Skip to main content
Log in

Ubiquitous Computing aus betriebswirtschaftlicher Sicht

Ubiquitous computing: A business perspective

  • WI - State-of-the-Art
  • Published:
WIRTSCHAFTSINFORMATIK

Abstract

This paper identifies and analyses potential business benefits of ubiquitous computing (ubicomp). Its aim is to challenge whether the growing visibility of topics such as ubiquitous or pervasive computing, automatic identification (Auto-ID) and radio frequency identification (RFID) can be justified from a business perspective. To do so it analyses the business contribution of existing ubicomp applications, reconstructs their development phases, introduces the business relevant base-functionalities and discusses implications on the design of products, processes and services using ubicomp applications.

The creation of an alternative and rather cost efficient machine-machine-relation between already established information systems and the real world things they try to manage has been identified as the main source of business benefit. However, before businesses can systematically leverage all potential benefits, some technical and political questions, such as creating robust solutions and solving privacy issues, have to be answered.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Literatur

  1. Abowd, G. D.; Ebling, M. R.; Gellersen, H.-W.: Context-Aware Pervasive Computing. In: IEEE Wireless Communications 9 (2002) 5, S. 8–9.

    Google Scholar 

  2. Abowd, G. D.; Mynatt, E. D.: Charting Past, Present, and Future Research in Ubiquitous Computing. In: ACM Transactions on Computer Human Interaction 47 (2000) 1, S. 29–58.

    Google Scholar 

  3. Accenture (Hrsg.): Seize the day: The Silent Commerce Imperative. http://www.accenture.com/xdoc/en/ideas/isc/pdf/SeizeTheDay.PDF, 2002, Abruf am 2003-04-22.

    Google Scholar 

  4. Antifakos, S.; Michahelles, F.; Schiele, B.: Proactive Instructions for Furniture Assembly. In: The Fourth International Conference on Ubiquitous Computing, UbiComp 2002, Göteborg, Sweden, September 2002.

    Google Scholar 

  5. Auto-ID Center: http://www.autoidcenter.org, Abruf am 2003-04-22.

  6. Banavar, G.; Bernstein, A.: Software infrastructure and design challenges for ubiquitous computing applications. In: Communications of the ACM 45 (2002) 12, S. 92–96.

    Google Scholar 

  7. Bender, K.: Ubiquitous Computing — the inversion of virtuality. In: Wissenschaftliche Zeitschrift — TU Dresden 47 (1998) 4, S. 44–47.

    Google Scholar 

  8. Bohn, J.; Coroama, V.; Langheinrich, M.; Mattern, F.; Rohs, M.: Allgegenwart und Verschwinden des Computers: Leben in einer Welt smarter Alltagsdinge. Arbeitsbericht ETH Zürich, http://www.inf.ethz.ch/vs/publ/papers/allvercom.pdf, 2003, Abruf am 2003-04-10.

    Google Scholar 

  9. Buderi, R.: Computing goes Everywhere. In: Technology Review 104 (2001) 1, S. 52–61.

    Google Scholar 

  10. Business Week: Special report: Wireless in Cyberspace. In: Business Week (2000), 2000-05- 26, S. 136.

    Google Scholar 

  11. Business Wire: Shoplifters and Dishonest Employees Continue to Steal Profits From United States Retailers, Says Jack L. Hayes International. In: Business Wire (2002), 2002-06-27. http://www.businesswire.com/webbox/bw.062702/221782286.htm, Abruf am 2003-04-22.

    Google Scholar 

  12. Davies, N.; Gellersen, H.-W.: Beyond Prototypes: Challenges in Deploying Ubiquitous Systems. In: IEEE Pervasive Computing 1 (2002) 1, S. 26–35.

    Google Scholar 

  13. Escort Memory Systems: Fords “Quality is Job 1″ = Radio Frequency Identification (RFID) from Escort Memory Systems. http://www.ems-rfid.com/apps/fordcase.html, 2002, Abruf am 2003-04-22.

  14. Fano, A.; Gershman, A.: The Future of Business Services in the Age of Ubiquitous Computing. In: Communications of the ACM 45 (2002) 12, S. 83–87.

    Google Scholar 

  15. Ferguson, G. T.: Have Your Objects Call My Objects. In: Harvard Business Review 80 (2003) 6, S. 138–143.

    Google Scholar 

  16. Fleisch, E.; Österle, H.: Auf dem Weg zum Echtzeitunternehmen. Erscheint in: Alt, R.; Österle, H. (Hrsg): Real-time Business. Springer, Berlin 2003.

    Google Scholar 

  17. Forrester Research: RFID: The Smart Product (R)evolution. Cambridge, August 2002.

    Google Scholar 

  18. Gain, B.: Connecting the dots. Web-enabled IC networks are demanding closer collaboration between manufacturers and their suppliers. In: EBN Online, 2003-03-10, S. 29–33.

    Google Scholar 

  19. Gellersen, H.-W.; Schmidt, A.; Beigl, M.: Adding Some Smartness to Devices and Everyday Things. In: IEEE Workshop on Mobile Computing Systems and Applications 2000, 7th.-8th. December, Monterrey, USA. http://ubicomp.teco.edu/index2.html, Abruf am 2003-04-22.

    Google Scholar 

  20. Harry, M.; Schroeder, R.: Six Sigma: The Breakthrough Management Strategy Revolutionizing The Worlds Top Corporations. Harry 1999.

    Google Scholar 

  21. IDTechEx: Authentication and Counterfeiting Protection Conference Review. In: Smart Labels Analyst 2 (2002) 2, S. 1–3.

    Google Scholar 

  22. Jessup, L. M.; Robey, D.: The relevance of social issues in ubiquitous computing environments. In: Communications of the ACM 45 (2002) 12, S. 88–81.

    Google Scholar 

  23. Kaerner, H.: Profitabler dank Telematik: Wenn Service neu gestaltet wird. http://www.accenture.de/4publika/4fachart/index.jsp, 2002-10, Abruf am 2003-04-22.

    Google Scholar 

  24. Kärkkäinen, M.; Holström, J.: Wireless product identification: enabler for handling efficiency, customisation and information sharing. In: Supply Chain Management 7 (2002) 4, S. 242–252.

    Google Scholar 

  25. Kaihla, P.: The ghosts in the machines. In: Canadian Business 74 (2001) 17, S. 24–30.

    Google Scholar 

  26. Kaye, J.; Matsakis, N.; Gray, M.; Wheeler, A.; Hawley, M.: PC Dinners, Mr. Java and Counter Intelligence: Prototyping Smart Appliances for the Kitchen. MIT Media Laboratory, Cambridge, USA 2000.

    Google Scholar 

  27. Khan, J. M.; Katz, R. H.; Pister, K. S. J.: Emerging Challenges: Mobile Networking for „Smart Dust”. In: Journal of Communications and Networks 2 (2000) 3, S. 188–196.

    Google Scholar 

  28. Kindberg, T. et al.: People, Places, Things: Web Presence for the RealWorld. http://www.cooltown.com/dev/wpapers/webpres/WebPresence.asp, 2001, Abruf am 2003-04-22.

    Google Scholar 

  29. Langheinrich, M.: Privacy by Design — Principles of Privacy-Aware Ubiquitous Systems. In: Proceedings of Ubicomp 2001, September 30-October 2, 2001, Atlanta, USA.

    Google Scholar 

  30. Lyytinen, K.; Yoo, Y.: Issues and Challenges in Ubiquitous Computing. In: Communications of the ACM 45 (2002) 12, S. 83–87.

    Google Scholar 

  31. Malone, T.; Crowston, K.: The Interdisciplinary Study of Coordination. In: ACM Computing Surveys 26 (1994) 1, S. 87–119.

    Google Scholar 

  32. Mattern, F. (Hrsg.): Total vernetzt. Springer, Berlin etc. 2003.

    Google Scholar 

  33. Midkiff, S. F.: The First Summer School on Ubiquitous and Pervasive Computing. in IEEE Pervasive Computing 2 (2003) 1, S. 84–88.

    Google Scholar 

  34. Negus, K. J.; Stephans, A. P.; Lansford, J.: HomeRF: wireless networking for the connected home. In: IEEE Personal Communications 7 (2000) 1, S. 20–27.

    Google Scholar 

  35. Norman, D. A.: The Invisible Computer. MIT Press, Cambridge, USA 1998.

    Google Scholar 

  36. Papazoglou, M. P.: The Role of Agent Technology in Business Electronic Commerce. In: Lecture Notes in Computer Science (1999) 1652, S. 245–264.

    Google Scholar 

  37. Pierre, S.: Mobile computing and ubiquitous networking: concepts, technologies and challenges. In: Telematics and Informatics 18 (2001) 2-3, S. 109–131.

    Google Scholar 

  38. RFID Journal: Diverse Fallstudien. http://www.rfidjournal.com/article/archive/4/, Abruf am 2003-04-22.

  39. Satyanarayanan, M.: (2001) Pervasive computing: vision and challenges. In: IEEE Personal Communications 8 (2001) 4, S. 10–17.

    Google Scholar 

  40. Sharp, K. R.: Technology Edge RFID Goes Mainstream. In: ID Systems 21 (2001) 1, S. 58–59.

    Google Scholar 

  41. Stajano, F.; Anderson, R.: The Resurrecting Duckling: Security Issues for Ubiquitous Computing. In: Computer 35 (2002) 4, Supp., S. 22–26.

    Google Scholar 

  42. Utterback, J.: Mastering the Dynamics of Innovation. Harvard Business School Press, Boston, Massachusetts 1994.

    Google Scholar 

  43. Waldo, J.: Virtual Organizations, Pervasive Computing, and an Infrastructure for Networking at the Edge. In: Information Systems Frontiers 4 (2002) 1, S. 9–18.

    Google Scholar 

  44. Watzlawick, P.; Beavin, J. H.; Jackson, D. D.: Menschliche Kommunikation. Formen, Störungen, Paradoxien. Hans Huber, Bern 1967.

    Google Scholar 

  45. Weiser, M.: The computer for the 21st century. In: Scientific American 256 (1991) 3, S. 94–104.

    Google Scholar 

  46. Wolff, J. A.: RFID tags — an intelligent bar code replacement. ftp://service.boulder.ibm.com/software/pervasive/info/tech/gsoee200.pdf, 2001, Abruf am 2003-04-22.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fleisch, E., Dierkes, M. Ubiquitous Computing aus betriebswirtschaftlicher Sicht. Wirtschaftsinf 45, 611–620 (2003). https://doi.org/10.1007/BF03250924

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03250924

Keywords

Navigation