and monitors their implementation, followed by the National Semester, i e. the implementation of the agreed policies by the Member States.
and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher's location, in its current version,
to be the first of a yearly outlook focused on digital trends emerging from both the managerial and scientific literature,
MIT Sloan Management Review, IEEE Computer, or the Communications of the ACM (CACM) have such a mission of connecting research and industry practices,
as said above, the book aims to be the first of a yearly outlook focused on digital trends emerging from both the managerial and scientific literature.
and Nadia Neytcheva Head of Research at the Business Technology Outlook (BTO) Research Program who have provided
and all the bright researchers at Business Technology Outlook (BTO) Research Program that have supported me in carrying out interviews, surveys, and data analysis:
100 5. 4. 2 Bring Your Own Media Tablet...100 5. 4. 3 Bring Your Own Device for Vendors...
102 5. 5. 3 Virtualization Strategy...103 5. 5. 4 Bring Your Own Device BYOD Strategy...
122 6. 4. 5 Social Software and Collaborative Systems and Tools...123 6. 4. 6 Online Communities...
Maturity Model Integration COBIT Control Objectives for Information and related Technology COC Cross Organizational Collaboration Cop Community of Practice CRM Customer relationship management CSCW Computer
, Wii, ipad, ipod, among others, represent an artificial extension of their human being, allowing a seamless integration of the virtual world of social networks and playground as part of their own everyday life.
They post everything on Facebook and theymakes a game out of everything''as said Brian Niccol chief marketing
a core component of the information infrastructure upon which our society is building its own open environment. 2 1 In the following we use data
It is worth noting that computer based information systems are a specific type of information system and not exhaustive 36.
As pointed out by IBM, examples of value added exploitation of data streams concern the analysis of 5 million daily trade events created to identify potential fraud,
on the other hand,(ii) a reduce function that merges all intermediate values associated with the same intermediate key 41.6 1 Big data the open source computing framework Hadoop have received a growing interest
Thus, DDSS refer to streams of real-time information by mobile devices and internet of things, that have to be captured
and energy (Footnote 4 continued) Mapreduce has been used to rewrite the production indexing system that produces the data structures used for the Google web search service 41.5 See for example how IBM has exploited/integrated Hadoop 42.1.1 Introduction 7 management.
confirming the claim by Andrew Mcafee and Erik Brynjolfsson 8 that data-driven decisions are better decisions,
what Awargal and Weill 27 called softscaling, requiring three core capabilities for companies and their IT units to act as enabling factors for anempatic''use of information for value creation.
and Hadoop at the core of Nokia's infrastructure. POINT OF ATTENTION: Big data ask for a clear understanding of both IT Portfolio and data asset,
and efficiently moving of data from, for example, servers in Singapore to a Hadoop cluster in the UK data center.
bundling the most popular open source projects 1. 2 Case studies 17 in the Apache Hadoop stack into a single, integrated package.
In 2011, Nokia put its central CDH cluster into production to serve as the company's information core.
''In 2011, GE announced $1 billion investment to build software and expertise on Big data analytics, launching a global software center in San ramon, California.
developing software and data science capabilities for GE's Big data domain of interest(the industrial Internet').
Furthermore, talent management and employees retention have to be considered as a core target for the success of a Big data strategy.
Indeed, the GE assesses the success of software and analytics by their enabling a new portfolio of compelling service offerings, helping, e g.,
we have discussed the business challenges of Big data as a core component of the information infrastructure upon which our society is building its own open environment.
the latter referring to streams of real-time information by mobile devices and internet of things, that have to be captured
Harv Bus Rev 90 (10): 70 76 6. IBM (2013) What is big data? http://www-01. ibm. com/software/data/bigdata/.
/Accessed 9 jul 2013 7. Pospiech M, Felden C (2012) Big data a state-of-the-art. In: Americas conference on information systems (AMCIS 2012) 8. Mcafee A, Brynjolfsson E (2012) Big data:
the management revolution. Harv Bus Rev 90 (10): 61 68 9. Wang RY, Strong DM (1996) Beyond accuracy:
how GE is building big data, software and analytics capabilities for anIndustrial Internet.''''http://sites. tcs. com/big data-study/ge-big data-case-study/.
Kharif O (2013) ATMS that look like ipads. Bloom Businessweek, pp 38 39 39. Han J, Haihong E, Le G, Du J (2011) Survey on Nosql database.
IBM, Zikopoulos P, Eaton C (2011) Understanding big data: analytics for enterprise class hadoop and streaming data, 1st edn.
we use computers, how we access information, how businesses derive value from ICT and how consumers live their daily lives.
and allows improved automation of the production process by using computer controlled machines. Moreover, marketing has benefited from ICT in many ways such as analyzing the results of market research in more effective ways by utilizing the capabilities of Business intelligence (BI),
Grid computing can be explained as the allocation of several computer systems in a parallel structure to solve one problem 1. Cloud computing is similar to Grid
or pool of services over the network through virtualized IT servers such as data centers and specialized software applications 2. It is the latest development in the computing models that performs computing functions on multilevel virtualization and abstraction by integrating many IT resources.
The key features of cloud computing can be summarized in the following list 1: V. Morabito, Trends and Challenges in Digital Business Innovation, DOI:
such as server using time and data storage, automatically and without human interaction. 2. Broad network access,
which enables the user to access the cloud computing resource from different platforms, such as mobile phones, laptops or PDAS. 3. Improved accessibility,
Service Models Dhar 4 defines cloud computing as the structure that provides the ability to the users to utilize the hardware, software,
From this definition, three levels of cloud computing can be defined (see Fig. 2. 1). The first level is the Software as Service (Saas). In this layer,
which the client will have full ownership over the service provided such as virtual servers, memory and storage devices.
which allows users to rent virtual computers on which to run their own computer applications.
It runs over HTTP using REST and SOAP protocols. It gives the subscribers the ability to launch
and manage server instances in data centers using APIS. The second one is Microsoft windows Azure platform,
which is composed of three components. The first component which is Windows Azure provides Windows based environment to enable users to run applications and store data in data centers.
reliable access to data using large clusters of Application Layer---Business Applications, Web Services Multimedia Platforms---Software Framework (Java, Python,.
NET) Storage (DB/File) Infrastructure---Computation (VM) Storage (Block) Hardware---CPU, Memory, Disk, Bandwidth Resources Managed at Each Layer Software as a service (Saas) Platform as a service
Google Apps, Facebook Youtube Microsoft Azure, Google Appengine, Amazon Simple DB/S3 Amazon EC2, Gogrid, Flexiscale Data centres Fig. 2. 2
Adapted from 5 Fig. 2. 1 The three layers of cloud computing. Adapted from 4 2. 1 Introduction 25 commodity servers.
Finally, the last one is the Map Reduce1 programming model that can be modified according to the characteristics of the applications that Google is running on its servers.
especially when the company does not have required the experience and the core competence in this field.
and the low level resources requirements such as CPU and memory in order to fulfill all demands. The automated service provisioning has been researched in the past
Virtualization can be important for cloud computing by enabling virtual machine migration to balance the load throughout the data center.
Moreover, the in-memory state should be transferred consistently and efficiently, with integrated consideration of resources for applications and physical servers. 3. Server consolidation.
Server consolidation is an approach to the efficient usage of computer server resources for the sake of cost and electricity savings 7. However,
despite the benefits of this approach, server consolidation, bear many problems that have to be considered.
when VM changes its footprint on the server, which could happen as a result of maximally consolidating a server.
Thus, it is crucial to monitor the fluctuations of VM footprints in order to best mange server consolidation.
In addition, the system has to quickly response to resource congestion when they occur. 4. Energy management.
One example is the usage of energy efficient hardware architecture that allows better utilization of hardware resources such as CPU and memory.
energy-aware job scheduling and server consolidation are two other ways to reduce power consumption by turning off unused machines. 2. 2 Strategic and Managerial Challenges
especially when they are composed of several hundreds of servers. 6. Data security. The infrastructure provider tries to achieve best data security by meeting the following two objectives (1) confidentiality
In this case, it is critical to build trust mechanisms at every architectural layer of the cloud. 7. Software frameworks.
The concerns that can arise here come from the compatibility issues between the Internet-scale file systems that host the software frameworks such as Mapreduce on one hand,
or down and the providers of this service can maximize the performance of the servers
since the service provider will be in charge of their jobs of providing software and hardware support. 4. Based on the last point,
there will be a possibility of losing the expert employees, which would create a problem for the company
, how it grants employees access to physical and virtual assets, how it monitors these employees,
brand damage and productivity loss. 4. Virtualization issues Virtualization is very important in the cloud computing to achieve its goal of sharing resources.
which also called Virtual machine Monitor (VMM). It is a platform that allows multiple OS and related applications (called Virtual machines VMS) to run on a cloud machine concurrently to facilitate sharing of cloud resources.
Virtualization of enterprise servers introduces considerable security concerns. Associating multiple servers with one host removes the physical separation between servers,
increasing the risk of undesirable cooperation of one application (of one VM) with others on the same host.
Also, if an attacker gets the root to access the hypervisor, then it brings significant threats to the holistic view of cloud computing. 5. Cryptography and key management The need for appropriate and,
cost-effective. 7. Insecure APIS The Applications Programming interface (APIS) are the software interfaces that document how to communicate with the concerned software.
and about making sure that the old CSP, will delete customer's data on its cloud servers. 9. Service Level Agreement
which the modern computer is based, and Delphi Method, which is a type of a collective decision-making method 20,
Innovation New Hardware/Software Experience Fig. 2. 3 Cloud computing supplier selection. Adapted from 19 36 2 Cloud computing necessities.
IT infrastructure (servers hardware, programs, processing) would be done by a vendor(the cloud), ''although responsibility for information technology would be retained by the company.
As the case unfolds, the authors explained that proper oversight was neglected; rash decisions were made; and a crisis developed.
This agency is consisted of two huge data centers that contain thousands of computer systems for about 47 organizations
However, despite this centralized operation, there is no integration between the computer systems. This situation triggered the move to the cloud environment, in
Cloud computing is simply about an innovative IT model for providing an ondemand network access to a shared pool of configurable computing resources such as networks, servers and software applications.
and software they need over the internet and without any limit. Also, it provides many benefits
Proceedings of the first workshop on hot topics in software defined networks, pp 97 102 7. Corradi A, Fanelli M, Foschini L, Elettronica D, Deis
IEEE symposium on computers and communications, pp 129 134 8. Khajeh-hosseini A, Greenwood D, Sommerville I (2010) Cloud migration:
Indeed, in the days when mobile devices such as smartphones and tablets have overtaken the role of Personal computers (PCS) and their leadership in terms of market-share,
and tablets cycles respectively) we are entering, faster than before, a third Computing Cycle ofWearables/Drivables/Flyables/Scannables''devices 2. Considering smartphones and tablets,
IDC has predicted that tablet shipments will hit 229.3 million units in 2013, further expecting they will exceed PC shipments by 2015.
This phenomenon can be related to other changes always noticed by Mary Meeker and Liang Wu for relevant players in the digital business, such as, e g.:
for example, consider the growing importance of location-based application on mobile devices for marketing activities and social sensing (discussed in detail in the following Chap. 4) 15.
However the diffusion of mobile devices such as, e g.,, smartphones and ipads or tablets, does not entail a consequent success of no matter services provided through them and accessible to a correspondent wide audience.
Furthermore, also the adoption of the above technologies may still find resistance by final users
+Smart mobile communications iphone, ipad, Android OS Smartphones and tablets Cloud computing Amazon, dropbox, Google, Salesforce. com, Windows Azure, etc.
High density, low cost chips IBM, Intel, AMD chips 50 3 Mobile Services As pointed out by Bagozzi 20, TAM is characterized by aparsimony''in the number of basic
Accordingly, the analyses of 21 have been based on anchors and adjustments related to individuals'general beliefs regarding a technology (in that case computers) and its use.
computer anxiety influence on perceived ease of use, when moderated by experience. As said above the research of TAM has produced a vast literature,
the TAM constructs are yet a core asset for the development of models, aiming to identify key drivers supporting IT as well as business executives decision making.
Apart from traditional core constructs of TAM (such as perceived ease of Table 3. 3 Constructs and related anchors for perceived ease of use
elaborated from 21 Constructs Anchors Control Computer self-efficacy Perceptions of external control or facilitating conditions Intrinsic motivation Computer playfulness Emotion Computer anxiety 6 With afeedback''effect also on the internal portfolio of technologies, due to the adoption of personal devices by employees for work,
as we are going to see in Chap. 5 on the IT Consumerization phenomenon. 52 3 Mobile Services use and perceived usefulness), classified asgeneral technology perceptions,
Demonstrability Anchor Computer Self-Efficacy Perceptions of external control Computer Anxiety Computer Playfulness Adjustment Perceived Enjoyment Objective Usability Technology Acceptance Model
the positive impact of social influence on perceived ease of use (see Fig. 3. 2), that is one of the core TAM antecedents of behavioral intention;
in particular, referring to mobile devices, applications, and services have to be related to other research streams investigating, e g.,
, the difference of usage behavior between mobile phones and personal computers. In particular, it is worth mentioning the work by Ghose et al. 28
Considering the specific characteristics of mobile phones (reduced screen size etc.)) and the consequent search costs and constraints, e g.,
, the desktop or personal computer ones, in the following Section we are going to discuss which digital management solutions can be considered
Integration, facing the issue of the alignment and adaptation to enterprise information systems, at software as well as data level.
Development Platforms for Mobile Applications (App) based on a reference framework Application integration with enterprise information systems (software and data) Device management (data privacy and security) Software solutions
store These stores are managed at global level by manufacturers of mobile operating systems (Apple, Samsung, Google, Microsoft, RIM),
Considering Mobile device Management solutions, they facilitate the management of devices deployed across different mobile operators
and configuration for all mobile devices (company-owned as well as employee-owned) in the network of a given company.
As for Application Streaming solutions, they can be considered a kind of application virtualization. Indeed, they are basically an on-demand service distribution,
which kept applications on corporate servers with only core parts or a subset of an application's code installed on the device, making the other packages available in streaming on the user's mobile device,
Finally, Mobile device Virtualization solutions are a kind of hardware virtualization, allowing, e g.,, the use of two or more operating systems on the same mobile device.
These solutions on the one hand, provide the user with a certain Table 3. 6 Solutions suitable to enable device security management Solutions Benefits Drawbacks Mobile device management Simple to install Provide centralized management of the devices used by the user
Manage only devices, so the IT department of a company has to define policies to regulate the practices of users Application streaming The data is stored not directly on the device as well as a part of the application code,
thus, not guaranteeing fast delivery of the service Mobile device virtualization The device can be used safely, even for personal purposes,
Require investment in infrastructure to ensure the effectiveness of the solution 3. 3 Digital Management Solutions 59 degree of freedom in the choice of the device and operating systems;
and business data as well as operating systems (the former managed by the mobile operators, the latter by the IT department of the company where the user is actually working).
To this end, the adopted solution should have been able to operate on different mobile devices, regardless of operating system,
Run Everywhere, enabling the development of a single app, compatible with different operating systems (OS), such as, e g.,
, ios, Android, Blackberry, Winmobile), as well as facilitating the updates by the users 29,30. Thus, the Kony solution have been selected to deliver Toyota's Mobile Shopping Tool application,
Mobile services initiatives have to consider integration with existing back-end systems without the need to rewrite the application for multiple types of OS,
the acquisition and processing of the orders were carried out on paper forms or by personal computer (which,
and implemented with Vodafone a Sales force Automation mobile app for ios based tablets (ipad). The goal of the solution was to provide more useful information to sellers to increase the effectiveness of the sales (historical data on the customer, complete catalog, real time inventory, etc.
Thanks to the optical scanning of product codes, using the camera of the tablet, and the access to historical cases of sales, the process of acquisition of orders has been streamlined, likewise.
Indeed, goods receipts have been carried then out automatically with Kymantm by Datalogic Mobile Wireless Handheld Computer and Barcode Scanner.
Indeed, the operators have to be able to scan the barcode using the optical drive of the tablet supplied,
Then, the Warehouse Management Software (WM) SAPDIRECTLY has to indicate where the scanned unit must be stored.
reducing time, increasing productivity and efficiency through the use of tablets and mobile applications development.
we refer the reader to the discussion on social sensing in Chap. 4. 10 Mobile devices designed to survive demanding environments, harsh conditions,
References 1. Craig C (2013) Beyond Google glass: get ready for more wearable computers. Infoworld 2. Meeker M, Wu L (2013) Internet trends D11 conference 3. Samson T (2013) IDC:
PC shipments worse than predicted, tablet shipments get better. Infoworld 4. Rai A, Sambamurthy V (2006) Editorial notes the growth of interest in services management:
integrating perceived behavioral control, computer anxiety and enjoyment into the technology acceptance model. Inf Syst Res 11: 342 365 22.
Datalogic (2012) Mobile computers connected to SAP: wireless inventory and warehouse management for Habasit 34.
Considering them as a core marketing driver for digital business value, the Chapter discusses the main approaches and tools for sentiment analysis and opinion mining,
In order to overcome this potential problem can be useful to enhance search engines'capabilities and mining tools with lexical integration through instruments such as
sentiment analysis software (or opinion mining) try to monitor all the relevant matters discussed online. Even though is not easy to create an accurate and reliable system,
As well as a search engine allows searching information through websites, an opinion search engine can easily find judgments
and evaluations about the argument the users are looking for. In this context, it is important to underline Horringan 22 reported that out of 2000 American adults'sample in 20071: 81%of internet users looked for information about product using internet at least once,
Thus, according to Pang and Lee 12 a sentiment analysis software has to be able to:
several other technologies are yet available such as Mashup systems, RSS syndication, social bookmarking, Podcast and widget.
Moreover, in addition to web browsers, also web server software can be attacked easily by malware and other threats.
therefore strategic if companies want to monitor, identify, evaluate and face the impact of external risks that rise up from social networks and 2. 0 technologies.
an exante marketing intelligence activity let the firms monitor external environment, identify potential threats, evaluate the impact
Examples of these two steps are offered in Table 4. 3. The approach described is structured in two core steps:
such as crystal liquid display and hard drives, and the sales of its participations''NoneAlex. Brown and Sons raised the rating he gave to Qwest Communications International,
and tablets, likewise (as seen in Chap. 3). However, mobile technologies are only one of the several facets of
, the ones in mobile device, but also social networks, and web technologies to infer data about people preferences, activities,
IBM System S, storing and processing large volume of data streams in real time Stream synopsis algorithms and software Histograms and sketches for data stream computation problems (see 37 for a survey) a According to 42 Hyperscale storage is measured a storage space in terms of petabytes,
serve millions of users with often one or a limited set of applications, may lack redundancy,
and minimize the cost, focusing on a high degree of automation (see also Chap. 1 of this book for storage issues for Big data) 4. 5 Social Sensing 79 mobile phones and tablets or ipad.
Always related to localization as a core feature, we point out the increasing relevance and interest into the applications ofVehicular Participatory Sensing'',in particular for the potential contribution to research and innovation areas such as, e g.
/)Foursquare (foursquare. com) Augmented Reality Wikitude (http://www. wikitude. com/app/)Internet of things Microsoft Sensormap Radio frequency identification (RFID) embedded in objects for tracking commercial products,
Nokia works in the international telecomm market, producing mobile devices, providing services and solution for worldwide dynamics
and Twitter also for benchmarking analysis. Especially in the open source activities or in the development communities,
In particular, the areas of interest involved the open source practices, the professional use of 3d elements, software development and open innovation.
Considering the social listening as a core marketing driver for digital business value, the main approaches and tools of sentiment analysis and opinion mining,
constantly monitor through mining and intelligence techniques the development and evolution of the company perception by inner and outer context users'opinions.
IEEE International Conference Pervasive Computer Communication Work PERCOM Work, pp 525 530 36. Aggarwal C, Abdelzaher T (2013) Social Sensing.
and strategies that concern this trend as well as to understand its implications on the businesses. 5. 1 Introduction It is very common nowadays to see workers from different levels in different companies bring their own laptops to the work environment to use them to do
example of this phenomenon is the use of the personal smartphones or tablet devices, since employees can take them anywhere
A major driver of mobile device usage in the work environments has been the emergence of cloud computing. As mentioned before
both personal and business data can reside in the cloud on large servers run by giant technology firms such as Amazon and Google,
mobile devices usage increases exponentially. In fact, a Gartner group prediction, reported by the Economist 4, states 1 billion smartphones will be sold in 2015, up from 468 million in 2012.
Cost cuts can be achieved by lower spending in hardware and other types of infrastructures, as employees will be more mobile
thus, it Limited connectivity Email or IM Communications IT Department Chooses the PC Primary device is fixed IT department has the control One device, One task Management & Security inside the Firewall Moving from Moving
while using approved applications deployed via the company's own app server. Frequent data interactions can increase data accuracy,
what protection software they have as well as the provisioning and support they will need. It also provides the legal requirements to govern this trend.
Third section is about the technical issues concerned with mobile devices and security issues related to them.
Fourth segment is about the issues related to software and apps used on the consumerized devices.
Moreover, Mcafee Inc. corporation, which is an information security specialist, has cooperated with Carnegie mellon University, in a report entitledMobility and Security'that addresses the consumerization related problems 12.
500 mobile device users and IT decision-makers that have found that 95%of the corporations already have policies that govern the use of mobile devices such as smartphones and tablets,
Furthermore, other survey results show that 63%of mobile devices that connect to enterprise networks regularly are used for both work and private purposes
there are concerns raised about the possibility of harmful software being introduced into the enterprise network by poorly protected smartphones,
the Mcafee study concludes that theft or loss of the devices is considered as a bigger security threat,
According to Mcafee, a third of such devices losses resulted in a financial impact on the organization.
, Dropbox. 2. The increased variety and complexity of personal and mobile devices as well as different operating systems and applications that all requiring management will lead to increased costs. 3. The possibility of losing mobile devices would likely increase when the organization uses
3. the risk of losing corporate data as a result of difficulty in applying security measures and policies on application-rich mobile devices,
Another example is provided by Intel IT center in a form of white paper 14 in which another five steps have been suggested as ways for companies to take the control of the this growing trend
if an employee knows he she may later need access to a file created on his her work computer,
because they run different operating systems that may occasionally connect to the corporate network, but are connected always to the Internet.
Support Employee Owned Devices In its report about IT consumerization 14, Intel has provided a set of best practices (see Fig. 5. 2) for supporting employee-owned devices in the enterprise.
In other words, instead of focusing solely on securing hardware devices, firms have to concentrate on protecting the corporate data that will be accessed by a range of devices 14.3.
To decide which operating systems and devices to support: this is an important procedure in order not to ensure that the technology choices wouldn't 5. 3 Steps for IT Consumerization 97 overwhelm the IT staff;
This includes considerations related to software requirements, bandwidth options, management needs, and investment parameters 14.5. To stay up-to date with changing and new technologies:
According to 15, Microsoft has used qualitative and quantitative research in several countries to understand the different types of information workers,
such as those listed in Table 5. 2. 1 Engage Stakeholders 2 Update Security Model 3 Decide on OS and devices 4 Plan Deployment 5 Stay current with Technology Fig
and attributes Non-PC worker Generalist Road warrior Deskbound contributor Techrealist All star Technology engagement Low Low Medium Medium Medium High Need
and work styles Business scenario Role Work style Work from your phone Corporate attorney Tech realist Bring your own media tablet Business manager All star
while in their offices because of security restrictions. 5. 4. 2 Bring Your Own Media Tablet A business manager handles hectic schedules and endless lists of tasks and responsibilities.
However, with the media tablet it is possible for that manager to accomplish a lot while being out of the office.
For example, the media tablet can connect to the corporate data center and can be used to answer all the emails that are related to work
while sharing documents on the screen with other employees at the company. 5. 4. 3 Bring Your Own Device for Vendors An independent contractor for several construction companies can controls his her own schedule while working
and to display, explain and discusses proposed changes by sharing the screen of his her laptop.
Moreover additional colleagues can join the conference calls from their own devices. Furthermore, he she also spends a few minutes browsing the latest news from friends on Facebook.
Additionally, throughout each day, he she can use Facebook on the laptop to communicate with friends
and family 16.100 5 IT Consumerization 5. 4. 4 The Boardroom Executive decision makers are more and more adopting tablet computers for decision support.
and are often reluctant to the use of computers in general. Tablet devices are replacing paper in fast-paced boardrooms
and can enable executives to attend meetings or conference calls with all the supporting documents they need,
so he she can focus on preparing more effectively on making decisions 16.5.4.5 High-performance Sales The tablet is suited extremely well for sales conversations
because it does not provide a physical barrier like opening a notebook to display the screen.
Also, because media tablets and TABLET PCS are thinner, lighter, and have longer battery life, they are very convenient for these ultra-mobile roles.
A tablet is highly supportive when talking to a client because it can provide interactive,
Examples of new opportunities enabled by tablets include making an immediate competitive analysis between businesses,
such as personalized mortgage information 16.5.4.6 Retail Sales Tablets can provide local retailers with the opportunity to compete effectively with online stores.
or both hands and tablets can interfere with that experience. In addition, shoppers may spend too much time looking at the screen of a tablet or phone
rather than interacting with products in the store 16. While kiosks remain popular if the customer needs to look for more information such as finding an out of stock-stock item online at another store,
some shoppers prefer to obtain recommendations from other consumers by using their tablets. Moreover, cash registers are increasingly being replaced by tablets and other handheld devices,
which provide an opportunity to reduce costs 16.5.4 Business Scenarios for IT Consumerization 101 5. 5 Strategies for IT Consumerization The previously explained business scenarios can be associated with one of the following strategies:
going mobile, modernize the desktop, virtualize, and bring your own device. The key concerns about these strategies as well as the technologies that address the raised issues are explained in the following sub-sections. 5. 5. 1 Going Mobile Strategy Many of the nowadays employees are exploring this strategy.
They are interested in achieving productivity gains by using their own mobile devices, such as smartphones and media tablets.
managing a diverse mobile platform, protecting information that flows across mobile devices, adopting applications for mobile consumption,
and defining data ownership. 3 Implementing mobile strategy includes enabling mobile device management infrastructure such as, for example, System Center Configuration Manager 2012 and Windows Intune,
which is based a cloud management solution that can provide a rich platform to manage Android, iphone,
and Windows phone devices. Also, it includes information protection by using Active directory Rights Management Services, which provide the infrastructure that is needed to protect office content and other Information Rights Management.
Moreover, Windows Server 8 and Dynamic Access will provide an even more compelling solution 16.5.5.2 Modernize the Desktop Strategy This strategy is needed
migration to up-to-date Linux, IOS and Windows versions to reduce cost; reducing application portfolio and application migration;
using virtualization to reduce application deployment costs by reducing testing efforts and decreasing the time that is needed to deploy apps. 3 Chapter 3 on mobile services provide further insights
which is desktop virtualization that separates the desktop environment and associated application software from the physical client device that is used to access it 5. 5. 3 Virtualization Strategy This strategy enables enterprises to quickly achieve business benefits gained from IT consumerization by moving the desktop and/or applications into a data center.
This strategy makes it easier to provide new desktops but it requires investment in the infrastructure that supports it.
The key concerns with this strategy include: roaming user experience across devices and locations, protecting user information, using virtualization technologies that include desktop virtualization and application streaming,
and finally, delivering the required applications to privately owned devices by using application gateways or by transforming to cloud computing. Nevertheless,
enabling such strategy includes new technologies such as serverbased virtualization for application streaming and user state virtualization for a great cross-device experience 16.
Companies that provide desktop virtualization solutions include information technology giants. One example of these companies is Cisco,
which provides Desktop Virtualization with collaboration with Citrix Xendesktop solution and desktop virtualization with cooperation with VMWARE View solution.
which provided Virtual desktop infrastructure (VDI) solution that provides new capabilities for its users such as high-performance 3d graphics, unified collaboration and Voip with other products such as Microsoft Lync 2013.
The users of this solution can access enhanced media and graphic software from virtually any place and on any device.
Examples of these include productivity apps from the cloud, such as Office 365, IT management services from the cloud, such as Windows Intune, virtualized desktops or apps,
since that mobile devices can access email and provide instant messaging service, calendar, voice, and other capabilities at any time and place 8. Refocusing IT on strategic initiatives.
and supporting their own mobile devices. Thus, IT department is relieved of some time-consuming aspects of supporting an enterprise infrastructure,
and security risks involved in using certain software applications. Legal considerations. It is crucial to consider the different legal
the needed changes in the infrastructure to be able to support a consumerization of IT strategy and the support of different mobile devices.
there are direct effects for IT consumerization on the existing IT policies and procedures regarding hardware and software failure.
Table 5. 4 Desktop delivery option On your own Bring your own Choose your own Here is your own Consumer desktop Enterprise desktop Consumer OS Consumer OS Enterprise OS
Enterprise OS Local workspace Local workspace Local workspace Local workspace Session roaming Session roaming Virtual desktop Virtual workspace (server
or local) Virtual workspace (server or local) Access to hosted desktop Access to hosted desktop Public access apps Remote desktop Session roaming Session roaming Remote apps Apps virtualization
Apps virtualization VDI Roaming environment Roaming environment Data synchronization Data synchronization VDI VDI Adapted from 16 5. 7 Considerations Related to IT Consumerization 105 Therefore,
and the society themself that are developing accordingly with the new online or virtual world and opportunities.
Moreover, around the world, social media and new and smart mobile devices are becoming very important in personal relationships among people in a way that makes it challenging to make separation between the technology and personal social networks.
However, at work places, 56%of employers do not allow access to non-work related resources or websites and 63%ban their employees from saving personal data and files on company's computers.
a recent research claim that nearly half of all the workers (46%)surveyed have graded their employers with extremely low marks for applying IT consumerization strategy 5. Table 5. 5 Sample IT support policy Devices Operating systems Files
For example, Microsoft's $1. 2bn acquisition of Yammer has positioned the software giant to introduce enterprise social networking capabilities to its existing business collaboration systems such as Sharepoint, Exchange, Lync and Office 365 17.
This acquisition by Microsoft is a clear example of the importance of social networking within work environments.
Yammer will accompany Skype software, which is a communication product that Microsoft acquired last year for $8. 5bn
and it is expected to integrate with its mainstream business applications 17.5.9 Case studies In this section we investigate some IT consumerization at work environments related case studies
and instant messaging communications by browsing through on-screen contact profiles that are represented by profile pictures andexistence''indicators,
''because even though its first incarnation was sized a tablet desktop device, the value of it is in the software
or app that can also be used on desktop computers and other devices such as ipad. Avaya's strategy for mobility within the enterprise is to take advantage of the consumer gadgets that executives
and employees are already bringing to work such as tablets and smartphones. Moreover, with its one-X software for smart phones, Avaya also allows its employees to make the mobile phone acts as an extension of the corporate network.
That means employees can transfer calls from their desk to their mobile phones as they are leaving their offices
or take a call on their mobile while they are on their way into the office
Shell has started a period of six months rollout of a Mobile device Management (MDM) software-as-a-service (Saas) platform from Airwatch.
It provides support to any employee-owned Apple and Android phones, and tablets that meet its minimum operating system requirements.
POINT OF ATTENTION: It is necessary to realize the importance of engaging people from all departments at the company
Intel (2012) Five steps to consumerization of IT in the Enterprise. White Pap from Intel 15.
Harteveld A (2012) How the consumerization of IT affects your business microsoft recommendations for a consumerization of IT strategy.
Microsoft Services Enterprise Architecture, Microsoft Corporation, Redmond, pp 1 22 16. Harteveld A (2012) Microsoft recommendations for a consumerization of IT strategy.
Microsoft Services Enterprise Architecture, Microsoft Corporation, Redmond, pp 1 16 17. Taylor P (2012) Consumerization of corporate IT accelerate.
In: Financial times. http://www. ft com/cms/s/0/a2fb5172-c077-11e1-982d-00144feabdc0. html#axzz2lgryjslf.
Accessed 21 nov 2013 18. Carr DF (2011) How Avaya Is Embracing Social, Consumerization Trends. In:
Computer-Supported cooperative work (CSCW) is concerned centrally with teamwork, learning, problem solving, knowledge building, task accomplishment and other cognitive achievements by small groups of people.
Another term that can be considered as the synonym for digital work collaboration Is supported Computer Cooperative Work (CSCW) 1
Examples of the collaboration systems include desktop and video conferencing systems, collaborative authorship applications, electronic mail as well as refinements and extensions,
which include conferencing rooms that are enhanced with large-screen digital projectors that are connected to several PCS.
and it is supported by technologies such as electronic meeting systems, videoconferencing systems and instant messaging software applications like email and chat programs.
and by using large displays and whiteboards. The previous explained collaboration categories can be illustrated in a form of matrix, in
They are the computer applications that support creative and collaborative way of finding solutions for the emerging problem and for decision-making of people inside a single organization or across several ones 4. The term is synonymous with Group Support systems (GSS) and essentially synonymous with Group
Electronic meeting systems form a class of applications for computer supported cooperative work. Based on their features, they can help to find solutions for many harmful
This software system is a suite of tools that provide configurable features of collaborative working methods;
In these systems, typically users have their own computers, and each one of them can participate in the current running session simultaneously.
However, electronic meeting systems need to be distinguished from classic groupware and from web conferencing systems.
The main difference from groupware is the degree of collaboration. Groupware provides support for collaboration within groups of participants where their contributions are recognizable.
In contrast EMS enables the group to produce an artifact in a cooperative way, in
Also, during the execution of a business process, both groupware applications and EMS support and complement each other:
the groupware provides teams with capabilities related to researching and documents creation during the preparation stage for an EMS session or throughout the implementation of the results of such a conference.
In contrast, web conferencing software complement EMS with screen-sharing as well as the ability for the voice interaction functionality that is necessary in synchronous online conferences and does not exist in EMS 12.
or over the time using tools such as bulletin board systems 4. The formal term used in computer-facilitated communication,
and the way the workflow is configured pre in such software applications. Several associations in industry issue their own standards of document control criteria that are used in their particular field 4. Moreover,
and Information technology 4. 6. 4. 5 Social Software and Collaborative Systems and Tools Nowadays, people are using social networking massively.
such as telephones, mail and even face-to-face meetings, are slowly being replaced by computer based systems where different kinds of socialization are enhanced through media sharing, reflection on past experiences and a bundle of additional services, supporting
The term social software is general and it applies to systems used outside the work environment or workplace.
Software products such as email calendaring, text chatting, wiki, and bookmarking belong to social software category. However, when these applications are used at work to facilitate the accomplishment of business tasks, processes and objectives,
then they are called collaborative software. Collaborative software is designed an application to assist people involved in a common task
The use of such software at the work place stimulates a Collaborative Working environment (CWE) that supports individuals as well as those who work as a team regardless of their geographical locations by providing them with the necessary equipment that aids communication, collaboration
Examples of such collaboration software in the market include: Microsoft Sharepoint, IBM Lotus notes and Google apps for business.
The latter one contains many useful applications such as Google doc for file sharing among team members, Google Calendar for scheduling meeting at times that works for everyone with features such as reminders,
Google Drive for storing, sharing and accessing files from everywhere, Google Sheets that enable spreadsheet 6. 4 Digital Collaboration Systems
and Ideas 123 management with easy charts and discussion style comments, and finally, Google Slides that allow users to create presentations together.
Also, Siglin 17 has provided examples of other video collaboration software. The first one is provided by Accordent Inc.
which have gained the ability to capture live content that synchronizes with Powerpoint, webpages, and live video streams.
Another example is produced by Adobe Systems Incorporation that introduced a collaborative tool called Adobe Story that provides the creative
and explain some of the most adopted collaborative tools in the market such as Skype, Dropbox, and others.
Skype This application is a free voice over internet Protocol (VOIP) service and instant messaging that is developed by the recently acquired company by the software giant, Microsoft.
Skype can be used to meet the following goals: calling and video conferencing over the internet;
train team members on using software using screen sharing ability with others; cheap calls on landlines and mobile devices;
instant text messaging from computer to computer; conduct meetings and conferences. Dropbox Dropbox is a file hosting service that offers many capabilities such as cloud storage and file synchronization.
It allows users to share contents through folders, which they can create on their computers.
Dropbox synchronizes those folders in order to appear the same folder (with the same contents) despite the media or the device that is used to view them.
This product can be used to meet the following goals: 124 6 Digital Work and Collaboration storing
immediate synchronization and sharing of files across computers and among users who are located in different geographical locations;
Google Drive and Google docs Google Drive is a file storage and synchronization service provided by Google
In this service, the files shared publicly on Google Drive can be searched with web search engines. Google docs is a freeware web-based office suite offered by Google within its Google Drive service.
It allows users to create and edit documents, spreadsheets and presentations online while collaborating with other users live.
With Google docs users and companies can do the following: create, collaborate on, share and edit documents online;
collaborate in a real time, which means that the users can see the changes instantly; manage different revisions of a document;
Microsoft Skydrive Skydrive is a file hosting service from Microsoft that allows users to upload
which means that users do not require a Microsoft account to access them. The features of the Microsoft Skydrive service include:
It allows users to upload, create, edit, and share Microsoft office documents directly within a Web browser.
It provides the ability to integrate with Microsoft office and outlook. Users can share the documents on social networks.
It supports geo-location data for photos uploaded onto the service. Microsoft Onenote Onenote is a software from Microsoft that enables a free-form information gathering
and provides capabilities for multi-user teamwork. It can accept entries such as users'handwritten or typed notes, sketches and audio explanations.
and it is available for different operating systems. Also, Microsoft offers a web-based 6. 4 Digital Collaboration Systems
and Ideas 125 version of Onenote as part of Skydrive or Office Web Apps, providing users with ability to modify notes via a Web browser.
This software allows companies and users to: create notes, outlines, clippings of websites, and collections of images;
computer scientists at Carnegie mellon University have created a project called recaptcha, which uses humans'abilities and intelligence to identify distorted words on websites.
These plans should have the ability to monitor crowds actions and on the one hand, to adapt at runtime incentive mechanisms to prevent various negative effects such as free riding,
not only to treat crowd workers as simple sensors or processors, but also to join their human intelligence and creativity.
This project is initiated by computer scientists from Carnegie mellon University in which people are collaboratively using their humans'thinking,
which computers cannot read using Optical Character Recognition (OCR) technology. Consequently, as the people read
and media that are not recognizable by computers. The creators of this project hope that recaptcha continues to have a positive impact on modern society by helping to digitize human knowledge 24.128 6 Digital Work
which is acclaimed a globally online meeting and collaboration applications and software services provider. The introduced technology has succeeded to achieve high satisfaction rates from both the members of the faculties and the students.
open source data and cloud technology to share knowledge, manage information and to have generated the user work shared
10.1007/s10606-013-9193-7 2. Grudin J (1994) Computer-supported cooperative work: history and focus (Long beach Calif) 27:19 26 3. Kay R (2004) Roots of digital collaboration.
Schrire S (2004) Interaction and cognition in asynchronous computer conferencing. Instr Sci 32: 475 502. doi:
King K, Ellis TJ (2009) Comparison of social presence in voice-based and text-based asynchronous computer conferences.
Bhana I, Johnson D (2006) Developing collaborative social software. Comput Sci ICCS 3992: 581 586 16.
Software C (2013) Collaborative software. In: Wikipedia. http://en. wikipedia. org/wiki/Collaborative software 17. Siglin T (2011) Video collaboration tools.
, managing diverse mobile platforms, protecting information across different and heterogeneous mobile devices, and defining data ownership.
security companies evaluations about the costs of the cybercrime worldwide were $110 billion every year according to Symantec Corp.;
a conclusion from the study is that public and private spending should be focused less on defense of computer crime (i e. antivirus, firewalls etc.)
aiming to engage core customers online and creating a direct dialog 3 Talktalk Business: http://www. talktalkbusiness. co. uk/.4 Vibram:
Social networking software and argumentation systems are just two examples of the ongoing research in this important area of digital governance.
IT governance, at its core, clarifies accountability, roles, and decision-making. It addresses concerns related to building a responsive development environment
through a transparent agreed process that people monitor to see whether has been followed or not Adapted from 1, 7,
which includes not only the core web team and business stakeholders but also the web managers within the organization and deep and rich support infrastructure that can include legal department, business experts and ICT specialists as well as external vendors.
create, protect, execute and monitor. Thus, they started with seventeen CSFS that they discovered from those studies;
we believe that the proposed six steps (1-Gather a Core Team; 2-Assess What You Have;
its core component at firm level should be developed first. Indeed, when a specific IT governance model is chosen and implemented,
In conclusion, this Chapter has offered some insights into digital governance and, in particular, into the IT governance domain as its core component at firm level
IBM Syst J 32:4 16 20. Broadbent M, Weill P (1993) Improving business and information strategy alignment:
IBM Syst J 32: 162 179 21. Simonsson M, Johnson P, Ekstedt M (2010) The effect of IT governance maturity ON IT governance performance.
and capture value can be seen, for example, in the results of the Global CEO Study 2009 produced by the IBM Institute for Business Value 12,
The production of highly innovative software and hardware products has always been the focus of Apple and, traditionally,
most of its business operations were taking place in the field of personal computers. The launch of the ipod, the portable media player, in combination with the itunes software, a system that allows users to access the Apple store to buy online music
and other types of content and transfer them from an ipod to a computer, corresponds to a formidable innovation of Apple's business model.
In summary, not only Apple has developed and brought to the market hardware and software products with a high degree of innovation,
but it has transformed radically its business environment, adding music distribution to its activities. This transformation has resulted in the construction of new ongoing relations,
which is the core of Apple's business model, allows the company to create and extract value on an ongoing basis
Web servers can monitor and record the navigation of millions of users and produce in real-time pages with a highly personalized content based on the profile and preferences of the single user.
which redefined the value chain linked to the world of personal computers in the late nineties,
In fact, the search engines like Google and Yahoo! are some of the most visited websites and they make money thanks to sponsored links and paid advertising;
IBM (2009) IBM Institute for Business Value's Biannual Global CEO Study 2009 13. Casadesus-Masanell R, Ricart JE (2007) Competing through business models WP no 713.
It is designed as a mix between the style and appearance of ios with the convenience of Facebook.
and experience on Google software, developed at the IBM Research Lab in Haifa, while his two partners both have extensive experience in the banking industry.
Instabank is focusing all its energies to develop an easy to use and simple on-line banking application,
while the core of the banking activity behind it is managed by a traditional Russian Bank (VPB).
and adoption of many other solutions based on the same core algorithms. 10.4 Billguard Billguard 5 is a personal finance security system scanning credit card activity daily for hidden
The management team is composed of data scientists, mathematicians, security experts and industry specialist, supported by the investments of some of the founders and CEOS of Google, Paypal, Verisign and Sun microsystems.
Mezzanine 6 is a collaborative conference room, enabling multi-user, multi-screen, multi-device interaction both in a physical and virtual meeting space.
The participants of a meeting can contribute with multiple streams of information, connecting to the screens and the distant communication systems seamlessly.
The system allows easy aggregation of all the video signals in the room across a series of displays
programmers, and hardware engineers, committed to Table 10.6 User value indicators Fast learning Yes User interface Good User experience Very good Process impact Low User feedback Very good
The core purpose of Oblong is to find ways to make computers more flexible, capable, interactive,
multi-screen, multi-device computing environments. The core technology platform, called g-speak, enables applications to run across multiple screens and multiple devices.
In Table 10.7 competitiveness appears to be high on time-to-market drivers. The company is solid and growing
and the technology is developing and integrating with more and more partner technologies. The market is interested, especially in design-intensive companies and for advanced decision making activity.
kids entertainment professionals, software developers, startup experts and creative. The idea of a financial education tool for children has been developed also by other companies,
The infrastructure is ready as there is no need for anything other than a pc and an internet connection. 10.6.2 Applications The interactive and game-like experience of Tykoon make it a very appreciated application by those who are using it.
and the software itself is developed for easy integration with other systems. 10.7.1 Developer Noldus Information technology was established in 1989,
a software Table 10.10 User value indicators Fast learning Yes User interface Very good User experience Very good Process impact Low User feedback Good Wow effect
and led to starting a company for the development of software dedicated to behavioral research.
Agents see in real time a display showing customer engagement and distress level providing also feedback on the quality of their own behavior.
and, directly from his notebook, table or smartphone, he can complete the payment online with very few steps.
On the Mobile Payments side, the ios and Android app, on the one hand, allows customers to pay with their smartphone, with no need for cards or cash, reducing by 10 s the single transaction;
As for the digital trends we have considered the business challenges of Big data as a core component of the information infrastructure upon which our society is building its own open environment.
and drawbacks of Cloud computing, considered an innovative IT model for providing on-demand network access to a shared pool of configurable resources such as networks, servers, and software applications.
in Chap. 5 we have discussed what can be considered as the core trend of the year,
Community cloud, 34 Community coordinator (CC), 118 Community of practice, 117 Comparative sentiment analysis, 70 Computer-supported cooperative work (CSCW), 113
Internet of things, 5 Interoperability, 34 ipad, 4 ipod 4 IT alignment, 146,150, 154,155, 159 IT consumerization, 134 IT governance, 145 149,151 159 ITIL, 150 KKEY performance indicators (KPI), 151 Key-/value
Social influence, 51,54 Social listening, 67,68, 72,78, 80,85 Social media, 5 Social network analysis, 69 Social software, 123 Software as service (Saas), 24
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011