1,022 research outputs found

    A Case Study on Mobilizing Business Process

    Get PDF

    End-user perspectives on the Adoption of Wireless Applications: Price of Convenience and a Model for Contextual Analysis

    Get PDF
    Information services delivered via wireless, portable communication devices continue to pervade our work and leisure spaces. While people are continuously bombarded with promises of newer and better ways to maintain contact with others and to have constant access to information, however, there remain a number of open issues that inhibit the potential for an open information society. The bidirectional influence between such wireless technologies and applications and their potential end-users, contributes to the development of both the technologies and applications and the social setting in which they are embedded. In this paper, we extend current studies of Information and Communications Technology (ICT) uptake by integrating interpretations of “ubiquitous computing” and its pervasion of everyday life. We draw upon findings from a range of IS research to structure our future studies of adoption issues in relation to a variety of wireless application cases. We show that, while some “traditional” IS/IT dimensions of uptake still hold, there are now a variety of other “non- utilitarian (hedonic)” factors that developers and designers need to take into account. We conclude by proposing a research model – expanded from model of user acceptability and product uptake, a descriptive framework based on the “Price of Convenience”(Ng-Kruelle, Swatman, Rebne and Hampe 2002)

    Standards, policies and cultural pluralism promoting strategies for achieving competitive advantage supporting the future of Information Technology

    Get PDF
    As standards and policies in Information Technology continue to develop globally, the Internet is becoming the primary vehicle for worldwide electronic commerce. Various organizations such as the ITU (International Telecommunication Union), GIIC (Global Information Infrastructure Commission), NII (National Information Infrastructure), NIST (National Institute of Standards and Technology), OECD (Organization for Economic Cooperation and Development), IEEE (Institute of Electrical and Electronics Engineers,) and the European Union, to name just a few, have strived to develop standards and policies to promote and protect consumers and organizations that conduct business on the Internet. Many challenges exist, such as computing standards, taxation, security, privacy and currency standards. These challenges must be resolved in order to ensure a level playing field. Strategies in Information Technology have allowed companies and individuals to challenge former ways of conducting business by employing radical technologies based on technological standards promoting global electronic commerce. For a company to position itself to envision radical technology, it must focus on the future. This forward thinking must be a part of a company\u27s corporate culture so that technological opportunism can be developed. Without radical technology, companies do not stand a chance in the information age. Although radical technologies have promoted technological and strategic opportunism enabling and supporting global electronic commerce, there are non-technological factors, such as cultural pluralism and other human factors that will determine the survivability of a country or company regardless of its technological innovations. These non-technological factors bring to light the notion that technology in and of itself satisfies only a subset of requirements needed for companies and countries to be competitive in the future global marketplace. Various traditional schools of thought on competitive advantage and strategy will be examined as well as the role of standards and open systems in reference to how it will play out in supporting the future of technology. Standards based organizations will establish and set the standards in promoting the methods in which technology will manifest itself. Doing this will support radical technology fostering innovation. Cultural pluralism coupled with these standards will support the future of international commerce and technological innovation because it will draw on new ideas and techniques in research and development from other cultures. The strategic alignment model will be used to internally aligned business with IT in terms of creating synergies as well as creating iterations which will take advantage of multiculturalism. Japan\u27s technological innovations, their use of technology transfer, and their strategies in research and development employing scientists and engineers worldwide, historically has shown that cultural pluralism has allowed them to excel in the technological playing field despite wars and natural disasters. These components will play a more significant role as technology shifts into a new non-technological dimension promoting the future global innovation. The future of technology will rely more on cultural pluralism and less on technology itself. This new wave of technological innovation will occur once the playing field has been set by government involvement, global standards, global access to the internet and it\u27s technologies, and most importantly, corporations and individuals accepting cultural pluralism

    Development of an M-commerce security framework

    Get PDF
    Research shows how M-Commerce has managed to find its way to previously inaccessible parts of the world as a major Information and Communication Technologies (ICT) tool for development due to widespread introduction of mobile phones in remote areas. M-Commerce has offered valuable advantages: anytime, anywhere, more personal, more location-aware, more context-aware, more age aware, always online and instant connectivity. But this is not without its problems, of which security is high on the list. The security issues span the whole M-Commerce spectrum, from the top to the bottom layer of the OSI network protocol stack, from machines to humans. This research proposes a threat-mitigation modular framework to help address the security issues lurking in M-Commerce systems being used by marginalised rural community members. The research commences with a literature survey carried out to establish security aspects related to M-Commerce and to determine requirements for a security framework. The framework classifies M-Commerce security threat-vulnerability-risks into four levels: human behaviour and mobile device interaction security, mobile device security, M-Commerce access channel security, wireless network access security. This is followed by a review of the supporting structures or related frameworks that the proposed framework could leverage to address security issues on M-Commerce systems as ICT4D initiatives. The proposed security framework based on the requirements discovered is then presented. As a proof-of-concept, a case study was undertaken at the Siyakhula Living Lab at Dwesa in the Eastern Cape province of South Africa in order to validate the components of the proposed framework. Following the application of the framework in a case study, it can be argued that the proposed security framework allows for secure transacting by marginalised users using M-Commerce initiatives. The security framework is therefore useful in addressing the identified security requirements of M-Commerce in ICT4D contexts

    An Autonomic Cross-Platform Operating Environment for On-Demand Internet Computing

    Get PDF
    The Internet has evolved into a global and ubiquitous communication medium interconnecting powerful application servers, diverse desktop computers and mobile notebooks. Along with recent developments in computer technology, such as the convergence of computing and communication devices, the way how people use computers and the Internet has changed people´s working habits and has led to new application scenarios. On the one hand, pervasive computing, ubiquitous computing and nomadic computing become more and more important since different computing devices like PDAs and notebooks may be used concurrently and alternately, e.g. while the user is on the move. On the other hand, the ubiquitous availability and pervasive interconnection of computing systems have fostered various trends towards the dynamic utilization and spontaneous collaboration of available remote computing resources, which are addressed by approaches like utility computing, grid computing, cloud computing and public computing. From a general point of view, the common objective of this development is the use of Internet applications on demand, i.e. applications that are not installed in advance by a platform administrator but are dynamically deployed and run as they are requested by the application user. The heterogeneous and unmanaged nature of the Internet represents a major challenge for the on demand use of custom Internet applications across heterogeneous hardware platforms, operating systems and network environments. Promising remedies are autonomic computing systems that are supposed to maintain themselves without particular user or application intervention. In this thesis, an Autonomic Cross-Platform Operating Environment (ACOE) is presented that supports On Demand Internet Computing (ODIC), such as dynamic application composition and ad hoc execution migration. The approach is based on an integration middleware called crossware that does not replace existing middleware but operates as a self-managing mediator between diverse application requirements and heterogeneous platform configurations. A Java implementation of the Crossware Development Kit (XDK) is presented, followed by the description of the On Demand Internet Computing System (ODIX). The feasibility of the approach is shown by the implementation of an Internet Application Workbench, an Internet Application Factory and an Internet Peer Federation. They illustrate the use of ODIX to support local, remote and distributed ODIC, respectively. Finally, the suitability of the approach is discussed with respect to the support of ODIC

    Planning and dynamic spectrum management in heterogeneous mobile networks with QoE optimization

    Get PDF
    The radio and network planning and optimisation are continuous processes that do not end after the network has been launched. To achieve the best trade-offs, especially between quality and costs, operators make use of several coverage and capacity enhancement methods. The research from this thesis proposes methods such as the implementation of cell zooming and Relay Stations (RSs) with dynamic sleep modes and Carrier Aggregation (CA) for coverage and capacity enhancements. Initially, a survey is presented on ubiquitous mesh networks implementation scenarios and an updated characterization of requirements for services and applications is proposed. The performance targets for the key parameters, delay, delay variation, information loss and throughput have been addressed for all types of services. Furthermore, with the increased competition, mobile operator’s success does not only depend on how good the offered Quality of Service (QoS) is, but also if it meets the end user’s expectations, i.e., Quality of Experience (QoE). In this context, a model for the mapping between QoS parameters and QoE has been proposed for multimedia traffic. The planning and optimization of fixed Worldwide Interoperability for Microwave Access (WiMAX) networks with RSs in conjunction with cell zooming has been addressed. The challenging case of a propagation measurement-based scenario in the hilly region of Covilhã has been considered. A cost/revenue function has been developed by taking into account the cost of building and maintaining the infrastructure with the use of RSs. This part of the work also investigates the energy efficiency and economic implications of the use of power saving modes for RSs in conjunction with cell zooming. Assuming that the RSs can be switched-off or zoomed out to zero in periods when the traffic exchange is low, such as nights and weekends, it has been shown that energy consumption may be reduced whereas cellular coverage and capacity, as well as economic performance may be improved. An integrated Common Radio Resource Management (iCRRM) entity is proposed that implements inter-band CA by performing scheduling between two Long Term Evolution – Advanced (LTE-A) Component Carriers (CCs). Considering the bandwidths available in Portugal, the 800 MHz and 2.6 GHz CCs have been considered whilst mobile video traffic is addressed. Through extensive simulations it has been found that the proposed multi-band schedulers overcome the capacity of LTE systems without CA. Result shown a clear improvement of the QoS, QoE and economic trade-off with CA

    Converged digital TV services: the role of middleware and future directions of interactive television

    Get PDF
    The subject of the future of the interactive Television medium has become a topic of great interest to the academic and industrial communities particularly since in the recent years there has been a dramatic increase in the pace of innovation of convergence of digital TV systems and services. The purpose of this paper is to provide a brief overview of what we know as digital TV converged services, to present and categorise the digital Television middleware technologies that contributed to it, and to present possible future trends and directions. A new Television era of converged wireless and mobile content delivery, user-authored content, multimodal interaction, intelligent personalisation, smart space awareness, and 3D content sensations is foreseen, creating ambient and immersive experiences

    M-Business: Economy Driver or a Mess?

    Get PDF
    Reports about mobile wireless technology in the media may be confusing. While we know that the telecommunication industry is in distress, we also observe a phenomenal, indeed unprecedented explosion of the use of mobile wireless devices and services all over the globe. This paper presents a balanced introduction to wireless technology including devices, mobile operating systems, and communication protocols. It discusses standardization efforts, technology evolution paths, and several new and potentially disruptive technologies, some still in the research stage. The paper lists leading global wireless service providers in terms of the number of domestic subscribers and presents an analysis of the six U.S. national operators including their strengths and weaknesses. Only four of them are profitable now. Although the consumer market currently dictates technology evolution, several examples of successful business applications of wireless mobile technology are presented. Finally, the question presented in the title is addressed
    corecore