透過您的圖書館登入
IP:18.223.172.252
  • 期刊
  • OpenAccess

A Mobile Computing Technology Foresight Study with Scenario Planning Approach

並列摘要


Although the importance of mobile computing is gradually being recognized, mobile computing technology development and adoption have not been clearly realized. This paper focuses on the technology planning strategy for organizations that have an interest in developing or adopting mobile computing technology. By using scenario analysis, a technology planning strategy is constructed. In this study, thirty mobile computing technologies are classified into six groups, and the importance and risk factors of these technologies are then evaluated under two possible scenarios. The main research findings include the discovery that most mobile computing software technologies are rated high to medium in importance and low risk in both scenarios, and that scenario changes will have less impact on mobile computing devices and on mobile computing software technologies. These results provide a reference for organizations interested in developing or adopting mobile computing technology.

參考文獻


J. Smajda, Open source and the moral field of computing. Journal of Information Technology & Politics, 8(3), p304-322, 2011. http://dx.doi.org/10.1080/19331681.2011.595333.
G. Gueguen and T. Isckia, The borders of mobile handset ecosystems: Is coopetition inevitable? Telematics and Informatics, 28(1), p5-11, 2011. http://dx.doi.org/10.1016/j.tele.2010.05.007.
H. Bouwman, S. Dihal, M. de Reuver, M. Warnier and C. Carlsson, Mobile cloud computing: State of the art and outlook. info, 15(1), p4-16, 2013. http://dx.doi.org/10.1108/14636691311296174.
C. Watson, J. McCarthy, and J. Rowley, Consumer attitudes towards mobile marketing in the smart phone era. International Journal of Information Management, 33(5), p840-849, 2013. http://dx.doi.org/10.1016/j.ijinfomgt.2013.06.004.
L.A. Mills, G. Knezek, and F. Khaddage, Information seeking, information sharing, and going mobile: Three bridges to informal learning. Computers in Human Behavior, 32, p324-334, 2014.http://dx.doi.org/10.1016/j.chb.2013.08.008.

延伸閱讀