<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0187-358X</journal-id>
<journal-title><![CDATA[Investigación bibliotecológica]]></journal-title>
<abbrev-journal-title><![CDATA[Investig. bibl]]></abbrev-journal-title>
<issn>0187-358X</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Investigaciones Bibliotecológicas y de la Información]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0187-358X2024000200035</article-id>
<article-id pub-id-type="doi">10.22201/iibi.24488321xe.2024.99.58874</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[De la computación pervasiva a los sistemas de información pervasivos]]></article-title>
<article-title xml:lang="en"><![CDATA[From Pervasive Computing to Pervasive Information Systems]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Guadarrama-Sánchez]]></surname>
<given-names><![CDATA[Hugo Alberto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nacional Autónoma de México Instituto de Investigaciones Bibliotecológicas y de la Información ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<volume>38</volume>
<numero>99</numero>
<fpage>35</fpage>
<lpage>54</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S0187-358X2024000200035&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S0187-358X2024000200035&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S0187-358X2024000200035&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen El objetivo de investigación se fundamenta en describir los sistemas de información pervasivos contemporáneos con base en los presupuestos teóricos seleccionados. A partir de un método inductivo guiado por diferentes posturas hacia las características de los sistemas de información pervasivos, se sintetizan ciertos elementos a manera de armonización conceptual basados en la computación pervasiva. Los resultados obtenidos a nivel conceptual denotan que un sistema de información pervasivo contemporáneo tiende a expandirse en el tiempo y espacio del área de trabajo, puesto que las actividades laborales y los servicios de información han transgredido los momentos y sitios personales ajenos a las tareas específicas del lugar de trabajo.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The objective is to describe contemporary pervasive information systems based on selected theoretical assumptions. starting from an inductive method grounded on different stands toward the characteristics of pervasive information systems, certain elements are synthesized as conceptual harmonization based on pervasive computing. The results obtained, at a conceptual level, denote that a contemporary pervasive information system tends to expand past the time and space of the working area, since work activities and information services have overtaken private moments and places beyond the tasks of the workplace.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Computación pervasiva]]></kwd>
<kwd lng="es"><![CDATA[Computación ubicua]]></kwd>
<kwd lng="es"><![CDATA[Tecnologías pervasivas]]></kwd>
<kwd lng="es"><![CDATA[sistemas pervasivos]]></kwd>
<kwd lng="en"><![CDATA[Pervasive Computing]]></kwd>
<kwd lng="en"><![CDATA[ubiquitous Computing]]></kwd>
<kwd lng="en"><![CDATA[Pervasive Technologies]]></kwd>
<kwd lng="en"><![CDATA[Pervasive systems]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Birnbaum]]></surname>
<given-names><![CDATA[Joel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pervasive Information Systems]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>1997</year>
<volume>40</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>40-1</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bott]]></surname>
<given-names><![CDATA[Ed]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Microsoft's Obsession with Piracy Threatens to Create a Windows 10 Licensing Mess]]></article-title>
<source><![CDATA[Zdnet]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brooks]]></surname>
<given-names><![CDATA[Chuck]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Merging of Human and Machine. Two Frontiers of Emerging Technologies]]></article-title>
<source><![CDATA[Forbes]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bull]]></surname>
<given-names><![CDATA[Peter]]></given-names>
</name>
<name>
<surname><![CDATA[Limb]]></surname>
<given-names><![CDATA[Ryan]]></given-names>
</name>
<name>
<surname><![CDATA[Payne]]></surname>
<given-names><![CDATA[James]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pervasive Home Environments]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Steventon]]></surname>
<given-names><![CDATA[Alan]]></given-names>
</name>
<name>
<surname><![CDATA[Wright]]></surname>
<given-names><![CDATA[Steve]]></given-names>
</name>
</person-group>
<source><![CDATA[Intelligent Spaces: Computer Communications and Networks]]></source>
<year>2006</year>
<page-range>81-91</page-range><publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chandra]]></surname>
<given-names><![CDATA[Deepak]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pervasive Computing]]></article-title>
<source><![CDATA[National Informatics Centre]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cheney]]></surname>
<given-names><![CDATA[Catherine]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How WhatsApp Became the Tool of Choice for WHO's COVID-19 Messaging]]></article-title>
<source><![CDATA[Devex]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dingli]]></surname>
<given-names><![CDATA[Alexiei]]></given-names>
</name>
<name>
<surname><![CDATA[Tanti]]></surname>
<given-names><![CDATA[Daniel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pervasive Social Network]]></article-title>
<source><![CDATA[UBICOMM 2015: The Ninth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies]]></source>
<year>2015</year>
<page-range>31-7</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<collab>Florida Institute of Technology</collab>
<article-title xml:lang=""><![CDATA[5 Types of Information Systems]]></article-title>
<source><![CDATA[Florida Tech]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gabriel]]></surname>
<given-names><![CDATA[Peter]]></given-names>
</name>
<name>
<surname><![CDATA[Bovenschulte]]></surname>
<given-names><![CDATA[Marc]]></given-names>
</name>
<name>
<surname><![CDATA[Hartmann]]></surname>
<given-names><![CDATA[Ernst]]></given-names>
</name>
</person-group>
<source><![CDATA[Pervasive Computing: Trends and Impacts]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Bonn ]]></publisher-loc>
<publisher-name><![CDATA[Federal Office for Information Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Giner]]></surname>
<given-names><![CDATA[Pau]]></given-names>
</name>
<name>
<surname><![CDATA[Cetina]]></surname>
<given-names><![CDATA[Carlos]]></given-names>
</name>
<name>
<surname><![CDATA[Fons]]></surname>
<given-names><![CDATA[Joan]]></given-names>
</name>
<name>
<surname><![CDATA[Pelechano]]></surname>
<given-names><![CDATA[Vicente]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Framework for the Reconfiguration of Ubicomp Systems]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Corchado]]></surname>
<given-names><![CDATA[Juan]]></given-names>
</name>
<name>
<surname><![CDATA[Tapia]]></surname>
<given-names><![CDATA[Dante]]></given-names>
</name>
<name>
<surname><![CDATA[Bravo]]></surname>
<given-names><![CDATA[José]]></given-names>
</name>
</person-group>
<source><![CDATA[Third Symposium of Ubiquitous Computing and Ambient Intelligence 2008]]></source>
<year>2009</year>
<page-range>110</page-range><publisher-loc><![CDATA[Berlin ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hayes]]></surname>
<given-names><![CDATA[Emma]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[10 Different Types of Information Systems: Explained in Plain English]]></article-title>
<source><![CDATA[History-Computer]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hilty]]></surname>
<given-names><![CDATA[Lorenz]]></given-names>
</name>
<name>
<surname><![CDATA[Som]]></surname>
<given-names><![CDATA[Claudia]]></given-names>
</name>
<name>
<surname><![CDATA[Köhler]]></surname>
<given-names><![CDATA[Andreas]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Assessing the Human, Social and Environmental Risks of Pervasive Computing]]></article-title>
<source><![CDATA[Human and Ecological Risk Assessment: An International Journal]]></source>
<year>2004</year>
<volume>10</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>853-74</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[Sun-Ha]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Technofutures in Stasis: Smart Machines, Ubiquitous Computing, and the Future That Keeps Coming Back]]></article-title>
<source><![CDATA[International Journal of Communication]]></source>
<year>2021</year>
<volume>15</volume>
<page-range>1940-60</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jurado Pérez]]></surname>
<given-names><![CDATA[Luis Alberto]]></given-names>
</name>
</person-group>
<source><![CDATA[Arquitecturas de computación pervasiva basadas en servicios REST]]></source>
<year>2014</year>
<publisher-name><![CDATA[Universidad Politécnica de Madrid]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khalfi]]></surname>
<given-names><![CDATA[Mohammed Fethi]]></given-names>
</name>
<name>
<surname><![CDATA[Benslimane]]></surname>
<given-names><![CDATA[Sidi Mohamed]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Toward A Generic Infrastructure for Ubiquitous Computing]]></article-title>
<source><![CDATA[International Journal of Advanced Pervasive and Ubiquitous Computing]]></source>
<year>2013</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>66-85</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Klovig]]></surname>
<given-names><![CDATA[Sebastian Klovig]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Microsoft 365 Banned in German Schools over Privacy Concerns]]></article-title>
<source><![CDATA[Computer Weekly]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kostakos]]></surname>
<given-names><![CDATA[Vassilis]]></given-names>
</name>
<name>
<surname><![CDATA[Eamonn]]></surname>
<given-names><![CDATA[O'Neill]]></given-names>
</name>
<name>
<surname><![CDATA[Penn]]></surname>
<given-names><![CDATA[Alan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Designing Urban Pervasive Systems]]></article-title>
<source><![CDATA[IEEE Computer Society]]></source>
<year>2006</year>
<volume>39</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>52-9</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kourouthanassis]]></surname>
<given-names><![CDATA[Panos]]></given-names>
</name>
<name>
<surname><![CDATA[Giaglis]]></surname>
<given-names><![CDATA[George]]></given-names>
</name>
<name>
<surname><![CDATA[Vrechopoulos]]></surname>
<given-names><![CDATA[Adam]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Enhancing User Experience through Pervasive Information Systems: The Case of Pervasive Retailing]]></article-title>
<source><![CDATA[International Journal of Information Management]]></source>
<year>2007</year>
<volume>27</volume>
<page-range>319-35</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lyytinen]]></surname>
<given-names><![CDATA[Kalle]]></given-names>
</name>
<name>
<surname><![CDATA[Yoo]]></surname>
<given-names><![CDATA[Youngjin]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Issues and Challenges in Ubiquitous Computing]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>2002</year>
<volume>45</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>63-5</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Miao]]></surname>
<given-names><![CDATA[Zhenjiang]]></given-names>
</name>
<name>
<surname><![CDATA[Yuan]]></surname>
<given-names><![CDATA[Baozong]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Discussion on Pervasive Computing Paradigm]]></article-title>
<source><![CDATA[TENCON 2005 - 2005 IEEE Region 10 Conference]]></source>
<year>2005</year>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Molla]]></surname>
<given-names><![CDATA[Rani]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Pandemic was Great for Zoom. What Happens When There's a Vaccine?]]></article-title>
<source><![CDATA[Vox]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mukherjee]]></surname>
<given-names><![CDATA[Sritoma]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The 6 Types of Information Systems and Their Applications]]></article-title>
<source><![CDATA[Emeritus]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muñoz]]></surname>
<given-names><![CDATA[Javier]]></given-names>
</name>
<name>
<surname><![CDATA[Ruiz]]></surname>
<given-names><![CDATA[Idoia]]></given-names>
</name>
<name>
<surname><![CDATA[Pelechano]]></surname>
<given-names><![CDATA[Vicente]]></given-names>
</name>
<name>
<surname><![CDATA[Cetina]]></surname>
<given-names><![CDATA[Carlos]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Un framework para la simulación de sistemas pervasivos]]></article-title>
<source><![CDATA[Actas del Simposio de Computación Ubicua e Inteligencia Ambiental, UCAmI2005]]></source>
<year>2005</year>
<page-range>181-9</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Phillips]]></surname>
<given-names><![CDATA[Gavin]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why You Don't Need Adobe Reader (And What to Use Instead)]]></article-title>
<source><![CDATA[Make Use of]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quinde]]></surname>
<given-names><![CDATA[Catalina]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["¿Qué es la computación ubicua o pervasiva?]]></article-title>
<source><![CDATA[Computación ubicua o pervasiva]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rangel Romero]]></surname>
<given-names><![CDATA[Miguel Angel]]></given-names>
</name>
<name>
<surname><![CDATA[Iñiguez Carrillo]]></surname>
<given-names><![CDATA[Adriana Lorena]]></given-names>
</name>
<name>
<surname><![CDATA[López Villalvazo]]></surname>
<given-names><![CDATA[Abraham Jair]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Valoración de la herramienta Google Drive durante el trabajo colaborativo universitario]]></article-title>
<source><![CDATA[Revista Iberoamericana para la Investigación y el Desarrollo Educativo]]></source>
<year>2021</year>
<volume>11</volume>
<numero>22</numero>
<issue>22</issue>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ratcliffe]]></surname>
<given-names><![CDATA[Martyn]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Bin]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[State Based Analysis of Pervasive Systems]]></article-title>
<source><![CDATA[Second International Conference on Pervasive Computing and Applications]]></source>
<year>2007</year>
<page-range>572-6</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Renteria]]></surname>
<given-names><![CDATA[Leonardo]]></given-names>
</name>
<name>
<surname><![CDATA[Mayacela]]></surname>
<given-names><![CDATA[Ángel]]></given-names>
</name>
<name>
<surname><![CDATA[Rojas]]></surname>
<given-names><![CDATA[Mayra]]></given-names>
</name>
<name>
<surname><![CDATA[Mayacela]]></surname>
<given-names><![CDATA[Margarita]]></given-names>
</name>
<name>
<surname><![CDATA[Mayacela]]></surname>
<given-names><![CDATA[Ángela]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Facebook como herramienta educativa emergente en el proceso de enseñanza-aprendizaje de nivel inicial en tiempos de pandemia]]></article-title>
<source><![CDATA[Novasinergia]]></source>
<year>2021</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>42-52</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salinas Segura]]></surname>
<given-names><![CDATA[Alexander]]></given-names>
</name>
</person-group>
<source><![CDATA[The Internet of Things: Business Applications, Technology Acceptance, and Future Prospects Dissertation]]></source>
<year>2016</year>
<publisher-name><![CDATA[Julius Maximilian Universidad de Wurzburgo]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[Carlos]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La computación ubicua: omnipresencia en los sistemas de información]]></article-title>
<source><![CDATA[Revista Tecnura]]></source>
<year>2015</year>
<volume>19</volume>
<page-range>121-8</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shea]]></surname>
<given-names><![CDATA[Sharon]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pervasive Computing (Ubiquitous Computing)]]></article-title>
<source><![CDATA[Tech Target]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silvis-Cividjian]]></surname>
<given-names><![CDATA[Natalia]]></given-names>
</name>
</person-group>
<source><![CDATA[Pervasive Computing]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Suiza ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="">
<collab>Simplilearn</collab>
<source><![CDATA[The 6 Most Popular Types of Information Systems and Their Applications]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Taconet]]></surname>
<given-names><![CDATA[Chantal]]></given-names>
</name>
<name>
<surname><![CDATA[Batista]]></surname>
<given-names><![CDATA[Thais]]></given-names>
</name>
<name>
<surname><![CDATA[Borges]]></surname>
<given-names><![CDATA[Pedro]]></given-names>
</name>
<name>
<surname><![CDATA[Bouloukakis]]></surname>
<given-names><![CDATA[Georgios]]></given-names>
</name>
<name>
<surname><![CDATA[Cavalcante]]></surname>
<given-names><![CDATA[Everton]]></given-names>
</name>
<name>
<surname><![CDATA[Chabridon]]></surname>
<given-names><![CDATA[Sophie]]></given-names>
</name>
<name>
<surname><![CDATA[Conan]]></surname>
<given-names><![CDATA[Denis]]></given-names>
</name>
<name>
<surname><![CDATA[Desprats]]></surname>
<given-names><![CDATA[Thierry]]></given-names>
</name>
<name>
<surname><![CDATA[Muñante]]></surname>
<given-names><![CDATA[Denisse]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Middleware Supporting PIS: Requirements, Solutions, and Challenges]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Kirsch]]></surname>
<given-names><![CDATA[Manuele]]></given-names>
</name>
<name>
<surname><![CDATA[Souveyet]]></surname>
<given-names><![CDATA[Carine]]></given-names>
</name>
<name>
<surname><![CDATA[Roose]]></surname>
<given-names><![CDATA[Philippe]]></given-names>
</name>
<name>
<surname><![CDATA[Steffenel]]></surname>
<given-names><![CDATA[Luiz]]></given-names>
</name>
</person-group>
<source><![CDATA[The Evolution of Pervasive Information Systems]]></source>
<year>2023</year>
<page-range>65-97</page-range><publisher-loc><![CDATA[Cham ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Prospering in the Pandemic: The Top 100 Companies]]></article-title>
<source><![CDATA[The Financial Times]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thompson]]></surname>
<given-names><![CDATA[Simon]]></given-names>
</name>
<name>
<surname><![CDATA[Azvine]]></surname>
<given-names><![CDATA[Ben]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[No Pervasive Computing without Intelligent Systems]]></article-title>
<source><![CDATA[BT Technology Journal]]></source>
<year>2004</year>
<volume>22</volume>
<page-range>39-49</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weiser]]></surname>
<given-names><![CDATA[Mark]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Computer for the 21st Century]]></article-title>
<source><![CDATA[Scientific American]]></source>
<year>1991</year>
<volume>265</volume>
<page-range>78-89</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[Mark]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adobe Gives Students Free Home Creative Cloud Access - Here's How to Get it]]></article-title>
<source><![CDATA[TechRadar]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ye]]></surname>
<given-names><![CDATA[Juan]]></given-names>
</name>
<name>
<surname><![CDATA[Dobson]]></surname>
<given-names><![CDATA[Simon]]></given-names>
</name>
<name>
<surname><![CDATA[Nixon]]></surname>
<given-names><![CDATA[Paddy]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Overview of Pervasive Computing Systems]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Delaney]]></surname>
<given-names><![CDATA[Kieran]]></given-names>
</name>
</person-group>
<source><![CDATA[Ambient Intelligence with Microsystems: Augmented Materials and Smart Objects]]></source>
<year>2008</year>
<page-range>3-17</page-range><publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[Jiehan]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[Junzhao]]></given-names>
</name>
<name>
<surname><![CDATA[Athukorala]]></surname>
<given-names><![CDATA[Kumaripaba]]></given-names>
</name>
<name>
<surname><![CDATA[Wijekoon]]></surname>
<given-names><![CDATA[Dinesh]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pervasive Social Computing: Augmenting Five Facets of Human Intelligence]]></article-title>
<source><![CDATA[Seventh International Conference on Ubiquitous Intelligence &amp; Computing and Seventh International Conference on Autonomic &amp; Trusted Computing]]></source>
<year>2010</year>
<page-range>1-6</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
