Research Journal of Science & IT Management - RJSITM - The ...
Research Journal of Science & IT Management - RJSITM - The ...
Research Journal of Science & IT Management - RJSITM - The ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Table <strong>of</strong> Contents<br />
Articles<br />
FUTURE TRENDS IN MOBILE COMMERCE: SERVICE OFFERINGS, TECHNOLOGICAL ADVANCES AND SECUR<strong>IT</strong>Y<br />
CHALLENGES<br />
Ashok Kumar<br />
THEORETICAL FRAMEWORK OF I-THOUN (INFORMATION THOUGHT NETWORK)<br />
Abhay Saxena, Dr. Pranav Pandya<br />
INTERNET BANKING: A CASE STUDY OF THE FACTORS INFLUENCING <strong>IT</strong>S ADOPTION IN MAUR<strong>IT</strong>IUS<br />
Dinesh Ramdhony, Deerajen Ramasawmy<br />
GRID COMPUTING: RELATED ISSUES AND BUSINESS APPLICATIONS<br />
Ahasanul Haque<br />
VENDOR RELATIONSHIP MANAGEMENT STRATEGY DEVELOPMENT PROCESS FOR AUTOMOBILE INDUSTRY TO<br />
REDUCE THE COST OF QUAL<strong>IT</strong>Y<br />
Shivagond Nagappa Teli<br />
Book Review<br />
SOLAR POWER GENERATION USING ZVT INTERLEAVED BOOST CONVERTER<br />
Shiny Jasmine
Future Trends In Mobile Commerce: Service<br />
Offerings, Technological Advances And Security<br />
Challenges<br />
Dr. P. S. NAGARAJAN<br />
Assistant Pr<strong>of</strong>essor, Alagappa Institute <strong>of</strong> <strong>Management</strong>, Alagappa University, Karaikudi – 4.<br />
J. ASHOKKUMAR<br />
Junior <strong>Research</strong> Fellow, Alagappa Institute <strong>of</strong> <strong>Management</strong>, Alagappa University, Karaikudi – 4.<br />
INTRODUCTION<br />
Mobile commerce is the conduct <strong>of</strong> business<br />
transactions over the Internet-enabled wireless devices is<br />
slowly becoming a dominant force in business and society.<br />
<strong>The</strong> push for advancing technology and the pull <strong>of</strong> public<br />
demand for low-cost, high-speed communications and<br />
ubiquitous access to information anytime anywhere have<br />
revolutionized the Telecommunications industry over the<br />
past two decades. This revolution has led Canada to have<br />
one <strong>of</strong> the lowest Internet access charges among G7 nations<br />
and to also have the lowest mobile communications <strong>of</strong> them<br />
all. More recently, Internet access and high computing<br />
power in wireless devices began to pave the way for the<br />
introduction <strong>of</strong> broadband interactive multimedia<br />
applications. Nevertheless, the wireless Web market is still<br />
in its infancy, and mobile commerce (m-commerce) is<br />
expected to evolve significantly in the future, especially in<br />
view <strong>of</strong> the current implementation <strong>of</strong> 3G systems and the<br />
future deployment <strong>of</strong> 4G systems, inter-connecting a<br />
multitude <strong>of</strong> diverse wireless networks, such as WBAN,<br />
WPAN, WLAN, and WMAN .m-commerce is the product<br />
<strong>of</strong> interaction among business transactions, Internet<br />
applications, and mobile communications. It is a highly<br />
evolved version <strong>of</strong> the 1980’s t-commerce (commerce via<br />
telephony) and the 1990’s e-commerce (commerce via the<br />
Internet). <strong>The</strong>re has been a revolutionary change in cellular<br />
mobile communications in every decade. <strong>The</strong> first<br />
generation (1G) systems, introduced in the early 1980s,<br />
provided analog voice-only communications and the second<br />
generation (2G) systems, introduced in the early 1990s,<br />
provided digital voice applications and circuit-switched lowspeed<br />
data services. <strong>The</strong> introduction <strong>of</strong> third-generation<br />
(3G) systems resumed in the 21st century, with the focus<br />
shifting to packet data instead <strong>of</strong> just voice. <strong>The</strong> fourthgeneration<br />
(4G) systems will likely provide broadband IPbased<br />
multimedia services around the 2010.<br />
As wireless evolves from a secondary means <strong>of</strong><br />
communication to a principal means <strong>of</strong> communication, it<br />
leads to the graying <strong>of</strong> lines between personal interactions<br />
and business transactions. Although the growth and<br />
pervasiveness <strong>of</strong> this continuing wireless revolution appears<br />
to be inevitable, the path and speed <strong>of</strong> growth <strong>of</strong> this<br />
technology are not so predictable. It is clear that different<br />
generations <strong>of</strong> mobile communication systems have evolved<br />
to satisfy the demands <strong>of</strong> high data rate, high mobility, wide<br />
area coverage, diverse applications, high spectral efficiency,<br />
high flexibility <strong>of</strong> mobile devices and networks, and low<br />
costs. In view <strong>of</strong> this backdrop, it is anticipated that m-<br />
commerce will become widely popular and ubiquitously<br />
available. In this paper, future trends in m-commerce<br />
services and technologies, as well as privacy concerns and<br />
security challenges will be highlighted<br />
WIRELESS USER EQUIPMENT AND SYSTEMS<br />
Today’s communication-centric and computingcentric<br />
devices are becoming a single intelligent wireless<br />
device. <strong>The</strong> future user wireless devices, dubbed as<br />
universal wireless handheld devices, will have numerous<br />
functionalities, all aiming to establish communications,<br />
enhance education, furnish entertainment, provide<br />
information, and conduct transactions for mobile users. Few<br />
<strong>of</strong> the device features are already available in handheld<br />
devices, but many <strong>of</strong> them, yet to be incorporated, will need<br />
to increase the device size, weight, complexity, power,<br />
memory, and processing requirements. To this end,<br />
engineering design trade-<strong>of</strong>fs will be required to form the<br />
right balance between devices’ capabilities and their<br />
constraints.<br />
With low-power requirements and long-lasting<br />
batteries, the universal wireless handheld devices will be<br />
small, low-cost, light-weight, easy-to-use, and IC-cardreader<br />
equipped. <strong>The</strong>y can be attached to desk-top/lap-top<br />
computers and their peripherals, including keyboards,<br />
printers, scanners, loud speakers, and fax machines. <strong>The</strong>y<br />
will have high-resolution colour screens to present pin-point<br />
information, thus minimizing the burden on users’ attention.<br />
<strong>The</strong>y will also possess features such as simple icon-menu,<br />
touch-pad, and artificial-intelligence-based natural<br />
languages. <strong>The</strong> wireless devices and networks will employ<br />
intrusion detection systems to detect cracking attempts in<br />
real time and to take effective protective measures based on<br />
the information it has. <strong>The</strong>se devices include anti-virus<br />
s<strong>of</strong>tware to handle malicious code and to support for<br />
authenticating users, servers, and applications.<br />
On a standalone basis, the devices will function as<br />
alarms, clocks, calculators, timers, flash lights, calendars,<br />
organizers, dictionaries, tape recorders, compasses, cameras,<br />
pocket PCs (with <strong>of</strong>fice applications), radios, TVs,<br />
biometric control devices, audio and video players. <strong>The</strong>y<br />
will also be able to measure the temperature, pressure,<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 1
humidity, and heartbeat. <strong>The</strong>y will all have high-speed,<br />
always-on, packet-switched bandwidth-on-demand access<br />
capabilities to the Internet and other networks, as well as to<br />
other wireless devices and equipment, anytime anywhere.<br />
While connected, they will function as virtual keys, secure<br />
ID cards, digital cash, tag-readers, remote control devices,<br />
pagers, locating devices, and phones, and will also get e-<br />
books, e-newspapers, e-mails, voice-mails, and video-mails.<br />
Although use <strong>of</strong> data, and, in general, multimedia<br />
continue to accelerate exponentially, voice will remain a<br />
dominant mode <strong>of</strong> communications while the user is on the<br />
move, for talking or listening provides hands- and eye-free<br />
operations and is also several times faster than typing or<br />
reading text messages. However, to convey the same<br />
information, typed texts require less bandwidth than spoken<br />
words; hence, the immense popularity <strong>of</strong> SMS. In view <strong>of</strong><br />
the fact that voice, video, keypad, and pen can be all used as<br />
a means to input, and text, audio, and video can represent<br />
output formats, a number <strong>of</strong> I/O enabling technologies will<br />
have to be incorporated in the wireless devices. <strong>The</strong>se<br />
technologies may include<br />
speech recognition (converting spoken words to<br />
text to avoid the use <strong>of</strong> alpha-numeric key pads),<br />
speech synthesis (converting e-mails to intelligible<br />
speech so as to hear the received e-mails),<br />
voice activation (bringing voice-control to navigate<br />
the Web sites and to replace a long series <strong>of</strong><br />
sequential inputs in an automated voice-menudriven<br />
phone system), and<br />
<br />
Optical character recognition (converting handwritten<br />
text to typed-written format with a high<br />
degree <strong>of</strong> accuracy and an inherent learning<br />
mechanism).<br />
In the future, 4G systems will focus on seamlessly<br />
integrating all wireless networks, and they will be the<br />
platform for mobile systems. This focus contrasts with 3G<br />
systems, which merely focus on developing new standards<br />
and hardware. 4G systems will be all IP-based multimedia<br />
services in heterogeneous networks that allow users to use<br />
any system at anytime anywhere. <strong>The</strong> new challenge facing<br />
the mobile industry is to minimize the fragmentation <strong>of</strong> the<br />
market and to enable seamless interoperability so as to<br />
simulate the growth <strong>of</strong> mobile services. 4G devices should<br />
be multi-band, multi-functional, and multi-mode capable<br />
and be able to handle various contents. Also, 4G systems<br />
will provide the best connection to users. It is believed that<br />
the interfaces for 4G systems will exploit the new frequency<br />
spectrum that is to be identified by WRC-2007; therefore, a<br />
speculative time scale for a mature 4G system is beyond<br />
2010. 4G systems will be an evolved version <strong>of</strong> 3G systems<br />
and will also be based on a cellular system but will require<br />
very small cells. 4G systems will warrant the realization <strong>of</strong><br />
automatic switching functions for such flexible networks,<br />
mobility control, coordination functions between layers 2<br />
and 3 to realize fast handover, rapid routing <strong>of</strong> packets, and<br />
so on. 4G systems will improve coverage in highly<br />
populated areas (i.e., hot spots) to carry more traffic by<br />
utilizing diverse access technologies to deliver the best<br />
possible services, while taking into account both cost and<br />
bandwidth efficiency.<br />
<strong>The</strong> primary 4G systems objectives over 3G<br />
systems objectives—higher transmission rate (by two orders<br />
<strong>of</strong> magnitude), larger capacity (by one order <strong>of</strong> magnitude),<br />
higher frequency band (beyond 3 GHz), single-device<br />
(ubiquitous, multi-functional, multi-service, multi-band),<br />
increased coverage (global roaming), simple billing (one bill<br />
with reduced total access cost), high quality <strong>of</strong> service<br />
(accommodating varying transmission rates, channel<br />
characteristics, bandwidth allocation, fault-tolerance levels,<br />
and different hand-<strong>of</strong>f support), and lower system costs (one<br />
order <strong>of</strong> magnitude)—will directly play pivotal roles in all<br />
aspects <strong>of</strong> the next generation <strong>of</strong> m-commerce.<br />
M-COMMERCE SERVICES, PAYMENT, AND<br />
VALUE CHAIN<br />
<strong>The</strong>re appears to be no m-commerce application<br />
that can be qualified as a “killer” application, per se.<br />
However, the key advantage <strong>of</strong> m-commerce is its ability to<br />
support a wide variety <strong>of</strong> attractive and innovative<br />
applications, and that will be the “killer” characteristic <strong>of</strong> m-<br />
commerce. It is worth highlighting that the highlypersonalized,<br />
context-aware, location-sensitive, time-critical<br />
applications, conducted in a very secure environment are the<br />
most promising m-commerce applications. <strong>The</strong>re are<br />
indications that the next-generation <strong>of</strong> wireless<br />
communications services based on 4G systems will not be<br />
limited to human (as it has been before) but rather to<br />
anything that very small wireless chips can be attached to<br />
(i.e., machine-to-machine communications). M-<br />
commerce service categories encompassing sets <strong>of</strong> attractive<br />
applications.<br />
Mobile communications services originated from<br />
voice telephony. However, the cellular phone market, when<br />
measured in terms <strong>of</strong> the number <strong>of</strong> wireless devices, is<br />
becoming saturated at a rather rapid pace. In short, there can<br />
be no significant increase in traffic merely through voice<br />
telephony. In view <strong>of</strong> this limitation, there appear to be two<br />
viable strategies to achieve growth in mobile<br />
communications: (i) implementation <strong>of</strong> new mobile services<br />
with an array <strong>of</strong> diverse multimedia applications, and (ii) the<br />
introduction <strong>of</strong> new wireless devices with enhanced<br />
features, including direct device-to-device communications<br />
capabilities. <strong>The</strong> mobile multimedia applications warrant<br />
high transmission rates and allow various modalities—such<br />
as voice, data, image, music, text, and video—to be<br />
transmitted simultaneously and in an integrated fashion. <strong>The</strong><br />
ubiquitous wireless devices with various radio interfaces<br />
possess capabilities to connect to a multitude <strong>of</strong><br />
heterogeneous networks, including the Internet, PSTN,<br />
ISDN, and WLAN. <strong>The</strong>y can also allow communications<br />
directly with other wireless devices, such as tether less<br />
machine-to-machine communications. Both <strong>of</strong> these<br />
developments can lead to a great increase in the volume <strong>of</strong><br />
user traffic, thus increasing the average revenue per user, a<br />
key metric for measuring the pr<strong>of</strong>itability <strong>of</strong> mobile-based<br />
businesses.<br />
Future mobile systems will introduce various<br />
quality-<strong>of</strong>-service (QoS) levels in order to provide various<br />
types <strong>of</strong> best-effort multimedia services corresponding to<br />
users’ demand. QoS may include priority, reliability, bit<br />
error rate, security, and delay, jitter, and throughput<br />
measures. <strong>The</strong> conversational services, with their real-time<br />
voice/video, connection-oriented applications, are<br />
characterized by a low fixed delay <strong>of</strong> about 20 – 30<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 2
milliseconds, a modest bit error rate <strong>of</strong> about 1E-03 to 1E-<br />
05, and a low-blocking probability for network access. On<br />
the other hand, transactional, retrieval, messaging, and<br />
distribution (e.g., multicasting) services, with their non-realtime<br />
connectionless applications, are characterized by a<br />
varying delay <strong>of</strong> 150 milliseconds or more, a low bit error<br />
rate <strong>of</strong> 1E-05 to 1E-07 to aim high data integrity, and a lowdelay<br />
probability for network access . It is worth noting that<br />
the effective user transmission rate (i.e., throughput) which<br />
can characterize, to a large extent, the set <strong>of</strong> m-commerce<br />
applications available to the user is a function <strong>of</strong> the cell size<br />
and the speed <strong>of</strong> the mobile user. For instance, a user in a<br />
stationary position in an urban area characterized by small<br />
cells can have a throughput 10 to 20 times higher than a user<br />
driving fast on a highway in a rural area consisting <strong>of</strong> large<br />
cells.<br />
Every generation <strong>of</strong> mobile services (e.g., 2G, 3G,<br />
and 4G) brings about more efficient spectrum utilization;<br />
that is, more users per unit spectrum per unit area (bits per<br />
second per Hz per square kilometres). Spectral efficiency<br />
measures the ability <strong>of</strong> a wireless system to deliver<br />
information or billable services. <strong>The</strong>re are many factors<br />
which can contribute to the spectral efficiency <strong>of</strong> a system,<br />
including modulation format, channel coding technique, air<br />
interface overhead, multiple access method, and acceptable<br />
interference level, to name a few. <strong>The</strong> spectral efficiency for<br />
2G systems is about 0.15 to 0.20, that for 3G systems is<br />
about 0.25 to 0.30, and that for 4G systems will likely be as<br />
high as 3 to 4 bits per second per Hz .This efficiency will, in<br />
turn, reduce the overall service cost quite significantly.<br />
<strong>The</strong>re are many factors shaping mobile billing, in<br />
general, and m-commerce payment, in particular. A major<br />
determining factor for the success <strong>of</strong> m-commerce is service<br />
affordability—such as low access, subscription, and usage<br />
fees. What basically the customer will have to pay depends<br />
on the fact that North America’s called-party-pays strategy,<br />
or Europe’s calling-party-pays strategy, or a reasonable mix<br />
<strong>of</strong> both will be employed. <strong>The</strong> service charge will also have<br />
to be a function <strong>of</strong> the user’s location, the time <strong>of</strong> call, the<br />
service type, the call priority, the service duration (measured<br />
in call seconds and/or Mega bytes), the call frequencies (to<br />
accommodate frequent micro-payments), and the payment<br />
plans (pre-pay or on-credit). Also, mobile payments, which<br />
are virtual payments, can be divided into macro-payments—<br />
typically a payment <strong>of</strong> $10 or more—and micro-payments—<br />
typically a payment <strong>of</strong> $10 or less. For a macro-payment,<br />
authentication through a trusted financial institution is<br />
required, which must be carried out over the public wireless<br />
access and wired-line backbone networks, while invoking<br />
all possible security measures. On the other hand, a micropayment<br />
may use the operator’s infrastructure or involve a<br />
cash card (in addition to the ID card which stores the<br />
confidential information, such as the user’s secret<br />
authentication key) and proximity payments through short<br />
distances by using Bluetooth, Infra-Red, RFID, and UWB<br />
technologies.<br />
<strong>The</strong> generic payment model for mobile commerce<br />
provides an abstract view <strong>of</strong> what information is passed<br />
between various parties to conclude a transaction and does<br />
not depict any particular ordering <strong>of</strong> the information flow. In<br />
the selection phase, the customer indicates what goods and<br />
services are desired, and he/she negotiates the price <strong>of</strong> the<br />
goods and services and the terms <strong>of</strong> conditions. <strong>The</strong><br />
transaction details highlight the description <strong>of</strong> goods or<br />
services, the customer’s name, and other required details.<br />
<strong>The</strong> customer then responds with transaction credentials<br />
(which may contain the payment credentials), the<br />
transaction details, and some authentication <strong>of</strong> the customer.<br />
Upon authentication, the payment is approved, the funds are<br />
transferred, and the goods will be delivered, or services will<br />
be provided.<br />
In mobile payment, although confidentiality<br />
(making sure information is not visible to eavesdroppers),<br />
integrity (finding out the content has not been tampered<br />
with), and non-repudiation (proving the transaction has<br />
taken place) are primary concerns, authentication (ensuring<br />
communicating parties are certain <strong>of</strong> each other’s identity) is<br />
<strong>of</strong> paramount importance. As a result, public key<br />
cryptography, which is slower but more powerful than<br />
symmetric key cryptography, will be used for authentication<br />
and the exchange <strong>of</strong> symmetric session keys. In order to<br />
prevent a false (cracker’s) public key as a legitimate public<br />
key, a certificate authority issues a public key certificate that<br />
would contain the name, the public key, and the expiration<br />
date. In view <strong>of</strong> the fact that the emerging wireless devices<br />
will have more throughputs, processing power, and memory,<br />
more complex encryption techniques—such as longer keys<br />
and/or more sophisticated multi-level algorithms—will be<br />
employed to enhance mobile payment security. Although<br />
encryption can be the most effective tool for both privacy<br />
and security, it is generally used only as a security measure<br />
when m-commerce transactions are conducted and not when<br />
essential data are generally stored in databases.<br />
<strong>The</strong> development environment for m-commerce is<br />
significantly more complex than e-commerce, thus requiring<br />
a broader base <strong>of</strong> expertise. In m-commerce, it is virtually<br />
impossible to achieve all technical and business<br />
requirements simultaneously, for some are clearly in conflict<br />
with others. For instance, in the current state <strong>of</strong> technology,<br />
not all technical requirements (such as high-speed access<br />
and low-power devices) and business requirements (such as<br />
low-access fee and high-quality <strong>of</strong> service) can be<br />
completely fulfilled at the same time. Moreover, there are<br />
constraints associated with business and regulatory<br />
environments that can influence some <strong>of</strong> these requirements,<br />
such as service coverage, location determination, backward<br />
compatibility, and privacy concerns, to name a few.<br />
<strong>The</strong> m-commerce applications can be successfully<br />
provided to mobile users only when a number <strong>of</strong> enterprises,<br />
called the m-commerce value chain, are complementarily<br />
involved in the creation and delivery <strong>of</strong> these services, with<br />
the goal <strong>of</strong> sharing revenue. In order to drive interoperability<br />
<strong>of</strong> mobile data services, the world’s mobile operators,<br />
device and network suppliers, information and<br />
communication technology companies, application<br />
developers and content providers have joined forces to<br />
ensure seamless mobile services for end-users anywhere.<br />
This outcome will be achieved by defining industry-wide<br />
requirements, architectural frameworks, and industry<br />
specifications for enabling technologies and end-to-end<br />
interoperability, all based on open specifications <strong>of</strong><br />
standards, protocols, and interfaces.<br />
<strong>The</strong> federal government also plays a pivotal role,<br />
not only in terms <strong>of</strong> setting policies and ensuring that<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 3
egulatory issues are fully respected, but in terms <strong>of</strong><br />
auctioning spectrum (instead <strong>of</strong> comparative bidding and<br />
lottery as licensing methods) .This role, in turn, can lead to<br />
huge investment requirements, which need to be met by<br />
some major players.<br />
M-commerce services with compelling contents are<br />
provided by tight business and strategic partnership<br />
arrangements and by involving a large number <strong>of</strong><br />
companies, with each influencing other parties in the value<br />
chain. While no two value chains are the same, a company<br />
can assume multiple roles in the value chain for m-<br />
commerce, or a single role for a multiplicity <strong>of</strong> services,<br />
such as m-commerce, e-commerce. It would identify the<br />
main categories <strong>of</strong> players in the m-commerce value chain.<br />
M-COMMERCE ENABLING TECHNOLOGIES<br />
Providing mobile users with wireless<br />
communications functions for their communications,<br />
information, education, entertainment, and business needs,<br />
as well as giving wireless communications functions to<br />
stationary places for access and security and to moving<br />
objects for asset and logistic purposes form the cornerstones<br />
<strong>of</strong> mobile commerce. To achieve these goals, significant<br />
technological advances in a number <strong>of</strong> enabling<br />
technologies are anticipated.<br />
Radio frequency identification (RFID) is a<br />
generic term for technologies that use radio waves to<br />
automatically identify individual items or some <strong>of</strong> their<br />
attributes. RFID possesses several benefits over bar codes.<br />
First, it does not need to meet line-<strong>of</strong>-sight requirements as<br />
long as the RFID tags are within the range <strong>of</strong> a reader.<br />
Second, quite many number <strong>of</strong> RFID tags can be read<br />
simultaneously. Third, every unique item can have its own<br />
RFID tags. <strong>The</strong> mobile consumer will use RFID readers in<br />
their mobile phones to scan RFID tags, say in the packaging<br />
<strong>of</strong> products on store shelves, to pay for tolls and access fees,<br />
to purchase at vending machines and points <strong>of</strong> sales, to<br />
access secure rooms, buildings, and other partitioned areas,<br />
and to control home and <strong>of</strong>fice appliances. With RFID, a<br />
scanner can read the encoded information even when the tag<br />
is concealed. For example, it may be embedded in a<br />
product’s casing, or sewn into an item <strong>of</strong> clothing, or<br />
sandwiched between a banknote’s layered papers. <strong>The</strong><br />
stealthy nature <strong>of</strong> RFID technology has raised concerns<br />
among privacy advocates that RFID tags could be tracked<br />
beyond their intended use. For example, security agencies<br />
might use them to covertly monitor individuals or their<br />
belongings. Lower frequencies (LF and MF) usually are<br />
cheaper, use less power, are better able to penetrate nonmetallic<br />
substances, and are ideal for scanning objects with<br />
high-water content. On the other hand, higher frequencies<br />
(HF and UHF) typically <strong>of</strong>fer a better range and can transfer<br />
data faster; they tend to be more directed and, thus, require a<br />
clearer path. Active tags can have a farther read range than<br />
passive tags, but passive tags are less expensive and require<br />
no maintenance. RFID will play a critical role in emerging<br />
wireless access and monitoring applications, especially in<br />
today’s security-aware era.<br />
Location determination is seen to be an<br />
indispensable feature for mobile commerce. Network-based<br />
positioning is carried out by terrestrial systems through<br />
various techniques, such as cell <strong>of</strong> origin, time <strong>of</strong> arrival,<br />
angle <strong>of</strong> arrival, and enhanced observed time difference. <strong>The</strong><br />
device-based positioning is carried out by satellite systems<br />
typically using three or four MEO satellites, also known as<br />
GPS. However, a hybrid approach delivering the accuracy<br />
<strong>of</strong> device-centric option, while avoiding a line-<strong>of</strong>-sight<br />
requirement as well as increased cost, size, and power<br />
consumption, is also used. Though FCC does not require the<br />
mobile network operators to use a specific technology, it has<br />
indicated specific performance metrics for location-enabled<br />
technology. For network-based technology, location<br />
information accuracy is required to be within 100 meters<br />
67% <strong>of</strong> the time and within 300 meters 95% <strong>of</strong> the time. But<br />
for the device-centric technology, these distances must be<br />
halved. In view <strong>of</strong> possible launches <strong>of</strong> LEO satellites and<br />
the significant increase in the processing capabilities <strong>of</strong> the<br />
wireless devices, as well as the fact that the cell sizes are<br />
shrinking from macro to micro to pico, the location-based<br />
technologies are expected to become more accurate and less<br />
costly in the future.<br />
S<strong>of</strong>tware defined radio (SDR) enables<br />
reconfigurable system architectures for wireless networks<br />
and user devices. To provide users with m-commerce<br />
services under an array <strong>of</strong> heterogeneous networks, certain<br />
design problems (such as limitations in device size, cost,<br />
power consumption, and backward compatibilities to<br />
systems) must all be overcome. <strong>The</strong> most viable way <strong>of</strong><br />
implementing these types <strong>of</strong> wireless devices is to adopt a<br />
s<strong>of</strong>tware radio approach. <strong>The</strong> received analog signal is<br />
processed by a reprogrammable baseband digital signal<br />
processor in accordance with the wireless environment.<br />
However, certain problems then need to be addressed—such<br />
as an analog radio interface with multiple antennas and<br />
amplifiers and very fast high-speed analog-to-digital<br />
conversions and DSP functions—which can all, in turn, add<br />
to the circuit complexity and high-power consumption and<br />
dissipation. SDR can provide the user with a single piece <strong>of</strong><br />
scalable hardware that is at once compatible at a global<br />
scale.<br />
S<strong>of</strong>tware defined radio (SDR) enables<br />
reconfigurable system architectures for wireless networks<br />
and user devices. To provide users with m-commerce<br />
services under an array <strong>of</strong> heterogeneous networks, certain<br />
design problems (such as limitations in device size, cost,<br />
power consumption, and backward compatibilities to<br />
systems) must all be overcome. <strong>The</strong> most viable way <strong>of</strong><br />
implementing these types <strong>of</strong> wireless devices is to adopt a<br />
s<strong>of</strong>tware radio approach. <strong>The</strong> received analog signal is<br />
processed by a reprogrammable baseband digital signal<br />
processor in accordance with the wireless environment.<br />
However, certain problems then need to be addressed—such<br />
as an analog radio interface with multiple antennas and<br />
amplifiers and very fast high-speed analog-to-digital<br />
conversions and DSP functions—which can all, in turn, add<br />
to the circuit complexity and high-power consumption and<br />
dissipation. SDR can provide the user with a single piece <strong>of</strong><br />
scalable hardware that is at once compatible at a global<br />
scale.<br />
Adaptive modulation and coding (AMC) is one<br />
<strong>of</strong> the most viable and effective means to dynamically<br />
combat wireless channel degradation and meet performance<br />
requirements. In AMC, for the same symbol rate (i.e.,<br />
occupied bandwidth), the signal power, the modulation<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 4
technique, the information rate, and the channel-coding rate,<br />
can all be adjusted in accordance with instantaneous<br />
variations in channel conditions (such as multi-path and<br />
proximity to the base station) and quality <strong>of</strong> service<br />
requirements. Forward-error- correcting (FEC) codes<br />
(whose rates may range from 1/2 to 5/6) and digital<br />
modulation techniques (ranging from QPSK to 64 QAM)<br />
will be dynamically adapted for every single individual,<br />
giving rise to up to a six-fold spectral efficiency (bits per<br />
second per Hz) .<br />
Mobile ad hoc networks vis-à-vis fixed topology<br />
wireless networks may be characterized by wireless nodes,<br />
the lack <strong>of</strong> fixed infrastructure support, dynamic topologies,<br />
bandwidth-constrained variable-capacity links, energyconstrained<br />
operations, and limited physical security. In<br />
such peer-to-peer networks, end-user wireless handsets also<br />
act as secure wireless routers that are part <strong>of</strong> the overall<br />
network infrastructure. Upstream and downstream<br />
transmissions hop through subscriber handsets and fixed<br />
wireless routers to reach the destination. Routing for the best<br />
path is defined for the least power. Mobile ad hoc networks<br />
will help a community <strong>of</strong> subscribers to increase<br />
dramatically spectrum reuse and reduce overall power<br />
consumption. Mobile ad hoc networks bring about a host <strong>of</strong><br />
challenges and opportunities, but due to emerging wireless<br />
device-to-device connectivity requirements, mobile ad hoc<br />
networks will prove to be an ever-essential component.<br />
PRIVACY, SECUR<strong>IT</strong>Y, AND TRUST IN M-<br />
COMMERCE<br />
<strong>The</strong> growth <strong>of</strong> the Internet and e-commerce has<br />
dramatically increased the amount <strong>of</strong> personal information<br />
that can be potentially collected about individuals by<br />
corporations and governments. Such data collections, along<br />
with usage tracking (click stream data) and the sharing <strong>of</strong><br />
information with third parties are always invoking issues <strong>of</strong><br />
privacy, especially in view <strong>of</strong> the fact that they can be easily<br />
done through high-speed links and high-capacity storage<br />
devices in a very accurate fashion, and most <strong>of</strong>ten without<br />
the consumer’s or citizen’s expressed knowledge or consent<br />
. This valuable information, <strong>of</strong>ten collected by hidden tools<br />
such as cookies and Web bugs can be shared with third<br />
parties for marketing purposes and surveillance operations,<br />
and its perceived value has been occasionally behind the<br />
stock-market valuations <strong>of</strong> some companies. In fact, this<br />
detailed information can be combined with other <strong>of</strong>f-line<br />
data such as demographic and psychographic data to predict<br />
a user’s interests, needs, and possible future purchases. To<br />
deal with the problem <strong>of</strong> pr<strong>of</strong>iling, trust seals and<br />
government regulations appear to be two forces pushing for<br />
more and better privacy disclosures on the Web. <strong>The</strong> former<br />
tend to promote privacy in the form <strong>of</strong> self-regulation,<br />
where they may eventually become more <strong>of</strong> a privacy<br />
advocate for corporations rather than for consumers. <strong>The</strong><br />
latter can advance privacy through legislation but can also<br />
potentially create privacy worries for citizens by monitoring<br />
their telecommunications traffic. For instance, the FBI’s<br />
powerful DCS1000 Carnivore program is a computerautomated<br />
snooping tool that is capable <strong>of</strong> intercepting and<br />
sorting out millions <strong>of</strong> text messages, such as telephone<br />
conversations and e-mails passing through ISPs by<br />
monitoring incoming and outgoing messages to specific IP<br />
addresses. It is clear that governments’ regulations and<br />
legislation can be as likely to thwart privacy as to enforce it.<br />
Even though wireless communications possess<br />
numerous merits, privacy is not one <strong>of</strong> them. M-commerce<br />
possesses, in addition to all privacy issues related to e-<br />
commerce, another major privacy threat: the sharing <strong>of</strong><br />
knowledge about a user’s location with others. <strong>The</strong>re are<br />
basically three solutions to this positioning problem: i) the<br />
network-based solution, where the calculations are carried<br />
out by the cellular network and the positioning information<br />
may then be passed to the user; ii) the device-based solution,<br />
where the wireless device computes its own position; and<br />
iii) a hybrid solution. <strong>The</strong> pitfall associated with the<br />
network-based positioning is that the information about the<br />
user’s whereabouts can be collected but not necessarily<br />
passed to the user. Instead, the information may be exploited<br />
by other entities, all without the user’s knowledge, let alone<br />
his/her consent. Also, there are some privacy implications<br />
about the requirement that wireless devices need to be<br />
embedded with a location-tracking technology to provide<br />
location-based services, such as targeted advertising and<br />
finding the nearest “X.” For instance, if location records<br />
were kept over time, an in-depth pr<strong>of</strong>ile could be compiled<br />
for other, perhaps unwarranted, purposes.<br />
<strong>The</strong> essence <strong>of</strong> a business transaction is based on<br />
trust, and trust must be mutual. Trust in a business context<br />
may be expressed in laws, contracts, regulations, and<br />
policies, as well as in personal reputations and long-term<br />
relationships, but these measures are not easily transferable<br />
to an online environment. <strong>The</strong> people online are generally<br />
rather too trusting when involved in personal interactions,<br />
such as downloading s<strong>of</strong>tware or engaging in chat rooms<br />
with strangers, but they are rather distrustful when involved<br />
in business transactions. A major barrier to the success <strong>of</strong><br />
online businesses has been the fundamental lack <strong>of</strong> faith<br />
between most businesses and consumers. This lack <strong>of</strong> trust<br />
is mainly due to the fact that consumers must provide<br />
detailed personal and confidential information upon request.<br />
For instance, the seller is not sure if the credit card number<br />
is genuine and belongs to the buyer, nor is the buyer sure<br />
that the seller would not misuse the credit card number for<br />
purposes other than the one allowed. It takes a very long<br />
time for the parties in click-and-mortar businesses (i.e., e-<br />
commerce) to establish the same level <strong>of</strong> trust which has<br />
existed for so long between the parties in brick-and-mortar<br />
businesses, and it will take an even longer time for pushand-mortar<br />
businesses (i.e.,m-commerce) to achieve the<br />
same level <strong>of</strong> trust.<br />
<strong>The</strong> issue <strong>of</strong> health and safety in wireless devices<br />
either as legally imposed by the governments’ regulations or<br />
as apparently complied by the manufacturer’s raises the<br />
issue <strong>of</strong> trust. In principle, the strong majority <strong>of</strong> people<br />
accept the safety guidelines, health recommendations, and<br />
regulatory standards issued by governments and what the<br />
manufacturers claim to respect. But, on the other hand, some<br />
<strong>of</strong> the health and safety guidelines in the past did not protect<br />
citizens’ safety and consumers’ heath. <strong>The</strong> guidelines and<br />
advisories for nuclear tests and smoking during the fifties<br />
are two cases in point.<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 5
CONCLUSION<br />
<strong>The</strong> major limitations <strong>of</strong> m-commerce, as viewed<br />
today, are small screens on wireless devices, limited<br />
processing power, modest memory, restricted power<br />
consumption, poor voice quality, low-speed data<br />
transmission, non-ubiquitous coverage, unproven security,<br />
scarce bandwidth, and possible health hazards. In view <strong>of</strong><br />
the fact that mobile computing is accelerating at a rate<br />
faster than Moore’s law, and according to Edholm’s law <strong>of</strong><br />
bandwidth , wireless transmission rates also follow Moore’s<br />
law, many <strong>of</strong> these limitations are expected to diminish, if<br />
not being eliminated, over time.<br />
In light <strong>of</strong> the fact that m-commerce is just at its<br />
inception, the real potential has yet to be visualized, let<br />
alone tapped. Noting that the highly-personalized, contextaware,<br />
location-sensitive, time-critical applications are the<br />
most promising applications in m-commerce, there are many<br />
m-commerce applications envisaged to become very widely<br />
popular. <strong>The</strong>y include: i) digital cash (to enable mobile users<br />
to settle transactions requiring micro-payments), ii) humanto-machine<br />
communications (to facilitate mobile users to<br />
communicate to stationary locations for access and security<br />
and to moving objects for asset and logistic purposes using<br />
RFID technologies), iii) telemetry (to activate remote<br />
recording devices for sensing and measurement<br />
information), and iv) broadband-interactive multimedia<br />
communications and messaging anytime, anywhere.<br />
4G systems with more security, higher speeds,<br />
higher capacity, lower costs, and more intelligent<br />
infrastructures and devices will help realize m-<br />
commerce applications. With improved wireless security<br />
and privacy through data encryption and user education, on<br />
the one hand, and with the wide deployment <strong>of</strong> 4G systems<br />
,it is anticipated that m-commerce will inescapably, become<br />
the most dominant method <strong>of</strong> conducting business<br />
transactions.<br />
REFERENCES<br />
[1] <strong>IT</strong>U, World Telecommunications Development Report,<br />
2008<br />
[2] Merrill Lynch, Wireless Matrix, 3Q03.<br />
[3] A. Mehrotra, Cellular Radio: Analog and Digital<br />
Systems, Artech House, 1999.<br />
[4] www.umts-forum.org<br />
[5] www.docomo.com<br />
[6] K. Tachikawa, “A perspective on the evolution <strong>of</strong><br />
mobile communications,” IEEE Communications<br />
Magazine, pp. 66-73, October 2003.<br />
[7] Y. Kim et al., “Beyond 3G: vision, requirements, and<br />
enabling technologies,” IEEE Communications Magazine,<br />
pp. 120-124, March 2003.<br />
[8] A. Dornan, <strong>The</strong> Essential Guide to Wireless<br />
Communications Applications, Prentice-Hall, 2001.<br />
[9] N. J. Muller, Wireless A to Z, McGraw-Hill, 2003.<br />
[10] U. Varshney and R. Jain, “Issues in emerging 4G<br />
wireless networks,” IEEE Computer Magazine, pp. 94-96,<br />
June 2001.<br />
[11] L. Garber, “Will 3G really be the next big wireless<br />
technology?” IEEE Computer Magazine, pp. 26-32,<br />
January 2002.<br />
[12] Y. Yuan and J. J. Zhang, “Toward an appropriate<br />
business model for m-commerce,” International <strong>Journal</strong> <strong>of</strong><br />
Mobile Communications, pp. 35-56, January 2003.<br />
[13] B. G. Evans and K. Baughan, “Visions <strong>of</strong> 4G,”<br />
Electronics and Communication Engineering <strong>Journal</strong>, pp.<br />
293-303, December 2000.<br />
[14] J. Z. Sun, J. Sauvola, and D. Howie “Features in<br />
future: 4G visions from a technical perspective,”<br />
Proceedings <strong>of</strong> IEEE GlobeCom Conference, pp. 3533-<br />
3537, November 2001.<br />
[15] T. Zahariadis, “Trends in the path to 4G,”<br />
Communications Engineer, pp. 12-15, February 2003.<br />
[16] S. K. Hui and K. H. Yeung, “Challenges in the<br />
migration to 4G mobile systems,” IEEE Communications<br />
Magazine, pp. 54-59, December 2008.<br />
[17] J. A. Senn, “<strong>The</strong> emergence <strong>of</strong> m-commerce,” IEEE<br />
Computer Magazine, pp. 148-150, December 2009.<br />
[18] E. Turban, D. King, J. Lee, and D. Viehland,<br />
Electronic Commerce 2009: a Managerial Perspective,<br />
Pearson, 2010.<br />
***<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 6
<strong>The</strong>oretical framework <strong>of</strong> I-Thoun<br />
(Information Thought Network)<br />
(A futuristic generation computational device)<br />
Dr. Pranav Pandya,<br />
Chancellor <strong>of</strong> Dev Sanskriti University,Haridwar, India<br />
Pr<strong>of</strong>. Abhay Saxena<br />
Associate Pr<strong>of</strong>essor and Head, Dept. Of Computer <strong>Science</strong>, Dev sanskriti University, Hardwar, India<br />
Abstract: <strong>The</strong> world <strong>of</strong> computing is changing<br />
enormously. <strong>The</strong> new generation computing like green,<br />
cloud, grid has taken the place <strong>of</strong> conventional computing.<br />
<strong>The</strong> latest generation gadgets i-pad, i-pod, i-phone are<br />
making the life smooth and affordable. Most <strong>of</strong> these<br />
devices are controlled by the human being with some<br />
physical movement. Think <strong>of</strong> the situation when the<br />
futuristic devices will move with the power <strong>of</strong> thoughts and<br />
speed <strong>of</strong> emotions. <strong>The</strong> present paper is a core idea <strong>of</strong> i-<br />
Thoun (an electronic gadget Intelligent based Thought<br />
network), a new generation computing device which will<br />
run with the speed <strong>of</strong> thoughts. <strong>The</strong> network, system<br />
connectivity and data transfer all will be available with a<br />
high definition speed and with enormous security. <strong>The</strong><br />
present paper will give the technocrats a new vision and<br />
direction <strong>of</strong> the futuristic computing devices.<br />
KeyWords: I-Thoun, futuristic computing, Internet<br />
devices, thought power<br />
INTRODUCTION<br />
We do believe that God has created this world but the<br />
technology avatar is a new incarnation <strong>of</strong> human being<br />
endeavours. <strong>The</strong> paradigm shifted from the world which<br />
revolves around the God to technology governed life. <strong>The</strong><br />
wonderful world <strong>of</strong> I-revolution has shaken the world. <strong>The</strong><br />
enormous demand for I-Pad, I-Pod and I-Phone is across the<br />
globe. “Information technology and business are becoming<br />
inextricably interwoven. I don't think anybody can talk<br />
meaningfully about one without the talking about the other”<br />
(Bill Gates, 2004).<br />
We are just an advanced breed <strong>of</strong> monkeys on a minor<br />
planet <strong>of</strong> a very average star. But we can understand the<br />
Universe. That makes us something very special (Stephen<br />
Hawkins, 2010). <strong>The</strong> banking, medical science,<br />
transportation, communication and education mostly track<br />
on one common platform i.e. technology and believe it most<br />
<strong>of</strong> us enjoys it.<br />
THOUGHTS & DREAMS – THE ENOURMOUS<br />
POWERHOUSES<br />
<strong>The</strong> world which evolved around the thoughts, emotions and<br />
sentiments is enormous. <strong>The</strong> length and breadth <strong>of</strong> the world<br />
looks small when the thought flies along with the<br />
imagination. <strong>The</strong> question bobbles up in mind, why only<br />
Newton had a wonderful idea <strong>of</strong> innovation that leads<br />
toward the ‘Principle <strong>of</strong> Gravity’. <strong>The</strong> falling <strong>of</strong> apple<br />
happens several times in our life but we never come up with<br />
new idea.<br />
<strong>The</strong> (Steve, 2005) rightly quoted, “Your time is limited, so<br />
don’t waste it living someone else’s life. Don’t be trapped<br />
by dogma – which is living with the results <strong>of</strong> other people’s<br />
thinking. Don’t let the noise <strong>of</strong> other’s opinions drown out<br />
your own inner voice and most important, have the courage<br />
to follow your heart and intuition. <strong>The</strong>y somehow already<br />
know what you truly want to become. Everything else is<br />
secondary.”<br />
Dr. A.P.J. Abdul Kalam had quoted, “Great dreams <strong>of</strong> great<br />
dreamers are always transcended.” We usually hesitate to<br />
dream. It is important to be innovative and it comes through<br />
dreams, the thought power to materialize those dreams into<br />
reality makes man a real innovator, an inventor or<br />
sometimes lucky to get even a noble. Every great dream<br />
begins with a dreamer. Always remember, you have within<br />
yourself the strength, the patience, and the passion to change<br />
the world (Harriet Tubman, 1865). We know that the<br />
technology is good but it should be used to make the best <strong>of</strong><br />
mankind. <strong>The</strong> most exciting breakthroughs <strong>of</strong> the 21st<br />
century will not occur because <strong>of</strong> technology but because <strong>of</strong><br />
an expanding concept <strong>of</strong> what it means to be human” (Johns<br />
Naisbitt, 2000). <strong>The</strong> scientist community is making some<br />
sincere efforts in this direction.<br />
• A wheel chair that reads your mind: (emmet cole,<br />
2007)<br />
Spanish scientists have begun work on a new braincomputer<br />
interface, or BCI, capable <strong>of</strong> converting thought<br />
into commands that a wheelchair can execute. <strong>Research</strong>ers<br />
are developing a thought-controlled robotic wheelchair. <strong>The</strong><br />
Spanish researchers hope to develop a small, mobile<br />
interface that works with electroencephalogram electrodes,<br />
or EEG, placed on the scalp. Two 800-MHz Intel<br />
computers mounted on the wheelchair will process these<br />
readings and send instructions to the wheels. After about a<br />
week's training the s<strong>of</strong>tware will adapt to patients' thought<br />
patterns for simple commands such as "left" and "right."<br />
• Ecole Polytechnique Fédérale de Lausanne (EPFL)<br />
A more user-friendly brain-machine interface, (Bex<br />
coxworth, 2011)<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 7
Practical thought-controlled devices, such as wheelchairs,<br />
artificial arms, or even cars, are perhaps a step closer to<br />
reality thanks to research being carried out at Switzerland's<br />
Ecole Polytechnique Fédérale de Lausanne (EPFL). <strong>The</strong><br />
(EPFL) system utilizes EEG readings obtained from a<br />
network <strong>of</strong> sensors on the user’s scalp to control assistive<br />
devices such as an electric wheelchair; in addition it uses<br />
statistical analysis, or probability theory, when processing<br />
these readings, allowing it to learn what the user expects <strong>of</strong><br />
it. When combined with a Shared Control system, which<br />
uses cameras and sensors to augment the thought control<br />
system, it can accomplish tasks such as avoiding obstacles<br />
without constant mental updates from the user.<br />
• <strong>The</strong> Mental Typewriter (Mike Hanlon, 2006)<br />
Scientists demonstrated a brain-computer interface that<br />
translates brain signals into computer control signals at<br />
CeB<strong>IT</strong> in Berlin. <strong>The</strong> initial project demonstrates how a<br />
paralysed patient could communicate by using a mental<br />
typewriter alone – without touching the keyboard.<br />
• Playing computer games with the blink <strong>of</strong> an eye<br />
(Paul Ridden, 2010)<br />
Under the supervision <strong>of</strong> Dr Aldo Faisal, a group <strong>of</strong><br />
undergraduates from Imperial College London have adapted<br />
an open source version <strong>of</strong> the Atari video game Pong so that<br />
the player's paddle can be controlled using only eye<br />
movement. an infra-red sensor and a webcam to a pair <strong>of</strong><br />
glasses to track the movement <strong>of</strong> a player's eye and feeding<br />
the information to synchronization s<strong>of</strong>tware on a laptop that<br />
translates it into onscreen paddle movement.<br />
• Physics <strong>of</strong> the Future: How <strong>Science</strong> Will Shape<br />
Human Destiny and Our Daily Lives by the Year<br />
2100 (Michio Kaku, 2011)<br />
In all likelihood, by 2100 we will control computers via tiny<br />
brain sensors and, like magicians, move objects around with<br />
the power <strong>of</strong> our minds. Artificial intelligence will be<br />
dispersed throughout the environment, and Internet-enabled<br />
contact lenses will allow us to access the world's<br />
information base or conjure up any image we desire in the<br />
blink <strong>of</strong> an eye. Meanwhile, cars will drive themselves using<br />
GPS, and if room-temperature superconductors are<br />
discovered, vehicles will effortlessly fly on a cushion <strong>of</strong> air,<br />
coasting on powerful magnetic fields and ushering in the age<br />
<strong>of</strong> magnetism.<br />
• Xbox Kinect foretells computers <strong>of</strong> the future ( Matt<br />
Warman , 2011)<br />
Micros<strong>of</strong>t's head <strong>of</strong> research says that computers <strong>of</strong> the<br />
future will recognise you and be more intuitive than ever. In<br />
a radical new approach to gaming, Kinect uses a camera<br />
simply to “read” a user’s movements and insert them into a<br />
video game. “You are the controller” is the slogan, and, in<br />
short, the device allows people to take up bowling, tennis<br />
and much more, simply by standing in front <strong>of</strong> their TV<br />
screens. <strong>The</strong> change in computing scenario is pushing the<br />
world towards smarter technologies rather than quicker.<br />
Smarter, not faster, is the future <strong>of</strong> computing research<br />
(Steeve Lohr, 2011). In an interesting article in Thinkquest,<br />
May 2011, the future <strong>of</strong> computers were predicted as the<br />
computers are going to all be in cars and may even drive the<br />
cars someday. It also talks about cat liter box to cupboards<br />
that open up on request. <strong>The</strong> possibilities are boundless and<br />
endless.<br />
I POWER OF THOUGHT<br />
What can’t be conquered by sword can be easily achievable<br />
by thought. <strong>The</strong> power <strong>of</strong> thought is enormous and it can<br />
change the destiny (Sharma Sriram, 1985). Thought is<br />
everywhere. You are surrounded by an ocean <strong>of</strong> thought.<br />
You are floating in the ocean <strong>of</strong> thought. You are absorbing<br />
certain thoughts and repelling some in the thought-world,<br />
(Shivanand Swami, 1997). <strong>The</strong> power <strong>of</strong> thought is like a<br />
spiritual power, (Emerson, 1935).<br />
CONCEPT OF I-THOUN<br />
<strong>The</strong> I-Thoun”, (intelligent Thought network device) will be<br />
a new version <strong>of</strong> trio i.e. I-Pad, I-pod, I-phone with advance<br />
features. It may have a small tablet shape device. <strong>The</strong> menu<br />
button will shows the features <strong>of</strong> education, TV,<br />
entertainment, sport, travel tour, telephone, guide,<br />
knowledge and a virtual teacher. This will provide the entire<br />
syllabus <strong>of</strong> quality continental education at the figure tip.<br />
<strong>The</strong> various streams, subjects and the course contents will<br />
be easily available. It will also have the long series <strong>of</strong> TV’s<br />
program especially cartoons covering the entire globe. <strong>The</strong><br />
Pandora Box – (I-thoun) will have much more to cheer<br />
about.<br />
FUNCTIONAL<strong>IT</strong>Y OF I-THOUN<br />
<strong>The</strong> daily digital newspaper will display automatically all<br />
because <strong>of</strong> the idea to have a newspaper. An idea to have<br />
food will bring the ‘I-Thoun’ to display the contents and the<br />
availability <strong>of</strong> food in the house. It was also be ready with<br />
the nearby grocery stores and food marts. It will also be<br />
connected with the helping servant ‘Robomania’ (a new<br />
version <strong>of</strong> Robots) who will be ready to press the menu<br />
button to have the food. It will also help the Microwave to<br />
get started automatically to pre-heating process so as to<br />
serve the food on time.<br />
I-thoun will also perform “Daily health check up”. <strong>The</strong><br />
vitamins, minerals, carbohydrate, proteins are available in<br />
various potencies (in aroma format) just like time waver<br />
machine (Germany). <strong>The</strong> moment one press the button <strong>of</strong><br />
Medicine and the entire stuff <strong>of</strong> pathology, biochemistry and<br />
routine check up parameters will be there on the screen. One<br />
can inhale the prescribed medicines with the help <strong>of</strong> ‘I-<br />
Thoun’ and will definitely get away with the smell and taste<br />
<strong>of</strong> medicines while consuming the same orally.<br />
<strong>The</strong> idea to play Basket ball will allow the I-thoun to display<br />
the virtual basket ball court on screen. It will also prompt to<br />
choose any <strong>of</strong> the continental teams and as the concept <strong>of</strong><br />
countries will be over by 2025, it will be purely on the<br />
continent based. Surprisingly one has to buy this in<br />
“Eudolee”, which is nothing but a combination <strong>of</strong> Euro,<br />
Dollar and Rupee.<br />
I-thoun will also take care <strong>of</strong> security issue seriously. <strong>The</strong><br />
‘thought enabled lock’ will be good exercise in taking care<br />
<strong>of</strong> valuable materials and property. <strong>The</strong> various digital<br />
mantras (thought generated data packets) to open and close<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 8
the digital doors will also make the police station a part <strong>of</strong><br />
history.<br />
improve the living condition and a pathway for global<br />
harmony, peace and brotherhood.<br />
II WORK PROCESS<br />
Basically it will work on the Thought Technology. <strong>The</strong> I-<br />
thoun microprocessors will receive signals from the brain<br />
and perform the process which is either pre-programmed or<br />
can be develop through ANN trained chips. <strong>The</strong> voluminous<br />
database will be highly sophisticated and will be connected<br />
through Google earth, sky and water along with various<br />
upcoming functionality and utility based databases and<br />
search engines.<br />
III DATA CONNECTIV<strong>IT</strong>Y & NETWORK<br />
<strong>The</strong> question may arise that how does this I-thoun will be<br />
managed effectively? Don’t we have the network problem<br />
as it will be handling millions <strong>of</strong> data on the same device<br />
and its connectivity with many other hi end computing<br />
peripherals? What about the network? Which topology will<br />
be best suited? <strong>The</strong> new wave <strong>of</strong> cloud computing had taken<br />
care <strong>of</strong> some <strong>of</strong> these questions. <strong>The</strong> question <strong>of</strong> thought<br />
governing device will definite be successful as it will take<br />
care most <strong>of</strong> the day to day activities with the available<br />
transcripted databases and the meta crawler based search<br />
engines. <strong>The</strong> upgraded and new emerging processors will<br />
work with the speed much more than Petaflops (10 15 ) and<br />
exaflops (10 18 ). <strong>The</strong> Network will be Wi-Fi as the system<br />
will be interacting at the speed <strong>of</strong> thoughts. Data<br />
transmission will definitely be in data packets labelled as<br />
“Thoughtrons”.<br />
OS OF I-THOUN<br />
<strong>The</strong> FPGA and advanced VLSI chips we are using for<br />
modern supercomputers. <strong>The</strong> I-thoun will work on<br />
“Thoughtrons” based chip. <strong>The</strong> Genome Technology, grid<br />
computing, expert system, ANN all are going to play a vital<br />
role in developing this chip. <strong>The</strong> neurologist, the<br />
psychiatrist, the microbiologist and the technocrats will have<br />
to come together to develop this sophisticated chip <strong>of</strong><br />
“Thoughtrons”. <strong>The</strong> idea was originally conceived from the<br />
Vichar Kranti, the thought transformation process carried<br />
out at various eras. <strong>The</strong> words <strong>of</strong> Lord Buddha, Lord<br />
Mahaveer, Socrates, and Gandhi will have to be transcript.<br />
<strong>The</strong> wave <strong>of</strong> thoughts <strong>of</strong> Pt. shriram Sharma, Sri Aurobindo<br />
and Swami Vivekananda has to be programmed and to be<br />
converted into thought chips, - Thoughtrons.<br />
CONCLUSION<br />
<strong>The</strong> I-thoun is going to hit the market with recent<br />
development and researches in the field <strong>of</strong> computer science.<br />
<strong>The</strong> modern computing grid, cloud, green or parallel all are<br />
going to be changed with the time frame and the futuristic<br />
computing will be thought governed computing i.e. Thought<br />
computing. <strong>The</strong> I-thoun is going to shake the world as there<br />
will be hardly any space for lie, hatred and hiding the<br />
emotions as everything and anything will be on display and<br />
public. Our greatest hopes could become reality in the future.<br />
With the technology at our disposal the possibilities are<br />
unbounded (Steve Hawkins, 1993). This will definitely<br />
REFERENCES:<br />
1. Cole, E., 2007: “ A wheel chair that reads your mind”,<br />
January 29, 2007 available at :<br />
http://www.transhumanism.org/pipermail/ieetnews/2007-January/000517.html<br />
2. Emerson, 1935; “the three fundamental concept <strong>of</strong><br />
Emerson philosophy”, theosophy, volume 24, pp 49-54.<br />
3. Guevin, J., 2006: “Say what? A look back at Gates’,<br />
pearls <strong>of</strong> wisdom”, Cnet, June 15, 2006, available at<br />
http://news.cnet.com/Say-what-A-look-back-at-Gatespearls-<strong>of</strong>-wisdom/2100-1014_3-6084505.html<br />
4. Hanlon, M., 2006: “<strong>The</strong> mental typewriter”, March 13,<br />
2006, gizmag, available at<br />
http://www.gizmag.com/go/5356/<br />
5. Hawkins, S., 2010: “A brief history <strong>of</strong> time: <strong>The</strong><br />
updated and expanded Tenth anniversary edition,<br />
Bantam books, New York.<br />
6. Jobs, S.; 2005; “Standford commencement address”,<br />
June 12, 2005, available at<br />
http://news.stanford.edu/news/2005/june15/jobs-<br />
061505.html<br />
7. Kalam, A. P. J., 1999: “Wings <strong>of</strong> fire, An<br />
Autobiography <strong>of</strong> APJ Abdul kalam”, Universities<br />
press, pp 161.<br />
8. Kaku, M., 2011: “ Physics <strong>of</strong> the future: How <strong>Science</strong><br />
Will Shape Human Destiny and Our Daily Lives by the<br />
Year 2100, Double day, New York<br />
9. Lohr, S., 2011: “Big data, speed and the future <strong>of</strong><br />
computing”, October 31, 2011, New York times.<br />
Available<br />
at:<br />
http://bits.blogs.nytimes.com/2011/10/31/big-dataspeed-and-the-future-<strong>of</strong>-computing/<br />
10. Naisbitt, J. B., Aburdene, P., 2000; available at<br />
http://tomdohm.wordpress.com/2011/08/24/deus-extranshumanism-and-you/<br />
11. Ridden, P., 2010 : “playing computer game with the<br />
blink <strong>of</strong> an eye”, March 30, 2010, Gizmag, available at :<br />
http://www.gizmag.com/eye-movement-game-controldevelopment/14667/<br />
12. Tubman, H., 1865 available at :<br />
http://thinkexist.com/quotation/<br />
every_great_dream_begins_with_a_dreameralways/346539.html<br />
13. Sharma, S.A., 1985: “Vicharo ki prachand Samarth”,<br />
yugantar chetna press, mathura<br />
14. Shivanand, S., 1997: “ Thought Power”, <strong>The</strong> divine life<br />
society publication, Tehri Garhwal,<br />
15. Warman, M., 2011: “ Xbox kinect foretells computers<br />
<strong>of</strong> the future; February 24, 2011, <strong>The</strong> telegraph, UK,<br />
available at :<br />
http://www.telegraph.co.uk/technology/micros<strong>of</strong>t/8344<br />
028/Xbox-Kinect-foretells-computers-<strong>of</strong>-thefuture.html<br />
<br />
Websites:<br />
http://library.thinkquest.org/C0113882/futcomputer.sht<br />
ml<br />
***<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 9
Internet Banking: A Case Study <strong>of</strong> the Factors<br />
influencing its Adoption in Mauritius<br />
Dinesh RAMDHONY * and Deerajen RAMASAWMY<br />
Abstract<br />
Purpose – <strong>The</strong> purpose <strong>of</strong> this paper is to investigate the<br />
factors that influence bank customers in Mauritius to adopt<br />
Internet Banking (IB).<br />
Methodology – An online survey was conducted with a<br />
response rate <strong>of</strong> 73%.<br />
Findings – Around 54% <strong>of</strong> the respondents were IB users.<br />
<strong>The</strong> commonly used services were for information inquiry<br />
and transfer <strong>of</strong> funds. Factor Analysis reveals that from a<br />
user’s point <strong>of</strong> view ‘availability <strong>of</strong> infrastructure’ and<br />
‘perceived ease <strong>of</strong> use’ are the most important factors in<br />
determining adoption <strong>of</strong> IB. In contrast, for non-users <strong>of</strong> IB,<br />
it was ‘trust and security issues’. Based on Logistic<br />
Regression analysis, household income group and age group<br />
were found to be the most significant demographic variables<br />
that determine adoption <strong>of</strong> IB.<br />
Practical implications – <strong>The</strong> results can be used by banks<br />
to devise strategies in increasing their customer base by<br />
catering for the needs <strong>of</strong> actual users and taking on board<br />
non-users.<br />
<strong>Research</strong> limitation – <strong>The</strong> use <strong>of</strong> convenience sampling<br />
weakens the objectivity <strong>of</strong> this research.<br />
Originality – This study considers the factors leading to<br />
actual usage or non-usage <strong>of</strong> IB unlike other studies which<br />
investigate the intention to use IB.<br />
Keywords: Internet Banking, Internet Banking Adoption,<br />
Technological Acceptance Model, Mauritius<br />
Introduction<br />
Advances in information technology have significantly<br />
changed the way banks deliver services to their customers<br />
and the way the latter undertake their regular banking<br />
transactions. Pressured by rising costs, ever more<br />
demanding customers, and the need to preserve pr<strong>of</strong>itability<br />
while standing out from the competition, banks found<br />
themselves forced to invest in new customer service<br />
channels such as internet banking (IB) (Hernandez and<br />
Mazon, 2007:72). <strong>The</strong> trend is evident in several developing<br />
countries such as Malaysia (Hway-Boon and Yu, 2003) and<br />
Thailand (Rotchanakitumnuai and Speece, 2003). Mauritian<br />
banks have joined the bandwagon and <strong>of</strong>fer a multiplechannel<br />
strategy to meet the needs <strong>of</strong> their clients.<br />
Internet banking <strong>of</strong>fers a multitude <strong>of</strong> benefits to both the<br />
user and the provider. Studies in Spain and Italy have found<br />
a positive correlation between provision <strong>of</strong> online services<br />
and financial performance (Hernando and Nieto, 2007,<br />
Hasan et al., 2005). Other benefits include cost savings,<br />
increased customer base, delivery <strong>of</strong> services in an<br />
innovative manner, increased marketing and communication<br />
possibilities, mass customisation and development <strong>of</strong> noncore<br />
businesses (Jayawardhena and Foley, 2000). From a<br />
user’s perspective the decision to adopt internet banking is<br />
mainly motivated by convenience and efficiency (Bruno,<br />
2003). Customers can access their bank account and effect<br />
transactions anywhere at any time. Internet banking has<br />
been found to be the cheapest delivery channel for<br />
standardised banking transactions such as account services<br />
and transfer <strong>of</strong> funds (Polatoglu and Ekin, 2001).<br />
A study on the adoption <strong>of</strong> internet banking in Mauritius<br />
was carried out by Padachi, Seetanah and Rojid (2006).<br />
However, the study lacked theoretical underpinning. <strong>The</strong><br />
last five years witnessed several cuts in the rates <strong>of</strong> internet<br />
access coupled with various initiatives by the local and<br />
central government to provide internet access in public<br />
places which justifies a new study on the adoption <strong>of</strong><br />
internet banking. <strong>The</strong> paper sets out to investigate the<br />
factors influencing the use <strong>of</strong> internet banking in Mauritius<br />
and tries to draw the pr<strong>of</strong>ile <strong>of</strong> the Mauritian Internet<br />
banking user. <strong>The</strong> findings are expected to be <strong>of</strong> great use to<br />
policy makers, financial institutions willing to launch IB<br />
services and more particularly to commercial banks already<br />
<strong>of</strong>fering IB facilities in devising strategies towards greater<br />
customer satisfaction and increasing their customer base.<br />
<strong>The</strong> paper is organised as follows. <strong>The</strong> next part contains a<br />
discussion <strong>of</strong> the theoretical models used to explain<br />
technology acceptance and findings <strong>of</strong> other studies<br />
regarding the adoption <strong>of</strong> internet banking. <strong>The</strong>n, the paper<br />
outlines the research methodology and presents the findings<br />
from the data analysis. From the findings, conclusions are<br />
drawn and recommendations are provided for assisting<br />
banks in devising strategies to increase their customer base.<br />
<strong>The</strong>oretical framework<br />
Several theories have been used to explain the determinants<br />
<strong>of</strong> <strong>IT</strong> adoption for individuals; the <strong>The</strong>ory <strong>of</strong> Reasoned<br />
Action (Fishbein & Ajzen, 1975), the <strong>The</strong>ory <strong>of</strong> Planned<br />
Behaviour (Ajzen, 1991) and the Technological Acceptance<br />
Model (TAM). Yousafzai et al. (2010) compared the three<br />
previously named theories in predicting IB behaviour. <strong>The</strong>y<br />
concluded that TAM is superior to other models. Chang and<br />
Hamid (2010) and Eriksson (1995) have also used the TAM<br />
for explaining IB adoption. This paper uses to a large extent<br />
the constructs <strong>of</strong> the TAM to explain IB adoption / nonadoption<br />
in Mauritius. TAM involves two primary<br />
predictors for the potential adopter, namely Perceived<br />
Usefulness and Perceived Ease <strong>of</strong> Use.<br />
Perceived Usefulness is defined as “the degree to which a<br />
technology is able to provide a means-end relationship, that<br />
is, the given technology as a means to a desired end” (Doll<br />
et al., 1998). <strong>The</strong> work <strong>of</strong> Wai-Ching Poon (2008)<br />
emphasised on the degree <strong>of</strong> convenience that customers can<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 10
attribute to the service and accordingly, 82% <strong>of</strong> the<br />
respondents agreed that e-banking is time saving and 53%<br />
strongly agreed that no queuing at the banks’ branches is<br />
advantageous. Sayar and Wolfe (2007) stated that customers<br />
find IB attractive as it is possible to conduct transactions<br />
anytime and anywhere, faster and lower fees are incurred<br />
compared to using traditional bank branches.<br />
Perceived Ease <strong>of</strong> Use refers to “the extent to which a<br />
person believes that using a particular system would be free<br />
<strong>of</strong> effort” (Davis et al., 1989). Rogers (1962) theorised that<br />
perceived ease <strong>of</strong> use demonstrates the degree to which an<br />
invention is seen as being not too difficult to understand,<br />
learn or operate. One <strong>of</strong> the attributes <strong>of</strong> Perceived Ease <strong>of</strong><br />
Use as suggested by Taylor and Todd (1995) is the<br />
complexity associated with the innovation, and in their study<br />
the latter was found to have the most significant relationship<br />
with adoption across a broad range <strong>of</strong> innovation types.<br />
Several other factors apart from Perceived Usefulness and<br />
Perceived Ease <strong>of</strong> Use, have been identified as influencing<br />
the decision to adopt IB. Davies (1989) refers to them as<br />
external variables. Some examples are: security or safety,<br />
the level <strong>of</strong> consumer trust, the risks associated with online<br />
banking, the infrastructure available, and eventually<br />
technological knowledge or awareness.<br />
Security or Safety<br />
<strong>The</strong> banking industry has declared information privacy and<br />
security to be major obstacles in the development <strong>of</strong><br />
consumer related electronic commerce (Thomas et al.,<br />
2002). Fear and anguish among the consumers<br />
psychological state that may bar them from using the system<br />
may be intensified if there exists any lapse <strong>of</strong> security in<br />
internet usage. Customers will not be willing to use the<br />
service if it is perceived as being easily susceptible to fraud<br />
(Al-Somali et al., 2009). This point was corroborated in a<br />
research conducted by Al-Hajri and Tatnall (2007). Most<br />
respondents were concerned about the problem <strong>of</strong> internet<br />
security as bank customers cannot put their full trust in<br />
internet technology due to possible fraud and privacy<br />
violation problems. In addition, feeling secure in doing<br />
transactions on the Web is <strong>of</strong>ten cited by users as a major<br />
factor that removes their concerns about the effective use <strong>of</strong><br />
the Internet for making online transactions (Salisbury et al.,<br />
2001).<br />
Trust<br />
<strong>The</strong> existence <strong>of</strong> a great deal <strong>of</strong> scepticism about the<br />
security <strong>of</strong> online transactions makes the element <strong>of</strong> trust a<br />
crucial factor when it comes to deciding upon the use <strong>of</strong> e-<br />
banking. Wai-Ching Poon (2008) confirmed that 69%<br />
respondents agreed that trust is affecting their demand for e-<br />
banking services. <strong>The</strong>re could be a limitation <strong>of</strong> the<br />
opportunities from web technology if there is a dearth <strong>of</strong><br />
trust by the consumers in the system (Rotchanakitumnuai<br />
and Speece, 2003). Customers usually do not have faith in<br />
internet based technology for reasons like security <strong>of</strong> the<br />
system, distrust <strong>of</strong> service providers, and anxiety regarding<br />
the dependability and consistency <strong>of</strong> the internet services<br />
(Rotchanakitumnuai and Speece, 2003). Finally, in a<br />
research by Fassnacht and Kose (2007), the customers‟ level<br />
<strong>of</strong> trust in e-banking was confirmed to have a considerable<br />
effect on the consumer’s choice <strong>of</strong> adopting this technology<br />
and for its continued usage.<br />
Awareness <strong>of</strong> the Service<br />
In general, customers will seek out those financial products<br />
which <strong>of</strong>fer the best value for money and about which they<br />
are educated. Once customers become aware <strong>of</strong> the<br />
integrated and secure services available somewhere, they are<br />
likely to switch to the providers <strong>of</strong> such services (Kalakota<br />
and Frei, 1998). El-Nawawy and Ismail (1999) in their study<br />
<strong>of</strong> e-commerce adoption by SMEs in Egypt reported that the<br />
main factors revolve around awareness and education. An<br />
innovative product will not achieve great heights if<br />
consumers are not aware <strong>of</strong> its existence and the potential<br />
benefits it presents. An Australian study by Sathye (1999)<br />
highlighted awareness as one <strong>of</strong> the main factors hindering<br />
the migration <strong>of</strong> consumers to IB.<br />
Availability <strong>of</strong> Infrastructure<br />
O’Connell (1996) identified lack <strong>of</strong> access to computers or<br />
internet as one <strong>of</strong> the possible reasons for slow adoption <strong>of</strong><br />
IB. <strong>The</strong> study by Wai-Ching Poon (2008) divulged that a<br />
majority <strong>of</strong> the respondents (81%) agreed that internet<br />
accessibility is an advantage for users’ satisfaction in<br />
adopting e-banking services. Likewise, through observations<br />
and narrative analysis <strong>of</strong> IB customers, Broderick and<br />
Vachirapornpuk (2002) identified issues like slowness, poor<br />
navigational possibilities, poor interactivity and critical<br />
incidents such as lack <strong>of</strong> help by the providers <strong>of</strong> IB service<br />
to be capable <strong>of</strong> deterring customers from adopting the<br />
service.<br />
Other Factors<br />
Many studies have investigated the effects <strong>of</strong> the customers’<br />
demographic characteristics; age (Czaja et al., 2001), gender<br />
(Venkatesh and Morris, 2000, Burke, 2002), financial<br />
income (Venkatesh and Morris, 2000), and education level<br />
(Burke, 2002). For example, it was found that older<br />
customers generally have negative attitudes towards<br />
technology and innovations; younger adults on the other<br />
hand were seen to be more interested in using new<br />
technologies (Czaja et al., 2001). Income was found by<br />
Venkatesh and Morris, (2000) to potentially exert a strong<br />
effect on the adoption and diffusion <strong>of</strong> technology.<br />
Similarly, gender and education level also played a<br />
significant role with regards to attitude towards technology<br />
use (Burke, 2002).<br />
Internet Banking in Mauritius<br />
<strong>The</strong> banking sector is a major component <strong>of</strong> the financial<br />
system in Mauritius. <strong>The</strong> sector is constantly growing and<br />
has attracted new players in the last five years. Presently the<br />
banking industry comprises <strong>of</strong> 20 banks holding a banking<br />
licence from the Bank <strong>of</strong> Mauritius, <strong>of</strong> which 7 are local<br />
banks, 8 are foreign owned subsidiaries, 1 is a joint venture<br />
and 4 are branches <strong>of</strong> foreign banks. <strong>The</strong> sector has been at<br />
the forefront <strong>of</strong> technological innovations <strong>of</strong>fering several<br />
banking channels via telephone / PC / terminal / Internet.<br />
<strong>The</strong> Mauritius Commercial Bank was the first bank to<br />
launch internet banking services in 1998 followed by the<br />
State Bank <strong>of</strong> Mauritius in 1999. As evidenced by Table I,<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 11
the number <strong>of</strong> IB customers have increased almost three fold<br />
between 2007 and 2010 while the value <strong>of</strong> IB transactions<br />
have tripled over the same period. <strong>The</strong> trend is expected to<br />
continue with gradual decrease in the costs <strong>of</strong> internet access<br />
and an increase in the number <strong>of</strong> banks <strong>of</strong>fering this service<br />
Methodology<br />
According to Internet World Stats 1 , Mauritius is considered<br />
an Intermediately Internet Penetrated Country. For a<br />
population size <strong>of</strong> 1,303,717 (2011) and 340,000 Internet<br />
Users, Mauritius has an Internet Penetration 26.7% and has<br />
a constantly growing part <strong>of</strong> its population using IB. As a<br />
result, it is very important for this study to investigate the<br />
different factors that influence the usage <strong>of</strong> IB in Mauritius.<br />
For the purpose <strong>of</strong> this study only individual users have<br />
been considered.<br />
A quantitative study was selected to obtain data regarding<br />
the usage <strong>of</strong> and attitudes towards IB. An online survey<br />
methodology approach was adopted. Based on Statistical<br />
Tables, a sample size <strong>of</strong> 398 was required for 95%<br />
Confidence Level, +/-5% and 0.5 degree <strong>of</strong> variability.<br />
Since a detailed list <strong>of</strong> all bank account holders is not<br />
available (for obvious confidential reasons), a convenience<br />
sampling method was used instead <strong>of</strong> a probabilistic method<br />
(such as simple random sampling). Emails were sent to<br />
individuals on the assumption that every working person<br />
holds a bank account. A total <strong>of</strong> 321 responses were<br />
obtained out <strong>of</strong> which 30 were incomplete. Thus, a total <strong>of</strong><br />
291 valid responses were obtained with a response rate <strong>of</strong><br />
73.1%.<br />
Organisation <strong>of</strong> the Questionnaire<br />
<strong>The</strong> questionnaire was prepared based on various sources <strong>of</strong><br />
IB and technology acceptance literature (Polatoglu and<br />
Ekin, 2001; Wai-Ching Poon, 2008; Yousafzai et al., 2010).<br />
<strong>The</strong> first section <strong>of</strong> the questionnaire contained biographical<br />
information about respondents which was meant for all<br />
users. <strong>The</strong> second part contained information destined for<br />
users <strong>of</strong> IB while the third part was aimed at non-users <strong>of</strong><br />
IB. A five-point Likert scale was used for questions in parts<br />
two and three <strong>of</strong> the questionnaire.<br />
<strong>The</strong> questionnaire was pretested several times with<br />
colleagues and experts in the field <strong>of</strong> IB to ensure face<br />
validity <strong>of</strong> items included in the data collection instrument.<br />
<strong>The</strong> pilot test also included a random sample <strong>of</strong> 20 bank<br />
account holders to ensure that the questions were clear and<br />
easily understandable so as to avoid any confusion and thus<br />
not deterring the participation <strong>of</strong> the bank account holders<br />
which is <strong>of</strong> paramount importance (Wai-Ching Poon, 2008).<br />
Following comments from respondents <strong>of</strong> the pilot test,<br />
minor amendments were made to the wordings and<br />
sequence <strong>of</strong> sentences contained in the questionnaire. <strong>The</strong><br />
questionnaire was then sent online with a cover letter<br />
explaining the academic purpose <strong>of</strong> the study and<br />
highlighting the fact that participation was purely voluntary.<br />
An online questionnaire was deemed better than a paper<br />
based one for the following reasons: there is no need to print<br />
questionnaires which saves on cost and contributes to the<br />
1 www.internetworldstats.com : Usage and Population Statistics<br />
promotion <strong>of</strong> a sustainable world; responses remain<br />
anonymous; respondents can fill the questionnaire at their<br />
own convenience; a large number <strong>of</strong> people can be reached<br />
at the click <strong>of</strong> the mouse. In addition, it saves us time on<br />
data input.<br />
Data Analysis<br />
Data collected was analysed using version 19 <strong>of</strong> IBM SPSS<br />
Statistics. A total <strong>of</strong> 321 responses were obtained out <strong>of</strong><br />
which 30 were incomplete. A total <strong>of</strong> 291 valid responses<br />
were obtained. Two sets <strong>of</strong> factor analyses were performed<br />
for both users and non-users. A logistic regression (LR) was<br />
also performed to identify the pr<strong>of</strong>ile <strong>of</strong> the Mauritian IB<br />
user/non-user.<br />
Findings<br />
<strong>The</strong> demographic pr<strong>of</strong>ile <strong>of</strong> the respondents that participated<br />
in the survey are summarised in Table II. We observe that<br />
there were more females (60%) than males (40%). In<br />
addition, the majority <strong>of</strong> the respondents (above 80%) were<br />
below 35 years <strong>of</strong> age and (around 75%) possesses at least a<br />
Diploma. In terms <strong>of</strong> household income, about 40% were in<br />
the group Rs 10,000 to Rs 25,000. Above 90% have Internet<br />
at home and above 80% have it at the work place. However,<br />
only around 54% use IB. Among IB users, the frequency <strong>of</strong><br />
usage <strong>of</strong> the majority <strong>of</strong> users is once a week or less. Table<br />
III summarises the different activities or tasks performed by<br />
IB users. <strong>The</strong> list was prepared based on decreasing<br />
frequency <strong>of</strong> usage. We observe that the majority use IB for<br />
viewing their account details (including account balance),<br />
for making transfers (internally, i.e., within accounts <strong>of</strong> the<br />
users or externally, to other users within same banks and<br />
other banks) and recharging mobile phones. <strong>The</strong> findings are<br />
in line with Polatoglu and Ekin (2001) who found that the<br />
mostly used IB services in Turkey are for information<br />
inquiry and transfer <strong>of</strong> funds. <strong>The</strong> least used services were<br />
found to be ‘Stop lost / stolen cheque’ and ‘Remove 'stop<br />
cheque' request’ which could be anticipated as bank<br />
customers will prefer to go personally to the bank given the<br />
urgency <strong>of</strong> the matter.<br />
Factor Analysis<br />
Users <strong>of</strong> IB<br />
<strong>The</strong> aim <strong>of</strong> this analysis is to group the 19 variables<br />
indicating usage <strong>of</strong> IB into underlying dimensions. <strong>The</strong><br />
Kaiser-Meyer-Olkin (KMO) value reached 0.823 which is<br />
considered excellent for factor analysis (Kaiser, 1974). <strong>The</strong><br />
Barlett test <strong>of</strong> sphericity reached statistical significance<br />
(0.000) indicating that factor analysis is appropriate.<br />
According to the Kaiser principle, only those factors with<br />
eigenvalues greater than 1 were maintained for further<br />
analysis. Principal Component Analysis revealed the<br />
presence <strong>of</strong> four factors which together explain a variance <strong>of</strong><br />
64%. A clear structure emerged after reducing the variables<br />
to four factors. A varimax rotation was performed to<br />
reorganise the four components. As a general rule factor,<br />
loadings less than 0.4 have been suppressed. <strong>The</strong> variables<br />
are listed in the Table IV, in the order <strong>of</strong> size <strong>of</strong> their factor<br />
loadings. Statements around component one give evidence<br />
<strong>of</strong> perceived ease <strong>of</strong> use and availability <strong>of</strong> infrastructure<br />
which are in accord with the findings <strong>of</strong> Davis et al., (1989)<br />
and Broderick and Vachirapornpuk (2002).<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 12
Non-users <strong>of</strong> IB<br />
For non-users <strong>of</strong> IB, 16 variables were used in the Factor<br />
Analysis so as to reduce the factors into underlying<br />
dimensions. <strong>The</strong> KMO value reached 0.827 while the<br />
Barlett test <strong>of</strong> sphericity reached statistical significance<br />
(0.000) indicating that factor analysis is appropriate. <strong>The</strong><br />
same criteria as mentioned for users <strong>of</strong> IBS were used. As in<br />
the case <strong>of</strong> users <strong>of</strong> IB, the PCA revealed the presence <strong>of</strong><br />
four factors which together explain a variance <strong>of</strong> 69%. A<br />
clear structure emerged after reducing the variables to four<br />
factors. <strong>The</strong> variables are listed in the Table V, in the order<br />
<strong>of</strong> size <strong>of</strong> their factor loadings.<br />
Both univariate and multivariate Logistic Regression were<br />
used. <strong>The</strong> results are summarised in Table VI. For univariate<br />
Logistic Regression, out <strong>of</strong> the four demographic pr<strong>of</strong>iles,<br />
namely gender, age group, household income and highest<br />
education level, only household income (above Rs 10,000)<br />
was found to be significant. Moreover with the multivariate<br />
LR, it was found that in addition to household income, age<br />
group was another significant demographic variable, in<br />
particular those in the age group below 45.<br />
Discussion<br />
Based on the findings, it is observed that users <strong>of</strong> IB attach<br />
high importance to the availability <strong>of</strong> infrastructure and<br />
perceived ease <strong>of</strong> use. <strong>The</strong> results show that users value<br />
‘friendly design’ and ‘availability <strong>of</strong> help when using IB’.<br />
<strong>The</strong>se findings are in accord with Gerrard and Cunningham<br />
(2003) who found that availability <strong>of</strong> an innovation to meet<br />
user’s needs using different feature availability on the<br />
website is <strong>of</strong> paramount importance for success in e-<br />
banking. <strong>The</strong> second best factor in determining usage <strong>of</strong> IB<br />
was found to be perceived usefulness. However, these<br />
findings are in contradiction with Wu and Kuo (2008) who<br />
noted that the respective predicting power <strong>of</strong> Perceived Use<br />
and Perceived Ease <strong>of</strong> Use on intention is considerably<br />
diluted by the addition <strong>of</strong> habitual usage or past usage. A<br />
possible factor explaining the Perceived Use and Perceived<br />
Ease <strong>of</strong> Use as being primary predictors <strong>of</strong> IB usage is that<br />
the IB phenomenon is quite new in Mauritius. Based on<br />
figures in Table I, we note that strong growth in the number<br />
<strong>of</strong> IB customers has been recorded from 2009 onwards thus<br />
confirming that mass usage <strong>of</strong> IB is quite new. Surprisingly,<br />
security issues rank last among the determinants <strong>of</strong> IB usage<br />
in Mauritius. This could be explained by the fact that with<br />
continued and regular usage, people start to trust the system<br />
and security becomes a salient issue.<br />
In contrast, for non-users <strong>of</strong> IB, ‘Trust and Security Issues’<br />
was the most important component extracted among the 5<br />
components as shown in Table V. Even with the advent <strong>of</strong><br />
secured website and secured login, some people were found<br />
not to trust IB. This can be attributed to the fact that there<br />
are many users have been fooled by scams and are reluctant<br />
to use IB. Availability <strong>of</strong> infrastructure and awareness <strong>of</strong><br />
service were the second and third components extracted<br />
respectively. <strong>The</strong>re are still people with no access to Internet<br />
either because they come from a low-income group or they<br />
have Personal Computers but without access to the Internet.<br />
<strong>The</strong> last component extracted is the Perceived Usefulness<br />
and Ease <strong>of</strong> Use. Non-IB users would usually use traditional<br />
banking services available at branches <strong>of</strong> banks or ATMs<br />
which becomes part <strong>of</strong> their routine and thereby ignoring the<br />
perceived ease <strong>of</strong> use and perceived usefulness <strong>of</strong> IB.<br />
In terms <strong>of</strong> pr<strong>of</strong>ile <strong>of</strong> users, we have found that household<br />
income and age groups are the demographic variables that<br />
determine whether or not a person uses IB. People in the<br />
age groups 25 – 35 and 36 – 45 are keener to use IB. <strong>The</strong><br />
results confirm the findings <strong>of</strong> Czaja et al. (2001) who claim<br />
that younger adults were more interested in using new<br />
technologies and older customers generally have a negative<br />
attitude toward technology and innovation. <strong>The</strong> level <strong>of</strong><br />
income significantly influences the use <strong>of</strong> IB. Our results are<br />
in line with the findings <strong>of</strong> Wai-Ching Poon (2008) who<br />
found that upper and middle income groups are affluent<br />
users <strong>of</strong> IB. No significant relationship was found between<br />
gender and IB use. This finding is contrary to that <strong>of</strong> Singh<br />
(2004) who found that males are more prone to use IB than<br />
females. Similarly, education level is not significantly<br />
related to the use <strong>of</strong> IB. <strong>The</strong> use <strong>of</strong> IB requires basic<br />
computer skills which could be a possible explanation for<br />
this result.<br />
Conclusions and Managerial implications<br />
<strong>The</strong> study identifies the motivators to use IB as being<br />
‘Availability <strong>of</strong> infrastructure and perceived ease <strong>of</strong> use’,<br />
‘perceived usefulness’, ‘Awareness <strong>of</strong> the service’ and<br />
‘security issues’, according to the degree <strong>of</strong> importance. <strong>The</strong><br />
pattern is reversed from the point <strong>of</strong> view <strong>of</strong> non –users who<br />
claim that obstacles to IB adoption according to the degree<br />
<strong>of</strong> importance are: ‘Trust and security issues’; ‘Availability<br />
<strong>of</strong> infrastructure’; ‘Awareness’ and ‘Perceived ease <strong>of</strong> use<br />
and perceived usefulness’.<br />
<strong>The</strong> findings <strong>of</strong> this study have several implications for<br />
commercial banks <strong>of</strong>fering IB services and potential IB<br />
providers. Banks should keep an eye on the design <strong>of</strong> their<br />
IB portal to ensure that they are user friendly and that timely<br />
assistance is provided to customers. <strong>The</strong> present conditions<br />
<strong>of</strong> distrust and insecurity among non-IB users needs to be<br />
addressed by educating customers, showing them the<br />
different safety measures taken by the bank to ensure<br />
privacy and confidentiality <strong>of</strong> information. Awareness<br />
campaigns could be run to that effect and at the same time<br />
reminding bank customers <strong>of</strong> the benefits <strong>of</strong> using IB and<br />
services <strong>of</strong>fered. Banks should upgrade their security<br />
system to win the trust <strong>of</strong> non-IB users. More assistance has<br />
to be provided online, to help customers effect their banking<br />
transactions. <strong>The</strong> findings on the demographic variables<br />
linked to the adoption <strong>of</strong> IB are also relevant for banks in<br />
devising strategies to increase their customer base.<br />
References<br />
AJZEN, I. (1991). <strong>The</strong> theory <strong>of</strong> planned behavior.<br />
Organizational Behavior and Human Decision<br />
Processes, 50, 179–211.<br />
AL-HAJRI, S. & TATNALL, A. (2007). Inhibitors and<br />
enablers to internet banking in Oman: A comparison<br />
with banks in Australia. International Review <strong>of</strong><br />
Business <strong>Research</strong> Papers, 3(5), 36-43.<br />
AL-SOMALI, S.A., GHOLAMI, R. & CLEGG, B.<br />
(2007). Internet banking acceptance in the context <strong>of</strong><br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 13
developing countries: An extension <strong>of</strong> the TAM Model.<br />
Operations & Information <strong>Management</strong> Group, Aston<br />
Business School.<br />
BANK OF MAUR<strong>IT</strong>IUS, Monthly bulletin, May 2011.<br />
BRODERICK, A. & VACHIRAPORNPUK, Y. (2002).<br />
Service quality in Internet banking: <strong>The</strong> importance <strong>of</strong><br />
customer role. Marketing Intelligence and Planning, 20,<br />
55-77.<br />
BURKE, R.R. (2002). Technology and the customer<br />
interface: What consumers want in the physical and<br />
virtual store? <strong>Journal</strong> <strong>of</strong> the Academy <strong>of</strong> Marketing<br />
<strong>Science</strong> 30(4), 411-432.<br />
BRUNO, M.A. (2003), B<strong>of</strong>A’s climb to the top <strong>of</strong> the<br />
online world, US Banker 113 (6), 24-25.<br />
CHANG, H. & HAMID, M. (2010). An empirical<br />
investigation <strong>of</strong> Internet Banking in Taiwan. Global<br />
<strong>Journal</strong> <strong>of</strong> Business <strong>Research</strong> 4 (2), 39-48.<br />
CZAJA, S.J., SHAR<strong>IT</strong>, J., OWNBY, R., ROTH, D.L.<br />
& NAIR, S. (2001). Examining age differences in<br />
performance <strong>of</strong> a complex information search and<br />
<br />
retrieval task. Psychology and Aging 16(4), 564-580.<br />
DAVIS, F. (1989). Perceived usefulness, perceived ease<br />
<strong>of</strong> use, and user acceptance <strong>of</strong> information technology.<br />
MIS Quarterly 13, 319–340.<br />
DOLL, W.J., HENDRICKSON, A. & DENG, X.<br />
(1998). Using Davis’s perceived usefulness and ease<strong>of</strong>-use<br />
instruments for decision making: a confirmatory<br />
and multigroup invariance analysis, Decision <strong>Science</strong>s<br />
<strong>Journal</strong> 29(4), 839-69.<br />
<br />
DAVIS, F.D., BAGOZZI, R.P. & WARSHAW, P.R.<br />
(1989). User Acceptance <strong>of</strong> Computer Technology: A<br />
Comparison <strong>of</strong> Two <strong>The</strong>oretical Models. <strong>Management</strong><br />
<strong>Science</strong> 35(8), 982-1003.<br />
EL-NAWAWY, M.A. & ISMAIL, M.M. (1999).<br />
Overcoming deterrents and impediments to electronic<br />
commerce in light <strong>of</strong> Globalization. Proceedings <strong>of</strong> the<br />
9th annual conference <strong>of</strong> the internet society, 22-25<br />
June INET 99, San Jose, USA.<br />
<br />
<br />
<br />
FASSNACHT, M. & KOSE, I. (2007). Consequences <strong>of</strong><br />
web-based service quality: Uncovering a multi-faceted<br />
chain <strong>of</strong> effects. <strong>Journal</strong> <strong>of</strong> Interactive Marketing, 21(3),<br />
35-54.<br />
FISHBEIN, M. & AJZEN, I. (1975). Belief, Attitude,<br />
Intention and Behavior. An Introduction to <strong>The</strong>ory and<br />
<strong>Research</strong>, Addison Wesley, Reading, MA.<br />
GERRARD, P. & CUNNINGHAM, J.B. (2003). <strong>The</strong><br />
diffusion <strong>of</strong> internet banking among Singapore<br />
consumers, International <strong>Journal</strong> <strong>of</strong> Bank Marketing 21<br />
(1), 16-28.<br />
HASAN, I., ZAZZARA, C. & CICIRETTI, R. (2005).<br />
Do internet activities add value? Evidence from the<br />
banking industry, Rensselaer Polytechnic Institute,<br />
unpublished manuscript.<br />
HERNANDEZ, J.M.C. & MAZZON, J.A. (2007).<br />
Adoption <strong>of</strong> internet banking: proposition and<br />
implementation <strong>of</strong> an integrated methodology approach,<br />
International <strong>Journal</strong> <strong>of</strong> Bank Marketing 25(2), 72-88.<br />
<br />
HERNANDO, I. & NIETO, M.J. (2007). Is the internet<br />
delivery channel changing banks’ performance? <strong>The</strong><br />
case <strong>of</strong> Spanish banks, <strong>Journal</strong> <strong>of</strong> Banking and Finance,<br />
31 (4), 1083-99.<br />
HWAY-BOON, O. & YU, C.M. (2003). Success<br />
factors in e-channels: the Malaysian banking scenario,<br />
International <strong>Journal</strong> <strong>of</strong> Bank Marketing 21 (6/7), 369-<br />
77.<br />
JAYAWARDHENA, C. & FOLEY, P. (2000), Changes<br />
in the banking sector – the case <strong>of</strong> internet banking in<br />
the UK, Internet <strong>Research</strong>: Electronic Networking<br />
Applications and Policy, Vol. 10 No. 1, pp. 19-30.<br />
KAISER, H. (1974). An index <strong>of</strong> factorial simplicity.<br />
Psychometrika, 39, 31-36.<br />
KALAKOTA, R. & FREI, F. (1998). Frontiers <strong>of</strong><br />
online financial services, In: M. J. Cronin, ed. Banking<br />
and Finance on the Internet. New York, USA: John<br />
Wiley & Sons, 19-74.<br />
O'CONNELL, B. (1996). Australian banking on the<br />
internet- fact or fiction? <strong>The</strong> Australian Banker,<br />
December, 212-214.<br />
PADACHI, K., ROJID, S. & SEETANAH, B. (2008).<br />
Analysing the factors that influence the adoption <strong>of</strong><br />
internet banking in Mauritius. <strong>Journal</strong> <strong>of</strong> Internet<br />
Business, 5, 116-126.<br />
POLATOGLU, V.N. & EKIN, S. (2001). An empirical<br />
investigation <strong>of</strong> the Turkish consumers’ acceptance <strong>of</strong><br />
internet banking services, International <strong>Journal</strong> <strong>of</strong> Bank<br />
Marketing 19 (4), 156-65.<br />
<br />
ROGERS, E.M. (1962). Diffusion <strong>of</strong> Innovations, <strong>The</strong><br />
Free Press, New York, NY.<br />
ROTCHANAK<strong>IT</strong>UMNUAI, S. & SPENCE, M. (2003).<br />
Barriers to internet banking adoption: a quantitative<br />
study among corporate customers in Thailand,<br />
International <strong>Journal</strong> <strong>of</strong> Bank Marketing 21 (6/7), 312-<br />
23.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
SALISBURY, W.D., PEARSON, R.A, PEARSON,<br />
A.W. & MILLER, D.W., (2001). Perceived security and<br />
World Wide Web purchase intention. Industrial<br />
<strong>Management</strong> & Data Systems 101, 165-176.<br />
SATHYE, M. (1999). Adoption <strong>of</strong> internet banking by<br />
Australian consumers: An empirical investigation.<br />
International <strong>Journal</strong> <strong>of</strong> Bank Marketing 17(7), 324-<br />
334.<br />
SAYAR, C. & WOLFE, S. (2007). Internet banking<br />
market performance: Turkey versus the UK,<br />
International <strong>Journal</strong> <strong>of</strong> Bank Marketing 25 (3), 122-41.<br />
SINGH, A.M. (2004). Trends in South African internet<br />
banking, Aslib Proceedings, 56 (3), 187-96.<br />
TAYLOR, S. & TODD, P.A. (1995). Assessing <strong>IT</strong><br />
usage: the role <strong>of</strong> prior experiences, MIS Quarterly<br />
19(3), 561-70.<br />
THOMAS, G., KELLERMANN, T., MCNEVIN &<br />
VALERIE. (2002). Electronic Security: Risk Mitigation<br />
in Financial Transactions. Public Policy Issues, <strong>The</strong><br />
World Bank.<br />
VENKATESH, V. & MORRIS, M.G. (2000). Why do<br />
not men ever stop to ask for directions? Gender, social<br />
influence, and their role in technology acceptance and<br />
usage behavior. MIS Quarterly 24(1) 115–139.<br />
YOUSAFZAI, S.Y., FOXALL, G.R. & PALLISTER,<br />
J.G. (2010), Explaining internet banking behavior:<br />
TRA, TPB, or TAM? <strong>Journal</strong> <strong>of</strong> Applied Social<br />
Psychology 40(5), 1172-1202.<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 14
WAI-CHING POON. (2008). Users' adoption <strong>of</strong> e-<br />
banking services: the Malaysian perspective. <strong>Journal</strong> <strong>of</strong><br />
Business and Industrial Marketing 23(1), 59-69.<br />
<br />
WU, M. & KUO, F. (2008). An Empirical Investigation<br />
<strong>of</strong> Habitual Usage and Past Usage on Technology<br />
Acceptance Evaluations and Continuance Intention,<br />
Database for Advances in Information Systems 39(4),<br />
48-73.<br />
ANNEXURE<br />
Table I: Internet Banking Trend<br />
Year Number <strong>of</strong> customers Number <strong>of</strong> transactions<br />
(monthly)<br />
Value <strong>of</strong> transactions (monthly)<br />
(Rs mn)<br />
Dec 2007 47, 616 164, 038 14, 442<br />
Dec 2008 63, 285 198, 205 28, 806<br />
Dec 2009 108, 414 252, 554 37, 607<br />
Dec 2010 133,508 171,088 4 4,038<br />
(Source: Bank <strong>of</strong> Mauritius (BoM) Monthly Bulletin – June 2011)<br />
Table II: Demographic Pr<strong>of</strong>ile <strong>of</strong> Respondents<br />
Demographic Pr<strong>of</strong>ile Details %<br />
Gender Male 40.3<br />
Female 59.7<br />
Age Group Less than 25 37.6<br />
25 – 35 47.2<br />
36 – 45 10.0<br />
More than 45 5.2<br />
Highest Education Level School Certificate (O Level) 1.7<br />
Higher School Certificate (A Level) 20.3<br />
Diploma / Degree 54.5<br />
Post Graduate 23.4<br />
Monthly Household Income Group < Rs 5,000 16.2<br />
Rs 5,000 – Rs 10,000 8.6<br />
Rs 10,000 – < Rs 25,000 40.0<br />
Rs 25,000 – < Rs 50,000 24.5<br />
Rs 50,000 and above 10.7<br />
Internet Access Home 92.4<br />
Workplace 86.4<br />
Use <strong>of</strong> IB 53.8<br />
Frequency <strong>of</strong> Usage <strong>of</strong> IB Daily 6.4<br />
2 – 3 times a week 14.0<br />
Once a week 24.8<br />
2 – 3 times a month 14.0<br />
Once a month 21.0<br />
Rarely 19.7<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 15
Table III: Uses <strong>of</strong> IB<br />
1 2 3 4<br />
USES OF IB Never Rarely Sometimes Regularly Mean SD<br />
Viewing Account Details 3.2 5.1 19.2 72.4 3.61 .732<br />
Inter Account Funds Transfer 28.8 14.7 28.2 28.2 2.56 1.182<br />
Making Online Payments 33.0 20.8 27.4 18.9 2.32 1.126<br />
Payment to other personal account 34.9 20.8 25.5 18.9 2.28 1.136<br />
Transfer <strong>of</strong> funds to credit card account 45.3 16.0 21.7 17.0 2.10 1.162<br />
Recharging Mobile Phones 53.8 8.5 12.3 25.5 2.09 1.299<br />
Payment to other local bank account 48.1 25.5 19.8 6.6 1.85 .964<br />
Loans, Credit Cards Application 62.8 12.2 11.5 13.5 1.76 1.109<br />
Standing Order Transactions 60.3 18.6 11.5 9.6 1.71 1.011<br />
Downloading Application Forms 59.4 20.8 13.2 6.6 1.67 .943<br />
Request Issue <strong>of</strong> C/A statement 66.0 19.8 10.4 3.8 1.52 .831<br />
Foreign transfer: Draft or Swift 70.8 15.1 13.2 0.9 1.44 .757<br />
Payment by <strong>of</strong>fice cheque 73.6 17.0 6.6 2.8 1.39 .738<br />
Cheque Book Request 76.4 15.1 6.6 1.9 1.34 .689<br />
Apply credit card limit charge 75.5 17.9 3.8 2.8 1.34 .689<br />
Stop lost / stolen cheque 89.6 7.5 1.9 0.9 1.14 .467<br />
Remove 'stop cheque' request 88.7 10.4 0.9 0.0 1.12 .357<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 16
Table IV : Users <strong>of</strong> IB<br />
IB Users<br />
Availability <strong>of</strong><br />
Infrastructure<br />
and Perceived<br />
Ease <strong>of</strong> Use<br />
Perceived<br />
Usefulness<br />
Awareness <strong>of</strong><br />
the Service<br />
Security Issues<br />
Rotated Component Matrix<br />
Component<br />
1 2 3 4<br />
My bank’s website has a clear, user-friendly design and the bank focuses on .787<br />
interactivity, navigation & security<br />
<strong>The</strong> availability <strong>of</strong> help simplifies navigation on the bank’s website .741<br />
<strong>The</strong> bank provides sufficient training, guides & manuals to support the use .716<br />
on IB<br />
IB usage requires no further knowledge apart from simply being<br />
.699<br />
acquaintained to use the computer<br />
It is easy to learn to use Internet Banking .661<br />
<strong>The</strong> bank is able to help me quickly in technical and non-technical issues .634<br />
related to IB<br />
It is flexible to interact with Internet Banking while utilising online services .609 .424<br />
I prefer internet Banking because online services are available 24 hours a<br />
.796<br />
day<br />
With IB, accounts can be paid and funds transferred without queues and<br />
.760<br />
writing out cheques<br />
IB is useful in conducting transactions .683<br />
Banking services are available more handily with IB .672<br />
Various banking services can be accessed at the same time, via Internet<br />
.652<br />
Banking<br />
I have enough information about how to use Internet Banking .838<br />
I am aware <strong>of</strong> the benefits and risks involved in Internet Banking .787<br />
I have enough information about Internet Banking .776<br />
I am aware about the different services being provided online .765<br />
I trust in the ability <strong>of</strong> the bank to protect my confidentiality .812<br />
I use Internet Banking because the bank is able to provide me with the<br />
.735<br />
necessary security<br />
<strong>The</strong> use <strong>of</strong> digital signatures, encryption & authorisation mechanisms<br />
.725<br />
provide a more secured IB service<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 17
GRID Computing: Related Issues and Business<br />
Applications<br />
Sanoara Yasmin and Musharuf Hossain Mollah<br />
School <strong>of</strong> Business, University <strong>of</strong> Information Technology and <strong>Science</strong><br />
Chittagong Campus, Bangladesh<br />
Department <strong>of</strong> Marketing<br />
Southeast University, Dhaka, Bangladesh<br />
Abstract<br />
Grid computing is a virtual computing system<br />
developed through the coordination and sharing <strong>of</strong><br />
computing power, application, data, and storage facilities <strong>of</strong><br />
different computers <strong>of</strong> geographically dispersed<br />
organizations. This paper is an effort to highlight the<br />
conceptual aspects, key characteristics, benefits and<br />
business applications <strong>of</strong> Grid computing. It focuses on<br />
different applications <strong>of</strong> Grid computing in Bangladesh<br />
perspective. Relevant peripheral issues <strong>of</strong> Grid computing<br />
like storage, security, integration and transparency <strong>of</strong> data,<br />
etc. are also discussed in the paper. Finally, the paper<br />
focuses on different strategies to implement Grid computing<br />
along with the future scope <strong>of</strong> Grid and a brief account <strong>of</strong> its<br />
limitations.<br />
INTRODUCTION<br />
Grid computing has been positioned as a promising next<br />
generation computing platforms due to the accelerated<br />
development <strong>of</strong> sharing the computation resources from peer<br />
computers as well computers across geographically<br />
dispersed organizations. It is a geographically distributed<br />
environment with autonomous domains that share resources<br />
amongst themselves (Azzedin and Maheswaran 2002).<br />
Foster et al. (1998) defined grid computing as a hardware<br />
and s<strong>of</strong>tware infrastructure that provides dependable,<br />
consistent, pervasive and inexpensive access to high-end<br />
computational capabilities. It coordinates and shares<br />
computing, application, data, storage, or network resources<br />
across dynamic and geographically dispersed organizations.<br />
It is a “virtualized” computing system comprised <strong>of</strong><br />
distributed system components (e.g., processors and storage)<br />
interconnected by a high-speed network. Grid computing<br />
enables creation <strong>of</strong> virtual enterprise for sharing and<br />
aggregation <strong>of</strong> millions <strong>of</strong> resources <strong>of</strong> geographically<br />
dispersed organizations (Buyya et al. 2004). It also suggests<br />
a computing paradigm similar to an electric power grid,<br />
which is a shared pool <strong>of</strong> resources that can be accessed on<br />
an as-needed basis. Thus grid computing has become a<br />
mainstream technology for large scale resources sharing and<br />
distributing system integration (Foster et al. 2002).<br />
EVOLUTION OF GRID COMPUTING<br />
Traditionally, computing typically was performed<br />
within highly integrated host-centric enterprise computing<br />
centers. <strong>The</strong> rise <strong>of</strong> the internet and the emergence <strong>of</strong> e-<br />
business have led to a growing awareness that an<br />
enterprise’s <strong>IT</strong> infrastructure encompasses external<br />
networks, resources, and services (Foster et al. 2002). In the<br />
early 1970s when computers were first linked by networks,<br />
the idea <strong>of</strong> harnessing unused CPU cycles was born. In<br />
1973, the Xerox installed the first Ethernet network and the<br />
first full-fledged distributed computing effort was underway.<br />
Scientists John F. Shoch and Jon A. Hupp created a worm,<br />
as they called it, and envisioned it moving from machine to<br />
machine using idle resources for beneficial purposes.<br />
Distributed computing scaled to a global level with the<br />
maturation <strong>of</strong> the Internet in the 1990s. One <strong>of</strong> the most<br />
famous projects <strong>of</strong> Grid computing in those years was the<br />
‘dnet’. It used thousands <strong>of</strong> independently owned computers<br />
across the Internet to crack encryption codes.<br />
<strong>The</strong> origin <strong>of</strong> the grid concept was established in<br />
the early 90’s when great efforts were made to deploy<br />
several gigabyte testbeds such as CASA that linked super<br />
computer link across the USA (Lyster et al., 1992). <strong>The</strong><br />
successes <strong>of</strong> these tesbeds inspired the I-WAY experiment<br />
in North America in 1995 where a large scale testbed where<br />
multiple supercomputers and advanced visualization devices<br />
at 17 different places were connected through ATM<br />
networks in order to allow high performance applications to<br />
be studied in a controlled environment (Bote-Lorenzo et al.<br />
2004). Grid computing entered the mainstream <strong>of</strong> research<br />
with the establishment <strong>of</strong> Global Grid Forum<br />
(www.gridforum.org) by early grid developers and<br />
practitioners. <strong>The</strong> publication <strong>of</strong> the book tiled “<strong>The</strong> Grid:<br />
Blueprint for a Future Computing Infrastructure” by Foster<br />
et al. (1998) laid the groundwork <strong>of</strong> the field.<br />
TYPES OF GRID<br />
From an application perspective, there are two<br />
types <strong>of</strong> grids: ‘compute grids’ and ‘data grids’ and from<br />
a topology view there are intra-grids (enterprise), extra<br />
grids(utility), clusters and inter-grids(partner).<br />
As the name suggests the ‘compute grid’ is<br />
essentially a collection <strong>of</strong> distributed computing resources,<br />
within or across locations, that are combined together to act<br />
as a unified processing resource or a virtual supercomputer.<br />
<strong>The</strong> main aspect <strong>of</strong> a compute grid is that it eliminates the<br />
binding <strong>of</strong> specific machines to certain computing processes<br />
by allowing the aggregated pool to service sequential and<br />
other attributes that need the power.<br />
Similarly a ‘data grid’ provides wide area, secure<br />
access to current data. <strong>The</strong>se grid enables users and<br />
applications to manage ad efficiently use database<br />
information from distributed locations. Importance <strong>of</strong> data<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 18
grid is that it eliminates the need to move, replicate or<br />
centralize data and thereby saves costs. <strong>The</strong> above grids rely<br />
on s<strong>of</strong>tware for secure access and usage policies and utilize<br />
the existing resources.<br />
‘Intra grids’ or ‘enterprise grids’ work within<br />
organizations that want to share information for better use <strong>of</strong><br />
resources and tangible business benefits. Examples <strong>of</strong><br />
companies are that have deployed Enterprise Grids include<br />
JP Morgan Chase, General Motors, Monsanto, Toshiba, etc.<br />
‘Extra’ or ‘utility grids’ basically are computing resources<br />
accessible on the internet and delivered by ASPs<br />
(Application Service Providers). This is an expansive grid<br />
spanning different business models, applications, operating<br />
platforms, etc. Example: IBM has successfully implemented<br />
an extra grid with its subsidiaries all across the world using<br />
the Internet. Many companies around the world are in the<br />
implementation process as yet.<br />
CHARACTERISTICS OF GRID COMPUTING<br />
Extant literature (e.g. Foster, 2002; Foster et al., 2001;<br />
Grimshaw, 2002) pointed out different characteristics <strong>of</strong><br />
Grid Computing. Bote-Lorenzo et al. (2004) compiled the<br />
key characteristics and outlined the following characteristics<br />
<strong>of</strong> Grid –<br />
a) A grid must be seen as a single virtual computer.<br />
b) Grid computing must be able to manage large scale<br />
resources from just a few to millions.<br />
c) Grid resources may be located at geographically<br />
distant places.<br />
d) A grid should be able to host heterogeneous<br />
resources such as both hardware and s<strong>of</strong>tware<br />
resources varying from data, files, programs, to<br />
sensors, scientific instruments, display devices,<br />
super-computers, networks, etc.<br />
e) A grid should involve resources <strong>of</strong> many<br />
organizations that allow other user organizations to<br />
access the resources.<br />
f) Each organizations involved with a particular grid<br />
may have different administration in order to<br />
establish and administer different customized<br />
security and administrative policies to access and to<br />
use the resources <strong>of</strong> the grid.<br />
g) Resources in a grid should be coordinated in order<br />
to provide aggregated computing capabilities.<br />
h) A grid should assure the delivery <strong>of</strong> services under<br />
established Quality <strong>of</strong> Service requirements.<br />
i) A grid must be built with standard services,<br />
protocols, and inter-faces and should hide the<br />
heterogeneity <strong>of</strong> the resources while allowing its<br />
scalability.<br />
j) A grid should be accessible to available resources<br />
by adapting to a dynamic environment. <strong>The</strong> grid<br />
must tailor its behavior to extract the maximum<br />
performance from the available resources.<br />
USES AND BENEF<strong>IT</strong>S OF GRID COMPUTING<br />
Many companies want to take advantage <strong>of</strong> the cost<br />
and efficiency benefits that come from a grid infrastructure.<br />
<strong>The</strong> benefits <strong>of</strong> Grid computing can be more extensive.<br />
<strong>The</strong>y include increased speed <strong>of</strong> computing, improved<br />
productivity and collaboration, more flexible and resilient<br />
infrastructure, etc. <strong>The</strong> benefits <strong>of</strong> Grid computing are<br />
discussed below -<br />
Utilization <strong>of</strong> Computing Power<br />
<strong>The</strong> main benefit from the full utilization <strong>of</strong><br />
computing power <strong>of</strong> the PCs. <strong>The</strong> desktop PCs <strong>of</strong> an<br />
organization are <strong>of</strong>ten underutilized. “PCs and Windows<br />
servers are about 5 percent utilized; Unix servers are 15<br />
percent utilized,” said Dan Powers, vice president <strong>of</strong> grid<br />
strategy at IBM. Even IBM mainframes are only utilized<br />
about 65 percent <strong>of</strong> the time. 1 By harnessing these plentiful<br />
underused computing assets and leveraging them for<br />
revenue-driving projects, the Grid MP platform provides<br />
immediate value for companies. Moreover, PCs are not in<br />
use on evenings, weekends, and daytime hours can provide<br />
significant computational resources.<br />
Faster Project Results<br />
Increased processing speed is an enormous benefit<br />
<strong>of</strong> Grid computing. It squeezes more computing speed from<br />
an organization's machines. <strong>The</strong> increased processing power<br />
<strong>of</strong> a grid enables applications run faster and delivers results<br />
more quickly. It has a direct impact on an organization's<br />
ability to win in the marketplace by shortening product<br />
development cycles and accelerating research and<br />
development processes.<br />
Reduced Operational Costs<br />
Grid computing enables to reduce the operational<br />
cost. On a price-to-performance basis, the Grid platform<br />
gets more work done with less administration and budget<br />
than dedicated hardware solutions. Depending on the size <strong>of</strong><br />
the network, the price-for-performance ratio for computing<br />
power can literally improve by an order <strong>of</strong> magnitude 2<br />
Optimized Capital Investment<br />
Reduced hardware capital investment is another<br />
significant and attractive cost saving means yielded by grid<br />
computing. As applications increase in breadth, volume and<br />
complexity, they increasingly require more compute<br />
horsepower. This necessitates that more and more funds be<br />
spent on hardware. However, with resource utilization<br />
across most enterprises, funding the purchase <strong>of</strong> new<br />
hardware is not required. Thus the company may have a<br />
lower TCO (total cost <strong>of</strong> ownership) for its <strong>IT</strong> projects<br />
through effective sharing <strong>of</strong> investments in storage with<br />
other enterprises.<br />
Increased Productivity<br />
Under a Grid infrastructure, productivity jumps due<br />
to increased computational activity. Besides, conservation <strong>of</strong><br />
resources from the underutilized CPUs also contributes to<br />
the productivity the whole system. It is aggregating<br />
computing power and converting it into value to the<br />
1<br />
http://www.networkmagazine.com/shared/article/show<br />
Article.jhtml?articleId=17602029 ).<br />
2 (www.grid.org)<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 19
usiness, which directs resources to more value-added tasks,<br />
entering new markets, <strong>of</strong>fering new services (both internally<br />
and externally) and directly impacting revenue and pr<strong>of</strong>it<br />
contribution.<br />
Sharing Data and Resources<br />
Grid computing allows widely dispersed<br />
departments and business to create virtual organizations to<br />
share data and resources. As a result, it is <strong>of</strong> immense help<br />
for the successful implementation <strong>of</strong> international projects.<br />
In addition to above mentioned benefits, grid<br />
computing facilitates an infrastructure that bonds and unifies<br />
globally remote and diverse resources to provide<br />
computational support (Bote-Lorenzo et al. 2004). Hence<br />
different types <strong>of</strong> computational support <strong>of</strong>fered by grids<br />
can be used in different purposes in business. Following<br />
discussions outline different computation supports <strong>of</strong>fered<br />
by Grid and their respective uses -<br />
Distributed Supercomputing Support: Grid<br />
computing provides distributed supercomputing support that<br />
combines computational resources in order to reduce the<br />
completion time <strong>of</strong> a job (Krauter et al. 2002). It also helps<br />
to tackle problems that cannot be solved by a single<br />
computer system (Foster 1998).<br />
On-Demand Computing Support: Grid<br />
computing <strong>of</strong>fers on-demand computing support that helps<br />
to retrieve resources that cannot be cost-effectively or<br />
conveniently located locally (Foster 1998). For example<br />
users who intend to perform accurate stock market analysis<br />
and price prediction in their home desktop can be benefitted<br />
from on-deman computing by employing grid connectivity<br />
(Bote-Lorenzo et al. 2004).<br />
Data Intensive Computing Support: It allows<br />
applications to use grids to synthesize new information from<br />
distributed data repositories, digital libraries, and databases<br />
(Foster 1998). <strong>The</strong> creation <strong>of</strong> a new database using data<br />
mining from a number <strong>of</strong> online databases would be an<br />
example <strong>of</strong> data-intensive computing applications (Bote-<br />
Lorenzo et al. 2004).<br />
Multimedia Computing Support: It allows<br />
applications to use grids to deliver contents assuring end-toend<br />
quality service (Krauter et al. 2002). For example, a<br />
video conferencing application is a typical example <strong>of</strong><br />
application requiring multimedia computing support (Bote-<br />
Lorenzo et al. 2004).<br />
APPLICATIONS OF GRID COMPUTING –<br />
BANGLADESH PERSPECTIVE<br />
Though Grid computing started in laboratories<br />
facilitating researchers to collaborate among themselves and<br />
utilize the unused computational power to perform complex<br />
mathematical operations, the concept has real business<br />
applications right now. Grid technologies can be applied in<br />
the following industries -<br />
Universities and Academic Institutions<br />
Universities can utilize the benefits <strong>of</strong> grid for the<br />
greater wellbeing <strong>of</strong> the all universities <strong>of</strong> Bangladesh.<br />
Universities possess plenty <strong>of</strong> computers used both for<br />
academic and administrative purpose, which can be brought<br />
under grid network to utilize their unused resources.<br />
Specially, the after hours idle administrative computer<br />
resources can be used for academic purposes by throughout<br />
the country. In addition, universities can also share their<br />
library resources, which will be beneficial to all the parties<br />
involved in the Grid network. University Grant Commission<br />
(UGC) may wish to conduct a through study and prepare a<br />
central plan in this regard. Similar university grid is<br />
proposed for Canadian universities to utilize their idle<br />
resources for the greater wellbeing (Schick, 2005).<br />
Financial Services<br />
It is a common situation in financial services<br />
industry that subsidiaries, divisions and line <strong>of</strong> business<br />
maintain their own set <strong>of</strong> system and data. Standardizing<br />
them by a common technology and harnessing its<br />
underutilized resources through Grid Computing can result<br />
in huge improvement in operational efficiency. Different<br />
financial service companies such as JP Morgan, Charles<br />
Schwab, etc. already implemented grid computing and<br />
reaped benefit out <strong>of</strong> it (Glasgow 2003).<br />
Pharmaceutical Industry<br />
Most Pharmaceutical companies derive<br />
competitive advantage from faster discovery <strong>of</strong> new drugs.<br />
However such discoveries almost always require molecular<br />
modeling and computational chemistry. <strong>The</strong>se tasks needs<br />
huge amount <strong>of</strong> computing power. Pharmaceutical<br />
companies can harness the power from unused resources in<br />
their organization by adopting grid technology. This can<br />
greatly reduce the cost <strong>of</strong> drug discovery and provide<br />
significant competitive advantage. For example, Novartis<br />
already implemented grid computing and using it for about a<br />
decade by linking together more than 2700 personal<br />
computers (PCs) available in its research and development<br />
and already came up with several interesting molecules as a<br />
result <strong>of</strong> incorporating the great amount <strong>of</strong> computing power<br />
tied into the grid (Glasgow 2003).<br />
Geosciences<br />
Upstream operations are absolutely vital for<br />
petroleum companies and hence analysis <strong>of</strong> large amount <strong>of</strong><br />
geophysical datasets for reservoir modeling is critical. It<br />
requires huge computing power and companies can<br />
significantly reduce seismic imaging turnaround time and<br />
maximize reservoir simulation productivity by<br />
implementing Grid Computing Technology.<br />
Industrial Engineering<br />
Many aerospace companies and automobile<br />
companies use computational fluid dynamics and finite<br />
element analysis to improve the design <strong>of</strong> an automobile<br />
part or build a more sustainable aircraft. Employing grid<br />
computing can result in running simulation and modeling<br />
faster and with more precision. This improvement will result<br />
in better quality products with shorter development time,<br />
significantly boosting the bottom line.<br />
PERIPHERAL ISSUES OF GRID COMPUTING<br />
Peripheral issues <strong>of</strong> Grid computing deals with the<br />
factors related with the implementation <strong>of</strong> Grid computing<br />
in an organization. To build a Grid, the development and<br />
deployment <strong>of</strong> a number <strong>of</strong> services is required. However,<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 20
the key issues where managers need to focus in this regard<br />
are - Service-Oriented Architecture, Security issues and<br />
Storage 3 .<br />
Service-Oriented Architecture<br />
A service-oriented architecture (SOA) is essentially<br />
a collection <strong>of</strong> services. <strong>The</strong>se services communicate with<br />
each other. <strong>The</strong> communication can involve either simple<br />
data passing or it could involve two or more services<br />
coordinating some activity. It uses web services to connect<br />
the service provider and service consumer. 4 It is designed in<br />
such a way that it can seamlessly connect with existing<br />
platforms and management solutions.<br />
For the successful implementation <strong>of</strong> Grid, the<br />
organizations should have service-oriented architecture as it<br />
enables the grid architecture to work flexibly on real world<br />
heterogeneous operating platforms and manage the entire<br />
infrastructure <strong>of</strong> a dynamic business. Besides, scalability is<br />
also important in an on-demand environment. <strong>The</strong><br />
architecture should be scalable enough to support the needs<br />
<strong>of</strong> the business as it grows, and maximize administrative<br />
productivity in a dynamic environment. A SOA can meet<br />
such need <strong>of</strong> the Grid architecture.<br />
Security<br />
Another most important factor to consider in the<br />
utility computing model is its security issue. Grid computing<br />
calls for servers to be dynamically configured and shared by<br />
different partners. As a result, there should be proper<br />
deployment and maintenance <strong>of</strong> security policies. <strong>The</strong>re<br />
should be an agreed understanding among the partners to<br />
what extent and how much time the resources <strong>of</strong> the grid<br />
will be shared by a specific party. <strong>The</strong>re should be a<br />
centralized security department committed to ensuring that<br />
these security issues are enforced across the organization<br />
and end-users conform to guidelines set forth by the<br />
Security department.<br />
Storage<br />
As grid computing enables the participants to share<br />
data, computational power and other resources,<br />
consequently, there should be a storage system <strong>of</strong> all these<br />
data or other resources. <strong>The</strong> term storage here essentially<br />
means a virtual storage, which acts as one <strong>of</strong> the main<br />
enablers <strong>of</strong> the utility computing model. As the amount <strong>of</strong><br />
data companies need to store has increased, companies have<br />
to buy huge storage devices to keep all those electronic<br />
records and information. <strong>The</strong> two key technologies that are<br />
enabling the virtualization <strong>of</strong> storage for on-demand<br />
computing are Storage Area Networks (SAN) and Network<br />
Attached Storage (NAS). 5 Storage Area Network (SAN) is<br />
3 Don LeClair, Managing On-Demand Computing, CA<br />
White Paper, July 14, 2003,<br />
http://whitepapers.informationweek.com/detail/RES/105904<br />
9277_795.html<br />
4 SOA definition at http://www.servicearchitecture.com/web-services/articles/serviceoriented_architecture_soa_definition.html)<br />
5 Don LeClair, Managing On-Demand Computing, CA<br />
White Paper, July 14, 2003,<br />
a high-speed sub network <strong>of</strong> shared storage devices. A<br />
storage device is a machine that contains nothing but a disk<br />
or disks for storing data. A SAN’s architecture works in a<br />
way that makes all storage devices available to all servers on<br />
a LAN or WAN. As more storage devices are added to a<br />
SAN, they too will be accessible from any server in the<br />
larger network. In this case, the server merely acts as a<br />
pathway between the end user and the stored data. Because<br />
stored data does not reside directly on any <strong>of</strong> a network's<br />
servers, server power is utilized for business applications,<br />
and network capacity is released to the end user. 6 On the<br />
other hand, a Network-Attached Storage (NAS) device is a<br />
server that is dedicated to nothing more than file sharing.<br />
NAS does not provide any <strong>of</strong> the activities that a server in a<br />
server-centric system typically provides, such as e-mail,<br />
authentication or file management. NAS allows more hard<br />
disk storage space to be added to a network that already<br />
utilizes servers without shutting them down for maintenance<br />
and upgrades. With a NAS device, storage is not an integral<br />
part <strong>of</strong> the server. Instead, in this storage-centric design, the<br />
server still handles all <strong>of</strong> the processing <strong>of</strong> data but a NAS<br />
device delivers the data to the user. A NAS device does not<br />
need to be located within the server but can exist anywhere<br />
in a LAN and can be made up <strong>of</strong> multiple networked NAS<br />
devices. 7<br />
Integration and Transparency <strong>of</strong> Data<br />
Another key issue to consider here is the<br />
integration and transparency <strong>of</strong> the data. A strict<br />
enforcement <strong>of</strong> rules for data management needs to be<br />
established across the organization. Because <strong>of</strong> open<br />
standards and a distributed environment, any updates made<br />
by end-users are available in real time across the<br />
organization and business units. But there is no control<br />
mechanism to check for errors or duplications in the<br />
database. As a result the integration <strong>of</strong> the data and its<br />
transparency is a vital issue here. <strong>The</strong> end users need to be<br />
more responsible in this regard.<br />
STRATEGIES FOR IMPLEMENTING GRID<br />
COMPUTING<br />
Grid computing is still in infancy and very few<br />
companies have embraced these technology full heartedly.<br />
However these early adopters have learnt from their<br />
mistakes. This continuous learning will someday evolve into<br />
best practices once the technology is mature. <strong>The</strong>refore, by<br />
analyzing how the early adopters like IBM, GM, JP Morgan<br />
Chase, and others have implemented Grid Computing and<br />
what were their mistakes, some strategies for the successful<br />
implementation <strong>of</strong> Grid Computing are outlined below -<br />
Evaluate Business Needs<br />
Though it might sound cliché, this is the classic<br />
mistakes corporations have been doing over time while<br />
adopting new technology. Grid computing is certainly a<br />
“buzzword” in technology arena today; however companies<br />
http://whitepapers.informationweek.com/detail/RES/105904<br />
9277_795.html<br />
6 http://www.webopedia.com/TERM/S/SAN.html<br />
7 http://www.webopedia.com/TERM/N/networkattached_storage.html<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 21
have to contemplate whether they are going to get some<br />
business value out <strong>of</strong> it or not. Our reading <strong>of</strong> various<br />
articles gives us an impression that technology is mature<br />
enough to move out <strong>of</strong> research phase and ready to roll into<br />
industry, but suitable only for industries that need enormous<br />
computational power and perform complex mathematical<br />
operations. Grid computing may be a natural fit for<br />
aerospace, financial services and petroleum industries.<br />
Go Slow<br />
Grid computing is still in experimental stage and<br />
people are exploring the technology in various directions. It<br />
will not be prudent to make huge commitment based on<br />
early trends. It has seen observed that <strong>of</strong>ten technologies<br />
change the course and move in different direction, which<br />
was not thought <strong>of</strong> in early stages. Moreover as the concept<br />
and standard <strong>of</strong> Grid Computing is still evolving and such<br />
evolving standard means companies have to constantly<br />
upgrade the technology, the company might not have<br />
enough resources to cope with it. <strong>The</strong>refore, the companies<br />
should follow a go-slow policy to implement Grid<br />
Computing.<br />
Pick a partner not a product<br />
As grid computing is gaining attention from<br />
corporate world, many small firms are coming up with new<br />
products. However quality <strong>of</strong> the products and after sales<br />
services must be evaluated carefully before choosing a<br />
product. We rather suggest that it would be very important<br />
to choose a right partner rather than a product. This<br />
approach can be handy as the technology is still evolving.<br />
Companies must be able to upgrade their existing<br />
technologies in line with evolving standards. A vendor who<br />
is committed to the technology can be <strong>of</strong> real value in this<br />
case.<br />
Check Compatibility<br />
<strong>The</strong> biggest challenge for grid computing is that<br />
many existing applications are not compatible with grid<br />
technology. In other words it means that if application is not<br />
written for multi processing, it requires significant effort to<br />
get those applications on the grid. It is very important that<br />
while doing cost benefit analysis; companies factor in the<br />
cost <strong>of</strong> modifying the applications to make them compatible<br />
with grid technology.<br />
Manage Change<br />
Grid computing is a paradigm shift in the way<br />
people used resources and thus it is certain to bring<br />
enormous changes in people’s work life. This enormous<br />
change has to be managed in order to realize the full<br />
potential <strong>of</strong> the technology. Though resources belong to the<br />
company, departmental view <strong>of</strong> personal ownership is hard<br />
to shake. Thus it requires significant effort from<br />
management to adjust the mindset <strong>of</strong> the company. This is<br />
critical for the enterprise wide success <strong>of</strong> the grid<br />
computing.<br />
FUTURE SCOPE OF GRID<br />
According to an estimate by Grid Technology<br />
Partners, a firm that specializes in grid computing, total<br />
worldwide market for grid computing is expected to touch<br />
$8 billion by end <strong>of</strong> 2008. Gartner research report says grid<br />
computing is one <strong>of</strong> the few emerging technologies that will<br />
transform enterprise computing over the next 10 years. Thus<br />
the question is not whether we will be using grid in future;<br />
the question is how we will be using grid in future.<br />
On Demand Computing<br />
Information Technology (<strong>IT</strong>) as an integral part <strong>of</strong><br />
a business cannot be an exception. On<br />
demand computing is a model in which computing resources<br />
are made available to the users as needed. Because an<br />
enterprise's demand on computing resources can vary<br />
drastically from one time to another, maintaining sufficient<br />
resources to meet peak requirements can be costly. Thus if<br />
company needs exceptionally high computing power for<br />
short period <strong>of</strong> time, it can get it from vendors like IBM and<br />
pay based on the computing power used. <strong>The</strong> same concept<br />
can be applied for applications and network storage. Thus<br />
combination <strong>of</strong> web services, grid computing and open<br />
architecture will help <strong>IT</strong> gain advantage from economies <strong>of</strong><br />
scale. This also means that over a period <strong>of</strong> time companies<br />
may substantially reduce their fixed cost in <strong>IT</strong> and reduce<br />
the total cost <strong>of</strong> ownership. This also means that <strong>IT</strong> staff<br />
becomes more <strong>of</strong> a broker between company and vendors<br />
thus significantly changing their role.<br />
Global Grid<br />
Grid computing holds excellent promise as the next<br />
generation <strong>of</strong> the shift from proprietary to open based<br />
computing architecture. It is the next level <strong>of</strong> eliminating the<br />
complexities <strong>of</strong> dependencies. This is how we envision a<br />
more promising application <strong>of</strong> on-demand technology. <strong>The</strong><br />
computing power on PCs is mostly unutilized and hence<br />
concept <strong>of</strong> applying grid is a possibility. Grid computing can<br />
be <strong>of</strong> great value to students, individual researchers,<br />
entrepreneurs and pr<strong>of</strong>essionals. As a student we come<br />
across situations where we need access to very expensive<br />
s<strong>of</strong>tware but the state is not willing to pay the huge licensing<br />
fees, especially in case <strong>of</strong> public universities. What if you<br />
are an entrepreneur and you need access to a data warehouse<br />
that contains critical information about your target<br />
customers. Imagine a researcher who needs access to a large<br />
amount <strong>of</strong> processing power for a highly specialized<br />
research project. In the current computing environment, it is<br />
not possible for these individuals to reach their goals<br />
without a huge corporate or government sponsorship. Now<br />
imagine if the university can go to a website and purchase<br />
the pricey s<strong>of</strong>tware for 12 students every Wednesday from<br />
5:00 to 6:30 pm. What if the entrepreneur could access the<br />
data warehouse for fifteen minutes and download the<br />
information he/she needs. What is the researcher could tap<br />
into the grid for a couple <strong>of</strong> hour’s everyday to perform his<br />
calculations at 600 GHz. Though this may sound day<br />
dreaming, the apt combination <strong>of</strong> web services, grid<br />
computing and open source architecture can make it happen.<br />
A global grid connecting computing resources all over the<br />
world accessible through internet is the ultimate destination<br />
proponents <strong>of</strong> grid computing should strive for!<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 22
LIM<strong>IT</strong>ATIONS AND CONCLUSION<br />
Grid computing is a technology with huge<br />
potentials. It could bring a paradigm shift in the way people<br />
share computing resources. However, grid computing is still<br />
is in its infancy and hence standards are not well developed.<br />
As grid resources are not entirely dedicated to the<br />
environment, computational and networking capabilities can<br />
vary significantly over time (Cao et al. 2003). Hence,<br />
predicting application performance may become difficult<br />
and real-time resource information update within a largescale<br />
global grid may become impossible. In addition, as the<br />
process <strong>of</strong> grid work flow encompass multiple<br />
administrative domains or organizations, lack <strong>of</strong> central<br />
ownership and control over the grid may result in<br />
incomplete information processing as well as many other<br />
uncertainties (Cao et al. 2003).<br />
Despite these limiting issues, it is sure that<br />
adopting grid computing will help improving operational<br />
efficiency <strong>of</strong> existing infrastructure and achieve more<br />
collaboration among various organizations. Specially,<br />
computational grid enables creation <strong>of</strong> virtual computing<br />
environment for sharing and aggregation <strong>of</strong> distributed<br />
resources for solving large-scale problems in science,<br />
engineering, and commerce (Buyya et al. 2002). Hence,<br />
application <strong>of</strong> grid computing is limited to businesses where<br />
high computational power is required. If web services and<br />
grid computing could be merged seamlessly, it can be<br />
utilized the productivity <strong>of</strong> masses and world can reap<br />
enormous advantages from it. Consequently, relevant<br />
legislations should be enacted in order to ensure proper<br />
direction and management <strong>of</strong> the resources <strong>of</strong> the virtual<br />
organization developed by the GRID itself. Hence further<br />
research is warranted in this regard.<br />
REFERENCES<br />
1. Azzedin, F. and Maheswaran, M. (2002), “Evolving and<br />
Managing Trust in Grid Computing Systems”, In<br />
Proceedings <strong>of</strong> the 2002 IEEE Canadian Conference on<br />
Electrical Computer Engineering, 0-7802-xxxx-x.<br />
2. Bote-Lorenzo, M. L., Yannis A. Dimitriadis, and<br />
Eduardo G´omez-S´anchez (2004), “Grid<br />
Characteristics and Uses: A Grid Definition”, in Miguel<br />
L., F. Fern´andez Rivera et al. (Eds.): Across Grids<br />
2003, LNCS 2970, pp. 291–298.<br />
3. Buyya, R. et al. (2002), “Economic models for resource<br />
management and scheduling in Grid computing”,<br />
Concurrency and Computation: Practice and<br />
Experiences, 14, 1507-1542.<br />
4. Cao, J., et al. (2003), “GridFlow: Workflow<br />
<strong>Management</strong> for Grid Computing”, In Proceedings <strong>of</strong><br />
the 3 rd IEEE/ACM International Symposium on Cluster<br />
Computing and the Grid (CCGRID’03), 0—7695-1919-<br />
9/03.<br />
5. Foster, I. and Kesselman, C. (1998), “<strong>The</strong> Globus<br />
Project: a Status Report”, In Proceedings <strong>of</strong><br />
IPPS/SPDP’98 Workshop on Heterogeneous<br />
Computing, pp. 4–18.<br />
6. Foster, I., Kesselman, C., Nick, J., and Tuecke, S.<br />
(2002), “Grid Services for Distributed<br />
System Integration”, Computer, 35(6):37–46.<br />
7. Foster, I. (1998), Computational Grids, pp. 15–52, in<br />
[10].<br />
8. Foster, I. (2002), “What Is the Grid? A Three Point<br />
Checklist”, Grid Today, 1(6).<br />
9. Grimshaw, A. (2002), “What is a Grid?”, Grid Today,<br />
1(26).<br />
Krauter, K., Buyya, R., and Maheswaran, M. (2002),<br />
“A taxonomy and survey <strong>of</strong> grid<br />
resource management systems for distributed<br />
computing. Int. J. <strong>of</strong> S<strong>of</strong>tware Practice<br />
and Experience, 32(2):135–164.<br />
10. Glasgow, B. 2003, “Information Technology Insights:<br />
Grid Computing Moves Into the Next Wave,” Chemical<br />
Market Reporter; Dec 22-Dec 29, 2003; 264, 22;<br />
ABI/INFORM Global pg. 17.<br />
11. Lyster, P., Bergman, L., Li, P., Stanfill, D., Crippe, B.,<br />
Blom, R., and Okaya, D. (1992),<br />
“CASA Gigabit Supercomputing Network:<br />
CALCRUST Three-Dimensional Real-<br />
Time Multi-Dataset Rendering”, In Proc.<br />
Supercomputing’92, Minneapolis.<br />
12. Schick, S. (2005), “Canadian grid computing project<br />
finds place in ATLAS”, Computing Canada; Sep 9, 31,<br />
12; ABI/INFORM Global pg. 10.<br />
Web sources:<br />
1. Liberated from Light Reading by Rick Thompson<br />
2. Characterizing Grids: Attributes, definitions and<br />
formalisms by N’emethl & Sunderam, EBSCO.<br />
http://www.networkmagazine.com/shared/article/showArticl<br />
e.jhtml?articleId=17602029 ).<br />
3. (www.grid.org)<br />
4. Don LeClair, Managing On-Demand Computing, CA<br />
White Paper, July 14, 2003,<br />
http://whitepapers.informationweek.com/detail/RES/105904<br />
9277_795.html<br />
5. SOA definition at http://www.servicearchitecture.com/web-services/articles/serviceoriented_architecture_soa_definition.html)<br />
6. Don LeClair, Managing On-Demand Computing, CA<br />
White Paper, July 14, 2003,<br />
7. http://whitepapers.informationweek.com/detail/RES/1059<br />
049277_795.html<br />
8. http://www.webopedia.com/TERM/S/SAN.html<br />
9. http://www.webopedia.com/TERM/N/networkattached_storage.html<br />
***<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 23
Solar Power Generation Using ZVT interleaved<br />
Boost Converter<br />
S.Shiny Jasmine<br />
Asst.Pr<strong>of</strong>, EEE, SNS College <strong>of</strong> Technology, Coimbatore.<br />
Abstract: <strong>The</strong> paper proposed is based on the<br />
implementation <strong>of</strong> a photo voltaic(PV) power system with<br />
high voltage gain. For a typical solar-tracking electricity<br />
generation system output voltage is relative low. High<br />
voltage gain is necessary to improve the grid connected<br />
function .<strong>The</strong> proposed PV system employs ZVT Boost<br />
converter with winding coupled inductor which can boost a<br />
low voltage <strong>of</strong> PV array to a high Dc bus voltage . A full<br />
bridge inverter with bidirectional power flow which can<br />
stabilize the dc bus voltage and shape the output current .A<br />
simple MPPT method based on power balance is applied to<br />
reduce the system complexity and cost. A prototype has<br />
been build and tested to verify the theoretical analysis <strong>of</strong> the<br />
paper.<br />
Keyword: PIC µc, ZVT Boost converter,<br />
photocell, Maximum power point<br />
tracking(MPPT)Photo voltaic(PV)system.<br />
I.INTRODUCTION<br />
<strong>The</strong> source <strong>of</strong> conventional energy are limited and<br />
every nation is planning to make an alternative arrangement<br />
to come out <strong>of</strong> the deficiencies <strong>of</strong> energy generating through<br />
depleting conventional sources <strong>of</strong> energy .So emphasis is<br />
given to the renewable energy programmes to keep the<br />
generating capacity upgraded.<br />
Solar energy is the energy that is present in<br />
sunlight. It has been used for thousands <strong>of</strong> years in many<br />
different ways by people all over the world. As well as its<br />
traditional human uses are heating, cooking, and drying, it is<br />
used today to generate electricity where other power<br />
supplies are absent, such as in remote places and in space. It<br />
is becoming cheaper to generate electricity from solar<br />
energy and in many ways it is competitive with other<br />
sources <strong>of</strong> energy like coal or oil.<br />
A solar tracker is a device for orienting a day lighting<br />
reflector, solar photovoltaic panel or concentrating solar<br />
reflector or lens toward the sun. <strong>The</strong> sun's position in the sky<br />
changes with the season and time <strong>of</strong> day as the sun moves<br />
across the sky. Solar powered equipment works best when<br />
pointed at or near the sun, so a solar tracker can increase the<br />
effectiveness <strong>of</strong> such equipment over any fixed position, at<br />
the cost <strong>of</strong> additional system complexity.<br />
In remote areas the sun is a cheap source <strong>of</strong> electricity<br />
because instead <strong>of</strong> hydraulic generators solar cells can be<br />
used to generate electricity. While the output <strong>of</strong> solar cells<br />
depends on the intensity <strong>of</strong> sunlight .<br />
PV cell is achieved rapidly by development <strong>of</strong><br />
semiconductor. Also, price <strong>of</strong> solar cell is descending<br />
continuously. <strong>The</strong>refore, photovoltaic system is a very<br />
important alternative energy and increasing constantly.<br />
<strong>The</strong>re are three methods for increasing the efficiency <strong>of</strong><br />
photovoltaic system.<br />
Increasing efficiency <strong>of</strong> PV cell, it becomes more cost.<br />
Efficiency <strong>of</strong> converter.<br />
Tracking the solar path to increase the use <strong>of</strong> solar<br />
energy.<br />
Increasing the efficiency <strong>of</strong> the converter is proposed in<br />
this paper. Efficiency <strong>of</strong> the converter is achieved by using<br />
a ZVT interleaved boost converter with winding coupled<br />
inductor.<br />
II.STEADY STATE MODEL OF<br />
ZVT-INTERLEAVED BOOST CONVERTER<br />
Fig1.Shows the ZVT interleaved boost converter with<br />
winding coupled inductor. <strong>The</strong> winding coupled inductor<br />
Offer the voltage gain extension [1]-[4]<strong>The</strong> active clamp<br />
circuits gives the ZVT commutation for the main switches<br />
and the auxiliary switches.S 1 and S 2 are the main switchers<br />
S c1 and S c2 are the active clamp switches. D 1 and D 2 are the<br />
output diodes. <strong>The</strong> coupling method <strong>of</strong> the winding inductor<br />
is marked by open circle and asterisks .<strong>The</strong> equivalent<br />
circuit model is shown in fig2 where L 1 and L 2 are the<br />
magnetizing inductor.L k1 and L k2 are the leakage inductance.<br />
C 1 and C 2 are the clamped capacitors. N is the turns ratio<br />
n 2/ n 1.<br />
Fig. 1 ZVT interleaved boost converter<br />
Fig. 2 Equivalent circuit <strong>of</strong> ZVT interleaved boost converter<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 24
Fig.3 Proposed PV power system<br />
ZVT converter has three following advantages.<br />
(i) Voltage gain is increased by using proper turn ratio .As<br />
the turn ratio increases, the voltage gain increases without<br />
the extreme duty ratio,which can reduce the input and output<br />
current ripples. <strong>The</strong> voltage gain is given by<br />
M=V out /V in =N+1/1-D (1)<br />
(ii)Voltage stress <strong>of</strong> the main switches is reduced,as the turn<br />
ratio increases. <strong>The</strong>refore low voltage and high performance<br />
device can be used to reduce the switching and conduction<br />
losses .And the voltage spikes are clamped effectively and<br />
the leakage energy is recovered .<strong>The</strong> voltage stress <strong>of</strong> the<br />
main switches are given by<br />
V ds =V out /N+1 (2)<br />
(iii)ZVT s<strong>of</strong>t switching is achieved for both main switches<br />
and auxiliary switches during the whole switching transition<br />
which means the switching losses are reduce greatly. <strong>The</strong><br />
diode reverse - recovery losses are reduced greatly because<br />
the di/dt <strong>of</strong> the diode current is controlled by the leakage<br />
inductor <strong>of</strong> a coupled boost inductor.<br />
To simplify the calculation, the following conditions are<br />
considered.<br />
(i)<strong>The</strong> clamp capacitance is large enough so the voltage<br />
ripple on the main switches can be ignored and the voltage<br />
V ds is taken as a constant when they turn <strong>of</strong>f.<br />
(ii)<strong>The</strong> magnetizing inductance is much larger than the<br />
leakage inductance so that the magnetizing current I m, the<br />
dead time <strong>of</strong> the main switches and the corresponding<br />
auxiliary switches are ignored.<br />
(iv)<strong>The</strong> two interleaved and inter coupled boost converter<br />
cells are provided with a strict symmetry. Based on the<br />
previous assumptions,the wave forms <strong>of</strong> the converter are<br />
shown in Fig.4<br />
Fig.4 Wave form <strong>of</strong> the converter<br />
From the graph the following approximation are given<br />
∆ If ≈ ∆ Ir ≈∆ I (3)<br />
V Lk1 ≈ V LK2 ≈V LK (4)<br />
<strong>The</strong> equation <strong>of</strong> the output voltage is always true by the<br />
Kirchh<strong>of</strong>f voltage law<br />
V OUT = V ds1 + V o n2 + V * n2 (5)<br />
Where V o n2 and V * n2 respectively, represents the voltage <strong>of</strong><br />
the second winding L 12 the voltage <strong>of</strong> the third winding L 23<br />
Stage(i) Main switch S 1 is <strong>of</strong>f and S 2 is on<br />
Based on the voltage second balance to the magnetizing<br />
inductor , the switching voltage <strong>of</strong> S 1 is given by<br />
V ds1 =V in /1-D (6)<br />
From the wave form we can found that<br />
V LK = V LK1 = L k1 x ∆ If /∆ t1<br />
= L k1 x ∆I/(1D)/F c (7)<br />
As shown in fig. 2 the voltage on the winding coupled<br />
inductors are decided by<br />
V o n1=V L1 =V ds1 -V LK1 (8) V o n2=N xV in<br />
(9) V * n2=Nx(V in -V LK2 ) (10)<br />
Where V n1 represents the voltage <strong>of</strong> the first winding L 11<br />
<strong>The</strong>refore , substituting (6),(9) and (10) in to (5) the<br />
equation <strong>of</strong> the output voltage in stage (i) is obtain as<br />
V out = (N-1) x V ds1 - 2 x N x V LK<br />
=(N+1/1-D)xV in -2xNxL k1 x∆I (11)<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 25
(1-D)/f s<br />
Stage(ii)Main switches S 1 is on and S 2 is on<br />
From the waveform in fig4, it can be found that<br />
64 bytes <strong>of</strong> data EEPROM memory<br />
<strong>The</strong> internal hardware architecture <strong>of</strong> PIC16F84A is<br />
represented by the block diagram shown in the below<br />
figure 5<br />
V ds1 = 0 (12)<br />
V LK = V LK1 = L K1 x ∆ Ir /∆ t2<br />
= L k1 x ∆I/∆ t2 (13)<br />
Considering the polarity <strong>of</strong> the voltage on the winding<br />
coupled inductor in stage (ii), the voltage expression for the<br />
winding coupled inductor can be obtained by<br />
V o n1=V L1<br />
=V LK1 -V in<br />
V o n2=nxV o n1<br />
(14)<br />
(15)<br />
V * n2=Nx(V LK2 +V in ) (16)<br />
<strong>The</strong>refore substituting (12), (15) and (16) in to (5) we can<br />
obtain the output voltage <strong>of</strong> stage b<br />
V OUT = 2x N x V LK<br />
=2 x L K1 x ∆I/∆ t2 (17)<br />
<strong>The</strong> charge through the two output diodes in one switching<br />
period can be decided by<br />
Q 1 =2 QD1 =(∆ t1 +∆ t2 )x∆I/N (18)<br />
Change through the load in one switching period is<br />
Q 2 =( V out /R )x (1/f s ) (19)<br />
<strong>The</strong>refore the charge conservation equation can be found<br />
that<br />
(∆ t1 + ∆ t2 ) x ∆I/N<br />
=( V ou t /R) x( 1/f s ) (20)<br />
<strong>The</strong>refore , the (11),(17) and (20) can be solved to obtain<br />
the expression for the steady state model <strong>of</strong> the converter.<br />
M =V out /V in<br />
All the blocks <strong>of</strong> figure. 5 are main bits <strong>of</strong><br />
hardware and the lines that connect them are called<br />
buses. <strong>The</strong>se buses are basically small parallel lines<br />
along which data can be passed simultaneously from<br />
one hardware block to the other. <strong>The</strong> number besides each<br />
bus indicates the number <strong>of</strong> lines present within that bus,<br />
denoting the bits that can be sent along these buses.<br />
IV. FULL- BRIDGE INVERTER.<br />
<strong>The</strong> full bridge inverter shown in fig.6 is a<br />
voltage source inverter. It has the capability to force the<br />
instantaneous load current to accurately follow the<br />
sinusoidal reference ,which synchronizes with the utility<br />
grid voltage. And the high power factor the low THD and<br />
the fast dynamic response are achieved. <strong>The</strong> bidirectional<br />
power flow facilitates the compensation <strong>of</strong> the Dc bus and<br />
the Ac side voltage variation.<br />
=(N+1)√ [(1-D)R] 2 +8N 2 f s L k1 R - (1-D)R<br />
4N 2 x f s x L k<br />
Where Lk is the equivalent leakage inductance <strong>of</strong> the<br />
winding coupled inductor ,and<br />
Lk = Lk1=Lk2, and R is the equivalent load <strong>of</strong> the<br />
converter.<br />
III. PIC16F84A ARCH<strong>IT</strong>ECTURE<br />
<strong>The</strong>re are three types <strong>of</strong> PIC16F84A packaging designs<br />
available in the market PDIP (18-Lead Plastic Dual Inline),<br />
SOIP (18-Lead Plastic Small Outline), SSOP (20-<br />
Lead Plastic Shrink Small Outline). PDIP type packaging<br />
will be used for the solar tracker embedded design.<br />
Figure 3 illustrates the PIC16F84A PDIP [11] and shows<br />
the name and pin positions [7,12]. <strong>The</strong> PDIP has three key<br />
features that satisfy the objective. <strong>The</strong>se are [13,14]<br />
8-bit multi channel analog to digital Converter<br />
13 input/output pin<br />
Full bridge inverter<br />
Fig.6<br />
<strong>The</strong> inverter can deliver and accept both real and reactive<br />
power .<strong>The</strong> inverter has two legs .Each leg consist <strong>of</strong> two<br />
power control devices .<strong>The</strong> load is connected between the<br />
mid point <strong>of</strong> the two phase legs. Each power control devices<br />
has a diode connected in anti parallel to it .This diodes<br />
provides an alternate path for load current if the power<br />
switches are turn <strong>of</strong>f. For example if the lower IGBT in the<br />
left leg is conducting and carrying current towards the<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 26
negative DC bus ,this current would commutate into the<br />
diode across the upper IGBT <strong>of</strong> the left leg ,if the lower<br />
IGBT is turned <strong>of</strong>f .Control <strong>of</strong> circuit is accomplished by<br />
varying the turn on time <strong>of</strong> the upper and lower IGBT <strong>of</strong><br />
each inverter leg ,with the provision <strong>of</strong> never turning on<br />
both at the same time ,to avoid a short circuit <strong>of</strong> the DC bus<br />
.In fact the modern drives does not allow this to happen<br />
even if the controller would erroneously command both<br />
controller devices to be turned on .<strong>The</strong> controller will<br />
therefore alternate the turn<br />
on command for the upper and lower switch .ie turn the<br />
upper switch on and the lower switch <strong>of</strong>f and vice versa<br />
.<strong>The</strong> drive circuit should add some additional blanking time<br />
(typically 500-1000ns) during the switch transitions to avoid<br />
any over lap in the condition intervals.<br />
<strong>The</strong> controller will control the duty cycle <strong>of</strong><br />
the conduction phase <strong>of</strong> the switches .<strong>The</strong> average potential<br />
<strong>of</strong> the centre point <strong>of</strong> each leg will be given by the DC bus<br />
voltage multiplied by the duty cycle <strong>of</strong> the upper switches ,if<br />
the negative side <strong>of</strong> the DC bus is used as a reference. If<br />
this duty cycle is modulated with a sinusoidal signal with a<br />
frequency much smaller than the switching frequency the<br />
short term average <strong>of</strong> the centre point potential will follow<br />
the modulation signal<br />
For a single phase inverter<br />
the modulation <strong>of</strong> the two legs are inverse <strong>of</strong> each other<br />
such that if the left leg has a large duty cycle for the upper<br />
switch , the right leg has a small one .<strong>The</strong> frequency ,wave<br />
shape and the amplitude <strong>of</strong> the inverter out put voltage can<br />
be controlled as long as the switching frequency is at least<br />
25 to 100 times higher than the fundamental output<br />
frequency <strong>of</strong> the inverter .<strong>The</strong> actual generation <strong>of</strong> PWM<br />
signals is done using microcontroller Fig 8 shows the<br />
control block diagram <strong>of</strong> photovoltaic power system .<br />
Solar panel<br />
Fig.8<br />
However, solar-thermal panels are still in<br />
production, and are common in portions <strong>of</strong> the world where<br />
energy costs, and solar energy availability, are high.<br />
Recently there has been a surge toward large scale<br />
production <strong>of</strong> PV modules. <strong>The</strong> largest solar panel in the<br />
world is under construction in the south <strong>of</strong> Portugal. A<br />
52,000 photovoltaic module, 11-megawatt facility covering<br />
a 60- hectare<br />
VI. MAXIMUM POWER POINT TRACKER (MPPT)<br />
MPPT solutions are developed to ensure the<br />
optimum utilization <strong>of</strong> PV module[8],[11].<strong>The</strong><br />
implementation generally involves sensing the output<br />
current and voltage <strong>of</strong> PV modules. Such realizations are are<br />
costly and complex.<br />
This paper presents a simple maximum power point<br />
tracker (or MPPT) that presents an optimal electrical load to<br />
a solar panel or array and produces a voltage suitable for the<br />
load.PV cells have a single operating point where the values<br />
<strong>of</strong> the current (I) and Voltage (V) <strong>of</strong> the cell result in a<br />
maximum power output. <strong>The</strong>se values correspond to a<br />
particular resistance, which is equal to V/I as specified by<br />
Ohm's Law. A PV cell has an exponential relationship<br />
between current and voltage, and the maximum power point<br />
(MPP) will occurs .where the resistance is equal to the<br />
negative <strong>of</strong> the differential resistance (V/I = -dV/dI).<br />
Maximum power point trackers utilize some type <strong>of</strong> control<br />
circuit or logic to search for this point and thus to allow the<br />
converter circuit to extract the maximum power available<br />
from a cell. MPPT increases the total power harvested by<br />
50%<br />
VII . EXPERIMENTAL RESULTS<br />
Simulation result.<br />
Fig.7 Control block diagram <strong>of</strong> PV power system<br />
V. SOLAR PANEL<br />
Fig.9 shows the experimental results <strong>of</strong> the ZVT interleaved<br />
boost converter when the input voltage is 38-50V and the<br />
out put voltage is 380v<br />
Solar panel is refer to a photovoltaic module which is<br />
an assembly <strong>of</strong> solar cells used to generate electricity. In all<br />
cases, the panels are typically flat, and are available in<br />
various heights and widths An array is an assembly <strong>of</strong> solarthermal<br />
panels or photovoltaic (PV) modules; the panels can<br />
be connected either in parallel or series depending upon the<br />
design objective. Solar panels typically find use in<br />
residential, commercial, institutional, and light industrial<br />
applications.<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 27
[4] K. C. Tseng and T. J. Liang, “Novel high-efficiency<br />
step-up converter,”<br />
IEE Electr. Power Appl., vol. 151, no. 2, pp. 182–190, Mar.<br />
2004.6<br />
[5] F. C. Lee, S. Wang, P. Kong, C. Wang, and D. Fu,<br />
“Power architecture<br />
Fig 9 Simulation result <strong>of</strong> the proposed system<br />
Hard ware designed<br />
design with improved system efficiency, EMI and power<br />
density,” in Proc.<br />
IEEE PESC Conf., 2008, pp. 4131–4137.<br />
[6] A. Bellini, S. Bifaretti, and V. Iacovone, “Resonant<br />
DC–DC converters<br />
for photovoltaic energy generation systems,” in Proc. IEEE<br />
SPEEDAM<br />
Conf., 2008, pp. 815–820.<br />
[7]. Microcomputer Control <strong>of</strong> a Residential Photovoltaic<br />
Power Condictioning System”<br />
B.K. Bose, P.M. Szczesny and R.L. Steigerwald, IEEE<br />
Trans. on Industry Applications, vol. IA-21, no. 5,Sep.<br />
1985, ppll82-1191.<br />
[8]. .D. P. Hohm, M. E. Ropp,“Comparative Study <strong>of</strong><br />
Maximum Power Point Tracking Algorithms Using an<br />
Experimental, Programmable, Maximum Power Point<br />
Tracking Test Bed”,IEEE,2000.pp.1699-1702.<br />
Fig12.Photograph <strong>of</strong> prototype<br />
VIII .CONCLUSION<br />
<strong>The</strong> paper proposed a photovoltaic power system<br />
with high voltage gain .<strong>The</strong> proposed PV system employs a<br />
high step up ZVT- interleaved boost converter with winding<br />
coupled inductors .A full bridge inverter with bidirectional<br />
power flow is used to stabilize the DC bus voltage and shape<br />
the output current .Further more a simple MPPT solution is<br />
applied in the PV system and a good performance is<br />
obtained.<br />
REFERENCES<br />
[1]W. Li and X. He, “ZVT interleaved boost converters for<br />
high-efficiency,<br />
high step-up DC/DC conversion,” IET Electr. Power Appl.,<br />
vol. 1, no. 2,<br />
pp. 284–290, Mar. 2007.<br />
[2]Q. Zhao and F. C. Lee, “High-efficiency, high stepupDC–DC<br />
converters,”<br />
IEEE Trans. Power Electron., vol. 18, no. 1, pp. 65–73, Jan.<br />
2003.<br />
[3] R. J.Wai and R. Y. Duan, “High step-up converter with<br />
coupled-inductor,”<br />
IEEE Trans. Power Electron., vol. 20, no. 5, pp. 1025–1035,<br />
Sep. 2005.<br />
[9]. SteveHeckeroth. Solar is the Solution,<br />
2008.http://www.motherearthnews.com/Renewable-<br />
Energy/2007-12-01/Solar-is-the-Solution.aspx (accessed<br />
Dec 20, 2008).<br />
[10]. J. Rizk, and Y. Chaiko. (2008). Solar Tracking System:<br />
More Efficient Use <strong>of</strong> Solar Panels. Proceedings <strong>of</strong><br />
World Academy <strong>of</strong> <strong>Science</strong>, Engineering and Technology,<br />
2-3<br />
[11]. Gay, CF and Wilson, JH and Yerkes, JW.<br />
"Performance advantages <strong>of</strong> two-axis tracking for large flatplate<br />
photovoltaic energy systems." 1982, Conf. Rec. IEEE<br />
Photovoltaic Spec.<br />
[12]. Iovine, John. (2000). PIC Microcontroller Project<br />
Book, 1st edition. Ch. 3, pg 35. McGraw-Hill.<br />
[13]. Ibrahim, Dogan. (2006).PIC Basic Projects: 30<br />
Projects Using PIC BASIC and PIC BASIC PRO, Ch. 2, pg<br />
14-16. Elsevier<br />
[14] Inoue, Seiichi. Hardware <strong>of</strong> the PIC16F84A,<br />
2008.http://www.interq.or.jp/japan/seinoue/e_pic2.htm<br />
accessed Jan 12, 2009.<br />
[15]. Microchip Technology Incorporated (2001).<br />
PIC16F84A, 18-pin Enhanced FLASH/EEPROM 8-Bit<br />
Microcontroller, PIC16F84A Data Sheet<br />
[16]. Inoue, Seiichi. Hardware <strong>of</strong> the PIC16F84A, 2008.<br />
http://www.interq.or.jp/japan/se-inoue/e_pic2.htm<br />
(accessed Feb 2, 2009<br />
[17]. Mohan, N (1995). Electronics Converters,<br />
Applications and Design, 2 nd Edition, John Wiley.<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 28
Vendor Relationship <strong>Management</strong> strategy<br />
development Process for Automobile Industry to<br />
reduce the cost <strong>of</strong> quality<br />
S.N.Teli<br />
Associate Pr<strong>of</strong>essor & HOD -Mech. Engg. Dept., SCOE, Kharghar, NaviMumbai<br />
Dr.V.S.Majali<br />
Pr<strong>of</strong>essor & HOD – Mech. Engg.Dept. , G<strong>IT</strong>, Belgaum<br />
Dr.U.M.Bhushi<br />
Principal - Sahyadri College <strong>of</strong> Mangalore Engineering & <strong>Management</strong>, Mangalore<br />
Kalyan Kumar Hatti<br />
AGM (PD) - Ashok Leyland, Chennai<br />
Abstract:<br />
Vendors play a key role in the success <strong>of</strong> your business<br />
irrespective <strong>of</strong> the sphere <strong>of</strong> business. <strong>The</strong> following vendor<br />
management practices build a mutually strong relationship<br />
with your vendor which in turn strengthens your company's<br />
overall performance in the marketplace. Ignoring these<br />
sound vendor management principles will result in a<br />
dysfunctional relationship that will have the potential to<br />
negatively impact your business. <strong>The</strong> time, money and<br />
energy used to nurture a positive vendor relationship cannot<br />
be measured directly against the company's bottom line.<br />
However, a well managed vendor relationship will result in<br />
increased customer satisfaction, reduced costs, better<br />
quality, and better service from the vendor. When and if<br />
problems arise, rest assured that a well managed vendor<br />
will be quick to remedy the situation. Successful vendorvendee<br />
relationship is viewed as an important ingredient for<br />
maintaining competitiveness in the current marketplace.<br />
This calls for a careful and comprehensive approach in<br />
selecting vendors.<br />
Keywords—Vendor Relationship <strong>Management</strong>, Customer<br />
Satisfaction, cost <strong>of</strong> quality<br />
I Introduction<br />
1. <strong>The</strong> Successful Vendor Selection Process<br />
<strong>The</strong> vendor selection process can be a very complicated and<br />
emotionally undertaking if you don't know how to approach<br />
it from the very start. Here are five steps to help you select<br />
the right vendor for your business. This guide will show you<br />
how to analyze your business requirements, search for<br />
prospective vendors, lead the team in selecting the winning<br />
vendor and provide you with insight on contract<br />
negotiations and avoiding negotiation mistakes.<br />
1.1Analyze the Business Requirements: Before you begin<br />
to gather data or perform interviews, assemble a team <strong>of</strong><br />
people who have a vested interest in this particular vendor<br />
selection process. <strong>The</strong> first task that the vendor selection<br />
team needs accomplish is to define, in writing, the product,<br />
material or service that you are searching for a vendor. Next<br />
define the technical and business requirements. Also, define<br />
the vendor requirements.<br />
Finally, publish your document to the areas relevant to this<br />
vendor selection process and seek their input. Have the team<br />
analyze the comments and create a final document. In<br />
summary:<br />
Assemble an Evaluation Team<br />
Define the Product, Material or Service<br />
Define the Technical and Business Requirements<br />
Define the Vendor Requirements<br />
Publish a Requirements Document for Approval<br />
1.2 Vendor Search :Now that you have agreement on the<br />
business and vendor requirements, the team now must start<br />
to search for possible vendors that will be able to deliver the<br />
material, product or service. <strong>The</strong> larger the scope <strong>of</strong> the<br />
vendor selection process the more vendors you should put<br />
on the table. Of course, not all vendors will meet your<br />
minimum requirements and the team will have to decide<br />
which vendors you will seek more information from. Next<br />
write a Request for Information (RFI) and send it to the<br />
selected vendors. Finally, evaluate their responses and select<br />
a small number <strong>of</strong> vendors that will make the "Short List"<br />
and move on to the next round. In summary:<br />
Compile a List <strong>of</strong> Possible Vendors<br />
Select Vendors to Request More Information From<br />
<br />
<br />
Write a Request for Information (RFI)<br />
Evaluate Responses and Create a "Short List" <strong>of</strong><br />
Vendors<br />
1.3 Request for Proposal (RFP) and Request for<br />
Quotation (RFQ): <strong>The</strong> business requirements are<br />
defined and you have a short list <strong>of</strong> vendors that you want to<br />
evaluate. It is now time to write a Request for Proposal or<br />
Request for Quotation. Whichever format you decide, your<br />
RFP or RFQ should contain the following sections:<br />
Submission Details<br />
Introduction and Executive Summary<br />
Business Overview & Background<br />
Detailed Specifications<br />
Assumptions & Constraints<br />
Terms and Conditions<br />
Selection Criteria<br />
1.4 Proposal Evaluation and Vendor Selection: <strong>The</strong> main<br />
objective <strong>of</strong> this phase is to minimize human emotion and<br />
political positioning in order to arrive at a decision that is in<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 29
the best interest <strong>of</strong> the company. Be thorough in your<br />
investigation, seek input from all stakeholders and use the<br />
following methodology to lead the team to a unified vendor<br />
selection decision:<br />
Preliminary Review <strong>of</strong> All Vendor Proposals<br />
Record Business Requirements and Vendor<br />
Requirements<br />
Assign Importance Value for Each Requirement<br />
Assign a Performance Value for Each Requirement<br />
Calculate a Total Performance Score<br />
Select a the Winning Vendor<br />
1.5 Contract Negotiation Strategies: <strong>The</strong> final stage in the<br />
vendor selection process is developing a contract negotiation<br />
strategy. Remember, you want to "partner" with your vendor<br />
and not "take them to the cleaners." Review your objectives<br />
for your contract negotiation and plan for the negotiations<br />
are covering the following items:<br />
List Rank Your Priorities Along With Alternatives<br />
Know the Difference Between What You Need and<br />
What You Want<br />
Know Your Bottom Line So You Know When to Walk<br />
Away<br />
Define Any Time Constraints and Benchmarks<br />
Assess Potential Liabilities and Risks<br />
Confidentiality, non-compete, dispute resolution,<br />
changes in requirements<br />
Do the Same for Your Vendor (i.e. Walk a Mile in<br />
<strong>The</strong>ir Shoes)<br />
1.6 Contract Negotiation Mistakes: <strong>The</strong> smallest mistake<br />
can kill an otherwise productive contract negotiation<br />
process. Avoid the following ten contract negotiation<br />
mistakes to protect jeopardizing an otherwise productive<br />
contract negotiation process.<br />
2. Ten Mistakes to Avoid In <strong>The</strong> Contract Negotiation<br />
Process<br />
<strong>The</strong>se contract negotiation mistakes should be avoided so<br />
that you and your vendor will come to an agreement that<br />
will benefit both parties.<br />
2.1 Thinking the Yard is fenced In: Don't assume that<br />
only a certain subset <strong>of</strong> resources or conditions can be<br />
negotiated. <strong>The</strong> sky is the limit and finding creative and<br />
original alternatives that can benefit both parties will result<br />
in a better negotiated contract. Do not propose ridiculous or<br />
insulting alternatives that will destroy your sincerity and<br />
integrity.<br />
2.2 Failure to Study Your Opponent: Too many people<br />
approach contract negotiation process with an egotistic<br />
mentality. <strong>The</strong>y fail to research the vendor that they will be<br />
negotiating with. <strong>The</strong>y don’t understand the vendor's market<br />
and what other influences control their environment. <strong>The</strong><br />
larger the contract, the more time you should spend on this.<br />
2.3 Too Aggressive: You need to be certain that your<br />
company's interests are at the forefront <strong>of</strong> your priorities but<br />
at the same time you need to be mindful and sensitive<br />
regarding the person representing the vendor. Aggressive<br />
discussions will only succeed in raising the vendor’s<br />
defensive mechanisms and negotiations will turn out to be<br />
fruitless.<br />
2.4 It's All About Price: Of course nobody wants to pay<br />
too much for their goods and services, but there is a lot more<br />
on the table than just money. Look for alternatives that are<br />
high on your priority list and low on the vendors. <strong>The</strong>n you<br />
both win.<br />
2.5 Jumping Too Quick: No matter how low the opening<br />
price is, <strong>of</strong>fer lower or ask for something more. If you jump<br />
too quickly at the first <strong>of</strong>fer, the vendor will feel like they<br />
made a stupid mistake.<br />
2.6 Don't Gloat: When you do end up striking a fantastic<br />
deal in your favor, don't embarrass the vendor by saying<br />
something that will give you an ego-trip at his/her expense.<br />
Not only is this unpr<strong>of</strong>essional, but the vendor may then<br />
look for loop-holes in the contract to regain some money<br />
and pride.<br />
2.7 Terminology Not Defined or Understood: Don't<br />
assume that everyone who will read the contract will<br />
understand every technical term or complicated provision.<br />
Insist that every area <strong>of</strong> the contract that has the possibility<br />
<strong>of</strong> being misunderstood is clearly defined.<br />
2.8 Inconsistencies within the Contract: Look for<br />
inconsistencies within the contract that can come back to<br />
haunt you in some form <strong>of</strong> arbitration. If necessary, have a<br />
third party review the contract in order to uncover any<br />
inconsistencies.<br />
2.9 Concern in One Area Will be Overridden by Another<br />
Area: Do not assume that a perceived weakness or<br />
apprehension in one area <strong>of</strong> the contract can be compensated<br />
by strength in another area. Be specific and direct in all<br />
areas. Once the contract is contested in a court <strong>of</strong> law, all<br />
control is removed from your hands.<br />
2.10 Avoid Redundancies: Stating the same thing twice in<br />
different section <strong>of</strong> the contract will not reinforce their<br />
value. In most instances lawyers and the courts will come up<br />
with a reason to differentiate and justify both areas; usually<br />
with an interpretation that neither party anticipated.<br />
II Methodology<br />
3. Vendor <strong>Management</strong> Success Tips:<br />
Strategies to Strengthen Vendor Relations<br />
Vendor management allows you to build a relationship with<br />
your suppliers and service providers that will strengthen<br />
both businesses. Vendor management is not negotiating the<br />
lowest price possible. Vendor management is constantly<br />
working with your vendors to come to agreements that will<br />
mutually benefit both companies.<br />
3.1 Share Information and Priorities: <strong>The</strong> most important<br />
success factor <strong>of</strong> vendor management is to share information<br />
and priorities with your vendors. That does not mean that<br />
you throw open the accounting books and give them user<br />
IDs and passwords to your systems. Appropriate vendor<br />
management practices provide only the necessary<br />
information at the right time that will allow a vendor to<br />
better service your needs. This may include limited forecast<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 30
information, new product launches, changes in design and<br />
expansion or relocation changes, just to name a few.<br />
3.2 Balance Commitment and Competition: One <strong>of</strong> the<br />
goals in vendor management is to gain the commitment <strong>of</strong><br />
your vendors to assist and support the operations <strong>of</strong> your<br />
business. On-the-other-hand, the vendor is expecting a<br />
certain level <strong>of</strong> commitment from you. This does not mean<br />
that you should blindly accept the prices they provide.<br />
3.3 Allow Key Vendors to Help You Strategize: If a<br />
vendor supplies a key part or service to your operation,<br />
invite that vendor to strategic meetings that involve the<br />
product they work with. Remember, you brought in the<br />
vendor because they could make the product or service<br />
better and/or cheaper than you could. <strong>The</strong>y are the experts in<br />
that area and you can tap into that expertise in order to give<br />
you a competitive advantage.<br />
3.4 Build Partnerships for the Long Term: Vendor<br />
management seeks long term relationships over short term<br />
gains and marginal cost savings. Constantly changing<br />
vendors in order to save a penny here or there will cost more<br />
money in the long run and will impact quality. Other<br />
benefits <strong>of</strong> a long term relationship include trust, preferential<br />
treatment and access to insider or expert knowledge.<br />
3.4 Seek to Understand Your Vendor's Business Too:<br />
Remember, your vendor is in business to make money too.<br />
If you are constantly leaning on them to cut costs, either<br />
quality will suffer or they will go out <strong>of</strong> business. Part <strong>of</strong><br />
vendor management is to contribute knowledge or resources<br />
that may help the vendor better serve you. Asking questions<br />
<strong>of</strong> your vendors will help you understand their side <strong>of</strong> the<br />
business and build a better relationship between the two <strong>of</strong><br />
you.<br />
3.5 Negotiate to a Win-Win Agreement: Good vendor<br />
management dictates that negotiations are completed in<br />
good faith. Look for negotiation points that can help both<br />
sides accomplish their goals. A strong-arm negotiation tactic<br />
will only work for so long before one party walks away<br />
from the deal.<br />
3.6 Come Together on Value: Vendor management is more<br />
than getting the lowest price. Most <strong>of</strong>ten the lowest price<br />
also brings the lowest quality. Vendor management will<br />
focus quality for the money that is paid. In other words:<br />
value! You should be willing to pay more in order to receive<br />
better quality. If the vendor is serious about the quality they<br />
deliver, they won't have a problem specifying the quality<br />
details in the contract.<br />
4. Vendor <strong>Management</strong> Best Practices<br />
Whether you're a multimillion dollar company or a small<br />
business with a few employees, here are some Vendor<br />
<strong>Management</strong> Best Practices that any size business can use.<br />
4.1 Vendor Selection: <strong>The</strong> vendor management process<br />
begins by selecting the right vendor for the right reasons.<br />
You will need to analyze your business requirements, search<br />
for prospective vendors, lead the team in selecting the<br />
winning vendor and successfully negotiate a contract while<br />
avoiding contract negotiation mistakes.<br />
4.2 Scrutinize the Prospects: Once you start to look at<br />
individual vendors, be careful that you don't get blinded by<br />
the deceptive <strong>of</strong>fers. Depending upon the size <strong>of</strong> the<br />
possible contract, they will pull out all the stops in order to<br />
get your business. This may include a barrage <strong>of</strong><br />
overzealous salespeople and consultants. Just because they<br />
send a lot <strong>of</strong> people in the beginning, doesn't mean they will<br />
be there after the contract is signed.<br />
As you begin your vendor search, ask some questions that<br />
will help you eliminate the more obvious misfits. For<br />
example, Is the proposed material, service or outsourcing<br />
project within the vendor's area <strong>of</strong> expertise?<br />
4.3 Remain Flexible: Be wary <strong>of</strong> restrictive or exclusive<br />
relationships. For example, limitations with other vendors or<br />
with future customers. In addition, contracts that have<br />
severe penalties for seemingly small incidents should be<br />
avoided. If the vendor asks for an extremely long term<br />
contract, you should ask for a shorter term with a renewal<br />
option. On the other hand, you should be open to the<br />
vendor's requests also. If an issue is small and insignificant<br />
to you but the vendor insists on adding it to the contract you<br />
may choose to bend in this situation. This shows good faith<br />
on your part and your willingness to work towards a<br />
contract that is mutually beneficial to both parties.<br />
4.4 Monitor Performance: Once the relationship with the<br />
vendor has begun, don't assume that everything will go<br />
according to plan and executed exactly as specified in the<br />
contract. <strong>The</strong> vendor's performance must be monitored<br />
constantly in the beginning. This should include the<br />
requirements that are most critical to your business. For<br />
example: shipping times, quality <strong>of</strong> service performed, order<br />
completion, call answer time, etc.<br />
4.5 Communicate Constantly: <strong>The</strong> bottom line in vendor<br />
management best practices is: communication. Don't assume<br />
that the vendor intimately knows your business or can read<br />
your mind. A well established and well maintained line <strong>of</strong><br />
communication will avoid misunderstandings and<br />
proactively address issues before they become problems.<br />
5. Choose Your Vendors Wisely:<br />
Your vendors have as much interest in your company's<br />
success as you do. When you make a lot <strong>of</strong> sales, they make<br />
a lot <strong>of</strong> sales; when you get paid, they get paid. Having<br />
reliable and trustworthy vendors can help your business<br />
succeed, just as dealing with unreliable or shady firms can<br />
cause major setbacks. Start by asking around; other business<br />
owners in your area can be a great source <strong>of</strong> information.<br />
Once you've got a list <strong>of</strong> names, call your local Better<br />
Business Bureau to find out whether any complaints have<br />
been filed against any <strong>of</strong> the vendors on your list. You can<br />
visit vendor Web sites and even tour their physical<br />
locations. You can ask for customer testimonials and for<br />
product samples as well. <strong>The</strong> key is to get as much<br />
information as possible before you make a large monetary<br />
commitment to a vendor you don't know.<br />
As you begin to choose vendors, particularly those who will<br />
stock your inventory, try to think <strong>of</strong> them as business<br />
partners. You want to choose the ones with whom your<br />
company can develop a long-term, mutually pr<strong>of</strong>itable<br />
relationship, and that relationship starts with your first<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 31
equest for a price quote. Don't be afraid to ask vendors for<br />
quotes; they're used to it and they probably expect it. After<br />
all, this is a major purchase, and it's never wise to make a<br />
major purchase without shopping around — especially when<br />
you're going to a vendor you've never dealt with before. If<br />
you're having a hard time finding vendors, and an even<br />
harder time finding information about them, you can run<br />
your own test by placing a very small order, under $100 in<br />
total value. If that process goes well, take it up a notch and<br />
place a slightly larger order the next time. Once you feel<br />
comfortable with the vendor, you can place your full-blown<br />
orders without worry.<br />
5.1 Getting Quotes: When you want to make a big purchase<br />
for your business, you need to know the total cost upfront.<br />
To get that information, you need to ask the people who sell<br />
whatever it is you want to buy. In order for that information<br />
to be fixed (as opposed to changeable), it's best to get it in<br />
writing. When your company is buying a product, that<br />
information will come in the form <strong>of</strong> a quote; when it's<br />
services you're after, the quote is usually referred to as an<br />
estimate.<br />
<strong>The</strong> best way to get a quote is to talk with a salesperson;<br />
quote requests that come by mail are <strong>of</strong>ten ignored. Phone<br />
contact is fine, especially after you've begun to build a<br />
relationship with that vendor or salesman. For your first<br />
time out, though, a face-to-face meeting could prove more<br />
fruitful, especially if you're spending a significant sum.<br />
Even though salesmen themselves are seldom involved in<br />
setting company pricing policy, they <strong>of</strong>ten have some<br />
leeway when it comes to closing a deal. When you establish<br />
a personal connection with a salesman, he'll work harder<br />
with you and for you; after all, making a sale to you is his<br />
bread and butter. Flexible areas <strong>of</strong>ten include lower unit<br />
pricing when you buy in bulk, and better credit terms.<br />
5.2 Avoid <strong>The</strong>se Vendors: <strong>The</strong>re are some vendors that you<br />
should avoid. If you run across a vendor with one (or more)<br />
<strong>of</strong> the following characteristics, run in another direction:<br />
Accepts cash only<br />
Asks for checks made out to cash<br />
Won't send a brochure or catalog<br />
Won't give you a price quote or estimate in writing<br />
Dirty, disorganized stockroom<br />
No warehouse or storage facility<br />
If one (or more) <strong>of</strong> these factors is the norm in your<br />
industry, and the vendor in question has gotten high marks<br />
from a reliable source, it's probably safe to keep him on your<br />
list. However, if it's the vendor telling you this is normal<br />
practice, and you can't verify that with anyone else, look for<br />
a different vendor.<br />
6. Establishing Good Vendor Relations:<br />
Developing your vendor relations will save you stress and<br />
time, both <strong>of</strong> which you can save for planning more events.<br />
6.1 <strong>The</strong> Vendor Cast <strong>of</strong> Characters: Your vendor list will<br />
vary depending on your field <strong>of</strong> event planning. When<br />
shopping for a vendor, ask other players in the same area for<br />
recommendations. You can also ask the company for<br />
referrals from other clients in the industry. Be sure to call<br />
the company for a full report before you decide to hire a<br />
vendor. As with industries, vendors rely heavily on their<br />
reputations to be successful. You might find yourself<br />
looking for the following vendors when you begin your<br />
career.<br />
Labor companies, which includes electricians,<br />
general contractors, carpenters, and painters<br />
Graphic designer or Web designer<br />
Specialty stationery designer or printing company<br />
6.2 Working with an Existing Vendor List: You may also<br />
find you are entering into a position with an existing vendor<br />
list. Ask your new associates how the relationship between<br />
the company and the vendor has been in the past. When<br />
appropriate, schedule a meeting with the vendor to introduce<br />
yourself. During the meeting you should get an idea <strong>of</strong> the<br />
existing process <strong>of</strong> ordering, delivering, and billing. You<br />
should reserve <strong>of</strong>fering suggestions until you have worked<br />
with the company for a few months<br />
6.3 Creating Goodwill among Your Vendors: If your<br />
goal is to develop a healthy relationship with a vendor, you<br />
must make a conscious effort to show your appreciation.<br />
Here are some suggestions to create goodwill and develop<br />
your vendor relationships.<br />
Offer a drink to your delivery people. Restaurants have<br />
the luxury <strong>of</strong> <strong>of</strong>fering this service to their vendors. If you<br />
are working in an <strong>of</strong>fice, keep c<strong>of</strong>fee, sodas, and bottled<br />
water on hand for company drivers.<br />
Provide vendor meals. Do so not only for your staff but<br />
also for vendors who may be working. This simple act<br />
encourages staff relationships and builds a sense <strong>of</strong><br />
community.<br />
Have a volunteer day. Choose a charity and get your<br />
company, vendors, and staff involved.<br />
Invite vendors to events. When appropriate, put your<br />
vendors on the guest list <strong>of</strong> an event your company is<br />
hosting.<br />
Extend an invitation to company parties. Holiday staff<br />
parties are a great way to integrate vendors into your<br />
company.<br />
7. Repairing a Relationship with a Vendor<br />
It is possible a relationship with a vendor may strain at some<br />
point in your career. You should make every effort to repair<br />
the relationship. Misunderstandings <strong>of</strong>ten occur in the heat<br />
<strong>of</strong> the moment. Tempers and emotions flare at this time<br />
between two otherwise calm people. In this case, an apology<br />
in your thank-you letter may solve this matter.<br />
7.1 Working toward a Solution: In the instance <strong>of</strong> larger<br />
disagreements, the first step to mending the working<br />
relationship is to have a meeting with your vendor. Revisit a<br />
disagreement after a few days have passed, to give both<br />
parties some clarity. Begin the meeting by addressing the<br />
problem, then listen to your vendor's side <strong>of</strong> the story.<br />
Accept your responsibility in the matter and apologize. If<br />
warranted, address any issues you may be having with your<br />
vendor, and hopefully he will return the apology and you<br />
both can continue working together.<br />
7.2 Monetary Issues: If the matter involves a monetary<br />
issue, try and invite a third party to resolve the dispute. <strong>The</strong><br />
third party should be someone you both have worked with<br />
and trust. Another vendor would be good choices for a third<br />
party. If the matter involves a client and a complaint, you<br />
might ask the client how he/she would like the matter<br />
resolved and recommend this to your vendor.<br />
7.3 Knowing When to Walk Away: Sometimes a sour<br />
vendor relationship has passed the point <strong>of</strong> repair. If you<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 32
have followed all the suggested tips for repairing a<br />
relationship, it may be time to walk away. It is best to make<br />
a clean break. Do not embellish or gossip to other vendors.<br />
A vendor can also gossip about his experience working for<br />
you. Make it a practice not to speak negatively about<br />
vendors. Simply stating you used to work with a vendor but<br />
no longer do will speak volumes to a client asking for a<br />
vendor referral.<br />
Conclusion: Although today’s reason for implementing<br />
VRM is mostly driven by cost-savings and efficiency<br />
increase propositions, Substantial improvements in efficacy<br />
and quality in different areas <strong>of</strong> Automobile Industries can<br />
be achieved.<br />
<strong>The</strong> implementation <strong>of</strong> the above mentioned vendor<br />
relationship management practices can boost the vendor<br />
response towards our own company which in turn will make<br />
him a staunch support at dire times <strong>of</strong> need. <strong>The</strong> cost <strong>of</strong><br />
quality (or better phrased as the cost <strong>of</strong> “unquality”) resulted<br />
from imperfections <strong>of</strong> a vendor's incoming input materials is<br />
one component <strong>of</strong> the total costs in the evaluation <strong>of</strong><br />
vendors.<br />
A well managed vendor will prove to be <strong>of</strong> great support<br />
when it comes to customer satisfaction and job shop<br />
productions in terms <strong>of</strong> cost and quality.<br />
In an automobile industry where the competition is<br />
enormous it becomes the need <strong>of</strong> the hour to have<br />
competitive and well managed vendors for developing new<br />
products at a faster pace to have a greater edge amongst the<br />
other major players.<br />
References:<br />
[1] Aberdeen Group. (2004, June). <strong>The</strong> Quiet Revolution in<br />
Vendor <strong>Management</strong> — A Benchmark Study on<br />
HowCompanies Are Communicating with and Monitoring<br />
<strong>The</strong>ir Suppliers. [Online].<br />
Available:http://www.aberdeen.com/summary/report/bench<br />
mark/suppliermgmt.asp.<br />
[2] W. Appelfeller, and W. Buchholz, Supplier Relationship<br />
<strong>Management</strong>: Strategie, Organisation und <strong>IT</strong><br />
desmodernenen Beschaffungsmanagements, Wiesbaden:<br />
Gabler, 2005.<br />
[3] I. Benbasat, D. K. Goldstein, and M. Mead, <strong>The</strong> Case<br />
<strong>Research</strong> Strategy in Studies <strong>of</strong> Information Systems,<br />
MISQuarterly, vol. 11, no. 3, pp. 369-386, 1987.<br />
[4] T. Boland, and A. Fowler, A Systems Perspective <strong>of</strong><br />
Performance <strong>Management</strong> in Public Sector<br />
Organisations,<strong>The</strong> International <strong>Journal</strong> <strong>of</strong> Public Sector<br />
<strong>Management</strong>, vol. 13, no. 5, pp. 417-446, 2000.<br />
[5] M. C. J. Caniëls, and C. J. Gelderman, Power and<br />
Interdependence in Buyer Supplier Relationships:<br />
A Purchasing Portfolio Approach, Industrial Marketing<br />
<strong>Management</strong>, vol. 36, no. 2, pp. 219-229, 2007.<br />
[6] M. G. Christopher, Logistics and Supply Chain<br />
<strong>Management</strong>, London: Pitman Publishing, 1992.<br />
1992.<br />
[7] T. H. Davenport, and J. E. Short, <strong>The</strong> New Industrial<br />
Engineering - Information Technology and Business Process<br />
Redesign, Sloan <strong>Management</strong> Review<br />
[8]F. R. Dwyer, P. H. Schurr, and S. Oh, Developing Buyer-<br />
Seller Relationships, <strong>Journal</strong> <strong>of</strong> Marketing.<br />
[9] European Commission, ICT and e-Business in Hospital<br />
Activities: ICT Adoption and e-Business Activity in<br />
2006,Sector Report No. 10/2006, e Business Watch, Bonn,<br />
Germany, 2006.<br />
***<br />
www.theinternationaljournal.org > RJS<strong>IT</strong>M: Volume: 01, Number: 08, June-2012 Page 33