SwePub
Sök i SwePub databas

  Utökad sökning

Booleska operatorer måste skrivas med VERSALER

Träfflista för sökning "AMNE:(SOCIAL SCIENCES Business and economics) ;srt2:(2010-2011);mspu:(conferencepaper)"

Sökning: AMNE:(SOCIAL SCIENCES Business and economics) > (2010-2011) > Konferensbidrag

  • Resultat 1221-1230 av 1448
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1221.
  •  
1222.
  • Mills, Adam, et al. (författare)
  • Drawing meaning from online user discussions about brands : A study of comments in response to luxury advertisements on YouTube
  • 2011
  • Ingår i: The Sustainable Global Marketplace. - : The Academy of Marketing Science. - 0939783363 ; , s. 398-
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • The Internet and how consumers make use of it is constantly changing. The Internet has evolved from an information retrieval source to a place of interactivity, and a place for dialogue from one-to-one, one-to-many and many-to-many. Many term the Internet today “Web 2.0.” As one of many social platforms of Web 2.0, the use of video as a means of online communication is gaining increasing popularity among Internet users. Video publishing is no longer accessible solely to trained and skilled videographers; assisted by the development of inexpensive and user-friendly media software, consumers are now creating their own content. The accessibility of video publishing, combined with the network effects of video-driven social media platforms such as YouTube, is changing the advertising landscape. This paper discusses Consumer Generated Advertising (CGA), where consumers create brand messages independent of the brands themselves in order to persuade, inform or remind fellow consumers. Because of the anonymity, visibility and interactivity of online CGA, consumer dialogues and market conversations are difficult to interpret through traditional advertising research methods (surveys, ratings services, etc). However, there may be an opportunity for brand managers to capitalize on Web 2.0 to gain valuable insight into the ways consumers interact with their brands. In this exploratory study, we make use of the content analysis software Leximancer to make sense of and measure consumer feedback around conversations on CGA. We study consumer comments posted on You Tube in response to three video advertisements in order to draw meaningful trends and insights from the large volume of seemingly disorganized consumer discussion
  •  
1223.
  • Mobach, Mark, et al. (författare)
  • The new world of work: space, technology, and knowledge.
  • 2011
  • Ingår i: APROS Asia-Pacific Researchers of Organization Studies, November 2011, Australia.
  • Konferensbidrag (refereegranskat)abstract
    • The new world of work is an upcoming term for new workspace and technological designs in which employees can work independent of time and place. They are supposed to allow workers to improve their work-life balance, to stimulate the sharing of knowledge and, by doing so, to create a more productive workforce. In this context, this current paper combines perspectives from facility management, technology management, and knowledge management, in investigating the complex relation between space, technology, human interaction, and productivity for knowledge workers. We held explorative interviews with Dutch managers who played key roles in implementing new way of working and added these with perceptions from Finnish managers of a firm who has implemented similar ways of working in a more in-depth study. Based on these findings we discuss what the new world of work contains, what kinds of outputs it can have as well as implications of the new world of work for employees and the firm.
  •  
1224.
  • Mobahat, Hoopad (författare)
  • Authentication and lightweight cryptography in low cost RFID
  • 2010
  • Ingår i: 2nd International Conference on Software Technology and Engineering (ICSTE). - Piscataway, NJ : IEEE Communications Society. - 9781424486670 ; , s. 123-129
  • Konferensbidrag (refereegranskat)abstract
    • Technology-driven transactions, or e-commerce, should not involve a tradeoff in which consumers relinquish widening amounts of their privacy in return for greater convenience. Businesses that put customers in control of their online privacy options increase consumer faith in the online world - and promote greater acceptance of e-commerce. Ultimately, though, the issue comes down to consumer empowerment and trust. "Companies rolling out RFID must have a clear and rigidly enforced policy on the deactivation of their tracking mechanisms, as having a cost-effective supply chain will be pretty meaningless if nobody trusts you enough to buy from you," states Martin Butler. RFID is rapidly pushed to the existing markets with diversified applications, such as automatic tariffs payment in public transport, animal identification and tracking, and automated manufacturing and logistics control. Unprotected communications between tags and readers over a wireless channel can disclose information about the tags and their positions. Due to the potential wide deployment of Radio Frequency Identification (RFID), the security of RFID systems has drawn extensive attention from both academia and industry, and the RFID authentication protocol is an important mechanism in the security of RFID systems. The desired security requirements of RFID authentication protocols include privacy, integrity, authentication, anonymity/untraceability, and even availability. To design an efficient protocol that satisfies all the requirements with limited resources is a challenge According to Benoit Calmels et.al - 2006 -Strong cryptography mechanisms need high computing resources which is not possible to be embedded into RFID tags. The approach would be an implementation of some low -cost but secure cryptographic functions in the tag. It would bring a high level of privacy where there is no need for any substantial change in the synopsis of communication between the tag and the reader. On - - the other hand, the tag broadcasts the same data to any reader, with dependency on given authorization, could read and process all or part of the said data. The major challenge faced when trying to provide security for low-cost radio frequency identification (RFID) tags in their very limited resources- for example, tag memory will be restricted to several hundred bits, and approximately 250-4000 logic gates out of the total tag space can be devoted to security- related tasks. So readers should bear in mind that these constrained devices are unable to support on-chip standard cryptographic primitives. During this research with an exploratory purpose some different protocols around authentication and cryptography in low cost RFID would be investigated and compared as the output and result with a qualitative approach. This strategy makes the opportunity to discover similarities and differences among protocols and solutions. So that specialists or executives who are looking for a proper protocol or scheme correspondent to their needs or priorities, could choose one or two among others, in other words when investigating the varied types of attacks against schemes, the administrator or the customer of the technology (technology buyer) could set up a comparison to find the suitable protocol according to his /her criterions or priorities like the value of data that is going to be transmitted by RFID transceivers in the air field or wireless media, or the probable attacks could happen according to situation of located RFID devices. For example, if the administrator or executive knows that the position or location that his/her RFID devices located are vulnerable to DOS attack would not choose RHLK or LCAP as the appropriate protocol, or if he/she assumes that spoofing or replay attack is more probable than other attacks then would not choose Li et al. or SRAC schemes for his/ her RFID transceivers authentication.
  •  
1225.
  •  
1226.
  • Mostaghel, Rana, et al. (författare)
  • Adoption of Enterprise Systems and Radio Frequency Identification among Service Firms
  • 2011
  • Konferensbidrag (refereegranskat)abstract
    • For optimizing supply chain processes a promising technology is Radio Frequency Identification (RFID). By adding functionality to previous enterprise systems, the aim is to increase transparency of information throughout the supply chain. In this paper, we present a survey of RFID implementation in Swedish service firms, concerned with RFID system penetration. The findings show that although the great majority of firms are actively working with integrated information systems, only a very small fraction has adopted RFID.
  •  
1227.
  •  
1228.
  •  
1229.
  •  
1230.
  • Muyingo, Henry (författare)
  • Managing special purpose properties : A study of practices in the public sector organisations and private manufacturing companies in Sweden
  • 2011
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • Purpose The purpose of this study is to analyse strategies used by state and county government organisations as well as private sector manufacturing companies in Sweden with the aim of identifying factors that can lead to more efficient management of special purpose properties in view of limited access to capital or government funding partly due to the global economic recession. Design/methodology/approach –The study is approached using a web-based questionnaire to solicit responses on issues such as decisions concerning securing of availability of production space, operating and maintenance strategies used as well as prediction of future actions. A total of sixty nine requests sent to property managers and company directors produced forty completed questionnaires that formed a database for the descriptive analysis. Findings – The findings indicate that there is a high degree of special property ownership in the surveyed companies despite changes in the market and that the probability of an expansion of the property leasing market in the coming five years is low. Companies in the Swedish public sector could benefit from increased outsourcing so as to focus more on core business. They could also benefit from seeing over policies concerning responsibilities and liabilities in the premises they lease so as to make them clearer. The results also reveal an urgent need towards a more uniform definition of concepts and classification of activities in all of the categories in the study. The level of neglected maintenance is deemed as higher in the public sector especially in the counties in contrast to private manufacturing companies that according to the study adhere more to long term maintenance plans. Originality/value –The key study results are of use in other countries that are considering privatisation or sale-leaseback transactions of large property portfolios under government ownership and provide new insights on the strategic maintenance of the properties in relation to the question of neglected maintenance.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1221-1230 av 1448
Typ av publikation
konstnärligt arbete (1)
Typ av innehåll
refereegranskat (938)
övrigt vetenskapligt/konstnärligt (495)
populärvet., debatt m.m. (15)
Författare/redaktör
Blomgren, Henrik, 19 ... (16)
Angelis, Jannis (16)
Öberg, Christina, 19 ... (13)
Witell, Lars (13)
Bohlin, Erik, 1961 (12)
Andersson, Per (12)
visa fler...
Markendahl, Jan (12)
Havila, Virpi (11)
Edvardsson, Bo (10)
Hertz, Susanne (10)
Fellesson, Markus (10)
McKelvey, Tomas, 196 ... (10)
Salehi-Sangari, Esma ... (10)
Raviola, Elena, 1981 (9)
Hilletofth, Per (9)
Gustafsson, Anders (9)
Zackariasson, Peter (9)
Mandell, Svante, 197 ... (9)
Srinuan, Pratompong, ... (9)
McKelvey, Maureen, 1 ... (9)
Hallin, Anette (9)
Edvardsson, Bo, 1952 ... (8)
Lundqvist, Peter (8)
Salomonson, Nicklas (8)
Mattsson, Lars-Gunna ... (8)
Kavathatzopoulos, Io ... (8)
Westelius, Alf (8)
Åberg, Annika (8)
Wallström, Åsa (8)
Ciabuschi, Francesco (8)
Brege, Staffan (7)
Isaksson, Raine (7)
Dolles, Harald, 1961 (7)
Jonsson, Patrik, 196 ... (7)
Aramo-Immonen, Heli, ... (7)
Thilenius, Peter (7)
Kappen, Philip (7)
Sebhatu, Samuel Petr ... (7)
Woodilla, Jill (7)
Solberg Søilen, Klau ... (6)
Söderman, Sten (6)
Armbrecht, John (6)
Kristensson, Per (6)
Appelqvist, Örjan, 1 ... (6)
Davidsson, Per, 1958 ... (6)
Rimmel, Gunnar (6)
Martín Martín, Oscar (6)
Styvén, Maria Ek (6)
Behrends, Sönke, 197 ... (6)
Lindgren, Monica, 19 ... (6)
visa färre...
Lärosäte
Göteborgs universitet (225)
Jönköping University (143)
Uppsala universitet (135)
Stockholms universitet (114)
Kungliga Tekniska Högskolan (113)
Linköpings universitet (100)
visa fler...
Linnéuniversitetet (98)
Chalmers tekniska högskola (89)
Handelshögskolan i Stockholm (79)
Karlstads universitet (70)
Sveriges Lantbruksuniversitet (67)
Örebro universitet (55)
Luleå tekniska universitet (52)
Högskolan i Borås (40)
Umeå universitet (37)
Högskolan i Halmstad (37)
Lunds universitet (35)
Högskolan i Gävle (33)
Mälardalens universitet (33)
Mittuniversitetet (25)
Högskolan i Skövde (16)
Blekinge Tekniska Högskola (15)
Högskolan Väst (14)
VTI - Statens väg- och transportforskningsinstitut (11)
Södertörns högskola (10)
Högskolan Dalarna (5)
Högskolan Kristianstad (3)
Malmö universitet (1)
RISE (1)
visa färre...
Språk
Engelska (1380)
Svenska (57)
Spanska (6)
Franska (3)
Portugisiska (2)
Forskningsämne (UKÄ/SCB)
Samhällsvetenskap (1448)
Teknik (98)
Lantbruksvetenskap (63)
Humaniora (39)
Naturvetenskap (33)
Medicin och hälsovetenskap (12)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy