mobile service provider

Top PDF mobile service provider:

A STUDY OF FACTORS CONSIDERED BY STUDENTS IN PUNE CITY WHILE SELECTING MOBILE SERVICE PROVIDER(MSP)

A STUDY OF FACTORS CONSIDERED BY STUDENTS IN PUNE CITY WHILE SELECTING MOBILE SERVICE PROVIDER(MSP)

In this study factor analysis ( Beri, 2009) was done to find out the important factors which subscribers preferred while selecting mobile service provider. Here by using SPPS the set of attributes (Given in Exhibit 1.1) are reduced into 4 major factors which is mentioned below in the Exhibit 1.2, and each respondent was asked to rate them according to their preferences which they have considered while selecting respective mobile service provider selection decision on a scale of 1 to 5 (1 being the least and 5 being the most important).
Show more

11 Read more

Marketing Capability and the Performance of Mobile Service Provider Intermediary Organizations in Nairobi County, Kenya

Marketing Capability and the Performance of Mobile Service Provider Intermediary Organizations in Nairobi County, Kenya

From the research findings, several policy implications can be drawn to guide the performance of mobile service providers intermediary organisations First, the sales manager need to lobby the management to set aside a training budget to be used in training the sales team to their marketing skills since marketing capability was found to significantly influence performance of the MSP intermediary organisation. Furthermore, the manager need to organise training of the sales team on marketing research skills that will enable them to identify, understand market trends and the need of new products and services that will enhance performance of the MSP intermediary organisation. The sales manager need to ensure training on effective pricing, new product and range extension, channel relationship management and promotions as they form key aspects in sales team marketing capabilities.
Show more

14 Read more

Predictors Of Customer Loyalty To Mobile Service Provider In South Africa

Predictors Of Customer Loyalty To Mobile Service Provider In South Africa

oday’s dynamic and competitive business environment necessitates the need for organisations to create and maintain customer loyalty. Researchers agree that customer loyalty is beneficial because businesses reduce marketing costs, profits increase, loyal customers engage in positive word-of- mouth behaviours, and loyal customers always try new products and make useful suggestions for service improvement (Wallace, Giese & Johson, 2004; Bushoff & Du Plessis, 2009). Therefore, over the years, organisations have focused on achieving customer loyalty and on ascertaining the factors influencing customer loyalty (Han & Ryu, 2009). Literature has shown that satisfying customers positively influences customer trust (Lin & Wang, 2006) and customer loyalty (Hamadi, 2010). According to Lee (2004), customer trust is also crucial as it creates customer loyalty. Customer intimacy is also confirmed as an important factor influencing customer loyalty (Bugel, Verhoel & Buunk, 2011). The loyalty of customers to the retailer also leads to intentions by customers to re- purchase (Kang, Okamoto & Donovan, 2004). This shows that it is the responsibility of mobile phone providers to implement service quality, customer satisfaction, trust and intimacy strategies in order to create and maintain customer loyalty.
Show more

14 Read more

Exploring the Main Factors Affecting Consumer Choice of Mobile Phone Service Provider Contracts

Exploring the Main Factors Affecting Consumer Choice of Mobile Phone Service Provider Contracts

This study aims to investigate the main factors affecting a consumer’s choice of mo- bile phone service provider contracts, and to determine which of these factors are important in a consumer’s decision-making process. As this decision is particularly pertinent within the contractual behavior setting, there is a need to explore the main factors that shape mobile phone subscriber choices when entering into a mobile phone telecommunication service contract. To do so, a set of mobile interrelated contract dimensions and a set of mobile service provider interrelated dimensions were identified and tested. The convenience sampling technique was employed and 400 questionnaires were distributed to mobile phone subscribers in Jordan with a response rate of 78.5%. By using the regression analysis, result analysis revealed that the main factor affecting consumer choices was “contract features”, with a relative importance of 41%. After a set of mobile phone contract hypotheses were identified and tested, it was found that contract price, with about 15% relative importance, was the main contract feature that affected consumer choices, followed by the size of data that were related to the number of minutes and/or number of messages offered within the mobile service contract package. In addition, “company factors”, with about 18% relative importance, were found to affect consumer choice of service pro- vider contracts. The principal issue affecting consumer choice decisions was “switching cost”, which was the highest relative importance element of company interrelated factors and found to influence mobile subscriber contracts choice significantly. However, other company factors like signal strength and sales outlet availability had no significant impact on consumer choices and ranked less for consumer-choice priority. More attention is needed from scholars to study the effect of other possible mobile phone contract dimensions from customers’ perspective.
Show more

20 Read more

An Empirical Exploration of a Range of Important Antecedents of the Customer Loyalty & Satisfaction in Case of Telecom Services in Haryana Province of India

An Empirical Exploration of a Range of Important Antecedents of the Customer Loyalty & Satisfaction in Case of Telecom Services in Haryana Province of India

Indian telecommunication industry is contributing very significantly in the country’s development and plays an indispensable part in the daily lives of many. Tele-communication contributes significantly to the GDP, a contribution of 400 US Dollars was made in the year 2014. There has been an unprecedented upsurge in the penetration rate within the mobile telecommunication industry. Penetration rate in India was standing at 78.73 in 2014 which was regarded among the highest rate in the world. A but obvious fact in the fast growing economical world shows that the competitors in the same segment always look to attract, entice and lure others customers and many consumers are in constant search for a better offer or deal as they are not so loyal to the mobile service provider. Customer attrition or the churning rates range mainly from 7% yearly in some service industries which are having high exit barriers (Switching Barrier), like the banking sector and the insurance sector. But in case of the Mobile Service Sector it is nearly 40 percent, which is really a matter of concern.
Show more

16 Read more

Authenticating Location Based Services with Spatial Query Processing

Authenticating Location Based Services with Spatial Query Processing

Location-based services (LBSs) have been gaining tremendous popularity over the recent years, in particular since the emergence of mobile social networking services (mSNSs). Social networking giants such as Facebook and Twitter are all turning their services into mobile, along with specialized vendors like Foursquare, Gowalla and Loopt. Besides, major mobile carriers also strive to provide more value-added services to their subscribers, among which the most thrilling applications are LBSs such as location-aware advertisement (“check-in deals”) and nearby-
Show more

6 Read more

A Review on Privacy Enhanced Participating
          Sensing Infrastructure Architecture

A Review on Privacy Enhanced Participating Sensing Infrastructure Architecture

privacy and anonymity is mandatory. Another dimension of data security in participatory sensing is the reliability of the sensed data. In participatory sensing applications, data originates from sensors controlled by other people, and any participant with an appropriately configured device can easily submit falsified data. The data trustworthiness becomes more crucial than the traditional wireless sensor networks. There is an inherent conflict between trust and privacy. If a participatory sensing system provides full anonymity to the participants, it is difficult to guarantee the trustworthiness of submitted data. Finding a solution that achieves both trust and anonymity is a major challenge in such systems [4]. The proliferation of mobile phones, along with their pervasive connectivity, has propelled the amount of digital data produced and processed every day. This has driven researchers and IT professionals to discuss and develop a novel sensing paradigm, where sensors are not deployed in specific locations, but are carried around by people. Today, many different sensors are already deployed in our mobile phones, and soon all our gadgets (e.g., even our clothes or cars) will embed a multitude of sensors (e.g., GPS, digital images, accelerometers, etc.). As a result, data collected by sensor-equipped devices becomes of extreme interest to other users and applications. For instance, mobile phones may report (in real-time) temperature or noise level, similarly, cars may inform on traffic conditions. This paradigm is called Participatory Sensing (PS) – sometimes also referred to as opportunistic or urban sensing [3]. It combines the ubiquity of personal devices with sensing capabilities typical of WSN.
Show more

5 Read more

Volume 19: Context-Aware Adaptation Mechanism for Pervasive and Ubiquitous Services 2009

Volume 19: Context-Aware Adaptation Mechanism for Pervasive and Ubiquitous Services 2009

Abstract: With the recent advent and widespread use of smart mobile devices, the flexibility and versatility offered by Service Oriented Architecture’s (SOA) makes it an ideal approach to use in the rapidly changing mobile environment. However, the mobile setting presents a set of new challenges that service discovery methods developed for non- mobile environments cannot address. The requirements a mobile client device will have from a Web service may change due to changes in the context or the resources of the client device. In a similar manner, a mobile device that acts as a Web service provider will have different capabilities depending on its status, which may also change dramatically during runtime. This paper introduces VOLARE, a middleware-based solution that will monitor the resources and context of the device, and adapt service requests accordingly. The same method will be used to adapt the Quality of Service (QoS) levels advertised by service providers, to realistically reflect each provider’s capabilities at any given moment. This approach will allow for more resource-efficient and accurate service discovery in mobile systems and will enable more reliable provider functionality in mobile devices. Keywords: mobile systems, semantic Web, context awareness, Web services, service discovery, quality of service metrics
Show more

7 Read more

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

Abstract: Distributed denial-of-service (DDoS) attacks remaina major security problem, the mitigation of which is very hard especiallywhen it comes to highly distributed botnet-based attacks.The early discovery of these attacks, although challenging, is necessaryto protect end-users as well as the expensive network infrastructure resources. In this paper, we address the problem of DDoS attacks and present the theoretical foundation, architecture, and algorithms of DDOS Wall. The core of DDOS Wall is composed of intrusion prevention systems (IPSs) located at the Internet service providers (ISPs) level. The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected traffic information. The evaluation of DDOS Wall using extensive simulations and a real dataset is presented, showing DDOS Wall effectiveness and low overhead, as well as its support for incremental deployment in real networks.
Show more

10 Read more

Improving Quality of Web Services by Using a Proposed Model

Improving Quality of Web Services by Using a Proposed Model

requests which have high chance for processing them within the user specified response time that is tmax. The second step is the predictor determines the service time to the user requests that are accepted or filtered through. The service time is used in scheduling of user requests within the scheduler. The third step is scheduling which receives the user request and the predicted service time from the predict layer. The objective of the scheduler to process the current requests in the system within tmax thus there is optimization of QoBiz and improved levels of QoE. we needs in this study to algorithm determines a location in the queue of accepted user requests based on estimated service times and the response time model presented. Though a best location can be found by comparing all the possible locations using greedy/heuristic search, it is not computationally feasible given the operational time considerations. Therefore a more realistic approach is needed. The BES algorithm achieves this by comparing the revenues within a range of user requests and places the request at a position where the revenue is maximized and penalties/losses are minimized. This results in improved QoBiz for the service provider. It ensures that it selects a location in such a way that all the user requests can be processed within their respective tmax of the response time. If such a location cannot be found, the user request is not accepted. Therefore the BES algorithm guarantees that the user requests are processed within their response time, increasing the QoE.
Show more

11 Read more

A Web Services Framework for Mobile Payment Services

A Web Services Framework for Mobile Payment Services

General Packet Radio Service [2] is packet switched wireless protocol providing non- voice value added services that allows information to be sent and received across a mobile telephone network. It is described as a 2.5G technology which supplements Circuit Switched technology such as GSM. Data transmissions speeds of 9.6 kbps to a theoretical maximum speed of up to 171.2 kbps are achievable with GPRS using all eight timeslots at the same time. In addition to higher data rates, GPRS provides users with all time connectivity while only charged for the data viewed or received with a minimal on- line charge. GPRS is an evolutionary step towards 3G technologies, such as EDGE (Enhanced Data GSM Environment) and UMTS (Universal Mobile Telephone Service).
Show more

90 Read more

Team Queue: A mobile application which provides a third party stage for an E-Sports service provider

Team Queue: A mobile application which provides a third party stage for an E-Sports service provider

The primary purpose of this mobile application is to concentrate on social, school union and company promote. According to “2017 Global E-Sports Market Report (NEWZOO, 2017, page 6.)”, the E-Sports Enthusiast audience skews young and male, with half of them aged between 21-35 and 71 % men. Therefore, designer targets the males who are age 18-25 as the critical audience, to evaluate if the function of the app fit the specific group well.

64 Read more

Mobile Phone Service Providers in Saudi Arabia : Students' Customer Satisfaction

Mobile Phone Service Providers in Saudi Arabia : Students' Customer Satisfaction

Table 19 Extent to which the eight items affect choice of mobile phone service providers 105 Table 20 Grouped median scores for eight items that affect choice of service provider 108 T[r]

235 Read more

An Objective of Service Level Agreement (SLA) in Cloud Computing Environment

An Objective of Service Level Agreement (SLA) in Cloud Computing Environment

Cloud computing is an internet based computing, providing the on demand services through the internet such as servers, storage disk, different platforms and applications to any business level company or organization with universal independence. The online user select the services according to their requirements and pay according the use. So, there should be some agreement which depicts the reliability of the provided services and customer relationship management features to succeed the working environment of the cloud environment. A service- level agreement (SLA) is a contract between a service provider and its internal or external customers. In this agreement documents, the provider will mentioned the services and defines the performance standards which the provider is obligated to meet. This can be a legally binding formal or an informal "contract" .The agreement may involve separate organizations, or different teams within one organization. SLA is an agreement defines the services contents that will be offered to the customer within the specified timeline. Basically, SLA achieved its goal by accessing different components and aspects. Customer, service and multilevel based levels are the backbone of SLA which purposely offered services to maintain the agreement between customer and an organization. On the other hand, unique stages of SLA performs the step by step level to offered services and maintains its components. As well as different metrics are also the part of SLA body to measure the complexity, cost and satisfaction of the customer regarding the services mentioned in SLA document.
Show more

10 Read more

Voice over IP Via IEEE 802.11 Wireless LAN

Voice over IP Via IEEE 802.11 Wireless LAN

The purpose of this project is to design and implement an android application that uses WIFI as a means of communication between mobile phones to provide voice communication at no cost. Wi-Fi is a WLAN standard which is used to share data over the transmission range larger than Bluetooth. Wi-Fi can also be used to share the voice from one mobile to another by receiving the data from one mobile (user) and sending the data to the destination user. The basic concept behind this data transferring is VOIP (voice over protocol).Voice telephony over mobile is currently supported at a cost using service provider such as GSM, or using IP service provider at cheaper cost. The system will allow users to search for other individuals within WIFI range and to establish free voice connections. If the users are not in the specific range, they are not allowed to establish free voice connections; they are provided communication by means of service providers. In time this will become a cheap and secure way to communicate and will have a large effect on university, business and personal communication.
Show more

5 Read more

CONSUMER ATTITUDE TOWARDS INTERNET SERVICE PROVIDER

CONSUMER ATTITUDE TOWARDS INTERNET SERVICE PROVIDER

Internet plays a major role in the technology development. Internet is a big boon for the technical and research development for the present as well as for the future period. The researcher in the study focuses on the attitude of various consumers regarding about the different internet service providers. Internet services are to be made prompt and easy to operate in quick speed. The area of the study is conducted in Coimbatore city. The sample design of the study is convenience sampling. The source of researcher study is based on primary data collection among 100 respondents. The statistical tools used in the study are percentage analysis and chi- square test.
Show more

13 Read more

Gap analysis on expectation of service quality in the outsourcing strategy of property maintenance and management context

Gap analysis on expectation of service quality in the outsourcing strategy of property maintenance and management context

Abstract - In this paper an investigation and analysis of expectation gaps on service quality for property maintenance and management (PMM) outsourcing strategy are reported. In particular, the proposed OUTQUAL model with 13 identified service quality criteria was put forward and divided into two sub criteria for each to examine the expectation gaps of service providers and clients towards the significance of each sub criteria. Result shows small gaps between the expectations of both service provider and client groups and depict the extent of improvement needed by service provider to fully achieve service quality level expected by the client in PMM outsource services delivery.
Show more

5 Read more

Multi Homed Inter Autonomous System Provider using MPLS VPN Technology

Multi Homed Inter Autonomous System Provider using MPLS VPN Technology

Abstract: To implement a Multi-Homed Inter-AS Provider network using MPLS VPN technology where Service Provider 1 and Service Provider 2 are providing services to geographically dispersed Customer A and B sites. This research work is great method of communication among partner branches of an organization each of them situated at distinct geographical areas with absence of the same ISP in every area. We came up with an idea of designing Multi-Homed Inter-AS provider network i.e., connecting multiple ISPs with MPLS VPN which provides global reachability. This design provides security confidently in Private/Public organizations through Internet replacement. In reliability, it becomes more important to use MPLS technology which is being widely adopted by worldwide service providers to connect geographically separated customer sites. In this research work, Customer Sites are connected with VPNs for secure private. Here, we provide a great survey about MPLS, BGP, and VPN Networks. We address the issues of traditional Inter-As Provider. This existing system connects the geographically separated customer sites with single link. Such, there is more traffic burden on that single link. Thus, the quality parameters of network such are speed and QoS (Quality of Service) are changing with traffic rate. To overcome these issues, we propose the Provision of Multi-Homed Inter-As Provider using MPLS VPN Technology. Our proposed design Inter-AS Multi-Homed Provider using MPLS VPN has explained in GNS3 Software for better understanding the system. This research work would be helpful for service providers to provide their services for long distance customers with more security and QoS parameters.
Show more

5 Read more

Multi-way Authentication Scheme for User Verification in  Cloud-Web Services

Multi-way Authentication Scheme for User Verification in Cloud-Web Services

The cloud security systems are constructed to handle the data and service level vulnerabilities. User account security is mainly focused to protect the user account recovery operations. Two security schemes are widely used to protect the account recovery tasks. They are Molecular Integration Simulation Toolkit (MIST) and Malachi schemes. The MIST security algorithm performs the user account recovery with predetermined questions and possible answer collections. The Malachi algorithm handles the account recovery with dynamic user queries and answers. In the Malachi scheme security questions and answers are collected during the account creation process. Malachi scheme performs the user verification at the time of each login attempt and account recovery process. The following issues are discovered from the current cloud security services.
Show more

6 Read more

Vehicle Emergency Service System

Vehicle Emergency Service System

Abstract: The system of vehicle repair provider is a trouble that needs to analyze on the area of repair center consistent with the provider wishes and to be had useful resource based totally at the maximal overlaying location and precedence queuing concept. Considering the effect of ready time because of rush jobs, this challenge proposes a version that maximizes the service overlaying, and restrains. Service level of uncovered zones. As we see human beings going through many issues related to vehicles and Most of the humans use community services and presenting on line software carrier on the way to create extra advantage for users as well as provider company. So we can build the application of Management gadget with notification the usage of app could be evolved to solve all of the modern-day problem related to the automobile. Using which the person that is searching out automobile restore carrier will get all the facilities of the car of their own location. The scope of this venture will cognizance on the user and service company who will use this application through online service. This venture may also be applied in small shops. The proposed system will store the efforts and time of a person in addition to improve the boom of employment.
Show more

10 Read more

Show all 10000 documents...