Search results

1 – 10 of over 37000
Article
Publication date: 4 December 2017

Jimin Kim, Goya Choi, Younghoon Chang and Myeong-Cheol Park

The purpose of this paper is to investigate the use contexts of personal computing devices in multiple steps and conducts an in-depth analysis for the use context of smartphones…

Abstract

Purpose

The purpose of this paper is to investigate the use contexts of personal computing devices in multiple steps and conducts an in-depth analysis for the use context of smartphones. The determinants of use context changes of smartphones are investigated using the technology-to-performance chain model.

Design/methodology/approach

In steps 1 and 2, a diary study method and 2014-2015 Korea media panel research data provided by the Korea Information Society Development Institute are used. Correspondence analysis, χ2 independence tests, and standardized residual analyses were conducted. In step 3, this study develops and validates a framework for use context changes using a survey method and structural equation modeling.

Findings

The results show that the use context of personal computing devices is represented differently and is clearly defined depending on the device used. Furthermore, the use context of smartphones has changed significantly because of the rapid growth of smartphone users and diverse usage patterns of smartphones. The research model results show that users expand the scope and frequency of smartphone use when they experience improved performance in everyday tasks and feel that smartphone content and functions could support everyday tasks better.

Originality/value

This study presents novel early stage research and presents empirical evidence and propositions in both exploratory and confirmatory ways. The main contribution of this study is to provide guidelines and general implications for other empirical studies on the use contexts of devices or information technology services.

Details

Industrial Management & Data Systems, vol. 117 no. 10
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 31 December 2006

Maria Strimpakou, Ioanna Roussaki, Carsten Pils and Miltiades Anagnostou

Context awareness is one of the key aspects of pervasive computing systems. In such systems, a plethora of dynamic context information needs to be constantly retrieved, soundly…

Abstract

Context awareness is one of the key aspects of pervasive computing systems. In such systems, a plethora of dynamic context information needs to be constantly retrieved, soundly interpreted, rapidly processed, maintained in various repositories, and securely disseminated. Thus, a flexible, scalable and interoperable context representation scheme needs to be established and solid context management mechanisms need to be adopted, which will perform well in large‐scale distributed pervasive systems. This paper elaborates on the COMPACT context middleware that has been designed to cope with the issues above and saturate pervasive computing environments with context awareness functionality.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 June 1986

Bernard C. Reimann

Although the personal computer (PC) invasion of the corporate world may be old news by now, most organizations are just beginning to appreciate some of the benefits—and hazards—of…

Abstract

Although the personal computer (PC) invasion of the corporate world may be old news by now, most organizations are just beginning to appreciate some of the benefits—and hazards—of this new technology. The new developments in personal computing — not just PCs, but other sophisticated hardware and software, and networks as well—can have subtle effects on an organization. Evidence is mounting that computer technology is helping to improve the strategic vision of its users. Not only does the computer speed up such work as word processing and budgeting, it can actually change the way managers view their world and relate to it.

Details

Planning Review, vol. 14 no. 6
Type: Research Article
ISSN: 0094-064X

Article
Publication date: 1 June 2000

George K. Chako

Briefly reviews previous literature by the author before presenting an original 12 step system integration protocol designed to ensure the success of companies or countries in…

7292

Abstract

Briefly reviews previous literature by the author before presenting an original 12 step system integration protocol designed to ensure the success of companies or countries in their efforts to develop and market new products. Looks at the issues from different strategic levels such as corporate, international, military and economic. Presents 31 case studies, including the success of Japan in microchips to the failure of Xerox to sell its invention of the Alto personal computer 3 years before Apple: from the success in DNA and Superconductor research to the success of Sunbeam in inventing and marketing food processors: and from the daring invention and production of atomic energy for survival to the successes of sewing machine inventor Howe in co‐operating on patents to compete in markets. Includes 306 questions and answers in order to qualify concepts introduced.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 12 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 1 January 1992

Riitta Hellman

Discusses the failure of end user computing (EUC) to achieve itsobjectives. Bases discussion on people, application and skill. Relatesthe problems to those of prototyping…

Abstract

Discusses the failure of end user computing (EUC) to achieve its objectives. Bases discussion on people, application and skill. Relates the problems to those of prototyping. Suggests some difficulties can be overcome by education. Presents an educational method consisting of five steps: interviews and observations, group discussions, lectures, simulation, and personal guidance.

Details

Information Technology & People, vol. 6 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 April 1985

Walt Crawford

Looking back at the first and third “Common Sense Microcomputing” articles, we can see the changes a year has brought. Personal computers are cheaper and more powerful; some of…

Abstract

Looking back at the first and third “Common Sense Microcomputing” articles, we can see the changes a year has brought. Personal computers are cheaper and more powerful; some of 1984's brand names have disappeared, while new brands and “generic computers” have emerged. Microcomputer magazine publishing has not yet stabilized; and many magazines have gone on enforced diets. The author comments on changes in the personal computer industry over the past year and details some specific changes in system availability and pricing. He then reevaluates a few microcomputer magazines.

Details

Library Hi Tech, vol. 3 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 December 1997

Walt Crawford

If you want to make some sense of personal computer ads and articles, you need to understand the terminology ‐ not all of it, to be sure (that way lies madness), but a few of the…

Abstract

If you want to make some sense of personal computer ads and articles, you need to understand the terminology ‐ not all of it, to be sure (that way lies madness), but a few of the key abbreviations and terms, and how significant they are in today‘s computing field. Some key abbreviations and terms have remained fairly consistent in the five years since “The Trailing Edge” last discussed terminoloyg ‐ but some terms have become passe, and new ones have come along. The author reviews some of 1992‘s terminology and how it‘s changed, introducing key new measures and phrases along the way. Don‘t expect the hot topics of programming and computer sociology, but do expect a grounding in the letters and numbers that make sense of it all.

Details

Library Hi Tech, vol. 15 no. 3/4
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 April 1986

Douglas E. Van Houweling

Information technology that cost a million dollars in 1950 will be available in the year 2000 for ten dollars. Developments in software, while not as much noticed, have been at…

Abstract

Information technology that cost a million dollars in 1950 will be available in the year 2000 for ten dollars. Developments in software, while not as much noticed, have been at least as remarkable as developments in computer hardware. The current and near‐term realities related to computing hardware, communication technology, storage technology, software, and the human‐computer interface are described and placed in context.

Details

Library Hi Tech, vol. 4 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 6 June 2016

Ema Kusen and Mark Strembeck

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision…

Abstract

Purpose

Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.

Design/methodology/approach

The results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.

Findings

Starting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures – context-aware access control and authentication mechanisms, cryptographic protocols that account for device’s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc and sensor networks.

Originality/value

To the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers’ novel to the security research in ubicomp.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 12 March 2018

Maroof Naieem Qadri and S.M.K. Quadri

The purpose of this paper is to propose a model to map the on-premise computing system of the university with cloud computing for achieving an effective and reliable university…

1305

Abstract

Purpose

The purpose of this paper is to propose a model to map the on-premise computing system of the university with cloud computing for achieving an effective and reliable university e-governance (e-gov) system.

Design/methodology/approach

The proposed model incorporates the university’s internal e-gov system with cloud computing in order to achieve better reliability, accessibility and availability of e-gov services while keeping the recurring expenditure low. This model has been implemented (and tested on a university e-gov system) in the University of Kashmir (UOK); case study of this implementation has been chosen as the research methodology to discuss and demonstrate the proposed model.

Findings

According to the results based on practical implementation, the proposed model is ideal for e-governed systems as it provided adequate cost savings and high availability (HA) with operational ease, apart from continuing to have the necessary security in place to maintain confidential information such as student details, grades, etc.

Practical implications

The implication of this study is to achieve HA and to reduce the cost from using external clouds, mapping internal IT servers of the university with the external cloud computing services.

Originality/value

Because no established mapping model for universities has been provided for effective, low-cost, highly available university e-gov system, the proposed mapping model through this paper closes this gap and provides guidelines to implement a hybrid-mapped e-gov model for universities while keeping the recurring expenditure on cloud computing minimal. The paper provides the perceptions of its adoption at UOK for achieving high reliability, accessibility and uptime of its e-gov applications while keeping the recurring expenditure on cloud computing minimal.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 11 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

1 – 10 of over 37000