Search results
1 – 10 of over 11000Yingying Hu, Ling Zhao, Sumeet Gupta and Xiuhong He
The purpose of this paper is twofold: first, to explore the negative consequences of ubiquitous connectivity enabled by personal IT ensembles (PITEs) usage; and second, to…
Abstract
Purpose
The purpose of this paper is twofold: first, to explore the negative consequences of ubiquitous connectivity enabled by personal IT ensembles (PITEs) usage; and second, to investigate the gender differences in the adverse effects of ubiquitous connectivity.
Design/methodology/approach
This study employs a socio-technical approach to identify the technical and interpersonal dimensions of PITE-enabled ubiquitous connectivity and develops a theoretical model to investigate their stress-inducing effects based on the framework of technostress. Furthermore, the moderating role of gender is examined based on the social role theory. The authors test the model on a sample of 439 Chinese netizens.
Findings
Ubiquitous technical and interpersonal connectivity induce four stressors: information overload, communication overload, life invasion and privacy invasion. These stressors further lead to psychological exhaustion and reluctance to try new ITs. The ubiquitous technical connectivity exerts stronger effects on stressors for female users than male users, and interpersonal connectivity exerts a stronger effect for male users than female users.
Originality/value
This study primarily contributes to the small amount of research on PITE-enabled ubiquitous connectivity by considering ubiquitous connectivity from a socio-technical perspective and examining the stress-related effects and outcomes of both technical and interpersonal dimensions of ubiquitous connectivity. This study also provides valuable insights into the gender differences in the stress-inducing effects of the two dimensions of ubiquitous connectivity.
Details
Keywords
Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been…
Abstract
Purpose
Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been suggested, the paper aims to argue that people acting in full conformity to those privacy norms still can infringe the privacy of others in the context of ubiquitous computing and “big data”.
Design/methodology/approach
New threats to privacy are described. Helen Nissenbaum's concept of “privacy as contextual integrity” is reviewed concerning its capability to grasp these problems. The argument is based on the assumption that the technologies work, persons are fully informed and capable of deciding according to advanced privacy considerations.
Findings
Big data and ubiquitous computing enable privacy threats for persons whose data are only indirectly involved and even for persons about whom no data have been collected and processed. Those new problems are intrinsic to the functionality of these new technologies and need to be addressed on a social and political level. Furthermore, a concept of data minimization in terms of the quality of the data is proposed.
Originality/value
The use of personal data as a threat to the privacy of others is established. This new perspective is used to reassess and recontextualize Helen Nissenbaum's concept of privacy. Data minimization in terms of quality of data is proposed as a new concept.
Details
Keywords
Takuma Takahashi and Donna Vandenbrink
The ubiquitous information society gave birth to quasi‐explicit, or formative, knowledge. Formative knowledge is like explicit knowledge in that it can be copied, but unlike…
Abstract
The ubiquitous information society gave birth to quasi‐explicit, or formative, knowledge. Formative knowledge is like explicit knowledge in that it can be copied, but unlike explicit knowledge because it is not fixed. Some manufacturers are beginning to adopt approaches to knowledge management that rely on formative knowledge. Such an approach enabled Honda to start production of its newest Civic model almost simultaneously at 12 plants around the globe in 2000. Strong fear of formative knowledge “consumption” by lead consumers made Honda use CAD/CAE networks to nurture a worldwide community of engineers to design the Civic. This innovation reduced Honda’s average model transfer time to about a half that of Toyota. Honda’s achievement suggests that a new approach to knowledge management is possible, one that lies between Japanese‐style knowledge management centered on human mediation and tacit knowledge and Western‐style knowledge management based on information technology and explicit knowledge.
Details
Keywords
Mobile communication technologies have come a long way, but they are far from completing their evolutionary path. An examination of the Japanese mobile sector, with its…
Abstract
Mobile communication technologies have come a long way, but they are far from completing their evolutionary path. An examination of the Japanese mobile sector, with its cutting‐edge technologies, may provide a glimpse of what is to come for the rest of the world. Japan's mobile users are demanding ever more functionality, and service providers are responding. Moreover, the mobile phone is affecting social norms of behaviour and its use has become integrated within Japanese society as nowhere else. Even though the technology is developing rapidly, the case of Japan suggests that self‐regulation and individual restraint can work.
Details
Keywords
To survey ambient intelligence research in Europe, the USA and Japan and, in particular, in the context of the issues of privacy, identity, security and trust and the safeguards…
Abstract
Purpose
To survey ambient intelligence research in Europe, the USA and Japan and, in particular, in the context of the issues of privacy, identity, security and trust and the safeguards proposed to protect them.
Design/methodology/approach
This paper is based on research being conducted by the SWAMI consortium under the EC's Sixth Framework Programme. SWAMI stands for Safeguards in a World of Ambient Intelligence. The consortium comprises five partners: the Fraunhofer Institute (Germany), the Technical Research Center of Finland (VTT Electronics), Vrije Universiteit Brussel (Belgium), the Institute for Prospective Technological Studies (IPTS) (Spain) and Trilateral Research & Consulting (UK). The 18‐month SWAMI project began in February 2005.
Findings
Most AmI projects do not take into account privacy, security and related issues. However, a reasonable number do (perhaps a quarter of those in Europe) to a greater or lesser extent and some have proposed safeguards.
Research limitations/implications
This paper references only a limited set of the research projects being carried out in Europe, the USA and Japan. More detailed information can be found on the SWAMI web site (http://swami.jrc.es).
Practical implications
A mix of different safeguards will be needed to adequately protect privacy, etc. in the new world of AmI.
Originality/value
Until now, there has been no reasonably comprehensive survey of AmI research projects in Europe, the USA and Canada focused on privacy, security, identity and trust issues. None has considered the range of safeguards needed to protect privacy, etc.
Details
Keywords
Mokmin Park, Dongmyung Lee, Kitae Shin and Jinwoo Park
This paper aims to enhance the responsiveness of enterprises with regard to delivery schedules in a supply chain. Based on the observations in industry, it seems that companies…
Abstract
Purpose
This paper aims to enhance the responsiveness of enterprises with regard to delivery schedules in a supply chain. Based on the observations in industry, it seems that companies often re‐negotiate their due‐dates. These phenomena have begun to appear only recently, as a result of the advancements of information technology and flexibility in the supply chain. However, these due‐date re‐negotiation processes are haphazard and ad hoc in nature, and a formal process is needed to respond to market fluctuations more quickly. In this paper, a re‐negotiable order processing method is developed that can change the already‐assigned due‐dates or allow partial shipments to increase the flexibility of firm response to a rush order from a prior customer (PC).
Design/methodology/approach
A due‐date re‐negotiation process is defined and a formal system for handling customer orders is proposed. The new data and business process integration model are proposed for the due‐date re‐negotiation process based on RosettaNet's Partner Interface Processes. Web services and ubiquitous computing technologies are used in the proposed system architecture to allow for responsive sales order management.
Findings
The paper shows that assigned due‐dates can also be re‐negotiated by enhancing the connectivity and visibility of the supply chain with co‐operative customers. In the early stage of the product life cycle or high‐regional demand variation environments, it is better to re‐negotiate due‐dates than to meet scheduled due‐dates.
Practical implications
In some instances, meeting the due‐date requested by a customer relates to the success or failure of a particular sales order. The proposed re‐negotiation method could help the sales offices of the MF to respond to PC requests quickly and flexibly. Rush orders from PC might be acceptable based on the slack gained through the re‐negotiation of co‐operative customers' assigned orders.
Originality/value
There has been a considerable volume of studies on the due‐date assignment, order releasing, and scheduling problems. However, these previous studies considered due‐dates as exogenous parameters or fixed endogenous variables. In this paper, the assigned due‐dates for pre‐contracted co‐operative customers are considered as re‐negotiable variables. On the other hand, most studies on ubiquitous computing technologies, especially those relate to radio frequency identification (RFID), have focused mostly on asset management and processing time reduction. This paper suggests other benefits of increased visibility and traceability of RFID technology in enhancing responsiveness and flexibility in the sales order management system.
Details
Keywords
Weishi Chen, Yifeng Huang, Xianfeng Lu and Jie Zhang
This paper aims to review the critical technology development of avian radar system at airports.
Abstract
Purpose
This paper aims to review the critical technology development of avian radar system at airports.
Design/methodology/approach
After the origin of avian radar technology is discussed, the target characteristics of flying birds are analyzed, including the target echo amplitude, flight speed, flight height, trajectory and micro-Doppler. Four typical airport avian radar systems of Merlin, Accipiter, Robin and CAST are introduced. The performance of different modules such as antenna, target detection and tracking, target recognition and classification, analysis of bird information together determines the detection ability of avian radar. The performances and key technologies of the ubiquitous avian radar are summarized and compared with other systems, and their applications, deployment modes, as well as their advantages and disadvantages are introduced and analyzed.
Findings
The ubiquitous avian radar achieves the long-time integration of target echoes, which greatly improves detection and classification ability of the targets of birds or drones, even under strong background clutter at airport. In addition, based on the big data of bird situation accumulated by avian radar, the rules of bird activity around the airport can be mined to guide the bird avoidance work.
Originality/value
This paper presented a novel avian radar system based on ubiquitous digital radar technology. The authors’ experience has confirmed that this system can be effective for airport bird strike prevention and management. In the future, the avian radar system will see continued improvement in both software and hardware, as the system is designed to be easily extensible.
Details
Keywords
Liming Chen and Parisa Rashidi
The purpose of this paper is to provide a view on situation, activity and goal awareness (SAGAware) in ubiquitous computing. It discusses these concepts, articulates their roles…
Abstract
Purpose
The purpose of this paper is to provide a view on situation, activity and goal awareness (SAGAware) in ubiquitous computing. It discusses these concepts, articulates their roles in scalability and prevalence of pervasive applications, and speculates the future development.
Design/methodology/approach
The paper is a visionary essay that introduces the background, elaborates the basic concepts and presents the authors' views and insights into SAGAware research in pervasive computing based on the latest state of the art of the development of pervasive computing and its applications.
Findings
SAGAware is closely related to the levels of automation and large‐scale uptake of pervasive applications. It is an interdisciplinary research area requiring collaboration and cooperation of multiple research communities.
Research limitations/implications
The paper highlights the importance of the SAGAware research and further points out research trends and future research directions.
Practical implications
The paper helps stimulate research interests and draw attention of relevant researchers to this promising research area.
Originality/value
The paper pioneers the investigation of an increasingly important research theme, and presents an in‐depth view to its potentials and research trends.
Details
Keywords
Carrie Liddy and Alice Sturgeon
Discusses the requirements ‐ both technical and geopolitical ‐ for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including…
Abstract
Discusses the requirements ‐ both technical and geopolitical ‐ for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including trusted third party (TTP) and self‐signed certification authorities. Depicts the relevant layers of interactions each option entails. Explains the structures of proprietary keying systems and of hierarchical certification authorities. Addresses the geopolitical elements ‐ especially policy and procedures, and national legal frameworks ‐ required to effectively implement the trust that secure transactions require.
Details