Search results

1 – 10 of over 11000
Article
Publication date: 27 June 2008

Jengchung V. Chen, William Ross and Shaoyu F. Huang

The purpose of this paper is to show how the development of location‐based services (such as those using global positioning satellite (GPS) systems) has accompanied the growth of

4021

Abstract

Purpose

The purpose of this paper is to show how the development of location‐based services (such as those using global positioning satellite (GPS) systems) has accompanied the growth of mobile telecommunication, providing mobile telephone users with a variety of functions. The paper aims to considers the benefits and concerns that these location‐based services present to consumers.

Design/methodology/approach

The paper identifies issues based on the academic literature, relevant theory, and current mobile telecommunication developments.

Findings

While location‐based services offer many benefits to consumers, issues pertaining to privacy, trust and justice are significant areas of concern.

Research limitations/implications

Testable research propositions pertaining to consumer behaviour are offered to guide future research.

Practical implications

Socially‐responsible telecommunication firms should consider the issues that are raised here. They should adopt policies to safeguard data, build trust, and offer consumers fair policies as the firms offer location‐based services.

Originality/value

While much has been written about GPS systems and wireless telecommunications, almost no empirical research has been conducted and little theoretical guidance has been offered to prospective researchers. The paper reviews the literature from a variety of disciplines and identifies important theoretical areas to guide future research on consumer behaviour. The paper identifies important issues for researchers and managers.

Details

info, vol. 10 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 12 February 2020

Peter Reji Ramanatt, K. Natarajan and K.R. Shobha

Aircraft manufacturers for a long time have been looking to reduce the weight of on board equipment to enhance performance both from commercial aspect and from military aspect…

Abstract

Purpose

Aircraft manufacturers for a long time have been looking to reduce the weight of on board equipment to enhance performance both from commercial aspect and from military aspect. The existing wired technology, using cables to connect different on board line replaceable unit apart from increasing the weight also increases the complexity related to electromagnetic interference, installation and maintenance. With continuous technology upgradation in the wireless domain, aviation industry is in the process of using wireless technology for intra-aircraft communication. Wireless technology can meet most of the challenges of modern avionics systems and significantly reduce the weight. This paper aims to look at various aspects of implementing a wireless network including issues related to wired network, aircraft channel, interference issues, suitable wireless protocols for aircraft applications and security aspects.

Design/methodology/approach

The paper has relied on literature study on wireless avionics intra-communications (WAIC) and the research work carried out in specific areas related to channel inside an aircraft, interference issues of wireless systems with onboard and external systems operating in the same band and security issues related to wireless network and security requirements of implementing an avionics wireless network (AWN). To identify suitable wireless protocol for AWN literature review and simulation to compare different protocols was carried out.

Findings

A single wireless protocol may not be suitable for all aircraft systems, and therefore, there may be a requirement to use multiple technologies. Mutual interference is not expected between WAIC systems with on board and external systems operating in the same band. The channel inside an aircraft is expected to be Rician (LOS) or Rayleigh (NLOS). However, additional measurements may have to be undertaken to have a generalized channel model. Security aspects in an AWN are critical and needs to be analyzed in detail prior to any wireless deployment.

Practical implications

Implementation of wireless technology can pave the way for usage of wireless technology for future generation avionics. With International Telecommunication Union allotting dedicated band for WAIC operations, considerable amount of research has been initiated in this field. It is believed that in the coming 2-3 years, the designers will be ready to replace the existing data wires with wireless transceivers. With radio technical commission for aeronautics and EURACAE involved in development of minimum operations performance standards for WAIC systems use of wireless for intra communication is bound to happen. Therefore, it is necessary to look at different issues for integrating wireless in the avionics domain.

Originality/value

The existing studies have been carried out in individual domains of using wireless in avionics. Separate studies and research work has been carried out for identifying wireless protocols, aircraft channel models, interference issues and security aspects. The paper has attempted to look at all these aspects together including certification.

Details

Aircraft Engineering and Aerospace Technology, vol. 92 no. 3
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 11 January 2011

Hirokazu Ozaki, Atsushi Kara and Zixue Cheng

The purpose of this paper is to derive the user‐perceived availability of M‐for‐N shared protection systems composed of multiple user groups, each with a protection‐switching…

Abstract

Purpose

The purpose of this paper is to derive the user‐perceived availability of M‐for‐N shared protection systems composed of multiple user groups, each with a protection‐switching priority.

Design/methodology/approach

The paper assumes a shared protection system with M protection units and N working units. The memoryless state transition diagram viewed from the system administrator, combined with combinatorial analysis of state probabilities on protection switching, yields a generic formula of the availability viewed from an arbitrary end user.

Findings

The numerical examples of availability reveal the effect of prioritized protection switching. It is observed that the total protection capacity is constant regardless of the ways of priority grouping. The shared protection system with multiple protection units enables more flexible availability allocation compared with the case of a single protection unit.

Research limitations/implications

User‐perceived reliability is still an unexplored research area. Many variations of the system treated in this paper can be applied to various applications.

Practical implications

The analysis provides useful information for the design and operation of, for example, telecommunication network devices. The analysis is applicable to general shared protection systems that are subject to service level agreement (SLA) involving user‐perceived reliability measures.

Originality/value

This paper establishes the model of the priority shared protection systems for the first time and shows a practical computation method of prioritized user‐perceived availability.

Details

International Journal of Quality & Reliability Management, vol. 28 no. 1
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 1 March 1978

Elaine Caruso

In Part 1 of the paper, the problems a would‐be user faces in accessing the contents of machine stored bibliographic databases are assessed; the online search services solve part…

Abstract

In Part 1 of the paper, the problems a would‐be user faces in accessing the contents of machine stored bibliographic databases are assessed; the online search services solve part of the difficulty, but become part of the problem; current training techniques are summarized and evaluated, and ways of improving training are suggested. In Part 2 of the paper, a new training program is described, the Hands on online multisystem multidatabase trainer, which delivers the training to the home terminal of the trainee, and in which emulations of bibliographic retrieval systems are provided that accept commands, search files, provide messages and displays to mimic the operational services, and in which the user trainee can develop the same skills he would learn in the ‘real’ system. The program has optionally available practice and instructional modules that guide the user in the protocols of telecommunication services, computer log in, file selection, search term negotiation, logical statement structure, interpretation of system messages and displays, and formatting of output from the search. The program can be used as needed with either the emulators or the online system itself. Training and design goals are detailed; namely the use and availability of the trainer outside the university, experience, use, evaluation of the training, extension and future development.

Details

Online Review, vol. 2 no. 3
Type: Research Article
ISSN: 0309-314X

Keywords

Article
Publication date: 6 April 2012

Vineeta Nigam, Tripta Thakur, V.K. Sethi and R.P. Singh

The purpose of this paper is to benchmark the Indian mobile telecommunication service providers for relative efficiencies. In this paper, a method for benchmarking performance of…

1802

Abstract

Purpose

The purpose of this paper is to benchmark the Indian mobile telecommunication service providers for relative efficiencies. In this paper, a method for benchmarking performance of mobile telecom utilities based on data envelopment analysis (DEA) is presented. The paper discusses some concepts between quality performance and benchmarking and the results include performance efficiency and sensitivity‐based classification of utilities. Also, peer‐to‐peer comparison of inefficient with efficient utilities is provided. Based on these results, inefficient utilities can develop strategic plans to improve performance.

Design/methodology/approach

The authors use DEA to measure comparative efficiencies of mobile telecom companies and two different DEA models, CCR and BCC, were applied to evaluate the relative efficiency of mobile telecom operators in India. Sensitivity‐based classification of utilities is carried out by removing one or more inputs or outputs from the base model to construct a new DEA model. Comparisons of DEA efficiencies from the base model with the structurally perturbed models show the impact on efficiency. Data include annual and quarterly reports showing various quality parameters.

Findings

DEA is used to derive the benchmarks based on the comparison of the 126 utilities which include public sector undertaking (PSU) operators (MTNL and BSNL) and private operators of the Indian mobile telecommunication sector. The result includes performance efficiency and peer‐to‐peer comparison of inefficient utilities with efficient utilities. Based on these results, inefficient utilities can develop strategic plans to improve their performance. Sensitivity analysis, based on removal of one or more variables from the base model to determine changes in DEA efficiencies is done for selecting the strength of parameters of utilities for performance improvement.

Practical implications

Benchmarking of service utilities in the telecom sector is virtually non‐existent at the national level in India. This research identifies the different variables and then a model is prepared for benchmarking of the service providers in India. Based on the efficiency analysis, benchmarks can be set, and utility efficiency scores can be obtained based on the set benchmarks. These scores can help develop a strategic plan for mitigating the factors that contribute to the system inefficiencies.

Originality/value

This paper is one of the few published studies that benchmark the performance of mobile telecom services in India. This research promises to be amongst the first of the works carried out taking specific parameters of mobile telecom utilities of India.

Article
Publication date: 1 June 2005

Olayinka Catherine Fatoki

Poor telecommunication infrastructure has been generally identified as a hindrance to most library activities in Nigeria. However, with the emergence and spread of wireless…

1838

Abstract

Purpose

Poor telecommunication infrastructure has been generally identified as a hindrance to most library activities in Nigeria. However, with the emergence and spread of wireless technologies, especially the global system of mobile communications (GSM), this paper seeks to consider the implications of this event on library services, with suggestions on the possible applications to academic libraries.

Design/methodology/approach

A background study of information and communication technology status past and present in Nigeria was carried out, especially the impact of wireless technologies on the global scale and in the country.

Findings

The GSM technologies acceptance and growth rate among the Nigerian populace has serious and great potentials for enhancing the communication and information technology‐related services in libraries and information centers in Nigeria. However, information managers need to fully exploit the opportunities presented by this relatively new phenomenon with a view to providing improved products and services to the library users, especially in the academic sector.

Originality/value

This paper highlights the use of GSM technologies library services. It targets librarians and information managers who have been limited in the past by inadequate telephone/telecommunications infrastructure. Encourages the professionals to exploit the opportunities presented by these expanding technologies.

Details

The Electronic Library, vol. 23 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 25 January 2011

Anthony Rutkowski

This paper aims to describe the history of cyber security public international law since 1850 that is found in treaty instruments developed by the signatory nations of what is now

1538

Abstract

Purpose

This paper aims to describe the history of cyber security public international law since 1850 that is found in treaty instruments developed by the signatory nations of what is now known as the International Telecommunication Union (ITU). Because of the esoteric nature of the subject and, until recently, the very difficult access to reference materials, knowledge of these provisions was confined to a handful of scholars.

Design/methodology/approach

To prepare this article, it was necessary to download the entire new ITU History Portal collection of treaty instruments, adding the US archive collection scans of missing documents, conversion to plain text, identification and linking of key provisions across time, detecting the differences, and then pursuing related material to find out why the text arose.

Findings

What the material reveals is a 150‐year history of cybersecurity law that is not only relevant to significant developments today, but also controlling as a set of obligations that virtually every nation has accepted.

Research limitations/implications

It is hoped that this article will not only be helpful going forward in dealing with the difficult challenges of evolving these provisions, but will also serve as a kind of template for a new generation that not only questions authority, but also appreciates the value of source materials, accessing them, and doing the necessary analysis rather than just visiting a search engine.

Originality/value

The history of the cyber security public international law in the international telecommunication treaty instruments has never been compiled before.

Details

info, vol. 13 no. 1
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 1 August 2008

Thomas Magnusson and Glenn Johansson

The purpose of this article is to illustrate how the characteristics of complex product systems pose specific managerial challenges onto the transfer of new technology from…

1809

Abstract

Purpose

The purpose of this article is to illustrate how the characteristics of complex product systems pose specific managerial challenges onto the transfer of new technology from technology development to product development.

Design/methodology/approach

The research relies on comparative case studies involving three cases of internal technology transfer processes in the development of electrical equipment and telecommunication systems.

Findings

The research findings suggest that managerial decisions on internal technology transfer should be guided by a contingency framework rather than general procedures and tools.

Research limitations/implications

Since the research is restricted to a limited number of case studies, additional studies are required to validate the findings.

Practical implications

The study results indicate that in cases of complex product development, there is a need for a more integrated view on technology and product development, than what is commonly described in the literature.

Originality/value

This article complements previous studies of the management of internal technology transfer processes, which primarily have addressed mass producing industries.

Details

European Journal of Innovation Management, vol. 11 no. 3
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 1 April 1990

Fay Turner

The Interlibrary Loan (ILL) protocol is a standard based on the OSI Reference Model that permits ILL messages to be exchanged between heterogeneous systems. By defining a standard…

Abstract

The Interlibrary Loan (ILL) protocol is a standard based on the OSI Reference Model that permits ILL messages to be exchanged between heterogeneous systems. By defining a standard for computer communications, the protocol permits the exchange of ILL messages between bibliographic institutions that use different computers, systems, and communication services. Recently approved as a Draft International Standard by the International Standards Organization, the protocol is expected to become an International Standard in 1991. Implementations based on this standard are currently being developed by institutions and software vendors in North America and Europe.

Details

Library Hi Tech, vol. 8 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 2 March 2012

Fernando de la Cruz Paragas

This paper aims to present a dialogue‐based systems framework using two cases in the liberalization of Philippine telecoms.

Abstract

Purpose

This paper aims to present a dialogue‐based systems framework using two cases in the liberalization of Philippine telecoms.

Design/methodology/approach

Through a meta‐analysis of government data, academic research and policy studies about Philippine telecoms, the paper presents a holistic view of the role of political, business, and social sectors in policy making and implementation.

Findings

The paper shows how intra‐ and inter‐sector dialogues have resulted in the liberalization and growth of the industry. Conversely, it shows how paucities among such dialogues have had consequences in terms of unutilized capacity and in an oversight about the medium of choice in promoting universal access. Moreover, the paper shows how policy is a product of local traditions and global policy trends.

Social implications

The paper reinforces calls for states to consider technological innovation and adoption in addressing universal service goals. The Philippines also serves as a case study for other developing states which pursue an agenda of liberalization and deregulation.

Originality/value

The study shows the utility of a proposed dialogue‐based systems framework as a parsimonious solution to the complexity of policy studies.

1 – 10 of over 11000