7,432 research outputs found

    Using big data for customer centric marketing

    Get PDF
    This chapter deliberates on “big data” and provides a short overview of business intelligence and emerging analytics. It underlines the importance of data for customer-centricity in marketing. This contribution contends that businesses ought to engage in marketing automation tools and apply them to create relevant, targeted customer experiences. Today’s business increasingly rely on digital media and mobile technologies as on-demand, real-time marketing has become more personalised than ever. Therefore, companies and brands are striving to nurture fruitful and long lasting relationships with customers. In a nutshell, this chapter explains why companies should recognise the value of data analysis and mobile applications as tools that drive consumer insights and engagement. It suggests that a strategic approach to big data could drive consumer preferences and may also help to improve the organisational performance.peer-reviewe

    Incentive Mechanisms for Participatory Sensing: Survey and Research Challenges

    Full text link
    Participatory sensing is a powerful paradigm which takes advantage of smartphones to collect and analyze data beyond the scale of what was previously possible. Given that participatory sensing systems rely completely on the users' willingness to submit up-to-date and accurate information, it is paramount to effectively incentivize users' active and reliable participation. In this paper, we survey existing literature on incentive mechanisms for participatory sensing systems. In particular, we present a taxonomy of existing incentive mechanisms for participatory sensing systems, which are subsequently discussed in depth by comparing and contrasting different approaches. Finally, we discuss an agenda of open research challenges in incentivizing users in participatory sensing.Comment: Updated version, 4/25/201

    Do Mobile App Providers Try Enough to Protect Users’ Privacy? – a Content Analysis of Mobile App Privacy Policies

    Get PDF
    Privacy policies are widely used to draw clear image of risks to users’ personal information in different contexts such as mobile apps. Nonetheless, many believe privacy policies are ineffective tools to notify and aware users about possible risks to information privacy merely because most users have a very low tendency to go through privacy policies to read and comprehend them. Due to intimacy of mobile apps, much of personal information disclosed to them are at risk. Specially, when mobile app users share sensitive personal information to apps chance of privacy violation and consequent risks are higher. It is not only important to understand how mobile developers practically implement a contract to protect users’ privacy based on users’ preferences but also crucial to examine the role of sensitivity of information on developers’ emphasis on different aspects of privacy. This research focuses on two aspects to understand the circumstance users experience when privacy policies are presented: efforts users have to make to read and understand privacy policies in terms of readability and length of statements, and developers’ emphasis on aspects of information privacy with respect to sensitivity of information. To elucidate easiness of reading privacy policy statements, readability and length are calculated. Through the lens of framing concept of prospect theory, this study investigates the information sensitivity level effect on developers’ emphasis on privacy dimensions. Three mobile app categories deal with different levels of sensitive data are health, navigation, and game apps. To differentiate between emphasis on different privacy dimensions when information sensitivity differs, a text mining method is developed in R to analyze the weights of four key privacy dimensions (collection, secondary use, improper access, and error). We downloaded 90 unique mobile app privacy policies. Readability calculations reveal that users should have a minimum of 12 years of secondary education to easily understand privacy policies. The average length of privacy policies is at least 1900 words, which hinders a thorough reading. ANOVA results show a significant difference between secondary uses of information in app privacy policies dealing with higher sensitive data. In addition, the findings demonstrate collection is more emphasized in health than game app privacy policies but do not find any significant difference between improper access dimensions. This study has made two key contributions. First, by building upon the framing concept of prospect theory, this research provides an effective framework to understand the organizational perspective of privacy concerns. Second, the results demonstrate the information sensitivity level is important for measuring privacy concerns

    UNDERSTANDING USER PERCEPTIONS AND PREFERENCES FOR MASS-MARKET INFORMATION SYSTEMS – LEVERAGING MARKET RESEARCH TECHNIQUES AND EXAMPLES IN PRIVACY-AWARE DESIGN

    Get PDF
    With cloud and mobile computing, a new category of software products emerges as mass-market information systems (IS) that addresses distributed and heterogeneous end-users. Understanding user requirements and the factors that drive user adoption are crucial for successful design of such systems. IS research has suggested several theories and models to explain user adoption and intentions to use, among them the IS Success Model and the Technology Acceptance Model (TAM). Although these approaches contribute to theoretical understanding of the adoption and use of IS in mass-markets, they are criticized for not being able to drive actionable insights on IS design as they consider the IT artifact as a black-box (i.e., they do not sufficiently address the system internal characteristics). We argue that IS needs to embrace market research techniques to understand and empirically assess user preferences and perceptions in order to integrate the "voice of the customer" in a mass-market scenario. More specifically, conjoint analysis (CA), from market research, can add user preference measurements for designing high-utility IS. CA has gained popularity in IS research, however little guidance is provided for its application in the domain. We aim at supporting the design of mass-market IS by establishing a reliable understanding of consumer’s preferences for multiple factors combing functional, non-functional and economic aspects. The results include a “Framework for Conjoint Analysis Studies in IS” and methodological guidance for applying CA. We apply our findings to the privacy-aware design of mass-market IS and evaluate their implications on user adoption. We contribute to both academia and practice. For academia, we contribute to a more nuanced conceptualization of the IT artifact (i.e., system) through a feature-oriented lens and a preference-based approach. We provide methodological guidelines that support researchers in studying user perceptions and preferences for design variations and extending that to adoption. Moreover, the empirical studies for privacy- aware design contribute to a better understanding of the domain specific applications of CA for IS design and evaluation with a nuanced assessment of user preferences for privacy-preserving features. For practice, we propose guidelines for integrating the voice of the customer for successful IS design. -- Les technologies cloud et mobiles ont fait Ă©merger une nouvelle catĂ©gorie de produits informatiques qui s’adressent Ă  des utilisateurs hĂ©tĂ©rogĂšnes par le biais de systĂšmes d'information (SI) distribuĂ©s. Les termes “SI de masse” sont employĂ©s pour dĂ©signer ces nouveaux systĂšmes. Une conception rĂ©ussie de ceux-ci passe par une phase essentielle de comprĂ©hension des besoins et des facteurs d'adoption des utilisateurs. Pour ce faire, la recherche en SI suggĂšre plusieurs thĂ©ories et modĂšles tels que le “IS Success Model” et le “Technology Acceptance Model”. Bien que ces approches contribuent Ă  la comprĂ©hension thĂ©orique de l'adoption et de l'utilisation des SI de masse, elles sont critiquĂ©es pour ne pas ĂȘtre en mesure de fournir des informations exploitables sur la conception de SI car elles considĂšrent l'artefact informatique comme une boĂźte noire. En d’autres termes, ces approches ne traitent pas suffisamment des caractĂ©ristiques internes du systĂšme. Nous soutenons que la recherche en SI doit adopter des techniques d'Ă©tude de marchĂ© afin de mieux intĂ©grer les exigences du client (“Voice of Customer”) dans un scĂ©nario de marchĂ© de masse. Plus prĂ©cisĂ©ment, l'analyse conjointe (AC), issue de la recherche sur les consommateurs, peut contribuer au dĂ©veloppement de systĂšme SI Ă  forte valeur d'usage. Si l’AC a gagnĂ© en popularitĂ© au sein de la recherche en SI, des recommandations quant Ă  son utilisation dans ce domaine restent rares. Nous entendons soutenir la conception de SI de masse en facilitant une identification fiable des prĂ©fĂ©rences des consommateurs sur de multiples facteurs combinant des aspects fonctionnels, non-fonctionnels et Ă©conomiques. Les rĂ©sultats comprennent un “Cadre de rĂ©fĂ©rence pour les Ă©tudes d'analyse conjointe en SI” et des recommandations mĂ©thodologiques pour l'application de l’AC. Nous avons utilisĂ© ces contributions pour concevoir un SI de masse particuliĂšrement sensible au respect de la vie privĂ©e des utilisateurs et nous avons Ă©valuĂ© l’impact de nos recherches sur l'adoption de ce systĂšme par ses utilisateurs. Ainsi, notre travail contribue tant Ă  la thĂ©orie qu’à la pratique des SI. Pour le monde universitaire, nous contribuons en proposant une conceptualisation plus nuancĂ©e de l'artefact informatique (c'est-Ă -dire du systĂšme) Ă  travers le prisme des fonctionnalitĂ©s et par une approche basĂ©e sur les prĂ©fĂ©rences utilisateurs. Par ailleurs, les chercheurs peuvent Ă©galement s'appuyer sur nos directives mĂ©thodologiques pour Ă©tudier les perceptions et les prĂ©fĂ©rences des utilisateurs pour diffĂ©rentes variations de conception et Ă©tendre cela Ă  l'adoption. De plus, nos Ă©tudes empiriques sur la conception d’un SI de masse sensible au respect de la vie privĂ©e des utilisateurs contribuent Ă  une meilleure comprĂ©hension de l’application des techniques CA dans ce domaine spĂ©cifique. Nos Ă©tudes incluent notamment une Ă©valuation nuancĂ©e des prĂ©fĂ©rences des utilisateurs sur des fonctionnalitĂ©s de protection de la vie privĂ©e. Pour les praticiens, nous proposons des lignes directrices qui permettent d’intĂ©grer les exigences des clients afin de concevoir un SI rĂ©ussi

    Medical data processing and analysis for remote health and activities monitoring

    Get PDF
    Recent developments in sensor technology, wearable computing, Internet of Things (IoT), and wireless communication have given rise to research in ubiquitous healthcare and remote monitoring of human\u2019s health and activities. Health monitoring systems involve processing and analysis of data retrieved from smartphones, smart watches, smart bracelets, as well as various sensors and wearable devices. Such systems enable continuous monitoring of patients psychological and health conditions by sensing and transmitting measurements such as heart rate, electrocardiogram, body temperature, respiratory rate, chest sounds, or blood pressure. Pervasive healthcare, as a relevant application domain in this context, aims at revolutionizing the delivery of medical services through a medical assistive environment and facilitates the independent living of patients. In this chapter, we discuss (1) data collection, fusion, ownership and privacy issues; (2) models, technologies and solutions for medical data processing and analysis; (3) big medical data analytics for remote health monitoring; (4) research challenges and opportunities in medical data analytics; (5) examples of case studies and practical solutions

    Mechatronics & the cloud

    Get PDF
    Conventionally, the engineering design process has assumed that the design team is able to exercise control over all elements of the design, either directly or indirectly in the case of sub-systems through their specifications. The introduction of Cyber-Physical Systems (CPS) and the Internet of Things (IoT) means that a design team’s ability to have control over all elements of a system is no longer the case, particularly as the actual system configuration may well be being dynamically reconfigured in real-time according to user (and vendor) context and need. Additionally, the integration of the Internet of Things with elements of Big Data means that information becomes a commodity to be autonomously traded by and between systems, again according to context and need, all of which has implications for the privacy of system users. The paper therefore considers the relationship between mechatronics and cloud-basedtechnologies in relation to issues such as the distribution of functionality and user privacy
    • 

    corecore