-
Can female fertility management mobile apps be sustainable and contribute to female health care? Harnessing the power of patient generated data ; Analysis of the organizations active in this e-Health segment
Authors:
Maki Miyamoto,
L. F. Pau
Abstract:
In recent years, personal health technologies have emerged that allow patients to collect a wide range of health-related data outside the clinic. These patient-generated data (PGD) reflect patients everyday behaviors including physical activity, mood, diet, sleep, and symptoms. However, major players and academics alike, have ignored the case where these patients or normal people are women. Is ana…
▽ More
In recent years, personal health technologies have emerged that allow patients to collect a wide range of health-related data outside the clinic. These patient-generated data (PGD) reflect patients everyday behaviors including physical activity, mood, diet, sleep, and symptoms. However, major players and academics alike, have ignored the case where these patients or normal people are women. Is analyzed the eHealth segment of female fertility planning mobile apps (in US called: period trackers) and its possible extensions to other female health care mobile services. The market potential is very large although age segmentation applies. These apps help women record and plan their menstruation cycles, their fertility periods, and ease with relevant personalized advice all the uncomfort. As an illustration, the case of a European app service supplier is described in depth. The services of ten worldwide suppliers are compared in terms of functionality, adoption, organization, financial and business aspects. The research question: Can female fertility management mobile apps be sustainable and contribute to female health care, is researched by a combination of academic literature study, testing of 7 essential hypotheses, and a limited user driven experimental demand analysis. Quality and impact metrics from a user point of view are proposed. The conclusion is a moderate yes to the research question, with several conditions. Further research and innovative ideas, as well as marketing and strategic directions are provided, incl. associations with male fertility apps.
△ Less
Submitted 28 September, 2018;
originally announced September 2018.
-
Wireless enabled clothing: New modular technologies and overall supply chain impact
Authors:
L-F Pau
Abstract:
The paper is devoted to the realization of wireless enabled clothing, employing recent new technologies in electronics, textile, and renewable power. This new wireless enabled clothing architecture is modular and distributed,allowing for customization in functionality and clothing designs. Are studied the implications for supply chains,distribution channels, and cost benefits. Modular wireless ena…
▽ More
The paper is devoted to the realization of wireless enabled clothing, employing recent new technologies in electronics, textile, and renewable power. This new wireless enabled clothing architecture is modular and distributed,allowing for customization in functionality and clothing designs. Are studied the implications for supply chains,distribution channels, and cost benefits. Modular wireless enabled clothing offers significant personalization opportunities at costs comparable with mobile terminals.
△ Less
Submitted 12 July, 2017;
originally announced July 2017.
-
From Digital computers to quantum computers based on biological paradigms and progress in particle physics
Authors:
P. N. Borza,
L-F Pau
Abstract:
While several paths have emerged in microelectronics and computing as follow-ons to Turing architectures, and have been implemented using essentially silicon circuits, very little beyond Moore research has considered: (1) first biological processes instead of sequential instructions, and, (2) the implementation of these processes exploiting particle physics interactions. This last combination enab…
▽ More
While several paths have emerged in microelectronics and computing as follow-ons to Turing architectures, and have been implemented using essentially silicon circuits, very little beyond Moore research has considered: (1) first biological processes instead of sequential instructions, and, (2) the implementation of these processes exploiting particle physics interactions. This last combination enables native spatial-temporal integration and correlation, but also powerful interference filtering, gating, splitting and more. These biological functions, their realization by quantum and charge carrier interactions, allow proposing a novel computing architecture, with interfaces, information storage, and programmability. The paper presents the underlying biological processes, the particle physics phenomena which are exploited, and the proposed architecture, as well as an algebraic design formalism.
△ Less
Submitted 24 September, 2016;
originally announced September 2016.
-
Botnet economics and devising defence schemes from attackers own reward processes
Authors:
L-F Pau
Abstract:
This paper focuses on botnet economics and design of defensive strategies. It takes the view that by combining scarce information on the attackers business models, with rational economic analysis of these business processes, one can identify design rules for economic defense mechanisms which the target can implement, often in a cheap way in addition to technical means. A short survey of game theor…
▽ More
This paper focuses on botnet economics and design of defensive strategies. It takes the view that by combining scarce information on the attackers business models, with rational economic analysis of these business processes, one can identify design rules for economic defense mechanisms which the target can implement, often in a cheap way in addition to technical means. A short survey of game theory in the security area, is followed by a real case of an Internet casino. This leads to develop a model, applicable to this case and others, which is presented first qualitatively then quantitatively. This allows carrying out different analyses based on different equilibrium or termination principles; the ones studied are reward break-even analysis, and Max-Min analysis from game theory, for the target and the attackers. On that basis, a number of specific economic and information led defense strategies are identified which can be further studied using the model and specific adaptations to other data or cases.
△ Less
Submitted 13 August, 2013;
originally announced September 2013.
-
Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures
Authors:
L. -F. Pau
Abstract:
This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks. It is based on time preference dynamics applied to the monetary mass for the restoration of capabilities, on long term investments to rebuild capabilities, and of the usability level of the capabilities after an attack. A simple illustrative exam…
▽ More
This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks. It is based on time preference dynamics applied to the monetary mass for the restoration of capabilities, on long term investments to rebuild capabilities, and of the usability level of the capabilities after an attack. A simple illustrative example is provided for a denial of service on a corporate data centre. The needed data collection methodologies are categorized by classes of targets. The use of the method is explained in the context of legal or policy driven dissuasive, retaliation or compensation/ restoration actions. A concrete set of deployment cases in mobile communications services is discussed. The conclusion includes policy recommendations as well as information exchange requirements.
△ Less
Submitted 13 August, 2013;
originally announced August 2013.
-
How and why communications industry suppliers get squeezed out: now, and the next phase
Authors:
L. F. Pau
Abstract:
The communications systems, terminals, software and deployment service, industries, have undergone the past ten years a significant technological internal evolution and external revolution at customer end (such as Internet, Mobile networks and terminals, Broadband,..). Very little management research has studied their financial survivability irrespective of changes in demand volumes in the present…
▽ More
The communications systems, terminals, software and deployment service, industries, have undergone the past ten years a significant technological internal evolution and external revolution at customer end (such as Internet, Mobile networks and terminals, Broadband,..). Very little management research has studied their financial survivability irrespective of changes in demand volumes in the present technological /organizational cycle. This paper analyzes the implications of genuine open mandated communications standards, of higher product volumes, of very high R&D, of the larger use of sourced /purchased technologies, and of contract manufacturing. The methodology used is equilibrium analyses. Two specific areas will be mentioned as examples. The paper also shows how eventually those industries in a later cycle will bounce back.
△ Less
Submitted 13 August, 2013;
originally announced August 2013.
-
Smart business networks and business genetics with a high tech communications supplier selection industry case
Authors:
L. F. Pau
Abstract:
Despite the emergence of event driven business process management, smart business networks, social networks, etc. as important research areas in management, for all the attractiveness of these concepts, two major challenges remain around their design and the partner selection rules while learning from interaction events.While smart business networks should provide advantages due to the quick conne…
▽ More
Despite the emergence of event driven business process management, smart business networks, social networks, etc. as important research areas in management, for all the attractiveness of these concepts, two major challenges remain around their design and the partner selection rules while learning from interaction events.While smart business networks should provide advantages due to the quick connect of business partners for selected functions in a process common to several parties, literature does not provide constructive methods whereby the selection of temporary partners and functions can be done. Most discussions only rely solely on human judgment. This paper introduces both computational geometry, and genetic programming, as systematic methods whereby to identify, characterize, and then display on a continuing basis from event monitoring such possible partnerships; such techniques also allow to plan for their effect on the organizations and thus to carry out selection. The two methods are being put in the context of emergence theory. Tessellations address the identification and categorization issues; business maps address the display and monitoring challenge with the use of Voronoii diagrams. Cellular automata mimicking living bodies, with genetic algorithms of which parameters are estimated by learning, address the selection and effect issues. To illustrate the approach, some experimental results from the sourcing function in a high tech industry, are discussed; they address the case of how to determine the selection process for a systems integrator to set up joint ventures with smaller technology suppliers.
△ Less
Submitted 13 August, 2013;
originally announced August 2013.
-
Mobile operators as banks or vice-versa? and: regulators interest in the best efficiency for payments
Authors:
L. F. Pau
Abstract:
This paper addresses the strategic challenges of deposit banks, and payment clearinghouses, posed by the growing role of mobile operators as collectors and payment agents for flows of cash for themselves and third parties. Through analysis and data analysis from selected operators, it is shown that mobile operators achieve as money flow handlers levels of efficiency, profitability,and risk control…
▽ More
This paper addresses the strategic challenges of deposit banks, and payment clearinghouses, posed by the growing role of mobile operators as collectors and payment agents for flows of cash for themselves and third parties. Through analysis and data analysis from selected operators, it is shown that mobile operators achieve as money flow handlers levels of efficiency, profitability,and risk control comparable with deposit banks. Furthermore, the payment infrastructures deployed by both are found to be quite similar, and are analyzed in relation to financial profitability, strategic challenges and opportunities. This paves the way to either mobile operators taking a bigger role,or for banks to tie up such operators to them even more tightly,or for alliances/mergers to take place,all these options being subject to regulatory evolution which is analyzed as well . The consequences are mapped out in operational and regulatory terms
△ Less
Submitted 13 August, 2013;
originally announced August 2013.
-
ERP projects Internal Stakeholder network and how it influences the projects outcome
Authors:
K. Jaaskelainen,
L-F Pau
Abstract:
So far little effort has been put into researching the importance of internal ERP project stakeholders mutual interactions,realizing the projects complexity,influence on the whole organization, and high risk for a useful final outcome. This research analyzes the stakeholders interactions and positions in the project network, their criticality, potential bottlenecks and conflicts. The main methods…
▽ More
So far little effort has been put into researching the importance of internal ERP project stakeholders mutual interactions,realizing the projects complexity,influence on the whole organization, and high risk for a useful final outcome. This research analyzes the stakeholders interactions and positions in the project network, their criticality, potential bottlenecks and conflicts. The main methods used are Social Network Analysis, and the elicitation of drivers for the individual players. Information was collected from several stakeholders from three large ERP projects all in global companies headquartered in Finland, together with representatives from two different ERP vendors, and with two experienced ERP consultants. The analysis gives quantitative as well as qualitative characterization of stakeholder criticality (mostly the Project Manager(s), the Business Owner(s) and the Process Owner(s)), degree of centrality, closeness, mediating or bottleneck roles, relational ties and conflicts (individual, besides those between business and project organizations), and clique formations. A generic internal stakeholder network model is established as well as the criticality of the project phases. The results are summarized in the form of a list of recommendations for future ERP projects to address the internal stakeholder impacts .Project management should utilize the latest technology to provide tools to increase the interaction between the stakeholders and to monitor the strength of these relations. Social network analysis tools could be used in the projects to visualize the stakeholder relations in order to better understand the possible risks related to the relations (or lack of them).
△ Less
Submitted 13 August, 2013;
originally announced August 2013.