4,049 research outputs found
Intention to use mobile customer relationship management systems
© Emerald Group Publishing Limited. Purpose - The purpose of this paper is to investigate the behavioral intentions of business-to-business (B2B) sales managers to use mobile customer relationship management (CRM) systems in the course of their day-to-day activities. Design/methodology/approach - An extended Technology Acceptance Model (TAM) of mobile CRM system adoption is developed and tested with data from 105 international sales managers representing five B2B companies. Findings - The study extends the TAM framework with three additional constructs derived from mobile technology and sales force automation literature, namely personal innovativeness in the domain of IT, perceived risk, and perceived reachability. The model demonstrates that personal innovativeness and perceived reachability have significant effects on the TAM framework. Research limitations/implications - The relatively small sample size limits the generalization of the results. Practical implications - Sales managers' intention to adopt mobile CRM can be explained by the extended TAM framework. Understanding the key factors that influence intention to adopt a mobile CRM system will aid companies in implementing it among their sales force. Companies willing to foster adoption of a mobile CRM system among the sales force could focus on communicating the usefulness of using the system and benefits gained from enhanced reachability. Recruiting sales people with strong personal innovativeness is beneficial. Originality/value - This study responds the calls for studies on mobile platforms and on the use of mobile B2B applications in sales force management. It is among the first attempts to incorporate variables derived from mobile technology acceptance literature among the sales force into the TAM framework, to better explain acceptance of mobile CRM systems
A personal distributed environment for future mobile systems
A Personal Distributed Environment (PDE) embraces a user-centric view of communications that take place against a backdrop of multiple user devices, each with its distinct capabilities, in physically separate locations. This paper provides an overview of a Personal Distributed Environment and some of the research issues related to the implementation of the PDE concept that are being considered in the current Mobile VCE work programme
Added Value-based Approach to Analyze Electronic Commerce and Mobile Commerce Business Models
In this contribution we propose to apply the theory of informational added values (IAV) on
electronic commerce (EC) and mobile commerce (MC). We state that for the success of electronic and mobile offers it is not sufficient to merely make a conventional offer available with new media. Instead, the use of electronic and mobile communication technology is only remunerative if it results in obtaining distinct supplementary IAV. This depends on the exploitation of certain faculties of the used technology. For EC, we call these the four electronic added values (EAV): reduction of temporal and certain spatial limitations, reduction of technical limitations, multi-mediality of access and egalitarian access. For MC, we call these the four mobile added values (MAV): ubiquity, contextsensitivity,identifying functions and command and control functions. We can find EAV and MAV as typical properties of EC or MC applications. EAV are the basis for the superiority of Internet applications compared with offline solutions. The relationship between the separate EAV and IAV will be explained and analyzed. Proceeding analogously for mobile applications, we analyze the relationship between MAV and resulting IAV. The outcome is an extension of the theory of informational added values with the concept of electronic and mobile added values. This allows for an application of the theory to both EC and MC in order to analyze and qualitatively evaluate any given business model. For determining its crucial added value we have to identify the EAV/MAV which are capitalized and can deduce the IAV resulting for each party involved. The concept put forward is a suggestion to approach business models, with the focus on typical evaluation criteria for Internet/mobile business models. It is also suitable to compare different business models and to put their added value for the involved parties in a context. In this way, objective criteria are established reducing subjectivity and allowing to make certain predictions. The paper ends with a critical review and the perspective for further research
Modelling and simulation of a biometric identity-based cryptography
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols
A Multi-perspective Analysis of Carrier-Grade NAT Deployment
As ISPs face IPv4 address scarcity they increasingly turn to network address
translation (NAT) to accommodate the address needs of their customers.
Recently, ISPs have moved beyond employing NATs only directly at individual
customers and instead begun deploying Carrier-Grade NATs (CGNs) to apply
address translation to many independent and disparate endpoints spanning
physical locations, a phenomenon that so far has received little in the way of
empirical assessment. In this work we present a broad and systematic study of
the deployment and behavior of these middleboxes. We develop a methodology to
detect the existence of hosts behind CGNs by extracting non-routable IP
addresses from peer lists we obtain by crawling the BitTorrent DHT. We
complement this approach with improvements to our Netalyzr troubleshooting
service, enabling us to determine a range of indicators of CGN presence as well
as detailed insights into key properties of CGNs. Combining the two data
sources we illustrate the scope of CGN deployment on today's Internet, and
report on characteristics of commonly deployed CGNs and their effect on end
users
The Transitivity of Trust Problem in the Interaction of Android Applications
Mobile phones have developed into complex platforms with large numbers of
installed applications and a wide range of sensitive data. Application security
policies limit the permissions of each installed application. As applications
may interact, restricting single applications may create a false sense of
security for the end users while data may still leave the mobile phone through
other applications. Instead, the information flow needs to be policed for the
composite system of applications in a transparent and usable manner. In this
paper, we propose to employ static analysis based on the software architecture
and focused data flow analysis to scalably detect information flows between
components. Specifically, we aim to reveal transitivity of trust problems in
multi-component mobile platforms. We demonstrate the feasibility of our
approach with Android applications, although the generalization of the analysis
to similar composition-based architectures, such as Service-oriented
Architecture, can also be explored in the future
Temporal Networks
A great variety of systems in nature, society and technology -- from the web
of sexual contacts to the Internet, from the nervous system to power grids --
can be modeled as graphs of vertices coupled by edges. The network structure,
describing how the graph is wired, helps us understand, predict and optimize
the behavior of dynamical systems. In many cases, however, the edges are not
continuously active. As an example, in networks of communication via email,
text messages, or phone calls, edges represent sequences of instantaneous or
practically instantaneous contacts. In some cases, edges are active for
non-negligible periods of time: e.g., the proximity patterns of inpatients at
hospitals can be represented by a graph where an edge between two individuals
is on throughout the time they are at the same ward. Like network topology, the
temporal structure of edge activations can affect dynamics of systems
interacting through the network, from disease contagion on the network of
patients to information diffusion over an e-mail network. In this review, we
present the emergent field of temporal networks, and discuss methods for
analyzing topological and temporal structure and models for elucidating their
relation to the behavior of dynamical systems. In the light of traditional
network theory, one can see this framework as moving the information of when
things happen from the dynamical system on the network, to the network itself.
Since fundamental properties, such as the transitivity of edges, do not
necessarily hold in temporal networks, many of these methods need to be quite
different from those for static networks
- …