320 research outputs found

    Whither Wireless? Future Directions in Mobility

    Get PDF
    Wireless technology, including mobile phones, WiFi-enabled laptops, and Bluetooth-connected devices, has become entrenched in today’s society, and we can expect this technology and its mobile applications to continue to evolve in the future. But what direction will this evolution take? The purpose of this paper is to look into the future and forecast where wireless is heading, recognizing full well that making such forecasts is fraught with danger. This paper first places the rise of wireless in an historical context relative to other important information technologies of the past. It then reviews mobile issues first presented in 2002 and examines where these issues stand today. The paper next looks at other views about the future of wireless. With this background the paper makes six forecasts about the future of wireless networks, mobile phones, wireless communications standards, wireless security, ultimate commerce, and the wireless market. Drawing on these forecasts, the paper describes several research questions that could yield valuable results in the wireless arena. The paper concludes with one final forecast

    Academic Programs in E-Commerce: Why (or Why Not), How, and What

    Get PDF
    New academic programs in electronic commerce have been created at a number of schools, while at other schools such programs have been rejected. This situation raises questions about the rationale, development process, and course requirements for e-commerce programs. This paper examines these questions by first reviewing ecommerce programs in general and then examining the case of the development of e-commerce programs at one university. The paper identifies the critical success factors in the case

    A Taxonomy of Collaborative Applications

    Get PDF
    This paper presents a taxonomy of collaborative applications based on the temporal, spatial, and modal dimensions of communication between members of a workgroup. The taxonomy satisfies the characteristics of being concise, sufficiently inclusive, comprehensive, and extendible. The taxonomy can be used to analyze collaborative applications and software. Common collaborative applications and representative software are summarize

    Supporting End-Users\u27 Non-Consistent Views for Decision Support Applications

    Get PDF
    Database views typically are maintained to be consistent with the database at a specific point in time. There are applications, however, where users may prefer or require views which are not consistent with the database. Supporting non-consistent views provides better information for end-users in a decision support environment such as data warehousing. This paper examines thecharacteristics of non-consistent views and investigates their management

    Use of Mobile Technology and Smartphone Apps on the Camino de Santiago: A Comparison of American and European Pilgrims

    Get PDF
    Mobile technology and smartphone apps are increasingly being used by pilgrims on the Camino de Santiago, leading us to wonder what the role of technology is among Camino pilgrims and what impact technology has on the Camino experience. The purpose of this research is to explore these questions. To do so we conducted separate surveys of American and European pilgrims on the Camino de Santiago. This paper presents our analysis of the results of these surveys, focusing on differences between American and European pilgrims. The results showed that some mobile technologies are used extensively by pilgrims, although pilgrims did not consider the technology to be essential. They also showed that technology impacts the Camino experience in both positive and negative ways. Similarities and differences between American and European pilgrims were found in the results

    A method for taxonomy development and its application in information systems

    Get PDF

    Towards a Taxonomy of Information Security Policy Non-Compliance Behavior

    Get PDF
    Due to the increasing digitalization of our society, IT security professionals must implement even more effective security measures to meet the growing information security requirements of their organizations. To target and effectively deploy these measures in the best possible way, they must consider different types of behaviors that might lead to information security threats. Regarding this issue, current research offers little for clarity to security professionals when it comes to understanding and differentiating the various types of behavior. Therefore, this research aims to develop a taxonomy to classify different types of information security policy non-compliance behavior. Our results present a taxonomy with five dimensions, each containing mutually exclusive and collectively exhaustive characteristics. Our results provide a basis for a more specific analysis of different types of information security policy non-compliance behavior and can be used for more comprehensive development and analysis of appropriate security measures

    Issues in Mobile E-Commerce

    Get PDF
    Though many companies are still just beginning to grasp the potential uses and impacts of the Web and e-commerce, advances in technologies and their application continue. These advances often present various managerial and technological issues for individuals, companies, governments, and other entities. One significant area of technological advancement is the development of mobile e-commerce, which encompasses interactive business activities and processes related to a (potential) commercial transaction conducted through communications networks that interface with wireless devices. These systems provide the potential for organizations and users to perform various commerce-related tasks without regard to time and location (anytime from anywhere). This emerging mobile e-commerce environment presents a new set of issues. This paper identifies and categorizes some of these issues so that researchers, developers, and managers have a starting point for focusing their activities within the emerging m-commerce domain. Our examination finds categories that include technological (both client and infrastructure) issues, application issues, and areas for future research

    Taxonomy Development in Health-IT

    Get PDF
    Health-IT is attracting increasing attention in the research community. To understand the relevant constructs and the relationships among them, many authors present taxonomies or typologies for classifying different things in health-IT. Even with much attention to health-IT, there is still limited theoretical knowledge in this field. This may be attributed to our observation that the process of developing taxonomies has not been adequately addressed in the health-IT literature. In this paper we address this challenge by (a) a comprehensive literature survey that shows a high diversity in the field and that the related discussion of the structural nature has largely been ad hoc, (b) presenting methods for developing health-IT taxonomies, and, (c) contributing to the theoretical foundations of the field by a taxonomy for health-IT applications
    corecore