Going Mobile With Enterprise Applications - A study on user behavior and perceptions.
This paper presents findings from three research studies carried out to understand the user behavior and explore the value in using mobile devices for accessing enterprise products.
The focus is essentially on the expectations of the end-‐users, namely, information technology (IT) administrators. In this case, we were exploring how the users of enterprise products might want to leverage mobile technology to access their everyday tasks and information, and therefore identify potential opportunities and challenges for extending their user experience to such devices.
The future of software engineering: Visions of 2025 and beyond IJECEIAES
In the current technological scenario of the industry and businesses, there has been increasing need of software within systems and also an increasing demand being put onto software-intensive systems. This in effect will lead to a significant evolution of software engineering processes over the next twenty years. This is due to the fact of emerging technological advancements like Industry 4.0 and Internet of Things in the IT field, among other new developments. This paper addresses and tries to analyses the key research challenges being faced by the software engineering field and articulates information that is derived from the key research specializations within software engineering. The paper analyses the past and current trends in software engineering. The future of software engineering is also looked with respect to Industry 4.0 which including emerging technological platforms like Internet of Things. The societal impact aspect of future trends in software engineering is also addressed in this paper.
Application of Savings and Loan Cooperative ServicesYogeshIJTSRD
Information technology knowledge has become a necessity. Most of a persons daily activities involve the assistance of information technology, both teaching and learning activities, working in institutions and entrepreneurship. In addition, knowledge of information technology is a persons main asset to be able to compete in the digital era. A cooperative is an institution that runs on the principle of kinship. So that in carrying out its activities prioritizing the welfare of its members and aiming to increase the economic growth of the community. The goal to be achieved in this community service activity is to produce an android based system of savings and loan cooperative service that is able to facilitate the delivery of information from management to members in real time and can provide solutions for speed, accuracy and accuracy. The method used in this research and development research uses the waterfall model, which is a process or steps to develop a new product or improve an existing product. The system analysis was carried out with the initial stages of the research method, the communication stage was carried out by the interview and observation process. The observation process is carried out by making direct observations to get an overview and the interview process is carried out by conducting questions and answers to match the data and information. After designing the next step is build an android system based of savings and loan cooperative service. Dimas Indra Laksmana | Maranatha Wijayaningtyas | Kiswandono "Application of Savings and Loan Cooperative Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40065.pdf Paper URL: https://www.ijtsrd.com/management/mis-and-retail-management/40065/application-of-savings-and-loan-cooperative-services/dimas-indra-laksmana
PNSCares: The android based mobile application to manage student complaintsjournalBEEI
Managing the complaint is tough to handle, efficient response to the complaints from the customer can be an indicator to measure an organization’s performance. We’ve chosen Politeknik Nilai as one of the institutions that are facing daily complaints from the students and parents. Currently, they are using the manual form to lodge a complaint and receive the feedback via email. In this study, we developed an android based mobile application to manage the students’ complaint. With mobile apps, the management can prevent the loss of complaint forms and keep track of the records. This system will send feedback and notification directly via students’ mobile phone. This study referred to the ten principles for effective complaint handling by Ombudsman. We only referred to eight principles to construct the PNSCares. The methodology used to develop mobile apps is using the Mobile Application Development Life Cycle (MADLC). System Usability Scale (SUS) is used to measure the effectiveness of the mobile apps. The feedbacks from ten respondents on the PNSCares prototype are good with 72 scores in SUS for perceived usefulness and ease of use factor. Based on the result, the prototype is effective and easy to use.
Abstract: - Data Mining is a process used to extract the usable data from a larger set of any raw data. It involves
analyzing data patterns in large batches of data using one or more software. R is a programming language for the
purpose of statistical computations and data analysis. The R language is widely used by the data miners and
statisticians on high dimensional pattern extraction. R is freely available under the GNU General Public Licenses
and the source code is written in FORTAN, C and R.It is a GNU project. The pre-compiled binary versions are
freely available for various flavours of operating system. R is basically command line interface (CLI) and various
GUI interfaces are also available now a day. In this articlefocuses the concept of R like; getting data into and out of
R and packages related to data mining and data visualization.
The future of software engineering: Visions of 2025 and beyond IJECEIAES
In the current technological scenario of the industry and businesses, there has been increasing need of software within systems and also an increasing demand being put onto software-intensive systems. This in effect will lead to a significant evolution of software engineering processes over the next twenty years. This is due to the fact of emerging technological advancements like Industry 4.0 and Internet of Things in the IT field, among other new developments. This paper addresses and tries to analyses the key research challenges being faced by the software engineering field and articulates information that is derived from the key research specializations within software engineering. The paper analyses the past and current trends in software engineering. The future of software engineering is also looked with respect to Industry 4.0 which including emerging technological platforms like Internet of Things. The societal impact aspect of future trends in software engineering is also addressed in this paper.
Application of Savings and Loan Cooperative ServicesYogeshIJTSRD
Information technology knowledge has become a necessity. Most of a persons daily activities involve the assistance of information technology, both teaching and learning activities, working in institutions and entrepreneurship. In addition, knowledge of information technology is a persons main asset to be able to compete in the digital era. A cooperative is an institution that runs on the principle of kinship. So that in carrying out its activities prioritizing the welfare of its members and aiming to increase the economic growth of the community. The goal to be achieved in this community service activity is to produce an android based system of savings and loan cooperative service that is able to facilitate the delivery of information from management to members in real time and can provide solutions for speed, accuracy and accuracy. The method used in this research and development research uses the waterfall model, which is a process or steps to develop a new product or improve an existing product. The system analysis was carried out with the initial stages of the research method, the communication stage was carried out by the interview and observation process. The observation process is carried out by making direct observations to get an overview and the interview process is carried out by conducting questions and answers to match the data and information. After designing the next step is build an android system based of savings and loan cooperative service. Dimas Indra Laksmana | Maranatha Wijayaningtyas | Kiswandono "Application of Savings and Loan Cooperative Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40065.pdf Paper URL: https://www.ijtsrd.com/management/mis-and-retail-management/40065/application-of-savings-and-loan-cooperative-services/dimas-indra-laksmana
PNSCares: The android based mobile application to manage student complaintsjournalBEEI
Managing the complaint is tough to handle, efficient response to the complaints from the customer can be an indicator to measure an organization’s performance. We’ve chosen Politeknik Nilai as one of the institutions that are facing daily complaints from the students and parents. Currently, they are using the manual form to lodge a complaint and receive the feedback via email. In this study, we developed an android based mobile application to manage the students’ complaint. With mobile apps, the management can prevent the loss of complaint forms and keep track of the records. This system will send feedback and notification directly via students’ mobile phone. This study referred to the ten principles for effective complaint handling by Ombudsman. We only referred to eight principles to construct the PNSCares. The methodology used to develop mobile apps is using the Mobile Application Development Life Cycle (MADLC). System Usability Scale (SUS) is used to measure the effectiveness of the mobile apps. The feedbacks from ten respondents on the PNSCares prototype are good with 72 scores in SUS for perceived usefulness and ease of use factor. Based on the result, the prototype is effective and easy to use.
Abstract: - Data Mining is a process used to extract the usable data from a larger set of any raw data. It involves
analyzing data patterns in large batches of data using one or more software. R is a programming language for the
purpose of statistical computations and data analysis. The R language is widely used by the data miners and
statisticians on high dimensional pattern extraction. R is freely available under the GNU General Public Licenses
and the source code is written in FORTAN, C and R.It is a GNU project. The pre-compiled binary versions are
freely available for various flavours of operating system. R is basically command line interface (CLI) and various
GUI interfaces are also available now a day. In this articlefocuses the concept of R like; getting data into and out of
R and packages related to data mining and data visualization.
AN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMScsandit
Gamification is the concept of applying game elements in non-game context platforms to motivate people to participate in planned activities to achieve goals.
Gamification has been applied to academic fields including software engineering (SE) in recent years. Many gamification implementations in SE have been ad hoc and lacked standardized guidelines. This paper introduces a new concept of building an expert gamification system(EGS) to provide guidelines for the implementation of gamification for virtual and cross cultural software teams (VCCST). The system will extend the core of a regular expert system to include gamification tools, a supplementary database, and an expert knowledge source. The cross-cultural data for the EGS contains the Hofstede's cultural dimensions (HCD).
As more and more VCCST are formed in recent years, many issues have been raised in those teams stemming from miscommunication and cultural conflicts. This paper uses the EGS to help resolve the issues in VCCST.
This essay briefly highlights the expanding use and impacts of mobile communications and social media in today’s world. The opportunities and challenges that these tools introduce are described. Where adopted, changes that maybe required within an organisation’s architecture are examined as well as other potential changes required to Human Resources. How ERP and related products can support mobile communications and social media are also outlined.
Search for answers in specific domains is a new milestone in question answering. Traditionally, question answering has focused on general domain questions. Thus, the most relevant answers (or passages) are selected according to the type of question and the Named Entities included in the possible answers. In this paper, we present a novel approach on question answering over specific (or technical) domains. This proposal allows us to answer questions such as “What article is appropriate for … “, “What are the articles related to … “, these kind of questions cannot be answered by a general question answering system. Our approach is based on a set of laws of a specific domain, which contain a large set of laws regarding the work organized into a hierarchy. We consider generic concepts such as “article” semantic categories. Our results on the corpus of Federal Labor Law show that this approach is effective and highly reliable.
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSijcsit
Search for answers in specific domains is a new milestone in question answering. Traditionally, question answering has focused on general domain questions. Thus, the most relevant answers (or passages) are selected according to the type of question and the Named Entities included in the possible answers. In this paper, we present a novel approach on question answering over specific (or technical) domains. This proposal allows us to answer questions such as “What article is appropriate for … “, “What are the articles related to … “, these kind of questions cannot be answered by a general question answering system. Our approach is based on a set of laws of a specific domain, which contain a large set of laws regarding the work organized into a hierarchy. We consider generic concepts such as “article” semantic categories. Our results on the corpus of Federal Labor Law show that this approach is effective and highly reliable.
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPScsandit
Mobile applications are becoming an emerging property in today’s world. Delivering high quality mobile applications by improving the quality of the user interface is a definitive guide in building successful mobile applications and will have a significant increase in the market for that application. This paper addresses some issues related to mobile user interface, current input system and user dictionary. After analysing these issues we have proposed a new system by making some improvements to the current input system and user dictionary. In order to improve the current system, we have taken some issues related to one of the most widely used data entry methods ‘Keyboard’ and proposed some improvements by introducing Smart Optimized Keyboard (STOKE). We have provided the results, which include performance, reduction in number of keystrokes, and screen space. This describes the significant change after adopting the proposed keyboard. In the end, we have proposed an optimized way of building up
the user dictionary, which assists the user in inserting the input very easily, rapidly and effectively. In a combine, these two will help in providing the best user experience to the users.
In this paper discussed about the role of e-HR in government/private organization. Electronic human resources are the part of electronic human management (e-HRM). E-HRM is the department of organization; electronic human resources are a function of HR that concerned with the use management and regulation of electronic information and processes within an organization. In this paper also discussed about the term of e-HRM (Electronic Human Resources Management) and e-HRIS (Human Resources Information System). The main goal of this paper is the important of e-HR (Electronic Human Resources) in the organization/industries. In this paper also discussed about the e-HR services, e-HR life cycle. E-HR is the latest technology in which use the technology and provide the good services of customer and employee. In this paper also discussed about the 5-stages of e-HR life cycle in need of improvement, e-HR implementation and also revenue cycle management.
For more classes visit
www.snaptutorial.com
INF 220 Week 2 Assignment Source of Competitive Advantage
This team assignment is meant to provide experience with real-world applicability in working in teams.
The “Sources of Competitive Advantage” image above shows the focus of competitive advantage for seven
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...IJERA Editor
Attracted by the benefits offered by mobility technologies directly relating to cost savings and improved productivity, enterprises are keen to adopt BYOD models; however, without proper feasibility studies and mobility policies in place, BYOD will not be able to generate the desired results. The commercialization of technology or BYOD is rapidly transforming the enterprise mobility landscape and changing the way that organizations conduct business. However, the adoption of this concept enables enterprises to devise stringent and precise mobility policies to avoid any security and privacy issues.
Nowadays the smart phones are equipped with touch based screens, enabling the user to interact in an easier and
efficient way, compared to standard buttons. However, such screens require visual navigation, apparently different
to access for the visually impaired.One of the technologies which aid the blind person to call in android mobile is
Virtual Reality. Even though virtual reality is employed to carry out operations the blind person attention is one of
the most important parameter. If the user commits any mistake to use the application it leads to a wrong call. So, in
this paper we suggest technology to reduce the burdens of a blind person “Haptic Technology”. Haptic is the
science of applying tactile sensation to human interaction with computers. In our paper we have discussed the basic
concepts behind haptic along with the haptic devices and how these devices are interacted to produce sense of touch
and force feedback mechanisms. Also the implementation of this mechanism by means of haptic rendering and
contact detection were discussed. Further we explained the storage and retrieval of haptic data while working with
haptic devices.
Taking into consideration the drivers’ state might be a serious challenge for designing new advanced driver
assistance systems. During this paper we present a driver assistance system strongly coupled to the user. Driver
Assistance by Augmented Reality for Intelligent Automotive is an augmented reality interface informed by a several
sensors. Communicating the presence of pedestrians or bicyclists to vehicle drivers may end up in safer interactions
with these vulnerable road users. Advanced knowledge about the presence of these users on the roadway is
particularly important when their presence isn't expected or when these users are out of range of the advanced safety
systems that are becoming a daily feature in vehicles today. For example, having advanced knowledge of a pedestrian
walking along a rural roadway is important to increasing driver awareness through in-vehicle warning messages that
provide an augmented version of the roadway ahead. Voice recognition system through an android platform adds
some good flavour during this project. The strategy of voice recognition through this platform is achieved by
converting the input voice signal into text of string and subsequently it's transmitted to embedded system which
contains an arduino atmega328 microcontroller through Bluetooth as a technique of serial communication between an
android application and a control system. The received text string on an arduino is also displayed on the AR Glass. As
connected vehicles start to enter the market, it's conceivable that when the vehicle sensors detect a pedestrian on a
rural roadway, the pedestrian presence is also communicated to vehicles upstream of the pedestrian location that
haven't reached the destination. This paper presents a survey of studies related to perception and cognitive attention
of drivers when this information is presented on Augmented Reality
Master thesis exploring the emerging field of Mobile App Analytics. We explore the potentials of the mobile app as a data source and the current stage within mobile app analytics
AN EXPERT GAMIFICATION SYSTEM FOR VIRTUAL AND CROSS-CULTURAL SOFTWARE TEAMScsandit
Gamification is the concept of applying game elements in non-game context platforms to motivate people to participate in planned activities to achieve goals.
Gamification has been applied to academic fields including software engineering (SE) in recent years. Many gamification implementations in SE have been ad hoc and lacked standardized guidelines. This paper introduces a new concept of building an expert gamification system(EGS) to provide guidelines for the implementation of gamification for virtual and cross cultural software teams (VCCST). The system will extend the core of a regular expert system to include gamification tools, a supplementary database, and an expert knowledge source. The cross-cultural data for the EGS contains the Hofstede's cultural dimensions (HCD).
As more and more VCCST are formed in recent years, many issues have been raised in those teams stemming from miscommunication and cultural conflicts. This paper uses the EGS to help resolve the issues in VCCST.
This essay briefly highlights the expanding use and impacts of mobile communications and social media in today’s world. The opportunities and challenges that these tools introduce are described. Where adopted, changes that maybe required within an organisation’s architecture are examined as well as other potential changes required to Human Resources. How ERP and related products can support mobile communications and social media are also outlined.
Search for answers in specific domains is a new milestone in question answering. Traditionally, question answering has focused on general domain questions. Thus, the most relevant answers (or passages) are selected according to the type of question and the Named Entities included in the possible answers. In this paper, we present a novel approach on question answering over specific (or technical) domains. This proposal allows us to answer questions such as “What article is appropriate for … “, “What are the articles related to … “, these kind of questions cannot be answered by a general question answering system. Our approach is based on a set of laws of a specific domain, which contain a large set of laws regarding the work organized into a hierarchy. We consider generic concepts such as “article” semantic categories. Our results on the corpus of Federal Labor Law show that this approach is effective and highly reliable.
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSijcsit
Search for answers in specific domains is a new milestone in question answering. Traditionally, question answering has focused on general domain questions. Thus, the most relevant answers (or passages) are selected according to the type of question and the Named Entities included in the possible answers. In this paper, we present a novel approach on question answering over specific (or technical) domains. This proposal allows us to answer questions such as “What article is appropriate for … “, “What are the articles related to … “, these kind of questions cannot be answered by a general question answering system. Our approach is based on a set of laws of a specific domain, which contain a large set of laws regarding the work organized into a hierarchy. We consider generic concepts such as “article” semantic categories. Our results on the corpus of Federal Labor Law show that this approach is effective and highly reliable.
APPLICATION BASED SMART OPTIMIZED KEYBOARD FOR MOBILE APPScsandit
Mobile applications are becoming an emerging property in today’s world. Delivering high quality mobile applications by improving the quality of the user interface is a definitive guide in building successful mobile applications and will have a significant increase in the market for that application. This paper addresses some issues related to mobile user interface, current input system and user dictionary. After analysing these issues we have proposed a new system by making some improvements to the current input system and user dictionary. In order to improve the current system, we have taken some issues related to one of the most widely used data entry methods ‘Keyboard’ and proposed some improvements by introducing Smart Optimized Keyboard (STOKE). We have provided the results, which include performance, reduction in number of keystrokes, and screen space. This describes the significant change after adopting the proposed keyboard. In the end, we have proposed an optimized way of building up
the user dictionary, which assists the user in inserting the input very easily, rapidly and effectively. In a combine, these two will help in providing the best user experience to the users.
In this paper discussed about the role of e-HR in government/private organization. Electronic human resources are the part of electronic human management (e-HRM). E-HRM is the department of organization; electronic human resources are a function of HR that concerned with the use management and regulation of electronic information and processes within an organization. In this paper also discussed about the term of e-HRM (Electronic Human Resources Management) and e-HRIS (Human Resources Information System). The main goal of this paper is the important of e-HR (Electronic Human Resources) in the organization/industries. In this paper also discussed about the e-HR services, e-HR life cycle. E-HR is the latest technology in which use the technology and provide the good services of customer and employee. In this paper also discussed about the 5-stages of e-HR life cycle in need of improvement, e-HR implementation and also revenue cycle management.
For more classes visit
www.snaptutorial.com
INF 220 Week 2 Assignment Source of Competitive Advantage
This team assignment is meant to provide experience with real-world applicability in working in teams.
The “Sources of Competitive Advantage” image above shows the focus of competitive advantage for seven
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...IJERA Editor
Attracted by the benefits offered by mobility technologies directly relating to cost savings and improved productivity, enterprises are keen to adopt BYOD models; however, without proper feasibility studies and mobility policies in place, BYOD will not be able to generate the desired results. The commercialization of technology or BYOD is rapidly transforming the enterprise mobility landscape and changing the way that organizations conduct business. However, the adoption of this concept enables enterprises to devise stringent and precise mobility policies to avoid any security and privacy issues.
Nowadays the smart phones are equipped with touch based screens, enabling the user to interact in an easier and
efficient way, compared to standard buttons. However, such screens require visual navigation, apparently different
to access for the visually impaired.One of the technologies which aid the blind person to call in android mobile is
Virtual Reality. Even though virtual reality is employed to carry out operations the blind person attention is one of
the most important parameter. If the user commits any mistake to use the application it leads to a wrong call. So, in
this paper we suggest technology to reduce the burdens of a blind person “Haptic Technology”. Haptic is the
science of applying tactile sensation to human interaction with computers. In our paper we have discussed the basic
concepts behind haptic along with the haptic devices and how these devices are interacted to produce sense of touch
and force feedback mechanisms. Also the implementation of this mechanism by means of haptic rendering and
contact detection were discussed. Further we explained the storage and retrieval of haptic data while working with
haptic devices.
Taking into consideration the drivers’ state might be a serious challenge for designing new advanced driver
assistance systems. During this paper we present a driver assistance system strongly coupled to the user. Driver
Assistance by Augmented Reality for Intelligent Automotive is an augmented reality interface informed by a several
sensors. Communicating the presence of pedestrians or bicyclists to vehicle drivers may end up in safer interactions
with these vulnerable road users. Advanced knowledge about the presence of these users on the roadway is
particularly important when their presence isn't expected or when these users are out of range of the advanced safety
systems that are becoming a daily feature in vehicles today. For example, having advanced knowledge of a pedestrian
walking along a rural roadway is important to increasing driver awareness through in-vehicle warning messages that
provide an augmented version of the roadway ahead. Voice recognition system through an android platform adds
some good flavour during this project. The strategy of voice recognition through this platform is achieved by
converting the input voice signal into text of string and subsequently it's transmitted to embedded system which
contains an arduino atmega328 microcontroller through Bluetooth as a technique of serial communication between an
android application and a control system. The received text string on an arduino is also displayed on the AR Glass. As
connected vehicles start to enter the market, it's conceivable that when the vehicle sensors detect a pedestrian on a
rural roadway, the pedestrian presence is also communicated to vehicles upstream of the pedestrian location that
haven't reached the destination. This paper presents a survey of studies related to perception and cognitive attention
of drivers when this information is presented on Augmented Reality
Master thesis exploring the emerging field of Mobile App Analytics. We explore the potentials of the mobile app as a data source and the current stage within mobile app analytics
One-in-two mobile owners in the US owns a smartphone, and many more own tablets. As most of these same consumers adapt their personal lifestyle to be “mobile first,” they expect their employers to be there to meet them. With the growing number of personal mobile devices in the hands of users, as well as increasingly remote organizations , there’s a great opportunity for organizations to increase productivity of their employees by allowing the use of these personal devices. Taking this on seems daunting, as IT has less ability to enforce a single standard than ever before. Not taking action, however, and ignoring this trend risks exposing corporate data to public clouds with no visibility on the part of IT. Enforcing a single standard will do a lot to serve all users partially, but none particularly well. "Power to the People: Identify and Empower Your Workforce," the new report by Altimeter Group analyst Chris Silva explores how companies are deploying mobile strategies to meet the the specific needs of their employees and the organization at large.
This paper reports on the current challenges the professional sector faces when going mobile. The report discusses the role of mobile devices in the workforce and addresses challenges like compatibility, security and training. It also provides a comprehensive review of the mobile landscape, and reviews current best practices in mobile learning.
Unleashing the Power of Survey Mobile ApplicationsNestForms
In the ever-evolving landscape of data collection and information gathering, survey mobile applications have emerged as powerful tools that streamline the process and revolutionise the way we collect and analyse data. Read more!
RESEARCH ARTICLEUSER SERVICE INNOVATION ON MOBILE PHONEP.docxaudeleypearl
RESEARCH ARTICLE
USER SERVICE INNOVATION ON MOBILE PHONE
PLATFORMS: INVESTIGATING IMPACTS OF LEAD
USERNESS, TOOLKIT SUPPORT,
AND DESIGN AUTONOMY1
Hua (Jonathan) Ye
Department of Information Systems and Operations Management, The University of Auckland Business School,
12 Grafton Road, Auckland 1142, NEW ZEALAND {[email protected]}
Atreyi Kankanhalli
Department of Information Systems and Analytics, National University of Singapore, 13 Computing Drive,
SINGAPORE 117417 {[email protected]}
User participation is increasingly being seen as a way to mitigate the challenges that firms face in innovation,
such as high costs and uncertainty of customer acceptance of their innovations. Thus, firms are establishing
online platforms to support users in innovating services, such as iOS and Android platforms for mobile data
service (MDS) innovation. Mobile phone platforms are characterized by technology (toolkits) and policy
(rules) components that could influence user’s innovation. Additionally, attributes of user innovators (lead
userness) are expected to drive their innovation behavior. Yet it is unclear how these characteristics jointly
impact users’ service innovation outcomes. To address this knowledge gap, we propose a model that builds
on user innovation theory and the work design literature to explain the influences of lead userness, design
autonomy, toolkit support, and their interactions on user’s innovation outcomes (innovation quantity) on these
platforms. We conceptualize toolkit support in terms of two constructs (i.e., ease of effort and exploration), and
design autonomy in terms of three constructs (i.e., decision-making autonomy, scheduling autonomy, and work-
method autonomy). The model was tested using survey and archival data from two dominant mobile phone
platforms (i.e., iOS and Android). As hypothesized, lead userness, exploration through toolkits, and ease of
effort through toolkits positively affect users’ innovation quantity. Additionally, decision-making autonomy
and work-method autonomy influence innovation quantity, but scheduling autonomy does not. Further, the pro-
posed three-way interactions between lead userness, toolkit support, and design autonomy constructs on users’
quantity of MDS innovation are largely supported. The findings enhance our understanding of user innovation
on mobile phone platforms.
1
Keywords: User innovation, mobile phone platform, design autonomy, toolkit support, lead userness, three-
way interaction
1Arun Rai was the accepting senior editor for this paper. Yulin Fang served as the associate editor.
The appendices for this paper are located in the “Online Supplements” section of the MIS Quarterly’s website (http://www.misq.org).
DOI: 10.25300/MISQ/2018/12361 MIS Quarterly Vol. 42 No. 1, pp. 165-187/March 2018 165
Ye & Kankanhalli/User Service Innovation on Mobile Phone Platforms
Introduction
Engaging customers or users in the process of service
innovation is incre ...
Framework to Analyze Customer’s Feedback in Smartphone Industry Using Opinion...IJECEIAES
In the present age, cellular phones are the largest selling products in the world. Big Data Analytics is a method used for examining large and varied data, which we know as big data. Big data analytics is very useful for understanding the world of cellphone business. It is important to understand the requirements, demands, and opinions of the customer. Opinion Mining is getting more important than ever before, for performing analysis and forecasting customer behavior and preferences. This study proposes a framework about the key features of cellphones based on which, customers buy them and rate them accordingly. This research work also provides balanced and well researched reasons as to why few companies enjoy dominance in the market, while others do not make as much of an impact.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
End-User Computing Insights: A study of digital maturityDImension Data
Dimension Data has gained valuable insights through working with top global clients in the domain of end-user computing over the past five years.
Our report delivers these insights to your business – so you can benchmark your journey and take the next steps in end-user computing with confidence.
Consumer technology is invading the enterprise and IT must embrace it in order to encourage employee productivity and satisfaction. Info-Tech recommends that organizations allow personal mobile devices on their corporate networks. This research addresses the following:
•Understand differences in security and management between the three major platforms – BlackBerry, Apple iOS, and Google Android.
•Evaluate the organization's position on the mobile device security scale and determine if third-party infrastructure is necessary.
•Development and enforcement of a personal mobile acceptable use policy to encourage end-user compliance and foster success.
Embrace consumer technology in the enterprise, and focus on end-user compliance to leverage productivity and maximize the potential for success.
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docxjeanettehully
Running head: PROFESSIONAL INTERVIEW REPORT 1
PROFESSIONAL INTERVIEW REPORT 4
Experience as a Computer Scientist
Opening Statement
For this report, the professional interviewed is a computer Engineer/ Web Developer who works for Omnivision Technologies Inc., a corporation that designs and develops advance digital technologies to use in mobile phones, notebooks, security cameras etc. across the United States. The interviewee is the technical manager of the organization and works at its headquarters in Santa Clara, California and has been working in this position for the last five years. This computer science expert provided very useful information about the computer science profession and highlighted a number of challenges common in the career. Further, he provided some recommendations on how the challenges can be dealt with. From the information provided by the interviewee, it is clear that the computer science profession is full of challenges particularly regarding the fast changing technology. The interview revealed several important topics which require further research.
Methodology
The interview was conducted on a skype video call and lasted for slightly above 30 minutes. Before the interview, the interviewee was contacted one hour in advance in order to avoid an ambush. He was also made to understand that the questions which were to be asked during the interview regards the profession, its concerns and challenges. The phone call was recorded during the entire conversation and the information later transcribed and key points extracted. This report is based only on important points and not everything that the interviewee said.
Essential Background
Computer science is a field of technology that deals with studying processes that interact with data and which can be depicted as data in program form. Skills in computer science enables one to manipulate, use, or communicate digital information using programing algorithms. An expert in computer science has knowledge in computation theory as well as the practice of software systems design. Computer scientists are also popularly known as computer and information scientists and can work in a range of environments. For instance, these professionals work in private software publishers, government agencies, academic institutions, and engineering firms (Page & Smart, 2013). Wherever they work, computer scientists’ general roles include solving computing problems as well as developing new products.
The professional interviewed for this report has in-depth knowledge in computer systems and management. Through his leadership skill, he organizes the successful delivery of effective and efficient technical solutions within the company. In particular, he is responsible for planning, designing, developing, production, and testing communication systems. He is also responsible for supervising technical and operations teams, landline and cellular network, IT infrastructure, and service platforms. He ...
A study of how application usage can help increase consumer satisfaction for ...Abeer Raza
This study uses regression analysis to determine the effects of mobile applications on consumer satisfaction. The paper focuses on the impact of mobile application usage on consumer behavior with regards to consumer engagement and brand loyalty. The author also looks into understanding the different factors within a mobile app that increases consumer satisfaction. This approach helps identify not just the factors themselves and their benefits but also their contribution in cultivating a long-term relationship between consumers and businesses.
Similar to Going mobile with enterprise application (20)
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
1. GOING
MOBILE
WITH
ENTERPRISE
APPLICATIONS
|
White
Paper
|
Jan,
2012
P a g e
|
1
Going
Mobile
With
Enterprise
Applications
A study on user behavior and perceptions
By
Muzayun
Mukhtar
Muzayun_Mukhtar@symantec.com
Markus
Grotenhuis
Markus_Grotenhuis@symantec.com
Anjeli
Singh
Anjeli_Singh@symantec.com
2. GOING
MOBILE
WITH
ENTERPRISE
APPLICATIONS
|
White
Paper
|
Jan,
2012
P a g e
|
2
EXECUTIVE
SUMMARY
This
paper
presents
findings
from
three
research
studies
carried
out
to
understand
the
user
behavior
and
explore
the
value
in
using
mobile
devices
for
accessing
enterprise
products.
The
focus
is
essentially
on
the
expectations
of
the
end-‐users,
namely,
information
technology
(IT)
administrators.
In
this
case,
we
were
exploring
how
the
users
of
enterprise
products
might
want
to
leverage
mobile
technology
to
access
their
everyday
tasks
and
information,
and
therefore
identify
potential
opportunities
and
challenges
for
extending
their
user
experience
to
such
devices.
The
research
methods
followed
for
these
studies
include
qualitative
tools
like
self
reporting
diaries
kept
by
IT
administrators,
focus
group
discussion,
and
a
survey
conducted
among
the
customers,
who
were
the
end
users
of
Symantec
products.
In
these
studies,
it
was
found
that
use
of
mobile
phones
is
ultimately
about
convenience,
simplicity,
and
ease
of
use.
Today’s
IT
administrators
favor
and
showed
a
desire
to
adapt
mobile
devices
as
their
productivity
tool.
However,
these
are
not
seen
just
as
supplementary
devices.
Mobile
devices
can
actually
result
in
handling
their
daily
tasks
more
effectively,
for
example
monitor
alerts
or
faults
in
the
data
center
can
be
always
on
their
finger
tips.
Because
users
are
already
getting
alert
notifications
through
emails,
a
mobile
application
has
to
do
more
than
just
feed
alerts.
It
is
revealed
that
users
would
want
to
have
access
to
tasks
and
immediate
remediation
in
case
of
faults.
For
critical
tasks,
an
alternate
choice
would
be
to
delegate
the
task
to
other
administrators
who
are
available
to
perform
the
task,
especially
when
necessary
remediation
is
too
complicated
to
do
from
a
mobile
device.
User
concerns
in
using
the
mobile
devices
also
came
up
during
these
studies
for
e.g.,
issues
related
to
security
such
as
VPN
access
and
execution
of
critical
and
bulk
operations.
In
regards
to
the
use
of
mobile
devices
by
the
IT
administrators,
enterprise
environments
might
also
need
to
overcome
challenges
withmanaging
security
and
protecting
data,
device
authentication,
policies
regarding
separation
of
personal
and
corporate
data.
KEYWORDS
Enterprise,
User
experience,
Mobile
application,
IT
administrative
tasks
3. GOING
MOBILE
WITH
ENTERPRISE
APPLICATIONS
|
White
Paper
|
Jan,
2012
P a g e
|
3
CONTENTS
EXECUTIVE
SUMMARY
..................................................
2
Keywords
..................................................................
2
1.
INTRODUCTION
....................................................
4
2.
ABOUT
THIS
PAPER
..............................................
4
3.
RESEARCH
METHODOLOGY
AND
STUDY
DETAILS
4
3.1
Study
I
–
Diary
Study
....................................
4
3.2
Study
II
–
Focus
Group
.................................
5
3.3
Study
III
-‐
Survey
..........................................
5
4.
RESULTS
................................................................
5
4.1
Current
practices
and
company
policies
.....
5
4.2
User
expectations
in
using
mobile
devices
..
6
4.3
User
perception
of
the
impact
....................
7
4.4
Concerns
and
challenges
to
overcome
........
8
5.
DISCUSSION
AND
CONCLUSION
...........................
8
6.
ACKNOWLEDGMENTS
..........................................
9
7.
REFERENCES
.........................................................
9
4. GOING
MOBILE
WITH
ENTERPRISE
APPLICATIONS
|
White
Paper
|
Jan,
2012
P a g e
|
4
1. INTRODUCTION
*
Nearly
75%
of
the
American
workforce
and
35%
of
the
global
workforce
will
be
mobile
by
2013
.
Symantec’s
strategy
for
mobile
(one
of
the
pillars
of
FQ11-‐12)
aims
to
drive
customer
satisfaction
by
extending
applications
to
mobile
devices.
As
part
of
preliminary
research
during
late
2010,
User
Experience
(UX)
team
which
is
a
part
of
Shared
Engineering
Services
(SES)
in
Symantec
studied
and
analyzed
the
current
industrial
scene
and
trends,
completed
initial
investigation
on
users
and
also
developed
some
proof
of
concepts
(POCs)
for
various
Symantec
products.
Our
research
showed
that
the
next
generation
IT
administrators
have
a
different
relationship
with
technology
as
compared
to
their
predecessors;
they
are
living
with
social
networking,
using
iPhones
and
iPads
for
their
personal
use.
They
are
bringing
these
new
devices
into
corporate
settings,
demanding
newer
and
more
exciting
way
of
doing
their
productive
tasks.
Many
industry
and
academic
research
studies
were
referred
to
gather
inputs
on
the
same.
We
also
felt
a
need
to
understand
the
requirements
from
the
point
of
view
of
enterprise
IT
experts.
Moving
forward,
we
wanted
to
learn
more
from
our
end-‐users,
get
feedback
on
the
use-‐cases
that
made
sense
for
porting
our
enterprise
applications
on
mobile
devices
and
identify
non-‐conforming
data
points,
if
there
are
any.
Research
studies
were
conducted
to
gather
insights
on
the
type
of
tasks
that
IT
professionals
perform
on
a
mobile
phone
vs.
a
tablet
device
vs.
a
desktop
computer
workstation.
We
also
aimed
at
developing
a
better
understanding
of
the
current
practices
with
regard
to
use
of
mobile
devices,
uncover
users’
needs
and
expectations.
Enterprise
environment
policies,
strategies,
and
concerns
in
regards
to
mobile
devices
were
also
investigated.
2. ABOUT
THIS
PAPER
In
this
paper,
we
present
the
main
findings
from
three
rounds
of
user
research
studies
conducted
across
IT
professionals
in
different
roles
during
FQ11-‐12.
This
paper
is
put
together
so
that
we
could
reach
to
the
wider
audience
within
the
industry,
make
this
research
available
to
the
internal
developers
and
designers
who
would
be
designing
future
mobile
enterprise
applications
for
our
end-‐users.
*
Source:
IDC
Market
Intelligence
2011
First,
we
summarize
the
research
methodology
and
participant
profiles.
Then,
we
give
an
understanding
of
user
response
with
respect
to
mobile
devices.
Finally,
in
conclusion,
we
summarize
our
findings
and
their
usefulness,
and
also
talk
about
plans
to
pursue
further
research
in
the
domain.
3. RESEARCH
METHODOLOGY
AND
STUDY
DETAILS
In
this
section,
we
describe
the
various
study
techniques
which
were
employed
to
gather
insights
from
the
end-‐users
relating
to
current
practices,
their
expectations
and
perceptions
of
the
mobile
devices.
In
each
of
these
studies,
we
had
different
set
of
participants.
We
mostly
relied
on
what
the
participants
have
shared
with
the
researchers
and
further
analysis
of
the
same.
The
contextual
environment
understanding
is
not
part
of
these
studies.
One
of
the
studies
was
a
focus
group[5]
discussion,
which
was
carried
out
in
a
face
to
face
interaction
with
the
end-‐users,
in
a
usability
lab.
[Study
II
–
Focus
Group]
These
studies
were
conducted
to
gain
insights
for
designing
a
new
experience
for
our
end-‐users.
As
the
field
data
collected
was
qualitative
and
descriptive
in
nature,
and
the
data
collection
methods
were
very
effort
intensive,
the
number
of
users
participating
in
these
studies
is
not
sufficiently
large
to
make
generalizations
on
the
preferences
of
IT
administrators.
However,
the
goal
of
this
paper
is
not
to
provide
a
generalized
account
of
the
working
methods
of
IT
administrators,
rather
to
draw
inspiration
for
designing
the
mobile
enterprise
applications
from
what
our
users
have
cited.
Following
sections
give
detailed
information
on
the
methodologies
followed
and
participant
profiles:
3.1 Study
I
–
Diary
Study
The
study
I
was
carried
out
to
understand
the
everyday
tasks
of
IT
administrators,
duration
of
tasks,
their
frequencies,
products
used,
environments
and
any
dependencies
on
peers.
In
this
study,
activity
logging
technique
was
followed
in
which
IT
administrators
recorded
their
daily
activities
for
a
duration
of
5
weekdays.
By
activities,
we
mean
tasks
which
they
do
regularly
like
configuring
a
storage
for
a
end-‐user,
deploying
certain
number
of
virtual
machines
(VMs)
for
a
business
unit
or
configuring
an
application
etc.
These
IT
administrators
represented
various
business
groups
within
Symantec:
Storage
Availability
Management
Group
(SAMG),
Symantec
Backup
Executive
(BE)
and
Compliance
Suite
(CCS).
In
5. GOING
MOBILE
WITH
ENTERPRISE
APPLICATIONS
|
White
Paper
|
Jan,
2012
P a g e
|
5
total,
10
participants
contributed
in
this
research
study.
These
belonged
to
different
job
profiles;
IT
Administrators
(8),
Senior
IT
Architect
(1),
IT
Management
(1).
Participants
were
also
asked
to
provide
their
comments
and
ideas
on
the
possibility
of
carrying
out
their
everyday
tasks
on
mobile
devices.
In
total,
118
tasks
were
reported,
out
of
which
98
tasks
were
seen
as
feasible
using
mobile
devices.
Users
even
had
certain
expectations
as
how
they
should
take
place
in
a
mobile
application.
The
remaining
were
found
either
challenging
or
were
more
to
do
with
employee
development/
internal
errands.
3.2 Study
II
–
Focus
Group
In
the
second
study,
we
initially
interviewed
participants
to
gather
open-‐ended
responses
regarding
current
practices
with
regard
to
use
of
mobile
devices,
their
needs
and
expectations.
This
was
followed
by
an
interactive
session,
Focus
Group
(FG),
in
which
participants
were
asked
to
share
their
thoughts,
perceptions,
and
ideas
about
using
Symantec
enterprise
products
on
a
mobile
device.
The
session
lasted
for
90
minutes.
Participants
were
mostly
Symantec
customers
attending
the
annual
Symantec
Vision
conference
2011
in
Las
Vegas.
Participants
were
15
in
number,
belonging
to
different
profiles
like
IT
Operations
(7),
IT
Management
(5),
Security/Compliance
(3).
These
participant
were
recruited
in
advance
through
email
and
on
spot,
their
time
was
reserved.
During
the
session,
we
asked
questions
about
general
role
of
mobile
devices
in
their
work,
the
kind
of
information
and
tasks
they
would
want
to
see,
and
any
challenges
they
foresee.
Participants
primarily
showed
excitement
that
Symantec
is
moving
towards
mobile
space,
but
at
the
same
time
they
recognized
that
any
enterprise
information
exposed
on
a
mobile
device
has
to
be
incredibly
secure.
They
believed
Symantec
would
be
able
to
handle
this
proficiently.
3.3 Study
III
-‐
Survey
For
the
Study
III,
we
relied
on
an
online
survey
to
collect
quantitative
data
to
further
support
our
qualitative
studies.
This
survey
was
deployed
among
the
attendees
at
2011
Vision,
Symantec's
annual
user
and
technical
conference.
These
included
customers
and
Symantec
internal
employees.
The
online
survey
included
questions
focused
on
current
practices,
type
of
Symantec
products
they
are
currently
using
and
their
mobile
expectations.
104
participants
completed
the
survey;
they
were
from
enterprise
&
large
businesses
(86%)
and
represented
various
industries.
The
majority
of
them
were
from
Finance/Insurance
(18.45
%),
and
Computer
and
Electronics
(15.53%).
Most
of
the
participants
were
using
more
than
three
Symantec
products.
4. RESULTS
This
section
presents
the
significant
findings
from
the
above
mentioned
studies.
The
various
insights
collected
and
the
observation
recorded
were
analyzed
in
order
to
reveal
patterns
and
common
elements
across
them.
Comments
from
the
participants
were
also
recorded
to
recognize
the
user’s
aspirations.
The
results
are
divided
into
four
main
sections:
(1)
Present
User
Behaviors
and
Company
Policies,
(2)
User
Expectations
in
using
Mobile
Devices,
(3)
User
Perception
of
the
Impact,
and
(4)
Concerns
and
Challenges
to
Overcome.
4.1 Current
practices
and
company
policies
Current
Mobile
Device
Practices
The
majority
of
work
related
activities
that
users
currently
perform
on
mobile
phones
are
related
to
monitoring
jobs
through
email
alerts,
besides
making
office
related
calls
and
IM,
office
email
access
and
calendar/schedule.
(Re)viewing
and
consuming
work
related
documents
are
also
generally
done.
However,
it
is
found
very
difficult
to
edit
or
create
documents.
Context
matters
a
lot
to
users,
in
the
way
that
they
do
care
to
think
where
they
are
using
their
devices
to
do
professional
tasks
–
however,
mobile
usage
is
not
found
exclusive
to
any
location.
Users
felt
that
they
could
use
the
device
anywhere,
even
when
they
are
at
their
desk.
In
the
course
of
these
studies,
Blackberry
seemed
to
be
the
device
most
used
for
official
use,
among
the
customers.
A
mixed
type
of
user
behavior
was
noticed
in
terms
of
the
number
of
devices
owned
and
maintained
by
the
users
–
some
users
keep
one
device
for
everything
while
others
prefer
two
separate
devices
for
personal
and
corporate
use.
This
might
be
driven
by
the
company
policies
and
to
some
extent,
personal
preferences.
At
present,
tablets
mostly
are
used
as
consumption
devices,
not
as
production
devices
like
the
mobile
phones.
6. GOING
MOBILE
WITH
ENTERPRISE
APPLICATIONS
|
White
Paper
|
Jan,
2012
P a g e
|
6
Enterprise
Mobile
Device
Policies
There
are
certain
policies
in
the
organizations
which
define
what
type
of
devices
IT
professionals
can
use
within
the
enterprise.
Blackberry
is
still
the
one
mobile
device
that
many
organizations
support
exclusively.
iPhone
and
Android
device
support
is
increasing,
and
this
is
mainly
driven
by
executives,
creative
staff
and
sales
group.
While
as,
support
of
tablet
devices
is
increasing
slower
than
mobile
phone
support,
but
it
is
picking
up.
Again,
this
is
mainly
driven
by
the
executives
who
stretch
the
possibilities[1].
Some
customers
said
that
they
don’t
trust
mobile
devices
to
be
very
secure,
and
hence
there
are
strict
policies
to
limit
data
exposure
on
mobile
devices.
The
wide
range
of
mobile
device
policies
were
identified
in
these
studies
which
would
broadly
fit
in
one
of
below
mentioned
policy
types,
or
sometimes
even
a
mix:
! Only
company-‐owned
mobile
devices
(Blackberry
so
far)
are
allowed
and
supported.
! Multiple
devices
(Blackberry,
iOS,
Android,
WebOS,
Windows
Phone)
are
supported,
but
it
has
to
be
a
company-‐owned
and
managed
device.
! Money
is
provided
for
personal
device
used
for
official
work.
! Professionals
can
bring
and
use
your
own
devices.
! IT
can
wipe
company
owned
devices,
even
if
there
is
personal
data
on
it.
4.2 User
expectations
in
using
mobile
devices
Participants
showed
excitement
in
using
mobile
devices
to
perform
many
of
their
monitoring
and
infrastructure
management
related
tasks.
Data
from
the
studies
suggests
that
users
find
mobile
devices
good
for
simple
and
uncomplicated
tasks
consuming
less
time
and
with
low
impact
and
low
risk
(e.g.,
restart
a
job).
Users
find
mobile
devices
inadequate
for
complex
tasks
that
require
concentrated/
dedicated
focus,
tasks
with
critical
impacts
(e.g.,
a
production
change),
or
tasks
which
are
carried
out
on
bulk
items.
Mobile
devices
are
seen
as
most
beneficial
for
vital
monitoring
jobs.
Participants
reported
that
they
would
want
to
see
alerts,
system/component
faults,
authentication
checks,
in-‐progress
activity
termination
information
on
their
handheld
devices.
However,
they
expect
a
visual
differentiation
between
critical
problems
and
minor
issues.
The
mobile
phone
is
also
expected
to
help
remediation
especially
in
emergency
situations.
Reporting
and
displaying
all
data
to
act
is
found
good
enough
in
these
situations,
which
can
allow
them
to
take
further
action.
Among
the
hardware
related
tasks,
keeping
an
inventory,
management
and
allocation
of
assets
were
seen
as
possible
while
mobile.
Very
often,
these
tasks
are
not
seen
as
high
focus
tasks.
Hardware
management
activities
which
required
physical
involvement
for
e.g.,
access
to
labs,
users
were
skeptical
as
how
mobile
devices
can
be
helpful.
Software
related
tasks
like
configuration
of
apps,
virtualization,
operating
system
installation
were
reported
as
tasks
which
take
5-‐10
minutes,
but
could
be
easily
executed
on
mobile
devices.
Storage
related
tasks
like
provisioning
and
zoning
were
seen
as
quick
and
simple
on
mobile
devices
as
these
are
short
duration
tasks.
Backup
related
tasks
which
were
found
ideal
on
mobile
devices
included
status
check
of
the
critical
backups
running,
reporting
vulnerabilities
and
quick
remediation,
and
some
amount
of
restoration
of
data
remotely.
Virus
protection
was
also
reported,
though
to
a
smaller
extend,
this
could
be
because
not
many
of
our
participants
were
in
that
role.
For
maintenance
of
the
terminal
server
which
happens
only
e.g.,
quarterly,
it
was
expected
that
it
could
be
triggered
remotely
using
a
mobile
device.
This
could
also
have
a
reminder
on
the
handheld
device.
Knowledge/
Information
gathering
was
another
place
where
users
wanted
mobile
devices
to
help
them.
Access
to
tech-‐notes
and
wikis
could
also
allow
them
to
interact
with
fellow
team
members
and
sometimes
cross
check
on
the
solutions
provided
by
them.
7. GOING
MOBILE
WITH
ENTERPRISE
APPLICATIONS
|
White
Paper
|
Jan,
2012
P a g e
|
7
Close
to
what
we
expected,
most
of
the
participants
preferred
optimized
interactions
and
most
critical
items
on
their
mobile
devices,
as
the
following
comments
reveal:
“I
can
quickly
know
the
storage
capacity
or
allocation
of
the
data
center
regardless
of
location
where
I
am
“Combine
activity
with
communication
-‐
I
would
want
to
connect
to
any
server
remotely,
perform
the
critical
task
I
have
to
do
and
also
send
update
to
the
end
user
or
other
admin
via
mobile
device.
With
regard
to
accessing
Symantec
enterprise
software
on
mobile
devices,
most
of
the
users
suggested
that
we
should
focus
on
the
product’s
core
functionality.
Most
of
our
customers
expected
a
mobile
app
to
be
free.
In
fact,
some
even
were
of
an
opinion
that
we
should
first
focus
on
smartphones
and
then
on
tablets.
Overall,
studies
revealed
that
the
mobile
usage
should
be
limited
to
pertinent
information
and
tasks
(i.e.,
role
based
information
&
contextual
information),
continuous
updates
on
general
sense
of
status
and
health
of
the
enterprise,
for
instance,
is
everything
up
to
date.
Execution
of
a
pre-‐configured
job
could
be
triggered
using
the
mobile
device.
Policy
management
and
updates
could
be
available
to
the
users,
like
what
is
the
current
policy,
when
was
it
applied
etc.
Sending
and
viewing
reports
could
have
more
engaging
user
experience
on
the
mobile
devices.
In
fact,
users
also
felt
that
a
24x7
access
for
people
performing
critical
tasks
(e.g.,
backup
administrators,
HA
administrators)
should
be
enabled
on
mobile
devices,
considering
the
nature
of
their
jobs.
4.3 User
perception
of
the
impact
Most
participants
believe
that
mobility
would
surely
change
the
way
they
work
currently,
as
it
will
give
them
more
control
over
their
work.
Based
on
participants’
perception,
we
believe
that
most
of
them
saw
a
reduction
in
time
to
execute
an
activity
or
resolve
an
issue.
For
example,
they
can
perform
a
‘Ping
test’
on
a
server
to
get
the
status
or
trigger
reboot
of
a
machine
remotely
using
a
mobile
device.
Escalations
on
failure
of
important
hardware
could
also
be
handled
earlier
than
otherwise.
They
could
also
perceive
that
wait
time
between
activities
could
be
avoided
while
completing
their
task
at
hand.
Independent
of
the
location
she
is
at,
user
can
get
an
approval
on
storage
allocation,
or
manage
storage
devices
and
send
immediate
alert
messages
to
the
other
administrators
to
sync
up
instead
of
waiting
to
connect
to
e-‐mail.
Users
also
indicated
they
would
like
to
have
an
ability
to
instantly
update
the
end-‐user
or
other
IT
administrators
when
the
task
at
hand
is
done.
An
example
of
wait
time
seen
as
a
bottleneck
in
the
pipeline
of
action
is
shown
in
fig
2.
Participants
pointed
out
that
they
would
like
to
have
End
user
raises
request
for
storage
(trigger)
Junior
admin
manages/checks
requirement
Junior
admin
sends
for
approval
Senior
admin
receives
approval
request
Senior
admin
assess/approves
the
request
Junior
admin
receives
approval
Junior
admin
completes
task
Junior
admin
communicates
to
user
User
gets
an
update
of
job
done
Figure
1:
Survey
data
showing
the
type
of
activities
users
wanted
to
view
and
access
from
the
mobile
devices.
Figure
2:
Diagram
showing
the
wait
time
between
various
steps
while
performing
a
task.
8. GOING
MOBILE
WITH
ENTERPRISE
APPLICATIONS
|
White
Paper
|
Jan,
2012
P a g e
|
8
an
option
to
delegate
the
task
to
other
admins
who
are
available
to
perform
the
task,
especially
when
necessary
remediation
is
too
complicated
to
do
from
a
mobile
device.
That
way,
resolution
of
critical
and
high
priority
tasks
would
happen
in
time,
since
the
user
would
be
able
to
have
a
look
at
it
even
before
she
has
no
access
to
the
machine.
What
makes
a
mobile
enterprise
app
different
from
a
mobile
consumer
app?
According
to
the
participants,
an
enterprise
application
requires
more
security
management
and
superior
policies
with
regard
to
data
protection.
It
is
also
evident
that
corporate
standards
are
changing
very
quickly
with
the
change
in
the
usage
patterns
of
mobile
technology,
data
security
still
remains
a
concern
which
is
relatively
less
crucial
in
the
consumer
apps.
We
also
uncovered
that
from
the
end-‐user
point
of
view,
there
should
be
no
difference
when
it
comes
to
the
user
experience
of
using
the
enterprise
app
on
mobile
devices.
The
following
comments
about
the
user
experience
on
mobile
devices
were
stated
by
the
participants:
“Basically,
anything
I
can
almost
do
on
a
PC
or
Citrix,
I
would
like
to
do
on
the
device
as
well.
“A
Symantec
Backup
Exec
mobile
app
should
be
like
the
baby
monitor
I
have
at
home.
4.4 Concerns
and
challenges
to
overcome
User
Concerns
of
Mobile
Usage
Users
seemed
to
be
uncomfortable
when
it
comes
to
making
a
change
in
the
production
environment
through
a
mobile
device.
Creating
a
new
job
or
performing
a
complex
task
was
seen
as
challenging
on
mobile
devices,
as
can
be
seen
in
the
following
excerpt:
“You
cannot
expect
someone
to
do
heavy
lifting
tasks
on
a
small
mobile
phone.
Reasons
for
such
concerns
range
from
security
of
such
devices
for
e.g.,
what
happens
when
the
device
is
stolen
or
lost,
to
human
error,
as
it
is
seen
that
people
don’t
pay
as
much
attention
when
digesting
information
on
a
mobile
device.
According
to
the
users,
complex
tasks
requires
focus;
mobile
devices
don’t
always
allow
that.[2]
Configuring
a
complex
security
product
which
takes
more
time
or
making
a
policy
change
that
could
have
far
reaching
impacts
needs
to
be
well
evaluated
before
applying.
It’s
impact
could
be
shown
upfront
while
the
user
executes
such
task
via
a
mobile
device.
Enterprise
Challenges
Getting
access
to
the
corporate
network
always
could
be
a
challenge,
especially
if
VPN
gateway
does
not
work,
which
means
access
to
nothing
except
email.
Participants
who
were
managing
security
also
showed
concern
on
how
to
protect
confidential
information
on
a
mobile
device.
Encryption,
Device
wipe
technologies
are
some
of
the
contemporary
techniques.
At
present,
managing
and
securing
iOS
and
Android
devices
is
seen
as
a
challenge
by
corporate.
Blackberry
devices
are
considered
a
lot
easier
to
manage.
The
current
way
of
authenticating
on
mobile
devices
is
also
painful
to
most
enterprises
[3].
Problems
around
separating
corporate
and
personal
identity
and
data
on
a
shared
personal/business
device
were
significantly
reported
by
the
members
from
InfoSec
department.
If
the
employee
uses
a
company
owned
device,
all
data
on
the
device,
whether
it
is
personal
data
or
not
is
owned
by
the
company.
However,
if
the
company
allows
their
employees
to
bring
and
use
their
personal
devices,
this
gets
complicated.
Most
companies
solve
this
by
asking
their
employees
to
waive
their
rights
to
all
personal
data
on
that
device.
Policy
makers
recognized
that
there
is
a
need
to
find
an
ideal
solution
to
this
issue,
as
it
is
impossible
at
present
to
separate
and
distinguish
between
personal
and
corporate
data.
Customers
expect
Symantec
to
solve
this
problem..
5. DISCUSSION
AND
CONCLUSION
To
start
with,
we
intended
to
find
out
how
end-‐users
of
enterprise
products
would
react
to
the
use
of
a
mobile
device
to
access
their
tasks.
We
also
tested
our
assumption
that
activities
like
monitoring,
reporting,
viewing
and
responding
to
alerts
are
the
primary
tasks
that
IT
administrators
want
on
a
mobile
device.
However,
it
was
further
revealed
from
the
studies
that
mobile
device
should
act
like
a
complementing
device
that
will
help
the
user
to
stay
in
touch
with
the
product
and
perform
vital
actions,
when
user
is
away
from
the
primary
work
location,
and
not
the
primary
device
itself.
To
conclude,
our
research
revealed
interesting
knowledge
in
the
domain
of
mobile
devices
and
IT
administration.
The
knowledge
gained
could
play
an
important
role
while
designing
enterprise
9. GOING
MOBILE
WITH
ENTERPRISE
APPLICATIONS
|
White
Paper
|
Jan,
2012
P a g e
|
9
applications
on
mobile
devices.
All
presented
ideas
are
results
of
three
research
studies.
The
information
obtained
could
be
referred
during
ideation
and
conceptualization
stages
of
application
development.
Our
future
work
will
include
evaluation
of
some
use
cases,
and
building
and
testing
prototypes,
identify
related
functionalities
to
deliver
more
relevant,
usable
mobile
experiences
to
our
customers.
It
will
be
important
to
know
how
these
design
will
be
accepted
by
users
doing
such
activities
day
in
and
out
as
well
as
identify
new
unidentified
concepts
which
will
further
enhance
their
productivity
in
enterprise
environments.
6. ACKNOWLEDGMENTS
We
would
like
to
express
our
warm
thanks
to
all
the
participants
among
our
customers,
internal
IT
admins,
and
all
the
co-‐researchers
who
were
involved
in
the
different
phases
of
the
research
studies.
7. REFERENCES
Papers-‐
1.Forbes;
Google
-‐
The
Untethered
Executive,
2010
2.HIIT;
Antti
-‐
The
Fragmentation
of
Attention,
2005
3.Forrester;
Symantec
-‐
Enhancing
Authentication
to
Secure
the
Enterprise,
2011
Books
–
4.
David
Sward,
Measuring
the
Business
Value
of
Information
Technology,
2006
5.Lindlof,
T.
R.,
&
Taylor,
B.
C,
Qualitative
Communication
Research
Methods,
2nd
Edition,
2002