Purpose – The purpose of this paper is to analyze mobile tethering from technological and social perspectives. Mobile tethering allows us to share cellular data connection with others over WiFi, Bluetooth or USB. Although the technology is ready and has promising outcomes, service providers and the users still keep their distance. Therefore, the incentives for the users and service providers should be identified. Design/methodology/approach – Technical challenges in terms of energy and bandwidth consumption are explored using an application specifically developed for mobile tethering. Usage issues are studied through conjoint analysis, in which we analyze the importance of technical aspects as well as social conditions for sharing data connection with others. Findings – The research shows that although energy, bandwidth and security are important technical challenges, users are mainly concerned about social aspects, such as with whom the connection will be shared, rather than monetary issues. Mobile tethering is a viable cooperative service, only when users are familiar with the person with whom the data connection is being shared. Research limitations/implications – In the technical evaluation of the mobile tethering application, only Android operating systems are being used. Other operating systems (e.g. iOS) may perform differently. Moreover, only a small fraction of smartphones and tablets has been tested. Practical implications – Service providers tend to block mobile tethering technology, as they do not have control and do not expect to gain revenues. However, service providers have the abilities to satisfy the security and privacy concerns of the users and can create secure femtocells for their customers. Social implications – Mobile tethering performance results indicate that more people can access the Internet while they are mobile even if they do not have cellular data subscription. More Internet‐based services can be offered to people while they roam in other countries. Originality/value – For technology developers, both the key technical issues and the concerns of the consumers are highlighted. Future applications must contain reliable security and privacy protocols in their design. Moreover, the significance of the social networks is shown in the decision‐making of the use of mobile tethering, especially with respect to the credit exchange.
info – Emerald Publishing
Published: May 6, 2014
Keywords: Mobile; Conjoint analysis; Wifi; Tethering; Willingness to share
It’s your single place to instantly
discover and read the research
that matters to you.
Enjoy affordable access to
over 18 million articles from more than
15,000 peer-reviewed journals.
All for just $49/month
Query the DeepDyve database, plus search all of PubMed and Google Scholar seamlessly
Save any article or search result from DeepDyve, PubMed, and Google Scholar... all in one place.
Get unlimited, online access to over 18 million full-text articles from more than 15,000 scientific journals.
Read from thousands of the leading scholarly journals from SpringerNature, Wiley-Blackwell, Oxford University Press and more.
All the latest content is available, no embargo periods.
“Hi guys, I cannot tell you how much I love this resource. Incredible. I really believe you've hit the nail on the head with this site in regards to solving the research-purchase issue.”Daniel C.
“Whoa! It’s like Spotify but for academic articles.”@Phil_Robichaud
“I must say, @deepdyve is a fabulous solution to the independent researcher's problem of #access to #information.”@deepthiw
“My last article couldn't be possible without the platform @deepdyve that makes journal papers cheaper.”@JoseServera