Search results
1 – 3 of 3Sarra Rajhi, Muhammad Ali Asadullah and Walid Derbel
The usage of social media at the workplace has become an undeniable reality, yet the role of social media use (SMU) in job-related outcomes is still unclear. This study uncovers…
Abstract
Purpose
The usage of social media at the workplace has become an undeniable reality, yet the role of social media use (SMU) in job-related outcomes is still unclear. This study uncovers a chain process through which SMU may strengthen job security perception of employees through social media disorder (SMD) and networking behavior.
Design/methodology/approach
This quantitative study used ratings of 197 Emirati students enrolled in a higher education institution located in United Arab Emirates (UAE). The respondents were professionals serving in different public and private organizations in UAE.
Findings
The statistical results supported a significant serial mediation of SMD and networking behavior between SMU and job security perceptions of employees.
Practical implications
This study offers implications for employees and their supervisors about the usage of social media for strengthening their perceptions of job security.
Originality/value
This study contributed to the existing stream of research on SMU to explain a chain process through which employees may benefit from social media to strengthen their perceptions of job security.
Details
Keywords
Venkatesh Kulkarni, Jaspreet Walia, Heikki Hämmäinen, Seppo Yrjölä, Marja Matinmikko-Blue and Risto Jurva
The purpose of this paper is to build possible future scenarios for indoor connectivity in a venue such as a university campus and build alternative value network configurations…
Abstract
Purpose
The purpose of this paper is to build possible future scenarios for indoor connectivity in a venue such as a university campus and build alternative value network configurations (VNCs) defining different local network deployment options, focused on the Finnish telecom market.
Design/methodology/approach
In this paper, Schoemaker’s scenario planning method (Schoemaker, 1995) is used to construct future scenarios and the VNC method of Casey et al. (2010) is used to build alternative VNCs. The paper studies the Aalto University campus network for current end-user data usage demand and the existing technology used in meeting the end-user needs and forecasts the demand for the next five years to understand the need for 5G.
Findings
This research concludes that with the provision of local spectrum licenses, there is an opportunity for venue owners to take the role of 5G local operator on the venue premises. Furthermore, it enables venue owners to collaborate with the incumbent mobile network operators (MNOs) in a neutral host model and provide venue-specific connectivity services.
Research limitations/implications
A detailed economic assessment for the network deployment in the campus is considered for future study.
Originality/value
Considering the provision for local spectrum licenses, this paper has taken a unique attempt in identifying the future scenarios for local 5G network operations. It provides a strategic direction for the venue owners in adopting 5G technology and whether to make 5G or buy 5G from MNOs.
Details
Keywords
Keyvan Rezghdeh and Sajjad Shokouhyar
The main purpose of the present study was to improve and develop previously proposed models for Iran telecommunication networks. It should be noted that the six-dimensional (6D…
Abstract
Purpose
The main purpose of the present study was to improve and develop previously proposed models for Iran telecommunication networks. It should be noted that the six-dimensional (6D) sustainability model used in this study will be a useful and comprehensive model for industries. Since, the new dimension of IT along with the five well-known economic, social, environmental, technical and institutional aspects of organizations is considered to have great impacts on supply chain sustainability; the proposed framework can be practical.
Design/methodology/approach
According to the related literature review, there are two research streams in supply chain management. The first stream is exploratory research, seeking out conceptual discussions in this area. The second one is associated with mathematical models and techniques, aiming to set decision-making rules in this regard (Agrell et al., 2004). In this study, evaluation was performed using the FMEA method as an analytical technique based on the principle of pre-occurrence prevention to identify potential failure factors in sensitive systems (Mohammadfam and Kianfari, 2008).
Findings
After identifying the risks and causes of the incidence and effects and consequences of risks, preventive and risk control measures and advisory strategies were presented. Customers with 45.76% share in critical risks are threatening to maintain supply chain in these companies. During this study, it was found that 33.9% of the main source of supply chain critical risks was customers, constituting 45.76% of such risks, accompanied by organization, having a 38.88% share of critical risk generation. The study findings also revealed that 33.9% of critical risks were mainly (equally) related to economic and technical aspects of supply chain sustainability in telecommunication networks. Moreover, as a newly-introduced sixth dimension, IT represented 10.17% of critical risks threatening supply chain sustainability in such networks. Critical risks are mainly related to the economic and technical aspects (equally) with the sustainability of the telecommunication networks supply chain. Also, as a new finding and the sixth dimension, 10.17% of the critical risks that threaten the sustainability of the telecommunication networks supply chain have the information technology dimension.
Originality/value
The internet and fixed and mobile data services are provided by several private companies in Iran, which are relatively similar in terms of their supply chains. In order to manage the sustainability of Iran's telecommunication supply chain, telecommunication networks affiliated to Iran Telecommunication Company (ITC), operating in the field of data and internet services and fixed telephone were selected in 31 provinces. The intended networks were also providing an important part of the country's needs including Mobile Telecommunication Company of Iran, a subsidiary of Iran's telecommunication networks, as one of the top companies in this industry. Accordingly, all the networks studied in this study needed to be identified with regard to communication sustainability risks, since they provide management solutions to each other by segregating risks. In this study, 68 managers and 72 experts participated in different work teams of telecommunication networks.
Details