1,709 research outputs found

    Rising stars in information and communication technology

    Get PDF
    The quest for more efficiency and security is reflected in the economy as a whole, but especially in the product and process innovations in information and communication technology (ICT). We examine the ten concepts considered to have the brightest prospects in the business segment in terms of their potential to gain widespread use during this decade. Out of these, the three most promising ICT approaches are biometrics, open-source software and radio tagging (RFID).internet telephony (VoIP), advanced mobile radio technology (WLAN, UMTS, WiMax), biometrics, quantum cryptography, Model information and communication technology (ICT), Driven Archi-tecture (MDA), decentralised storage (ILM), decentralised data process-ing (grid computing), open-source software, outsourcing, and radio tag-ging (RFID)

    Accessing Antecedents and Outcomes of RFID Implementation in Health Care

    Get PDF
    This research first conceptualizes, develops, and validates four constructs for studying RFID in health care, including Drivers (Internal and External), Implementation Level (Clinical Focus and Administrative Focus), Barriers (Cost Issues, Lack of Understanding, Technical Issues, and Privacy and Security Concerns), and Benefits (Patient Care, Productivity, Security and Safety, Asset Management, and Communication). Data for the study were collected from 88 health care organizations and the measurement scales were validated using structural equation modeling. Second, a framework is developed to discuss the causal relationships among the above mentioned constructs. It is found that Internal Drivers are positively related to Implementation Level, which in turn is positively related to Benefits and Performance. In addition, Barriers are found to be positively related to Implementation Level, which is in contrast to the originally proposed negative relationship. The research also compares perception differences regarding RFID implementation among the non-implementers, future implementers, and current implementers of RFID. It is found that both future implementers and current implementers consider RFID barriers to be lower and benefits to be higher compared to the non-implementers. This paper ends with our research implications, limitations and future research

    First experiences with Personal Networks as an enabling platform for service providers

    Get PDF
    By developing demonstrators and performing small-scale user trials, we found various opportunities and pitfalls for deploying personal networks (PNs) on a commercial basis. The demonstrators were created using as many as possible legacy devices and proven technologies. They deal with applications in the health sector, home services, tourism, and the transportation sector. This paper describes the various architectures and our experiences with the end users and the technology. We conclude that context awareness, service discovery, and content management are very important in PNs and that a personal network provider role is necessary to realize these functions under the assumptions we made. The PNPay Travel demonstrator suggests that PN service platforms provide an opportunity to develop true trans-sector services

    Manufacturing industry developments - 2004/05; Audit risk alerts

    Get PDF
    https://egrove.olemiss.edu/aicpa_indev/1140/thumbnail.jp

    Security Applications for Converging Technologies - Impact on the Constitutional State and the Legal order

    Get PDF
    In this study we investigate the impact of converging technologies on legal practice and criminology in a forward looking study intended for practitioners and policy makers in the field of legislation, crime prevention, and law enforcement. We look at a 15 years timeframe and discuss the scientific and technical progress in various domains as well as the ethical, legal, and policy dilemmas involved.

    Internet of Things Strategic Research Roadmap

    Get PDF
    Internet of Things (IoT) is an integrated part of Future Internet including existing and evolving Internet and network developments and could be conceptually defined as a dynamic global network infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual “things” have identities, physical attributes, and virtual personalities, use intelligent interfaces, and are seamlessly integrated into the information network

    Emerging technologies for learning (volume 2)

    Get PDF

    Modality Mix of RFID Regulation

    Full text link
    This paper provides a general reflection on how law must manage the evolution oftechnology. By the example of radio frequency identification (RFID), it analyses the necessity ofRFID regulation based on Lessig’s four modalities law, norms, market and architecture. This papersuggests that a trade-off between or complementing of the four modalities is necessary for a holisticregulation of RFID. To support this claim, various topics of the draft recommendation on theimplementation of privacy, data protection and information security principles in RFID applicationsby the European Commission of February 2008 are cross-examined with and attributed to one ofthe four modalities. This paper concludes that the draft recommendation does not provide precisesupplementing legislation to justify its implementation. Many law-related issues of the draftrecommendation can be traded off against or complemented by the other three modalities norms,market and architecture

    ERP systems facilitating XBRL reporting and regulatory compliance

    Get PDF
    Today, the global economic environment requires that information is readily available across the supply chain (SC) and value chain and that the information is available in a costeffective manner. The information must be accurate, credible, timely, cost-efficient, reliable, traceable, pertinent, and possess data transparency. The information must be available to members within a particular organization, its vendors and customers, and outside governmental and regulatory agencies. All associated stakeholders and stockholders are entitled to the availability of trustworthy financial information to aid them in decision making, therefore, the controls regarding the data are critical for the compilation of the data. The Securities and Exchange Commission (SEC) reviews the financial report data a company submits on a yearly basis and this aids in the validity and credibility of the data, so that the ultimate end-user, who is the stockholder has the afforded protection from deception which is mandated and provided by the government

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
    • …
    corecore