Successful Implementation of Emerging Communication Technologies in a Mobile-Intense Organization

Author(s):  
Keyurkumar J. Patel

Wireless Technology is growing at a phenomenal rate. Of the many present challenges highlighted by the author, increased security is one of the main challenges for both developers and end users. This chapter presents this important security aspect of implementing a mobile solution in the context of Sydney International airport. After tackling initial challenges and issues faced during the implementation of wireless technology, this chapter demonstrates how security issues and wireless application were implemented at this mobile-intense airport organization. The decision to deploy and manage the wireless spectrum throughout the Airport campus meant that the wireless LAN had to share the medium with public users, tenants and aircraft communications on the same bandwidth. Therefore, this case study also demonstrates invaluable approach to protect unintended users from breach of existing security policies adopted by their corporate network. Authentication and data privacy challenges, as well as complete WLAN connectivity for tenants, public and corporate usage is presented in this case study.

Author(s):  
Keyurkumar J. Patel

Wireless Technology is growing at a phenomenal rate. Of the many present challenges highlighted by the author, increased security is one of the main challenges for both developers and end users. This chapter presents this important security aspect of implementing a mobile solution in the context of Sydney International airport. After tackling initial challenges and issues faced during the implementation of wireless technology, this chapter demonstrates how security issues and wireless application were implemented at this mobile-intense airport organization. The decision to deploy and manage the wireless spectrum throughout the Airport campus meant that the wireless LAN had to share the medium with public users, tenants and aircraft communications on the same bandwidth. Therefore, this case study also demonstrates invaluable approach to protect unintended users from breach of existing security policies adopted by their corporate network. Authentication and data privacy challenges, as well as complete WLAN connectivity for tenants, public and corporate usage is presented in this case study.


Author(s):  
Youssef Gahi ◽  
Imane El Alaoui ◽  
Mouhcine Guennoun

Database-as-a-service (DBaaS) is a trend allowing organizations to outsource their databases and computations to external parties. However, despite the many advantages provided by this service in terms of cost reduction and efficiency, DBaaS raises many security issues regarding data privacy and access control. The protection of privacy has been addressed by several research contributions proposing efficient solutions such as encrypted databases and blind queries over encrypted data, called blind processing. In this latter context, almost all proposed schemes consider an architecture of a single user (the data owner) that requests the database server for encrypted records while he is the only one capable of decrypting. From a practical perspective, a database system is set up to support not only a single user but multiple users initiating multiple queries. However, managing various accesses to an encrypted database introduces several challenges by itself, like key sharing, key revocation, and data re-encryption. In this article, we propose a simple and efficient blind processing protocol that allows multiple users to query the same encrypted data and decrypt the retrieved results without getting access to the secret key.


2021 ◽  
Vol 22 (2) ◽  
pp. 161-178
Author(s):  
Martyna Kostrzewska

The smart city concept is a multi-faceted approach to urban development, allowing to combine determinants of competitiveness and sustainable development. Among the many concepts and visions of cities, the concept of intelligent city is becoming more and more popular. A smart city is a city that uses information and communication technologies to increase the interactivity and efficiency of urban infrastructure. The process of transforming urbanized areas under the influence of civilization changes, technological progress, globalization and increase of territorial competitiveness, aging of the society and growing ecological awareness creates new challenges in shaping the human life environment. The paper presents selected results of research on the evaluation of the concept of smart city on the example of Szczecin as an intelligent city. The main goal of the article is to determine the relationship between the concept of a smart city and the competitiveness of a modern city, understood as a standard of living of city’s inhabitants. The research method is a case study, based on a selected example of the city of Szczecin in Poland.


2011 ◽  
pp. 27-53 ◽  
Author(s):  
Clarence N.W. Tan ◽  
Tiok-Woo Teo

This chapter provides an overview of prevailing trends and developments shaping m-Commerce (mobile commerce) and the wireless economy. A detailed roadmap of the evolving mobile technology landscape is first presented. An intuitive review of the many basic underlying building blocks attempts to demystify the alphabet soup that wireless telecommunications infrastructure is often deemed to be. Interesting mobile Internet deployment and adoption demographics are highlighted. Commercial ramifications of actual and potential wireless application implementations are emphasized. Pertinent issues serving to promote or impede m-commerce take-off are examined. A case study is also included, profiling an industry-leading m-Commerce Web portal.


AГГ+ ◽  
2020 ◽  
Vol 1 (8) ◽  
Author(s):  
Miroslav Kostadinović ◽  
Aleksandar Stjepanović ◽  
Goran Kuzmić ◽  
Mirko Stojčić ◽  
Tanja Kostadinović

The subject of the research within the scope of this paper is integrated wired and wireless communication technologies in the process industry, with the aim of keeping up with the world trends in this field, and refers to the following activities. First, a brief overview of the historical development will be provided and the technical characteristics of the industrial protocols that have the greatest application in industrial communication networks will be described. Then, necessary steps to integrate wireless technology within an existing facility with wired devices already installed will be presented. At the end of this paper, the integration of wireless technologies in implementing industrial communication networks will be proposed, which will be verified by analysing the results obtained in a feasibility study for introducing an integrated network model in a real facility in a sugar refinery in Brčko.


Author(s):  
Burak Pak

This paper aims at discussing the potentials of bottom-up design practices in relation to the latest developments in Information and Communication Technologies (ICT) by making an in-depth review of inaugural cases. The first part of the study involves a literature study and the elaboration of basic strategies from the case study. The second part reframes the existing ICT tools and strategies and elaborates on their potentials to support the modes of participation performed in these cases. As a result, by distilling the created knowledge, the study reveals the potentials of novel modes of ICT-enabled design participation which exploit a set of collective action tools to support sustainable ways of self-organization and bottom-up design. The final part explains the relevance of these with solid examples and presents a hypothetical case for future implementation. The paper concludes with a brief reflection on the implications of the findings for the future of architectural design education.


Author(s):  
Isabel Rivers

This chapter analyses the editions, abridgements, and recommendations of texts by seventeenth-century nonconformists that were made by eighteenth-century dissenters, Methodists, and Church of England evangelicals. The nonconformist writers they chose include Joseph Alleine, Richard Baxter, John Flavel, John Owen, and John Bunyan. The editors and recommenders include Philip Doddridge, John Wesley, Edward Williams, Benjamin Fawcett, George Burder, John Newton, William Mason, and Thomas Scott. Detailed accounts are provided of the large number of Baxter’s works that were edited, notably A Call to the Unconverted and The Saints Everlasting Rest, and a case study is devoted to the many annotated editions of Bunyan’s Pilgrim’s Progress and the ways in which they were used. The editors took into account length, intelligibility, religious attitudes, and cost, and sometimes criticized their rivals’ versions on theological grounds.


1970 ◽  
Vol 2 ◽  
pp. 30-38 ◽  
Author(s):  
Bayes Ahmed ◽  
Muhammad Rakibul Hasan Raj ◽  
KM Maniruzzaman

Dhaka City has undergone radical changes in its physical form, not only by territorial expansion, but also through internal physical transformations over the last decades. These have created entirely new kinds of fabric. With these changes, the elements of urban form have changed. Plots and open spaces have been transformed into building areas, open squares into car parks, low land and water bodies into reclaimed built-up lands etc. This research has its general interest in the morphologic change of Dhaka City. It focuses on the spatial dynamics of urban growth of Dhaka over the last 55 years from 1952-2007. In the research, the transformation of urban form has been examined through space syntax. The aim behind using this technique is to describe aspects of relationships between the morphological structure of man-made environments and social structures and events. To conduct this research, Wards 49 and 72 of Dhaka City Corporation were selected as the study areas, of which Ward 72 is an indigenous and Ward 49 is a planned type of settlement. Being a planned residential area, the syntactic measures from this morphological analysis are showing quite unchanged and high values in all phases for Ward 49 and the physical characteristics of Ward 72 (Old Dhaka) still represent the past. The syntactic values are found to be higher for Ward 72 and than Ward 49. Higher values indicate that the street network is highly connective among each other. Time affects differently the layout of cities and the architecture of buildings. Of the many human creations, street systems are among the most resistant to change. This has been emphasized in this study, thereby facilitating the comparison of urban layouts across space and time. The interpretation of history in the light of quantitative accounts, as demonstrated in this study, will be of value to urban planners and urban designers for the future planning of modern Dhaka City.DOI: http://dx.doi.org/10.3329/jbip.v2i0.9554  Journal of Bangladesh Institute of Planners Vol. 2, December 2009, pp. 30-38


2004 ◽  
Vol 23 (1) ◽  
pp. 15-27
Author(s):  
Jason C.H. Chen ◽  
Binshan Lin ◽  
Lingli Li ◽  
Patty S. Chen

Chinese businesses began with a weak foundation in the intense world trade environment, similar to the many other companies that grew from developing countries. How were these Chinese businesses able to compete with foreign competitors armed with strong capital structures and efficient communication networks? Haier is an excellent example of how Chinese companies have successfully adapted to and prospered in the global economy, using information technology as a strategic weapon to improve its competitive advantage and further to create collaborative advantage. Haier's growth is miraculous: in less than two decades, it grew from a state-owned refrigerator factory into an innovative international giant. The company has become China's first global brand and the fifth largest appliance seller in the world. What are the secrets of Haier's success? Many researchers have conducted extensive studies on Haier's management and found the key is Management Information Systems such as e-Commerce and logistics systems that improve business operations between its suppliers, customers, and business partners. This article recounts the journey of Haier's achievements to excellence through its MIS, and provides analyses of the company's business model, the market chain management model.


Sign in / Sign up

Export Citation Format

Share Document