An Advanced Platform for Collaborative and Mobile Enterprise 2.0
Abstract
Keywords
Full Text:
PDFReferences
Yu Q., Liu X., Bouguettaya A.and Medjahed B. “Deploying and managing Web services: issues, solutions, and directions”. VLDB Journal 17, 3 (May. 2008), pp. 537-572.
Ojeda-Zapata J. (2010). Ipad Means Business: How Apple's Tablet Computer is Changing the Work World. Happy About
Castledine E., Eftos M. and Wheeler M. (2011). Build Mobile Websites and Apps for Smart Devices. (1st ed.). Sitepoint
McAfee , A.P. (2006). “Enterprise 2.0: The Dawn of Emergent Collaboration”. Sloan Management Review, Spring, 47(3), pp. 21-28.
O’Reilly, T. (2005) “What is Web 2.0. Design Patterns and Business Models for the Next Generation of Software”. (2005, September, 30), O’Reilly Media Inc. Available online: http://oreilly.com/web2/archive/what-is-web-20.html.
Cho, Y., I.Im, Hiltz, R., and Fjermestad, J. (2002). An analysis of online customer complaints: implications for web complaint management. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, IEEE, pp. 2308–2317.
Consoli D. (2010a) “Analysis of The Use of Web 2.0 Technology in Small and Medium Companies to Implement an Enterprise 2.0 Model“, Siauliu, Siauliu Universiteto Leidykla Review, 2010, Vol. 20, n.4, pp. 13-20
Tapscott, D, Williams, A. D. (2006). Wikinomics: How Mass Collaboration Changes Everything. Portfolio (Penguin Group) Publisher.
Toffler, A. (1980). The Third Wave. Bantam Books.
Witell L., Kristensson P., Gustafsson A. and Lofgren M. (2011). Idea generation: customer co-creation versus traditional market research techniques. In Journal of Service Management, Vol. 22, no. 2, 2011, pp. 140-159
Strobbe, M., Van Laere, O., Dauwe, S., Dhoedt, B., De Turck, F., Demeester, P., van Nimwegen, Vanattenhoven, J. (2010). Interest based selection of user generated content for rich communication services. J. Netw. Comput. Appl., 33 (2), pp. 84-97.
Sumi, K. (2008). “Anime de Blog: animation CGM for content distribution. In 2008 international Conference on Advances in Computer Entertainment Technology”. ACM, Yokohama, Japan. Vol. 352, pp.187-190
Weinberger D. (2007). Everything is Miscellaneous: The Power of the New Digital Disorder. New York, 2007, pp. 278
Grossman, L. (2006). Time’s Person of the Year: You”. (2006, December 13). Time Magazine. Available: http://www.imli.com/imlog/archivi/001051.html.
Lii, Y. and Sy, E. (2009) Internet differential pricing: Effects on consumer price perception, emotions, and behavioral responses. (May. 2009), Comput. Hum. Behav. Vol. 25 (3), pp. 770-777
Selnes F. (1993). An Examination of the Effect of Product Performance on Brand Reputation, Satisfaction and Loyalty. European Journal of Marketing, Vol. 27 Is. 9, pp.19 – 35
Consoli D. (2011). A Layered Software Architecture for the Management of a Manufacturing Company. In Informatica Economica Journal, Bucharest, Vol. 15, No. 2, pp. 5-15
Li C. and Bernoff J. (2008). Groundswell: Winning in a World Transformed by Social Technologies, Harvard Business Press.
Yan Z. and Zhang P. (2006). Enhancing trust in mobile enterprise networking. In Proceedings of the 5th WSEAS international conference on Applied computer science (ACOS'06), Wenhao Huang, Z. Y. Hu, Q. Z. Chen, and S. Y. Chen (Eds.). World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, pp. 1056-1063
Hoang A.T., Nickerson R.C., Beckman P. and Eng. J. (2008). Telecommuting and corporate culture: Implications for the mobile enterprise. Inf. Knowl. Syst. Manag. 7, 1,2 (April 2008), pp. 77-97
Deitel P.J., Deitel H.M., Deitel A. and Morgano M. (2011). Android for Programmers: An App-Driven Approach (1st ed.). Prentice Hall Press, Upper Saddle River, NJ, USA
Tomlinson A., Yau P-W., and MacDonald J.A. (2010). Privacy threats in a mobile enterprise social network. Inf. Secur. Tech. Rep. 15, 2 (May 2010), 57-66
Sathyan J. and Sadasivan M. (2010). Multi-layered collaborative approach to address enterprise mobile security challenges. In Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy (ISPACT'10), Rivas-Echeverria F. and Mousalli-Kayat G. (Eds.). World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, pp. 47-52
Luo T., Hao H., Du W., Wang Y. and Yin H. (2011). Attacks on WebView in the Android system. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC '11). ACM, New York, NY, USA, pp. 343-352
Chen H-F., Huang H., Jana R., Jim T., Hiltunen M., John S., Jora S., Muthumanickam R. and Wei B. (2003). iMobile EE: an enterprise mobile service platform. Wirel. Netw. 9, 4 (July 2003), pp. 283-297
Brans P.D. and Basole, R.C. (2008). A comparative anatomy of mobile enterprise applications: Towards a framework of software reuse. Inf. Knowl. Syst. Manag. 7, 1,2 (April 2008), pp. 145-158
Srirama S.N. and Jarke M. (2009). Mobile Enterprise A Case Study of Enterprise Service Integration. In Proceedings of the 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST '09). IEEE Computer Society, Washington, DC, USA, pp. 101-107
Dan A., Johnson R.D. and Carrato T. SOA service reuse by design. In Proceedings of the 2nd international Workshop on Systems Development in SOA Environments (Leipzig, May 11 - 11, 2008). SDSOA '08. ACM, New York, NY, 2008, pp. 25-28
Toffetti G., Comai S., Preciado J.C. and Linaje M. (2011). State-of-the Art and trends in the Systematic Development of Rich Internet Applications. J. Web Eng. 10, 1 (March 2011), pp. 70-86
Consoli D. and Musso F. (2010b). A new model of supply chain management in a web service oriented architecture. Brasov, Infomarket Publishing House, 2010, pp. 117 – 120
Sathyan J. and Sadasivan M. (2010). Multi-layered collaborative approach to address enterprise mobile security challenges. In Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy (ISPACT'10), Rivas-Echeverria F. and Mousalli-Kayat G. (Eds.). World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, pp. 47-52
Sun S.-T., Pospisil E., Muslukhov I., Dindar N., Hawkey K., and Beznosov K. (2011). What makes users refuse web single sign-on?: an empirical investigation of OpenID. In Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS '11). ACM, New York, NY, USA, , Article 4, pp. 20
Hay D. (2009). A Survival Guide to Social Media and Web 2.0 Optimization: Strategies, Tactics, and Tools for Succeeding in the Social Web. Dalton Publishing
Muneer S. and Sharma C. (2008). Enterprise mobile product strategy using scenario planning. Inf. Knowl. Syst. Manag. 7, 1,2 (April 2008), pp. 211-224
Unhelkar B. (2009). Mobile Enterprise Transition and Management (1st ed.). Auerbach Publications, Boston, MA, USA
Wang C-Y, Huang H-Y and Hwang R-H (2011). Mobility management in ubiquitous environments. Personal Ubiquitous Comput. 15, 3 (March 2011), pp. 235-251
Perego A. and Catti P.A. (eds).(2009). 4th Report – Mobile & Wireless Business, School of Management – MIP Report
Oh H-Y, Min B-W and Oh Y-S. (2011). An improvement of mobile web interface design optimized for tablet PC environment. In Proceedings of the 5th international conference on Convergence and hybrid information technology (ICHIT'11), Geuk Lee, Daniel Howard, and Dominik Ślęzak (Eds.). Springer-Verlag, Berlin, Heidelberg, pp. 770-777
De Virgilio R., Sugamiele P. and Torlone R. (2009). Incremental aggregation of RFID data. In Proceedings of the 2009 International Database Engineering & Applications Symposium (IDEAS '09). ACM, New York, NY, USA, pp. 194-205
Gunasekaran V. and Harmantzis F.C. (2008). Towards a Wi-Fi ecosystem: Technology integration and emerging service models. Telecommun. Policy 32, pp. 3-4
Bolotnyy L. and Robins G. (2007). Multi-tag RFID systems. Int. J. Internet Protoc. Technol. 2, 3/4 (December 2007), pp. 218-231
López J.M., Pascual A., Masip L., Granollers T., and Cardet X. (2011). Influence of web content management systems in web content accessibility. In Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part IV (INTERACT'11), Pedro Campos, Nuno Nunes, Nicholas Graham, Joaquim Jorge, and Philippe Palanque (Eds.), Vol. Part IV. Springer-Verlag, Berlin, Heidelberg, pp. 548-551
Canfora G., Fasolino A.R., Frattolillo G. and Tramontana P. (2008). A wrapping approach for migrating legacy system interactive functionalities to Service Oriented Architectures. J. Syst. Softw. 81, 4 (April 2008), pp. 463-480
McDaniel E., McCully, M. and Childs R.D. (2007). Becoming a “Sense-and-Respond. Academic and Government Organisation. In The Electronic Journal of Knowledge Management, 5(2), pp. 215-222
Noureddine, A.A. and Damodaran, M. (2008). Security in web 2.0 application development. In Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services (iiWAS '08), Gabriele Kotsis, David Taniar, Eric Pardede, and Ismail Khalil (Eds.). ACM, New York, NY, USA, pp. 681-685.
Cesaroni F.M., Consoli D., Demartini P. (2010c). The use of ICT in manufacturing small firms facing the crisis. In proc. ITAIS 2010. Naples, 8-9 October 2010
Refbacks
- There are currently no refbacks.
Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)