3,007 research outputs found

    WiFi Hot Spot Service Business for the Automotive and Oil Industries: A Competitive Analysis

    Get PDF
    While you refuel for gas, why not refuel for information or upload vehicle data, using a cheap wireless technology as WiFi? This paper analyzes in extensive detail the user segmentation by vehicle usage, service offering, and full business models from WiFi hot spot services delivered to and from vehicles (private, professional, public) around gas stations. Are also analyzed the parties which play a role in such services: authorization, provisioning and delivery, with all the dependencies modelled by attributed digraphs. Account is made of WiFi base station technical capabilities and costs. Five year financial models (CAPEX, OPEX), and data pertain to two possible service suppliers: multi-service oil companies, and mobile service operators (or MVNOs). Model optimization on the return-on-investment (R.O.I.) is carried out for different deployment scenarios, geographical coverage assumptions, as well as tariff structures. Comparison is also being made with public GPRS and 3G data services, as precursors to HSPA/LTE, and the effect of WiFi roaming is analyzed. Regulatory implications, including those dealing with public safety, are addressed. Analysis shows that due to manpower costs and marketing costs, suitable R.O.I. will not be achieved unless externalities are accounted for and innovative tariff structures are introduced. Open issues and further research are outlined. Further work is currently carried out with automotive electronics sector, wireless systems providers, wireless terminals platform suppliers, and vehicle manufacturers. Future relevance of this work is also discussed for the emerging electrical reloading grids for electrical vehicles.WiFi, Fuel Stations, Business Models, Oil Company, Mobile Operator, WiFi Services, Regulations, Professional Vehicles

    Business models for deployment and operation of femtocell networks; - Are new cooperation strategies needed for mobile operators?

    Get PDF
    In this paper we discuss different business models for deployment and operation of femtocell networks intended for provisioning of public mobile broad band access services. In these types of business cases the operators use femtocells in order to reduce investments in "more costly" macro networks since the traffic can be "offloaded" to "less costly" femtocell networks. This is in contrast to the many business cases presented in Femtoforum where femtocells mainly are discussed as a solution to improve indoor coverage for voice services in homes and small offices, usually for closed user groups The main question discussed in this paper is if "operators need to consider new forms of cooperation strategies in order to enable large scale deployment of femtocells for public access?" By looking into existing solutions for indoor wireless access services we claim that the answer is both "Yes" and "No". No, since many types of cooperation are already in place for indoor deployment. Yes, because mobile operators need to re-think the femtocell specific business models, from approaches based on singe operator networks to different forms of cooperation involving multi-operator solutions, e.g. roaming and network sharing. --

    Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces

    Get PDF
    Physical retailers, who once led the way in tracking with loyalty cards and `reverse appends', now lag behind online competitors. Yet we might be seeing these tables turn, as many increasingly deploy technologies ranging from simple sensors to advanced emotion detection systems, even enabling them to tailor prices and shopping experiences on a per-customer basis. Here, we examine these in-store tracking technologies in the retail context, and evaluate them from both technical and regulatory standpoints. We first introduce the relevant technologies in context, before considering privacy impacts, the current remedies individuals might seek through technology and the law, and those remedies' limitations. To illustrate challenging tensions in this space we consider the feasibility of technical and legal approaches to both a) the recent `Go' store concept from Amazon which requires fine-grained, multi-modal tracking to function as a shop, and b) current challenges in opting in or out of increasingly pervasive passive Wi-Fi tracking. The `Go' store presents significant challenges with its legality in Europe significantly unclear and unilateral, technical measures to avoid biometric tracking likely ineffective. In the case of MAC addresses, we see a difficult-to-reconcile clash between privacy-as-confidentiality and privacy-as-control, and suggest a technical framework which might help balance the two. Significant challenges exist when seeking to balance personalisation with privacy, and researchers must work together, including across the boundaries of preferred privacy definitions, to come up with solutions that draw on both technology and the legal frameworks to provide effective and proportionate protection. Retailers, simultaneously, must ensure that their tracking is not just legal, but worthy of the trust of concerned data subjects.Comment: 10 pages, 1 figure, Proceedings of the PETRAS/IoTUK/IET Living in the Internet of Things Conference, London, United Kingdom, 28-29 March 201

    Beyond Microsoft: Intellectual Property, Peer Production and the Law’s Concern with Market Dominance.

    Get PDF

    Knowing Your Population: Privacy-Sensitive Mining of Massive Data

    Full text link
    Location and mobility patterns of individuals are important to environmental planning, societal resilience, public health, and a host of commercial applications. Mining telecommunication traffic and transactions data for such purposes is controversial, in particular raising issues of privacy. However, our hypothesis is that privacy-sensitive uses are possible and often beneficial enough to warrant considerable research and development efforts. Our work contends that peoples behavior can yield patterns of both significant commercial, and research, value. For such purposes, methods and algorithms for mining telecommunication data to extract commonly used routes and locations, articulated through time-geographical constructs, are described in a case study within the area of transportation planning and analysis. From the outset, these were designed to balance the privacy of subscribers and the added value of mobility patterns derived from their mobile communication traffic and transactions data. Our work directly contrasts the current, commonly held notion that value can only be added to services by directly monitoring the behavior of individuals, such as in current attempts at location-based services. We position our work within relevant legal frameworks for privacy and data protection, and show that our methods comply with such requirements and also follow best-practice

    Final report on dissemination, regulation, standardization, exploitation & training : D6.3

    Get PDF
    In D6.1 deliverable project dissemination, exploitation and training plans, as well as standardization & regulatory approach strategy was presented. The D6.2 reported on the necessary updates of these strategies and the actions taken by the partners in line with them, as well as the obtained results. In this D6.3 deliverable, a full set of project dissemination activities, standardization & regulatory contributions as well as an operator’s “cook book” outlining steps necessary for full deployment of ON functionality and services, are presented.Deliverable D6.3 del projecte OneFITPostprint (author’s final draft

    The Emerging WLAN-Infrastructure: Complement or Substitute?

    Get PDF
    • …
    corecore