870 research outputs found

    A Theoretical Model of Nomadic Culture: Assumptions, Values, Artifacts, and the Impact on Employee Job Satisfaction

    Get PDF
    The model of an anytime-anywhere workforce is changing the landscape of business today. Increasingly employees are being emancipated from their traditional offices by the widespread infiltration of technologies that facilitate this model. The question is, how can we characterize the culture developing in support of these new ways of working and how can they be cultivated? Understanding this “ nomadic culture ” is critical to both researchers and practitioners. Due to the newness of these technologies and the speed of their integration into today’s work practices, prior research lends little direction in understanding this developing culture. This research contributes by proposing and validating a multidimensional model of nomadic culture. The model describes nomadic culture in terms of three levels: underlying assumptions, espoused values, and artifacts. Each level is then described more specifically by eight measurable nomadic culture sub-constructs. Using the Structural Equation Modeling technique, proposed relationships among the sub-constructs are tested along with the effect of organizational support for nomadic behaviors on employee job satisfaction. Significant support for the model was found in data collected from 203 working IT professionals from a wide variety of organizations. Suggestions for future research as well as implications for practice are provided

    Automatic Security Assessment for Next Generation Wireless Mobile Networks

    Get PDF

    Automatic security assessment for next generation wireless mobile networks

    Get PDF
    Abstract. Wireless networks are more and more popular in our life, but their increasing pervasiveness and widespread coverage raises serious security concerns. Mobile client devices potentially migrate, usually passing through very light access control policies, between numerous and heterogeneous wireless environments, bringing with them software vulnerabilities as well as possibly malicious code. To cope with these new security threats the paper proposes a new active third party authentication, authorization and security assessment strategy in which, once a device enters a new Wi-Fi environment, it is subjected to analysis by the infrastructure, and if it is found to be dangerously insecure, it is immediately taken out from the network and denied further access until its vulnerabilities have been fixed. The security assessment module, that is the fundamental component of the aforementioned strategy, takes advantage from a reliable knowledge base containing semantically-rich information about the mobile node under examination, dynamically provided by network mapping and configuration assessment facilities. It implements a fully automatic security analysis framework, based on AHP, which has been conceived to be flexible and customizable, to provide automated support for real-time execution of complex security/risk evaluation tasks which depends on the results obtained from different kind of analysis tools and methodologies. Encouraging results have been achieved utilizing a proof-of-concept model based on current technology and standard open-source networking tools

    A prototype and demonstrator of Akogrimo’s architecture: An approach of merging grids, SOA, and the mobile Internet

    Full text link
    The trend of merging telecommunication infrastructures with traditional Information Technology (IT) infrastructures is ongoing and important for commercial service providers. The driver behind this development is, on one hand, the strong need for enhanced services and on the other hand, the need of telecommunication operators aiming at value-added service provisioning to a wide variety of customers. In the telecommunications sector, the IP Multimedia Subsystem (IMS) is a promising service platform, which may become a ''standard'' for supporting added-value services on top of the next generation network infrastructure. However, since its range of applicability is bound to SIP- enabled services, IMS extensions are being proposed by ''SIPifying'' applications. In parallel to these developments within the traditional IT sector, the notion of Virtual Organizations (VO) enabling collaborative businesses across organizational boundaries is addressed in the framework of Web Services (WS) standards implementing a Service-oriented Architecture (SOA). Here, concepts for controlled resource and service sharing based on WS and Semantic Technologies have been consolidated. Since the telecommunications sector has become, in the meantime ''mobile'', all concepts brought into this infrastructure must cope with the dynamics mobility brings in. Therefore, within the Akogrimo project the VO concept has been extended towards a Mobile Dynamic Virtual Organization (MDVO) concept, additionally considering key requirements of mobile users and resources. Especial attention is given to ensure the duality of the merge of both, SOA and IMS approaches to holistically support SOA-enabled mobile added-value services and their users. This work describes major results of the Akogrimo project, paying special attention to the overall Akogrimo architecture, the prototype implemented, and the key scenario in which the instantiated Akogrimo architecture shows a very clear picture of applicability, use, and an additional functional evaluation

    Identity Management Framework for Internet of Things

    Get PDF

    Internet Predictions

    Get PDF
    More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section

    Annual report

    Get PDF
    corecore