题名

A Mobile Computing Technology Foresight Study with Scenario Planning Approach

DOI

10.7903/ijecs.1242

作者

Wei-Hsiu Weng;Woo-Tsong Lin

关键词

Mobile Computing ; Scenario Analysis ; Technology Foresight ; Strategy

期刊名称

International Journal of Electronic Commerce Studies

卷期/出版年月

6卷2期(2015 / 12 / 01)

页次

223 - 231

内容语文

英文

英文摘要

Although the importance of mobile computing is gradually being recognized, mobile computing technology development and adoption have not been clearly realized. This paper focuses on the technology planning strategy for organizations that have an interest in developing or adopting mobile computing technology. By using scenario analysis, a technology planning strategy is constructed. In this study, thirty mobile computing technologies are classified into six groups, and the importance and risk factors of these technologies are then evaluated under two possible scenarios. The main research findings include the discovery that most mobile computing software technologies are rated high to medium in importance and low risk in both scenarios, and that scenario changes will have less impact on mobile computing devices and on mobile computing software technologies. These results provide a reference for organizations interested in developing or adopting mobile computing technology.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 經濟學
社會科學 > 財金及會計學
社會科學 > 管理學
参考文献
  1. Atzori, L.,Iera, A.,Morabito, G.(2010).The Internet of Things: A survey.Computer Networks,54(15),2787-2805.
  2. Bouwman, H.,Dihal, S.,de Reuver, M.,Warnier, M.,Carlsson, C.(2013).Mobile cloud computing: State of the art and outlook.info,15(1),4-16.
  3. Chana, M.,Estèvea, D.,Fourniolsa, J.Y.,Escribaa, C.,Campoa, E.(2012).Smart wearable systems: Current status and future challenges.Artificial Intelligence in Medicine,56(3),137-156.
  4. Gueguen, G.,Isckia, T.(2011).The borders of mobile handset ecosystems: Is coopetition inevitable?.Telematics and Informatics,28(1),5-11.
  5. Hancke, G.P.,Markantonakis, K.,Mayes, K.E.(2010).Security challenges for user-oriented RFID applications within the “Internet of things”.Journal of Internet Technology,11(3),307-313.
  6. Holzer, A.,Ondrus, J.(2011).Mobile application market: A developer’s perspective.Telematics and Informatics,28(1),22-31.
  7. Ilie-Zudor, E.,Kemény, Z.,van Blommestein, F.,Monostori, L.,van der Meulen, A.(2011).A survey of applications and requirements of unique identification systems and RFID techniques.Computers in Industry,62(3),227-252.
  8. Kim, H.,Feamster, N.(2013).Improving network management with Software Defined Networking.IEEE Communications Magazine,51(2),114-119.
  9. Leong, L.Y.,Hew, T.S.,Tan, G.W.H.,Ooi, K.B.(2013).Predicting the determinants of the NFC-enabled mobile credit card acceptance: A neural networks approach.Expert Systems with Applications,40(14),5604-5620.
  10. Lerche, C.,Hartke, K.,Kovatsch, M..Industry adoption of the Internet of Things: A constrained application protocol survey.International Conference on Emerging Technologies & Factory Automation,Krakow, Poland:
  11. Mietzner, D.,Reger, G.(2005).Advantages and disadvantages of scenario approaches for strategic foresight.International Journal of Technology Intelligence and Planning,1(2),220-239.
  12. Mills, L.A.,Knezek, G.,Khaddage, F.(2014).Information seeking, information sharing, and going mobile: Three bridges to informal learning.Computers in Human Behavior,32,324-334.
  13. Ngai, E.W.T.,Moon, K.K.L.,Riggins, F.J.,Yi, C.Y.(2008).RFID research: An academic literature review (1995-2005) and future research directions.International Journal Production Economics,112(2),510-520.
  14. Piran, M.J.,Murthy, G.R.,Babu, G.P.(2011).Vehicular ad hoc and sensor networks principles and challenges.International Journal of Ad hoc, Sensor & Ubiquitous Computing,2(2),38-49.
  15. Sengupta, S.(2013).An approach to provide a network layer security model with QR code generated with shuffled GPS parameters as embedded keys traveling over Internet using existing IPv4 mechanism.Computer Networks,57(11),2313-2330.
  16. Serrano, N.,Hernantes, J.,Gallardo, G.(2013).Mobile Web Apps.IEEE Software,30(5),22-27.
  17. Shin, S.,Kim, K.,Kim, K.-H.,Yeh, H.(2012).A remote user authentication scheme with anonymity for mobile devices.International Journal of Advanced Robotic Systems,9,1-8.
  18. Smajda, J.(2011).Open source and the moral field of computing.Journal of Information Technology & Politics,8(3),304-322.
  19. SRI(1996).SRI, Integrated Technology Planning. SRI International Report, Menlo Park, California, 1996..
  20. Subashini, S.,Kavitha, V.(2011).A survey on security issues in service delivery models of cloud computing.Journal of Network and Computer Applications,34(1),1-11.
  21. Tan, G.W.H.,Ooi, K.B.,Chong, S.C.,Hew, T.S.(2014).NFC mobile credit card: The next frontier of mobile payment?.Telematics and Informatics,31(2),292-307.
  22. Villanueva, F.J.,Villa, D.,Moya, F.,Santofimia, M.J.,Lopez, J.C..Internet of things architecture for an RFID-based product tracking business model.International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,Palermo, Italy:
  23. Watson, C.,McCarthy, J.,Rowley, J.(2013).Consumer attitudes towards mobile marketing in the smart phone era.International Journal of Information Management,33(5),840-849.
  24. Yu, O.S.(2006).Technology portfolio planning and management: Practical concepts and tools.New York:Springer.
被引用次数
  1. Wei-Hsiu Weng(2021).Effect of IoT on Marketing Intelligence and Business Strategy: An Organizational Capability Perspective.International Journal of Electronic Commerce Studies,12(2),209-228.
  2. Wei-Hsiu Weng(2022).Impact Of Competitive Strategy on Big Data Analytics Adoption: An Information Processing Perspective.International Journal of Electronic Commerce Studies,13(2),1-25.