18 resultados para Mobile Web Development
em Helda - Digital Repository of University of Helsinki
Resumo:
Migration within the European Union (EU) has increased since the Union was established. Community pharmacies provide open access to health care services and can be the first, most frequently used or even the only contact with a nation s health care system among mobile community residents. In some of the mass-migration areas in Southern Europe, most of the customers may represent mobile citizens of foreign background. This has not always been taken into consideration in the development of community pharmacy services. Mobile patients have been on the EU's health policy agenda, but they have seldom been mentioned in the context of community pharmacies. In most of the EU member states, governments control the specific legislation concerning community pharmacies and there is no harmonised pharmaceutical policy or consistent minimal standards for community pharmacy services in the EU. The aim of this study was to understand medication use, the role of community pharmacies and the symptom mitigation process of mobile community residents. Finns living in Spain were used as an example to examine how community pharmacies in a EU member state meet the needs of mobile community residents. The data were collected by a survey in 2002 (response rate 53%, n= 533) and by five focus group discussions in 2006 (n=30). A large number (70%) of the respondents had moved to Spain for health reasons and suffered from chronic morbidity. Community pharmacies had an important role in the healthcare of mobile community residents and the respondents were mostly satisfied with these services. However, several medication safety risks related to community pharmacy practices were identified: 1) Availability of prescription medicines without prescription (e.g., antibiotics, sleeping pills, Viagra®, asthma medications, cardiovascular medicines, psoriasis medicines and analgesics); 2) Irrational use of medicines (e.g., 41% of antibiotic users had bought their antibiotics without a prescription, and the most common reasons for antibiotic self-medication were symptomatic common colds and sore throats); 3) Language barriers between patients and pharmacy professionals; 4) Lack of medication counselling; 5) Unqualified pharmacy personnel providing pharmacotherapy. A fifth of the respondents reported experiencing problems during pharmacy visits in Spain, and the lack of a common language was the source of most of these problems. The findings of this study indicate that regulations and their enforcement can play a crucial role in actually assuring the rational and safe use of medicines. These results can be used in the development of pharmaceutical and healthcare policies in the EU. It is important to define consistent minimum standards for community pharmacy services in the EU. Then, the increasing number of mobile community residents could access safe and high quality health care services, including community pharmacy services, in every member state within the EU.
Resumo:
This dissertation examined the research-based teacher education at the University of Helsinki from different theoretical and practical perspectives. Five studies focused on these perspectives separately as well as overlappingly. Study I focused on the reflection process of graduating teacher students. The data consisted of essays the students wrote as their last assignment before graduating, where their assignment was to examine their development as researchers during their MA thesis research process. The results indicated that the teacher students had analysed their own development thoroughly during the process and that they had reflected on theoretical as well as practical educational matters. The results also pointed out that, in the students’ opinion, personally conducted research is a significant learning process. -- Study II investigated teacher students’ workplace learning and the integration of theory and practice in teacher education. The students’ interviews focused on their learning of teacher’s work prior to education. The interviewees’ responses concerning their ‘surviving’ in teaching prior to teacher education were categorized into three categories: learning through experiences, school as a teacher learning environment, and case-specific learning. The survey part of the study focused on integration of theory and practice within the education process. The results showed that the students who worked while they studied took advantage of the studies and applied them to work. They set more demanding teaching goals and reflected on their work more theoretically. -- Study III examined practical aspects of the teacher students’ MA thesis research as well as the integration of theory and practice in teacher education. The participants were surveyed using a web-based survey which dealt with the participants’ teacher education experiences. According to the results, most of the students had chosen a practical topic for their MA thesis, one arising from their work environment, and most had chosen a research topic that would develop their own teaching. The results showed that the integration of theory and practice had taken place in much of the course work, but most obviously in the practicum periods, and also in the courses concerning the school subjects. The majority felt that the education had in some way been successful with regards to integration. -- Study IV explored the idea of considering teacher students’ MA thesis research as professional development. Twenty-three teachers were interviewed on the subject of their experiences of conducting research about their own work as teachers. The results of the interviews showed that the reasons for choosing the MA thesis research topic were multiple: practical, theoretical, personal, professional reasons, as well as outside effect. The objectives of the MA thesis research, besides graduating, were actual projects, developing the ability to work as teachers, conducting significant research, and sharing knowledge of the topic. The results indicated that an MA thesis can function as a tool for professional development, for example in finding ways for adjusting teaching, increasing interaction skills, gaining knowledge or improving reflection on theory and/or practice, strengthening self-confidence as a teacher, increasing researching skills or academic writing skills, as well as becoming critical and being able to read scientific and academic literature. -- Study V analysed teachers’ views of the impact of practitioner research. According to the results, the interviewees considered the benefits of practitioner research to be many, affecting teachers, pupils, parents, the working community, and the wider society. Most of the teachers indicated that they intended to continue to conduct research in the future. The results also showed that teachers often reflected personally and collectively, and viewed this as important. -- These five studies point out that MA thesis research is and can be a useful tool for increasing reflection doing with personal and professional development, as well as integrating theory and practice. The studies suggest that more advantage could be taken of the MA thesis research project. More integration of working and studying could and should be made possible for teacher students. This could be done in various ways within teacher education, but the MA thesis should be seen as a pedagogical possibility.
Resumo:
Sensor networks represent an attractive tool to observe the physical world. Networks of tiny sensors can be used to detect a fire in a forest, to monitor the level of pollution in a river, or to check on the structural integrity of a bridge. Application-specific deployments of static-sensor networks have been widely investigated. Commonly, these networks involve a centralized data-collection point and no sharing of data outside the organization that owns it. Although this approach can accommodate many application scenarios, it significantly deviates from the pervasive computing vision of ubiquitous sensing where user applications seamlessly access anytime, anywhere data produced by sensors embedded in the surroundings. With the ubiquity and ever-increasing capabilities of mobile devices, urban environments can help give substance to the ubiquitous sensing vision through Urbanets, spontaneously created urban networks. Urbanets consist of mobile multi-sensor devices, such as smart phones and vehicular systems, public sensor networks deployed by municipalities, and individual sensors incorporated in buildings, roads, or daily artifacts. My thesis is that "multi-sensor mobile devices can be successfully programmed to become the underpinning elements of an open, infrastructure-less, distributed sensing platform that can bring sensor data out of their traditional close-loop networks into everyday urban applications". Urbanets can support a variety of services ranging from emergency and surveillance to tourist guidance and entertainment. For instance, cars can be used to provide traffic information services to alert drivers to upcoming traffic jams, and phones to provide shopping recommender services to inform users of special offers at the mall. Urbanets cannot be programmed using traditional distributed computing models, which assume underlying networks with functionally homogeneous nodes, stable configurations, and known delays. Conversely, Urbanets have functionally heterogeneous nodes, volatile configurations, and unknown delays. Instead, solutions developed for sensor networks and mobile ad hoc networks can be leveraged to provide novel architectures that address Urbanet-specific requirements, while providing useful abstractions that hide the network complexity from the programmer. This dissertation presents two middleware architectures that can support mobile sensing applications in Urbanets. Contory offers a declarative programming model that views Urbanets as a distributed sensor database and exposes an SQL-like interface to developers. Context-aware Migratory Services provides a client-server paradigm, where services are capable of migrating to different nodes in the network in order to maintain a continuous and semantically correct interaction with clients. Compared to previous approaches to supporting mobile sensing urban applications, our architectures are entirely distributed and do not assume constant availability of Internet connectivity. In addition, they allow on-demand collection of sensor data with the accuracy and at the frequency required by every application. These architectures have been implemented in Java and tested on smart phones. They have proved successful in supporting several prototype applications and experimental results obtained in ad hoc networks of phones have demonstrated their feasibility with reasonable performance in terms of latency, memory, and energy consumption.
Resumo:
In recent years, XML has been widely adopted as a universal format for structured data. A variety of XML-based systems have emerged, most prominently SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This popularity is helped by the excellent support for XML processing in many programming languages and by the variety of XML-based technologies for more complex needs of applications. Concurrently with this rise of XML, there has also been a qualitative expansion of the Internet's scope. Namely, mobile devices are becoming capable enough to be full-fledged members of various distributed systems. Such devices are battery-powered, their network connections are based on wireless technologies, and their processing capabilities are typically much lower than those of stationary computers. This dissertation presents work performed to try to reconcile these two developments. XML as a highly redundant text-based format is not obviously suitable for mobile devices that need to avoid extraneous processing and communication. Furthermore, the protocols and systems commonly used in XML messaging are often designed for fixed networks and may make assumptions that do not hold in wireless environments. This work identifies four areas of improvement in XML messaging systems: the programming interfaces to the system itself and to XML processing, the serialization format used for the messages, and the protocol used to transmit the messages. We show a complete system that improves the overall performance of XML messaging through consideration of these areas. The work is centered on actually implementing the proposals in a form usable on real mobile devices. The experimentation is performed on actual devices and real networks using the messaging system implemented as a part of this work. The experimentation is extensive and, due to using several different devices, also provides a glimpse of what the performance of these systems may look like in the future.
Resumo:
The Ajax approach has outgrown its origin as shorthand for "Asynchronous JavaScript + XML". Three years after its naming, Ajax has become widely adopted by web applications. Therefore, there exists a growing interest in using those applications with mobile devices. This thesis evaluates the presentational capability and measures the performance of five mobile browsers on the Apple iPhone and Nokia models N95 and N800. Performance is benchmarked through user-experienced response times as measured with a stopwatch. 12 Ajax toolkit examples and 8 production-quality applications are targeted, all except one in their real environments. In total, over 1750 observations are analyzed and included in the appendix. Communication delays are not considered; the network connection type is WLAN. Results indicate that the initial loading time of an Ajax application can often exceed 20 seconds. Content reordering may be used to partially overcome this limitation. Proper testing is the key for success: the selected browsers are capable of presenting Ajax applications if their differing implementations are overcome, perhaps using a suitable toolkit.
Resumo:
The mobile phone has, as a device, taken the world by storm in the past decade; from only 136 million phones globally in 1996, it is now estimated that by the end of 2008 roughly half of the worlds population will own a mobile phone. Over the years, the capabilities of the phones as well as the networks have increased tremendously, reaching the point where the devices are better called miniature computers rather than simply mobile phones. The mobile industry is currently undertaking several initiatives of developing new generations of mobile network technologies; technologies that to a large extent focus at offering ever-increasing data rates. This thesis seeks to answer the question of whether the future mobile networks in development and the future mobile services are in sync; taking a forward-looking timeframe of five to eight years into the future, will there be services that will need the high-performance new networks being planned? The question is seen to be especially pertinent in light of slower-than-expected takeoff of 3G data services. Current and future mobile services are analyzed from two viewpoints; first, looking at the gradual, evolutionary development of the services and second, through seeking to identify potential revolutionary new mobile services. With information on both current and future mobile networks as well as services, a network capability - service requirements mapping is performed to identify which services will work in which networks. Based on the analysis, it is far from certain whether the new mobile networks, especially those planned for deployment after HSPA, will be needed as soon as they are being currently roadmapped. The true service-based demand for the "beyond HSPA" technologies may be many years into the future - or, indeed, may never materialize thanks to the increasing deployment of local area wireless broadband technologies.
Resumo:
With the recent increase in interest in service-oriented architectures (SOA) and Web services, developing applications with the Web services paradigm has become feasible. Web services are self-describing, platform-independent computational elements. New applications can be assembled from a set of previously created Web services, which are composed together to make a service that uses its components to perform a certain task. This is the idea of service composition. To bring service composition to a mobile phone, I have created Interactive Service Composer for mobile phones. With Interactive Service Composer, the user is able to build service compositions on his mobile phone, consisting of Web services or services that are available from the mobile phone itself. The service compositions are reusable and can be saved in the phone's memory. Previously saved compositions can also be used in new compositions. While developing applications for mobile phones has been possible for some time, the usability of the solutions is not the same as when developing for desktop computers. When developing for mobile phones, the developer has to more carefully consider the decisions he is going to make with the program he is developing. With the lack of processing power and memory, the applications cannot function as well as on desktop PCs. On the other hand, this does not remove the appeal of developing applications for mobile devices.
Resumo:
In recent years, XML has been accepted as the format of messages for several applications. Prominent examples include SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This XML usage is understandable, as the format itself is a well-accepted standard for structured data, and it has excellent support for many popular programming languages, so inventing an application-specific format no longer seems worth the effort. Simultaneously with this XML's rise to prominence there has been an upsurge in the number and capabilities of various mobile devices. These devices are connected through various wireless technologies to larger networks, and a goal of current research is to integrate them seamlessly into these networks. These two developments seem to be at odds with each other. XML as a fully text-based format takes up more processing power and network bandwidth than binary formats would, whereas the battery-powered nature of mobile devices dictates that energy, both in processing and transmitting, be utilized efficiently. This thesis presents the work we have performed to reconcile these two worlds. We present a message transfer service that we have developed to address what we have identified as the three key issues: XML processing at the application level, a more efficient XML serialization format, and the protocol used to transfer messages. Our presentation includes both a high-level architectural view of the whole message transfer service, as well as detailed descriptions of the three new components. These components consist of an API, and an associated data model, for XML processing designed for messaging applications, a binary serialization format for the data model of the API, and a message transfer protocol providing two-way messaging capability with support for client mobility. We also present relevant performance measurements for the service and its components. As a result of this work, we do not consider XML to be inherently incompatible with mobile devices. As the fixed networking world moves toward XML for interoperable data representation, so should the wireless world also do to provide a better-integrated networking infrastructure. However, the problems that XML adoption has touch all of the higher layers of application programming, so instead of concentrating simply on the serialization format we conclude that improvements need to be made in an integrated fashion in all of these layers.
Resumo:
Extraintestinal pathogenic Escherichia coli (ExPEC) represent a diverse group of strains of E. coli, which infect extraintestinal sites, such as the urinary tract, the bloodstream, the meninges, the peritoneal cavity, and the lungs. Urinary tract infections (UTIs) caused by uropathogenic E. coli (UPEC), the major subgroup of ExPEC, are among the most prevalent microbial diseases world wide and a substantial burden for public health care systems. UTIs are responsible for serious morbidity and mortality in the elderly, in young children, and in immune-compromised and hospitalized patients. ExPEC strains are different, both from genetic and clinical perspectives, from commensal E. coli strains belonging to the normal intestinal flora and from intestinal pathogenic E. coli strains causing diarrhea. ExPEC strains are characterized by a broad range of alternate virulence factors, such as adhesins, toxins, and iron accumulation systems. Unlike diarrheagenic E. coli, whose distinctive virulence determinants evoke characteristic diarrheagenic symptoms and signs, ExPEC strains are exceedingly heterogeneous and are known to possess no specific virulence factors or a set of factors, which are obligatory for the infection of a certain extraintestinal site (e. g. the urinary tract). The ExPEC genomes are highly diverse mosaic structures in permanent flux. These strains have obtained a significant amount of DNA (predictably up to 25% of the genomes) through acquisition of foreign DNA from diverse related or non-related donor species by lateral transfer of mobile genetic elements, including pathogenicity islands (PAIs), plasmids, phages, transposons, and insertion elements. The ability of ExPEC strains to cause disease is mainly derived from this horizontally acquired gene pool; the extragenous DNA facilitates rapid adaptation of the pathogen to changing conditions and hence the extent of the spectrum of sites that can be infected. However, neither the amount of unique DNA in different ExPEC strains (or UPEC strains) nor the mechanisms lying behind the observed genomic mobility are known. Due to this extreme heterogeneity of the UPEC and ExPEC populations in general, the routine surveillance of ExPEC is exceedingly difficult. In this project, we presented a novel virulence gene algorithm (VGA) for the estimation of the extraintestinal virulence potential (VP, pathogenicity risk) of clinically relevant ExPECs and fecal E. coli isolates. The VGA was based on a DNA microarray specific for the ExPEC phenotype (ExPEC pathoarray). This array contained 77 DNA probes homologous with known (e.g. adhesion factors, iron accumulation systems, and toxins) and putative (e.g. genes predictably involved in adhesion, iron uptake, or in metabolic functions) ExPEC virulence determinants. In total, 25 of DNA probes homologous with known virulence factors and 36 of DNA probes representing putative extraintestinal virulence determinants were found at significantly higher frequency in virulent ExPEC isolates than in commensal E. coli strains. We showed that the ExPEC pathoarray and the VGA could be readily used for the differentiation of highly virulent ExPECs both from less virulent ExPEC clones and from commensal E. coli strains as well. Implementing the VGA in a group of unknown ExPECs (n=53) and fecal E. coli isolates (n=37), 83% of strains were correctly identified as extraintestinal virulent or commensal E. coli. Conversely, 15% of clinical ExPECs and 19% of fecal E. coli strains failed to raster into their respective pathogenic and non-pathogenic groups. Clinical data and virulence gene profiles of these strains warranted the estimated VPs; UPEC strains with atypically low risk-ratios were largely isolated from patients with certain medical history, including diabetes mellitus or catheterization, or from elderly patients. In addition, fecal E. coli strains with VPs characteristic for ExPEC were shown to represent the diagnostically important fraction of resident strains of the gut flora with a high potential of causing extraintestinal infections. Interestingly, a large fraction of DNA probes associated with the ExPEC phenotype corresponded to novel DNA sequences without any known function in UTIs and thus represented new genetic markers for the extraintestinal virulence. These DNA probes included unknown DNA sequences originating from the genomic subtractions of four clinical ExPEC isolates as well as from five novel cosmid sequences identified in the UPEC strains HE300 and JS299. The characterized cosmid sequences (pJS332, pJS448, pJS666, pJS700, and pJS706) revealed complex modular DNA structures with known and unknown DNA fragments arranged in a puzzle-like manner and integrated into the common E. coli genomic backbone. Furthermore, cosmid pJS332 of the UPEC strain HE300, which carried a chromosomal virulence gene cluster (iroBCDEN) encoding the salmochelin siderophore system, was shown to be part of a transmissible plasmid of Salmonella enterica. Taken together, the results of this project pointed towards the assumptions that first, (i) homologous recombination, even within coding genes, contributes to the observed mosaicism of ExPEC genomes and secondly, (ii) besides en block transfer of large DNA regions (e.g. chromosomal PAIs) also rearrangements of small DNA modules provide a means of genomic plasticity. The data presented in this project supplemented previous whole genome sequencing projects of E. coli and indicated that each E. coli genome displays a unique assemblage of individual mosaic structures, which enable these strains to successfully colonize and infect different anatomical sites.
Resumo:
This is a qualitative and multimethodological comparative study, which consists of two main parts: examining the development of new media and analysing and comparing the new media strategies of the three companies studied (Alma Media, Sanoma and the Finnish Broadcasting Company Yleisradio). The study includes the first large-scale review in Finnish of the development of new media, paying attention to the birth of the Internet as well as to mobile media, web TV and any other element of new media. It also concentrates on the function of electronic distribution channels before the age of the Internet, e.g. cable text and videotext. Answers about how the three traditional Finnish media houses began spreading their content to the Internet and wireless applications in 1994–2004 are also given. In researching the new media strategies the study pays special attention to the attitudes that the three media companies adopted towards the Internet and other forms of new media in their strategies during the years in question. By analysing and comparing, e.g., the companies’ strategies and their investments, the study ascertains whether the companies had a joint functional model in adopting new media or acted totally on their own without taking too much notice of the media field overall. The study makes extensive use of previously published material. The researcher has also interviewed almost twenty people who were involved in getting the companies’ new media functions under way. The methods for the interviews were dialogue and snowball sampling. The researcher has created a classification in which he divides the business strategies into four different categories: active strategy, careful strategy, permissive strategy, and passive strategy. In comparing and analysing the companies the researcher has used the classification devised by Allan Afuah & Christopher L. Tucci. The seven element classification consists of dominant managerial logic, competency trap, fear of cannibalisation and loss of revenue, channel conflict, political power, co-opetitor power and emotional attachment. In analysing the company strategies the researcher has also noted the classifications of convergence made by Everette E. Dennis and Graham Murdock as well as the aspects formulated by Sylvia Chan-Olmsted and Louisa Ha concerning the success of the companies in adopting the Internet into their functions. Based on all these classifications and by further developing them the researcher analyses and compares the success of the new media strategies of the three Finnish companies. The outcome of the study is a conclusion as to what kind of strategies the companies have carried out their new media functions and how they have succeeded in it.
Resumo:
This report has been written as part of the E-ruralnet –project that addresses e-learning as a means for enhancing lifelong learning opportunities in rural areas, with emphasis on SMEs, micro-enterprises, self-employed and persons seeking employment. E-ruralnet is a European network project part-funded by the European Commission in the context of the Lifelong Learning Programme, Transversal projects-ICT. This report aims to address two issues identified as requiring attention in the previous Observatory study: firstly, access to e-learning for rural areas that have not adequate ICT infrastructure; and secondly new learning approaches introduced through new interactive ICT tools such as web 2.0., wikis, podcasts etc. The possibility of using alternative technology in addition to computers is examined (mobile telephones, DVDs) as well as new approaches to learning (simulation, serious games). The first part of the report examines existing literature on e-learning and what e-learning is all about. Institutional users, learners and instructors/teachers are all looked at separately. We then turn to the implementation of e-learning from the organizational point of view and focus on quality issues related to e-learning. The report includes a separate chapter or e-learning from the rural perspective since most of Europe is geographically speaking rural and the population in those areas is that which could most benefit from the possibilities introduced by the e-learning development. The section titled “Alternative media”, in accordance with the project terminology, looks at standalone technology that is of particular use to rural areas without proper internet connection. It also evaluates the use of new tools and media in e-learning and takes a look at m-learning. Finally, the use of games, serious games and simulations in learning is considered. Practical examples and cases are displayed in a box to facilitate pleasant reading.
Resumo:
As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform’s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.
Resumo:
As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.
Resumo:
Service researchers and practitioners have repeatedly claimed that customer service experiences are essential to all businesses. Therefore comprehension of how service experience is characterised in research is an essential element for its further development through research. The importance of greater in-depth understanding of the phenomenon of service experience has been acknowledged by several researchers, such as Carú and Cova and Vargo and Lusch. Furthermore, Service-Dominant (S-D) logic has integrated service experience to value by emphasising in its foundational premises that value is phenomenologically (experientially) determined. The present study analyses how the concept of service experience has been characterised in previous research. As such, it puts forward three ways to characterise it in relation to that research: 1) phenomenological service experience relates to the value discussion in S-D logic and interpretative consumer research, 2) process-based service experience relates to understanding service as a process, and 3) outcome-based service experience relates to understanding service experience as one element in models linking a number of variables or attributes to various outcomes. Focusing on the phenomenological service experience, the theoretical purpose of the study is to characterise service experience based on the phenomenological approach. In order to do so, an additional methodological purpose was formulated: to find a suitable methodology for analysing service experience based on the phenomenological approach. The study relates phenomenology to a philosophical Husserlian and social constructionist tradition studying phenomena as they appear in our experience in a social context. The study introduces Event-Based Narrative Inquiry Technique (EBNIT), which combines critical events with narratives and metaphors. EBNIT enabled the analysis of lived and imaginary service experiences as expressed in individual narratives. The study presents findings of eight case studies within service innovation of Web 2.0, mobile service, location aware service and public service in the municipal sector. Customers’ and service managers’ stories about their lived private and working lifeworld were the foundation for their ideal service experiences. In general, the thesis finds that service experiences are (1) subjective, (2) context-specific, (3) cumulative, (4) partially socially constructed, (5) both lived and imaginary, (6) temporally multiple-dimensional, and (7) iteratively related to perceived value. In addition to customer service experience, the thesis brings empirical evidence of managerial service experience of front-line managers experiencing the service they manage and develop in their working lifeworld. The study contributes to S-D logic, service innovation and service marketing and management in general by characterising service experience based on the phenomenological approach and integrating it to the value discussion. Additionally, the study offers a methodological approach for further exploration of service experiences. The study discusses managerial implications in conjunction with the case studies and discusses them in relation to service innovation.
Resumo:
The thesis is positioned in the services marketing field. Previous mobile service research has identified perceived value or relative advantage as a stable predictor of use of services. However, a more detailed view of what customers value in mobile services is needed for marketing diverse types of mobile content and attracting committed customers. The direct relationships between multidimensional value and loyalty constructs have received limited attention in the previous literature, although a multidimensional view is needed for differentiating services. This thesis studies how perceived value of mobile service use affects customer commitment, repurchase intentions, word-of-mouth and willingness to pay. The doctoral thesis consists of three journal articles and one working paper. The four papers have different sub-aims and comprise individual empirical studies. Mixed methods including both personal interviews and survey data collected from end-users of different types of mobile content services are used. The conceptual mobile perceived value model that results from the first explorative empirical study supports a six- dimensional value view. The six dimensions are further categorized into two higher order constructs: content-related perceived value (emotional, social, convenience and monetary value) and context-related (epistemic and conditional value) perceived value. Structural equation modeling is used in the other three studies to validate this framework by analyzing the relationships between context- and content-related value, and how the individual perceived value dimensions affect commitment and behavioral outcomes. Analyzing the direct relationships revealed differences in the effect of perceived value dimensions between information and entertainment mobile service user groups, between effects on commitment, repurchase intentions and word-of-mouth intentions, as well as between effects on commitment to the provider and to the mobile channel as such. This thesis contributes to earlier perceived value literature by structuring the value dimensions into two groups. Most importantly, the thesis contributes to the value and loyalty literature by increasing understanding of how the different dimensions of perceived value directly affect commitment and post-purchase intentions. The results have implications for further theory development in the electronic services field using multidimensional latent constructs, and practical implications for enhancing commitment to content provider and for differentiated marketing strategies in the mobile field. The general conclusion of this thesis is that differentiated value-based marketing of mobile services is essential for attracting committed customers who will use the same providers’ content also in the future. Minna Pihlström is associated with the Centre for Relationship Marketing and Service Management (CERS) at Hanken.