26 resultados para user generated services

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Esitys KDK-käytettävyystyöryhmän järjestämässä seminaarissa: Miten käyttäjien toiveet haastavat metatietokäytäntöjämme? / How users' expectations challenge our metadata practices? 30.9.2014.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Increasing usage of Web Services has been result of efforts to automate Web Services discovery and interoperability. The Semantic Web Service descriptions create basis for automatic Web Service information management tasks such as discovery and interoperability. The discussion of opportunities enabled by service descriptions have arisen in recent years. The end user has been considered only as a consumer of services and information sharing occurred from one service provider to public in service distribution. The social networking has changed the nature of services. The end user cannot be seen anymore only as service consumer, because by enabling semantically rich environment and right tools, the end user will be in the future the producer of services. This study investigates the ways to provide for end users the empowerment to create service descriptions on mobile device. Special focus is given to the changed role of the end user in service creation. In addition, the Web Services technologies are presented as well as different Semantic Web Service description approaches are compared. The main focus in the study is to investigate tools and techniques to enable service description creation and semantic information management on mobile device.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Learning of preference relations has recently received significant attention in machine learning community. It is closely related to the classification and regression analysis and can be reduced to these tasks. However, preference learning involves prediction of ordering of the data points rather than prediction of a single numerical value as in case of regression or a class label as in case of classification. Therefore, studying preference relations within a separate framework facilitates not only better theoretical understanding of the problem, but also motivates development of the efficient algorithms for the task. Preference learning has many applications in domains such as information retrieval, bioinformatics, natural language processing, etc. For example, algorithms that learn to rank are frequently used in search engines for ordering documents retrieved by the query. Preference learning methods have been also applied to collaborative filtering problems for predicting individual customer choices from the vast amount of user generated feedback. In this thesis we propose several algorithms for learning preference relations. These algorithms stem from well founded and robust class of regularized least-squares methods and have many attractive computational properties. In order to improve the performance of our methods, we introduce several non-linear kernel functions. Thus, contribution of this thesis is twofold: kernel functions for structured data that are used to take advantage of various non-vectorial data representations and the preference learning algorithms that are suitable for different tasks, namely efficient learning of preference relations, learning with large amount of training data, and semi-supervised preference learning. Proposed kernel-based algorithms and kernels are applied to the parse ranking task in natural language processing, document ranking in information retrieval, and remote homology detection in bioinformatics domain. Training of kernel-based ranking algorithms can be infeasible when the size of the training set is large. This problem is addressed by proposing a preference learning algorithm whose computation complexity scales linearly with the number of training data points. We also introduce sparse approximation of the algorithm that can be efficiently trained with large amount of data. For situations when small amount of labeled data but a large amount of unlabeled data is available, we propose a co-regularized preference learning algorithm. To conclude, the methods presented in this thesis address not only the problem of the efficient training of the algorithms but also fast regularization parameter selection, multiple output prediction, and cross-validation. Furthermore, proposed algorithms lead to notably better performance in many preference learning tasks considered.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tässä työssä selvitetään mitä mobiiliympäristössä käytettävillä kontekstitietoisilla sovelluksilla tarkoitetaan, miksi niitä tarvitaan ja mitä niiden avulla voidaan saavuttaa. Käyttäjäkeskeisen palvelun tavoitteena on mukautua käyttäjän kontekstiin, sekä hänen tarpeisiin ja tavoitteisiin ilman käyttäjältä vaadittavaa jatkuvaa vuorovaikutusta. Kontekstitietoisen sovelluksen suunnittelussa ja toteutuksessa tulee kiinnittää huomiota muun muassa kontekstitiedon keräämiseen, tallentamiseen ja tiedon eheyden säilyttämiseen. Sovelluksen suunnittelun tärkein haaste on toteuttaa hyvä logiikka, joka osaa päätellä kontekstitiedoista mitä toimintoja sen tulisi suorittaa. Mobiilipalveluiden personalisoinnissa on tärkeää ottaa huomioon käyttäjän, laitteen ja palvelun väliset vuorovaikutussuhteet. Nämä vuorovaikutussuhteet määrittelevät miten tiettyä mobiilipalvelua tulisi personalisoida jotta palvelu pystyy täyttämään käyttäjän sille asettamat vaatimukset.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Työn tavoitteena oli kokonaisnäkemyksen luominen Helsingin seudun liikenteenhallinnan tilasta ja kehitysnäkymistä sekä seuraavien tärkeimpien kehittämispolkujen tunnistaminen ja konkretisointi toimenpiteiksi. Työssä keskityttiin seuraaviin painopistealueisiin 1. Liityntäpysäköinnin informaation ja maksujärjestelmien kehittäminen 2. Liikenteenhallintakeskuksen toiminnan kehittäminen ja laajentaminen 3. Liikennejärjestelmän reaaliaikainen tilannekuva ja lyhyen aikavälin ennusteet 4. Pääkaupunkiseudun pääväylien ruuhkien ja häiriöiden hallinta 5. Joukkoliikenteen ajantasaisen matkustajainformaation kehittäminen. Työssä laadittiin katsaus kullakin painopistealueella jo tapahtuneeseen sekä käynnissä olevaan kehitystyöhön, kuvattiin esiin nousseita ongelmia ja laadittiin esitys vuoteen 2020 ulottuvasta toiminnallisesta tavoitetilasta sekä konkreettisista kehittämistoimista. Työssä järjestettiin myös tulevaisuustyöpaja, johon pyydettiin alustuksia valikoiduilta viranomaistahoilta, tutkijoilta ja palveluntuottajilta. Näiden keskustelujen kautta kirkastettiin seudun toimijoiden näkemystä älyliikenteen toimialan kehitysnäkymistä ja –tarpeista. Työn lopputuloksena syntyneeseen toimenpideohjelmaan kirjattiin yhteensä 30 hanketta. Näistä viisi hanketta valittiin työpajatyöskentelyn kautta varsinaisiksi kärkihankkeiksi, joiden toteutus on kriittistä liikkujien ja viranomaistyön palvelutason kannalta ja joka edellyttää usean toimijan yhteistyötä. Lisäksi tunnistettiin joukko seurattavia hankkeita. Valitut kärkihankkeet, käynnistämisen vastuutaho sekä tavoitteellinen käynnistysvuosi ovat seuraavat: 1. Liityntäpysäköinnin dynaamisen informaatiojärjestelmän pilotointi Hämeenlinnanväylän käytävässä Kehäradan asemilla (HSL 2012) 2. HSL:n alueen joukkoliikenteen häiriönhallinnan uudelleenorganisointi (HSL, Liikennevirasto 2012) 3. Seudullisen liikenteenhallintasuunnitelman laadinta verkollisen operoinnin kehittämiseksi häiriötilanteissa (ELY-keskus, Liikennevirasto 2013) 4. Reaaliaikaisen sujuvuustiedon tuottaminen ruuhkautuvalta pääkatu- ja alempiasteiselta maantieverkolta (Liikennevirasto, kunnat 2012) 5. Liikenteen vaihtuvan ohjauksen ja tiedottamisen hyödyntäminen pääväylien ruuhkautumisen ja häiriöiden hallinnassa. (ELY-keskus 2012) Kärkihankkeisiin ei liity sellaisia riippuvuuksia, että niitä ei voitaisi käynnistää ennen päätöksentekoa jostakin muusta investoinnista. Merkittävimmät riippuvuudet liittyvät LIJ2014-järjestelmän ajoneuvojen paikannuksen ja muiden työkalujen valmistumiseen. Johtoryhmän linjauksen mukaan kärkihankkeissa ja muissakin toimijoiden omissa hankkeissa syntyvien tietojärjestelmien rajapinnat avataan soveltuvasti kaupallisten toimijoiden käyttöön, jolloin syntyvien kaupallisten loppukäyttäjäpalveluiden kautta voidaan parantaa tietopalvelujen tavoittavuutta. Kärkihankkeiden valinta ja sisältö on rakennettu pitkälti sen lähtökohdan varaan, että liikenteen tietopalveluissa julkistoimijoiden roolina on pääasiassa lähtötietojen tuottaminen ja jakaminen varsinaisille palveluntuottajille. Vuoteen 2016 mennessä uusien rajapintojen kautta jaettavien tietojen määrä on nykyiseen verrattuna huomattavasti laajempi, ja odotukset uusien ja innovatiivisten palvelujen syntymiselle ovat korkeat. HLH-johtoryhmä nimeää jokaisen kärkihankkeen läpiviennistä vastaavan työryhmän, joiden työskentelyä ohjataan nykyisen kaltaisessa johtoryhmätyössä. Johtoryhmätyön organisointi on todettu toimivaksi, sillä ryhmä koostuu seudun 14 kunnan alueen keskeisistä julkisista toimijoista ja sen kautta on olemassa vahvat kytkennät sekä seudun liikennejärjestelmätyöhön (HLJ) että valtakunnalliseen älyliikenteen kehitystyöhön.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This study discusses the procedures of value co-creation that persist in gaming industry. The purpose of this study was to identify the procedures that persist in current video gaming industry which answers the main research problem how value is co-created in video gaming industry followed by three sub questions: (i) What is value co-creation in gaming industry? (ii) Who participates in value co-creation in gaming industry? (iii) What are the procedures that are involved in value co-creation in gaming industry? The theoretical background of the study consists of literature relating to the theory of marketing i.e., notion of value, conventional understanding of value creation, value chain, co-creation approach, co-production approach. The research adopted qualitative research approach. As a platform of relationship researcher used web 2.0 tool interface. Data were collected from the social networks and netnography method was applied for analyzing them. Findings show that customer and company both co-create optimum level of value while they interact with each other and within the customers as well. However mostly the C2C interaction, discussions and dialogues threads that emerged around the main discussion facilitated to co-create value. In this manner, companies require exploiting and further motivating, developing and supporting the interactions between customers participating in value creation. Hierarchy of value co-creation processes is the result derived from the identified challenges of value co-creation approach and discussion forums data analysis. Overall three general sets and seven topics were found that explored the phenomenon of customer to customer (C2C) and business to customer (B2C) interaction/debating for value co-creation through user generated contents. These topics describe how gamer contributes and interacts in co-creating value along with companies. A methodical quest in current research literature acknowledged numerous evolving flows of value in this study. These are general management perspective, new product development and innovation, virtual customer environment, service science and service dominant logic. Overall the topics deliver various realistic and conceptual implications for using and handling gamers in social networks for augmenting customers’ value co-creation process.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tässä pro gradu -tutkielmassa selvitettiin, miten aikakauslehden eli emobrändin tuttuus vaikuttaa halukkuuteen osallistua verkkopalvelun eli brändilaajennuksen sisällöntuotantoon joukkoistamalla. Kysymys liittyy muuttuneeseen tilanteeseen median kulutuksessa. Teknologia on kehittynyt, paperisten mediatuotteiden kysyntä vähentynyt ja aikakauslehdet kehittävät digitaalisia palvelujaan. Medialla kuitenkaan ole yksinoikeutta sisällöntuotantoon. Kuka tahansa voi tehdä ja julkaista sisältöä. Monet mediat ovat ottaneet lukijat mukaan sisällöntuotantoon. Aiempien tutkimusten perusteella emobrändin tuttuus vaikuttaa myönteisesti asi-akkaiden halukkuuteen käyttää brändilaajennusta. Se vaikuttaa myös ostopäätökseen ja lisää luottamusta verkkopalvelua kohtaan. Tässä tutkimuksessa tuote oli tuttu niille, jotka ovat lehden tilaajia. Lukijalähtöistä sisältöä ovat mm. blogit, verkkokeskustelut, lukijoiden tarinat, runot, kuvat, kilpailut ja kyselyt. Tutkielman aineisto kerättiin verkkokyselyn avulla ja siihen vastasi 437 vastaajaa. Tulosten perusteella emobrändin tuttuus vaikuttaa myönteisesti tilaajien halukkuuteen käyttää aikakauslehden verkkopalvelua. Tilaajat käyvät palvelussa muita käyttäjiä useammin ja osallistuvat tai haluaisivat osallistua ei-tilaajia innokkaammin sisällöntuotantoon. He ovat myös ei-tilaajia kiinnostuneempia lukijalähtöisestä sisällöstä.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The thesis analyzes liability of Internet news portals for third-party defamatory comments. After the case of Delfi AS v. Estonia, decided by the Grand Chamber of the European Court of Human Rights on 16 June 2015, a portal can be held liable for user-generated unlawful comments. The thesis aims at exploring consequences of the case of Delfi for Internet news portals’ business model. The model is described as a mixture of two modes of information production: traditional industrial information economy and new networked information economy. Additionally, the model has a generative comment environment. I name this model “the Delfian model”. The thesis analyzes three possible strategies which portals will likely apply in the nearest future. I will discuss these strategies from two perspectives: first, how each strategy can affect the Delfian model and, second, how changes in the model can, in their turn, affect freedom of expression. The thesis is based on the analysis of case law, legal, and law and economics literature. I follow the law and technology approach in the vein of ideas developed by Lawrence Lessig, Yochai Benkler and Jonathan Zittrain. The Delfian model is researched as an example of a local battle between industrial and networked information economy modes. The thesis concludes that this local battle is lost because the Delfian model has to be replaced with a new walled-garden model. Such a change can seriously endanger freedom of expression.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The aim of this bachelor’s thesis was to explore adolescents’ personal branding practices in the social media environment of the photo and video sharing mobile application Instagram. As the theoretical background for personal branding is quite limited, this thesis combined concepts of personal branding and self-presentation to answer the research problems. Empirical data was collected by conducting semi-structured individual interviews with 10-14-year-old adolescent girls. The photo-elicitation method was utilized in the interviews as the participants were requested to present and discuss their Instagram accounts. The concepts of personal brand identity and personal brand positioning were found to be suitable descriptions to adolescents’ personal branding practices on Instagram. It was found that adolescents consciously consider what kind of personal brand identity they aim to portray to their audience and that authenticity of the personal brand identity is valued. Personal brand positioning, on the other hand, was found to be achieved through impression management: adolescents make strategic disclosure decisions regarding the content they post on their Instagram accounts in a way that the content is reflective of the personal brand identity. Posting brand-related user-generated content on one’s Instagram account was found to be one of the many disclosure decisions in personal brand positioning on Instagram and this type of content was very common on the participants’ accounts. Adolescents were also found to be interested in monitoring the audience reactions to their personal branding efforts.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A web service is a software system that provides a machine-processable interface to the other machines over the network using different Internet protocols. They are being increasingly used in the industry in order to automate different tasks and offer services to a wider audience. The REST architectural style aims at producing scalable and extensible web services using technologies that play well with the existing tools and infrastructure of the web. It provides a uniform set of operation that can be used to invoke a CRUD interface (create, retrieve, update and delete) of a web service. The stateless behavior of the service interface requires that every request to a resource is independent of the previous ones facilitating scalability. Automated systems, e.g., hotel reservation systems, provide advanced scenarios for stateful services that require a certain sequence of requests that must be followed in order to fulfill the service goals. Designing and developing such services for advanced scenarios with REST constraints require rigorous approaches that are capable of creating web services that can be trusted for their behavior. Systems that can be trusted for their behavior can be termed as dependable systems. This thesis presents an integrated design, analysis and validation approach that facilitates the service developer to create dependable and stateful REST web services. The main contribution of this thesis is that we provide a novel model-driven methodology to design behavioral REST web service interfaces and their compositions. The behavioral interfaces provide information on what methods can be invoked on a service and the pre- and post-conditions of these methods. The methodology uses Unified Modeling Language (UML), as the modeling language, which has a wide user base and has mature tools that are continuously evolving. We have used UML class diagram and UML state machine diagram with additional design constraints to provide resource and behavioral models, respectively, for designing REST web service interfaces. These service design models serve as a specification document and the information presented in them have manifold applications. The service design models also contain information about the time and domain requirements of the service that can help in requirement traceability which is an important part of our approach. Requirement traceability helps in capturing faults in the design models and other elements of software development environment by tracing back and forth the unfulfilled requirements of the service. The information about service actors is also included in the design models which is required for authenticating the service requests by authorized actors since not all types of users have access to all the resources. In addition, following our design approach, the service developer can ensure that the designed web service interfaces will be REST compliant. The second contribution of this thesis is consistency analysis of the behavioral REST interfaces. To overcome the inconsistency problem and design errors in our service models, we have used semantic technologies. The REST interfaces are represented in web ontology language, OWL2, that can be part of the semantic web. These interfaces are used with OWL 2 reasoners to check unsatisfiable concepts which result in implementations that fail. This work is fully automated thanks to the implemented translation tool and the existing OWL 2 reasoners. The third contribution of this thesis is the verification and validation of REST web services. We have used model checking techniques with UPPAAL model checker for this purpose. The timed automata of UML based service design models are generated with our transformation tool that are verified for their basic characteristics like deadlock freedom, liveness, reachability and safety. The implementation of a web service is tested using a black-box testing approach. Test cases are generated from the UPPAAL timed automata and using the online testing tool, UPPAAL TRON, the service implementation is validated at runtime against its specifications. Requirement traceability is also addressed in our validation approach with which we can see what service goals are met and trace back the unfulfilled service goals to detect the faults in the design models. A final contribution of the thesis is an implementation of behavioral REST interfaces and service monitors from the service design models. The partial code generation tool creates code skeletons of REST web services with method pre and post-conditions. The preconditions of methods constrain the user to invoke the stateful REST service under the right conditions and the post condition constraint the service developer to implement the right functionality. The details of the methods can be manually inserted by the developer as required. We do not target complete automation because we focus only on the interface aspects of the web service. The applicability of the approach is demonstrated with a pedagogical example of a hotel room booking service and a relatively complex worked example of holiday booking service taken from the industrial context. The former example presents a simple explanation of the approach and the later worked example shows how stateful and timed web services offering complex scenarios and involving other web services can be constructed using our approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The evaluation of investments in advanced technology is one of the most important decision making tasks. The importance is even more pronounced considering the huge budget concerning the strategic, economic and analytic justification in order to shorten design and development time. Choosing the most appropriate technology requires an accurate and reliable system that can lead the decision makers to obtain such a complicated task. Currently, several Information and Communication Technologies (ICTs) manufacturers that design global products are seeking local firms to act as their sales and services representatives (called distributors) to the end user. At the same time, the end user or customer is also searching for the best possible deal for their investment in ICT's projects. Therefore, the objective of this research is to present a holistic decision support system to assist the decision maker in Small and Medium Enterprises (SMEs) - working either as individual decision makers or in a group - in the evaluation of the investment to become an ICT's distributor or an ICT's end user. The model is composed of the Delphi/MAH (Maximising Agreement Heuristic) Analysis, a well-known quantitative method in Group Support System (GSS), which is applied to gather the average ranking data from amongst Decision Makers (DMs). After that the Analytic Network Process (ANP) analysis is brought in to analyse holistically: it performs quantitative and qualitative analysis simultaneously. The illustrative data are obtained from industrial entrepreneurs by using the Group Support System (GSS) laboratory facilities at Lappeenranta University of Technology, Finland and in Thailand. The result of the research, which is currently implemented in Thailand, can provide benefits to the industry in the evaluation of becoming an ICT's distributor or an ICT's end user, particularly in the assessment of the Enterprise Resource Planning (ERP) programme. After the model is put to test with an in-depth collaboration with industrial entrepreneurs in Finland and Thailand, the sensitivity analysis is also performed to validate the robustness of the model. The contribution of this research is in developing a new approach and the Delphi/MAH software to obtain an analysis of the value of becoming an ERP distributor or end user that is flexible and applicable to entrepreneurs, who are looking for the most appropriate investment to become an ERP distributor or end user. The main advantage of this research over others is that the model can deliver the value of becoming an ERP distributor or end user in a single number which makes it easier for DMs to choose the most appropriate ERP vendor. The associated advantage is that the model can include qualitative data as well as quantitative data, as the results from using quantitative data alone can be misleading and inadequate. There is a need to utilise quantitative and qualitative analysis together, as can be seen from the case studies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tämä diplomityö on tehty Lappeenrannassa Telecom Business Research Centerin 5T-projektiin liittyen. Työssä tutkitaan matkaviestinnän lisäarvopalveluiden liiketoimintakonsepteja operaattoreiden näkökulmasta. Lisäarvopalvelut laajentavat operaattoreiden palveluvalikoimaa. Niiden osuuden telekommunikaatioalan yritysten ja erityisesti operaattoreiden tuotoista on ennustettu kasvavan huomattavasti. Työn tärkeimpänä tavoitteena on tuoda uusia näkökulmia ja lisätä ymmärrystä lisäarvopalveluiden liiketoimintakonseptin rakentamisprosessista. Tätä tietämystä käytetään edesauttamaan työn empiirisessä osuudessa tutkitun Content Gateway -tuotteen liiketoimintaa. Tarjoamalla nopean liitynnän ja laskutuskanavan ulkopuolisten palveluntarjoajien ja operaattorin välille tämä tuote mahdollistaa operaattorille ja palveluntarjoajille lisäarvopalveluiden liiketoiminnan käynnistämisen. Lisäarvopalveluiden arvonluontiprosessi vaatii lukuisia yhteistyötä tekeviä osapuolia, joiden yhteistoiminta on dynaamista ja tiedonvälitys avointa, interaktiivista ja nopeaa. Arvonluontiin liittyy myös monia konvergoituvia kehityssuuntia. Perinteinen arvoketjuajattelu on riittämätön uuteen, verkottuneeseen toimintaympäristöön ja sen tilalle on tullut modernimpi arvoverkostomalli. Arvoverkosto luo kilpailuetunsa muita verkostoja vastaan jakamalla resurssit ja kompetenssit optimaalisesti ja liittämällä strategisen ja operationaalisen johtamisen kulttuurit toisiinsa. Tässä työssä verrataan arvoverkoston teoreettisia tavoitteita kahteen lisäarvopalveluiden liiketoimintakonseptiin. Näistä ensimmäinen, i-mode –niminen konsepti on valittu vertailuun edistyksellisyytensä ja tulevaa kehitystä ennakoivien ominaispiirteidensä vuoksi. Toinen esimerkkikonsepti on rakennettu edellä mainitun Content Gateway -tuotteen ympärille. Tutkimus sisältää mm. liikekumppaneiden hankinnan, ansaintalogiikoiden ja verkostojen johtamisen analysoinnin. Työn tuloksena on saatu ohjeita siihen, miten operaattori voi rakentaa tällaista konseptia ja mitä seikkoja tulee ottaa huomioon erityisesti sanomapalveluihin liittyvässä liiketoiminnassa.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The subject of this master’s thesis was developing a context-based reminder service for mobile devices. Possible sources of context were identified and analyzed. One such source is geographical location obtained via a GPS receiver. These receivers consume a lot of power and techniques and algorithms for reducing power consumptions were proposed and analyzed. The service was implemented as an application on a series 60 mobile phone. The application requirements, user interface and architecture are presented. The end-user experiences are discussed and possible future development and research areas are presented.