Effectively Communicating by Email: an Oxymoron?

Karen Renaud1*, Judith Ramsay2 and Judy van Biljon3
1School of Computing Science, University of Glasgow, Glasgow, UK
2Division of Psychology, School of Social Science,
University of the West of Scotland, Paisley, UK
3School of Computing, University of South Africa, Pretoria, South Africa

Email: karen.renaud@glasgow.ac.uk, judith.ramsay@uws.ac.uk, vbiljja@unisa.ac.za


Organisations attempt to minimise ill-advised use of email by issuing email acceptable use policies. There is no widely accepted standard for these documents; their content and focus varies widely, as we will show here. Persistent reports of poor emailing behaviour suggest that they are not entirely effective. More guidance for the policy writers is needed. As a first step, we will focus on the content of the policies, to ensure that their content and formulation is optimal. Implementation, dissemination and enforcement will be the focus of our future research. It appears that most policies implement a control-based approach, which neglects the empowerment and fostering of effective communication. To address this, policies need to be grounded in the well-established principles of effective communication. We have synthesised the recommendations from the literature, and validated these by performing a content analysis of published recommendations, email-related news reports and in-use email policies. The approach proposed here articulates effective communication principles in a way that empowers users and helps to maximise the value of email use in organisations. This research should provide policy writers with some much-needed guidance, and lead to more effective communication.

Key words: Data Mining, Email, Human Communication, Acceptable Use Policies.

Analysis of Frameworks and QoS Routing Protocols for MANETs

Rakesh Kumar1*, Anil K. Sarje2, and Manoj Misra2
1Department of Computer Science and Engineering,
M.M.M. Engineering College Gorakhpur, Uttar Pradesh, India-273010
2 Department of Electronics and Computer Engineering,
Indian Institute of Technology Roorkee, Uttarakhand, India-247667
Email: rkiitr@gmail.com, sarjefec@iitr.ernet.in, manojfec@iitr.ernet.in


With advances in wireless communications and the expansion of real-time applications such as streaming audio and games, the need for quality of service (QoS) support has become essential for mobile ad hoc networks (MANETs). Due to the special characteristics of MANETs such as lack of central coordination, mobility of hosts, dynamically varying network topology, and limited availability of resources make QoS provisioning very challenging. Therefore it is important that routing protocols incorporate desired metrics in route finding and maintenance to support end-to-end QoS. These routing support diverse applications and have varying and stringent requirements for delay, jitter, bandwidth and packets loss. In the past, effort has been made to address this critical issue. However, providing such services in mobile ad hoc networks requires a close collaboration between all layers in the protocol stack. In this paper, a representative set of QoS frameworks and QoS-aware routing protocols are reviewed with emphasis on their ability to support such services. These frameworks provide required services to each user application. We also summarize methods of QoS provisioning at different levels including those at the levels of routing, medium access control (MAC), and cross layer. We compare salient features of various solutions and approaches and point out directions for future work. Finally, a detailed and comprehensive comparison table is provided for better understanding of such service provisioning in MANETs.

Keywords: Mobile Ad hoc Network (MANET), Quality of Service (QoS), QoS Models, QoS Routing, QoS Framework.

An Efficient and Improved Power Save Mode for IEEE 802.11 Ad-Hoc Networks

Narendran Rajagopalan * and C. Mala
National Institute of Technology, Trichy, 620 015, India

Email: narenraj1@gmail.com, mala@nitt.edu


Devices constituting wireless ad-hoc networks generally operate in battery power. Efficient usage of energy is a serious research issue to be addressed. IEEE 802.11 Power Save Mode is a standard recommended for energy efficient operation of wireless ad-hoc networks. According to IEEE 802.11 Power Save Mode even when there is no data to transfer, energy is still utilized during the Ad-hoc Time Indication Map window. With this work, an attempt is made to address this drawback with the proposal of a variation in the Power Save Mode. Another issue with IEEE 802.11 Power Save Mode is that each frame travels only one hop during a beacon interval, leading to huge end to end latency and energy consumption. This issue is also addressed and history based prediction method is proposed. According to this method, a data frame can travel many hops from source to destination within a beacon interval. The limitations of history based prediction method are analyzed. The Simulation results using Network Simulator 2 (NS-2) also depicts that the false positives of history based prediction method are tolerable for long burst connections than short burst connections. Simulation results show that the proposed method outperforms IEEE 802.11 Power Save Mode with respect to energy efficiency and end to end latency.

Keywords: IEEE 802.11, Distributed Coordination Function, Power Save Mode, Ad-hoc Networks, Energy Efficiency, Latency, False-positive.

Measuring Intellectual Capital: Focusing on Human-Centered Assets in a Consulting Firm

Ali Tajdari* and Nasim Ghanbartehrani
Industrial Management Institute, Tehran, Iran

Email: Ali.Tajdari@gmail.com, Nasim.Tehrani@gmail.com


Intellectual Capital has been the center of attention in the past 3 decades. In the knowledge economy, having intellectual capital is considered to help companies create more value. Many models and frameworks are presented to assess and measure the intellectual capital, but evidence shows there are many deficiencies in the models applying to the practical cases. In this paper, researchers develop a practical procedure to apply the Technology Broker model to measure the Human aspect of the Intellectual Capital of a consulting firm. Authors discuss the effects of IC on value creation in a scorecard model and focus on the human element as the main effective part of IC in the current case.

Keywords: Intellectual Capital, Technology Broker Model, Human Centered-Asset, Knowledge Measurement, Knowledge Management, Consulting Firm.

Case Management and Enterprise Content Management (ECM)

Lekha Menon
HiTech Solutions Central, Tata Consultancy Services Limited, Mumbai, India
Email: Lekha.menon@tcs.com


Interest in Composite Content Applications has been climbing higher over the recent years due to the rising need around enabling business process improvements and addressing challenges around business process agility. Such applications can deliver substantial value by leveraging both content and process services for the better orchestration of people and processes and empower organizations to automate routine tasks and aggregate information from multiple sources in a collaborative work environment that enables rapid decision making. In this paper, we have introduced Case Management and its relationship with ECM and the essential functionalities in a Case Management Product stack. It then touches upon leading vendors in this space along with the salient features of their case management offerings. Subsequently we have built on a sample case scenario of building a contracts management application using EMC Documentum xCelerated Composition Platform (xCP), the business needs and challenges that a well-designed Contracts Management application can address, a real-life application of xCP platform to build such a solution and the observations on the strengths and limitations of this platform, along with a few workarounds to address the limitations.

Keywords: Enterprise Content Management, Case Management, Documentum xCelerated Composition Platform, Documentum xCP, Contracts Lifecycle Management.