Search results

1 – 10 of over 11000
Article
Publication date: 10 January 2022

Yingying Hu, Ling Zhao, Sumeet Gupta and Xiuhong He

The purpose of this paper is twofold: first, to explore the negative consequences of ubiquitous connectivity enabled by personal IT ensembles (PITEs) usage; and second, to…

448

Abstract

Purpose

The purpose of this paper is twofold: first, to explore the negative consequences of ubiquitous connectivity enabled by personal IT ensembles (PITEs) usage; and second, to investigate the gender differences in the adverse effects of ubiquitous connectivity.

Design/methodology/approach

This study employs a socio-technical approach to identify the technical and interpersonal dimensions of PITE-enabled ubiquitous connectivity and develops a theoretical model to investigate their stress-inducing effects based on the framework of technostress. Furthermore, the moderating role of gender is examined based on the social role theory. The authors test the model on a sample of 439 Chinese netizens.

Findings

Ubiquitous technical and interpersonal connectivity induce four stressors: information overload, communication overload, life invasion and privacy invasion. These stressors further lead to psychological exhaustion and reluctance to try new ITs. The ubiquitous technical connectivity exerts stronger effects on stressors for female users than male users, and interpersonal connectivity exerts a stronger effect for male users than female users.

Originality/value

This study primarily contributes to the small amount of research on PITE-enabled ubiquitous connectivity by considering ubiquitous connectivity from a socio-technical perspective and examining the stress-related effects and outcomes of both technical and interpersonal dimensions of ubiquitous connectivity. This study also provides valuable insights into the gender differences in the stress-inducing effects of the two dimensions of ubiquitous connectivity.

Details

Information Technology & People, vol. 36 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 6 May 2014

Tobias Matzner

Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been…

3563

Abstract

Purpose

Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been suggested, the paper aims to argue that people acting in full conformity to those privacy norms still can infringe the privacy of others in the context of ubiquitous computing and “big data”.

Design/methodology/approach

New threats to privacy are described. Helen Nissenbaum's concept of “privacy as contextual integrity” is reviewed concerning its capability to grasp these problems. The argument is based on the assumption that the technologies work, persons are fully informed and capable of deciding according to advanced privacy considerations.

Findings

Big data and ubiquitous computing enable privacy threats for persons whose data are only indirectly involved and even for persons about whom no data have been collected and processed. Those new problems are intrinsic to the functionality of these new technologies and need to be addressed on a social and political level. Furthermore, a concept of data minimization in terms of the quality of the data is proposed.

Originality/value

The use of personal data as a threat to the privacy of others is established. This new perspective is used to reassess and recontextualize Helen Nissenbaum's concept of privacy. Data minimization in terms of quality of data is proposed as a new concept.

Details

Journal of Information, Communication and Ethics in Society, vol. 12 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 February 2004

Takuma Takahashi and Donna Vandenbrink

The ubiquitous information society gave birth to quasi‐explicit, or formative, knowledge. Formative knowledge is like explicit knowledge in that it can be copied, but unlike…

2890

Abstract

The ubiquitous information society gave birth to quasi‐explicit, or formative, knowledge. Formative knowledge is like explicit knowledge in that it can be copied, but unlike explicit knowledge because it is not fixed. Some manufacturers are beginning to adopt approaches to knowledge management that rely on formative knowledge. Such an approach enabled Honda to start production of its newest Civic model almost simultaneously at 12 plants around the globe in 2000. Strong fear of formative knowledge “consumption” by lead consumers made Honda use CAD/CAE networks to nurture a worldwide community of engineers to design the Civic. This innovation reduced Honda’s average model transfer time to about a half that of Toyota. Honda’s achievement suggests that a new approach to knowledge management is possible, one that lies between Japanese‐style knowledge management centered on human mediation and tacit knowledge and Western‐style knowledge management based on information technology and explicit knowledge.

Details

Journal of Knowledge Management, vol. 8 no. 1
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 1 August 2004

Lara Srivastava

Mobile communication technologies have come a long way, but they are far from completing their evolutionary path. An examination of the Japanese mobile sector, with its…

3739

Abstract

Mobile communication technologies have come a long way, but they are far from completing their evolutionary path. An examination of the Japanese mobile sector, with its cutting‐edge technologies, may provide a glimpse of what is to come for the rest of the world. Japan's mobile users are demanding ever more functionality, and service providers are responding. Moreover, the mobile phone is affecting social norms of behaviour and its use has become integrated within Japanese society as nowhere else. Even though the technology is developing rapidly, the case of Japan suggests that self‐regulation and individual restraint can work.

Details

info, vol. 6 no. 4
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 1 December 2005

David Wright

To survey ambient intelligence research in Europe, the USA and Japan and, in particular, in the context of the issues of privacy, identity, security and trust and the safeguards

2353

Abstract

Purpose

To survey ambient intelligence research in Europe, the USA and Japan and, in particular, in the context of the issues of privacy, identity, security and trust and the safeguards proposed to protect them.

Design/methodology/approach

This paper is based on research being conducted by the SWAMI consortium under the EC's Sixth Framework Programme. SWAMI stands for Safeguards in a World of Ambient Intelligence. The consortium comprises five partners: the Fraunhofer Institute (Germany), the Technical Research Center of Finland (VTT Electronics), Vrije Universiteit Brussel (Belgium), the Institute for Prospective Technological Studies (IPTS) (Spain) and Trilateral Research & Consulting (UK). The 18‐month SWAMI project began in February 2005.

Findings

Most AmI projects do not take into account privacy, security and related issues. However, a reasonable number do (perhaps a quarter of those in Europe) to a greater or lesser extent and some have proposed safeguards.

Research limitations/implications

This paper references only a limited set of the research projects being carried out in Europe, the USA and Japan. More detailed information can be found on the SWAMI web site (http://swami.jrc.es).

Practical implications

A mix of different safeguards will be needed to adequately protect privacy, etc. in the new world of AmI.

Originality/value

Until now, there has been no reasonably comprehensive survey of AmI research projects in Europe, the USA and Canada focused on privacy, security, identity and trust issues. None has considered the range of safeguards needed to protect privacy, etc.

Details

info, vol. 7 no. 6
Type: Research Article
ISSN: 1463-6697

Keywords

Abstract

Details

Digital Theology: A Computer Science Perspective
Type: Book
ISBN: 978-1-83982-535-4

Article
Publication date: 23 March 2010

Mokmin Park, Dongmyung Lee, Kitae Shin and Jinwoo Park

This paper aims to enhance the responsiveness of enterprises with regard to delivery schedules in a supply chain. Based on the observations in industry, it seems that companies…

1081

Abstract

Purpose

This paper aims to enhance the responsiveness of enterprises with regard to delivery schedules in a supply chain. Based on the observations in industry, it seems that companies often re‐negotiate their due‐dates. These phenomena have begun to appear only recently, as a result of the advancements of information technology and flexibility in the supply chain. However, these due‐date re‐negotiation processes are haphazard and ad hoc in nature, and a formal process is needed to respond to market fluctuations more quickly. In this paper, a re‐negotiable order processing method is developed that can change the already‐assigned due‐dates or allow partial shipments to increase the flexibility of firm response to a rush order from a prior customer (PC).

Design/methodology/approach

A due‐date re‐negotiation process is defined and a formal system for handling customer orders is proposed. The new data and business process integration model are proposed for the due‐date re‐negotiation process based on RosettaNet's Partner Interface Processes. Web services and ubiquitous computing technologies are used in the proposed system architecture to allow for responsive sales order management.

Findings

The paper shows that assigned due‐dates can also be re‐negotiated by enhancing the connectivity and visibility of the supply chain with co‐operative customers. In the early stage of the product life cycle or high‐regional demand variation environments, it is better to re‐negotiate due‐dates than to meet scheduled due‐dates.

Practical implications

In some instances, meeting the due‐date requested by a customer relates to the success or failure of a particular sales order. The proposed re‐negotiation method could help the sales offices of the MF to respond to PC requests quickly and flexibly. Rush orders from PC might be acceptable based on the slack gained through the re‐negotiation of co‐operative customers' assigned orders.

Originality/value

There has been a considerable volume of studies on the due‐date assignment, order releasing, and scheduling problems. However, these previous studies considered due‐dates as exogenous parameters or fixed endogenous variables. In this paper, the assigned due‐dates for pre‐contracted co‐operative customers are considered as re‐negotiable variables. On the other hand, most studies on ubiquitous computing technologies, especially those relate to radio frequency identification (RFID), have focused mostly on asset management and processing time reduction. This paper suggests other benefits of increased visibility and traceability of RFID technology in enhancing responsiveness and flexibility in the sales order management system.

Details

Industrial Management & Data Systems, vol. 110 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 11 January 2022

Weishi Chen, Yifeng Huang, Xianfeng Lu and Jie Zhang

This paper aims to review the critical technology development of avian radar system at airports.

Abstract

Purpose

This paper aims to review the critical technology development of avian radar system at airports.

Design/methodology/approach

After the origin of avian radar technology is discussed, the target characteristics of flying birds are analyzed, including the target echo amplitude, flight speed, flight height, trajectory and micro-Doppler. Four typical airport avian radar systems of Merlin, Accipiter, Robin and CAST are introduced. The performance of different modules such as antenna, target detection and tracking, target recognition and classification, analysis of bird information together determines the detection ability of avian radar. The performances and key technologies of the ubiquitous avian radar are summarized and compared with other systems, and their applications, deployment modes, as well as their advantages and disadvantages are introduced and analyzed.

Findings

The ubiquitous avian radar achieves the long-time integration of target echoes, which greatly improves detection and classification ability of the targets of birds or drones, even under strong background clutter at airport. In addition, based on the big data of bird situation accumulated by avian radar, the rules of bird activity around the airport can be mined to guide the bird avoidance work.

Originality/value

This paper presented a novel avian radar system based on ubiquitous digital radar technology. The authors’ experience has confirmed that this system can be effective for airport bird strike prevention and management. In the future, the avian radar system will see continued improvement in both software and hardware, as the system is designed to be easily extensible.

Details

Aircraft Engineering and Aerospace Technology, vol. 94 no. 3
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 31 August 2012

Liming Chen and Parisa Rashidi

The purpose of this paper is to provide a view on situation, activity and goal awareness (SAGAware) in ubiquitous computing. It discusses these concepts, articulates their roles…

440

Abstract

Purpose

The purpose of this paper is to provide a view on situation, activity and goal awareness (SAGAware) in ubiquitous computing. It discusses these concepts, articulates their roles in scalability and prevalence of pervasive applications, and speculates the future development.

Design/methodology/approach

The paper is a visionary essay that introduces the background, elaborates the basic concepts and presents the authors' views and insights into SAGAware research in pervasive computing based on the latest state of the art of the development of pervasive computing and its applications.

Findings

SAGAware is closely related to the levels of automation and large‐scale uptake of pervasive applications. It is an interdisciplinary research area requiring collaboration and cooperation of multiple research communities.

Research limitations/implications

The paper highlights the importance of the SAGAware research and further points out research trends and future research directions.

Practical implications

The paper helps stimulate research interests and draw attention of relevant researchers to this promising research area.

Originality/value

The paper pioneers the investigation of an increasingly important research theme, and presents an in‐depth view to its potentials and research trends.

Details

International Journal of Pervasive Computing and Communications, vol. 8 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 March 1998

Carrie Liddy and Alice Sturgeon

Discusses the requirements ‐ both technical and geopolitical ‐ for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including…

675

Abstract

Discusses the requirements ‐ both technical and geopolitical ‐ for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including trusted third party (TTP) and self‐signed certification authorities. Depicts the relevant layers of interactions each option entails. Explains the structures of proprietary keying systems and of hierarchical certification authorities. Addresses the geopolitical elements ‐ especially policy and procedures, and national legal frameworks ‐ required to effectively implement the trust that secure transactions require.

Details

Information Management & Computer Security, vol. 6 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of over 11000