4,049 research outputs found

    Intention to use mobile customer relationship management systems

    Get PDF
    © Emerald Group Publishing Limited. Purpose - The purpose of this paper is to investigate the behavioral intentions of business-to-business (B2B) sales managers to use mobile customer relationship management (CRM) systems in the course of their day-to-day activities. Design/methodology/approach - An extended Technology Acceptance Model (TAM) of mobile CRM system adoption is developed and tested with data from 105 international sales managers representing five B2B companies. Findings - The study extends the TAM framework with three additional constructs derived from mobile technology and sales force automation literature, namely personal innovativeness in the domain of IT, perceived risk, and perceived reachability. The model demonstrates that personal innovativeness and perceived reachability have significant effects on the TAM framework. Research limitations/implications - The relatively small sample size limits the generalization of the results. Practical implications - Sales managers' intention to adopt mobile CRM can be explained by the extended TAM framework. Understanding the key factors that influence intention to adopt a mobile CRM system will aid companies in implementing it among their sales force. Companies willing to foster adoption of a mobile CRM system among the sales force could focus on communicating the usefulness of using the system and benefits gained from enhanced reachability. Recruiting sales people with strong personal innovativeness is beneficial. Originality/value - This study responds the calls for studies on mobile platforms and on the use of mobile B2B applications in sales force management. It is among the first attempts to incorporate variables derived from mobile technology acceptance literature among the sales force into the TAM framework, to better explain acceptance of mobile CRM systems

    A personal distributed environment for future mobile systems

    Get PDF
    A Personal Distributed Environment (PDE) embraces a user-centric view of communications that take place against a backdrop of multiple user devices, each with its distinct capabilities, in physically separate locations. This paper provides an overview of a Personal Distributed Environment and some of the research issues related to the implementation of the PDE concept that are being considered in the current Mobile VCE work programme

    Added Value-based Approach to Analyze Electronic Commerce and Mobile Commerce Business Models

    Get PDF
    In this contribution we propose to apply the theory of informational added values (IAV) on electronic commerce (EC) and mobile commerce (MC). We state that for the success of electronic and mobile offers it is not sufficient to merely make a conventional offer available with new media. Instead, the use of electronic and mobile communication technology is only remunerative if it results in obtaining distinct supplementary IAV. This depends on the exploitation of certain faculties of the used technology. For EC, we call these the four electronic added values (EAV): reduction of temporal and certain spatial limitations, reduction of technical limitations, multi-mediality of access and egalitarian access. For MC, we call these the four mobile added values (MAV): ubiquity, contextsensitivity,identifying functions and command and control functions. We can find EAV and MAV as typical properties of EC or MC applications. EAV are the basis for the superiority of Internet applications compared with offline solutions. The relationship between the separate EAV and IAV will be explained and analyzed. Proceeding analogously for mobile applications, we analyze the relationship between MAV and resulting IAV. The outcome is an extension of the theory of informational added values with the concept of electronic and mobile added values. This allows for an application of the theory to both EC and MC in order to analyze and qualitatively evaluate any given business model. For determining its crucial added value we have to identify the EAV/MAV which are capitalized and can deduce the IAV resulting for each party involved. The concept put forward is a suggestion to approach business models, with the focus on typical evaluation criteria for Internet/mobile business models. It is also suitable to compare different business models and to put their added value for the involved parties in a context. In this way, objective criteria are established reducing subjectivity and allowing to make certain predictions. The paper ends with a critical review and the perspective for further research

    Modelling and simulation of a biometric identity-based cryptography

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    A Multi-perspective Analysis of Carrier-Grade NAT Deployment

    Full text link
    As ISPs face IPv4 address scarcity they increasingly turn to network address translation (NAT) to accommodate the address needs of their customers. Recently, ISPs have moved beyond employing NATs only directly at individual customers and instead begun deploying Carrier-Grade NATs (CGNs) to apply address translation to many independent and disparate endpoints spanning physical locations, a phenomenon that so far has received little in the way of empirical assessment. In this work we present a broad and systematic study of the deployment and behavior of these middleboxes. We develop a methodology to detect the existence of hosts behind CGNs by extracting non-routable IP addresses from peer lists we obtain by crawling the BitTorrent DHT. We complement this approach with improvements to our Netalyzr troubleshooting service, enabling us to determine a range of indicators of CGN presence as well as detailed insights into key properties of CGNs. Combining the two data sources we illustrate the scope of CGN deployment on today's Internet, and report on characteristics of commonly deployed CGNs and their effect on end users

    The Transitivity of Trust Problem in the Interaction of Android Applications

    Full text link
    Mobile phones have developed into complex platforms with large numbers of installed applications and a wide range of sensitive data. Application security policies limit the permissions of each installed application. As applications may interact, restricting single applications may create a false sense of security for the end users while data may still leave the mobile phone through other applications. Instead, the information flow needs to be policed for the composite system of applications in a transparent and usable manner. In this paper, we propose to employ static analysis based on the software architecture and focused data flow analysis to scalably detect information flows between components. Specifically, we aim to reveal transitivity of trust problems in multi-component mobile platforms. We demonstrate the feasibility of our approach with Android applications, although the generalization of the analysis to similar composition-based architectures, such as Service-oriented Architecture, can also be explored in the future

    Temporal Networks

    Full text link
    A great variety of systems in nature, society and technology -- from the web of sexual contacts to the Internet, from the nervous system to power grids -- can be modeled as graphs of vertices coupled by edges. The network structure, describing how the graph is wired, helps us understand, predict and optimize the behavior of dynamical systems. In many cases, however, the edges are not continuously active. As an example, in networks of communication via email, text messages, or phone calls, edges represent sequences of instantaneous or practically instantaneous contacts. In some cases, edges are active for non-negligible periods of time: e.g., the proximity patterns of inpatients at hospitals can be represented by a graph where an edge between two individuals is on throughout the time they are at the same ward. Like network topology, the temporal structure of edge activations can affect dynamics of systems interacting through the network, from disease contagion on the network of patients to information diffusion over an e-mail network. In this review, we present the emergent field of temporal networks, and discuss methods for analyzing topological and temporal structure and models for elucidating their relation to the behavior of dynamical systems. In the light of traditional network theory, one can see this framework as moving the information of when things happen from the dynamical system on the network, to the network itself. Since fundamental properties, such as the transitivity of edges, do not necessarily hold in temporal networks, many of these methods need to be quite different from those for static networks
    • …
    corecore