Search results for "Internet"
showing 10 items of 2589 documents
Software-as-a-Service Revenue Models
2013
This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.
A modelling framework for social media monitoring
2013
This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…
Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications
2014
Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…
Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work
2013
Non-work-related personal use of the Internet within organizations has received increased attention from scholars. We increase previous understanding of this phenomenon by proposing a novel model based on the theory of interpersonal behavior (TIB). The TIB includes previous researched constructs (i.e., attitudes, social influence, and intentions) as well as emotional factors, habits, and different sources of social influence. Our results (N=238) suggest that the model well predicts the use of the Internet at work for non-work purposes. Our results shed new light on the influence of habit, affect, role, and self-concept in the use of the Internet.
User session level diverse reranking of search results
2018
Most Web search diversity approaches can be categorized as Document Level Diversification (DocLD), Topic Level Diversification (TopicLD) or Term Level Diversification (TermLD). DocLD selects the relevant documents with minimal content overlap to each other. It does not take the coverage of query subtopics into account. TopicLD solves this by modeling query subtopics explicitly. However, the automatic mining of query subtopics is difficult. TermLD tries to cover as many query topic terms as possible, which reduces the task of finding a query's subtopics into finding a set of representative topic terms. In this paper, we propose a novel User Session Level Diversification (UserLD) approach bas…
Mobile Banking Services Continuous Usage -- Case Study of Finland
2016
Finland is at the forefront of using new information systems, such as mobile banking (m-banking). The present study develops and tests a model of continuous usage intentions toward m-banking services for a sample of 273 Finnish m-banking users. Results confirm the hypothesized direct relationships between self-congruence and perceived value, perceived risk and perceived value, perceived value and continuous usage, and continuous usage and word of mouth. The frequency of usage of m-banking services and experience moderate the relationship between perceived value and continuous usage. We discuss the theoretical and managerial implications of the study results and present recommendations for f…
H.264 QoS and Application Performance with Different Streaming Protocols
2015
Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed
Online activity traces around a "Boston bomber"
2013
This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.
Internet Adoption at the User Level: Empirical Evidence from The Gambia
2014
The unified theory of acceptance and use of technology (UTAUT) are used to investigate technology adoption. However, its application in Sub-Saharan Africa is rare and barely extended to the validation phase. In this paper, we introduce six new moderating factors for UTAUT core determinants and two other direct determinants of Internet adoption. The objective of this approach is to identify relevant elements of Internet adoption at the user level in The Gambia. Moderating factors are interacting terms used when the relationship between independent and dependent variable is weak, inconsistent or non-existent. A case study research design was employed and the data were gathered in Autumn of 20…