billion spent on video games, consoles, and accessories (Entertainment Software Association 2011 and $30 billion on crafts and hobbies in 2010 (Craft and Hobby Association, 2011;
Luo, Ratchford and Yang, 2013. In terms of digital and online consumption, the numbers are also noteworthy
Individuals can now access software, games, and social communities through smartphones, com -puters, and their gaming consoles (Williams, Yee,
and Caplan, 2008), and according to Nielsen, 81 billion minutes were spent on social networks and blogs in 2011 and 42%of tablet owners use them
daily while watching TV (Nielsen, 2011. Closely related to the empirical application in this paper the worldwide market for online games surpassed $15 billion in 2010 with additional sales of virtual
regarding technology products (Ram and Jung, 1990; Shih and Venkatesh, 2004; Huh and Kim 2008
we make use of a unique data set-from the popular online video game World of Warcraft-that tracks product usage, content consumption choices,
of the major developers of computer games. At the call, the discussion revolved around one of their main products
For example, in video games, product updates are common and demand expertise from users to enjoy newly introduced content.
or clan of players in a video game, as it is the case in our application At each time t, consumer i decides on their status regarding communities of users of the product
For example, in computer games, a playerâ s level is defined usually as a function of most complex completed content;
For examples, in our application, users of a video game can choose content that is hard to complete and have to repeat it in some cases multiple times before proceeding with the game
, hired programmers) to support a fairly stable schedule of content introduction; according to announcements from the firm, new content is launched whenever
server maintenance is performed, which makes Pr (pëoet+1=pëoet+1 âoe§ept, Xt)= 0 except when XMONDAYT=1. For the
per week for video games. See Yao et al. 2011) for a list of other discount rates choices.
with the study of consumer demand in the online computer gaming industry 3. 1 An Online Game
dividuals explore the environment developed by programmers. The game was introduced originally in 2004 and became the best-selling PC game of 2005 and 2006 worldwide.
By 2011, Blizzard had launched three full-fledged expansions and dozens of patches that added new content.
comes from additional fees paid by users to access the online game server and consumer content.
a test server available to users, giving an almost perfect knowledge about the quality of content
The product usage data include actions of 206 users from one of the game servers, for whom the
launch, called badges (a term also used in gamification: how many times an individual successfully completed previous content above a certain complexity.
In the four panels of Figure 4, we show the evolution of the experience levels of each segment
The panels in Figure 5 show the results by segment and content choices j=1,..20.
demand that the firm cannot satisfy, for example due to server capacity 5. 4. 2 Change in Product Diï culty:
The darker line displays participation in the lower complexity setting, the lighter line reflects higher complexity,
The results are presented in the two panels of Figure 9. On the top panel, we show the evolution
while the lower panel reveals the percentage of participating users, for both the actual and counterfactual cases.
as the bottom panel shows, consumers are more active with the content. This engagement is especially important in later stages of the game
a product are formed by frequent usage, such as video games, TV SHOWS, mobile applications, book series, and, in more general terms, any durable good where practice is essential to develop the
Entertainment Software Association (2011), Top 10 industry facts, October 10th 12. Golder, P. N. and G. J. Tellis (2004), âoegrowing, Growing, Gone:
The Case of Japanese Video games, â Working paper 21. Kopalle, Praveen K.,Scott A. Neslin, Baohong Sun, Yacheng Sun, and Vanitha Swaminathan
stereotypical gamer profile, â Journal of Computer-Mediated Communication, 13, pp. 993-1018 44. Yao, S.,C. F. Mela, J. Chiang,
about the majority of small and micro size firms that constitute the core of the economy.
that constitute the core of the economy do not innovate. Most SME innovations are marginal improvements of already existing products, and
Entrepreneurship Monitor, Rapport voor Bel en Vlaanderen 2006 17 Wickham, Philip A.,Strategic Entrepreneurship, Pearson, Fourth
and long-term outlook (Anderson and Reeb 2003). These differences might be explained partly that family involvement affects activities and pro
As core elements in the findings of this research, these concepts are essential, both individually
Global entrepreneurship monitor. Report on high-expectation entrepreneurship. Wellesley: London Business School/Mazars/Babson Barney, J. 1991.
software of the mind. London: Mcgraw-hill Holt, DT, Rutherford, MW, & Kuratko, DF. 2010). ) Advancing the field of family business research:
Petrakis, PE, & Kostis, PC. 2012). ) The role of knowledge and trust in SMES. Journal of the Knowledge Economy, 1â 20
Entrepreneurship Monitor (GEM) 2003 global report. Wellesley: Babson/London Business school/Kauffman Foundation Reynolds, PD, & White, SB.
>/NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken voor kwaliteitsafdrukken op desktopprinters en proofers.
De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5. 0 en hoger
>/ENU (Use these settings to create Adobe PDF documents for quality printing on desktop printers and proofers.
Created PDF documents can be opened with Acrobat and Adobe Reader 5. 0 and later >>/Namespace
Adobe Common 1. 0 /Othernamespaces <</Asreaderspreads false /Cropimagestoframes true /Errorcontrol/Warnandcontinue /Flattenerignorespreadoverrides false /Includeguidesgrids false
Adobe Indesign 4. 0 /Omitplacedbitmaps false /Omitplacedeps false /Omitplacedpdf false /Simulateoverprint/Legacy >><Addbleedmarks false /Addcolorbars false
/Addcropmarks false /Addpageinfo false /Addregmarks false /Convertcolors/Noconversion /Destinationprofilename /Destinationprofileselector/NA /Downsample16bitimages true /Flattenerpreset <</Presetselector/Mediumresolution
Adobe Creativesuite 2. 0 /PDFXOUTPUTINTENTPROFILESELECTOR/NA /Preserveediting true /Untaggedcmykhandling/Leaveuntagged /Untaggedrgbhandling/Leaveuntagged /Usedocumentbleed false >>>setdistillerparams
and functioning regional innovation system, where the core actors and suitable investment priorities and to allocate resources efficiently are more easily identifiable.
is reproduced also by focusing exclusively on a number of core and peripheral EU regions, in order to
a single year (2010), was subsequently transform into a panel variable by combining it with the World
expenditures and R&d spillovers both display a positive and significant correlation with innovation. And finally, all socioeconomic variables included in the social filter index appear to be robust predictors of
same specification for the regions in the core of Europe. The estimates confirm the presence of significant
differences in the factors that affect innovation in the core and the periphery of Europe.
By contrast, core regions, whose quality of government institutions is generally much higher, benefit little in terms of innovation from further increases in quality of government.
Peripheral regions Core regions 1)( 2)( 3)( 4)( 5)( 6)( 7)( 8)( 9)( 10 Patents application (t-1)- 0. 571***0. 573***0. 570***0. 570***0. 569***0. 484***0. 482***0. 484
It can be accessed through the Europa server http://europa. eu /How to obtain EU publications
SMES typically act as catalysts of economic growth and the scarce literature on OI in SMES indicates that small firms engaging in OI practices are more
behaviour, and resulting innovation capacities serve as catalysts to (developing economies (Benã¡cek, 1995; Peng, 2001;
the industry and market contribute to creating a â realisticâ outlook: âoeeveryone works with â opinion leadersâ.
strategic outlook that is necessary for OI to be successful. Joint innovation efforts (and innovation activities in general) take time to generate beneficial financial results and
v Each participating SMEÂ s core area of operation was standardized using the Standard Industrial Classification
In summary, a set of core issues and recommendations were agreed, as follows â¢recognition of the role of universities as a key partner in taking forward successful Smart Specialisation
The above set of core issues and recommendations could valuably feed into the assessment of RIS3 and monitoring and evaluation
The core question is how to design calls to meet common interests aligning regional development strategies with university research expertise and interests.
aerospace and embedded systems, health (ageing, cancer and use of ITCS and agriculture and agronomics, which has had strong structuring effects.
e g. software engineering, renewable energies The National University of Ireland, Maynooth, had much experience of use of EU Structural and Social
improving transparency and allowing software programmers to create extra value from underused data by, for example, mapping
out injuries and deaths to cyclists on Londonâ s roads. vii The Young Foundation researches
Innovation Campâ s bring together software developers and service designers with social innovators to build effective, web-based solutions to social problems, resulting
also been echoed by the recent Business Panel on Future EU Innovation Policy, chaired by Diogo Vasconcelos. xi In their final report, â Reinvent Europe
through Innovation, â the Panel argues that within innovation policy, the â priority has been investing in knowledge rather than utilizing it rapidly and
The Panel proposed broadening the concept of innovation to include social innovation as well as business innovation.
Here, the Business Panel on Future EU Innovation Policy allude to a new kind of research which is multi-disciplinary
business area for private companies and a core driver of innovationâ. Equally challenges facing the public sector â increasing demands from citizens for
European Technology Platforms Expert Group, the Business Panel on Future EU Innovation Policy and the European Research Area Board make a strong
users, using open source methods or crowd sourcing solutions. The view of innovation in the EU 2020 strategy risks being seen as somewhat top down
and screen readers. In the UK, the â direct paymentsâ and â In Controlâ programmes gave people with disability direct control over public budgets
software programming â¢â Pushâ in the form of effective supply, which comes from: first, the
printing, carpet weaving gardening, furniture manufacture, paper recycling and car washing. The first 9 social cooperatives to be set up employ more than 150 people with mental
rather than core costs. The lack of reliable and sustainable grant funding has left the sector vulnerable to outside shocks
software developers code continuously for 24 hours and prizes are given for the best hacks. Seedcamps are week long events
software developers, designers, marketing and business experts as well as those who have knowledge of specific areas of social need-to a two-and-a
is new forms of mutual action between individuals â such as open source software and web-based social networking around issues such as the
management of chronic disease or childcare. Another trend is the rise of prosumption â that is, where users are also producers of services they
Riversimple is creating the first, open source, highly energy efficient eco car Riversimple is a small company with the ability
Through this visual display, residents can see their greenhouse gas contributions in the areas of transportation
Open source technology, such as wikis, â can make government decision-making more expert and more democraticâ. cx Examples from the US and New zealand
commentary on claims of pending patent applications in computer architecture, software, and information security. The process goes through
stages of review and discussion, research for art preferences, evaluation before the top ten references and commentary are sent to the US Patent and
coherence, comprehensiveness or global outlook, and few developed channels exist for spreading skills, knowledge and experience.
The Business Panel on Future Innovation Policy notes that âoethe current finance system is not fit for the new types of innovation required to address
comprehensiveness, or a global outlook. There are scattered elements of what is needed in civil service colleges, NGO training programmes, schools for
According to a Business Panel on Future EU Innovation Policy for the European commission, closed innovation systems are no longer a viable
recommendations of the Business Panel on Future Innovation Policy. clxxi SIX, therefore, recommends that the following should be established across
â¢Developing materials, curriculum, case studies, open source materials â¢Coordinating universities, civil service colleges etc to work
xi European commission, DG Enterprise & Industry, Special Business Panel (2009) Reinvent Europe through innovation: From a knowledge society to an innovation society.
by a Business Panel on future EU innovation policy. Available at http://www. eurosfaire. prd. fr/7pc/doc/1261563738 business panel report en. pdf. Accessed 3
cxxvi European commission, DG Enterprise & Industry, Special Business Panel (2009) Reinvent Europe through innovation: From a knowledge society to an innovation society.
by a Business Panel on future EU innovation policy. Available online http://www. eurosfaire. prd. fr/7pc/doc/1261563738 business panel report en. pdf (accessed 08
cxli European commission, DG Enterprise & Industry, Special Business Panel (2009) Reinvent Europe through innovation: From a knowledge society to an innovation society.
by a Business Panel on future EU innovation policy, p. 25. Available online http://www. eurosfaire. prd. fr/7pc/doc/1261563738 business panel report en. pdf
Business Panel (2009) Reinvent Europe through innovation: From a knowledge society to an innovation society.
Recommendations by a Business Panel on future EU innovation policy Available at http://www. eurosfaire. prd. fr/7pc/doc/1261563738 business panel report en. pdf. Accessed 3
clxxiii European commission, DG Enterprise & Industry, Special Business Panel (2009) Reinvent Europe through innovation: From a knowledge society to an innovation society.
by a Business Panel on future EU innovation policy. Available at http://www. eurosfaire. prd. fr/7pc/doc/1261563738 business panel report en. pdf. Accessed 3
â¢This is an intervention carried out with a comprehensive outlook with regard to strategic projects for the region
For example, bringing together diagnostic computer programmes, call centres and nurses to provide new kinds of healthcare;
Examples include computers in classrooms, the use of assistive devices for the elderly, or implants to cut
work best (such as the discovery that giving computers to two children to share is more effective for education than giving them one each.
including software, gaming and music. Other landmark projects that gave people a licence to be creative in other fields include:
vendor relationship-management software tools to put citizens in control of the personal data held by big firms and public agencies.
68) Citizenâ s panels are similar to citizen juries but tend to involve more people â typically between 500 and 3, 000 people.
which was held in Second life Participants attend as a â virtualâ version of themselves (an avatar), and
Oneworld. netâ s â Virtual Baliâ initiative on Second life. Image courtesy of Oneclimate. net/Oneworld. net
The best think tanks can act as catalysts, combining research, policy ideas, and prompts for practical innovation in advance
82) Fast prototyping emerged first in the software field, the idea being that faster implementation would speed up learning.
around the world in conversation through the use of Telepresence screens Images courtesy of Dialogue Cafã
â¢A business model that runs parallel to the core idea of the venture and which sets out how it can become sustainable
Felipe Berrã os, who launched the initiative, believed that this was the best arrangement â
There are a number of ways in which core stakeholders can be incorporated in the structure of an organisation and
goal should always be to find ways for the core finance to come from those
specification, and trains suppliers in the use of the software of the bidding process. The auction takes from two hours to a few days, with
a common core of meaning Transmitters We look at platforms as the nodes of the new economy,
Prize in conjunction with the United Nationâ s Intergovernmental Panel on Climate Change (IPCC) for â their efforts to build up and disseminate
digital learning environments such as colleges in second life 255) Comprehensive pilots, such as the Bastoey Island prison in Norway
brings together web designers and developers with those involved in meeting social needs to design web-based solutions to particular social
connect start-ups, designers, programmers, and funders 309) Platforms for aggregating action such as Pledgebank, an online
and open-source software such as the Linux operating system, the Mozilla Firefox browser, and the Apache web server.
These rely on a large and highly distributed community of programmers to develop, maintain, and improve the software.
Peer-to-peer platforms can be characterised by decentralisation, self-selected participation self-allocated tasks, community based moderation, and diversity of
participants. However, none of these are of themselves defining features 140 THE OPEN BOOK OF SOCIAL INNOVATION
and are reluctant to provide core funding. Grant -aided organisations are often the first to suffer in state budget cuts and
and the coverage of core costs. 4 403) Direct funding for individuals, including the grants given by Unltd
business assets, such as Salesforceâ s provision of software to nonprofit organisations, or TNTÂ s distribution of food to disaster areas
translation software on its Meedan website of Arabic blogs, or Dialogue Cafã and the Social Innovation Exchange (SIX) using Telepresence
of open-source software, or web-based social networking around specific issues (there are reportedly 18 million cancer related websites, the great
-source software, they are also creating new terms and conditions for the use of information and products.
Hackneyâ s Online Citizen Panel 43 Hammarby Sjã stad 112 Harvard university Ash Institute for Democratic Governance and Innovation
Linux 139 Live Work 31 London Climate Change Agency 158 Mapping 17-19 Margolis Wheel 47-48
Open source 154; 139 Open Space 45-46 Open Testing 53 Organisation 6-7; 34; 61-70;
by building innovative software solutions with a social conscience 7. Initiatives such as Games for Change
intervention on this tension is at the core of Amartya Senâ s Capability Approach (CA) 13. CA is a way to
approach human well-being that posits human freedoms at its core. These freedoms are described as the
-cost distributed and independent manufacturing (e g. 3d printing) in personalised digital-health whilst jointly reflecting on its impact on potential service users and on health-policy making with our research partners
Open source basic infrastructure...20 The components the basic infrastructure...20 Models for sector-specific ecosystems 21
preliminary planning, procuring hardware and/or software tools (installation, training and subsequent reorganisation), continuous maintenance, servicing costs and
telecommunications charges. However, getting the right ICT equipment is only part of the equation..SMES often have limited very resources for experimentation;
the investments in their core business 2. THE DIGITAL SYSTEMS EVOLUTION AND THE ADOPTION PHASES
and efficient search engines, On average, across European union (EU), only 67%of SMES108 have access to the Internet.
to the core business systems, modifying the internal working methods and processes and the internal culture and organisation
The major obstacles could be overcome by having a software infrastructure with services at acceptable costs and adequate quality having the possibility to acquire
and includes outsourcing non-core operations, changes in processes and systems, and paying attention to legal and audit
are, in fact, characterised by intelligent software components and services, knowledge transfer, interactive training frameworks and integration of business processes and e
business services and the software components are supported by a pervasive software environment, which shows an evolutionary and self-organising behaviour,
and software components and services developed for that area of business will appear. These components are based on a set of specific
which could be software components, applications, services, knowledge, business models, training modules, contractual frameworks, laws, â
organs Software components business models Open source models operating systems Simple species Grass worms tiger Small organizations
universities c hambe r s o f commerce Basic e-services Simple services Accounting sys
Groupware sys Group o f species in symbiosis Species in symbiosis: â Networked organizations specific value
and software components and services developed for that area of business appear. These components are based on a set of specific requirements
ï'Generic software components and applications adapted for the specific sector (e g. adaptation of customer relationship management systems, user
ï'New developed or imported sector-specific software components (e g reservation systems or yield management systems for tourism sector;
within a set of interconnected computer nodes based on the geographical areas which adopt the ecosystem concept.
open source developer communities is a measure of the success of the initiative The local business digital ecosystems, supported by a strong and active communities
software sharing, common development of open source software open and distributed common infrastructure use of digital business ecosystems
Terry Winograd and Fernando Flores, Understanding Computer and Cognition, a new foundation for design 1986, Ablex Publishing Corporation, Norwood, NJ
an open source model adopting multiple business models ï'for the âoedigital speciesâ of specialised ecosystem: encouraging the maximum
a unique provider, to guarantee the independence from hardware and software platforms, the highest interoperability and the possibility to reuse the preexisting
Open source basic infrastructure To guarantee that the ecosystems attracts a critical mass of developers of services and
The use of open source infrastructure, the convergence on open standard and open systems, the strong support for interoperability (if necessary through the creation of
compatible free software; the mechanisms for semantic definition, ontology building and instruments for distributed look up
component (open source or proprietary), could substitute it as soon a more adequate one appears on the ecosystem,
ï'fosters the private entrepreneurship on the sector of production of software components and services
Stimulus for small and local ICT software and service providers The ecosystems stimulates the innovation
the smallest software producer can compete on equal terms with the most powerful corporations Competitiveness and innovation is increased then,
generating a supply of software with better conditions of usability, in a model of continuous improvement
provide support for proprietary software produced by multinational companies do not have the knowledge and the possibility of high-level development.
develop software components and solutions creates more technically qualified employment and a framework of competence which stimulates the market, and
which have become the core of a thriving regional innovation network including incubators, science parks, business
like computer networking winnowed from a larger collection (Miller, 1997 Yet another situation is when one space becomes the basis for the enhancement of the others
the making of the personal computer Mcgraw-hill, New york Galende, J.,Suarez I. 1999. A resource-based analysis of the factors determining a firmâ s
ability to attract highly qualified labor force will become one of its core competencies Bougrain and Haudeville, 2002.
Especially the firms located in peripheral and rural areas are forced often to rely on the generally available information sources due to the lack of relevant local
enterprise panels is attrition â which leads to missing data and possibly biased results When reviewing the existing literature on innovation-performance relationship
Science, Technology and Industry Outlook, OECD Paris OECD (2005), The Measurement of Scientific and Technological Activities:
evidence from the Vienna software sectorâ, Economic geography, Vol. 85 No. 4 pp. 443-62 Toâ dtling, F. and Kaufmann, A. 1999), âoeinnovation systems in regions of Europe â a comparative
and monitors their implementation followed by the National Semester, i e. the implementation of the agreed policies by the
information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of
â¢to be the first of a yearly outlook focused on digital trends emerging from both
, MIT Sloan Management Review, IEEE Computer, or the Communications of the ACM (CACM) have such a mission of connecting
aims to be the first of a yearly outlook focused on digital trends emerging from
Research at the Business Technology Outlook (BTO) Research Program who have provided me valuable suggestions and precious support in the coordination of the
bright researchers at Business Technology Outlook (BTO) Research Program that have supported me in carrying out interviews, surveys, and data analysis:
5. 4. 2 Bring Your Own Media Tablet...100 5. 4. 3 Bring Your Own Device for Vendors...
5. 5. 3 Virtualization Strategy...103 5. 5. 4 Bring Your Own Device BYOD Strategy...
6. 4. 5 Social Software and Collaborative Systems and Tools...123 6. 4. 6 Online Communities...
CSCW Computer-Supported Cooperative Work CSFS Critical Success Factors Cxo C-level Manager DDS Digital data stream
, Wii, ipad, ipod, among others, represent an artificial extension of their human being, allowing a seamless integration of the
virtual world of social networks and playground as part of their own everyday life They post everything on Facebook
Data, a core component of the information infrastructure upon which our society is building its own open environment. 2
It is worth noting that computer based information systems are a specific type of information system and not exhaustive 36.
As pointed out by IBM, examples of value added exploitation of data streams concern the analysis of 5 million daily trade events
the open source computing framework Hadoop have received a growing interest and adoption in both industry and academia. 5
5 See for example how IBM has exploited/integrated Hadoop 42 1. 1 Introduction 7 management. Moreover, marketing and service may exploit Big data for
industries, confirming the claim by Andrew Mcafee and Erik Brynjolfsson 8 that data-driven decisions are better decisions,
what Awargal and Weill 27 called softscaling, requiring three core capabilities for companies and their IT units to act as enabling factors for an
and Hadoop at the core of Nokiaâ s infrastructure POINT OF ATTENTION: Big data ask for a clear understanding of both
servers in Singapore to a Hadoop cluster in the UK data center Nevertheless, Nokia faced also the problem of fitting unstructured data into a
bundling the most popular open source projects 1. 2 Case studies 17 in the Apache Hadoop stack into a single, integrated package.
In 2011, GE announced $1 billion investment to build software and expertise on Big data analytics, launching a global software center in San ramon, Cali
-fornia. GE charged William Ruh from Cisco systems to lead the center, devel -oping software and data science capabilities for GEÂ s Big data domain of interest
â the industrial Internetâ POINT OF ATTENTION: Big data require top management commitment and investments, in particular, on human resources to be focused on data
-tion have to be considered as a core target for the success of a Big data strategy
Indeed, the GE assesses the success of software and analytics by their enabling a new portfolio of compelling service offerings, helping, e g.,
In this Chapter, we have discussed the business challenges of Big data as a core component of the information infrastructure upon which our society is building its
) the latter referring to streams of real-time information by mobile devices and internet of things, that have to be â â capturedâ â
6. IBM (2013) What is big data? http://www-01. ibm. com/software/data/bigdata/./Accessed 9 jul
2013 7. Pospiech M, Felden C (2012) Big dataâ a state-of-the-art. In: Americas conference on
8. Mcafee A, Brynjolfsson E (2012) Big data: the management revolution. Harv Bus Rev 90 (10:
how GE is building big data, software and analytics capabilities for an â â Industrial Internet. â â http://sites. tcs. com/big data-study
Kharif O (2013) ATMS that look like ipads. Bloom Businessweek, pp 38â 39 39. Han J, Haihong E, Le G, Du J (2011) Survey on Nosql database.
IBM, Zikopoulos P, Eaton C (2011) Understanding big data: analytics for enterprise class hadoop and streaming data, 1st edn.
changed the way we use computers, how we access information, how businesses derive value from ICT
of the production process by using computer controlled machines. Moreover marketing has benefited from ICT in many ways such as analyzing the results of
Grid computing can be explained as the allocation of several computer systems in a parallel structure to solve one problem 1. Cloud computing is
specific service or pool of services over the network through virtualized IT servers such as data centers and specialized software applications 2. It is the latest
development in the computing models that performs computing functions on multilevel virtualization and abstraction by integrating many IT resources.
The key features of cloud computing can be summarized in the following list 1 V. Morabito, Trends and Challenges in Digital Business Innovation
computing capabilities, such as server using time and data storage, automati -cally and without human interaction 2. Broad network access,
resource from different platforms, such as mobile phones, laptops or PDAS 3. Improved accessibility, by providing the ability for the employees to access
users to utilize the hardware, software, and networking infrastructure over the Internet. From this definition, three levels of cloud computing can be defined (see
Fig. 2. 1). The first level is the Software as Service (Saas). In this layer, the
have full ownership over the service provided such as virtual servers, memory and storage devices. These layers are called also the application layer, the platform
which allows users to rent virtual computers on which to run their own computer applications.
It runs over HTTP, using REST and SOAP protocols. It gives the subscribers the ability to launch
and manage server instances in data centers using APIS. The second one is Microsoft windows Azure platform, which is composed of three components.
The first component which is Windows Azure provides Windows based environment to enable users to run
---Software Framework (Java, Python. NET Storage (DB/File Infrastructure ---Computation (VM) Storage (Block Hardware ---CPU, Memory, Disk, Bandwidth
Resources Managed at Each Layer Software as a service Saas Platform as a service Paas Infrastructure as a service Iaas Examples Google Apps, Facebook
Youtube Microsoft Azure Google Appengine Amazon Simple DB/S3 Amazon EC2 Gogrid Flexiscale Data centres Fig. 2. 2 Cloud computing architecture.
Adapted from 5 Fig. 2. 1 The three layers of cloud computing. Adapted from 4 2. 1 Introduction 25
commodity servers. The second one is the Big Table, which is simplified a model large-scale distributed database.
applications that Google is running on its servers. The previous three systems rep -resent data storage, data management and programming models respectively 5
and the core competence in this field. The agreement between the implementing organization and the cloud computing service provider can be flexible enough
level resources requirements such as CPU and memory in order to fulfill all demands. The automated service provisioning has been researched in the past
Virtualization can be important for cloud com -puting by enabling virtual machine migration to balance the load throughout the
integrated consideration of resources for applications and physical servers 3. Server consolidation. Server consolidation is an approach to the efficient usage
of computer server resources for the sake of cost and electricity savings 7 However, despite the benefits of this approach, server consolidation, bear many
problems that have to be considered. One example of these problems is resource congestion when VM changes its footprint on the server,
which could happen as a result of maximally consolidating a server. Thus, it is crucial to monitor the fluctuations of VM footprints in order to best mange server con
-solidation. In addition, the system has to quickly response to resource con -gestion when they occur
4. Energy management. Energy efficiency and environmental considerations are very important factors in cloud computing that have to be well-thought-out in
designing its architecture. Those requirements can be met by adopting different solutions. One example is the usage of energy efficient hardware architecture
that allows better utilization of hardware resources such as CPU and memory Also, energy-aware job scheduling and server consolidation are two other ways
to reduce power consumption by turning off unused machines 2. 2 Strategic and Managerial Challenges and Opportunities 27
5. Traffic management and analysis. The importance of the analysis of the data traffic is faced by many challenges in cloud computing. These challenges stem
from the difficulties in calculating, measuring and predicting the traffic to the data centers, especially when they are composed of several hundreds of servers
6. Data security. The infrastructure provider tries to achieve best data security by meeting the following two objectives (1) confidentiality, for secure data access
7. Software frameworks. The main objective behind the cloud computing is to provide a platform to host
host the software frameworks such as Mapreduce on one hand, and the legacy applications that are required to run on these file systems from the other hand
-mance of the servers and other resources to comply with the business needs. On the other hand,
charge of their jobs of providing software and hardware support 4. Based on the last point, there will be a possibility of losing the expert
virtual assets, how it monitors these employees, or how it analyses and reports on policy compliance and the little or lack of visibility into the hiring standards and
4. Virtualization issues Virtualization is very important in the cloud computing to achieve its goal of
sharing resources. This can be accomplished by using hypervisor, which also called Virtual machine Monitor (VMM. It is a platform that allows multiple OS
and related applications (called Virtual machines VMS) to run on a cloud machine concurrently to facilitate sharing of cloud resources.
Virtualization of enterprise servers introduces considerable security concerns. Associating multiple servers with one host removes the physical separation between servers,
increasing the risk of undesirable cooperation of one application (of one VM) with others on the same
host. Also, if an attacker gets the root to access the hypervisor, then it brings
significant threats to the holistic view of cloud computing 5. Cryptography and key management The need for appropriate and, up-to-date cryptography systems with efficient
key management will be the main objective for any CSP with highly sensitive customer information. The following are the possible weak components of the
The Applications Programming interface (APIS) are the software interfaces that document how to communicate with the concerned software.
The CSP publishes those API to allow users to discover the available features of the cloud computing
sure that the old CSP, will delete customerâ s data on its cloud servers 9. Service Level Agreement and trust management gaps
logic on which the modern computer is based, and Delphi Method, which is a type of a collective decision-making method 20, with several rounds of anonymous
Hardware/Software Experience Fig. 2. 3 Cloud computing supplier selection. Adapted from 19 36 2 Cloud computing
infrastructure (servers, hardware, programs, processing) would be done by a vendor (â â the cloudâ â),
data centers that contain thousands of computer systems for about 47 organizations and department, including the Ministry of Education science and Technology, the
between the computer systems This situation triggered the move to the cloud environment, in which the
example, there is no centralized system for the government to check and monitor the educational institutes and the results achieved every year.
as networks, servers and software applications. It allows people to access the applications and software they need over the internet and without any limit.
Also it provides many benefits and advantages to the implementing companies. Cloud computing helps organizations to adapt quickly to market changes
Proceedings of the first workshop on hot topics in software defined networks, pp 97â 102
IEEE symposium on computers and communications, pp 129â 134 8. Khajeh-hosseini A, Greenwood D, Sommerville I (2010) Cloud migration:
days when mobile devices such as smartphones and tablets have overtaken the role of Personal computers (PCS) and their leadership in terms of market-share, a new
breed of technologies seem ready to take their place in a few years. As pointed out
smartphones, and tablets cycles respectively) we are entering, faster than before, a third Computing Cycle of â â Wearables/Drivables/Flyables/Scannablesâ â devices
2. Considering smartphones and tablets, as reported by Infoworld 3, in 2013 a research company such as, e g.,
, IDC has predicted that tablet shipments will hit 229.3 million units in 2013, further expecting they will exceed PC shipments by
2015 This phenomenon can be related to other changes always noticed by Mary Meeker and Liang Wu for relevant players in the digital business, such as, e g
location-based application on mobile devices for marketing activities and social sensing (discussed in detail in the following Chap. 4) 15
However the diffusion of mobile devices, such as, e g.,, smart -phones and ipads or tablets, does not entail a consequent success of no matter
services provided through them and accessible to a correspondent wide audience Furthermore, also the adoption of the above technologies may still find resistance
+Smart mobile communications â¢iphone, ipad, Android OS Smartphones and tablets Cloud computing â¢Amazon, dropbox, Google, Salesforce. com, Windows
High density, low cost chips â¢IBM, Intel, AMD chips 50 3 Mobile Services As pointed out by Bagozzi 20,
technology (in that case computers) and its use. In particular, Venkatesh 21 identified anchors related to constructs for individual control beliefs, motivation
â¢computer anxiety influence on perceived ease of use, when moderated by experience As said above the research of TAM has produced a vast literature, whose
TAM constructs are yet a core asset for the development of models, aiming to identify key drivers supporting IT as well as business executives decision making
Apart from traditional core constructs of TAM (such as perceived ease of Table 3. 3 Constructs and
Control Computer self-efficacy Perceptions of external control or facilitating conditions Intrinsic motivation Computer playfulness
Emotion Computer anxiety 6 With a â â feedbackâ â effect also on the internal portfolio of technologies, due to the adoption of
personal devices by employees for work, as we are going to see in Chap. 5 on the IT Consu
Computer Self-Efficacy Perceptions of external control Computer Anxiety Computer Playfulness Adjustment Perceived Enjoyment Objective
Usability Technology Acceptance Model (TAM Experience Voluntariness Fig. 3. 1 Technology acceptance model 3 (TAM3.
Adapted from 17 Technology-specific Perceptions Perceived service availability Perceived monetary value General Technology Perceptions
Fig. 3. 2), that is one of the core TAM antecedents of behavioral intention; on the
mobile devices, applications, and services have to be related to other research streams investigating, e g.,, the difference of usage behavior between mobile
phones and personal computers. In particular, it is worth mentioning the work by Ghose et al. 28 which explores the difference in economics between the two
specific characteristics of mobile phones (reduced screen size, etc. and the con -sequent search costs and constraints, e g.,
computer ones, in the following Section we are going to discuss which digital management solutions can be considered
information systems, at software as well as data level â¢Performance, encompassing the need for monitoring and control of applications
software and data ï§Device management data privacy and security Software solutions to support applications management on devices
Development Integration Security Performance Fig. 3. 3 Digital management solutions 56 3 Mobile Services The native development model is specific for a single device
operating systems (Apple, Samsung, Google, Microsoft, RIM thus with a degree of freedom and control over the application
Considering Mobile device Management solutions, they facilitate the man -agement of devices deployed across different mobile operators or service pro
through a control of the settings and configuration for all mobile devices (com -pany-owned as well as employee-owned) in the network of a given company.
application virtualization. Indeed, they are basically an on-demand service dis -tribution, which kept applications on corporate servers with only core parts or a
subset of an applicationâ s code installed on the device, making the other packages available in streaming on the userâ s mobile device,
when eventually required by a given specific application context Finally, Mobile device Virtualization solutions are a kind of hardware virtu
-alization, allowing, e g.,, the use of two or more operating systems on the same mobile device. These solutions, on the one hand, provide the user with a certain
Table 3. 6 Solutions suitable to enable device security management Solutions Benefits Drawbacks Mobile device management â¢Simple to install
â¢Provide centralized management of the devices used by the user â¢Manage only devices, so the IT
department of a company has to define policies to regulate the practices of users Application streaming â¢The data is stored not directly
Mobile device virtualization â¢The device can be used safely even for personal purposes without being subject to
corporate policies â¢Solutions not always mature and in some case still in a testing phase
degree of freedom in the choice of the device and operating systems; on the other hand, they improve security
and business data as well as operating systems (the former managed by the mobile operators, the latter by the IT department of the company where the user is actually
different mobile devices, regardless of operating system, without losing the native capabilities, and synchronize with the corporate CRM and Inventory management
-patible with different operating systems (OS), such as, e g.,, ios, Android Blackberry, Winmobile), as well as facilitating the updates by the users 29,30
Thus, the Kony solution have been selected to deliver Toyotaâ s Mobile Shopping Tool application, including the mlottm features 29,30,
application for multiple types of OS, among the key issues for obtaining substantial savings from enhanced Customer Experience
personal computer (which, however, required an active connection at the time the order). ) Furthermore, among other useful information to the sales force, the vendors
Force Automation mobile app for ios based tablets (ipad. The goal of the solution was to provide more useful information to sellers to increase the effec
camera of the tablet, and the access to historical cases of sales, the process of
Kymantm by Datalogic Mobile Wireless Handheld Computer and Barcode Scanner. Besides technology issues, the investment in this solution has covered
scan the barcode using the optical drive of the tablet supplied, thus, synchronizing the data on the availability of the product in a purchase order system by SAPÏ
, the Warehouse Management Software (WM) SAPϿdirectly has to indicate where the scanned unit must be stored.
increasing productivity and efficiency through the use of tablets and mobile applications development The last case study shows the relevance of mobile services for marketing and
10 Mobile devices designed to survive demanding environments, harsh conditions, rough handling, providing ergonomics that reduce operator effort.
1. Craig C (2013) Beyond Google glass: get ready for more wearable computers. Infoworld 2. Meeker M, Wu L (2013) Internet trends D11 conference
PC shipments worse than predicted, tablet shipments get better Infoworld 4. Rai A, Sambamurthy V (2006) Editorial notesâ the growth of interest in services
control, computer anxiety and enjoyment into the technology acceptance model. Inf Syst Res 11: 342â 365
Datalogic (2012) Mobile computers connected to SAP ï inventory and warehouse management for Habasit 34.
Considering them as a core marketing driver for digital business value, the Chapter discusses the main approaches and tools for
section, sentiment analysis software (or opinion mining) try to monitor all the relevant matters discussed online.
As well as a search engine allows searching information through websites, an opinion search engine can easily find judgments and evaluations about the argument
the users are looking for. In this context, it is important to underline Horringan 22 reported that out of 2000 American adultsâ sample in 20071
according to Pang and Lee 12 a sentiment analysis software has to be able to â¢Identify relevant posts
syndication, social bookmarking, Podcast and widget. These systems reshape the way social networking is considered, giving it a more dynamic and multi-sources
Moreover, in addition to web browsers, also web server software can be easily attacked by malware and other threats.
if companies want to monitor, identify, evaluate and face the impact of external risks that rise up from social networks and 2. 0 technologies.
-ante marketing intelligence activity let the firms monitor external environment identify potential threats, evaluate the impact
in order to prevent and control risks through marketing intel -ligence tools, these have to use advanced and appropriate metrics.
offered in Table 4. 3. The approach described is structured in two core steps â¢identify and decide
such as crystal liquid display and hard drives, and the sales of its participationsâ â None â â â Alex.
and tablets, likewise (as seen in Chap. 3). However, mobile technologies are only one of the several facets of what
the ones in mobile device, but also social networks, and web technologies to infer data about people preferences, activities,
IBM System S, storing and processing large volume of data streams in real time Stream synopsis algorithms and software
Histograms and sketches for data stream computation problems see 37 for a survey a According to 42 Hyperscale storage is measured a storage space in terms of petabytes,
mobile phones and tablets or ipad. Always related to localization as a core feature, we point out the increasing relevance and interest into the applications of
â â Vehicular Participatory Sensingâ â, in particular for the potential contribution to research and innovation areas such as, e g.,
/Internet of things â¢Microsoft Sensormap â¢Radio frequency identification (RFID) embedded in objects for tracking commercial products, in large animals for tracing
mobile devices, providing services and solution for worldwide dynamics and evolving markets. Inside Nokiaâ s organization, benchmarking is used in order to
-marking analysis. Especially in the open source activities or in the development communities, the usage of social media and collaborative spaces has contributed to
interest involved the open source practices, the professional use of 3d elements software development and open innovation.
Among the instruments, blogs and wikis, forums for discussion, video services (Youtube and Slideshare), have
â¢involve also internal users in a proactive participation to the marketing intel -ligence process (helping
Pervasive Computer Communication Work PERCOM Work, pp 525â 530 36. Aggarwal C, Abdelzaher T (2013) Social Sensing.
companies bring their own laptops to the work environment to use them to do their jobs.
or tablet devices, since employees can take them anywhere and access any variety of content, e g.,
A major driver of mobile device usage in the work environments has been the emergence of cloud computing. As mentioned before, both personal and business
data can reside in the cloud on large servers run by giant technology firms such as Amazon and Google, where staggering amounts of data are stored for retrieval
host of smaller firms and the use of portable, mobile devices usage increases exponentially. In fact, a Gartner group prediction, reported by the Economist 4
achieved by lower spending in hardware and other types of infrastructures, as employees will be more mobile
PC Primary device is fixed IT department has the control One device, One task Management & Security
companyâ s own app server. Frequent data interactions can increase data accu -racy, and at the same time the degree of data sharing will be increased 8
and what protection software they have as well as the provisioning and support they will need. It also provides the legal requirements to govern this trend.
â¢Third section is about the technical issues concerned with mobile devices and security issues related to them
â¢Fourth segment is about the issues related to software and apps used on the consumerized devices
Moreover, Mcafee Inc. corporation, which is an information security specialist has cooperated with Carnegie mellon University, in a report entitled â Mobility and
It shows that despite the results of a survey of 1, 500 mobile device users and IT decision-makers that have found that 95%of the corporations
already have policies that govern the use of mobile devices such as smartphones and tablets, only one third of the employees at those companies were aware of such
rules. Moreover, the guidelines that are currently in use within those businesses are inadequate to deal with situations
Furthermore, other survey results show that 63%of mobile devices that con -nect to enterprise networks regularly are used for both work and private purposes
software being introduced into the enterprise network by poorly protected smartphones, the Mcafee study concludes that theft
or loss of the devices is considered as a bigger security threat, since the lost smartphone can contain sig
According to Mcafee, a third of such devices losses resulted in a financial impact on the organization.
2. The increased variety and complexity of personal and mobile devices as well as different operating systems and applications that all requiring management will
lead to increased costs 3. The possibility of losing mobile devices would likely increase when the
organization uses more of these equipment, which means more costs 4. Additional spending might happen to ensure that the security requirements do
measures and policies on application-rich mobile devices, especially when the device is owned by the employee
by Intel IT center in a form of white paper 14 in which another five steps have
to a file created on hisher work computer, heshe can easily store the document using his personal cloud service.
different operating systems that may occasionally connect to the corporate net -work, but are connected always to the Internet.
In its report about IT consumerization 14, Intel has provided a set of best practices (see Fig. 5. 2) for supporting employee-owned devices in the enterprise
In other words, instead of focusing solely on securing hardware devices, firms have to concentrate on protecting the corporate data that will be
3. To decide which operating systems and devices to support: this is an important procedure in order not to ensure that the technology choices wouldnâ t
includes considerations related to software requirements, bandwidth options management needs, and investment parameters 14 5. To stay up-to date with changing and new technologies:
According to 15, Microsoft has used qualitative and quantitative research in several countries to understand the different types of information workers, which
OS and devices 4 Plan Deployment 5 Stay current with Technology Fig. 5. 2 Best practices for supporting employeesâ owned devices.
Non-PC worker Generalist Road warrior Deskbound contributor Techrealist All star Technology engagement Low Low Medium Medium Medium High
Bring your own media tablet Business manager All star Bring your own device for contractors Contractor Road warrior
5. 4. 2 Bring Your Own Media Tablet A business manager handles hectic schedules and endless lists of tasks and
However, with the media tablet it is possible for that manager to accomplish a lot while being out of the office.
For example, the media tablet can connect to the corporate data center and can be used to answer all the emails that
-saging IM discussions while sharing documents on the screen with other employees at the company
and to display, explain and discusses proposed changes by sharing the screen of hisher laptop.
Moreover, additional colleagues can join the conference calls from their own devices Furthermore, heshe also spends a few minutes browsing the latest news from
on the laptop to communicate with friends and family 16 100 5 IT Consumerization 5. 4. 4 The Boardroom
Executive decision makers are more and more adopting tablet computers for decision support. These roles are constrained extremely time and are often
reluctant to the use of computers in general. Tablet devices are replacing paper in fast-paced boardrooms
and can enable executives to attend meetings or conference calls with all the supporting documents they need,
The tablet is suited extremely well for sales conversations because it does not provide a physical barrier like opening a notebook to display the screen.
Also because media tablets and TABLET PCS are thinner, lighter, and have longer battery life, they are very convenient for these ultra-mobile roles.
A tablet is highly supportive when talking to a client because it can provide interactive, visual
information that supports the conversation. Examples of new opportunities enabled by tablets include making an immediate competitive analysis between businesses
or providing highly personalized information during the conversation, such as personalized mortgage information 16 5. 4. 6 Retail Sales
Tablets can provide local retailers with the opportunity to compete effectively with online stores. The types of devices that are used for retail applications vary
tablets can interfere with that experience. In addition, shoppers may spend too much time looking at the screen of a tablet or phone,
rather than interacting with products in the store 16 While kiosks remain popular if the customer needs to look for more information
to obtain recommendations from other consumers by using their tablets. Moreover cash registers are increasingly being replaced by tablets and other handheld
devices, which provide an opportunity to reduce costs 16 5. 4 Business Scenarios for IT Consumerization 101
going mobile, modernize the desktop, virtualize, and bring your own device. The key concerns about these strategies as well as the tech
in achieving productivity gains by using their own mobile devices, such as smartphones and media tablets. However, some key concerns about this strategy
have to be addressed. These include: managing a diverse mobile platform, pro -tecting information that flows across mobile devices, adopting applications for
mobile consumption, and defining data ownership. 3 Implementing mobile strategy includes enabling mobile device management infrastructure such as, for example, System Center Configuration Manager 2012
and Windows Intune, which is based a cloud management solution that can pro -vide a rich platform to manage Android, iphone, and Windows phone devices
Also, it includes information protection by using Active directory Rights Man -agement Services, which provide the infrastructure that is needed to protect office
Moreover, Windows Server 8 and Dynamic Access will provide an even more compelling solution 16 5. 5. 2 Modernize the Desktop Strategy
â¢migration to up-to-date Linux, IOS and Windows versions to reduce cost â¢reducing application portfolio and application migration
â¢using virtualization to reduce application deployment costs by reducing testing efforts and decreasing the time that is needed to deploy apps
which is desktop virtualization that separates the desktop environment and associated application software from the
physical client device that is used to access it 5. 5. 3 Virtualization Strategy This strategy enables enterprises to quickly achieve business benefits gained from
IT consumerization by moving the desktop and/or applications into a data center This strategy makes it easier to provide new desktops,
but it requires investment in the infrastructure that supports it. The key concerns with this strategy include
roaming user experience across devices and locations, protecting user information using virtualization technologies that include desktop virtualization and applica
-tion streaming, and finally, delivering the required applications to privately owned devices by using application gateways
Nevertheless, enabling such strategy includes new technologies such as server -based virtualization for application streaming and user state virtualization for a
great cross-device experience 16. Companies that provide desktop virtualization solutions include information technology giants. One example of these companies
is Cisco, which provides Desktop Virtualization with collaboration with Citrix Xendesktop solution and desktop virtualization with cooperation with VMWARE
View solution. Another example of those information technology pioneers is Dell which provided Virtual desktop infrastructure (VDI) solution that provides new
capabilities for its users such as high-performance 3d graphics, unified collabo -ration and Voip with other products such as Microsoft Lync 2013.
The users of this solution can access enhanced media and graphic software from virtually any
place and on any device. Also, it provides IT departments with the ability to centrally host, manage
Windows Intune, virtualized desktops or apps, application gateways to publish apps to devices, and cloud services to deliver apps to devices 16
since that mobile devices can access email and provide instant messaging service, calendar, voice, and other capabilities at any time and
own mobile devices. Thus, IT department is relieved of some time-consuming aspects of supporting an enterprise infrastructure,
the privacy and security risks involved in using certain software applications Legal considerations. It is crucial to consider the different legal and privacy
and the support of different mobile devices Moreover, additional delivery options are associated with device options, as
consumerization on the existing IT policies and procedures regarding hardware and software failure. Also, different support strategies can be utilized to control the
support efforts as well as the costs while providing support to the organization Table 5. 4 Desktop delivery option
On your own Bring your own Choose your own Here is your own Consumer desktop Enterprise desktop
Consumer OS Consumer OS Enterprise OS Enterprise OS Local workspace Local workspace Local workspace Local workspace
Virtual desktop Virtual workspace server or local Virtual workspace server or local Access to hosted desktop Access to hosted desktop
Public access apps Remote desktop Session roaming Session roaming Remote apps Apps virtualization Apps virtualization
VDI Roaming environment Roaming environment Data synchronization Data synchronization VDI VDI Adapted from 16 5. 7 Considerations Related to IT Consumerization 105
Therefore, it is important to establish a communication strategy or policy that clearly defines personal and IT responsibilities and expectations from all parties
online or virtual world and opportunities. This situation can be demonstrated better by examining the fact that one-in-six United states (US) couples who got married
Moreover, around the world, social media and new and smart mobile devices are becoming very important in personal relationships among people in a way that
companyâ s computers. Moreover, a recent research claim that nearly half of all the workers (46%)surveyed have graded their employers with extremely low marks
Devices Operating systems Files & settings Apps On your own You You You You Corp Corp Bring your own You You You You
has positioned the software giant to introduce enterprise social networking capa -bilities to its existing business collaboration systems such as Sharepoint
This acquisition by Microsoft is a clear example of the importance of social networking within work environments
Skype software, which is a communication product that Microsoft acquired last year for $8. 5bn and it is expected to integrate with its mainstream business
applications 17 5. 9 Case studies In this section we investigate some IT consumerization at work environments related case studies and we provide explanation about its role for the business
messaging communications by browsing through on-screen contact profiles that are represented by profile pictures and â â existenceâ â indicators,
first incarnation was sized a tablet desktop device, the value of it is in the software or
app that can also be used on desktop computers and other devices such as ipad Avayaâ s strategy for mobility within the enterprise is to take advantage of the
consumer gadgets that executives and employees are already bringing to work such as tablets and smartphones.
Moreover, with its one-X software for smart phones Avaya also allows its employees to make the mobile phone acts as an extension of
the corporate network. That means employees can transfer calls from their desk to their mobile phones as they are leaving their offices,
Shell has started a period of six months rollout of a Mobile device Management (MDM) software-as-a-service (Saas) platform from Airwatch.
employee-owned Apple and Android phones, and tablets that meet its minimum operating system requirements POINT OF ATTENTION:
It is necessary to realize the importance of engaging people from all departments at the company in order to comply
with all needs and to be able to have a successful consumerization of the IT
Intel (2012) Five steps to consumerization of IT in the Enterprise. White Pap from Intel
15. Harteveld A (2012) How the consumerization of IT affects your businessâ microsoft recommendations for a consumerization of IT strategy.
Microsoft Services Enterprise Architecture, Microsoft Corporation, Redmond, pp 1â 22 16. Harteveld A (2012) Microsoft recommendations for a consumerization of IT strategy
Microsoft Services Enterprise Architecture, Microsoft Corporation, Redmond, pp 1â 16 17. Taylor P (2012) Consumerization of corporate IT accelerate.
In: Financial times. http://www ft com/cms/s/0/a2fb5172-c077-11e1-982d-00144feabdc0. html#axzz2lgryjslf.
Accessed 21 Nov 2013 18. Carr DF (2011) How Avaya Is Embracing Social, Consumerization Trends.
In: Information week. http://www. informationweek. com/how-avaya-is-embracing-social-consumerization -trends/d d-id/1101720?
Also, Computer-Supported cooperative work (CSCW) is concerned centrally with teamwork, learning, problem solving knowledge building, task accomplishment and other cognitive achievements by
work collaboration Is supported Computer Cooperative Work (CSCW) 1, which V. Morabito, Trends and Challenges in Digital Business Innovation
-laboration systems include desktop and video conferencing systems, collaborative authorship applications, electronic mail as well as refinements and extensions, and
systems which include conferencing rooms that are enhanced with large-screen digital projectors that are connected to several PCS
meeting systems, videoconferencing systems and instant messaging software applications like email and chat programs â¢Same Time (synchronous) and Same Place (collocated),
using large displays and whiteboards The previous explained collaboration categories can be illustrated in a form of
They are the computer applications that support creative and collaborative way of finding solutions for the
Electronic meeting systems form a class of applications for computer supported cooperative work. Based on their features, they can help to find solutions for many
This software system is a suite of tools that provide configurable features of collaborative working methods;
In these systems, typically users have their own computers, and each one of them can participate in the current running session simultaneously.
groupware and from web conferencing systems. The main difference from groupware is the degree of collaboration.
Groupware provides support for col -laboration within groups of participants where their contributions are recognizable
In contrast, EMS enables the group to produce an artifact in a cooperative way, in
during the execution of a business process, both groupware applications and EMS support and complement each other:
the groupware provides teams with capa -bilities related to researching and documents creation during the preparation stage
-ferencing software complement EMS with screen-sharing as well as the ability for the voice interaction functionality that is necessary in synchronous online con
formal term used in computer-facilitated communication, collaboration and learning is asynchronous conferencing and is used to define technologies that are
compatibility, and the way the workflow is configured pre in such software applications. Several associations in industry issue their own standards of docu
6. 4. 5 Social Software and Collaborative Systems and Tools Nowadays, people are using social networking massively.
face-to-face meetings, are slowly being replaced by computer based systems where different kinds of socialization are enhanced through media sharing, reflection on
The term social software is general and it applies to systems used outside the work environment or workplace.
Software products such as email, calendaring text chatting, wiki, and bookmarking belong to social software category. However when these applications are used at work to facilitate the accomplishment of
business tasks, processes and objectives, then they are called collaborative software Collaborative software is designed an application to assist people involved in a
common task in order to achieve their predetermined goals. These applications aim to transform the way the documents
The use of such software at the work place stimulates a Col -laborative Working environment (CWE) that supports individuals as well as those
Examples of such collaboration software in the market include: Microsoft Sharepoint, IBM Lotus notes and Google apps for business.
The latter one con -tains many useful applications such as Google doc for file sharing among team members, Google Calendar for scheduling meeting at times that works for
everyone with features such as reminders, Google Drive for storing, sharing and accessing files from everywhere,
Google Sheets that enable spreadsheet 6. 4 Digital Collaboration Systems and Ideas 123 management with easy charts and discussion style comments, and finally, Google
Slides that allow users to create presentations together Also, Siglin 17 has provided examples of other video collaboration software
The first one is provided by Accordent Inc, . which its history is based on rich -media capture.
with Powerpoint, webpages, and live video streams. Moreover, beyond just the live streaming capabilities, the company has polling, chat, and other real-time
Another example is produced by Adobe Systems Incorporation that introduced a collaborative tool called Adobe Story that provides the creative and
enterprise customers with the ability to jointly create a video script Taking the above issues into account,
market such as Skype, Dropbox, and others. Moreover, it is worth noting that these technologies can be considered as a representative â â typeâ â of the main common
Skype This application is a free voice over internet Protocol (VOIP) service and instant messaging that is developed by the recently acquired company by the software
giant, Microsoft. Skype can be used to meet the following goals â¢calling and video conferencing over the internet
â¢train team members on using software using screen sharing ability with others â¢cheap calls on landlines and mobile devices
â¢instant text messaging from computer to computer â¢conduct meetings and conferences Dropbox Dropbox is a file hosting service that offers many capabilities such as cloud storage
and file synchronization. It allows users to share contents through folders, which they can create on their computers.
Dropbox synchronizes those folders in order to appear the same folder (with the same contents) despite the media or the device
that is used to view them. This product can be used to meet the following goals 124 6 Digital Work and Collaboration
â¢storing and backing up any kind of file â¢immediate synchronization and sharing of files across computers and among
users who are located in different geographical locations â¢sending and sharing files that are large to email
Google Drive and Google docs Google Drive is a file storage and synchronization service provided by Google and
Google Drive can be searched with web search engines. Google docs is a freeware web-based office suite offered by Google within its Google Drive service.
It allows users to create and edit documents, spreadsheets and presentations online while collaborating with other users live.
With Google docs, users and companies can do the following â¢create, collaborate on, share and edit documents online
â¢collaborate in a real time, which means that the users can see the changes instantly
â¢manage different revisions of a document â¢create online forms for conducting community surveys
Microsoft Skydrive Skydrive is a file hosting service from Microsoft that allows users to upload and
sync files to cloud storage and then access them from a Web browser or their local device.
which means that users do not require a Microsoft account to access them. The features of the Microsoft Skydrive service include
â¢It allows users to upload, create, edit, and share Microsoft office documents directly within a Web browser
â¢It provides the ability to integrate with Microsoft office and outlook â¢Users can share the documents on social networks
â¢It supports geo-location data for photos uploaded onto the service Microsoft Onenote Onenote is a software from Microsoft that enables a free-form information
gathering and provides capabilities for multi-user teamwork. It can accept entries such as usersâ handwritten or typed notes, sketches and audio explanations.
Notes can be shared with other Onenote users over the Internet or a network, and it is
available for different operating systems. Also, Microsoft offers a web-based 6. 4 Digital Collaboration Systems and Ideas 125
version of Onenote as part of Skydrive or Office Web Apps, providing users with ability to modify notes via a Web browser.
This software allows companies and users to â¢create notes, outlines, clippings of websites, and collections of images
For example, computer scientists at Carnegie mellon Uni -versity have created a project called recaptcha, which uses humansâ abilities
These plans should have the ability to monitor crowds actions and on the one hand, to adapt at runtime incentive mechanisms to prevent various
sensors or processors, but also to join their human intelligence and creativity. As a result, instead of focusing on simple and independent tasks,
project is initiated by computer scientists from Carnegie mellon University, in which people are collaboratively using their humansâ thinking, processing and
computers cannot read using Optical Character Recognition (OCR) technology Consequently, as the people read and enter the two words into specified fields at
-nizable by computers. The creators of this project hope that recaptcha con -tinues to have a positive impact on modern society by helping to digitize human
applications and software services provider. The introduced technology has suc -ceeded to achieve high satisfaction rates from both the members of the faculties
-oration is basically about using digital devices, open source data and cloud technology to share knowledge, manage information
2. Grudin J (1994) Computer-supported cooperative work: history and focus (Long beach Calif 27: 19â 26
Schrire S (2004) Interaction and cognition in asynchronous computer conferencing. Instr Sci 32: 475â 502. doi:
asynchronous computer conferences. In: Proceedings of 42nd Hawaii international conference on system sciences, pp 1â 10
Bhana I, Johnson D (2006) Developing collaborative social software. Comput Sci ICCS 3992: 581â 586
Software C (2013) Collaborative software. In: Wikipedia. http://en. wikipedia. org/wiki /Collaborative software 17. Siglin T (2011) Video collaboration tools.
-forms, protecting information across different and heterogeneous mobile devices and defining data ownership. However, this is only a part of the current challenges
Symantec Corp.;while approximately $1 trillion according to Mc afee Inc However, apart from the presence of no standard mechanism for accounting for
public and private spending should be focused less on defense of computer crime i e. antivirus, firewalls etc.
campaign, aiming to engage core customers online and creating a direct dialog 3 Talktalk Business:
Social networking software and argumentation systems are just two examples of the ongoing research in this important area of digital governance.
IT governance, at its core, clarifies accountability, roles and decision-making. It addresses concerns related to building a responsive
people monitor to see whether has been followed or not Adapted from 1, 7, 8 148 8 Digital Governance
which includes not only the core web team and business stakeholders but also the web managers within the organization and deep and rich support infrastructure that
-cute and monitor. Thus, they started with seventeen CSFS that they discovered from those studies;
-Gather a Core Team; 2-Assess What You Have; 3-Determine What You Want; 4
its core component at firm level should be first developed. Indeed, when a specific IT governance model is chosen and
and, in particular, into the IT governance domain as its core component at firm level, covering the advantages
IBM Syst J 32: 4â 16 20. Broadbent M, Weill P (1993) Improving business and information strategy alignment
IBM Syst J 32: 162â 179 21. Simonsson M, Johnson P, Ekstedt M (2010) The effect of IT governance maturity ON IT
IBM Institute for Business Value 12, interviewing 1, 130 entrepreneurs, CEOS and general managers working in different industries.
innovative software and hardware products has always been the focus of Apple and, traditionally, most of its business operations were taking place in the field of
personal computers. The launch of the ipod, the portable media player, in com -bination with the itunes software, a system that allows users to access the Apple
store to buy online music and other types of content and transfer them from an ipod to a computer, corresponds to a formidable innovation of Appleâ s business
model. In summary, not only Apple has developed and brought to the market hardware and software products with a high degree of innovation, but it has
radically transformed its business environment, adding music distribution to its activities. This transformation has resulted in the construction of new ongoing
which is the core of Appleâ s business model, allows the company to create and extract value on an ongoing basis
servers can monitor and record the navigation of millions of users and produce in real-time pages with a highly personalized content based on the profile and
redefined the value chain linked to the world of personal computers in the late nineties, ebayâ s and Pricelineâ reverse auction system,
In fact, the search engines like Google and Yahoo! are some of the most visited websites and they make money thanks to
IBM (2009) IBM Institute for Business Valueâ s Biannual Global CEO Study 2009 13. Casadesus-Masanell R, Ricart JE (2007) Competing through business modelsâ WP no 713
designed as a mix between the style and appearance of ios with the convenience of Facebook.
-ground and experience on Google software, developed at the IBM Research Lab in Haifa, while his two partners both have extensive experience in the banking
while the core of the banking activity behind it is managed by a traditional Russian Bank (VPB.
development and adoption of many other solutions based on the same core algorithms 10.4 Billguard Billguard 5 is a personal finance security system scanning credit card activity
Google, Paypal, Verisign and Sun microsystems In Table 10.5 the time-to-market drivers of competitiveness display an
is a collaborative conference room, enabling multi-user, multi-screen, multi-device interaction both in a physical and virtual meeting space.
screens and the distant communication systems seamlessly. Mezzanine wishes to transform the telepresence in infopresence, incorporating multiple users and
of all the video signals in the room across a series of displays, which function as a
It is a company of designers, programmers, and hardware engineers, committed to Table 10.6 User value
indicators Fast learning Yes User interface Good User experience Very good Process impact Low User feedback Very good
The core purpose of Oblong is to find ways to make computers more flexible, capable, interactive,
and empowering. The system designed for Minority report was considered futuristic at the time, but it has largely been transformed into reality in the last years.
multi-screen, multi-device computing environments. The core technology plat -form, called g-speak, enables applications to run across multiple screens and
multiple devices In Table 10.7 competitiveness appears to be high on time-to-market drivers The company is solid and growing
and the technology is developing and inte -grating with more and more partner technologies. The market is interested
made up of financial experts, kids entertainment professionals, software devel -opers, startup experts and creative.
other than a pc and an internet connection 10.6.2 Applications The interactive and game-like experience of Tykoon make it a very appreciated
and the software itself is developed for easy integration with other systems 10.7.1 Developer Noldus Information technology was established in 1989,
on parasitoid wasps, he developed the first version of The Observer, a software Table 10.10 User value
and led to starting a company for the development of software dedicated to behavioral research.
Agents see in real time a display showing customer engagement and distress level, providing also feedback on the quality of
and, directly from his notebook, table or smartphone, he can complete the payment online with very few steps.
) On the Mobile Payments side, the ios and Android app, on the one hand allows customers to pay with their smartphone, with no need for cards or cash
trends we have considered the business challenges of Big data as a core com -ponent of the information infrastructure upon which our society is building its own
resources such as networks, servers, and software applications. Furthermore, we have analyzed the challenges to digital business innovation by the diffusion and
Lastly, in Chap. 5 we have discussed what can be considered as the core trend of the year, perhaps resulting from
Computer-supported cooperative work CSCW), 113 Computing interfaces, 194 Confidentiality, 28 Consumerization, 89, 90â 92,95, 98,99, 102
ipad, 4 ipod, 4 IT alignment, 146,150, 154,155, 159 IT consumerization, 134 IT governance, 145â 149, 151â 159
Social software, 123 Software as service (Saas), 24 Start-up, 187 Storage, 10 Subjectivity detection, 73,74
T Tagging, 83 TAM 2, 51 TAM 3, 51 Technology acceptance model (TAM), 47 50â 52,54, 63
5. 4. 2 Bring Your Own Media Tablet 5. 4. 3 Bring Your Own Device for Vendors
5. 5. 3 Virtualization Strategy 5. 5. 4 Bring Your Own Device BYOD Strategy 5. 6â Enterprise Drivers Behind the Consumerization of IT
6. 4. 5 Social Software and Collaborative Systems and Tools Skype Dropbox Google Drive and Google docs
Microsoft Skydrive Microsoft Onenote 6. 4. 6 Online Communities 6. 4. 7 Crowdsourcing 6. 5â Case studies
6. 6â Summary References 7 Digital Business Identity Abstract 7. 1â Introduction 7. 2â Privacy and Security Drivers and Challenges
7. 3â Digital Brand Management 7. 4â Case studies 7. 5â Summary References 8 Digital Governance
Abstract 8. 1â Introduction 8. 2â Opportunities and Challenges Related to Digital Governance 8. 3â Digital Governance Mechanisms
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011