77,079 research outputs found

    Organisational Capabilities Required for Enabling Employee Mobility through Bring- Your-Own-Device Concept

    Get PDF
    Background: Mobile device adoption is on the rise and people are increasingly using mobile devices as a part of their lives. Studies have shown that people can use mobile devices to perform their work duties from anywhere. Organisations are now exploring ways of enabling and supporting mobility for employees’ mobile devices, including BYOD (Bring-Your-Own-Device) policies. Objective: The objective of this study is to identify the main capabilities required for enterprise mobility. Methods/Approach: This qualitative research study presents empirical results based on interviews with selected senior IS managers of large organizations. Results: The main findings of this study suggest that information security and mobile device management are among the main capabilities required for enterprise mobility. Conclusions: Enterprise mobility is an emerging field which has received very little research attention. More research in the field will help organisations make informed decisions on how to increase productivity, sales and efficiency while achieving employee satisfaction through enterprise mobility

    Information Mobility and Business Transforms

    Get PDF
    The dynamic growth of Information Technology offers great opportunities for business enhancements. Information mobility is the latest trend in the IT domain which adds value to Enterprises and puts it in a transition. The transitions from a previous state to an improved one, always involve various risks too. It is essential to have a perfect strategic planning and a set of deployment schemes to bring success in this domain. This has to be realized practically within the time and within the budget. Information mobility is one of the key enabling technologies sweeping across the world offering multifaceted business promotion avenues. The mobility technology is expected to transform enterprise patterns and its operations through various modes of liberal coupling of users and a variety of business processes. The enterprise mobility needs to deal with terms like BYOD, CYOD, MDM, M-Security and M-Analytics to ensure a successful implementation leading to expected transformation. There are various direct advantages derivable from it, like real time enterprise data access, improved collaboration as well as employee and customer satisfaction. At the same time it poses several challenges and risks spread over security of implementations, data classification and user rights management. In this paper we discuss the features of Information Management and the challenges posed by them along with a possible risk profile associated with them

    Barriers to development and progression of women entrepreneurs in Pakistan

    Get PDF
    This article would help integration of women entrepreneurs into the mainstream economy in Pakistan.In Pakistan, women entrepreneurs do not enjoy the same opportunities as men due to a number of deep-rooted discriminatory socio-cultural values and traditions. Furthermore, these restrictions can be observed within the support mechanisms that exist to assist such fledgling businesswomen. The economic potential of female entrepreneurs is not being realised as they suffer from a lack of access to capital, land, business premises, information technology, training and agency assistance. Inherent attitudes of a patriarchal society, that men are superior to women and that women are best suited to be homemakers, create formidable challenges. Women also receive little encouragement from some male family members, resulting in limited spatial mobility and a dearth of social capital. The research suggests that in order to foster development, multi-agency cooperation is required. The media, educational policy makers and government agencies could combine to provide women with improved access to business development services and facilitate local, regional and national networks

    Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements

    Get PDF
    Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA

    Middleware Technologies for Cloud of Things - a survey

    Get PDF
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    Middleware Technologies for Cloud of Things - a survey

    Full text link
    The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future. The IoT services are a key solution for providing smart environments in homes, buildings and cities. In the era of a massive number of connected things and objects with a high grow rate, several challenges have been raised such as management, aggregation and storage for big produced data. In order to tackle some of these issues, cloud computing emerged to IoT as Cloud of Things (CoT) which provides virtually unlimited cloud services to enhance the large scale IoT platforms. There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying suitable "Middleware". Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next we study different architecture styles and service domains. Then we presents several middlewares that are suitable for CoT based platforms and lastly a list of current challenges and issues in design of CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268, Digital Communications and Networks, Elsevier (2017

    Enabling states, capitalising enterprise and confronting the social: issues and implications in researching contemporary social capital and enterprise

    Get PDF
    A key feature of late capitalism continues to be a complex reworking of previous approaches to the relationship between the state and business. This significant shift in the interplay between the public and private sectors has generated such developments as the privatisation of many services formerly provided by government and the growth of not-for-profit organisations seeking to fill gaps in service provision. These changes are highly significant for every citizen and community member and for all stakeholders. This first chapter in this book encapsulates these complex developments in terms of debates about the enabling imperatives of the contemporary state, the character of the intersection between capital and enterprise, and a timely confrontation of what is understood by “the social” in current discourses, policies and strategies. In presenting this distillation, the authors introduce the subsequent chapters in the book in terms of how each chapter, including this one, contributes new insights to the broader project of eliciting the issues and implications attendant on researching contemporary social capital and social enterprise. This project is crucial if we are to understand the ways in which social capital and social enterprise can work sustainably and transformatively with variously marginalised and vulnerable groups in our societies. It is vital also for understanding the ways that such work is constrained and limited in its effectiveness
    • …
    corecore