30 research outputs found
Privacy Management Contracts And Economics, Using Service Level Agreements (Sla)
Recognizing the importance of privacy management as a business process and a business
support process, this paper proposes the use of service level agreements around privacy
features, including qualitative and quantitative ones. It also casts privacy management into a
business perspective with benefits and costs to either party in a process
Discovering the Dynamics of Smart Business Networks
In an earlier paper ,was discussed the necessary evolution from smart business networks, as based on process need satisfaction and governance, into business genetics [1] based on strategic bonds or decay and opportunistic complementarities. This paper will describe an approach and diffusion algorithms whereby to discover the dynamics of emergent smart business network structures and their performance in view of collaboration patterns over time. Some real life early analyses of dynamics are discussed based on cases and date from the high tech sector. Lessons learnt from such cases are also given on overall smart network dynamics with respect to local interaction strategies, as modelled like in business genetics by individual partner profiles, goals and constraints. It shows the weakness of static "business operating systems", as well as the possibly destabilizing clustering effects amongst nodes linked to filtering, evaluation and own preferences
A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services
This paper gives an analytical business model of the Internet IPv4 and
IPv6 protocols ,focussing on the business implications of intrinsic
technical properties of these protocols .The technical properties
modeled in business terms are : address space, payload,
autoconfiguration, IP mobility , security, and flow label. Three
operational cash flow focussed performance indexes are defined for
respectively an Internet operator or ISP, for the address domain
owner, and for the end user. Special considerations are made and
modeling changes for mobile Internet traffic. The effects of
technical innovation in the Internet services and protocols is taken
into account , as are special considerations for N.A.T. and content
owners. A numerical case is provided which mimics the current state of
the Internet network and services ,and around which sensitivity
analysis can be carried out, or such that additional service models
can be added. It establishes in the Case the relative advantages or
disadvantages of IPv4 and IPv6 for each of the three main parties
,i.e. the ISP operator, the address domain owner, and the end use
Smart business networks: architectural aspects and risks
This paper summarizes key attributes and the uniqueness of smart business networks [1], to propose thereafter an operational implementation architecture. It involves, amongst others, the embedding of business logic specific to a network of business partners, inside the communications control networks .It also involves the definition of business protocols between these partners and the joint management of some common functions relying on open networking standards. This implies some key paradigm changes, both of a technical and of a business nature, which are offered here for discussion via a set of propositions
Privacy Metrics and Boundaries
This paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for examples of scenarios see [4]; -to define a notion of privacy boundary, and design it to encompass the set of information, behaviours, actions and processes which the privacy protector can accept to expose to an information gathering under an agreement with said party; everything outside the boundary is not acceptable and justifies not entering into the agreement; -to characterize the contribution of privacy enhancing technologies (PET). A full case is given with the qualitative and quantitative privacy metrics determination and envelope, i.e. a Cisco Inc. privacy agreement
How and why communications industry suppliers get "squeezed out" now, and the next phase
The communications systems, terminals , software and deployment service, industries ,have undergone the past ten years a significant technological internal evolution and external revolution at customer end (such as Internet ,Mobile networks and terminals, Broadband,..). Very little management research has studied their financial survivability irrespective of changes in demand volumes in the present technological /organizational cycle . This paper analyzes the implications of genuine open mandated communications standards ,of higher product volumes , of very high R&D , of the larger use of sourced /purchased technologies ,and of contract manufacturing . The methodology used is equilibrium analyses . Two specific areas will be mentioned as examples .The paper also shows how eventually those industries in a later cycle will bounce back
Mobile Service Affordability for the Needy, Addiction, and ICT Policy Implications
This paper links communications and media usage to social and household economics boundaries. It highlights that in present day society, communications and media are a necessity, but not always affordable, and that they furthermore open up for addictive behaviours which raise additional financial and social risks. A simple and efficient methodology compatible with state-of-the-art social and communications business statistics is developed, which produces the residual communications and media affordability budget and ultimately the value-at-risk in terms of usage and tariffs. Sensitivity analysis provides precious information on communications and media adoption on the basis of affordability. Case data are surveyed from various countries. ICT policy recommendations are made to support widespread and responsible communications access
Privacy Management Service Contracts as a New Business Opportunity for Operators
Recognizing the importance of privacy management as a business process and a business support process, this paper proposes the use of service level agreements (SLA’s) around privacy features, including qualitative and quantitative ones. Privacy metrics are defined by both parties with boundary values on each qualitative or qualitative feature. Their distribution is relying on stress distributions used in this field. The use of service level agreements also casts privacy management into a business perspective with benefits and costs to either party in a process. This approach is especially relevant for communications operators as brokers between content owners (individuals, businesses) and enterprise applications; in this context, the privacy SLA management would be carried out by the operator, while the terms and conditions of the SLA negotiation reside with the two external parties. This work was carried out as part of the large EU project PRIME www.prime.project.eu.org. on privacy enhancing technologies
Smart Business Networks Design and Business Genetics
With the emergence of smart business networks, agile networks, etc. as important research areas in management, for all the attractiveness of these concepts, a major issue remains around their design and the selection rules. While smart business networks should provide advantages due to the quick connect of business partners for selected functions in a process common to several parties, literature does not provide constructive methods whereby the selection of temporary partners and functions can be done. Most discussions only rely solely on human judgment. This paper introduces both computational geometry, and genetic programming, as systematic methods whereby to display possible partnerships, and also whereby to plan for their effect on the organizations or functions of those involved. The two techniques are also been put in the context of emergence theory. Business maps address the first challenge with the use of Voronoï diagrams. Cellular automata, with genetic algorithms mimicking living bodies, address the second challenge.
This paper does not include experimental results, which have been derived in the high tech area to determine especially the adequateness of systems integrators to set up joint ventures with smaller technology suppliers
Mobile operators as banks or vice-versa? and: the challenges of Mobile channels for banks
This short paper addresses the strategic challenges of deposit banks, and payment clearinghouses, posed by the growing role of mobile operators as collectors and payment agents of flow of cash for themselves and third parties. Through analysis and data analysis from selected operators , it is shown that mobile operators achieve as money flow handlers levels of efficiency , profitability ,and risk control comparable with deposit banks – Furthermore , the payment infrastructures deployed by both are found to be quite similar , and are analyzed in relation to strategic challenges and opportunities This paves the way to either mobile operators taking a bigger role ,or for banks to tie up such operators to them even more tightly ,or for alliances/mergers to take place ,all these options being subject to regulatory evolution as analyzed as well . The reader should acknowledge that there is no emphasis on specific Mobile banking (M-Banking) technologies (security, terminals, application software) , nor on related market forces from the user demand point of view