Saturday, December 28, 2019

Definition of White Collar Crime Essay - 1160 Words

White collar crime has many definitions, one of the earlier described it as illegal or unethical acts that violate fiduciary (holding or held in trust) responsibility of public trust committed by an individual or organization, usually during the course of legitimate occupational activity, by persons of high or respectable social status for personal or organizational gain. However, as time went on the definitions and variation of the crimes began expanding and a definition did not describe the act to completion. The way a crime was determined a ‘white collar crime’ was if it fit five elements. If the crime perpetrated has intent, then it can be a white collar crime, by intent it means to commit a wrongful act or to achieve a purpose†¦show more content†¦One type of crime that fits all these categories and the modern definitions of white collar crime is identity theft. II. What is Identity Theft? Identity theft has been around for many years, and is a method of stealing another person’s identity. The person who steals the identity then pretends to be the person whose identity they have just stolen. This is done to get the persons credit card information, their resources, and their benefits. The victim of the theft can have everything in their life taken from them, and it is not an easy crime to prove. Sometimes, the person uses that newly attained identity to commit other crimes, which then can get the victim in even more problems. Identity theft can lead to identity fraud, leading to the misappropriation of the person’s identity. With the modern technology of today identity theft has become a lot easier. With firmware, spyware, and viruses identity theft has become easier than ever, apps and programs like these will take a lot more than a person’s credit card information. However, identity theft is not as simple as one may thi nk; many types of identity theft that affect people every day. III. Different Types of Identity Theft Identity theft has been split into six different types used to describe the expansiveness of the crime, identity cloning, criminal identity theft, medical identity theft, synthetic identity theft, child identity theft, and financial identity theft. The simple definitionShow MoreRelatedWhite Collar Crime : An Definition Of Occupational Deviance, And Workplace Crime1020 Words   |  5 PagesFriedrichs provided more accurate definition of occupational deviance because the term seems to be applied to activities drifted away from the original meaning of White Collar crime. It’s blended with the term conventional crime. Edwin Sutherland introduced the concept of white-collar crime in 1939. There were conceptual confusions with the term occupational crime, occupational deviance, and workplace crime because these terms are combined with white-collar crime. Friedrichs (2002) defined occupationalRead MoreThe And White Collar Crime897 Words   |à ‚  4 Pages1. Literature Review Crimes have been occurring in our society for many years and recently the occurrence of non-violent crimes has increased dramatically. Traditional and white collar crimes have two traits in common, an objective and a modus operandi, but the major difference is that a white collar criminal has a plan and also the ability, knowledge and technology to execute it (Nevis, 2012). White-collar crimes can occur at any occupational level and affects all parts of society, from big businessesRead More‘A Peacemaking Approach To Criminology’ Was Written By1503 Words   |  7 Pagespromoting a humane way of handling crime and deviants. The book proposes a peaceable way of dealing with offenders in a manner that accords respect to human rights. Further, Gesualdi notes that the criminal justice system is concentrated on inflicting harm on the offenders by punishing them. He argues that the system is fixated on the notion of reacting to crime rather than prevention. Hence, the book proposes an approach where restorative justice and prevention of crime can be accommodated in the criminalRead MoreEssay on White Collar Crime and Corporate Crime1509 Words   |  7 PagesWhite Collar crime is not a crime unto it self, but instead a criteria that has to be met in order for a crime to be considered as White- Collar Crime; (Blount, 2002) hence the reason why Corp orate Crime is also considered as White- Collar Crime. At the same time, White Collar Crime and Corporate Crime can be seen as distinct criminological categories, however, in order to reveal this, this essay will firstly be exploring Sutherlands definition of white collar crime and the perplexity with thisRead MoreWhite Collar Crimes And Street Crimes1431 Words   |  6 PagesCrimes are one of the many things that all humans have in common. Whether it be a serious crime or not, everyone can commit a crime and go to jail for it. There are two types of crime that can be considered complete opposites of each other. They are white collar crimes and street crimes. White collar crimes are considered nonviolent crimes committed by a person of respectability and high social status in the course of his/her occupation such as fraud, embezzlement, or bribery. On the other hand,Read MoreWhite Collar And Other Crimes And Their Penalties1420 Words   |  6 PagesRunning head: White Collar Cri me WHITE COLLAR AND OTHER CRIMES AND THEIR PENALTIES. Ken Jaeger Intro to Criminal Justice CRJ 100 Mr. Sexton September 5, 2014 Abstract This paper will discuss the many various aspects of White Collar Crime. It will show how whether White Collar crime differs from other types of crime. It will show how to justify white collar crimes compared to all types of other crimes committed. It will show how and why White collar criminals receive more lenient penaltiesRead MoreWhite Collar Crime941 Words   |  4 PagesA present day study of the term white collar crime, is as controversial as it is general. If you log onto the F.B.I. website to see a host of crimes ranging from health care fraud to computer fraud. (www.fbi.gov) Criminologists, with a focus on the law, contend that many of the behaviors society believes to be white collar crimes are in fact not crimes at all. Without a statute to define a behavior as a criminal violation of law, behaviors could be labeled by individual standards rather than inRead MoreFinancial Aspects Of The Accounting Scandal1000 Words   |  4 Pagespractices were committed in order to co ntinue showing his increasing net-worth and the company’s growth. For this essay, an attempt to study and discuss white-collar crimes will be done by using various sources and the scandalous case of WorldCom as a focal case. In the past, there have already been studies related to the topic of white-collar crime, but not every theory and hypothesis has been tested to explain the problems with trying to study the topic with a one-for-all type of theory. In thisRead MoreThe Various Aspects Of White Collar Crime1123 Words   |  5 PagesWhite Collar Crime Ken Jaeger Intro to Criminal Justice CRJ 100 Mr. Sexton September 5, 2014 Abstract This paper will discuss the many various aspects of White Collar Crime. It will show how whether White Collar crime differs from other types of crime. It will show how to justify white collar crimes compared to all types of other crimes committed. It will show how and why White collar criminals receive more lenient penalties then criminals who commit crimes such as murder, robbery, vandalismRead MoreWhite Collar Crime Theories, Laws, and Processes785 Words   |  3 PagesWhite Collar Crime Theories, Laws, and Processes Name Tutor Course Title Date Submitted White Collar Crime Theories, Laws, and Processes: The term white collar crime was first introduced by Edwin Sutherland, a criminologist and sociologist, in 1939. The criminologist defined the term as offenses committed by individuals of respectability and high social status while in their different occupations. He also included criminal offenses carried out by corporations and other lawful organizations

Friday, December 20, 2019

Its Time to Put an End to Child Labor Essay - 1268 Words

Its Time to Put an End to Child Labor People believe that child labor does not affect them, not realizing that the Persian rugs they put their feet on are made by suffering children in a dark, small room. They don’t realize the soccer balls that their children are kicking around outside are made by children themselves, who slave away for little or no pay at all. In 1999, ap-proximately 250 million children are employed or enslaved across the world for little or no money at all (Gay 23). Imagine how these child workers are depraved from experi-ences the joys of childhood. These poor children never get to play outside or enjoy a simple game. Child labor is a harrowing experience for anyone involved in it. In order to end this travesty†¦show more content†¦Children should not be forced to suffer adult maladies. Imagine a child aged seven, who is supposed to be full of vitality and energy, having arthritis, bad back, and cataracts. These are just some of the maladies that child laborers in Indian rug shops suf-fer from. Children often have to work in closet sized rooms, hunched over and squinting from lack of light. The woolen fluff they work with causes skin rashes and lung compli-cations (Williams 18). An even more serious malady happens on the sugar plantations in Brazil. The children use machetes, large knives, to cut the sugar cane crop. This poses a serious threat. Children have cut off appendages, mutilated themselves, and even killed themselves (Gay 14). Children toiling in Cambodia brick factories drop heavy bricks on their bare feet and hands. No child should be forced to suffer such health complications. Since several countries refuse to buy products created by child laborers, the countries that employ children have faltering economies. An example of this is how there is a coalition called the Foulball campaign that â€Å"ensures that ‘children would not longer kick around the balls made by impoverished children half a world away.†(Berry 3) This has lowered the amount of soccer balls purchased from Thailand. Reebok and Nike have guaranteed that children did not make their soccer balls. Another company that puts a dent in the economy of rug based markets, is the RugmarkShow MoreRelatedChild Labour And Child Labor1600 Words   |  7 PagesChild Labor Issues There are children that suffer through child labor daily. Child labor is the use of children in a business or industry, usually illegal. â€Å"3 billion people around the world survive on $2.50 a day or less. And 2 billion people do not hold a bank account or have access to essential financial services† (â€Å"Living in Poverty†1). Children that are normally in labor come from a poor family that’s in need of money so badly that it comes down to selling their own children or puttingRead MoreResearch Paper On Child Labor1354 Words   |  6 Pages Child Labor Introduction: For centuries and years child labor has become one of the biggest problem in the world. It’s a challenge and long-term work for many countries to put an end to child labor especially those developing countries it’s one of the issues that’s considered as serious issue these days. Child labor refers to children’s who lose their rights and do things that aren’t supposed to do, it refers to children who go to work at the age of schooling. The international labor organizationRead More Labor and Childbirth - The Event of a Lifetime Essay711 Words   |  3 PagesIt moves from one stage to the next, with the labor, so that when you come to the bearing down stage, the stirrups can be put in place. The side rails of the bed provide more comfort than the hand of your coach, during each contraction. The mattress of the bed is truly uncomfortable for a woman in so much pain. The eager faces of your friends and family staring at your half naked body seem to be acceptable. They keenly watch for you to push a child out of your most private area; under no otherRead MoreBusiness Ethics: Apple1300 Words   |  5 Pagesincreasingly global society, people are more aware of how their actions impact the lives and futures of others. One ethical issue that many companies in America face is the decision on whether or not to outsource labor to other countries. The reasons that this conundrum is enticing are obvious. Labor is cheaper overseas and thus saves the company money, adding to an even wider profit margin. This is no small issue and is something which can have a truly detrimental impact on the American economy: It hasRead MoreHuman Trafficking is Trading People without their Consent1134 Words   |  4 Pagesconsent. It can be done through recruitment, harboring and transporting. This is achieved by threat/use of violence, abduction, deception - simply for the purpose of sexual exploitation, forced labor or slavery. I believe that slavery must be abolished because it robs people of their dignity and human rights, its not advantageous for them and it is an abomination to mankind. The very first form of slavery occurred 400 years ago, where the black africans were abducted from their motherland and shippedRead MoreChild Labor And Child Rights884 Words   |  4 Pages Child Slavery Up until the 13th amendment, owning a slave had been just like owning any other piece of property. No one felt guilty about how the slaves were being mistreated. The 13th amendment was the first step in ending slavery in the United States, but no steps were taken to end slavery in other countries. Even though people believe that slavery no longer exists today, about 5.5 million children are still held captive in slavery (Anti- Slavery International 2012). Child slavery can come inRead MoreIke Ethics And Society1324 Words   |  6 PagesProf: Jackie Deem January 16, 2016 Introduction In 1995 one of IKEA suppliers in India was named for using children for labor in a rug factory. This was alarming to the IKEA Corporation. This news could have been damaging to the entire company if the right preventive measures were not taken. IKEA had to decide on their viewpoint on child labor and then had to make sure that what they did then and in the future was adequate to society standards. They will be watching to make sureRead MoreChild Labor Is Not An Effective Way For India1533 Words   |  7 Pageswho were forced to put themselves in that position in order for us to receive our goods. All around the world, child labor is one of the most widely social issues affecting the younger population, specifically, in India. For the children of India, work becomes a nightmare based on suffering and mistreatment. While children have no choice but to be independent and forced to work, it can be a big influence on the child’s education, life, health, and development. Where chi ld labor is deeply rooted fromRead MoreSocial Criticism in William Blakes Songs of Innocence and Experience906 Words   |  4 PagesWilliam Blake was a social critic of his time, yet his criticism also reflects society of our own time as well. He mainly communicates humanitarian concerns through his Songs of Innocence and Experience; which express two opposite states of the human soul, happiness or misery, heaven or hell. Innocence; expresses the state of childhood, into which we are all born, a state of free imagination and infinite joy. Experience;, according to Blake, is mans state when disaster has destroyed the initialRead MoreChildhood Vs Modern Childhood1156 Words   |  5 Pagesthey are children and childhood is viewed as very special time that requires support and respect from everyone. This comparison is a good starting point when comparing the modern childhood of western children vs. a childhood of non-western children. In the article we read by Fass, Alexander Hamilton’s predictions for the United States’ manufacturing future included children working in the factories a long side their parents and at the time that wasn’t a crazy prediction (Fass, 204). Fast forward

Thursday, December 12, 2019

Design Dynamic Telecommunicate Industries -Myassignmenthelp.Com

Question: Discuss About The Design Dynamic Telecommunicate Industries? Answer: Introduction Mobile computing is a kind of technology that permits complete transference of data, video and voice via computer or any wireless device. Smart phones or any other equivalent device could be a tool of mobile computing (Pitoura and Samaras 2012). It associated with mobile communication, mobile software and mobile hardware. The business personals and the leaders of recent days need to take fruitful decision associated with mobile computing as it has opportunities to grow as successful business and it has flourishing demand in the modern market. However, with the growth of mobile computing, the business leaders should make investment on the mobile computing as to develop the operational activities (Chen Chiang and Storey 2012). It has mention that most of the operations in businesses are now dependent on the mobile computing function. Now days, the demand of much productivity is increasing in the workplace. Therefore, the business organization needs to adopt the technology, which is based on mobile computing (Rao Sasidhar and Kumar 2012). The organizations could explore opportunities related to mobile computing for its future business. It is the most essential part of the organization as the world is transforming its way and has become more dependent on the technologies such as mobile computing and as the business activities are not solely dependent on the office activities, thus, the business operations could be helpful for continuous activities across the globe (Hu et al. 2015). It could be helpful even for the office workers as they could manage business operations at any places with the help of mobile computing. The current research proposal is related to the opportunities that exist in application of mobile computing or technology in the business. Project Objectives The objectives are, To analyze the existing literature review based on the opportunities of business operation in application of mobile computing. To discuss the necessity of the mobile computing technology in the modern world. To discuss the advantages of the implication of the mobile computing technologies. To discuss the future opportunities related to the mobile computing technologies and the possible implication in the future world. This will be highlighted in the overall research proposal. To provide the recommendations of the possible application of the mobile computing technology in the contemporary and future world. Project Scope The scope of this research proposal comprises the analysis and discussion of the existing literatures that are associated with the opportunities of business operation in application of mobile computing. With the implication of the mobile computing, the possibilities for the improvement of the marketing and the scopes of the business operations for almost all business organizations have been increased. There are also some of the advantages of the mobile computing in the workplace and other business operations. There is also major scope in the future development as rapid changes in infrastructure of the mobile computing is going on. However, the business organizations should adopt these changes in Infrastructure of the mobile computing and accept the opportunities related to the application of the mobile computing. The organization should acknowledge the necessity of the mobile computing technology in the modern world. The scope of the research proposal is to discuss the practical possibilities in the future of this mobile computing technology and the possible implication in the future world. The research proposal will also recommend the possible application of the mobile computing technology in the contemporary and future world. All the relevant journals and past research works will be examined in order to fulfill the objectives of the research work. Literature Reviews The research work of Ahmed and Ahmed (2016) has explored the major advantages of the application of the mobile computing technology in the modern business world. With the help of method, an integration of the online data storing technology has been made possible. Jararweh et al. (2014) have discussed the importance of the mobile data communication that could have a major contribution in the future of the business operation. Liu and Rong (2015) have showed the allowance of the virtual information that is stored in the online server, which is accessible to the business leaders, thus, making international business faster and compatible in the modern context. Bank et al. (2016) have showed the cost-effectiveness of this technology and the involvement of this technology in the manual operational process. Borger et al. (2016) have discussed the social innovativeness of the cloud technology and the application in business in the development of the new procedure. Mobile computing has helped in effective business communication and supporting the technical service of the business operation. Rahimi et al. (2014) have stated about the implication of the faster communication method globally in business operation as wireless mobile communication psychology has evolved and there is an introduction of the advanced mobile system bandwidth. Ghezzi et al. (2015) have discussed the importance of this technology-based reality and displaying of the specific information about a product, which is being sold in the market. Sen and Swaminathan (2016) have noticed the opportunity for improving brand values and number of targeted customers. The marketing agents of any business operation should design a user-friendly websites in this context that could be helpful for the customers to get relevant information. Dinh et al. (2013) have discussed the opportunities of the implication of mobile computing in businesses. Due to application of the mobile computing, it is possible for online purchase, improvement of the business through online to reach targeted customers and the sales record. Gai et al. (2016) showed another aspect of the e-commerce from the perspective of customers, as they are now able to buy foreign brand products, which are delivered with the help of logistic support. Yousfi et al. (2016) have showed the possibility of the tracking the real-time movement of the raw material and product, thus getting the right and fair information about the product while Bradley et al. (2017) have identified the opportunity of estimate the exact delivery time of any product. Literature Problems and Gap Identification and Opportunities The current literature reviews have shown the opportunities and advantages of the application of the mobile computing however, the major gap in these literatures are there are not concerned about the challenges that any company could face regarding the application of this technology. There could be even major drawbacks that a company could face due to mobile computing application. As the whole system is solely based upon technology, therefore, any problem related to technical dysfunction could hamper the business operation, however, there are no such literature focusing these problems. Due to increasing rate of hacking and cyber crime, there are great risks of data breaching and chance for leaking information, which can damage the business and create financial loss. This is also one of the major literature problems and gap, which should not be overlooked. Thus, some opportunities to the researchers to conduct research on removing threats and problems are related to the different appl ication of the mobile computing. Research Hypotheses H0 : Mobile computing has no impact on the business opportunities. H1: Mobile computing has impact on the business opportunities. Research Questions The research questions are as followed, Primary Question: What are the necessity and advantages of the mobile computing technology in the modern business operations? Secondary Questions: What are the future opportunities and implications of the mobile computing in business operations? How to improve the future opportunities and the implication of the mobile computing in the business? Research Design and Methodology The one segment of the research method includes the qualitative analysis. The qualitative research aids to the improvement of the quality of the products and services. Hence, the researcher has done the qualitative analysis by conducting interviews. The qualitative research is appropriate for the study. Approaches to reliability and Validity In this research, the researcher started to describe the in depth analysis of the topic by which, the research could be done in better ways. The mobile computing opportunities in conducting business operation could be described under the positivism philosophy. Positivism is rather the best method, which would help in making detailed structure for this research. The inductive research approach has taken in as the research approaches. Inductive research approach is carried out by making observation, data collection, analysing those data by employing effective analytical tools. After that, it is followed by developing the potential theories relating the topic. Sampling As the researcher needs to gather the primary data, the sampling is an important method to select appropriate candidates for the study. Relevant data could be collected through the data collection method. The two basic sampling methods are probability and non-probability. Here, the research has chosen the non-probability sampling especially the convenient sampling. The reason is that the convenient sampling is used for reducing the deviation of responses that are collected from the primary data collection candidates. Sample Size For this current study, the researcher has taken 5 managers of any organisations, which use mobile computing technology, for the qualitative data collection. Data Collection Method The data collection method is the incorporation of the primary and secondary data where the researcher would emphasize on the primary data collection method for this research. The researcher has gained the primary data that is the information gathered from the interviews and this information should be very authentic and have capacity to provide a comprehensive approach to the research. Variable Specification The two variables in this research are the dependent and independent variables. The independent variable is the mobile computing and the dependent variable is the business opportunities related to this. Quantitative Research The quantitative analysis could be done through questionnaire survey. This is another segment of the research method. Research instrument The research instrument is the questionnaire survey that will be conducted online. The online questionnaire survey method is the research instrument that has been chosen. Quantitative Data Analysis Process The quantitative data analysis process would be descriptive. The descriptive research design process relates the objectives of the study with the obtained findings of the research. The descriptive design assists the researcher undertaking various approaches in a detailed or descriptive manner. Sampling As the researcher requires gathering the primary data, the sampling is an important method to choose appropriate candidates for this study. Relevant data could be taken from the data collection method. The two basic sampling methods are probability and non-probability. Here, the research has chosen the non-probability sampling method especially the convenient sampling method. The logic is that the convenient sampling method is used for minimizing the deviation of responses that are collected from the primary data collection candidates. Sample Size For this current study, the researcher has at first taken 90 respondents where as 80% of the respondents that is 72 of the people have responded to this survey. As the sample size is larger than the usual, convenient sampling is an appropriate method to decrease the deviation of responses. This could be helpful in getting the desirable conclusion from this survey, which the author needs to draw. Interviewing and Questionnaire Design The interview process would be conducted by taking five managers interview. The managers could be from any organization, which use the mobile computing technology. Based on fifteen questions, the online survey would be conducted. Reliability and Validity of Data In this research, the researcher has started to describe the insight analysis of the topic that better conduction of the research can be pursued. The mobile computing opportunities in conducting business operation can be better described under the positivism philosophy. The positivism is the best method that would help in better way in making detailed structure for this particular research. The inductive research approach has taken in as the research approaches. Inductive approach follows observation, data collection, analysis of those data using effective analytical tools and development of potential theories relative to the topic. Research Limitations The limitations could be faced by the researcher in means of challenges while conducting the interview and survey. Those are: The research is completely based on the primary data, which is a limitation for this research. Online survey itself is a limitation that could interrupt for collecting the authentic information related to the topic. Loyal customers could provide fake data to hide the flaws of the organization. In the interview process, the researcher could face difficulties in gathering the primary data for the reason of the data analysis only. This could deviate the findings of the study from expectation. Time Schedule Main activity 1st month and 2nd month 3rd month 4th month and 5th month 6th month, 7th month and 8th month 9th month Survey of the market Identification of user of internet Deciding the way to implement the promotion on these segmented group Implementing the marketing method Monitor Conclusion It can be concluded by stating that the mobile computing is helpful and necessary for business operation in modern world. The advantages and opportunities have been shown in the literature review part. marketing, there are some gaps still exist and that can be deduced based on the available literatures. It is here recommended to neutralize these gaps for the future improvement of the technology and business operation. References Ahmed, A. and Ahmed, E., 2016, January.A survey on mobile edge computing. In Intelligent Systems and Control (ISCO), 2016 10th International Conference on (pp. 1-8). IEEE. Bank, J.H., Bradley, L.M., Quirk, A.J. and Sun, L., International Business Machines Corporation, 2016.Enabling mobile computing devices to track data usage among mobile computing devices that share a data plan.U.S. Patent 9,426,308. Borger, S., Cardonha, C.H. and Koch, F.L., International Business Machines Corporation, 2016.Intermediated data entry in a shared message board through a mobile computing device. U.S. Patent 9,485,637. Bradley, L.M., Broomhall, M.E., Loredo, R.E. and Silva, A., International Business Machines Corporation, 2017. Intelligent user interaction experience for mobile computing devices. U.S. Patent 9,613,318. Chen, H., Chiang, R.H. and Storey, V.C., 2012. Business intelligence and analytics: From big data to big impact.MIS quarterly,36(4). Dinh, H.T., Lee, C., Niyato, D. and Wang, P., 2013. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), pp.1587-1611. Gai, K., Qiu, M., Zhao, H., Tao, L. and Zong, Z., 2016.Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing.Journal of Network and Computer Applications, 59, pp.46-54. Ghezzi, A., Cortimiglia, M.N. and Frank, A.G., 2015. Strategy and business model design in dynamic telecommunications industries: A study on Italian mobile network operators. Technological Forecasting and Social Change, management. Hu, Y.C., Patel, M., Sabella, D., Sprecher, N. and Young, V., 2015. Mobile edge computingA key technology towards 5G.ETSI White Paper,11(11), pp.1-16. Jararweh, Y., Ababneh, F., Khreishah, A. and Dosari, F., 2014.Scalable cloudlet-based mobile computing model.Procedia Computer Science, 34, pp.434-441. Liu, G. and Rong, K., 2015. The nature of the Co-evolutionary process: Complex product development in the mobile computing Industrys business ecosystem. Group Organization Management, 40(6), pp.809-842. Pitoura, E. and Samaras, G., 2012.Data management for mobile computing(Vol. 10). Springer Science Business Media. Rao, N.M., Sasidhar, C. and Kumar, V.S., 2012. Cloud computing through mobile-learning.arXiv preprint arXiv:1204.auditing. Sanaei, Z., Abolfazli, S., Gani, A. and Buyya, R., 2014. Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys Tutorials, 16(1), pp.369-392. Sen, A. and Swaminathan, A., Apple Inc., 2016. Cooperative power savings among mobile computing devices.U.S.Patent 9,282,516. Yousfi, A., de Freitas, A., Dey, A.K. and Saidi, R., 2016. The use of ubiquitous computing for business process improvement.IEEE Transactions on Services Computing, 9(4), pp.621-632.