77,079 research outputs found
Organisational Capabilities Required for Enabling Employee Mobility through Bring- Your-Own-Device Concept
Background: Mobile device adoption is on the rise and people are increasingly using mobile devices as a part of their lives. Studies have shown that people can use mobile devices to perform their work duties from anywhere. Organisations are now exploring ways of enabling and supporting mobility for employees’ mobile devices, including BYOD (Bring-Your-Own-Device) policies. Objective: The objective of this study is to identify the main capabilities required for enterprise mobility. Methods/Approach: This qualitative research study presents empirical results based on interviews with selected senior IS managers of large organizations. Results: The main findings of this study suggest that information security and mobile device management are among the main capabilities required for enterprise mobility. Conclusions: Enterprise mobility is an emerging field which has received very little research attention. More research in the field will help organisations make informed decisions on how to increase productivity, sales and efficiency while achieving employee satisfaction through enterprise mobility
Information Mobility and Business Transforms
The dynamic growth of Information Technology offers great opportunities for business enhancements. Information mobility is the latest trend in the IT domain which adds value to Enterprises and puts it in a transition. The transitions from a previous state to an improved one, always involve various risks too. It is essential to have a perfect strategic planning and a set of deployment schemes to bring success in this domain. This has to be realized practically within the time and within the budget. Information mobility is one of the key enabling technologies sweeping across the world offering multifaceted business promotion avenues. The mobility technology is expected to transform enterprise patterns and its operations through various modes of liberal coupling of users and a variety of business processes. The enterprise mobility needs to deal with terms like BYOD, CYOD, MDM, M-Security and M-Analytics to ensure a successful implementation leading to expected transformation. There are various direct advantages derivable from it, like real time enterprise data access, improved collaboration as well as employee and customer satisfaction. At the same time it poses several challenges and risks spread over security of implementations, data classification and user rights management. In this paper we discuss the features of Information Management and the challenges posed by them along with a possible risk profile associated with them
Barriers to development and progression of women entrepreneurs in Pakistan
This article would help integration of women entrepreneurs into the mainstream economy in Pakistan.In Pakistan, women entrepreneurs do not enjoy the same opportunities as men due to a number of deep-rooted discriminatory socio-cultural values and traditions. Furthermore, these restrictions can be observed within the support mechanisms that exist to assist such fledgling businesswomen. The economic potential of female entrepreneurs is not being realised as they suffer from a lack of access to capital, land, business premises, information technology, training and agency assistance. Inherent attitudes of a patriarchal society, that men are superior to women and that women are best suited to be homemakers, create formidable challenges. Women also receive little encouragement from some male family members, resulting in limited spatial mobility and a dearth of social capital. The research suggests that in order to foster development, multi-agency cooperation is required. The media, educational policy makers and government agencies could combine to provide women with improved access to business development services and facilitate local, regional and national networks
Recommended from our members
A classification of emerging and traditional grid systems
The grid has evolved in numerous distinct phases. It started in the early ’90s as a model of metacomputing in which supercomputers share resources; subsequently, researchers added the ability to share data. This is usually referred to as the first-generation grid. By the late ’90s, researchers had outlined the framework for second-generation grids, characterized by their use of grid middleware systems to “glue” different grid technologies together. Third-generation grids originated in the early millennium when Web technology was combined with second-generation grids. As a result, the invisible grid, in which grid complexity is fully hidden through resource virtualization, started receiving attention. Subsequently, grid researchers identified the requirement for semantically rich knowledge grids, in which middleware technologies are more intelligent and autonomic. Recently, the necessity for grids to support and extend the ambient intelligence vision has emerged. In AmI, humans are surrounded by computing technologies that are unobtrusively embedded in their surroundings.
However, third-generation grids’ current architecture doesn’t meet the requirements of next-generation grids (NGG) and service-oriented knowledge utility (SOKU).4 A few years ago, a group of independent experts, arranged by the European Commission, identified these shortcomings as a way to identify potential European grid research priorities for 2010 and beyond. The experts envision grid systems’ information, knowledge, and processing capabilities as a set of utility services.3 Consequently, new grid systems are emerging to materialize these visions. Here, we review emerging grids and classify them to motivate further research and help establish a solid foundation in this rapidly evolving area
Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements
Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)
IPv6 Network Mobility
Network Authentication, Authorization, and Accounting has
been used since before the days of the Internet as we know it
today. Authentication asks the question, “Who or what are
you?” Authorization asks, “What are you allowed to do?” And fi nally,
accounting wants to know, “What did you do?” These fundamental
security building blocks are being used in expanded ways today. The
fi rst part of this two-part series focused on the overall concepts of
AAA, the elements involved in AAA communications, and highlevel
approaches to achieving specifi c AAA goals. It was published in
IPJ Volume 10, No. 1[0]. This second part of the series discusses the
protocols involved, specifi c applications of AAA, and considerations
for the future of AAA
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
Middleware Technologies for Cloud of Things - a survey
The next wave of communication and applications rely on the new services
provided by Internet of Things which is becoming an important aspect in human
and machines future. The IoT services are a key solution for providing smart
environments in homes, buildings and cities. In the era of a massive number of
connected things and objects with a high grow rate, several challenges have
been raised such as management, aggregation and storage for big produced data.
In order to tackle some of these issues, cloud computing emerged to IoT as
Cloud of Things (CoT) which provides virtually unlimited cloud services to
enhance the large scale IoT platforms. There are several factors to be
considered in design and implementation of a CoT platform. One of the most
important and challenging problems is the heterogeneity of different objects.
This problem can be addressed by deploying suitable "Middleware". Middleware
sits between things and applications that make a reliable platform for
communication among things with different interfaces, operating systems, and
architectures. The main aim of this paper is to study the middleware
technologies for CoT. Toward this end, we first present the main features and
characteristics of middlewares. Next we study different architecture styles and
service domains. Then we presents several middlewares that are suitable for CoT
based platforms and lastly a list of current challenges and issues in design of
CoT based middlewares is discussed.Comment: http://www.sciencedirect.com/science/article/pii/S2352864817301268,
Digital Communications and Networks, Elsevier (2017
Enabling states, capitalising enterprise and confronting the social: issues and implications in researching contemporary social capital and enterprise
A key feature of late capitalism continues to be a complex reworking of previous approaches to the relationship between the state and business. This significant shift in the interplay between the public and private sectors has generated such developments as the privatisation of many services formerly provided by government and the growth of not-for-profit organisations seeking to fill gaps in service provision. These changes are highly significant for every citizen and community member and for all stakeholders. This first chapter in this book encapsulates these complex developments in terms of debates about the enabling imperatives of the contemporary state, the character of the intersection between capital and enterprise, and a timely confrontation of what is understood by “the social” in current discourses, policies and strategies. In presenting this distillation, the authors introduce the subsequent chapters in the book in terms of how each chapter, including this one, contributes new insights to the broader project of eliciting the issues and implications attendant on researching contemporary social capital and social enterprise. This project is crucial if we are to understand the ways in which social capital and social enterprise can work sustainably and transformatively with variously marginalised and vulnerable groups in our societies. It is vital also for understanding the ways that such work is constrained and limited in its effectiveness
- …