Search results

1 – 10 of over 6000
Article
Publication date: 31 December 2006

Juan Ignacio Vazquez, Diego López de Ipiña and Iñigo Sedano

Despite several efforts during the last years, the web model and semantic web technologies have not yet been successfully applied to empower Ubiquitous Computing architectures in…

Abstract

Despite several efforts during the last years, the web model and semantic web technologies have not yet been successfully applied to empower Ubiquitous Computing architectures in order to create knowledge‐rich environments populated by interconnected smart devices. In this paper we point out some problems of these previous initiatives and introduce SoaM (Smart Objects Awareness and Adaptation Model), an architecture for designing and seamlessly deploying web‐powered context‐aware semantic gadgets. Implementation and evaluation details of SoaM are also provided in order to identify future research challenges.

Details

International Journal of Web Information Systems, vol. 2 no. 3/4
Type: Research Article
ISSN: 1744-0084

Keywords

Abstract

Purpose

Ubiquitous web applications (UWA) are a new type of web applications which are accessed in various contexts, i.e. through different devices, by users with various interests, at anytime from anyplace around the globe. For such full‐fledged, complex software systems, a methodologically sound engineering approach in terms of model‐driven engineering (MDE) is crucial. Several modeling approaches have already been proposed that capture the ubiquitous nature of web applications, each of them having different origins, pursuing different goals and providing a pantheon of concepts. This paper aims to give an in‐depth comparison of seven modeling approaches supporting the development of UWAs.

Design/methodology/approach

This methodology is conducted by applying a detailed set of evaluation criteria and by demonstrating its applicability on basis of an exemplary tourism web application. In particular, five commonly found ubiquitous scenarios are investigated, thus providing initial insight into the modeling concepts of each approach as well as to facilitate their comparability.

Findings

The results gained indicate that many modeling approaches lack a proper MDE foundation in terms of meta‐models and tool support. The proposed modeling mechanisms for ubiquity are often limited, since they neither cover all relevant context factors in an explicit, self‐contained, and extensible way, nor allow for a wide spectrum of extensible adaptation operations. The provided modeling concepts frequently do not allow dealing with all different parts of a web application in terms of its content, hypertext, and presentation levels as well as their structural and behavioral features. Finally, current modeling approaches do not reflect the crosscutting nature of ubiquity but rather intermingle context and adaptation issues with the core parts of a web application, thus hampering maintainability and extensibility.

Originality/value

Different from other surveys in the area of modeling web applications, this paper specifically considers modeling concepts for their ubiquitous nature, together with an investigation of available support for MDD in a comprehensive way, using a well‐defined as well as fine‐grained catalogue of more than 30 evaluation criteria.

Details

International Journal of Web Information Systems, vol. 4 no. 3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 14 September 2015

Nasrine Olson, Jan Michael Nolin and Gustaf Nelhans

The purpose of this paper is to investigate concepts that are used in depicting future visions of society, as afforded by technology, to map the extent of their use, examine the…

1686

Abstract

Purpose

The purpose of this paper is to investigate concepts that are used in depicting future visions of society, as afforded by technology, to map the extent of their use, examine the level of their dominance in different research areas and geographic boundaries, identify potential overlaps, analyse their longitudinal growth, and examine whether any of the identified concepts has assumed an overarching position.

Design/methodology/approach

In total, 14 concepts, each of which is used to depict visions of future information infrastructures, were identified. More than 20,000 scholarly documents related to 11 of these concepts (those with 20 or more documents) are analysed by various qualitative/quantitative methods.

Findings

The concepts most referred to are semantic web and ubiquitous computing (all years), and internet of things (Year 2013). Publications on some newer concepts (e.g. digital living, real world internet) are minimal. There are variations in the extent of use and preferred concepts based on geographic and disciplinary boundaries. The overlap in the use of these terms is minimal and none of these terms has assumed an overarching umbrella position.

Research limitations/implications

This study is limited to scholarly publications; it would be relevant to also study the pattern of usage in governmental communications and policy documents.

Social implications

By mapping multiplicity of concepts and the dispersion of discussions, the authors highlight the need for, and facilitate, a broader discussion of related social and societal implications.

Originality/value

This paper is the first to present a collective of these related concepts and map the pattern of their occurrence and growth.

Details

Journal of Documentation, vol. 71 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 4 April 2016

Jan Nolin and Nasrine Olson

The purpose of this paper is to explore and engage with connections between the evolving technology of the Internet of Things (IoT) and notions of convenience. In particular, the…

7295

Abstract

Purpose

The purpose of this paper is to explore and engage with connections between the evolving technology of the Internet of Things (IoT) and notions of convenience. In particular, the concept of alpha convenience is introduced in order to articulate the broad scope of Internet “any-everything” connectivity, here called “alpha convenience.”

Design/methodology/approach

The recommendations of Constructive Technology Assessment are followed in order to evaluate technology before implementation. The seven value drivers articulated by Fleisch (2010) are utilized in order to envision-specific aspects.

Findings

Three critical aspects relating to alpha convenience are identified and discussed: gossiping technology, personalization and the disempowered smartphone user. It is argued that extreme forms of convenience shift traditional areas of human agency onto technology. It is also noted that alpha convenience tends to develop as ubiquitous feature of future society, making it difficult, if not impossible, to opt out.

Research limitations/implications

The paper focusses on one powerful concept, although the IoT is merely one of several terms used to deliberate the role of next-generation information technology and society. Notable competitors include semantic web, ubiquitous computing, pervasive computing and ambient intelligence.

Social implications

The IoT is predicted to be an intrusive feature into everyday life and the paper identifies important aspects.

Originality/value

This is the first critical discussion of the IoT and convenience. The paper aims at conceptual innovation. Overall, there is a substantial lack of critical scrutiny of the emerging ideas of the IoT.

Details

Internet Research, vol. 26 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 31 December 2006

Akio Sashima, Noriaki Izumi and Koichi Kurumatani

In the vision of pervasive computing, numerous heterogeneous devices, various information services, and users performing daily activities are physically co‐located in a…

Abstract

In the vision of pervasive computing, numerous heterogeneous devices, various information services, and users performing daily activities are physically co‐located in a environment. How can we coordinate the services and devices to assist a particular user in receiving a particular service so as to maximize the user’s satisfaction? To solve this human‐centered coordination issue, we propose an agent‐based service coordination framework for pervasive computing. It is called location‐aware middle agent framework. The middle agent takes account of the user location in cognitive way (based on location‐ontology), and determines best‐matched services for the user. Based on this coordination framework, we have developed a multi‐agent architecture for pervasive computing, called CONSORTS (Coordination System of Real‐world Transaction Services). In this paper, we first outline some requirements of the human‐centered service coordination in pervasive computing. Secondly, we describe location‐aware middle agent framework to fill the requirements. Lastly, we outline CONSORTS, an prototype of location‐aware middle agent framework, and two applications of CONSORTS, location‐aware information assistance services in a museum and wireless‐LAN based location systems on FIPA agent Networks.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 August 2003

Shien‐Chiang Yu and Ruey‐Shun Chen

The integration of information systems must consider various aspects, including the individuals of an organization, cooperating with other vendors, and the connections within this…

1805

Abstract

The integration of information systems must consider various aspects, including the individuals of an organization, cooperating with other vendors, and the connections within this organization. The advantages of integration include shortening the negotiation process among the organization and the cooperating vendors, saving time for the users, and identifying the interface management. However, the greatest difficulties are how to integrate different system platforms and implement technical aspects into a suitable Web‐interface for users to operate. Information technology companies have developed Web Services which rely on the flexibility of the Extended Mark‐up Language. The services not only apply to integrated information systems, but also provide open services in Web environments. This article evaluates the feasibility of Web Services for application in integrated library information systems.

Details

The Electronic Library, vol. 21 no. 4
Type: Research Article
ISSN: 0264-0473

Keywords

Content available
Article
Publication date: 29 August 2008

David Taniar

312

Abstract

Details

International Journal of Web Information Systems, vol. 4 no. 3
Type: Research Article
ISSN: 1744-0084

Article
Publication date: 7 April 2015

Chii Chang, Satish Narayana Srirama and Sea Ling

Recent smart mobile devices are capable of letting users produce various digital content, and share/upload the content to many social network services (SNS) directly via wireless…

Abstract

Purpose

Recent smart mobile devices are capable of letting users produce various digital content, and share/upload the content to many social network services (SNS) directly via wireless network connections. The phenomenon has increased the number of people using mobile SNS applications. Although the applications have become more popular, mobile users have been restricted in the virtual communities of online SNS and are not aware of the social opportunities available to them in real-time surrounding. While they spend most of their time accessing online SNS, they have missed many opportunities to interact with others for new friendships, business opportunities or information sharing. Consequently, a new breed of mobile social network (MSN) system has arisen to assist mobile users to interact with proximal people and perform various social activities. Such a proximal-based MSN environment is termed a Mobile Social Network in Proximity (MSNP).

Design/methodology/approach

Developing an MSNP system needs to address a number of issues and challenges, such as heterogeneity, content/service discovery, privacy and trust, resource management, and so on. This paper identifies and describes these challenges, and reviews a number of related solutions from existing literature. In the follow up, this paper addresses a number of open challenges in the MSNP domain.

Findings

Although various works have been proposed to enable and overcome challenges in MSNP, there are still many unsolved open challenges in terms of identification, content management, social-aware discovery, trust in public environment, adaptation, quality of service and the development of MSNP. We have addressed these challenges in this paper as future research directions in the MSNP domain.

Originality/value

This paper provides an original literature review in MSNP and identifies a number of open challenges as research direction in the MSNP domain.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 22 October 2019

Karol Król and Dariusz Zdonek

Almost two decades after diagnosing the link rot phenomenon, and in spite of the universal character of the bit rot phenomenon, the need for reminding about these is still valid…

Abstract

Purpose

Almost two decades after diagnosing the link rot phenomenon, and in spite of the universal character of the bit rot phenomenon, the need for reminding about these is still valid. This is because it appears that digital device users have become accustomed to them. The bit rot and link rot phenomena describe the inability to access specific contents or the inability to use specific digital resources. This paper aims to answer the question as to whether it is possible to eliminate the link rot and bit rot phenomena from the internet space.

Design/methodology/approach

The link rot and bit rot phenomena were characterised based on a review of various source materials, including the academic literature and internet materials.

Findings

The phenomena known as bit rot and link rot have already been well researched and described. Research has revealed the reasons for their occurrence, and also offered recommendations on how to minimise their occurrence. In the current digital ecosystem, however, it is not possible to completely eliminate the link rot and bit rot phenomena.

Research limitations/implications

One can forecast that the link rot phenomenon will intensify and the internet resources will be even more unstable, because more and more new, highest-level domains which are purchased are emerging.

Originality/value

The study compares the phenomena of bit rot and link rot, even though they are usually considered separately. Moreover, it presents the terms of “digital bumps”, which cause “digital tsunami”.

Details

Global Knowledge, Memory and Communication, vol. 69 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 9 January 2017

Maria Lindh and Jan Michael Nolin

The purpose of this paper is to explore persuasive rhetoric by critically scrutinizing metaphorical devices utilized by leaders of the cloud industry. This paper introduces a…

Abstract

Purpose

The purpose of this paper is to explore persuasive rhetoric by critically scrutinizing metaphorical devices utilized by leaders of the cloud industry. This paper introduces a critical approach to the promotion of cloud technology.

Design/methodology/approach

In total, 13 video clips from YouTube were analyzed, containing presentations and talks delivered by leaders of Google, Apple, Facebook and Amazon – four of the most influential companies within the information technology industry, sometimes referred to as GAFA. With the help of conceptual metaphor theory, often-repeated metaphors for cloud technologies reveal what properties were promoted and hidden.

Findings

GAFA mainly used the same persuasive metaphors to promote cloud computing’s positive aspects. Potentially negative or complex issues were mostly avoided. Cloud technology was uniformly described in metaphors of control, empowerment, transformation and automation. Implicitly, GAFA exerts power through the extensive dissemination of their metaphors and these are used in order to negotiate and overcome doubts about cloud computing and related technologies.

Originality/value

This is the first study aimed at understanding the persuasive rhetoric of GAFA, seen as a uniform object of study.

Details

Journal of Documentation, vol. 73 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

1 – 10 of over 6000