The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the commercial deployment of 4G technology, the Mobile Internet era comes truly. The human resource managers should conform to the trend of the times, combine human resource management with Mobile Internet and design the innovation strategies for human resource management mode. This paper chooses the telecom operator -- JLLT company as the research object, analyses the bottleneck of JLLT company's...
Mobile devices are increasingly becoming a melting pot of different types of data ranging from sensitive corporate documents to commercial media to personal content produced and shared via online social networks. While it is desirable for such diverse content to be accessible from the same device via a unified user experience and through a rich plethora of mobile apps, ensuring that this data remains...
The paper concerns the problem of using and implementing mobile solutions in SMEs (Small and Medium Enterprises). Some of the existing examples of mobile solutions are analyzed and characterized. A significant part of the paper is a presentation of the research on mobile solutions which can be used to manage the business activities in SMEs. The role and methods of testing the mobile systems have been...
Cloud service has created the opportunity for a new business model. Among all of them, cloud storage service is one of the frequently adopted by the Internet user to create, keep and share their files. This study aims to realize customers' willingness to pay for cloud storage service from the mediating effect of perceived value through perceived service quality, perceived sacrifice and conformity...
With the rapid development of LTE-Advanced (LTE-A) mobile communication technology, companies continue to file for new patents or obtain licenses from patent assignees to secure the right to use LTE-A related intellectual properties (IPs) for product commercialization. There are many standard essential patents (SEPs) complying with LTE-A specifications set by the third generation partnership project...
Mobile users are unlikely to guard against information security risks that do not come to mind in typical situations. As more people conduct sensitive transactions through mobile devices, what risks do they perceive? To inform the design of mobile applications we present a user study of perceived risk for information technology workers accessing company data, consumers using mobile personal banking,...
Disaster recovery solutions are critical for businesses. The disaster recovery solutions range from fairly simple offsite storage solutions to fairly complex real-time replication systems. This paper investigates the use of mobile devices as a collective storage location that can be used in case of a disaster. The solution makes use of the Neo devices described in the Neo Model. The Neo devices connect...
This paper analyses the key elements that affect the acceptance and effective utilisation of ICT, in Zimbabwean SMEs. The research employed a qualitative research approach and utilised the survey strategy to obtain reliable data and provide a tentative view of the SMEs in context. The data obtained from structured interviews with identified SMEs has practically identified key elements that affect...
According to the statistics from the last five years users purchasing new personal computers (PCs) give preference to mobile devices (tablets and smartphones) that has its effect on its use in business. The problem is in methods and means of ensuring the security and confidentiality which are described at the top level and do not consider the specifics of the Mobile Corporate Networks (MCN). Authors...
At the start of each year, there is always a lot of interest in predictions for the year ahead and the latest marketing trends. “What's Hot?” and “What's next?” are always the most common questions. Marketing is at the core of all business activities. Without marketing, organizations cannot sell and without sales there is no revenue and without revenue people cannot run business. The Digital marketing...
At the start of each year, there is always a lot of interest in predictions for the year ahead and the latest marketing trends. “What's Hot?” and “What's next?” are always the most common questions. Marketing is at the core of all business activities. Without marketing, organizations cannot sell and without sales there is no revenue and without revenue people cannot run business. The Digital marketing...
This paper dwells on the application of MOOC model to the career guidance curriculum in the application-type undergraduate colleges, with combining the characteristics of MOOC courses and the features of career guidance. Thus, the career guidance curriculum, on the basis of teaching theoretical knowledge, combined the ways of event experience and inspired summary, make students participate in the...
Mobile Applications of cloud play stores have a tremendous growth nowadays. Numerous applications are available to schedule our day to day activities, checking emails, making conference calls, connect using social network and so on. As the technology grows the fraudulence of applications has also increased. Some Application developers use tricky measures to rank their applications in the top Applications...
The most common thing we are listening about these days is e commerce this paper is all about taking e commerce to the next level. In a survey (of Bi intelligence) it was found that the most used social networking app is Facebook messenger and what's app, which is basically online chatting applications. It's all about giving customers a reliable and easy platform of internet shopping to save their...
Detection System for Mobile Identity Bag Owners Students Using QR Codes (Quick Response) was developed to create a system of safety features in a briefcase National Defence University of Malaysia (NDUM) used by students. QR code technology is the best technology to solve the problems faced by the current system. The system is capable of decod QR, information display and transmission of information...
Collecting a digital footprint of data from one's everyday activities is becoming an information source for preventive health care. Wearable sensor technologies combined with mobile phone applications offer an interesting way to collect and monitor personal activity data for personal use, in addition to providing information for wellness and health care professionals. In this paper we present our...
The aim of the explorative study is to understand the role of crowdfunding in the development of the fanbase using data from two recent cases of competing business ecosystems. We conducted an event study that employed social set analysis (SSA) of Facebook data to uncover and better understand the users' interactions and brand associations before, during and after a crowdfunding campaign event. Key...
As mobile and wearable technologies grow in popularity, ever-increasing volumes of valuable, fine-grained personal information are generated as people go about their daily lives. This information may be exchanged by individuals for "free" services, but there is currently no widely adopted means by which individuals can benefit financially from their personal information. To address this...
Digital Health is concerned with improving human health by utilizing such high profile applications of wearable and implantable technology, web and email, mobile technology and social networking, and data management and analytics. The changes that these technologies could bring to our lives have been well articulated, but there is a gap between the benefits that are envisioned and the challenges to...
Few studies describe in depth the dynamic aspect of the design process of the business model (BM) construct. This dynamic feature is interrelated with the changes in the environment, and this is specifically true for new ventures in rapidly changing context, who need to adjust their BMs several times to succeed. This research attempts to clarify the mechanisms of BM change during a firm's startup...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.