A mobilized performance management system for M-business

Pao Yue-kong Library Electronic Theses Database

A mobilized performance management system for M-business

 

Author: Peng, Yang
Title: A mobilized performance management system for M-business
Degree: M.Sc.
Year: 2011
Subject: Hong Kong Polytechnic University -- Dissertations
Mobile commerce
Department: Dept. of Computing
Pages: viii, 68 leaves : ill. ; 30 cm.
InnoPac Record: http://library.polyu.edu.hk/record=b2426826
URI: http://theses.lib.polyu.edu.hk/handle/200/6026
Abstract: This thesis is mainly focus on the effects of wireless technology on companies' core information system like ERP system, and extending such a mobile system with business intelligence to conduct business performance management for M-Business. Accordingly, there are four research works, which are outlined as follows: 1) Design of a mobile performance management system model; 2) Illustrate the functions and procedures of such a system; 3) Solve the access control issues for such a mobile system; 4) Evaluation of the system. For the system design, a five-layer model of Ubiquitous Enterprise Performance Management (U-EPM) system is proposed to capture the "mobility" and "business intelligence" for extending the current ERP system. It is expected not only to streamline the processes of mobile business performance management, but also help companies to achieve better effectiveness and efficiency in doing M-Business. For the functions and procedures, a three-layer functional structure is developed to illustrate the differentiated functions of U-EPM system compared to the existing ERP system. Some specific scenarios are created and related data processing technique issues are reviewed, such as real-time data warehousing, on-line analytic platform (OLAP) querying optimization, operational data store (ODS), and etc. In order to streamline the operation procedures of the U-EPM system, a more detailed architecture which is on the level of application is provided as well. For achieving an effective access control to protect the information inside the U-EPM system from unauthorized access under the 3G networks environment, a hybrid access control mechanism is adopted, which comprises the authentication and authorization. The face recognition technique is applied as a solution to achieve full authentication in the U-EPM system, and a possible face recognition solution, which is the enhanced (PC)²A approach, is provided on the current technique stage of face recognition. For evaluation, an evaluation metrics which consists of three dimensions including, functionality, usability, and utility is proposed. It is discovered by means-end approach that four business values including economic value, managerial value, customer value and employee value could be created. Experiment results in previous researches are introduced to demonstrate that PDA gets higher usability than PC in mobile environment. Fuzzy comprehensive evaluation (FCE) approach is adopted to evaluate the utility by the comparison with three existing representative ERP and BI systems including SAP mobile, BPM and BPA system, and the results indicate that U-EPM system performs the best. Therefore, the superiority of the U-EPM system under the M-business background is proved. The research works above are interrelated and the research results could be utilized as the foundation for subsequent research works and possible research directions are also provided in order to improve the performance of the U-EPM system.

Files in this item

Files Size Format
b24268264.pdf 2.015Mb PDF
Copyright Undertaking
As a bona fide Library user, I declare that:
  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

     

Quick Search

Browse

More Information