{"title":"Risk Catalogue for Mobile Business Applications","authors":"B. Hasan, Patrick Schäfer, J. Gómez, J. Kurzhöfer","doi":"10.5220/0005968900430053","DOIUrl":"https://doi.org/10.5220/0005968900430053","url":null,"abstract":"Today mobile devices, namely smartphones and tablets, are the most popular and used devices. This reality makes companies willing to support mobile devices, which in turn increase the productivity of their employees by allowing them to perform several tasks and to be always updated on the move. However, in spite of the advance in mobile technologies, security is still the primary barrier to the adoption of mobile applications within the enterprise. Some companies avoid the use of mobile business applications due to the fear of security risks. Guidelines and risk catalogues give an overview on the potential risks when using particular applications. Typically, the existing guidelines and risk catalogues target IT-professionals, but not business users who mostly do not have the required technical knowledge to understand the risks. Thus, in this paper, potential risks to companies when adopting mobile business applications are presented in a risk catalogue including the potential mobile threats along with their likelihood of occurrence and possible malicious impact on business. This catalogue will help business users in reinforcing their awareness of possible mobile security risks.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115615222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive e-Advertising Delivery Model: The AEADS Approach","authors":"A. Qaffas, A. Cristea","doi":"10.5220/0005996301240131","DOIUrl":"https://doi.org/10.5220/0005996301240131","url":null,"abstract":"e-Advertising adaptation plays a main role in delivering personalised advertisements to internet users. In this time of the Internet revolution, many websites need to use the adaptation process to adapt their advertisements. This paper focuses on a lightweight delivery model, easy to integrate into wide range of existing websites. This model includes three engines, in order to deliver personlised advertisements to Internet users easily. It also presents a study that assesses the effectiveness of a tool based on this model, called AEADS, via a trial run of a model prototype with users.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Petrova, Adriana Romaniello, B. Medlin, Sandra A. Vannoy
{"title":"QR Codes Advantages and Dangers","authors":"K. Petrova, Adriana Romaniello, B. Medlin, Sandra A. Vannoy","doi":"10.5220/0005993101120115","DOIUrl":"https://doi.org/10.5220/0005993101120115","url":null,"abstract":"Quick Response (QR) codes are two dimensional (matrix) codes that have been developed in ways that allow companies and individuals to sell or market their products, skills, and events quickly and easily. The code can be used to represent data such as a web address or map location that can be scanned quickly by a mobile device such as a smart phone. Tracking inventories and marketers were some of the first uses and users of QR codes because of the ease of deployment and low development cost. The use has also grown quickly amongst individual users who want to transfer information such as sending an invitation, providing details about an event, or even announcing a babyâs birth. While there are many advantages in the use of QR codes, there is a negative side that has resulted in end users discontinuing their use. Our paper discusses both the usefulness of QR codes as well as the inconveniences and dangers that they may pose.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"130 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120927367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical Examination of Customer Retention in Mobile Telecommunication Services in Australia","authors":"H. Bhatti, A. Abareshi, S. Pittayachawan","doi":"10.5220/0005951900720077","DOIUrl":"https://doi.org/10.5220/0005951900720077","url":null,"abstract":"The service quality has an impact on customer satisfaction and retention. From Telecommunication annual reports it has been investigated that there are service quality issues due to high complaints in Australia and it can affect end customers and businesses (TIO, 2013, ACMA, 2013). Factors such as behavioural intention which leads to customer intention to repurchase the service are measured through the Unified Theory of Acceptance and Use of Technology (UTAUT2), Marketing Mix Theory and Expectation Confirmation Theory (ECT). Similarly, researchers have studied the habit, hedonic motivation, customer satisfaction, customer experience, marketing mix factors relationship by empirical testing. There has been very little research in the area of customer retention in mobile telecommunication services. Drawing upon theories of marketing mix, ECT and UTAUT2, this study aims to determine what factors affect customer retention in mobile telecommunication services in Australia. Data gathering will be done through online surveys from Australian consumers. Quantitative data analysis techniques, structural equation modelling (SEM) will be used for data analysis. This study will contribute to the customer retention literature through a theoretical framework that shows how the customer retention can be generated in mobile telecommunication services. Additionally, this study will help businesses to have understanding of how to retain their customers which will result in higher business revenues.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121780274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control","authors":"Tatsuya Fujimoto, Keiichi Iwamura, Masaki Inamura","doi":"10.5220/0005994501160123","DOIUrl":"https://doi.org/10.5220/0005994501160123","url":null,"abstract":"We have proposed a copyright protection technology suitable for editable contents, which can control the change, deletion, and addition of partial contents. In this paper, we propose a new scheme that can control the diversion of partial contents to other contents and composition of contents, in addition to control of the change, deletion, and addition of partial contents using digital signatures based on the author’s intention. This scheme realizes edit control between two or more contents, and is effective with Internet contents such as consumer generated media represented by YouTube. We also evaluate the security of our proposed scheme against various attacks.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130131757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christina Pakusch, Paul Bossauer, Markus Shakoor, G. Stevens
{"title":"Using, Sharing, and Owning Smart Cars - A Future Scenario Analysis Taking General Socio-Technical Trends into Account","authors":"Christina Pakusch, Paul Bossauer, Markus Shakoor, G. Stevens","doi":"10.5220/0005960900190030","DOIUrl":"https://doi.org/10.5220/0005960900190030","url":null,"abstract":"The megatrends towards both a digital and a usership economy have changed entire markets in the past and will continue to do so over the next decades. In this work, we outline what this change means for possible futures of the mobility sector, taking the combination of trends in both economies into account. Using a sys-tematic, scenario-based trend analysis, we draft four general future scenarios and adapt the two most relevant scenarios to the automotive sector. Our findings show that combing the trends from both economies provides new insights that have often been neglected in literature because of an isolated view on digital technology only. However, service concepts such as self-driving car sharing or self-driving taxis have a great impact at various levels including microeconomic (e.g., service and product design, business models) and macroeconomic (e.g., with regard to ecological, economical, and social impacts). We give a brief outline of these issues and show which business models could be successful in the most likely future scenarios, before we frame strategic implications for todayâs automobile manufacturers.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123028072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Data Service Adoption and Use from a Service Supply Perspective - An Empirical Investigation","authors":"K. Petrova, Stephen G. MacDonell, David T. Parry","doi":"10.5220/0005966100860097","DOIUrl":"https://doi.org/10.5220/0005966100860097","url":null,"abstract":"The paper presents the findings of an empirical study of the views of a selection of mobile data service (MDS) supply chain participants about anticipated MDS customer requirements and expectations, and about the MDS environment. Applying an inductive thematic analysis approach, the study data are first represented as a thematic map; the thematic map is then used to formulate propositions that contribute an MDS supplier perspective to models investigating MDS customer adoption and use.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127057457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imen Ben Said, M. Chaâbane, R. Bouaziz, E. Andonoff
{"title":"A Version-based Approach to Address Flexibility of BPMN Collaborations and Choreographies","authors":"Imen Ben Said, M. Chaâbane, R. Bouaziz, E. Andonoff","doi":"10.5220/0005967100310042","DOIUrl":"https://doi.org/10.5220/0005967100310042","url":null,"abstract":"Process flexibility is an important issue in the business process management area: it has mainly been investigated in the context of intra-organisational processes but it received little attention in the context of processes crossing the boundaries of companies. This paper addresses the issue of BPMN collaborations and choreographies flexibility, advocating a version-based approach. Indeed versions, which have been recognised as a powerful mechanism to face flexibility of internal processes of companies, are used to address flexibility of processes crossing the boundaries of companies, modelled as collaborations or choreographies in BPMN. Thus this paper extends BPMN collaborations using versions. It also introduces algorithms supporting the mapping from versions of collaborations into versions of choreographies. This paper mainly focuses on static aspects of collaboration and choreography versioning.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133645796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context Specific, Networked and Feedback Enhanced eTransformation Business Model","authors":"A. Hol","doi":"10.5220/0005967600980105","DOIUrl":"https://doi.org/10.5220/0005967600980105","url":null,"abstract":"Businesses have been transforming for centuries. Each era of civilisation brought in new innovations and new technologies. Today we find ourselves surrounded by devices, services and applications that in some form utilise technology. Individuals, utilise it to be more productive, groups exchange and manipulate data using it and businesses run their day to day operations. Consequently, technology is been implemented to speed operations, be more reliable and crate new revenues. Based on the scenario analysis of five new businesses which utilise transformed renewed business model, this study investigates technology factors that drive new business models and identifies roles that current technological advancements play in shaping the new models. The study highlights that there is a direct relationship between open access technology platforms and current technology trends. Furthermore, this study identifies that for the new business model to be established definition of the specific domain problems and the importance of the access to the resource networks, such as the network of context specific knowledge, either experts, or the individuals with knowledge and skills who can provide timely context specific solutions and network of those who have interest in a the specific context domain are paramount for the model to succeed.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122467475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gap Processes for Analysing Buyers' Burstiness in E-Business Process","authors":"A. Ahrens, J. Zaščerinska","doi":"10.5220/0005957900780085","DOIUrl":"https://doi.org/10.5220/0005957900780085","url":null,"abstract":"Success of e-business process requires analysis of buyersâ burstiness. The research question is as follows: How \u0000 \u0000to describe buyersâ burstiness in e-business by a mathematical model? The aim of the research is to provide \u0000 \u0000a mathematical model for evaluation of buyersâ burstiness in e-business process. In this work the buyersâ \u0000 \u0000burstiness in e-business process is described by a mathematical concept based on gap processes. Therefore, \u0000 \u0000the meaning of the key concepts of buyersâ burstiness, binary customer behavior and gap processes is studied. \u0000 \u0000Moreover, the analysis demonstrates how the key concepts are related to the idea of e-business process and \u0000 \u0000shows a potential model for development, indicating how the steps of the process are related following a \u0000 \u0000logical chain: conceptual framework â model development â empirical study â conclusions. The results \u0000 \u0000of the present research show the model for evaluation of buyersâ burstiness in e-business process. The model \u0000 \u0000itself is based on the assumption that the gaps between two buyers are statistically independent from each \u0000 \u0000other. The novel contribution of the paper is revealed in the newly created mathematical model for evaluation \u0000 \u0000of buyersâ burstiness in e-business process via gap processes.","PeriodicalId":190970,"journal":{"name":"International Conference on e-Business","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126761799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}