50 research outputs found

    A BUSINESS-TO-BUSINESS PERSPECTIVE ON MOBILE APPLICATION STORES

    Get PDF
    Mobile devices, namely smart phones and tablets, have recently experienced remarkable proliferation. Beside private users, companies realize the potential of increasing the mobile productivity of their workforce. In this paper, we take a business-to-business perspective on mobile app stores by evaluating the potential of particular app stores for business-related apps. For this purpose, we first review the existing landscape of mobile app stores, and then assess their suitability for business-tobusiness purposes. For some mobile platforms there already exist alternatives to the official app store. We also judge if they could serve as model for B2B purposes. Overall, we highlight three distinct cases from this analysis: the “Google case”, the “Apple case” and the “Web case”. For all of them we show how the distribution of B2B could fit in. We then take a look at the specific aspects that should be considered for designing app stores for B2B needs. We suggest concepts for realizing these aspects. Some of the aspects, however, remain open. We discuss them and propose considerable potential for further work

    If Erring is Human, is System Use Divine?:Omission Errors During Post-Adoptive System Use

    Get PDF
    Our study contributes to the research on human error during IS use by studying the antecedents of the omission errors that occur during routine instances of computerized work. While attention lapses have been identified as the main mechanism leading to omission errors, we still know little about how such lapses come about during post-adoptive system use. To address this limitation, we draw our theoretical insights from theories of attention and prospective memory to illustrate how the different forms of system use carry the potential to explain patterns of human error. Accordingly, we distinguish between two forms of use history that can consist of features that are either related or unrelated to the execution of a focal task and examine their effects on the frequency of omission errors. We also examine the interaction effects of task variation on the aforementioned relationship. Our hypotheses are tested by analyzing log data associated with the use of a newly introduced mobile application in the context of a sailing sports event. Our results indicate that restricting one's system use on related task features reduces omission errors, whereas a use history based on unrelated task features produces the opposite effects. Further, task diversity positively moderates the relationship between a use history of unrelated features and omission errors, but has no significant moderating effect on the relationship between a use history of related features and omission errors. Our findings hold a number of implications for the literature on human error, and these are discussed alongside with the implications of our study for practitioners and system design

    Toward location-aware Web: extraction method, applications and evaluation

    Get PDF
    Location-based services (LBS) belong to one of the most popular types of services today. However, a recurring issue is that most of the content in LBS has to be created from scratch and needs to be explicitly tagged to locations, which makes existing Web content not directly usable for LBS. In this paper, we aim at making Web sites location-aware and feed this information to LBS. Our approach toward location-aware Web is threefold: First, we present a location extraction method: SALT. It receives Web sites as input and equips them with location tags. Compared to other approaches, SALT is capable of extracting locations with a precision up to the street level. Performance evaluations further show high applicability for practice. Second, we present three applications for SALT: Webnear.me, Local Browsing and Local Facebook. Webnear.me offers location-aware Web surfing through a mobile Web site and a smartphone app. Local Browsing adds the feature to browse by nearby tags, extracted from Web sites delivered by SALT. Local Facebook extends location tagging to social networks, allowing to run SALT on one's own and one's friends' timeline. Finally, we evaluate SALT for technology acceptance of Webnear.me through a formative user study. Through real user data, collected during a 3 months pilot field deployment of Webnear.me, we assess whether SALT is a proper instance of "location of a Web site”

    Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4

    Get PDF
    MAYO is a popular high-calorie condiment as well as an auspicious candidate in the ongoing NIST competition for additional post-quantum signature schemes achieving competitive signature and public key sizes. In this work, we present high-speed implementations of MAYO using the AVX2 and Armv7E-M instruction sets targeting recent x86 platforms and the Arm Cortex-M4. Moreover, the main contribution of our work is showing that MAYO can be even faster when switching from a bitsliced representation of keys to a nibble-sliced representation. While the bitsliced representation was primarily motivated by faster arithmetic on microcontrollers, we show that it is not necessary for achieving high performance on Cortex-M4. On Cortex-M4, we instead propose to implement the large matrix multiplications of MAYO using the Method of the Four Russians (M4R), which allows us to achieve better performance than when using the bitsliced approach. This results in up to 21% faster signing. For AVX2, the change in representation allows us to implement the arithmetic much faster using shuffle instructions. Signing takes up to 3.2x fewer cycles and key generation and verification enjoy similar speedups. This shows that MAYO is competitive with lattice-based signature schemes on x86 CPUs, and a factor of 2-6 slower than lattice-based signature schemes on Cortex-M4 (which can still be considered competitive)

    31st Annual Meeting and Associated Programs of the Society for Immunotherapy of Cancer (SITC 2016) : part two

    Get PDF
    Background The immunological escape of tumors represents one of the main ob- stacles to the treatment of malignancies. The blockade of PD-1 or CTLA-4 receptors represented a milestone in the history of immunotherapy. However, immune checkpoint inhibitors seem to be effective in specific cohorts of patients. It has been proposed that their efficacy relies on the presence of an immunological response. Thus, we hypothesized that disruption of the PD-L1/PD-1 axis would synergize with our oncolytic vaccine platform PeptiCRAd. Methods We used murine B16OVA in vivo tumor models and flow cytometry analysis to investigate the immunological background. Results First, we found that high-burden B16OVA tumors were refractory to combination immunotherapy. However, with a more aggressive schedule, tumors with a lower burden were more susceptible to the combination of PeptiCRAd and PD-L1 blockade. The therapy signifi- cantly increased the median survival of mice (Fig. 7). Interestingly, the reduced growth of contralaterally injected B16F10 cells sug- gested the presence of a long lasting immunological memory also against non-targeted antigens. Concerning the functional state of tumor infiltrating lymphocytes (TILs), we found that all the immune therapies would enhance the percentage of activated (PD-1pos TIM- 3neg) T lymphocytes and reduce the amount of exhausted (PD-1pos TIM-3pos) cells compared to placebo. As expected, we found that PeptiCRAd monotherapy could increase the number of antigen spe- cific CD8+ T cells compared to other treatments. However, only the combination with PD-L1 blockade could significantly increase the ra- tio between activated and exhausted pentamer positive cells (p= 0.0058), suggesting that by disrupting the PD-1/PD-L1 axis we could decrease the amount of dysfunctional antigen specific T cells. We ob- served that the anatomical location deeply influenced the state of CD4+ and CD8+ T lymphocytes. In fact, TIM-3 expression was in- creased by 2 fold on TILs compared to splenic and lymphoid T cells. In the CD8+ compartment, the expression of PD-1 on the surface seemed to be restricted to the tumor micro-environment, while CD4 + T cells had a high expression of PD-1 also in lymphoid organs. Interestingly, we found that the levels of PD-1 were significantly higher on CD8+ T cells than on CD4+ T cells into the tumor micro- environment (p < 0.0001). Conclusions In conclusion, we demonstrated that the efficacy of immune check- point inhibitors might be strongly enhanced by their combination with cancer vaccines. PeptiCRAd was able to increase the number of antigen-specific T cells and PD-L1 blockade prevented their exhaus- tion, resulting in long-lasting immunological memory and increased median survival

    Mobile Advertisements in Disguise and Their Effect on Trust Propensity and Intention to Use

    Get PDF
    Advertisements (ads) are prevalent in almost anyone’s life. In exchange for consuming ads, the user gets free access to online and mobile platforms, thus constituting a fragile symbiosis between platform, user and marketer. We shed light on a critical factor that affects this fragility: advertisements in disguise, also called covert advertisements. By varying the discernibility of ads with visual indications and intrusiveness, we measure the perceived trust propensity and the perceived intention to use. The concerning application is a novel, location-based iPhone app – Local FAQ - that allows to ask and to answer questions about nearby places. Our methodology is threefold: first, two focus group discussions each with 6 smartphone users influenced the design and functionality of the Local FAQ app, and raised concern in privacy and trust propensity in mobile, location-based apps. Second, an exploratory survey with 46 respondents aimed at substantiating some focus group claims. Third, a systematic survey with 114 respondents manipulates ad discernibility and measures variations of trust propensity and intention to use. Regression analysis shows that trust and intention to use fall the more intrusive the ads are. Further, results indicate that covert ads may not lead to loss of trust if they are informative. After detection that they were actually ads, they however still lead to loss of trust

    Toward location-aware Web:extraction method, applications and evaluation

    No full text
    Location-based services (LBS) belong to one of the most popular types of services today. However, a recurring issue is that most of the content in LBS has to be created from scratch and needs to be explicitly tagged to locations, which makes existing Web content not directly usable for LBS. In this paper, we aim at making Web sites location-aware and feed this information to LBS. Our approach toward location-aware Web is threefold: First, we present a location extraction method: SALT. It receives Web sites as input and equips them with location tags. Compared to other approaches, SALT is capable of extracting locations with a precision up to the street level. Performance evaluations further show high applicability for practice. Second, we present three applications for SALT: Webnear.me, Local Browsing and Local Facebook. Webnear.me offers location-aware Web surfing through a mobile Web site and a smartphone app. Local Browsing adds the feature to browse by nearby tags, extracted from Web sites delivered by SALT. Local Facebook extends location tagging to social networks, allowing to run SALT on one’s own and one’s friends’ timeline. Finally, we evaluate SALT for technology acceptance of Webnear.me through a formative user study. Through real user data, collected during a 3 months pilot field deployment of Webnear.me, we assess whether SALT is a proper instance of “location of a Web site”
    corecore