CAICT COMMUNICATIONS 2009/2
Mobile Services Revisited: an Analysis of
ICMB 2006
Jan Damsgaard & Jonas Hedman
26. February 2009
ISBN 978-87-92524-01-0
Center for Applied ICT (CAICT)
Copenhagen Business School - Howitzvej 60 - 2000 Frederiksberg
URL http://www.cbs.dk/caict
Abstract
This paper analyzes the 44 papers included in the proceedings of the 5th ICMB conference in
Copenhagen 2006. The purpose of the paper was to investigate to what extent the conference
fulfilled its objectives which was to compare previous expectations with present realities along
the following four areas: (1) business models, (2) the influence of m-business on private and
work life, (3) the impact of regulation, and (4) the re-composition of the value network. In the
analysis we apply the well-known framework by Lyytinen and Yoo for studying nomadic
computing. In addition to this we also classify the papers in relation to type of artifact
investigated, application area, and research methodology. The analysis show that the main focus
lay on the use and adoption of mobile services – over 60% of the papers address. Few papers
address the impact of service on any level of analysis. Business model is a recurring topic in 17
of the papers. There is lack in theorizing of the artifact, e.g. many just study mobile devices, but
do not describe what type they study.
1. Introduction
The mobile phone is one of the greatest innovations of modern time. It is the fourth item to be
carried by mankind in addition to the wallet, the watch and keys (Constantiou, Damsgaard, &
Knutsen, 2006). Whereas the former three have fought vigorously for centuries for their lucrative
position the mobile phone has claimed victory in just a decade and a half. The mobile phone has
become a ubiquitous part of us and many think of the mobile phone as a true extension of
themselves (Kruse, Ström Carlsson, & Ericsson Consumer and Enterprise Lab, 2003).
Whereas voice and basic services such as text messages (SMS) have been embraced expeditious
other more advanced mobile services has been much less successful to the surprise and
frustration of many, including actors in the telecommunication industry and researchers
(Constantiou et al., 2006). Numerous times has the mobile service revolution been proclaimed to
be just around the corner, e.g. Lyytinen and Yoo (2002) forecasted the amount of data transfer
via wireless connection will be 200 Megabytes per user in 2006 something that was very far
from true. It is fair to state that it is not exactly clear why the promise of mobile services has not
materialized. Some claim that it is the low data communication speed (Kumar , Shailaja,
Kavitha, & Saxena, 2006), others the poor quality of the services (McMahon & Steketee, 2006;
Steinert, 2006) whereas others point to antiquated and static business models in the
telecommunication sector (Coursaris, Hassanein, & Head, 2006; Saugstrup & Henten, 2006;
Thestrup, Sørensen, & De Bona, 2006) or poor revenue sharing along the value chain (Ballon &
Bossuyt, 2006; Henri & Aurélie, 2006) are the main culprits.
In 2006 the theme of the fifth International Conference on Mobile Business was mobile services
revisited. The underlying assumption was that in 2006 m-business would have evolved to a
degree where predictions about the future would have passed and we would have witnessed the
full impact of m-business. The conference was therefore dedicated to comparing previous
expectations with the realities. The comparisons could take place in the following areas:
• business models,
• the influence of m-business on private and work life,
• the impact of regulation,
• and in the re-composition of the value network.
The goal was to revise previous understanding and generate insights about the fundamental
factors that guide the evolution of m-business. So, the purpose of this paper is to evaluate the 5th
ICMB conference whether it reached its goals and fulfilled its promises. To accomplish our aim
we provided a systematic investigation of the papers published in the proceedings of ICMB
2006. The main research questions are: What were the topics and research issues? What were the
levels of analysis? What methodologies were applied? What were the artifacts of focus and the
application areas? With the analysis we provide a map of the research into mobile business.
The reminder of this paper is organized as follows. In the next section we present our main
analytical tool for the investigation. In section three we describe and justify our research
approach (literature analysis) and present some descriptive data. Our analyses are provided in
section four. Section five discusses our findings and we make some conclusions. We also report
some untapped research issues that are worth pursuing for researchers in this field.
2. Framework for the analysis
To guide our analysis of the proceedings we use the well-cited holistic framework of Lyytinen
and Yoo (2002) that incorporates 8 research themes and 20 research issues that researchers must
address if they wish to fully comprehend and provide advice to the fundamental changes we
witness in the area of nomadic computing.
There are three are three drivers of change in nomadic computing (Lyytinen & Yoo, 2002). They
are convergence, mobility and mass scale. They all evolve around an infrastructure layer and a
service layer. Figure 1 depicts the drivers of nomadic computing environments. The drivers are
interdependent, but yet distinct in the sense that they each individually can contribute to the
innovation of both services and infrastructure. But when simultaneously working together the
contribution becomes larger than just the sum of the drivers separately (Lyytinen & Yoo, 2002,
p. 378).
Mobility
Services
Infrastructure
Convergence
Mass Scale
Figure 1. Lyytinen and Yoo’s (2002, p. 378) Framework for nomadic computing environments
In the following we shortly present the three fundamental drivers and the two layers in the
framework and adapt them to a mobile business context.
Mobility captures the development of computing that used to be placed in large rooms at central
locations to a situation where we can carry computing capability with us (e.g. the mobile phone,
a navigation system or more recently Apple’s iPhone and iPod). Digital convergence refers to
the process where technological platform for, e.g. voice, photos and music, begin to seamlessly
work together. Digital convergence also captures the development of new enabling technologies
for example IPv6 and the family of IEEE 802.1x protocols (Bluetooth, WiFi and WiMax) but
also the 3G protocol UMTS and 3.5G HDSPA. Whereas most mobile phones in the past only
packed one of the above protocols most mobile phones presently bundle several of the above.
The last of the three fundamental drivers is mass scale. This refers to the mass scale of which
nomadic and hence also mobile services will be made available. There are for example around
2.5 billion mobile phone users in the world growing at 200 million per quarter. Soon the majority
of people on earth will have a mobile phone.
The drivers effect and enable the development of the underlying infrastructure on which the
services are designed and developed upon. There is a mutual dependency between the two layers.
The demand for services drives the development of the infrastructure which enables new services
(Lyytinen & Yoo, 2002, p. 379).
When deriving the research issues Lyytinen and Yoo uses the dichotomy between services and
infrastructure and crosses them with the level of analysis (individual, team, organizational and
inter-organizational level). Services are further divided into three research topics (design, use
and adoption, and impact). The infrastructure layer is further categorized into enabling
capabilities and governance and control. This 4 by 5 matrix yields 20 research issues that
researchers must address in order to comprehend and offer guidance to the rapid and
fundamental changes that the three drivers impart on the research environment. The framework
thus provides us with our analytical foundation. The next section explains and justifies our use of
the framework to analyze the 44 articles published in the proceedings of ICMB 2006
(Damsgaard & Yoo, 2006)
3. Methodology
This section describes why and we went about answering the research questions. Webster and
Watson’s (2002, p. xiii) provides good arguments for writing and conducting literature reviews.
“A review of prior, relevant literature is an essential feature of any academic project. An
effective review creates a firm foundation for advancing knowledge. It facilitates theory
development, closes areas where a plethora of research exists, and uncovers areas where
research is needed”.
In addition, they argue that a good literature review should be focused upon topics and concepts
(Webster & Watson, 2002). In identifying topics we apply the previously introduced
frameworks. The reason for selecting the framework is the degree of institutionalization in the
scientific community. First, it is published in one of the leading IS-journals (Information Systems
Research), according to several rankings (see e.g. www.isworld.org for journal ranking). The
second reason is the large number of citations (159 according to Google Scholar in the beginning
of February 2008).
The starting point in analyzing the papers was to uniquely identify each paper, based on
alphabetic order (see Appendix 1.). In order to keep track of the analysis an excel sheet was
created. The excel sheet contained 44 rows, one for each paper, and 15 columns. The columns
reflect the different level of analysis (four columns) and drivers (three columns) in Lyytinen and
Yoo’s (2002) holistic framework. In addition to this we added one column for identifying
application area, one column for type of artifact, one for conference area, and five columns for
identifying the research methodology. Thereafter, the analysis took place. We decided to classify
the papers according to track appearance, instead of alphabetic order, since papers within a track
ought to have similarities.
We classified each paper in relation to level of analysis (individual, team/group, organization,
and inter-organization) and in relation to the design, use and adoption, and impact of services as
well as the enabling capability and governance of the underlying infrastructure. Then we
classified the papers according to the three key drivers (mobility, convergence, mass scale),
research methodology, artifact type, and application area. We used the excel sheet to keep track
of our classification by making notes and writing key words in the corresponding cell in the
excel sheet. To illustrate the process we exemplify it with the best paper of the conference (Bina
& Giaglis, 2006). Bina and Giaglis (2006) paper applied survey as research methodology (in
table 1 this paper is identified as paper no. 3) and was focused on WLAN as technological
artifact in an inter-organizational context. Furthermore, the paper was classified as applying both
mobility and mass scale and fundamental driver. The paper was also classified as belonging to
service, individual level, and use and adoption of the holistic framework.
The process was not as straightforward as the illustration above may suggest. In most case there
were several iterations when classifying a paper. One reason was that our understanding of the
data material increased as we classified more papers. Therefore several of the early
classifications were re-done.
Before presenting the result in the next section, we will first reveal some descriptive data of he
44 papers. There were 65 submissions of which 44 were included in the proceedings. The papers
were submitted into seven tracks (numbers within brackets are the amount of papers in that
track): M-business models (17), ubiquitous computing (7), M-business in mobile work and
interaction (6), M-health (2), social and societal implications and considerations (6), economics
of m-business (2), and mobile information systems (4). In relation to the four areas of the
conference the approximate distribution was identified: 40% address business models, 32%
address the influence of m-business on private and work life, 13% address the re-composition of
the value network, 3% address the impact of regulation, and 12% address other areas.
There were several different types of mobile artifacts. The most common artifacts were mobile
phones, mobile applications, WLAN/WiFi/Wimax, large computing devices, mobile devices, and
others. One interesting thing is that several of the papers use the term mobile device (Fox,
Rezania, Wareham, & Christiaanse, 2006; Melo, Nagler-Ihlein, & Weber, 2006), but does not
describe what type of artifact they refer to. So, there is a lack of descriptions and theorizing of
the artifact (Orlikowski & Lacono, 2001). This will most definitely have and impact on our
collective ability to accumulate knowledge concerning the phenomena of mobile related artifacts.
The same problem exist in the information systems field (Orlikowski & Lacono, 2001).
The papers addressed several application areas and the most common areas are marketing and
advertising (e.g. Chen & Pau, 2006; Heinonen & Strandvik, 2006; Key Pousttchi & Wiedemann,
2006), inter-organizational use (e.g. Ballon & Bossuyt, 2006; Krotov & Junglas, 2006;
Marchegiani, 2006; Key Pousttchi & Thurnher, 2006), and electronic payment (e.g. Fabini,
Reichl, Poropatich, Huber, & Jordan, 2006; Hussin, Edwards , & Coulton, 2006; Ondrus &
Pigneur, 2006). The focus is clearly oriented towards business-to-consumer orientation (B2B).
Very few papers addressed the firm internal use of mobile applications.
The final descriptive area is the research methodology. In table 1 we have summarized the
classification of applied research methodology. We used the following categories: single case
study, multiple case study, survey, interview, and not reported or conceptual. Multiple case,
survey and interviews are the main empirical approaches. Single case studies are found in five of
the papers. Note that several of the papers applied several types of research methodology (e.g.
Fox et al., 2006; Komulainen, Ristola, & Still, 2006; Key Pousttchi & Thurnher, 2006).
Table 1. Summary of applied research methodology
Research methodology
Paper number in appendix 1
No of papers
Single case study
5, 17, 25, 43, 44
5
Multiple case
1, 2, 4, 6, 7, 8, 10, 13, 22, 23, 31, 33, 37, 41, 42
15
Survey
3, 9, 12, 16, 19, 20, 22, 27, 28, 34, 36, 38
12
Interview
2, 9, 15, 22, 26, 32, 33, 34, 35
9
Not reported or conceptual
11, 14, 18, 21, 24, 29, 30, 31, 39, 40, 43
11
3.1 Result
In the following section we will present the result of the classification of the 44 articles into the
two theoretical frameworks. The results are found in table 2 and 3. Note that we in table 3 show
the names of the authors instead of just the number.
In relation to the nomadic computing environments framework most of the papers were
classified into the service dimension. Mobility was the most addressed driver (25 no of papers)
followed by convergence (21 no of papers) and mass scale (20 no of papers). Five of the papers
did not address any of the drivers for mobile business. Several of the papers addressed two or
three of the drivers. The framework was found a little bit problematic, since its discriminating
ability was found low. A summary of this classification is found in table 2.
Table 2. Classification according to nomadic computing environments
Mobility
Convergence
Mass Scale
Not possible to classify
Service
Infrastructure
3, 4, 6, 9, 11, 12, 13, 14, 15, 16, 18, 20, 21, 25, 26, 28,
29, 31, 33, 34, 36, 37, 41, 43, 44
4, 5, 6, 9, 10, 12, 14, 15, 16, 17, 18, 20, 21, 22, 25, 31,
32, 34, 37, 38, 44
1, 3, 5, 6, 10, 11, 17, 18, 19, 21, 22, 23, 27, 28, 31, 36,
39, 41, 43, 44
2, 24, 35, 40
7, 8, 30
7, 13, 30
7, 8, 13
42
As shown by table 3, last column, there is an overwhelming majority of papers, 45 in total, in
relation to service and only 5 in relation to infrastructure. Note that seven of the papers were
classified into more than one category (Coursaris et al., 2006; Decker, Schiefer, & Bulander,
2006; Garner et al., 2006; Imai, Sugiue, Hori, & Masuda, 2006; Komulainen et al., 2006; Key
Pousttchi & Thurnher, 2006; Ziv & Mullot, 2006). The most common issue is use and adoption
of services, with 31 papers. To our surprise only seven papers addressed the impact. This was
somewhat surprising when considering the theme of the conference, which was formulated as
“m-business would have evolved to a degree where predictions about the future would have
passed and we would have witnessed the full impact of m-business”. Design, i.e. development,
was addressed in seven papers. When we move over to infrastructure we can see that four papers
addressed enabling capabilities and only one papers addressed governance and control of
infrastructure. In relation to level of analysis the most is inter-organizational level with 18
papers followed by organizational and individual level with 13 papers each. The team/group
level was addressed by seven papers.
Table 3. Summary of classification in accordance with the holistic framework
Level of analyses
Organizational
Individual
Team/Group
Inter-organizational
Total
Design
McMahon and Steketee;
Chen and Paul
Nickerson and Isaac
Kumar et al.
Drossos and Giaglis;
Heinonen and Strandvik;
Pousttchi and Widemann
Thestrup et al.
Marchegiani
Garner et al.;
Hussin et al.
Ondrus and Pigneur
Angelov adn Rao
Comonova and Pigneur
Tan and Henten
7
Use and
Adoption
Bina and Giaglis;
Fox et al.;
Pousttchi and Thurnher;
Komulainen;
Campbell;
Feng et al.;
Junglas and Spitzmüller;
Kargin and Basoglu;
Komnios;
Repo
No paper
Henri and Aurélie;
Imai et al.;
Ziv and Mullot;
Lu and Swatman;
Richter et al.;
Leijdekkers and Gay;
Steinert;
Coursaris et al.;
Melo et al.;
Krotov and Junglas;
Komulainen;
Decker et al.;
Imai et al.;
Hawryszkiewycz and Steele;
Yuan and Zeng;
No paper
Pousttchi and Thurnher;
Fabini et al.
Ziv and Mullot
Sagstrup and Henten;
Ballon Bossyt;
Decker et al.;
Tan and Wong
7
Coursaris et al.
Decker et al.
No paper
No paper
No paper
4
No paper
No paper
Garner et al.
Yamakami
Michael et al.
Services
Impact
Infrastructu
re
Enabling
capabilities
Governanc
e and control
31
1
4. Analysis
We use Lyytinen and Yoo (2002) framework found in table 3 to structure of the analyses. We
begin to analyze the papers horizontally (the level of analysis). This is followed by the vertical
dimensions (design, use and adoption, impact, enabling capabilities, governance and control).
4.1 Vertical dimension
The focuses of papers addressed individual level are either concerned with the design or use and
adoption of new mobile based artifacts. Design recommendations are based on user needs or
derived from theory. In relation to design we can see design guidelines as a recurring aspect.
New artifacts are oriented towards mass market and generic services pushed onto the user.
Another important design idea is personalization and the users choose of specific services. Value
creation is often used as design criteria, but how it is achieved is fully expressed. In relation to
use and adoption there is a move from the often used technology acceptance model to new
perspectives. The main driver for use and adoption is motivation (demand side), which plays a
crucial role in both determining what is needed of new artifacts. The view of the user is either
´common people´ with needs or professional users (mobile worker). The mobile phone is a
highly personal device. Thus, when using it for business to consumer it becomes very delicate.
Issues related to information overload, control of personal information and learning are not
addressed.
The team and group level can be divided into groups with a common interest and work groups.
The two categories apply different underlying theoretical frameworks. Groups are both
communities who are connected via computer technology to surveillance and monitoring where
the groups are diverse placed people receiving different forms of information. A key issue is the
use of mobile devices in social contexts (acceptability) and new forms of mobile communication.
Another issue the anywhere, anytime in terms of appropriateness (social rules), and design of
social situations based on location and time. Research issues related to the design, such as
integration between people and technology, are superficially covered. Impact issues, e.g.
performance and trust, are not addressed at all.
Mobile devices in organizational contexts are means for collaboration between people. And the
success of organizational mobile devices relies on standardization of technology and interfaces
between devises. Inclusion of all users is a central theme, regardless of place and time (e.g. the
home, the office or temporary visitor) is central to the design. There is a strong empathizes on
how organizations can add value through mobile service and applications. This is based on
reviews of literature and suggests guidelines and propositions to achieve advantages for
organizations. Key issue in adoption of is task and technology fit. Barriers are also critical to
understand in the implementation of mobile technology. The design of generic services for
diverse organizational contexts is considered. Another emerge issue is related to security when
using mobile devices. However, there are few guidelines on how to achieve this.
At the inter-organizational level the focus is towards marketing, marketing campaigns and the
success factors within marketing campaigns. A majority of papers argues that there is a lack of
guidance for mobile marketing campaigns and majority of the recommendations are derived
from literature. The turning point for mobile marketing is SMS. Several of the papers concern
areas such as consumer expectations or the actual demand-side usage with derived technical
implementation. Implicitly, a cooperation of a network by organizations must be assumed.
Several papers analyses and investigates present research, experience gained, and adoption in
order to advance current understanding. Many studies attempt to identify gaps between theory
and actual market behavior. New perspectives are proposed to better explain market changes.
Security issues are of growing concerns, but interoperability between technical standards is one
of the strongest barriers to diffusion of mobile services.
4.2 Horizontal dimension
The focus of design of services is on recommendations how to design. The recommendations are
either based on interviews with potential users or based on deductive reasoning on the
requirements from theory. There are two types of design guidelines, which to some extent are
contradictory. They generic service designed for a mass market vs. personalized services for
each and one of us. This conflict may be solved through efficient technical configuration, which
can be used as a method by the consumer to define what he or she wants - not just selecting on
offers. This resembles the conflict between pull vs. push strategy. There are no major differences
between the levels of analysis.
The aim of the papers are either concerned with introducing a new herein or suggesting specific
characteristic guide lines for mobile communication, adoption of models (read: new
perspectives) from the ´traditional´ to the new mobile opportunities and new conceivable
services vs. Applying current services in other ways or in a different combination of available
opportunities. Motivation (demand side) is has a crucial role in both determining what is needed
of new considerations and as to what a more proper fashion of configuration of the technology
may be. Some ascribes the mobile phone as a highly personal device (privacy) and thus as using
it as a B2C channel as being very delicate. This view is mainly within consumer markets, and
generally it is accepted that there is a need for rules or considerations within this area. It does,
however, not seem to be a point of major concern with mobile workers in an organization
context, neither is organizational security mentioned much, and where it is related to the
communication between an organization and a consumer in e.g. e-commerce. Within an
organizational setting “the anytime- anywhere” connectivity seems focused on that a person can
always be reached or reach someone else, efficiency. But, in and end consumer setting the
connectivity attends more to social usage/ marketing effects.
Impact is only addressed on the organizational and inter-organizational levels. Papers attempts to
identify propositions of achieve advantages for organizations. Via hindsight knowledge tries to
suggest future impact effect and areas. One emerging issue is the business models and in
particular comparisons of business model configurations and the impact on the key stakeholders,
such as mobile operators, content providers, and content distributors.
Enabling capabilities is similar to use and adoption of service and divided into two parts, new
innovations or the use of existing infrastructure in new context. Infrastructure value is based on
fundamental attributes. An underlying idea is that value creation has not been achieved (both
demand side and supplier side) and that mobile solutions are driven by cost considerations.
Innovation is central and can be researched through SME participation in order to drive the
demand-side usage.
Mobile devices mean new possibilities of governance and control. For instance, the Global
Positioning System (GPS) can be used to track and monitor humans. This can be used both for
commercial applications (marketing and sales) and for monitoring people. This gives the people
or organizations in control of the technology unforeseen possibilities that can intrude the privacy
of the individual.
5. Discussion and conclusions
In this section we discuss the result of the analysis. The first overall question is did the
conference meet its goals. Based, on the systematic analysis of the presented papers we can
believe that the conference meet its goals. The only critic concerning the areas covered by the
papers is related towards the impact of regulation. If this is due to review process or the type of
papers submitted to the conference cannot be determined at this stage. The frameworks (nomadic
computing and holistic framework) proposed by Lyytinen and Yoo (2002) are useful when
analyzing papers addressing nomadic computing as the ones presented at the 5th ICMB
conference. All papers could be classified according to the frameworks, except for those that did
not describe any fundamental driver. The frameworks are comprehensive, since no additional
driver, research theme, or research issue emerged from the analyses of the papers. Some small
alterations, such as security issues are mentioned by Lyytinen and Yoo at inter-organizational,
but papers at organizational level addressed this issue as well. But, Lyytinen and Yoo do not
claim that their 20 research questions are an exhaustive list. So, one contribution by this paper is
that Lyytinen and Yoo’s framework have been validated as useful and relevant and we further
believe that it is a suitable framework for conducting reviews of mobile business literature.
Based on our use of the framework we believe that the clear distinction between services and
infrastructure could be the basis of a new research theme that is particular interesting for mobile
business. The motivation for this suggestion is not based on the number of papers that address
the infrastructure aspect but rather due to lack or absence of papers addressing this important
topic.
The focus on service and not infrastructure is understandable, since services are a focal point of
the areas of the conference, such as business models and influence of m-business on private and
work life. However, the lack of interest in impact or research into the theme is disappointing,
because we need more empirical research addressing the impact of mobile service on individuals,
team/groups, organizations, and inter-organizations. We need a variety in the underlying theories
and disciplines, from economics to psychology, and also in research approach, from positivistic
to interpretive approach.
On the horizontal dimension the focus was on the use and adoption of service across level of
analysis. The interesting and positive finding was that we can see a move from the technology
acceptance model towards motivation based models. Thus usefulness and ease of use are not the
only factors explaining why we adopt mobile services and devices.
The vertical dimension shows an orientation towards the inter-organizational level of analysis,
with a strong focus towards marking and marketing campaigns. We see this as an interesting
field for research and suggest collaborations between marketing and mobile researchers, thus
leading to cross-fertilization.
So, finally some concluding words and learning experiences that we would like to share and
hopefully convey to others. The first is that literature reviews of past conference is a good way of
advancing our knowledge and should be a natural part of the future conferences. This will
facilitate theory development, uncover new areas for research, and be a solid ground for calls for
papers. The second one relates to the result of our analyses, namely the lack of theorizing the
artifact. We found several papers just stating mobile devices, but what type of mobile device do
they refer to? Is it a phone or a laptop? We believe that this is very critical in order to advance
the field of nomadic computing.
6. Acknowledgements
Thanks to CBS president Finn Junge-Jensen for a grant enabling this study.
7. References
Angelov, B., & Rao, B. (2006). From Macedonia to Mauritius: New Trajectories in Wireless
Broadband Development. Paper presented at the International Conference on Mobile
Business.
Ballon, P., & Bossuyt, M. V. (2006). Comparing business models for multimedia content
distribution platforms. Paper presented at the International Conference on Mobile Business.
Bina, M., & Giaglis, G. M. (2006). Unwired Collective Action: Motivations of Wireless
Community Participants. Paper presented at the International Conference on Mobile
Business.
Campbell, D. E., Sarker, S., & Valacich, J. S. (2006). Collaboration using Mobile Technologies
(MCTs): When is it essential? Paper presented at the International Conference on Mobile
Business.
Camponovo, G., & Pigneur, Y. (2006). From Hype to Reality: A Case Study on the Evolution of
the Swiss WISP Industry. Paper presented at the International Conference on Mobile
Business.
Chen, H., & Pau, L.-F. (2006). Individual Tariffs for Mobile Services: Theoretical Framework
and a Computational Case in Mobile Music. Paper presented at the International Conference
on Mobile Business.
Constantiou, I. D., Damsgaard, J., & Knutsen, L. (2006). Exploring perceptions and use of
mobile services: user differences in an advancing market. International Journal of Mobile
Communications, 4 (3).
Coursaris, C., Hassanein, K., & Head, M. (2006). Mobile Technologies and the Value Chain:
Participants, Activities and Value Creation. Paper presented at the International Conference
on Mobile Business.
Damsgaard, J., & Yoo, Y. (2006). M-business Revisited. From Speculation to Reality. Paper
presented at the International Conference on Mobile Business (ICMB 2006), Copenhagen,
Denmark.
Decker, M., Schiefer, G., & Bulander, R. (2006). A SME-friendly framework for the provision
of mobile services. Paper presented at the International Conference on Mobile Business.
Drossos, D., & Giaglis, G. M. (2006). Mobile Advertising Effectiveness: an Exploratory Study.
Paper presented at the International Conference on Mobile Business.
Fabini, J., Reichl, P., Poropatich, A., Huber, R., & Jordan, N. (2006). “IMS in a Bottle”: Initial
Experiences from an OpenSER-based Prototype Implementation of the 3GPP IP Multimedia
Subsystem. Paper presented at the International Conference on Mobile Business.
Feng, H., Hoegler, T., & Stucky, W. (2006). Exploring the Critical Success Factors for Mobile
Commerce. Paper presented at the International Conference on Mobile Business.
Fox, P., Rezania, D., Wareham, J., & Christiaanse, E. (2006). Will Mobiles Dream of Electric
Sheep? Expectations of the New Generation of Mobile Users: Misfits with Practice and
Research. Paper presented at the International Conference on Mobile Business.
Garner, P., Edwards, R., & Coulton, P. (2006). Card-based Macropayment for Mobile Phones.
Paper presented at the International Conference on Mobile Business.
Hawryszkiewycz, I. T., & Steele, R. (2006). Service Oriented Design Methodologies for Mobile
Applications. Paper presented at the International Conference on Mobile Business.
Heinonen, K., & Strandvik, T. (2006). How do consumers react to mobile marketing? Paper
presented at the International Conference on Mobile Business.
Henri, I., & Aurélie, L. (2006). « Give me a mobile phone, and I will work harder! » Assessing
the value of mobile technologies in organizations : an exploratory research. Paper presented
at the International Conference on Mobile Business.
Hussin, W. H. W., Edwards , R., & Coulton, P. (2006). E-Pass Using DRM in Symbian v8 OS
and TrustZone: Securing Vital Data on Mobile Devices. Paper presented at the International
Conference on Mobile Business.
Imai, Y., Sugiue, Y., Hori, Y., & Masuda, S. i. (2006). Application of A Remote Surveillance
System with Mobile Phone-Enhanced User Interface. Paper presented at the International
Conference on Mobile Business.
Junglas, I., & Spitzmüller, C. (2006). Personality Traits and Privacy Perceptions: An Empirical
Study in the Context of Location-Based Services. Paper presented at the International
Conference on Mobile Business.
Kargin, B., & Basoglu, N. (2006). Adoption Factors of Mobile Services. Paper presented at the
International Conference on Mobile Business.
Komninos, A., Barrie, P., Newman, J., & Landsburgh, S. (2006). me-Commerce: An
Infrastructure for Personal Predictive Mobile Commerce. Paper presented at the
International Conference on Mobile Business.
Komulainen, H., Ristola, A., & Still, J. (2006). Mobile advertising in the eyes of retailers and
consumers – empirical evidence from a real-life experiment. Paper presented at the
International Conference on Mobile Business.
Krotov, V., & Junglas, I. (2006). Mobile Technology as an Enabler of Organizational Agility.
Paper presented at the International Conference on Mobile Business.
Kruse, E., Ström Carlsson, A., & Ericsson Consumer and Enterprise Lab. (2003). A Journey to
the Third Place: Market Reality Among Early Adopters (1. ed.). Stockholm: Ericsson
Consumer and Enterprise Lab.
Kumar , K. P., Shailaja, G., Kavitha, A., & Saxena, A. (2006). Mutual Authentication and Key
Agreement for GSM. Paper presented at the International Conference on Mobile Business.
Leijdekkers, P., & Gay, V. (2006). Personal Heart Monitoring and Rehabilitation System using
Smart Phones. Paper presented at the International Conference on Mobile Business.
Lu, N., & Swatman, P. (2006). Mobile Organic Certification (MobiCert) – A theoretical
foundation for a practical project. Paper presented at the International Conference on Mobile
Business.
Lyytinen, K., & Yoo, Y. (2002). Research Commentary: The next Way of Nomadic Computing.
Information Systems Research, 13 (4), 377-388.
Marchegiani, L. (2006). The two-sided coin of innovative mobile telecommunication market.
Paper presented at the International Conference on Mobile Business.
McMahon, M., & Steketee, C. (2006). Investigation of Proposed Applications for LBS Enabled
Mobile Handsets. Paper presented at the International Conference on Mobile Business.
Melo, G. M. d., Nagler-Ihlein, J., & Weber, M. (2006). Generating User Interfaces from CDISC
ODM for Mobile Devices. Paper presented at the International Conference on Mobile
Business.
Michael, K., McNamee, A., & Michael, M. (2006). The Emerging Ethics of Humancentric GPS
Tracking and Monitoring. Paper presented at the International Conference on Mobile
Business.
Nickerson, R. C., & Isaac, H. (2006). “Am I Disturbing You?”: A Research Model for
Investigating the Use of Mobile Phones in Social Settings. Paper presented at the
International Conference on Mobile Business.
Ondrus, J., & Pigneur, Y. (2006). A Systematic Approach to Explain the Delayed Deployment of
Mobile Payments in Switzerland. Paper presented at the International Conference on Mobile
Business.
Orlikowski, W. J., & Lacono, C. S. (2001). Research Commentary: Desperately Seeking the 'IT'
in IT Research--A Call to Theorizing the IT Artifact. Information Systems Research, 12 (2),
121.
Pousttchi, K., & Thurnher, B. (2006). Understanding Effects and Determinants of Mobile
Support Tools: A Usability-Centered Field Study on IT Service Technicians. Paper
presented at the International Conference on Mobile Business.
Pousttchi, K., & Wiedemann, D. G. (2006). A Contribution to Theory Building for Mobile
Marketing: Categorizing Mobile Marketing Campaigns through Case Study Research. Paper
presented at the International Conference on Mobile Business.
Repo, P., Hyvönen, K., & Saastamoinen, M. (2006). Traveling from B2B to B2C: Piloting a
Moblog Service for Tourists. Paper presented at the International Conference on Mobile
Business.
Richter, J. G., Nixdorf, M., Becker, A., Koch, T., Monser, R., & Schneider, M. (2006). Mobile
Computing instead of paper based documentation in German Rheumatology. Paper
presented at the International Conference on Mobile Business.
Saugstrup, D., & Henten, A. (2006). Developing Personal Network Business Models. Paper
presented at the International Conference on Mobile Business.
Steinert, M. (2006). An Expert Model on Barriers to Implement Mobile Data Services. Paper
presented at the International Conference on Mobile Business.
Tan, C. M., & Wong, C. C. (2006). Mobile Broadband Race: Friend or Foe? Paper presented at
the International Conference on Mobile Business.
Tan, S.-E., & Henten, A. (2006). New Mobile Technologies: Sustaining or Disruptive? Paper
presented at the International Conference on Mobile Business.
Thestrup, J., Sørensen, T. F., & De Bona, M. (2006). Using Conceptual Modeling and Value
Analysis to Identify Sustainable m>Business Models in Industrial Services. Paper presented
at the International Conference on Mobile Business.
Webster, J., & Watson, R. T. (2002). Analyzing the Past to Prepare for the Future: Writing a
Litterateur Review. MIS QUARTERLY, 26 (2), 65-65.
Yamakami, T. (2006). Lessons in business model development from early mobile Internet
services in Japan. Paper presented at the International Conference on Mobile Business.
Yuan, Y., & Zheng, W. (2006). The Fit between Mobile Task and Mobile Work Support: A
Theoretical Framework. Paper presented at the International Conference on Mobile
Business.
Ziv, N. D., & Mullot, B. (2006). An Exploration on Mobile Social Networking: Dodgeball as a
Case in Point. Paper presented at the International Conference on Mobile Business.
Appendix 1. Identifier of papers
No
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
Author/s and name of paper
Angelov, B. and Rao, B. (2006) From Macedonia to Mauritius: New Trajectories in
Wireless Broadband Development.
Ballon, P. and Bossuyt, M. V. (2006) Comparing business models for multimedia
content distribution platforms.
Bina, M. and Giaglis, G. M. (2006) Unwired Collective Action: Motivations of
Wireless Community Participants.
Campbell, D. E., Sarker, S. and Valacich, J. S. (2006) Collaboration using Mobile
Technologies (MCTs): When is it essential?.
Camponovo, G. and Pigneur, Y. (2006) From Hype to Reality: A Case Study on the
Evolution of the Swiss WISP Industry.
Chen, H. and Pau, L.-F. (2006) Individual Tariffs for Mobile Services: Theoretical
Framework and a Computational Case in Mobile Music.
Coursaris, C., Hassanein, K. and Head, M. (2006) Mobile Technologies and the Value
Chain: Participants, Activities and Value Creation.
Decker, M., Schiefer, G. and Bulander, R. (2006) A SME-friendly framework for the
provision of mobile services.
Drossos, D. and Giaglis, G. M. (2006) Mobile Advertising Effectiveness: an
Exploratory Study.
Fabini, J., Reichl, P., Poropatich, A., Huber, R. and Jordan, N. (2006) “IMS in a
Bottle”: Initial Experiences from an OpenSER-based Prototype Implementation of the
3GPP IP Multimedia Subsystem.
Feng, H., Hoegler, T. and Stucky, W. (2006) Exploring the Critical Success Factors
for Mobile Commerce.
Fox, P., Rezania, D., Wareham, J. and Christiaanse, E. (2006) Will Mobiles Dream of
Electric Sheep? Expectations of the New Generation of Mobile Users: Misfits with
Practice and Research.
Garner, P., Edwards, R. and Coulton, P. (2006) Card-based Macropayment for Mobile
Phones.
Hawryszkiewycz, I. T. and Steele, R. (2006) Service Oriented Design Methodologies
for Mobile Applications.
Heinonen, K. and Strandvik, T. (2006) How do consumers react to mobile marketing?.
Henri, I. and Aurélie, L. (2006) « Give me a mobile phone, and I will work harder! »
Assessing the value of mobile technologies in organizations : an exploratory research.
Hussin, W. H. W., Edwards , R. and Coulton, P. (2006) E-Pass Using DRM in
Symbian v8 OS and TrustZone: Securing Vital Data on Mobile Devices.
Imai, Y., Sugiue, Y., Hori, Y. and Masuda, S. i. (2006) Application of A Remote
Surveillance System with Mobile Phone-Enhanced User Interface.
Junglas, I. and Spitzmüller, C. (2006) Personality Traits and Privacy Perceptions: An
Empirical Study in the Context of Location-Based Services.
Kargin, B. and Basoglu, N. (2006) Adoption Factors of Mobile Services.
Komninos, A., Barrie, P., Newman, J. and Landsburgh, S. (2006) me-Commerce: An
Infrastructure for Personal Predictive Mobile Commerce.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
Komulainen, H., Ristola, A. and Still, J. (2006) Mobile advertising in the eyes of
retailers and consumers – empirical evidence from a real-life experiment.
Krotov, V. and Junglas, I. (2006) Mobile Technology as an Enabler of Organizational
Agility.
Kumar , K. P., Shailaja, G., Kavitha, A. and Saxena, A. (2006) Mutual Authentication
and Key Agreement for GSM.
Leijdekkers, P. and Gay, V. (2006) Personal Heart Monitoring and Rehabilitation
System using Smart Phones.
Lu, N. and Swatman, P. (2006) Mobile Organic Certification (MobiCert) – A
theoretical foundation for a practical project.
Marchegiani, L. (2006) The two-sided coin of innovative mobile telecommunication
market.
McMahon, M. and Steketee, C. (2006) Investigation of Proposed Applications for
LBS Enabled Mobile Handsets.
Melo, G. M. d., Nagler-Ihlein, J. and Weber, M. (2006) Generating User Interfaces
from CDISC ODM for Mobile Devices.
Michael, K., McNamee, A. and Michael, M. (2006) The Emerging Ethics of
Humancentric GPS Tracking and Monitoring.
Nickerson, R. C. and Isaac, H. (2006) “Am I Disturbing You?”: A Research Model for
Investigating the Use of Mobile Phones in Social Settings.
Ondrus, J. and Pigneur, Y. (2006) A Systematic Approach to Explain the Delayed
Deployment of Mobile Payments in Switzerland.
Pousttchi, K. and Thurnher, B. (2006) Understanding Effects and Determinants of
Mobile Support Tools: A Usability-Centered Field Study on IT Service Technicians.
Pousttchi, K. and Wiedemann, D. G. (2006) A Contribution to Theory Building for
Mobile Marketing: Categorizing Mobile Marketing Campaigns through Case Study
Research.
Repo, P., Hyvönen, K. and Saastamoinen, M. (2006) Traveling from B2B to B2C:
Piloting a Moblog Service for Tourists.
Richter, J. G., Nixdorf, M., Becker, A., Koch, T., Monser, R. and Schneider, M.
(2006) Mobile Computing instead of paper based documentation in German
Rheumatology.
Saugstrup, D. and Henten, A. (2006) Developing Personal Network Business Models.
Steinert, M. (2006) An Expert Model on Barriers to Implement Mobile Data Services.
Tan, C. M. and Wong, C. C. (2006) Mobile Broadband Race: Friend or Foe?.
Tan, S.-E. and Henten, A. (2006) New Mobile Technologies: Sustaining or
Disruptive?.
Thestrup, J., Sørensen, T. F. and De Bona, M. (2006) Using Conceptual Modeling and
Value Analysis to Identify Sustainable m>Business Models in Industrial Services.
Yamakami, T. (2006) Lessons in business model development from early mobile
Internet services in Japan.
Yuan, Y. and Zheng, W. (2006) The Fit between Mobile Task and Mobile Work
Support: A Theoretical Framework.
Ziv, N. D. and Mullot, B. (2006) An Exploration on Mobile Social Networking:
Dodgeball as a Case in Point.