Classifying Personalization Constraints in Digital Business Environments through Case Study Research
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 1
Abstract
To aid professionals in the early assessment of possible risks related to personalization activities in marketing as well as to give academics a starting point to discover not only the opportunities but also the risks of personalization, a ‘Classification Scheme of Personalization Constraints’ is established after the analysis of 24 case studies. The classification scheme includes three dimensions: origin (internal, external), subject (technological, organizational) and time (data collection, matchmaking, delivery) and describes the different obstacles with which companies are confronted when implementing personalization activities. Additionally four ‘Standard Types of Personalization Environments’ are developed. They describe a set of business environments which inherit different internal and external risks related to personalization activities in marketing. The standard types are termed Flow, Performance, Dependence and Risk.
Authors and Affiliations
Michael J. Harnisch
Sentiment Analysis Based on Expanded Aspect and Polarity-Ambiguous Word Lexicon
This paper focuses on the task of disambiguating polarity-ambiguous words and the task is reduced to sentiment classification of aspects, which we refer to sentiment expectation instead of semantic orientation widely use...
Web Scraper Revealing Trends of Target Products and New Insights in Online Shopping Websites
Trillions of posts from Facebook, tweets in Twitter, photos on Instagram and e-mails on exchange servers are overwhelming the Internet with big data. This necessitates the development of such tools that can detect the fr...
Crypt-Tag Authentication in NFC Implementation for Medicine Data Management
This study focus on the implementation of expiry date detection for medicine using RFID in the health care industry. The motivation for doing this research is the process of searching for the expired medicine is a time c...
Characterizing End-to-End Delay Performance of Randomized TCP Using an Analytical Model
TCP (Transmission Control Protocol) is the main transport protocol used in high speed network. In the OSI Model, TCP exists in the Transport Layer and it serves as a connection-oriented protocol which performs handshakin...
Video Authentication using PLEXUS Method
Digital Video authentication is very important issue in day to day life. A lot of devices have got the ability of recording or capturing digital videos and all these videos can be passed through the internet as well as m...