712 research outputs found

    Research Framework, Strategies, And Applications Of Intelligent Agent Technologies (IATs) In Marketing

    Get PDF
    In this digital era, marketing theory and practice are being transformed by increasing complexity due to information availability, higher reach and interactions, and faster speeds of transactions. These have led to the adoption of intelligent agent technologies (IATs) by many companies. As IATs are relatively new and technologically complex, several definitions are evolving, and the theory in this area is not yet fully developed. There is a need to provide structure and guidance to marketers to further this emerging stream of research. As a first step, this paper proposes a marketing-centric definition and a systematic taxonomy and framework. The authors, using a grounded theory approach, conduct an extensive literature review and a qualitative study in which interviews with managers from 50 companies in 22 industries reveal the importance of understanding IAT applications and adopting them. Further, the authors propose an integrated conceptual framework with several propositions regarding IAT adoption. This research identifies the gaps in the literature and the need for adoption of IATs in the future of marketing given changing consumer behavior and product and industry characteristics

    Research Framework, Strategies, And Applications Of Intelligent Agent Technologies (IATs) In Marketing

    Get PDF
    In this digital era, marketing theory and practice are being transformed by increasing complexity due to information availability, higher reach and interactions, and faster speeds of transactions. These have led to the adoption of intelligent agent technologies (IATs) by many companies. As IATs are relatively new and technologically complex, several definitions are evolving, and the theory in this area is not yet fully developed. There is a need to provide structure and guidance to marketers to further this emerging stream of research. As a first step, this paper proposes a marketing-centric definition and a systematic taxonomy and framework. The authors, using a grounded theory approach, conduct an extensive literature review and a qualitative study in which interviews with managers from 50 companies in 22 industries reveal the importance of understanding IAT applications and adopting them. Further, the authors propose an integrated conceptual framework with several propositions regarding IAT adoption. This research identifies the gaps in the literature and the need for adoption of IATs in the future of marketing given changing consumer behavior and product and industry characteristics

    Internet-Based Vehicle-Cargo Matching Platform Enterprises in China

    Get PDF
    This paper examines vehicle-cargo matching platform enterprises in China, which play the role of non-truck operating common carriers that are the freight operator by entrusting transportation duties to the actual carrier. We summarize several kinds of operation modes for vehicle-cargo matching: simple vehicle-cargo matching; whole- vehicle system with single loading and multiple unloading; virtual fleet; and integration of whole-vehicle service and carpooling. We selected representative enterprises and analyzed such features as their operation, advantages and disadvantages, profit model, and applications. We compare and analyze those systems

    Fourth Generation Wireless Systems: Requirements and Challenges for the Next Frontier

    Get PDF
    Fourth generation wireless systems (4G) are likely to reach the consumer market in another 4-5 years. 4G comes with the promise of increased bandwidth, higher speeds, greater interoperability across communication protocols, and user friendly, innovative, and secure applications. In this article, I list the requirements of the 4G systems by considering the needs of the users in the future. These requirements can be met if technical and business challenges can be overcome. Technical challenges include mobility management, quality of service, interoperability, high data rate, security, survivability, spectrum, intelligent mobile devices, middleware, and network access. I discuss the most plausible solutions to these technical challenges in this paper. Business-related challenges include billing, payment methods, pricing, size of investments, content provision and mediation, and the trade-off between richness and reach. If these technical and business challenges can be met, then 4G will become the next frontier in data and voice communication infrastructure

    Privacy in Mobile Agent Systems: Untraceability

    Get PDF
    Agent based Internet environments are an interesting alternative to existing approaches of building software systems. The enabling feature of agents is that they allow software development based on the abstraction (a "metaphor") of elements of the real world. In other words, they allow building software systems, which work as human societies, in which members share products and services, cooperate or compete with each other. Organisational, behavioural and functional models etc applied into the systems can be copied from the real world. The growing interest in agent technologies in the European Union was expressed through the foundation of the Coordination Action for Agent-Based Computing, funded under the European Commission's Sixth Framework Programme (FP6). The action, called AgentLink III is run by the Information Society Technologies (IST) programme. The long-term goal of AgentLink is to put Europe at the leading edge of international competitiveness in this increasingly important area. According to AgentLink "Roadmap for Agent Based Computing"; agent-based systems are perceived as "one of the most vibrant and important areas of research and development to have emerged in information technology in recent years, underpinning many aspects of broader information society technologies"; However, with the emergence of the new paradigm, came also new challenges. One of them is that agent environments, especially those which allow for mobility of agents, are much more difficult to protect from intruders than conventional systems. Agent environments still lack sufficient and effective solutions to assure their security. The problem which till now has not been addressed sufficiently in agent-based systems is privacy, and particularly the anonymity of agent users. Although anonymity was studied extensively for traditional message-based communication for which during the past twenty five years various techniques have been proposed, for agent systems this problem has never been directly addressed. The research presented in this report aimed at filling this gap. This report summarises results of studies aiming at the identification of threats to privacy in agent-based systems and the methods of their protection.JRC.G.6-Sensors, radar technologies and cybersecurit

    Context-aware information delivery for mobile construction workers

    Get PDF
    The potential of mobile Information Technology (IT) applications to support the information needs of mobile construction workers has long been understood. However, existing mobile IT applications in the construction industry have underlined limitations, including their inability to respond to the changing user context, lack of semantic awareness and poor integration with the desktop-based infrastructure. This research argues that awareness of the user context (such as user role, preferences, task-at-hand, location, etc.) can enhance mobile IT applications in the construction industry by providing a mechanism to deliver highly specific information to mobile workers by intelligent interpretation of their context. Against this this background, the aim of this research was to investigate the applicability of context-aware information delivery (CAID) technologies in the construction industry. The research methodology adopted consisted of various methods. A literature review on context-aware and enabling technologies was undertaken and a conceptual framework developed, which addressed the key issues of context-capture, contextinference and context-integration. To illustrate the application of CAID in realistic construction situations, five futuristic deployment scenarios were developed which were analysed with several industry and technology experts. From the analysis, a common set of user needs was drawn up. These needs were subsequently translated into the system design goals, which acted as a key input to the design and evaluation of a prototype system, which was implemented on a Pocket-PC platform. The main achievements of this research include development of a CAID framework for mobile construction workers, demonstration of CAID concepts in realistic construction scenarios, analysis of the Construction industry needs for CAID and implementation and validation of the prototype to demonstrate the CAID concepts. The research concludes that CAID has the potential to significantly improve support for mobile construction workers and identifies the requirements for its effective deployment in the construction project delivery process. However, the industry needs to address various identified barriers to enable the realisation of the full potential of CAID

    Process-Oriented Information Logistics: Aligning Process Information with Business Processes

    Get PDF
    During the last decade, research in the field of business process management (BPM) has focused on the design, modeling, execution, monitoring, and optimization of business processes. What has been neglected, however, is the provision of knowledge workers and decision makers with needed information when performing knowledge-intensive business processes such as product engineering, customer support, or strategic management. Today, knowledge workers and decision makers are confronted with a massive load of data, making it difficult for them to discover the information relevant for performing their tasks. Particularly challenging in this context is the alignment of process-related information (process information for short), such as e-mails, office files, forms, checklists, guidelines, and best practices, with business processes and their tasks. In practice, process information is not only stored in large, distributed and heterogeneous sources, but usually managed separately from business processes. For example, shared drives, databases, enterprise portals, and enterprise information systems are used to store process information. In turn, business processes are managed using advanced process management technology. As a consequence, process information and business processes often need to be manually linked; i.e., process information is hard-wired to business processes, e.g., in enterprise portals associating specific process information with process tasks. This approach often fails due to high maintenance efforts and missing support for the individual demands of knowledge workers and decision makers. In response to this problem, this thesis introduces process-oriented information logistics(POIL) as new paradigm for delivering the right process information, in the right format and quality, at the right place and the right point in time, to the right people. In particular, POIL allows for the process-oriented, context-aware (i.e., personalized) delivery of process information to process participants. The goal is to no longer manually hard-wire process information to business processes, but to automatically identify and deliver relevant process information to knowledge workers and decision makers. The core component of POIL is a semantic information network (SIN), which comprises homogeneous information objects (e.g., e-mails, offce files, guidelines), process objects (e.g., tasks, events, roles), and relationships between them. In particular, a SIN allows discovering objects linked with each other in different ways, e.g., objects addressing the same topic or needed when performing a particular process task. The SIN not only enables an integrated formal representation of process information and business processes, but also allows determining the relevance of process information for a given work context based on novel techniques and algorithms. Note that this becomes crucial in order to achieve the aforementioned overall goal of this thesis

    Survey on Additive Manufacturing, Cloud 3D Printing and Services

    Full text link
    Cloud Manufacturing (CM) is the concept of using manufacturing resources in a service oriented way over the Internet. Recent developments in Additive Manufacturing (AM) are making it possible to utilise resources ad-hoc as replacement for traditional manufacturing resources in case of spontaneous problems in the established manufacturing processes. In order to be of use in these scenarios the AM resources must adhere to a strict principle of transparency and service composition in adherence to the Cloud Computing (CC) paradigm. With this review we provide an overview over CM, AM and relevant domains as well as present the historical development of scientific research in these fields, starting from 2002. Part of this work is also a meta-review on the domain to further detail its development and structure
    corecore