30 research outputs found

    Privacy Management Contracts And Economics, Using Service Level Agreements (Sla)

    Get PDF
    Recognizing the importance of privacy management as a business process and a business support process, this paper proposes the use of service level agreements around privacy features, including qualitative and quantitative ones. It also casts privacy management into a business perspective with benefits and costs to either party in a process

    Discovering the Dynamics of Smart Business Networks

    Get PDF
    In an earlier paper ,was discussed the necessary evolution from smart business networks, as based on process need satisfaction and governance, into business genetics [1] based on strategic bonds or decay and opportunistic complementarities. This paper will describe an approach and diffusion algorithms whereby to discover the dynamics of emergent smart business network structures and their performance in view of collaboration patterns over time. Some real life early analyses of dynamics are discussed based on cases and date from the high tech sector. Lessons learnt from such cases are also given on overall smart network dynamics with respect to local interaction strategies, as modelled like in business genetics by individual partner profiles, goals and constraints. It shows the weakness of static "business operating systems", as well as the possibly destabilizing clustering effects amongst nodes linked to filtering, evaluation and own preferences

    A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    Get PDF
    This paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP mobility , security, and flow label. Three operational cash flow focussed performance indexes are defined for respectively an Internet operator or ISP, for the address domain owner, and for the end user. Special considerations are made and modeling changes for mobile Internet traffic. The effects of technical innovation in the Internet services and protocols is taken into account , as are special considerations for N.A.T. and content owners. A numerical case is provided which mimics the current state of the Internet network and services ,and around which sensitivity analysis can be carried out, or such that additional service models can be added. It establishes in the Case the relative advantages or disadvantages of IPv4 and IPv6 for each of the three main parties ,i.e. the ISP operator, the address domain owner, and the end use

    Smart business networks: architectural aspects and risks

    Get PDF
    This paper summarizes key attributes and the uniqueness of smart business networks [1], to propose thereafter an operational implementation architecture. It involves, amongst others, the embedding of business logic specific to a network of business partners, inside the communications control networks .It also involves the definition of business protocols between these partners and the joint management of some common functions relying on open networking standards. This implies some key paradigm changes, both of a technical and of a business nature, which are offered here for discussion via a set of propositions

    Privacy Metrics and Boundaries

    Get PDF
    This paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for examples of scenarios see [4]; -to define a notion of privacy boundary, and design it to encompass the set of information, behaviours, actions and processes which the privacy protector can accept to expose to an information gathering under an agreement with said party; everything outside the boundary is not acceptable and justifies not entering into the agreement; -to characterize the contribution of privacy enhancing technologies (PET). A full case is given with the qualitative and quantitative privacy metrics determination and envelope, i.e. a Cisco Inc. privacy agreement

    How and why communications industry suppliers get "squeezed out" now, and the next phase

    Get PDF
    The communications systems, terminals , software and deployment service, industries ,have undergone the past ten years a significant technological internal evolution and external revolution at customer end (such as Internet ,Mobile networks and terminals, Broadband,..). Very little management research has studied their financial survivability irrespective of changes in demand volumes in the present technological /organizational cycle . This paper analyzes the implications of genuine open mandated communications standards ,of higher product volumes , of very high R&D , of the larger use of sourced /purchased technologies ,and of contract manufacturing . The methodology used is equilibrium analyses . Two specific areas will be mentioned as examples .The paper also shows how eventually those industries in a later cycle will bounce back

    Mobile Service Affordability for the Needy, Addiction, and ICT Policy Implications

    Get PDF
    This paper links communications and media usage to social and household economics boundaries. It highlights that in present day society, communications and media are a necessity, but not always affordable, and that they furthermore open up for addictive behaviours which raise additional financial and social risks. A simple and efficient methodology compatible with state-of-the-art social and communications business statistics is developed, which produces the residual communications and media affordability budget and ultimately the value-at-risk in terms of usage and tariffs. Sensitivity analysis provides precious information on communications and media adoption on the basis of affordability. Case data are surveyed from various countries. ICT policy recommendations are made to support widespread and responsible communications access

    Privacy Management Service Contracts as a New Business Opportunity for Operators

    Get PDF
    Recognizing the importance of privacy management as a business process and a business support process, this paper proposes the use of service level agreements (SLA’s) around privacy features, including qualitative and quantitative ones. Privacy metrics are defined by both parties with boundary values on each qualitative or qualitative feature. Their distribution is relying on stress distributions used in this field. The use of service level agreements also casts privacy management into a business perspective with benefits and costs to either party in a process. This approach is especially relevant for communications operators as brokers between content owners (individuals, businesses) and enterprise applications; in this context, the privacy SLA management would be carried out by the operator, while the terms and conditions of the SLA negotiation reside with the two external parties. This work was carried out as part of the large EU project PRIME www.prime.project.eu.org. on privacy enhancing technologies

    Smart Business Networks Design and Business Genetics

    Get PDF
    With the emergence of smart business networks, agile networks, etc. as important research areas in management, for all the attractiveness of these concepts, a major issue remains around their design and the selection rules. While smart business networks should provide advantages due to the quick connect of business partners for selected functions in a process common to several parties, literature does not provide constructive methods whereby the selection of temporary partners and functions can be done. Most discussions only rely solely on human judgment. This paper introduces both computational geometry, and genetic programming, as systematic methods whereby to display possible partnerships, and also whereby to plan for their effect on the organizations or functions of those involved. The two techniques are also been put in the context of emergence theory. Business maps address the first challenge with the use of Voronoï diagrams. Cellular automata, with genetic algorithms mimicking living bodies, address the second challenge. This paper does not include experimental results, which have been derived in the high tech area to determine especially the adequateness of systems integrators to set up joint ventures with smaller technology suppliers

    Mobile operators as banks or vice-versa? and: the challenges of Mobile channels for banks

    Get PDF
    This short paper addresses the strategic challenges of deposit banks, and payment clearinghouses, posed by the growing role of mobile operators as collectors and payment agents of flow of cash for themselves and third parties. Through analysis and data analysis from selected operators , it is shown that mobile operators achieve as money flow handlers levels of efficiency , profitability ,and risk control comparable with deposit banks – Furthermore , the payment infrastructures deployed by both are found to be quite similar , and are analyzed in relation to strategic challenges and opportunities This paves the way to either mobile operators taking a bigger role ,or for banks to tie up such operators to them even more tightly ,or for alliances/mergers to take place ,all these options being subject to regulatory evolution as analyzed as well . The reader should acknowledge that there is no emphasis on specific Mobile banking (M-Banking) technologies (security, terminals, application software) , nor on related market forces from the user demand point of view
    corecore