Anda di halaman 1dari 7

SMART PHONES

1. Chih-Hsuan Wang. (Incorporating the concept of systematic innovation into quality function
deployment for developing multi-functional smart phones May 2017)
Smartphone has been recognized as one of the most prevailing products because of its portability, ubiquitous
computing, multi-functionality, and wireless connectivity (Barkhuus & Polichar, 2010). In particular,
consumers can actively adapt and adopt different portfolios of APPs to fit their individual needs and lifestyles.
According to the IDCs statistical profile in 2015, annual market growth of smart phone is more than 20% so
far. In brief, the popularity of smart phones arises from many drivers, such as wireless internet access,
geographical positioning, electronic wallet application, social community connectivity, excellent photo quality
and video recording (Lin et al., 2008; Tan et al., 2009). In fact, smartphone has incorporated multiple functions
of the conventional devices, such as personal digital assistant (PDA), global positioning system (GPS), music
player (MP3), and etc. Two categories of mobile phones (Wang & Wu, 2014) have been analyzed, including
multi-media phone (emphasizing photo quality) and social-media phone (emphasizing network connectivity).
Obviously, the conventional PDA, multi-media phone and social-media phone are now fused into modern
smart phones. Very interestingly, two industrial findings are observed in recent years: on the one end, the
boundary between smart phones and other consumer electronics (like digital cameras and tablets) is becoming
more and more blurred (Wang & Wu, 2014; 4 Wang, 2015a) because smart phones have significantly replaced
low-end digital cameras and small-sized tablets. On the other hand, the market shares of smart phones among
brand companies have been intensively fluctuating, especially when the wireless technology has been shifting
from the second generation to the third and to the forth. For example, Nokia was merged by Micro-soft in
2014. Motorola was firstly acquired by Google and now acquired under Lenovo. As shown in Fig. 1, the top
five phone vendors in 2015 (quarter 2) are sequentially ranked as: Samsung (21%), Apple (14%), Huawei
(8.7%), Xiaomi (5.6%), and Lenovo (4.7%). So far, Samsung has lost at least 10% market share and yielded its
preoccupied territory to three Chinese brands, like Huawei, Xiaomi, and Lenovo. Apparently, to survive in a
dramatically booming as well as saturated business environment, it is of importance to continually design
attractive alternatives for acquiring distinct niche segments (Fogliatto et al., 2008; Wang & Chen, 2012). A
good example is like Apples iMac, iPod, iPhone, iPad, iWatch, and Apple TV series, which have been
heralded as an aesthetic revolution in industrial design (Chen & Chuang, 2008). Similarly, a famous slogan
proposed by Nokia- Technology always originates from the humanity, also reflects that brand companies
should stand and think at the perspectives of consumers. Actually, user preferences and user perceptions are
not only critical to stimulate product sales but also significant to 5 consolidate firms product image (Wang,
2015a; 2015b). In an effort to meet dynamically changing customer desires, capturing user preferences and
user perceptions and incorporating them into the process of market segmentation and product development is
key to survival and prosperity of brand companies. To the best of our knowledge, numerous schemes have
been presented to elicit user preference or capture user perception, such as analytical hierarchy process, multi-
attributed utility theory, quality function deployment, conjoint analysis, Kano model, and Kansei engineering
(Sireli et al., 2007; Kwong et al., 2011a; 2011b; Luo et al., 2012). Despite some of the above-mentioned
studies have successfully incorporated user aspects into the entire decision-making process, most of them are
deficit in tackling engineering conflicts to generate inventive design. Although the compromised design is
easier to be implemented, it is difficult to stimulate huge product sales, especially when facing a saturating
market like todays smart phones. Consequently, a novel framework combining quality function deployment
(QFD) with the theory of inventive problem solving (TRIZ) is presented in this paper. Inspired by the
aforementioned industrial trends and the past publications, this paper attempts to provide a systematic way to
help brand companies trace the past route, review current alternatives, and forecast future trends of smart
phones. In particular, the following issues are explored and addressed: 6 How to partition a heterogeneous
market into the ad-hoc niche segments in terms of marketing requirements? How to overcome engineering
conflicts among technical attributes to generate innovative ideas rather than focusing on the compromised
alternatives? How to identify the key features for catching up the new trends of smart phones with regard to
the previously partitioned niche segments? The remaining of this paper is organized as follows. Section 2
introduces the concept of QFD and TRIZ. Section 3 presents the proposed framework. A real case is
demonstrated in Section 4. Concluding remarks are drawn in Section 5.

MOBILE APPLICATION
1. Asta Tarute, Shahrokh Nikou, Rimantas Gatautis (Mobile Application Driven Consumer Engagement
July 2017)

The extensive use of smart mobile devices and mob ile applications provides new opportunities for
companies. The modern consumer is often referred as to be social, local, and mobile (Marsden and Chaney,
2013). The convergence of users locality, mobility, and sociability aspects require a deeper understanding of
consumer behavior. These changes of consumer behavior impose new challenges to companies seeking to
influence consumer behavior by making use of mobile technologies. Therefore, in response to these changes,
companies 1 Corresponding author: Shahrokh Nikou, Faculty of Social Sciences, Business and Economics
bo Akademi University. Email: snikou@abo.fi. Tel: + 358 41 455 3191 are met with questions, as for how to
make better use of mobile devices to engage consumers. The phenomenon of consumer engagement has raised
significant interest both in academia (Avnet and Higgins, 2006; Higgins and Scholer, 2009; Brodie et al., 2011;
Hollebeek, 2011a, b; Vivek, Beatty, Morgan, 2012; Zakir, 2013; Dessart, Veloutsou and Morgan-Thomas,
2015) and also in business sectors. Renowned research and advertisement agencies such as Nielsen Media
Research, Gallup Group, American Association of Advertising Agencies expressed their interest in consumer
engagement for the last twenty years. Moreover, consumer engagement is considered to be one of the primary
marketing research areas according to Marketing Science Institute (2014). However, there is little consensus in
scientific literature regarding antecedents and consequences of consumer engagement in a traditional physical
context (Vivek et al., 2012; Gummerus et al., 2012; Hollebeek and Chen, 2014), let alone in a context that is
virtual and, or mobile (Wirtz et al., 2013; Kim, Kim and Wachter, 2013). Literature informs us that consumer
engagement is dynamic and complex multidimensional concept. For instance, Bowden (2009) defines it as
psychological process that leads to the formation of loyalty and Patterson et al. (2006) define it as
psychological state that is characterized by a degree of vigor, dedication, absorption and interaction. van Doorn
et al. (2010) postulate the consumer engagement as the behavioral manifestation from a consumer toward a
brand or a firm which goes beyond purchase behavior (p.254). In this research, we borrow the definition
provided by Vivek et al. (2012) and state that consumer engagement is the intensity of an individual's
participation in and connection with an organization's offerings and activities, which either of the parties
initiate. We further argue that consumer engagement is composed of cognitive, emotional, behavioral, and
social elements. The ability to engage consumers is necessary to capture and retain market share in a highly
competitive market, specifically in the mobile applications market. The number of mobile applications is
rapidly increasing, but the margins per sales are very low (Lim et al., 2015; Dovaliene, Masiulyte, and
Piligrimiene, 2015). A plausible explanation for this observed phenomenon is that consumers are overwhelmed
with increasing numbers of mobile applications every day. Deciding which application to adopt and to use is a
challenging task. According to Gartner (2014; 2016), mobile devices continue to proliferate, and companies
need to develop applications complying with the needs of mobile consumer in their ever changing contexts and
environments. Considering this, companies, their marketers, designers and business developers, are obliged to
carefully rethink opportunities for application development and strategies. The literature (c.f. Hoehle &
Venkatesh, 2015; Deloitte, 2012) shows the research results of number of mobile applications and the actual
scale of use. Interestingly, in 2010-2011, only 1% of all available mobile applications is downloaded for over a
million times, and every fourth of the downloaded applications are not used more than once. A total of 80% of
all mobile applications are downloaded for less than 1000 times (Deloitte 2012; Dredge 2011). Moreover,
recent statistical data shows similar tendencies, 25% of installed mobile applications are never used and 26%
of installed mobile applications are abandoned after the first use (Google/Ipsos, May 2015). These numbers
suggest a lack of familiarity and a weak consumer engagement with applications. From an academic research
perspective, there is a lack of research focusing on the relations and causality between mobile applications,
consumer engagement and their potential consequences for continuous usage of the applications. Even though
several studies related to mobile technologies and consumer engagement exist (Bellman et al., 2011; Kim et
al., 2013), prior research results are fragmented and inconclusive. For example, Bellman et al. (2011) only
determine whether using mobile applications affects brand attitude and brand purchase intention and do not
explicitly investigate the relationship between mobile applications and consumer engagement. Moreover, there
is a significant knowledge gap discussing the relation between specific features and usage of mobile
applications in understanding the specific role of consumer engagement. Despite growing interest from
academic research, consumer engagement in a mobile environment specifically with regard to mobile
applications is, to the best of our knowledge, not explored. This paper addresses this limitation and fills this
gap in part by theoretically conceptualizing and empirically validating the model to measure consumer
engagement in relation to specific features and continuous usage of mobile applications. We aim to identify
features of mobile application that are significant for consumer engagement and may lead to repetitive usage of
mobile applications. This paper is organized as follows. Section two provides an overview of existing
consumer engagement literature, followed by discussions on consumers motivation to engage with and via
mobile applications and the features of such applications that potentially impact mobile consumer engagement.
Next, the importance and nature of features of mobile applications to consumer engagement are discussed.
Section three provides the research methodology, followed by the section in which results are presented.
Section five provides the discussion of the findings and section six concludes the paper with the theoretical and
practical contributions, limitations, and suggestions for future research.

APPLICATION SECURITY

1. Pan Ping, Zhu Xuan, Mao Xinyue (Research on security test for application software based on
SPN 2017)

The generation, development and extensive application of giant complex intelligent systems such as cloud
computing, big data, the Internet of things and the physical information fusion system, shows the great changes
in human lifestyle, represents the modern human life desire for the science and technology, especially the
reliance on information technology as the core of life. At the same time, hardware products such as the
microelectronics integration technology, required to meet the reliability requirement of scientific research and
human activity, meanwhile, the security requirements of the software have been improved. Software security
testing is a process to verify whether the software meets the expected functional requirements and security
requirements, and discovery potential security flaws in the software. It mainly includes User Authentication,
System Network and Database * Corresponding author. Tel.: +86-187-9801-0052. E-mail address:
zhuxuan0429@outlook.com 2017 Published by Elsevier Ltd. This is an open access article under the CC
BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of
the organizing committee of the 13th Global Congress on Manufacturing and Management Pan Ping et al. /
Procedia Engineering 174 ( 2017 ) 1140 1147 1141 security testing. Due to the different security
requirements test strategy is also different. Currently, the software security testing methods mainly include the
static analysis testing, the mode-based testing, the fuzzy testing, and the fault injection-based testing, the fault
tree-based testing, penetration testing and so on. Chen et al[1] believe that the software testing by the fault
injection may cause extra burden to the software, affect its performance, and produce intermittent error or
uncertain error; Xu et al[2] use the formal fault tree technology to explore software security requirement, and
propose using the minimum cut set of security incidents to generate test cases; Yang et al[3] derive threat
behavior trajectory from known security threat model, and propose generating test cases according to certain
test strategy, which is used to test whether program behavior is contained within the model library of security
threats. Although these thinking methods provide some theoretical basis and method, however, it is not hard to
find that these methods are based on some known parameters, and dont take the random of actual application
of software into account. Because of the software safety evaluation is subject to many factors, and the factor is
random. Zhao et al [4] has been proved that using Petri net (PN) not only can well describe the software
architecture, but also present the software working process and the relationship between software modules at
the same time. Wei et al [5] further proves that using PN method for software security analysis can quickly
generate minimum cut set and test cases set. Therefore, this paper introduced SPN theory as the foundation to
analyze the security testing of application software in terms of the failure of software security. Simulation
results show that this method can maintain its consistency in various environments, with high precision and
low-cost evaluation of the characteristics, and meanwhile provides a reliable and effective theory and method
for the security software evaluation.

ONLINE PAYMENT
1. Jing-Jang Hwanga,*, Tzu-Chang Yehb,c, Jung-Bin Lib (Securing on-line credit card payments
without disclosing privacy information 2003)

Information privacy is defined as an individuals claim to control the terms under which personal
informationinformation identifiable to the individualis acquired, disclosed, and used [1]. It has been a
critical concern long there before the advent of computers. As computer technologies advance and the
popularity of Internet grows, personal information could be recorded, gathered, analyzed, and misused easier
than ever. Privacy protection is therefore becoming an important issue in the cyber era. Especially when it
comes to on-line credit card payments. Not just only because this payment method has been becoming the
trend of modern consuming practice, but also it involves the sensitivity of personal information. One of
GartnerG2s reports [2] shows that 0920-5489/02/$ - see front matter D 2002 Elsevier Science B.V. All rights
reserved. doi:10.1016/S0920-5489(02)00102-2 * Corresponding author. Tel.: +886-3-3283016x5815; fax:
+886-3-3271304. E-mail address: jjhwang@mail.cgu.edu.tw (J.-J. Hwang). www.elsevier.com/locate/csi
Computer Standards & Interfaces 25 (2003) 119 129 approximately 60% of on-line adults in the US do not
do business on the web due to security and privacy concerns. Another Gartners report [3] indicates that credit
cards are used for 93% of all transactions in the on-line world. The Information Technology Association of
America found that 74% of Americans are worried that their personal information on the Internet could be
stolen or used for malicious purpose [4]. Therefore, the issue of privacy protection for on-line credit card
payments is in great need to be addressed for the development of electronic commerce. With a growing scale
of wide acceptance and a mature business operation infrastructure, payment by credit card has been a common
payment method in the physical world. This method has also been commonly applied on-line, but cardholders
confidence needs to be improved. Taking advantage of its convenience, Secure Sockets Layer (SSL) has
become the most widely used protocol for on-line credit card payments nowadays. However, it is designed
only to provide a private and reliable channel between two communicating entities. Unscrupulous merchants
can steal cardholders credit card information that contains the key elements needed to counterfeit credit cards
and/or to initiate fraudulent transactions. Secure Electronic Transaction (SET) [5 8], the secure electronic
transaction protocol proposed by VISA International and MasterCard International, is deemed to be a de facto
standard. But, there is agreement in the market that SET has not taken off. The complexity and cost of
implementing SET have been obstructing barriers. Moreover, some researchers [8] pointed out that SET does
not address the concern of data aggregation. Constrained by being an extension of the existing card payment
networks to the Internet, the acquirer can obtain the cardholders card number and the issuer has a complete
record of the cardholders credit card transactions which could be aggregated for further analysis. Recently the
successor of SET, 3D SET (3 Dimension SET) [9], is proposed to improve the portability and the flexibility for
cardholders to pay on-line. The core protocol of 3D SET is the same as that of SET. Based on the inherent
assumption that banks are trustworthy, all the transaction details and history of the cardholder are stored at the
bank. Having long been trusted by cardholders, banks can always access to sensitive data over their
cardholders, which they should not know. However, negative impacts such as banking scandals, closure
programs due to poor management, and security problems with Internet banking are all undermining
cardholders trust in banks. The Behrenss report from GartnerG2 [2] shows that 86% of on-line American
adults are very concerned about the security of bank and brokerage account numbers when doing on-line
transactions. According to Riems survey [10], a serious case happened in December 2000 draws much
attention. Halifax, a British bank, was forced to shut down one of its credit card sites after leaving cardholder
details exposed. Three of the largest British banks have also been identified as having security holes in their
systems. Academically, some protocols are also proposed in recent papers to improve the privacy protection
for cardholders [8,11,12]. In this paper, we first examine the necessary privacy protection for on-line credit
card payments, and then analyze the protection on the major protocols that are either in use or proposed in
recent papers. Based on the need-to-know principle proposed in Refs. [8,13,14], transaction information should
be available only to parties that need it to avoid data aggregation and misuse. Two revisions of the original
SET protocol are proposed to conceal cardholders identities in the electronic marketplace. Cardholders trust
for banks can thus be reduced to a minimum. A cardholder needs only to select a trustworthy issuer, instead of
worrying about the possible breakdowns of every involved acquirer.

WEBSITE
1. Li Lia, Maojuan Penga, Nan Jiangb,, Rob Law (An empirical study on the influence of economy hotel
website quality on online booking intentions 2017)

The reservation behavior of hotel consumers in China is gradually changing along with the increasing
popularity of the Internet and the low threshold and ease of use of network technologies. An increasing number
of Chinese consumers are more inclined to book their rooms online than on-site or over the phone. According
to Chinas Online Travel Market Trend Prediction, 20142017 published by EnfoDesk in 2015, the online
travel market deals in China will steadily grow and reach 352.4 billion by 2015; this figure is 25.9% larger
than that in 2014. By 2017, the market size is estimated to reach 498.3 billion. These figures indicate the bright
future of the online travel market in China.
Economy hotels are a new sector of the hotel industry in China that has developed rapidly since 2000 (Shen et
al., 2014). However, the economy hotel industry in China currently faces several
Li Li and Maojuan Peng are affiliated with the School of
Tourism and Hospitality Management of South China
University of Technology, Guangzhou, China, where Li Li is
a Professor, and Maojuan Peng is a postgraduate. Nan Jiang
and Rob Law are affiliated with the School of Hotel and
Tourism Management of the Hong Kong Polytechnic
University, where Nan Jiang is a doctoral student and Rob
Law is a Professor.
Corresponding author.
E-mail addresses: lligd@scut.edu.cn (L. Li),
pengmaojuan@qq.com (M. Peng), 51146059@qq.com (N.
Jiang), rob.law@polyu.edu.hk (R. Law).

http://dx.doi.org/10.1016/j.ijhm.2017.01.001
0278-4319/ 2017 Elsevier Ltd. All rights
reserved.
challenges. Given the delays in the construction of hotel websites, the economy hotel industry heavily relies on
online travel agencies (OTAs), such as Ctrip and Elong. The hotel during the preliminary stage requires
network intermediaries for advertising and sales to compensate their inadequate distribution power. However,
the rise of network intermediaries has inevitably led to high commissions and a channel monopoly, thereby
threatening the hotel industry. Therefore, online direct selling has become a common trend in the development
of the Chinese economy hotel industry. Given great efforts to develop direct-selling channels and the
constantly increasing investments in economy hotel websites, the hotel industry is concerned with whether
hotel websites can offer users a positive experience and encourage online direct sales.
The hotel online booking platform and its related issues have been investigated in literature because of their
significance to online travel. Most scholars have evaluated the hotel website from various perspectives,
including website design, functions, and characteristics; however, only a few researchers have explored the
influence of hotel website quality, specifically economy hotel website quality, on consumer psychology and
behavior. Previous studies suggest that hotel website quality profoundly and positively influence the
willingness of consumers to book rooms online (Bai et al., 2008; Wang et al., 2015). However, most of these
studies have focused on high-end international brands and ignore economy hotels, which also comprise a large
market in the industry.
Economy hotels are also referred to as budget hotels or limited service hotels and are different from hotels
that provide full service; this type of hotels originated in the United States after the Second World War when
the US economy recovered with the development of its highway system (Senior and Morphew, 1990). Zou
(2003) defined economy hotels as hotels that provide professional services and affordable price to public
consumers. Given that different types of hotels target various classes of customers, their hotel website
requirements also differ. Trust plays an important role in online reservations because of the inherent risks in
availing online services (Wang and Emurian, 2005). Therefore, hotels must establish trust relationships with
their online consumers, thereby affecting the willingness of consumers to book rooms online (Wang et al.,
2015).
This study attempts to explore the influence of economy hotel website quality on the online booking intention
of consumers. Three economy hotels (7 days, Home Inns, and Hanting Hotel) in Guangzhou, China were
selected as research objects. The theoretical relationships among the quality of these hotel websites (usability,
ease of use, entertainment, and complementarity), eTrust, and online booking intentions were thoroughly
examined. The influence of the four aforementioned independent variables of hotel website quality on eTrust
and online booking intentions was tested using the WebQualTM model (Loiacono et al., 2002). The rest

of the paper is organized as follows. Section 2 presents the theoretical model and discusses the main research
hypotheses to be tested empirically. Section 3 introduces the methodology. Section 4 analyzes the results.
Section 5 discusses and provides the implications. Section 6 presents the limitations and future research
directions.

Anda mungkin juga menyukai