Information Systems and e-Business Management

, Volume 8, Issue 4, pp 415–438 | Cite as

Assessing the potential of ubiquitous computing for improving business process performance

Original Article


Although ubiquitous technologies such as RFID, sensor networks, and networked embedded systems are quite mature, widespread adoption by organizations has yet to take place. This may be due to the lack of systematic assessment of the potential of ubiquitous technologies for creating value. Accordingly, a prescriptive model is presented that shows how value is created through the fit between generic capabilities of ubiquitous technologies and task characteristics in business processes. The identified task characteristics can thus be used as indicators for assessing the potential improvements in business process performance through particular ubiquitous computing functionalities.


Ubiquitous technologies (UT) Information system (IS) Business information System (BIS) Radio frequency identification (RFID) Task-technology fit (TTF) 


  1. Abowd GD, Mynatt ED (2000) Charting past, present and future research in ubiquitous computing. ACM Trans Comput Hum Interact 7(1):29–58CrossRefGoogle Scholar
  2. Andersson M, Lindgren R (2005) The mobile-stationary divide in ubiquitous computing environments: lessons from the transport industry. Inf Syst Manage 22(4):65–79CrossRefGoogle Scholar
  3. Basole RC (2004) The value and impact of mobile information and communication technologies. Proceedings of the 2004 IFAC symposium, Atlanta, GAGoogle Scholar
  4. Beigl M, Krohn A, Zimmer T, Decker C (2004) Typical sensors needed in ubiquitous and pervasive computing. Proceedings of the first international workshop on networked sensing systems. Accessed 01 Jan 2009
  5. Bornhoevd C, Lin T, Haller S, Schaper J (2004) Integrating automatic data acquisition with business processes—experiences with SAP’s Auto-ID infrastructure. In: Nascimento M, Öszu M, Kossmann D, Miller R, Blakeley J, Schiefer K (eds) Proceedings of the 30th international conference on very large databases, pp 1182–1188Google Scholar
  6. Boushka M, Ginsburg L, Haberstroh J, Haffey T, Richard J, Tobolski J (2002) Auto-ID on the move: the value of Auto-ID technology in freight transportation. Auto-ID center white paper. Accessed 01 Jan 2009
  7. Brock D, Cummins C (2003) EPC tag data specification. Auto-ID center white paper. Accessed 01 Jan 2008
  8. Estrin D, Govindan R, Heidemann J, Kumar S (1999) Next century challenges: scalable coordination in sensor networks. In: Proceedings of the 5th annual ACM/IEEE international conference on mobile computing and networking, pp 263–270Google Scholar
  9. Fleisch E (2001) Business perspectives on ubiquitous computing. M-Lab working report Nr. 4, 2001Google Scholar
  10. Fleisch E, Tellkamp C (2003) The challenge of identifying value-creating ubiquitous computing applications, Workshop on ubiquitous commerce, UbiComp 2003Google Scholar
  11. Gebauer J, Shaw M (2004) Success factors and impacts of mobile business applications: results from a mobile e-procurement study. Int J Electron Commer 8(3):19–41Google Scholar
  12. Gebauer J, Tang Y (2008) Applying the theory of task-technology fit to mobile technology: the role of user mobility. Int J Mob Commun 6(3):321–344CrossRefGoogle Scholar
  13. Gebauer J, Shaw M, Michael J, Gribbins ML (2006) Task-technology fit for mobile information systems, working paper, University of Illinois School for Business, No 06-0107., 2006. Accessed 01 Jan 2009
  14. Goodhue D, Thompson R (1995) Task-technology fit and individual performance. MIS Q 19(2):213–236CrossRefGoogle Scholar
  15. Gressgard L, Stensaker I (2006) The mobile service industry: strategic challenges and future business models. Int J Mob Commun 5(4):509–531Google Scholar
  16. Heijden H, Valiente P (2002) Mobile business processes: cases from Sweden and the Netherlands. Stockholm school of economics working paper series in business administration 14Google Scholar
  17. Hightower J, Boriello G (2001) A survey and taxonomy of location systems for ubiquitous computing. IEEE Comput 34(8):57–66Google Scholar
  18. Inaba T (2008) EPC system for a safe & secure supply chain and how it is applied. In: Cole P, Ranasinghe D (eds) Networked RFID systems and lightweight cryptography: raising barriers to product counterfeiting. Springer, Berlin, pp 191–210CrossRefGoogle Scholar
  19. Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24:381–394CrossRefGoogle Scholar
  20. Lampe M, Strassner M, Fleisch E (2004) An ubiquitous computing environment for aircraft maintenance. In: ACM symposium on applied computing, Nicosia, Cyprus, pp 1586–1592Google Scholar
  21. Laubacher R, Malone TW, Kothari SP (2005) What is RFID worth to your company? Measuring performance at the activity level. MIT center for coordination science working paper, 2005Google Scholar
  22. Lee H, Özer O (2007) Unlocking the value of RFID. Prod Oper Manage 16(1):40–64Google Scholar
  23. Lyytinen K, Yoo Y (2002) Issues and challenges in ubiquitous computing. Commun ACM 45(12):63–65CrossRefGoogle Scholar
  24. Mattern F (2005) Ubiquitous computing: scenarios for an informatized world. In: Zerdick A, Picot A, Schrape K et al (eds) E-merging media: communication and the media economy of the future. Springer, Berlin, pp 145–164Google Scholar
  25. Moran H, McFarlane D, Milne T (2003) Use case approach for determining the impact of Auto-ID implementations on business information systems. Auto-ID center white paper. Accessed 01 Jan 2009
  26. Satyanarayanan M (2002) A catalyst for mobile and ubiquitous computing. IEEE Pervasive Comput Mag 1(1):2–5CrossRefGoogle Scholar
  27. Seibt D, Bielli P, Bjorn-Andresen N et al (1997) CEBUSNET consolidation framework. Working paper No.1/1997, chair of information systems and information managements, University of CologneGoogle Scholar
  28. Strassner M, Schoch T (2002) Today’s impact of ubiquitous computing on business processes. In: Mattern F, Naghshineh M (eds) Short paper proceedings of the international conference on pervasive computing 2002, pp 62–74Google Scholar
  29. Walls J, Widmeyer G, Sawy O (1992) Building an information system design theory for vigilant EIS. Inf Syst Res 3(1):36–59CrossRefGoogle Scholar
  30. Wamba S, Ygal B (2008) Understanding the impact of emerging technologies on process optimization: the case of RFID technology. 13th Asian-Pacific decision sciences conference, Brisbane, Queensland, Australia, 25 July 2008Google Scholar
  31. Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):75–84CrossRefGoogle Scholar
  32. Yoo Y, Lyytinen K (2003) Measuring the consequences of ubiquitous computing in networked organizations. Sprouts: working papers on information environments, systems and organizations, 3(3)Google Scholar
  33. Zigurs I, Buckland B (1998) A theory of task-technology fit and group support systems effectiveness. MIS Q 22(2):313–334CrossRefGoogle Scholar

Copyright information

© Springer-Verlag 2009

Authors and Affiliations

  1. 1.SAP ResearchKarlsruheGermany
  2. 2.Institute of Information SystemsUniversity of BernBernSwitzerland

Personalised recommendations