should be paid much attention to. The mobile phone vendors are gradually transforming into platform providers who will offer the support for services, including hardware, protocol stacks and storage, instead of providing specific services. Meanwhile, operators and Internet service providers will become the main body of service development.
文摘On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies, this paper presents the problems encountered during the research and points out some key points and research goals in this field. It infers that it is necessary to perform research on issues such as new Internet routing theories and protocols, structural characteristics of changing networks, multicast theories in mobile Internet environment and IPv6-based wireless IP network theories.
基金supported by the National HighTechnology Research and Development Programof China ("863" Program) under Grant No.2008AA01A204
文摘The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.
文摘With the enforcement of 3G network capabilities in the future, the mobile Internet will greatly change the service modes of traditional Internet, rather than simply combine the Internet with mobile networks. The development of new technologies such as Mashup and mobile widgets will enable better service for users and new business models, bringing benefits for the industrial chain members including operators, vendors, Content Providers/Service Providers (CPs/SPs) and Internet application providers. The mobile Internet and the traditional Internet not only compete for contents and services, but also cooperate with each other; and the mobile Internet services should focus on mobile applications to avoid the homogenization with traditional Internet service.
基金Supported by Projects of Science Technology Department of Zhejiang Province(2014C23003,2015C02048,2017C03035)Major Projects of Zhejiang Meteorological Bureau(2015ZD10,2015ZD11)
文摘The combination and application of the mobile internet techniques with the weather radar monitoring data and the numerical weather pre-diction data were introduced, and the smart phone weather routing application software for both land and aquatic traffic safety, which is equipped with the function of analysis and warning of disastrous weather, was developed to reduce potential weather risks encountered during the journey as much as possible.
基金supported by the National Key Technology R&D Program of China under Grant No.2006BAH02A03.
文摘Wideband Wireless Mobile Internet (WWMI) has become one of the most important technologies for Modern Service. The Modern Service information communication multi-access network can easily realize the new operation modes formed by various Modern Service support systems. We think that under the new operation modes, the charges on calling and information will become more negligible, while the charge on services provided by the direct service support of various Modern Service platforms will turn into a major revenue source. It is suggested that the operators build an operation service support platform with common services to cooperate with thousands of information websites, help clients to transform information into profit and carry out operations and services.
文摘In order to ensure interoperability of basic mobile applications, the Open Mobile Association (OMA), from the perspective of mobile application, developed the mobile application layer technical standards for technology engines and carried out the interoperability test. From the perspective of fixed Internet, the World Wide Web Consortium (W3C) developed the technology standard based on basic Web applications, laying the foundation for Web-based mobile Internet applications. There are a number of important technology engines supporting mobile Internet services, including the engine for Internet access and download, the engine for providing status of mobile users and mobile terminals, the engine for community/group administration, the engine for mobile search, and the engine for classification-based content filtering.
文摘In this paper, we conduct research on the service industry mobile marketing under the mobile Internet background. Marketing activities from scratch, never valued to the cherished, the Marketing Department in from scratch, from the production of auxiliary department to the enterprise leading department of course have made indelible contribution to the development of the enterprise. Services marketing is not justfor external customers, at the same time also want to take a marketing gimmick to internal customers. External marketing is a pointer to a series of services provided by the customer, including all preferential foreign propaganda and sales promotion action plan, including personnel and more than the personnel communication skills, as well as the services provided by all service equipment. This paper analyzes this issue from theunique perspective that is meaningful.
文摘In the mobile Internet era,the business model of new retail enterprises has changed greatly,so the audit mode needs to be innovated to adapt to the development of the times and improve the audit quality.Luckin Coffee has achieved rapid expansion relying on Internet technology,but the unsustainability of its business model leads to financial fraud by its management.In the mobile Internet era,the new retail enterprises,such as Luckin Coffee,are more suitable to adopt the data-based audit mode.In the audit process,the business model,original sales data,information system and transaction cycle are the key audit contents,and the key audit technologies such as field investigation,information technology and data analysis are adopted to realize the verification of financial information of new retail enterprises[1].
文摘According to a recent study released by Kenya's e-commerce platform Jumia, 60 percent of the Kenyan population has now access to Internet. This is the highest proportion in Africa, where the average Intemet penetration rate is only 18 percent. Kenyans' high connectivity is mostly due to the rapid development and increasing availability of mobile Internet, which is changing daily life in the country. ChinAffica reporter Ge Lijun sat down with Zi Ran, who is in charge of Palmchat,~the social networking platform of Chinese mobile phone manufacturer Tecno.