1,209 research outputs found

    Mobile Service Affordability for the Needy, Addiction, and ICT Policy Implications

    Get PDF
    This paper links communications and media usage to social and household economics boundaries. It highlights that in present day society, communications and media are a necessity, but not always affordable, and that they furthermore open up for addictive behaviours which raise additional financial and social risks. A simple and efficient methodology compatible with state-of-the-art social and communications business statistics is developed, which produces the residual communications and media affordability budget and ultimately the value-at-risk in terms of usage and tariffs. Sensitivity analysis provides precious information on communications and media adoption on the basis of affordability. Case data are surveyed from various countries. ICT policy recommendations are made to support widespread and responsible communications access.addiction;ICT policy;communications affordability;mobile service

    Privacy Management Service Contracts as a New Business Opportunity for Operators

    Get PDF
    Recognizing the importance of privacy management as a business process and a business support process, this paper proposes the use of service level agreements (SLA’s) around privacy features, including qualitative and quantitative ones. Privacy metrics are defined by both parties with boundary values on each qualitative or qualitative feature. Their distribution is relying on stress distributions used in this field. The use of service level agreements also casts privacy management into a business perspective with benefits and costs to either party in a process. This approach is especially relevant for communications operators as brokers between content owners (individuals, businesses) and enterprise applications; in this context, the privacy SLA management would be carried out by the operator, while the terms and conditions of the SLA negotiation reside with the two external parties. This work was carried out as part of the large EU project PRIME www.prime.project.eu.org. on privacy enhancing technologies.Content Owners;Enterprise Business Processes;Managed Service Contracts;Privacy Agreements;Service Level Agreements (SLA's);Telecommunications Operators

    Discovering the Dynamics of Smart Business Networks

    Get PDF
    In an earlier paper ,was discussed the necessary evolution from smart business networks, as based on process need satisfaction and governance, into business genetics [1] based on strategic bonds or decay and opportunistic complementarities. This paper will describe an approach and diffusion algorithms whereby to discover the dynamics of emergent smart business network structures and their performance in view of collaboration patterns over time. Some real life early analyses of dynamics are discussed based on cases and date from the high tech sector. Lessons learnt from such cases are also given on overall smart network dynamics with respect to local interaction strategies, as modelled like in business genetics by individual partner profiles, goals and constraints. It shows the weakness of static "business operating systems", as well as the possibly destabilizing clustering effects amongst nodes linked to filtering, evaluation and own preferences.dynamics;network performance;smart business networks;SBN;business genetics

    Network-based business process management: embedding business logic in communications networks

    Get PDF
    Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into re-usable process modules. These process modules can subsequently be distributed on the Internet over a variety of many different actors, each with their own specialization and economies-of-scale. The economic benefits of process specialization can be huge. However, how should such actors in a business network find, select, and control, the best partner for what part of the business process, in such a way that the best result is achieved? This particular management challenge requires more advanced techniques and tools in the enabling communications networks. An approach has been developed to embed business logic into the communications networks in order to optimize the allocation of business resources from a network point of view. Initial experimental results have been encouraging while at the same time demonstrating the need for more robust techniques in a future of massively distributed business processes.active networks;business process management;business protocols;embedded business logic;genetic algorithms;internet distributed process management;payment systems;programmable networks;resource optimization

    Emergency Messaging to General Public via Public Wireless Networks

    Get PDF
    Warnings to the broad population in an emergency situation, irrespective of location and condition, is a public policy responsibility. Public wireless networks offer now the opportunity to deliver emergency warnings in this way with explanations, because in many countries the mobile penetration rates are higher than any other access form .The paper summarizes the analysis of the selection process between Short messaging services (SMS) and Cell Broadcast messaging in the context of Denmark based on end user requirements and stakeholder roles. It demonstrates the many technical, cost-benefit and other trade-offs needed in supporting the population now with a dependable and wide-spread technology.SMS;cell broadcast (CB);emergency warnings;public wireless networks

    Individual Tariffs for Mobile Communication Services

    Get PDF
    This paper introduces a conceptual framework and a computational model for individual tariffs for mobile communication services. The purpose is to provide guidance for implementation by communication service suppliers or user groups alike. The paper first examines the sociological and economic incentives for personalized services and individual tariffs. Then it introduces a framework for individual tariffs which is centered on user and supplier behaviours. The user, instead of being fully rational, has "bounded rationality" and his behaviours are subject to economic constraints and influenced by social needs. The supplier can belong to different types of entities such as firms and communities; each has his own goals which lead to different behaviors. Individual tariffs are decided through interactions between the user and the supplier and can be analyzed in a structured way using game theory. A numerical case in mobile music training is developed to illustrate the concepts.risks;mobile communication services;Individual tariffs;computational games
    corecore