Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 2, 2012 ISSN 2067 – 4074
An Advanced Platform for Collaborative and Mobile Enterprise 2.0 Domenico CONSOLI Department of Economics, Society and Politics University of Urbino Via Saffi n. 2 ITALY
[email protected] https://profiles.google.com/consoli.domenico Abstract: Recently, a new model of Enterprise 2.0, which interacts actively with customers using web 2.0 tools
(chat, forum, blog, wiki, social network) to improve and develop new products/services and to satisfy market requirements, is affirming. The company to communicate with all stakeholders of the supply chain and to exploit all business services of the Information System can use smart and mobile devices. The new model of business, provided of technological tools, is a mobile and collaborative enterprise that interact, exchange and share information with the internal and external social environment. In this paper we describe, in detail, an advanced platform that integrates various tools and applications and supports the new model of business. In this way the enterprise can implement a corporate strategy to reach competitive advantages.
Key-Words: web 2.0, enterprise 2.0, mobile enterprise, collaborative software, web services, SOA.
business applications, their integration with the existing components, the security, the connectivity and the user support. The mobility [1] redefines the context of the company, to experiment with new technologies and solutions and to assign them a greater importance as business tools. These devices transform business networks in global networks and change the work environment in a virtual space [2]. By these new and advanced mobile devices an efficiency organization will be possible. In the paper we describe a collaborative and mobile platform that integrates legacy systems with new web-based tools and business applications [3]. For the success of the implementation of the Enterprise 2.0 model, it is also necessary that the top management and employees have a global vision of the change. The paper presents the following structure: the next section focuses on the new Enterprise 2.0 model. In the third section we analyze the new ICT consumerization phenomenon. In the fourth section we describe an advanced platform to implement a mobile and collaborative Enterprise 2.0. The fifth
1. Introduction In recent years, in the business sector, a new and advanced Enterprise 2.0 model is developing. This model represents an open enterprise that exchanges information with commercial partners and in particular with customers by web 2.0 tools (chat, forum, blog, wiki, social media) to improve the product/service. Web 2.0 tools, before, were used only in a private sphere and not for business goals. Nowadays many websites of companies have their pages on Facebook, videos on YouTube and use business communities to exchange and share information with customers. Even mobile devices enhance the new business model of Enterprise 2.0, focused on collaboration and information sharing. Within the company it feels the need to integrate these mobile devices to use services and corporate information assets. The internal IT department must adopt the most effective strategy to preserve benefits and advantages also in a mobility context. The corporate ICT plan must consider all aspects affecting the mobility, the introduction of new devices and new 121
www.jmeds.eu
and sixth sections focus on technical features and benefits/limits of the platform. Finally some conclusions is drawn
enterprise shows a strong attention to his/her needs and identity. The knowledge sharing, the collaboration and the development of social networks, inside and outside the company, are very important factors for the success of the enterprise. In fact the key features of an enterprise 2.0 are: sharing, collaboration, interactivity and agility. An Enterprise 2.0 presents an architecture bottom up and uses a peerto-peer communication while in a traditional enterprise (Enterprise 1.0) the architecture is top-down and the communication is hierarchical. In the Enterprise 2.0, the customer is a central figure and he/she is involved in all processes: conception, design, development, testing, marketing, buying and so on. A customer more involved in the production process helps the company to find and eliminate errors/defects for improving the final product/service. The Enterprise 2.0 model can be interpreted as a new way of doing business, a participative business where the company and the customer work together (co-operate, co-create, coproduce) [8] to improve the final product/service. A collaboration between companies and customers, in a context of co-creation and co-production, stimulates the realization of the figure of the prosumer (producer and consumer at the same time) [9]. The consumer is becoming a co-creator of value [10] while in the past he/she was a passive responder to market supply. Nowadays, the customer, really, has an active role as prosumer. In IKEA, the customer participates in the logistical and productive processes by transporting and mounting, individually, the furniture at home. The Mulino Bianco is available to listen any proposal of new biscuits. Ideas can be proposed and voted; the best one will be realized. In the website "Fiat 500" (500 Wants You - www.fiat500.com) any consumer contributed creatively to the design of the new car. In the case of the canadian manufacturer John Fluevog, customers
2. Enterprise 2.0 model The new model of Enterpise 2.0 (Figure 1) is an open enterprise that, for business goals, exchanges and shares information with all stakeholders (customers, suppliers, sponsors, partners). Enterprise 2.0 [4] is the use of emergent social software platforms within companies, or between companies and their partners or customers.
Figure 1. Enterprise 2.0 model. Source:own. The Enterprise 2.0 introduces strong impacts in the organization and in Information Systems. This enterprise uses intensely web 2.0 tools (that before were generally used only in a private manner and not for business goals. In the web 2.0 [5] we can take in consideration two aspects: technological and social. The social aspect is relative to people that interact and exchange information and the technological aspect is relative to digital tools used. The Web 2.0 is a network of people and not of machines. The technology surely is the trigger but the people are the real core of this evolution. Every day, people exchange and share experiences, opinions, photos and video. There are a lot of websites that collect and make available customer reviews: epinions.com, ciao.it, complaints.com, planetfeedback.com, ecomplaints.com, dooyoo.it, cnet.com. [6]. To capitalize customers opinions is very important for an enterprise, both for the improvement of products and for the reinforcement of the customer loyalty [7]. The customer will be motivated to be loyal if the 122
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 2, 2012 ISSN 2067 – 4074 participate actively and creatively desinging new models of shoes. The Web 2.0 also leads to a revolution in the content generation. Until few years ago, users read only, in a passive modality while now they can create contents and movies, express opinions and give advices becoming UserGenerated Content [11] or Consumer Generated Content [12]. In the web, the contents’ production is no longer the prerogative of media centers and press but everyone, by web 2.0 tools, can participate in the discussion and produce contents by simple platforms like Flickr, YouTube, Second Life, Facebook, Wikipedia. In the era of Web 2.0 there is no clear boundary between who produces and who consumes contents; everything is indefinite, "everything is miscellaneous" [13]. To emphasize the role of users [14] in Time magazine affirmed that “Person of the year are you: For seizing the reins of the global media, for founding and framing the new digital democracy, for working for nothing and beating the pros at their own game”. The primary goal of the enterprise is not to sell directly but to gain more brand-reputation and brandengagement, following a continuous and fruitful relationship with customers. The brand engagement describes the process of attachment (emotional and rational) between people and the brand [15]. The reputation and customer loyalty are useful to create brand affinity toward an enterprise [16] but these require not only investment but mainly time to build a lasting relationship. The main differences between an Enterprise 2.0 and an Enterprise 1.0 (traditional enterprise) are summarized in Table 1.
Contents reading Structured Sharing Competition Tecnology-driven Top Down Content publishing Contacts Copyright Database Owner Stationary Hierarchy Scheduled Product-oriented
Contents generation Unstructured Participation Collaboration User-driven Bottom up Content delivery Relationships Sharing Ontology Open Mobility Network On demand Customer-oriented
3. Enterprise 2.0 and IT consumerization The orientation towards the principles of the organization 2.0 stimulates the introduction and application of new interactive tools 2.0. These tools contribute significantly to strengthen and promote innovative organizational behaviors that are based mainly on participation, collaboration and sharing of information. The collaborative and adaptive decision making stimulates the development of an Information System 2.0 configurable and flexible around people and digital devices used in everyday life. The logic of governance of the Enterprise 2.0 [17] must be bottom up and not based on traditional hierarchical topdown mechanisms. The building blocks of Governance 2.0, must be based on a coherent and communicative leadership that spreads enthusiasm. All employees must have the access to corporate information, the possibility to develop social relationships for a positive comparison and mutual influence that lead to the realization of new practices. Furthermore, people are urged to share top-level decisions and take responsibility for their own initiatives. In the private life, daily, it grows the desire to communicate and collaborate. The market always pushes towards the
Table 1. Enterprise 2.0 vs Enterprise 1.0. Enterprise 1.0 Enterprise 2.0 Rigid/centralized Flexible/distribute d HTML/CMS Ajax Functions Services oriented oriented Unidirectional Bidirectional 123
www.jmeds.eu
consumerization of IT tools (smartphone and social networks). We must bring, in the company, tools and applications that are used in the private sphere. People feel the need to use in the work what they use in the private life regarding technological and social aspects. Companies must understand that allowing to employees to use their mobile devices (tablets, smartphones, laptops, etc.) [1] for business purposes, it increases the productivity and improves the results. This consideration outlines a framework of integration from below, from the desire of employees to work in a more easy and convenient modality. In the future there will be a cultural change, a long wave [18] which involves not only senior managers but also employees, who can use their devices to manage corporate information assets in a context of mobile enterprise [19][20]. Since 2010, the Gartner report (www.gartner.com) announced that the consumerization of IT in the company would have been the trend for the next 10 years. Recognising the benefits, companies are investing in adopting the BYOD (Bring Your Own Device) policy, with the aim to meet the needs of employees and others. This action increases the productivity, employees are happy, and the access to information and the internal collaboration will improve. The Cisco report's "Connected World" (www.cisco.com) of 2010, already showed the dissatisfaction of the employees of obsolete access policies: the 63% of Italian employees suggested updated policies, finding a compromise between the use of devices, social media, mobile and the working flexibility; the 22% of people declared to be ready for violating the rules of business just to satisfy the growing demands of communication and to work better. Companies need to switch to a type of "security as a service". Using rules that everyone could not follow it is dangerous. It is much better to create a sort of white list of approved applications to provide employees with
secure tools. For employees working remotely, it is necessary to use a strong authentication process, valid independently of the device. The Apple model (www.apple.com) suggests to keep users free within an operating area. Users applying the model of Consumerization IT operate, in an implicit way, for the best security (being their own terminals), with a selfawareness that, in standard working conditions, it is more difficult to have. Howeer, this spreading of a real time collaboration requires specific tools and applications [3][21] to support the business in this area in a full security context [22][23][24]. Inside the companies, people should be able to use their devices to manage corporate information assets to have the mobile access to a series of business processes. The implementation of a mobile Enterprise 2.0 [25][26] brings to company advantages such as the increased staff productivity, best performances, effectiveness of processes, a greater control of products movement and a greater customer loyalty. For all these goals it is important to use an integrated platform that enhances the collaborative and mobile aspects of the Enterprise 2.0. [27].
4. A platform for a Collaborative and Mobile Enterprise 2.0 At the moment the adoption of web 2.0 tools (chat, forums, blogs) and mobile devices inside the company, presents a relatively low impact on business Information Systems with some problems of integration. In this section, we describe an advanced platform (Figure 2) to integrate, inside the company, new web 2.0 tools, smart mobile devices with legacy software (ERP, SCM, CRM, CAD/CAM).
124
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 2, 2012 ISSN 2067 – 4074 The application layer is a set of software applications that supports different functions and business processes. All applications could be transformed in services. The collaborative layer includes the software that interacts with the external environment and in particular with all stakeholders: customers, suppliers, partners. The Service Oriented Architecture (SOA) [28] allows to switch from monolithic systems to systems based on different components able to provide single services that can be used from more applications. A service could be an online order or the monitoring/traceability of a product from the magazine to the final customer. Services can be executed at interactive (controlled by users) or batch (controlled by process) level. Services can be published thanks to remote Web Services (WS) [1] [17] in a cloud modality according the paradigm of software-as-a-service (SaaS). The service can be invoked by browser using Rich Internet Application (RIA) interfaces [29]. Services can be reused, modified or combined (mash-up) to create new ones for satisfying workload changes and the applications trend. The service provided by Web Services is described with a Web Services Description Language (WSDL) document and published into an Universal Description Discovery and Integration (UDDI) repository. For example a business process requires a service (Service Request) to Web Services. The Web Service, found the service in the UDDI register responds and activates a Service Delivery [30].
Figure 2. Platform of collaborative and mobile Enterprise 2.0. Source: own. All different components of the Figure 2 can be grouped into 6 main services: Working context or infrastructure (SOA/WS/RIA); Security (Access and Security); Basis (Personal Workspace & Social Media); Collaborative Mobile Contents (CMC); Integration (CCS&LSI interface with Legacy Software); Database (Integrated Datawarehouse).
4.1. The logic infrastructure of the Enterprise 2.0 The logic infrastructure of the Enterprise 2.0 is shown in Figure 3 [17].
4.2. Security service Figure 3. Logic infrastructure of Enterprise 2.0. Source: own.
This module contains the applications that control the access to different services of the platform. The security policies protect the confidentiality, integrity and availability of information [31]. These procedures authenticate users to safeguard the legal exchange of information.
The digital layer includes PCs, wifi/wired networks, operating systems and also mobile devices. Architecture layer is an open and flexible substrate based on Service Oriented Architecture (SOA). 125
www.jmeds.eu
All applications must comply with common security requirements and service levels necessary for the proper functioning of business processes. The security service includes different tasks: definition of users and groups to structure hierarchically all users of the platform; definition of roles and privileges to define, in detail, hierarchical permissions on contents; management of the Single Sign-On (SoS) [32], an unique identification for allowing to users to authenticate once and gain access to all permitted information resources. Some guidelines to create secure web applications are: divide applications in components and each component must be armoured; control privileges allowed to users for the access to different functions of single components; management of user session, maintenance, opening and closing to protect the id session and the simultaneous presence of the same user in different multiple sessions; management of the log file for tracking sessions, user behavior and the communication between components.
contact management to manage internal and external contacts context discussions for sharing comments and consultations on specific contents; ratings and comments to allow additional modalities of participation around specific contributions; search engine to find useful information; tagging to facilitate the classification of information (content, documents, articles, etc..). reporting to monitor the use of services.
4.4. Collaborative – Mobile – Contents (CMC) services This multiple-service can be split in 3 services. 4.4.1 Collaborative service A collaborative service contains Web 2.0 tools for the communication and collaboration [33] among internal and external subjects, for sharing know-how and user-experience. The main components are the followings: Wiki: to collaborate and share knowledge; Blog: to publish contents on the web space; Chat: for instant interactions among system users; Forum: to exchange views on topics and discussions; Social Network: for information exchange with profiled users and groups; Tagging: for the knowledge classification; FAQ: to classify the answers to specific questions; Polls: to consult the opinions of users Votes and Comments: to evaluate work and reviews; Syndication: to subscribe and update some news..
4.3. Basis Service The platform should contain interactive tools for the login, profile customization, context menu, search engines. The main components of the basis service are the followings: management of the own profile to customize personal home page as a container for widgets and RSS feeds dashboard to monitor personal activities; tools to support multichannel audio, video, mobile devices; calendar and agenda shared with other users of the platform with the possibility to create and share events, meetings and planned activities;
4.4.2 Mobile service In setting a mobile strategy [34] it is important to think about the mobility solutions to implement and therefore to 126
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 2, 2012 ISSN 2067 – 4074 the management of these activities (mobility management). In terms of mobility management [35] [36], we must consider the following steps [37]: Management of the infrastructure: laptop, tablet, smartphones and industrial terminals; Management of mobile applications: middleware, mobile applications (apps) and delivery; Management of enterprise mobility: management of people, resources, processes and connectivity (gprs, cdma, wifi, rfid, wimax). Carriers that offer connectivity are mobile operators and wireless internet service provider (WISP). An important factor to consider in the mobility management is how mobile applications (apps) impact on business organization and information systems [37] (Figure 4). How we can see from the Figure 4, Business Intelligence (BI) and apps 2.0 have a strong impact both on organization and Information System (IS).
must increase their capacity to develop and optimize the mobility [38] to operate, collaborate and decide more quickly with all partners of the value chain. In a scenario in continuous and rapid technological evolution it is important the development of the Infomobility. In the future, regarding the connectivity wireless, QR code and RFID technologies [39] seem destined to pervade the entire value chain of any organization. The Wireless Fidelity (Wi-Fi) [40] uses the IEEE Standard 802.11 and by a router, it is possible to connect the devices to an ISP network. The Worldwide Interoperability for Microwave Access (WiMax) is a technology that enables a wireless access to a broadband communication network like the Broadband Wireless Access (BWA). Code Division Multiple Access (CDMA) is a protocol for a multiple access in wireless networks. The Radio Frequency IDentification (RFID) is a technology based on radio frequency. The data trasmission of RF code, in wireless modality, occurs when a tag (microchip), attached on product and connected to its own antenna, is syncronized and coupled with the frequency of an electromagnetic field generated by an electronic device (reader). RFID technology is very important to speed up loadingunloading, goods delivery and to localize vehicles and drivers. The data is transmitted according to the standard Electronic Product Code (EPC) and processed by a centralized information system. From the operations center, via the Internet Protocol (IP), it is possible to know all movements of mobile units and associate data to transported goods. Even in the traditional Enterprise 1.0, there were mobile activities: the movement of the inventory, outbound logistics, remote maintenance and direct supervision of customers. In terms of business processes an important and strategic mobility activity is the delivery of products to various customers and the tracking of this service which allows, at any moment, to
Figure 4. Impacts of apps on IS and Organization. Source: Perego and Catti, 2009 (adapted by author). Unified Communication (UC), analog and digital communication over IP, has a low impact on Information System and high in the organization; inside a company the communication is very important. The applications of Customer Relationship Management (CRM) and Supply Chain Management (SCM) have a strong impact in IS and not in organization and, at the end, the Sales Force Automation (SFA) has a low impact both in IS and organization. In the globalized economy and increasingly mobile society, companies 127
www.jmeds.eu
see the current position of the product and if it was delivered [30]. All products and means of transport are provided with RFID/GIS tags [41]. The service requests and their deliveries are implemented via web services. This model is supported by a web-based Information System that provides, in real-time, information on products. To implement the planning of distribution routes a Geographic Information System (GIS) can be used. In this way we can provide the best routing plan and new scenarios depending on the timing, cost, locations, etc… The system manages all means of transport, combinations of locations and deliveries. The control of the logistic fleet can be executed also with other technologies [40]: Wi-Fi, Global Positioning System (GPS) and General Packet Radio Service (GPRS). The efficient management of fleets is also useful to reduce consumption, emissions, minimize operating costs and to increase the sustainability. The Information System coordinates all stakeholders and uses web collaborative tools to enable the interactive exchange of information, the planning and the execution of activities in the supply chain. The sensor network that monitors the operations in real time, plays a crucial role to improve processes, infrastructure and information flows.
4.5. Integration service The platform must be able to integrate digital interactive systems with legacy ones. A level of integration it becomes essential to ensure uniformity and harmonization of different services. The integration will be among different heterogeneous information sources. We remember that main legacy systems are: Enterprise Resource Planning (ERP) Supply Chain Management (SCM) Customer Relationship Management (CRM) Computer Aided Design (CAD), Computer Aided Manufacturing (CAM), Computer Aided Engineering (CAE) Product Lifecycle Management (PLM) To integrate and link together legacy and collaborative systems it is necessary an interface named Collaborative Contents Software & Legacy System Integration (CCS&LSI). This integration is designed to share information and documents among different applications. In this way, the available knowledge, inside the organization, will increase and therefore will be possible to discover new business opportunities. Companies that decide to transfer on the web (part of) their applications and transactions must transform software applications in services. Actually, many companies convert their legacy systems and develop applications to share with different stakeholders a part of the business process. In this way the full development of standardized and reusable components is implemented. To transform a legacy application in a web service, it is necessary to use appropriate wrappers [43] which add useful information to the old code in order to expose it as a service, easily accessible by browser.
4.4.3 Contents service This service is used to manage, publish, distribute and search information and contents in the whole platform. Main components are: Content Management System (CMS) [42]: for managing unstructured contents as web pages Document Management System (DMS): for managing and sharing files among users of the platform Contents Search: for searching all contents available in the platform Opinion mining: to extract the polarity of opinions: negative, positive, neutral. For the the Opinion mining process we can use statistical or semantic algorithms.
4.6. Database Service Data of the platform is stored in an Integrated DataWarehouse. This database contains exchanged data by legacy and collaborative systems and 128
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 2, 2012 ISSN 2067 – 4074 therefore both structured and unstructured information. All different components and services (e.g. security, collaborative, contents,…) of the platform save and read data from this database.
Business Process Management. The Business Intelligence is important for decision support systems and therefore to analyse collected data for forecasting future events. To this end it is important the Knowledge Acquisition and the representation of structured knowledge in specific ontologies that describes data and relationships for a correct knowledge representation. The extraction of useful information can be done by extraction techniques that use specific wrappers and intelligent software agents.
5. Technical features of the platform 2.0 The main goals of the platform are: implementing interactive channels among managers, employees and external actors to improve business processes, the integration between legacy and new interactive tools and the management of smart mobile devices. Technically it is important that the platform meets the following basic requirements: multi-database: to implement the platform on a database like Oracle, MySQL, SQL Server, PostgreSQL, DB2, Firebird, Sybase databases multi-platform: the solution should preferably be installed on Microsoft, Linux, MacOSX, Windows Mobile, Palm OS, Symbian, Android scalability: to distribute the platform load caching: to improve performances of web applications multiserver: implementation in web servers like Apache/Tomcat, IIS, WebSphere Application The platform presents also the following technological components: Software Development Kit (SDK), an API-based access to the platform in Java, .Net, etc… An Integrated Development Environment (IDE) to develop software applications Directory Services, for the interface with systems such as Open LDAP and Active Directory enabling the sharing of users, groups, roles and permissions Mail server, to interface with the most common e-mail protocols: SMTP, POP3, IMAP, EMS, MMS, WAP. Regarding business performances it is important that the platform is also able to process information for Knowledge Management, Business Intelligence and
6. Benefits and limits of the platform 2.0 Enterprise 2.0 technologies improve the collaboration and cooperation with all stakeholders and stimulate the productivity enabling people to participate in business processes. Firstly, inside the company, Information Systems were more oriented to the processes than people; now employees use productivity tools more individualoriented. The platform 2.0 improves also the user experience. The user, inside the organization, assumes a central role with his/her ability to cooperate, create and generate value through relationships in social networks. All interactions among users are important as contents and the user experience becomes more rich and complete. Internal systems and services match with the needs of the business productivity and the habits, relationships and interactions among employees. Appreciating the experience that the user can live with business tools it means to design an enterprise system that takes in account the continuity of user experience. Designing the user experience in Enterprise 2.0 means provide to users the facility of exploiting all necessary resources and tools in relation to their needs and experiences like smartphones, tablets and social networks. The wrong decisions are often caused from a poor use of employees’skills and missed innovation opportunities for incorrect policies of communication. The 129
www.jmeds.eu
collaboration between employees in the right working environment is fundamental to the business success. The use of collaboration and mobile tools in a social context can improve the time to market and the positioning of the enterprise regarding competitors. In this way the company becomes more agile in answering to market requirements [44]. Inside the company, there is a fear for data privacy and internal security [24]. The Security Officer should certainly reduce the risk that the social network is used improperly; internal rules on the use of the Web are necessary [45]. Firstly it is important to create clear rules that clearly indicate which behaviors are tolerated, those to avoid and the required checks. Posting sensitive contents on social networks, such as technical information, potentially can cause problems to the reputation and the intellectual property. Being alert to malware intrusion like contents, hyperlinks, files or applications that link to malicious contents that, once executed can compromise the security of the entire network. Data owned of the company should only be treated in a controlled environment according to defined policies. Other limitations are due to the entrepreneurs/managers who not use the platform 2.0 because they are afraid of the customer opinions and suggestions and of the word of mouth (WOM) [46] which may affect the company's online reputation. Furthermore, some managers is afraid to stimulate a peer-to-peer and nonhierarchical communication because in this way, they lose the power in the corporate management.
company, it is important the implementation of a technological collaborative and mobile platform that integrates new and legacy systems. In this way the Enterprise Information System is more complete and can process both structured and unstructured data coming from online contents. The platform 2.0 works in a SOA environment where all functions that support the business can be used as services. These services reside on web servers and can be read, used and combined to support new processes. In this context the enterprise becomes more agile in answering to market requirements and in improving the customer satisfaction. The Enterprise 2.0 is a social and participative model based on collaboration and participation of web 2.0 tools. These interactive tools have facilitated a great revolution in the information sharing among users. The future web 3.0 will be useful to understand the semantics, that is the meaning of words. The semantic algorithms allow the exchange of information and data among computers. Enterprise 2.0 is the open company of people who work in the supply chain while the Enterprise 3.0 will be the technological company of the machines where it will be easier to find useful documents and to support the automated reasoning of computers in the decision making.
References [1] Yu Q., Liu X., Bouguettaya A.and Medjahed B. “Deploying and managing Web services: issues, solutions, and directions”. VLDB Journal 17, 3 (May. 2008), pp. 537572. [2] Ojeda-Zapata J. (2010). Ipad Means Business: How Apple's Tablet Computer is Changing the Work World. Happy About [3] Castledine E., Eftos M. and Wheeler M. (2011). Build Mobile Websites and Apps for Smart Devices. (1st ed.). Sitepoint [4] McAfee , A.P. (2006). “Enterprise 2.0: The Dawn of Emergent
7. Conclusions Nowadays, in the knowledge era, by the new business model of Enterprise 2.0, the company can acquire competitive advantages. The company interacting with customers can improve the product/service. The bidirectional communication, enterprise-customers, is supported by web 2.0 tools and by smart and mobile devices. Inside the 130
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 2, 2012 ISSN 2067 – 4074 Collaboration”. Sloan Management Review, Spring, 47(3), pp. 21-28. [5] O’Reilly, T. (2005) “What is Web 2.0. Design Patterns and Business Models for the Next Generation of Software”. (2005, September, 30), O’Reilly Media Inc. Available online: http://oreilly.com/web2/archive/wha t-is-web-20.html. [6] Cho, Y., I.Im, Hiltz, R., and Fjermestad, J. (2002). An analysis of online customer complaints: implications for web complaint management. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, IEEE, pp. 2308–2317. [7] Consoli D. (2010a) “Analysis of The Use of Web 2.0 Technology in Small and Medium Companies to Implement an Enterprise 2.0 Model“, Siauliu, Siauliu Universiteto Leidykla Review, 2010, Vol. 20, n.4, pp. 1320 [8] Tapscott, D, Williams, A. D. (2006). Wikinomics: How Mass Collaboration Changes Everything. Portfolio (Penguin Group) Publisher. [9] Toffler, A. (1980). The Third Wave. Bantam Books. [10] Witell L., Kristensson P., Gustafsson A. and Lofgren M. (2011). Idea generation: customer co-creation versus traditional market research techniques. In Journal of Service Management, Vol. 22, no. 2, 2011, pp. 140-159 [11] Strobbe, M., Van Laere, O., Dauwe, S., Dhoedt, B., De Turck, F., Demeester, P., van Nimwegen, Vanattenhoven, J. (2010). Interest based selection of user generated content for rich communication services. J. Netw. Comput. Appl., 33 (2), pp. 84-97. [12] Sumi, K. (2008). “Anime de Blog: animation CGM for content distribution. In 2008 international Conference on Advances in Computer Entertainment Technology”. ACM, Yokohama, Japan. Vol. 352, pp.187190 [13] Weinberger D. (2007). Everything is Miscellaneous: The Power of the New Digital Disorder. New York, 2007, pp. 278
[14] Grossman, L. (2006). Time’s Person of the Year: You”. (2006, December 13). Time Magazine. Available: http://www.imli.com/imlog/archivi/0 01051.html. [15] Lii, Y. and Sy, E. (2009) Internet differential pricing: Effects on consumer price perception, emotions, and behavioral responses. (May. 2009), Comput. Hum. Behav. Vol. 25 (3), pp. 770-777 [16] Selnes F. (1993). An Examination of the Effect of Product Performance on Brand Reputation, Satisfaction and Loyalty. European Journal of Marketing, Vol. 27 Is. 9, pp.19 – 35 [17] Consoli D. (2011). A Layered Software Architecture for the Management of a Manufacturing Company. In Informatica Economica Journal, Bucharest, Vol. 15, No. 2, pp. 5-15 [18] Li C. and Bernoff J. (2008). Groundswell: Winning in a World Transformed by Social Technologies, Harvard Business Press. [19] Yan Z. and Zhang P. (2006). Enhancing trust in mobile enterprise networking. In Proceedings of the 5th WSEAS international conference on Applied computer science (ACOS'06), Wenhao Huang, Z. Y. Hu, Q. Z. Chen, and S. Y. Chen (Eds.). World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, pp. 1056-1063 [20] Hoang A.T., Nickerson R.C., Beckman P. and Eng. J. (2008). Telecommuting and corporate culture: Implications for the mobile enterprise. Inf. Knowl. Syst. Manag. 7, 1,2 (April 2008), pp. 77-97 [21] Deitel P.J., Deitel H.M., Deitel A. and Morgano M. (2011). Android for Programmers: An App-Driven Approach (1st ed.). Prentice Hall Press, Upper Saddle River, NJ, USA [22] Tomlinson A., Yau P-W., and MacDonald J.A. (2010). Privacy threats in a mobile enterprise social network. Inf. Secur. Tech. Rep. 15, 2 (May 2010), 57-66 [23] Sathyan J. and Sadasivan M. (2010). Multi-layered collaborative 131
www.jmeds.eu
approach to address enterprise mobile security challenges. In Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy (ISPACT'10), RivasEcheverria F. and Mousalli-Kayat G. (Eds.). World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, pp. 47-52 [24] Luo T., Hao H., Du W., Wang Y. and Yin H. (2011). Attacks on WebView in the Android system. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC '11). ACM, New York, NY, USA, pp. 343-352 [25] Chen H-F., Huang H., Jana R., Jim T., Hiltunen M., John S., Jora S., Muthumanickam R. and Wei B. (2003). iMobile EE: an enterprise mobile service platform. Wirel. Netw. 9, 4 (July 2003), pp. 283-297 [26] Brans P.D. and Basole, R.C. (2008). A comparative anatomy of mobile enterprise applications: Towards a framework of software reuse. Inf. Knowl. Syst. Manag. 7, 1,2 (April 2008), pp. 145-158 [27] Srirama S.N. and Jarke M. (2009). Mobile Enterprise A Case Study of Enterprise Service Integration. In Proceedings of the 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST '09). IEEE Computer Society, Washington, DC, USA, pp. 101-107 [28] Dan A., Johnson R.D. and Carrato T. SOA service reuse by design. In Proceedings of the 2nd international Workshop on Systems Development in SOA Environments (Leipzig, May 11 - 11, 2008). SDSOA '08. ACM, New York, NY, 2008, pp. 25-28 [29] Toffetti G., Comai S., Preciado J.C. and Linaje M. (2011). State-ofthe Art and trends in the Systematic Development of Rich Internet Applications. J. Web Eng. 10, 1 (March 2011), pp. 70-86 [30] Consoli D. and Musso F. (2010b). A new model of supply chain
management in a web service oriented architecture. Brasov, Infomarket Publishing House, 2010, pp. 117 – 120 [31] Sathyan J. and Sadasivan M. (2010). Multi-layered collaborative approach to address enterprise mobile security challenges. In Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy (ISPACT'10), RivasEcheverria F. and Mousalli-Kayat G. (Eds.). World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, pp. 47-52 [32] Sun S.-T., Pospisil E., Muslukhov I., Dindar N., Hawkey K., and Beznosov K. (2011). What makes users refuse web single sign-on?: an empirical investigation of OpenID. In Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS '11). ACM, New York, NY, USA, , Article 4, pp. 20 [33] Hay D. (2009). A Survival Guide to Social Media and Web 2.0 Optimization: Strategies, Tactics, and Tools for Succeeding in the Social Web. Dalton Publishing [34] Muneer S. and Sharma C. (2008). Enterprise mobile product strategy using scenario planning. Inf. Knowl. Syst. Manag. 7, 1,2 (April 2008), pp. 211-224 [35] Unhelkar B. (2009). Mobile Enterprise Transition and Management (1st ed.). Auerbach Publications, Boston, MA, USA [36] Wang C-Y, Huang H-Y and Hwang R-H (2011). Mobility management in ubiquitous environments. Personal Ubiquitous Comput. 15, 3 (March 2011), pp. 235-251 [37] Perego A. and Catti P.A. (eds).(2009). 4th Report – Mobile & Wireless Business, School of Management – MIP Report [38] Oh H-Y, Min B-W and Oh Y-S. (2011). An improvement of mobile web interface design optimized for tablet PC environment. In Proceedings of the 5th international conference on Convergence and 132
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 2, 2012 ISSN 2067 – 4074 hybrid information technology (ICHIT'11), Geuk Lee, Daniel Howard, and Dominik Ślęzak (Eds.). Springer-Verlag, Berlin, Heidelberg, pp. 770-777 [39] De Virgilio R., Sugamiele P. and Torlone R. (2009). Incremental aggregation of RFID data. In Proceedings of the 2009 International Database Engineering & Applications Symposium (IDEAS '09). ACM, New York, NY, USA, pp. 194205 [40] Gunasekaran V. and Harmantzis F.C. (2008). Towards a Wi-Fi ecosystem: Technology integration and emerging service models. Telecommun. Policy 32, pp. 3-4 [41] Bolotnyy L. and Robins G. (2007). Multi-tag RFID systems. Int. J. Internet Protoc. Technol. 2, 3/4 (December 2007), pp. 218-231 [42] López J.M., Pascual A., Masip L., Granollers T., and Cardet X. (2011). Influence of web content management systems in web content accessibility. In Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction Volume Part IV (INTERACT'11), Pedro Campos, Nuno Nunes, Nicholas Graham, Joaquim Jorge, and Philippe Palanque (Eds.),
Vol. Part IV. Springer-Verlag, Berlin, Heidelberg, pp. 548-551 [43] Canfora G., Fasolino A.R., Frattolillo G. and Tramontana P. (2008). A wrapping approach for migrating legacy system interactive functionalities to Service Oriented Architectures. J. Syst. Softw. 81, 4 (April 2008), pp. 463-480 [44] McDaniel E., McCully, M. and Childs R.D. (2007). Becoming a “Sense-and-Respond. Academic and Government Organisation. In The Electronic Journal of Knowledge Management, 5(2), pp. 215-222 [45] Noureddine, A.A. and Damodaran, M. (2008). Security in web 2.0 application development. In Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services (iiWAS '08), Gabriele Kotsis, David Taniar, Eric Pardede, and Ismail Khalil (Eds.). ACM, New York, NY, USA, pp. 681685. [46] Cesaroni F.M., Consoli D., Demartini P. (2010c). The use of ICT in manufacturing small firms facing the crisis. In proc. ITAIS 2010. Naples, 8-9 October 2010
133