{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T03:46:56Z","timestamp":1648871216697},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1007\/s10257-009-0122-8","type":"journal-article","created":{"date-parts":[[2009,11,23]],"date-time":"2009-11-23T12:04:07Z","timestamp":1258977847000},"page":"415-438","source":"Crossref","is-referenced-by-count":0,"title":["Assessing the potential of ubiquitous computing for improving business process performance"],"prefix":"10.1007","volume":"8","author":[{"given":"Nina","family":"Oertel","sequence":"first","affiliation":[]},{"given":"Jens","family":"Dibbern","sequence":"additional","affiliation":[]},{"given":"Zoltan","family":"Nochta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"issue":"1","key":"122_CR1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/344949.344988","volume":"7","author":"GD Abowd","year":"2000","unstructured":"Abowd GD, Mynatt ED (2000) Charting past, present and future research in ubiquitous computing. ACM Trans Comput Hum Interact 7(1):29\u201358","journal-title":"ACM Trans Comput Hum Interact"},{"issue":"4","key":"122_CR2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1201\/1078.10580530\/45520.22.4.20050901\/90031.7","volume":"22","author":"M Andersson","year":"2005","unstructured":"Andersson M, Lindgren R (2005) The mobile-stationary divide in ubiquitous computing environments: lessons from the transport industry. Inf Syst Manage 22(4):65\u201379","journal-title":"Inf Syst Manage"},{"key":"122_CR3","unstructured":"Basole RC (2004) The value and impact of mobile information and communication technologies. Proceedings of the 2004 IFAC symposium, Atlanta, GA"},{"key":"122_CR4","unstructured":"Beigl M, Krohn A, Zimmer T, Decker C (2004) Typical sensors needed in ubiquitous and pervasive computing. Proceedings of the first international workshop on networked sensing systems. http:\/\/www.teco.edu\/~krohn\/inss.pdf . Accessed 01 Jan 2009"},{"key":"122_CR5","unstructured":"Bornhoevd C, Lin T, Haller S, Schaper J (2004) Integrating automatic data acquisition with business processes\u2014experiences with SAP\u2019s Auto-ID infrastructure. In: Nascimento M, \u00d6szu M, Kossmann D, Miller R, Blakeley J, Schiefer K (eds) Proceedings of the 30th international conference on very large databases, pp 1182\u20131188"},{"key":"122_CR6","unstructured":"Boushka M, Ginsburg L, Haberstroh J, Haffey T, Richard J, Tobolski J (2002) Auto-ID on the move: the value of Auto-ID technology in freight transportation. Auto-ID center white paper. http:\/\/www.autoidlabs.org\/uploads\/media\/ACN-AUTOID-BC-003.pdf . Accessed 01 Jan 2009"},{"key":"122_CR7","unstructured":"Brock D, Cummins C (2003) EPC tag data specification. Auto-ID center white paper. http:\/\/www.autoidlabs.org\/uploads\/media\/MIT-AUTOID-WH025.pdf . Accessed 01 Jan 2008"},{"key":"122_CR8","doi-asserted-by":"crossref","unstructured":"Estrin D, Govindan R, Heidemann J, Kumar S (1999) Next century challenges: scalable coordination in sensor networks. In: Proceedings of the 5th annual ACM\/IEEE international conference on mobile computing and networking, pp 263\u2013270","DOI":"10.1145\/313451.313556"},{"key":"122_CR9","unstructured":"Fleisch E (2001) Business perspectives on ubiquitous computing. M-Lab working report Nr. 4, 2001"},{"key":"122_CR10","unstructured":"Fleisch E, Tellkamp C (2003) The challenge of identifying value-creating ubiquitous computing applications, Workshop on ubiquitous commerce, UbiComp 2003"},{"issue":"3","key":"122_CR11","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1080\/10864415.2004.11044304","volume":"8","author":"J Gebauer","year":"2004","unstructured":"Gebauer J, Shaw M (2004) Success factors and impacts of mobile business applications: results from a mobile e-procurement study. Int J Electron Commer 8(3):19\u201341","journal-title":"Int J Electron Commer"},{"issue":"3","key":"122_CR12","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1504\/IJMC.2008.017514","volume":"6","author":"J Gebauer","year":"2008","unstructured":"Gebauer J, Tang Y (2008) Applying the theory of task-technology fit to mobile technology: the role of user mobility. Int J Mob Commun 6(3):321\u2013344","journal-title":"Int J Mob Commun"},{"key":"122_CR13","unstructured":"Gebauer J, Shaw M, Michael J, Gribbins ML (2006) Task-technology fit for mobile information systems, working paper, University of Illinois School for Business, No 06-0107. http:\/\/www.business.uiuc.edu\/Working_Papers\/papers\/06-0107.pdf , 2006. Accessed 01 Jan 2009"},{"issue":"2","key":"122_CR14","doi-asserted-by":"crossref","first-page":"213","DOI":"10.2307\/249689","volume":"19","author":"D Goodhue","year":"1995","unstructured":"Goodhue D, Thompson R (1995) Task-technology fit and individual performance. MIS Q 19(2):213\u2013236","journal-title":"MIS Q"},{"issue":"4","key":"122_CR15","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1504\/IJMC.2006.009257","volume":"5","author":"L Gressgard","year":"2006","unstructured":"Gressgard L, Stensaker I (2006) The mobile service industry: strategic challenges and future business models. Int J Mob Commun 5(4):509\u2013531","journal-title":"Int J Mob Commun"},{"key":"122_CR16","unstructured":"Heijden H, Valiente P (2002) Mobile business processes: cases from Sweden and the Netherlands. Stockholm school of economics working paper series in business administration 14"},{"issue":"8","key":"122_CR17","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/2.940014","volume":"34","author":"J Hightower","year":"2001","unstructured":"Hightower J, Boriello G (2001) A survey and taxonomy of location systems for ubiquitous computing. IEEE Comput 34(8):57\u201366","journal-title":"IEEE Comput"},{"key":"122_CR18","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-540-71641-9_10","volume-title":"Networked RFID systems and lightweight cryptography: raising barriers to product counterfeiting","author":"T Inaba","year":"2008","unstructured":"Inaba T (2008) EPC system for a safe & secure supply chain and how it is applied. In: Cole P, Ranasinghe D (eds) Networked RFID systems and lightweight cryptography: raising barriers to product counterfeiting. Springer, Berlin, pp 191\u2013210"},{"key":"122_CR19","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24:381\u2013394","journal-title":"IEEE J Sel Areas Commun"},{"key":"122_CR20","doi-asserted-by":"crossref","unstructured":"Lampe M, Strassner M, Fleisch E (2004) An ubiquitous computing environment for aircraft maintenance. In: ACM symposium on applied computing, Nicosia, Cyprus, pp 1586\u20131592","DOI":"10.1145\/967900.968217"},{"key":"122_CR21","unstructured":"Laubacher R, Malone TW, Kothari SP (2005) What is RFID worth to your company? Measuring performance at the activity level. MIT center for coordination science working paper, 2005"},{"issue":"1","key":"122_CR22","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1111\/j.1937-5956.2007.tb00165.x","volume":"16","author":"H Lee","year":"2007","unstructured":"Lee H, \u00d6zer O (2007) Unlocking the value of RFID. Prod Oper Manage 16(1):40\u201364","journal-title":"Prod Oper Manage"},{"issue":"12","key":"122_CR23","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/585597.585616","volume":"45","author":"K Lyytinen","year":"2002","unstructured":"Lyytinen K, Yoo Y (2002) Issues and challenges in ubiquitous computing. Commun ACM 45(12):63\u201365","journal-title":"Commun ACM"},{"key":"122_CR24","first-page":"145","volume-title":"E-merging media: communication and the media economy of the future","author":"F Mattern","year":"2005","unstructured":"Mattern F (2005) Ubiquitous computing: scenarios for an informatized world. In: Zerdick A, Picot A, Schrape K et al (eds) E-merging media: communication and the media economy of the future. Springer, Berlin, pp 145\u2013164"},{"key":"122_CR25","unstructured":"Moran H, McFarlane D, Milne T (2003) Use case approach for determining the impact of Auto-ID implementations on business information systems. Auto-ID center white paper. http:\/\/www.autoidlabs.org\/uploads\/media\/CAM-AUTOID-WH020.pdf . Accessed 01 Jan 2009"},{"issue":"1","key":"122_CR26","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MPRV.2002.993138","volume":"1","author":"M Satyanarayanan","year":"2002","unstructured":"Satyanarayanan M (2002) A catalyst for mobile and ubiquitous computing. IEEE Pervasive Comput Mag 1(1):2\u20135","journal-title":"IEEE Pervasive Comput Mag"},{"key":"122_CR27","unstructured":"Seibt D, Bielli P, Bjorn-Andresen N et al (1997) CEBUSNET consolidation framework. Working paper No.1\/1997, chair of information systems and information managements, University of Cologne"},{"key":"122_CR28","unstructured":"Strassner M, Schoch T (2002) Today\u2019s impact of ubiquitous computing on business processes. In: Mattern F, Naghshineh M (eds) Short paper proceedings of the international conference on pervasive computing 2002, pp 62\u201374"},{"issue":"1","key":"122_CR29","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1287\/isre.3.1.36","volume":"3","author":"J Walls","year":"1992","unstructured":"Walls J, Widmeyer G, Sawy O (1992) Building an information system design theory for vigilant EIS. Inf Syst Res 3(1):36\u201359","journal-title":"Inf Syst Res"},{"key":"122_CR30","unstructured":"Wamba S, Ygal B (2008) Understanding the impact of emerging technologies on process optimization: the case of RFID technology. 13th Asian-Pacific decision sciences conference, Brisbane, Queensland, Australia, 25 July 2008"},{"issue":"7","key":"122_CR31","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/159544.159617","volume":"36","author":"M Weiser","year":"1993","unstructured":"Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):75\u201384","journal-title":"Commun ACM"},{"key":"122_CR32","unstructured":"Yoo Y, Lyytinen K (2003) Measuring the consequences of ubiquitous computing in networked organizations. Sprouts: working papers on information environments, systems and organizations, 3(3)"},{"issue":"2","key":"122_CR33","doi-asserted-by":"crossref","first-page":"313","DOI":"10.2307\/249668","volume":"22","author":"I Zigurs","year":"1998","unstructured":"Zigurs I, Buckland B (1998) A theory of task-technology fit and group support systems effectiveness. MIS Q 22(2):313\u2013334","journal-title":"MIS Q"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-009-0122-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10257-009-0122-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-009-0122-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:42:13Z","timestamp":1559130133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10257-009-0122-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["122"],"URL":"https:\/\/doi.org\/10.1007\/s10257-009-0122-8","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,11,24]]}}}