Search results for "Internet"

showing 10 items of 2589 documents

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct

A modelling framework for social media monitoring

2013

This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…

ta113Graph databaseComputer Networks and Communicationsbusiness.industryComputer scienceRelational databaseSocial realitySchematiccomputer.software_genreTemporal databaseHardware and ArchitectureGraph (abstract data type)The InternetSocial mediaData miningbusinesscomputerInformation SystemsInternational Journal of Web Engineering and Technology
researchProduct

Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications

2014

Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…

ta113Information Systems and ManagementHypertext Transfer Protocolta213Cost efficiencyComputer scienceSmart objectsbusiness.industrycomputer.internet_protocolta111Computer securitycomputer.software_genreManagement Information SystemsConstrained Application ProtocolWeb of ThingsArts and Humanities (miscellaneous)Developmental and Educational PsychologyOverhead (computing)businessta512Protocol (object-oriented programming)computerInformation SystemsComputer networkDecision Support Systems
researchProduct

Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work

2013

Non-work-related personal use of the Internet within organizations has received increased attention from scholars. We increase previous understanding of this phenomenon by proposing a novel model based on the theory of interpersonal behavior (TIB). The TIB includes previous researched constructs (i.e., attitudes, social influence, and intentions) as well as emotional factors, habits, and different sources of social influence. Our results (N=238) suggest that the model well predicts the use of the Internet at work for non-work purposes. Our results shed new light on the influence of habit, affect, role, and self-concept in the use of the Internet.

ta113Information Systems and Managementbusiness.industrymedia_common.quotation_subjectAffect (psychology)Work relatedInterpersonal behaviorManagement Information SystemsWork (electrical)PhenomenonThe InternetHabitbusinessPsychologySocial psychologyInformation SystemsSocial influencemedia_commonInformation & Management
researchProduct

User session level diverse reranking of search results

2018

Most Web search diversity approaches can be categorized as Document Level Diversification (DocLD), Topic Level Diversification (TopicLD) or Term Level Diversification (TermLD). DocLD selects the relevant documents with minimal content overlap to each other. It does not take the coverage of query subtopics into account. TopicLD solves this by modeling query subtopics explicitly. However, the automatic mining of query subtopics is difficult. TermLD tries to cover as many query topic terms as possible, which reduces the task of finding a query's subtopics into finding a set of representative topic terms. In this paper, we propose a novel User Session Level Diversification (UserLD) approach bas…

ta113InternetInformation retrievalWeb search queryuser sessionComputer scienceCognitive NeuroscienceInformationSystems_INFORMATIONSTORAGEANDRETRIEVAL02 engineering and technologyGraphComputer Science Applicationssearch result rerankingQuery expansionsession graphArtificial IntelligenceWeb query classification020204 information systems0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)020201 artificial intelligence & image processingtiedonhakuhakutuloksetsearch result diversification
researchProduct

Mobile Banking Services Continuous Usage -- Case Study of Finland

2016

Finland is at the forefront of using new information systems, such as mobile banking (m-banking). The present study develops and tests a model of continuous usage intentions toward m-banking services for a sample of 273 Finnish m-banking users. Results confirm the hypothesized direct relationships between self-congruence and perceived value, perceived risk and perceived value, perceived value and continuous usage, and continuous usage and word of mouth. The frequency of usage of m-banking services and experience moderate the relationship between perceived value and continuous usage. We discuss the theoretical and managerial implications of the study results and present recommendations for f…

ta113Mobile bankingbusiness.industry05 social sciencesWord of mouthSample (statistics)AdvertisingRisk perception0502 economics and businessInformation systemmobile banking050211 marketingThe InternetBusinessMarketingta512Value (mathematics)Finland050203 business & managementConsumer behaviour2016 49th Hawaii International Conference on System Sciences (HICSS)
researchProduct

H.264 QoS and Application Performance with Different Streaming Protocols

2015

Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed

ta113Protocol (science)HLSbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceReal-time computingstreaming protocolsQoSFrame rateRTSPTest sequenceUser experience designRTMPReal Time Streaming ProtocolQoEH.264businesscomputerComputer networkProceedings of the 8th International Conference on Mobile Multimedia Communications
researchProduct

Online activity traces around a "Boston bomber"

2013

This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.

ta113Social networkbusiness.industryInternet privacyTragedy (event)ComputingMilieux_LEGALASPECTSOFCOMPUTINGThe InternetSocial mediaSociologySuspectbusinessWeb crawlerDigital mediaProceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
researchProduct

Internet Adoption at the User Level: Empirical Evidence from The Gambia

2014

The unified theory of acceptance and use of technology (UTAUT) are used to investigate technology adoption. However, its application in Sub-Saharan Africa is rare and barely extended to the validation phase. In this paper, we introduce six new moderating factors for UTAUT core determinants and two other direct determinants of Internet adoption. The objective of this approach is to identify relevant elements of Internet adoption at the user level in The Gambia. Moderating factors are interacting terms used when the relationship between independent and dependent variable is weak, inconsistent or non-existent. A case study research design was employed and the data were gathered in Autumn of 20…

ta113VariablesPublic Administrationbusiness.industrymedia_common.quotation_subjectDevelopmentUnified theory of acceptance and use of technologyComputer Science ApplicationsPyramidCase study researchThe InternetMarketingPsychologyEmpirical evidencebusinessmedia_commonInformation Technology for Development
researchProduct

Detection of Fake Profiles in Social Media - Literature Review

2017

ta113identiteettiväärennöksetfalse identitiessocial network analysisverkkoprofiilitComputer sciencebusiness.industrysocial mediaInternet privacysosiaalinen mediafake profilesväärennöksetidentiteettiSocial mediata518businessProceedings of the 13th International Conference on Web Information Systems and Technologies
researchProduct