Search results

1 – 10 of 106
Article
Publication date: 3 March 2023

Rocky Chung-Ngam Cheng, Xiaohua Men, J.J. Po-An Hsieh, Zhuo June Cheng, Xiaocong Cui, Tiange Wang and Sheng-Hsun Hsu

In the era of the digital economy, organizations are under much pressure to justify their information technology (IT) spending on digital transformation. Some organizations have…

Abstract

Purpose

In the era of the digital economy, organizations are under much pressure to justify their information technology (IT) spending on digital transformation. Some organizations have thus implemented IT chargeback, an IT governance (ITG) mechanism, to clarify and allocate IT costs among various business units. While practitioners have stressed the importance of IT chargeback, there has been little theoretical effort that investigates its strategic effects and boundary conditions.

Design/methodology/approach

Synthesizing the ITG literature and the resource-based view (RBV), the authors develop a research model to examine if IT chargeback affects IT–business strategic alignment and, in turn, organizational performance and how human IT resources strengthen the impacts of IT chargeback. The authors designed a survey to collect data from 103 firms and tested the model using partial least squares (PLS).

Findings

The authors found that IT chargeback promoted strategic alignment and then organizational performance only for firms with business-competent chief information officers (CIOs), rather than IT-competent business executives.

Originality/value

This study enriches the ITG literature by exploring the strategic value of an IT cost governance mechanism (i.e. IT chargeback). This study further proposes and validates a measure of IT chargeback. Drawing on the RBV, this study quantitatively investigates the strategic impacts and boundary contingencies of IT chargeback. This study also advances the CIO literature by identifying the strategic leading role, instead of the traditional supporting role, of CIOs in modern organizations.

Details

Internet Research, vol. 33 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 18 June 2018

Chun-Miin (Jimmy) Chen

The purpose of this paper is to examine service level agreements (SLAs) in the retail industry and uses empirical data to draw conclusions on the relationships between SLA…

Abstract

Purpose

The purpose of this paper is to examine service level agreements (SLAs) in the retail industry and uses empirical data to draw conclusions on the relationships between SLA parameters and retailer financial performance.

Design/methodology/approach

Based on prior SLA theories, hypotheses about the impacts of SLA confidentiality, choice of chargeback mechanisms and chargeback penalty on retailer inventory turnover are tested.

Findings

Retailer inventory turnover could vary by the level of SLA confidentiality, and the variation of retailer inventory turnovers could be explained by chargeback penalty.

Research limitations/implications

The research findings may not be readily applicable to SLAs outside of the retail industry. Also, most conclusions were drawn from publicly available SLAs.

Practical implications

The significant relationships between SLA parameters and retailer inventory turnover imply that a retailer could improve its financial performance by leveraging its SLA design.

Originality/value

Not only does this study contribute to the understanding of retail SLA design in practice, but it also extends prior theories by investigating the implications of SLA design on the retailer inventory turnover.

Details

The International Journal of Logistics Management, vol. 29 no. 4
Type: Research Article
ISSN: 0957-4093

Keywords

Article
Publication date: 2 September 2014

Chioma Vivian Amasiatu and Mahmood Hussain Shah

First party fraud is fraud committed by an account holder or customer that does not involve the use of a stolen identity. This type of fraud has grown substantially in recent…

1837

Abstract

Purpose

First party fraud is fraud committed by an account holder or customer that does not involve the use of a stolen identity. This type of fraud has grown substantially in recent times due to increased online shopping and is becoming a major concern for online retail businesses, hereby referred to as e-tailers. The purpose of this paper is to provide insights into the motives and nature of first party fraud in e-tailing.

Design/methodology/approach

Systematic literature review was used to synthesise existing research on first party fraud. The authors used scholarly literature as well as grey literature to help understand the motives and nature of this growing business problem.

Findings

Findings reveal a myriad of schemes and motives for engaging in first party fraud.

Research limitations/implications

The findings of this paper employed very little literature due to availability. However, the authors believe that the findings are still useful for advancing the knowledge in this emerging research area.

Practical implications

This study will be useful to researchers as well as practitioners in the retail industry in helping understand the nature and motives of first party frauds which could in turn help devise preventive strategies. The study also makes a case for increased managerial interest and involvement in reducing first party fraud.

Originality/value

A comprehensive literature search presented in this paper shows that this is the first paper to synthesise the various forms of first party fraud in e-tailing.

Details

International Journal of Retail & Distribution Management, vol. 42 no. 9
Type: Research Article
ISSN: 0959-0552

Keywords

Article
Publication date: 25 July 2008

Curtis A. Knapp and Jennifer Oliver

The aim of this paper is to provide an overview of the merits of occupancy planning as a means for improving strategic decisions regarding real estate portfolios and strengthening…

700

Abstract

Purpose

The aim of this paper is to provide an overview of the merits of occupancy planning as a means for improving strategic decisions regarding real estate portfolios and strengthening the credibility of corporate real estate (CRE) professionals.

Design/methodology/approach

The authors' extensive experience is combined with survey results and case examples of how two global companies are benefiting from occupancy planning.

Findings

Occupancy planning programs lead to better data and forecasting, which in turn create a more accurate portfolio‐wide view and improved space utilization.

Originality/value

This article demonstrates the link between effective occupancy planning and sound CRE decisions.

Details

Journal of Corporate Real Estate, vol. 10 no. 3
Type: Research Article
ISSN: 1463-001X

Keywords

Article
Publication date: 1 October 2018

Miriam Borchardt, Marcelo Souza, Giancarlo M. Pereira and Claudia V. Viegas

Branded car dealerships with best revenue by serviced car also have the best after-sales customers’ satisfaction level. The purpose of this paper is to present the analysis of the…

2405

Abstract

Purpose

Branded car dealerships with best revenue by serviced car also have the best after-sales customers’ satisfaction level. The purpose of this paper is to present the analysis of the after-sales quality management practices adopted by dealerships with the best performance in terms of customer’s satisfaction and revenue and how such practices contribute to these results.

Design/methodology/approach

A multiple case study was performed with nine leader branded car dealerships in an emerging country, considering the entrance car. The performance indicators to evaluate customers’ satisfaction, revenue and operational indicators related to product support, brand manifestation and relationship with customers were identified. Quality management practices that support the best results achievement were analyzed.

Findings

The three dealerships that represent Asiatic brands have best customers’ satisfaction and revenue performance. These dealerships typically have different processes comparing with dealerships that represent European and American brands concerning to: continuous improvement management; warranties and stock management; services scheduling; offer bonuses to customers; and customers service that emphasizes focus on technical and commercial expertise.

Originality/value

This research considered indicators performance and, based on that, analyzed the dealerships’ practices that support the best performance. Such aspect has room for academic literature since the quality management research related to car industry focuses mainly on manufacturer and generates managerial insights to the car industry and its dealerships.

Details

International Journal of Quality & Reliability Management, vol. 35 no. 9
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 1 October 1998

Larry Levine and Betsy McClain

Regardless of how they are budgeted, information technology (IT) costs must be paid. Most schools offer some computing services at no cost to the individual or unit and some that…

1454

Abstract

Regardless of how they are budgeted, information technology (IT) costs must be paid. Most schools offer some computing services at no cost to the individual or unit and some that are charged back to users and units. Typically, common good services are centrally funded, and services that differentially benefit specific individuals or units are charged for. How services are funded often reflects a school’s philosophy about IT and about finances. Preferably, IT funding mechanisms deliberately help shape and influence an institution’s IT and services philosophy, as opposed to an IT or service philosophy being unintentionally shaped by fiscal policies that follow no particular strategy. Levying fees to users on an individual or departmental basis may yield a different demand and expectation of IT services than when costs are borne by a central budget. Quantity and quality, degree of centralization, and administrative complexity of services are major variables in determining funding. Also at stake is the degree to which an institution wishes to endorse, suppress, control or expand IT services. These issues are specifically illustrated through a case study of the formulation of a new budget and cost accounting model to both finance an institution‐wide network upgrade and to maintain that network.

Details

Campus-Wide Information Systems, vol. 15 no. 4
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 1 December 2002

Steven R. Gordon and Judith R. Gordon

The organization of companies’ information technology (IT) functions has been studied and described in three ways: on a centralization‐decentralization continuum, on the basis of…

1529

Abstract

The organization of companies’ information technology (IT) functions has been studied and described in three ways: on a centralization‐decentralization continuum, on the basis of technological architecture, and, for multinational companies, as reflective of their strategic focus. This research proposes a classification of organizational structures based on the tension between business units and IT departments in the delivery of IT services. Using a cluster analysis on a sample of 40 companies having corporate offices in the USA or The Netherlands, it identifies four basic structures or patterns that describe the similarities and differences in the way IT services are handled. The paper then describes the implications of these structures for companies that are considering the redesign or restructure of their information technology function.

Details

Information Technology & People, vol. 15 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 April 1988

Elizabeth Richmond

Costing is more than just a buzz word for librarians working in either the public or private sector. We are all concerned with program efficiency, cost containment, and financial…

Abstract

Costing is more than just a buzz word for librarians working in either the public or private sector. We are all concerned with program efficiency, cost containment, and financial management. But, cost studies are a lot of work and not universally popular. In fact, actual cost studies are not common. Those produced are frequently uneven in method and quality and often focus on specific areas such as acquisitions or circulation. As a result, the methodology for arriving at the cost conclusions is at best unique to the specific case; at worst it is incomplete or only inferred.

Details

The Bottom Line, vol. 1 no. 4
Type: Research Article
ISSN: 0888-045X

Article
Publication date: 3 February 2023

Tahir Sufi, Bindu Ranga and Indu Ranga

The incidents of hotel theft constitute a significant cause of concern for the hotel industry. Such incidents result in substantial financial implications, inventory management…

Abstract

Purpose

The incidents of hotel theft constitute a significant cause of concern for the hotel industry. Such incidents result in substantial financial implications, inventory management issues and complications in finding exact replacements. This study, therefore, investigates customer stealing practices in Indian hotel industry.

Design/methodology/approach

A structured email interview was conducted with twenty-five senior hotel managers. The data were analyzed by adopting a coding technique using inductive content analysis.

Findings

The results were discussed under seven headings-extent of such stealing incidents, financial consequences of such practices, strategies to prevent such instances and, finally, how to deal with customers when caught stealing.

Research limitations/implications

This study highlighted themes related to the profile of customers involved in stealing practices, motives, consequences and strategies required to manage such customers. Future studies can focus on restaurants, airlines, airports and tourist attractions to identify strategies and best practices for preventing such practices.

Practical implications

The study's findings have tremendous potential for the hospitality industry. Dealing with customers’ stealing practices is a very sensitive issue. Furthermore, hotels bear lots of expenses if the policy for tackling the problem still needs to be implemented. Furthermore, if not handled professionally, a lack of effective guidelines can cause embarrassment for managers.

Social implications

The study has the potential to raise awareness among the members of society to be more responsible toward hotel property.

Originality/value

This study extends to the limited literature on hotel guests' theft. The comprehensive analysis of the themes generated from an interview with the senior managers of the hotel industry provides a unique insight into the nature of the problem. The solutions offered in this study are an original contribution to the literature.

Details

Journal of Hospitality and Tourism Insights, vol. 6 no. 5
Type: Research Article
ISSN: 2514-9792

Keywords

Article
Publication date: 16 February 2010

Mohamed Alsudairi and Yogesh K. Dwivedi

In recent years a large number of studies have appeared on information systems (IS)/information technology (IT) outsourcing related issues but scattered in a number of distantly…

3432

Abstract

Purpose

In recent years a large number of studies have appeared on information systems (IS)/information technology (IT) outsourcing related issues but scattered in a number of distantly related publishing outlets which may hamper the use of such published resources and repetition of research conducted by various researchers. The purpose of this paper is to conduct a systematic survey of the literature pertaining to research on IS/IT outsourcing.

Design/methodology/approach

The research aim was accomplished by extracting information on a number of relevant variables by conducting a review of 315 articles on IS/IT outsourcing published between 1992 and 2008.

Findings

The analysis is presented by listing and illustrating subject category, journals, year of publications and country, frequently published authors, productive institutions, the trend of collaborative nature (co‐author analysis) of research, the impact/influence of published research; topics/research issues and utilised methods, and the challenges and limitations of existing research.

Practical implications

Results of this research may have implications for both private and public sector organizations interested in outsourcing IS/IT services and applications, and various stakeholders of academic publishing (namely, researchers, journal editors, reviewers and universities) research on IS/IT outsourcing.

Originality/value

The primary value of this paper lies in extending the understanding of evolution and patterns of outsourcing research.

Details

Journal of Enterprise Information Management, vol. 23 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of 106