Search results

1 – 10 of over 138000
To view the access options for this content please click here
Article
Publication date: 1 December 2003

Wilfried Lemahieu, Monique Snoeck and Cindy Michiels

At present, many companies rely on third‐party applications and application services for (part of) their information systems. When applications from different parties are…

Abstract

At present, many companies rely on third‐party applications and application services for (part of) their information systems. When applications from different parties are used together, an integration problem arises. This paper describes an integration approach based on the construction of an enterprise layer. This approach is deliberately kept away from a document‐based, flow‐oriented approach, where business processes are hard coded into the application architecture. Interaction is based on the concurrent update of a shared underlying enterprise layer. At the same time, the application architecture becomes easily adaptable to re‐engineered business processes.

Details

Business Process Management Journal, vol. 9 no. 6
Type: Research Article
ISSN: 1463-7154

Keywords

To view the access options for this content please click here
Article
Publication date: 1 June 2002

George K. Chacko

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade…

Abstract

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 14 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

To view the access options for this content please click here
Article
Publication date: 7 August 2017

Wei-Chao Lin, Shih-Wen Ke and Chih-Fong Tsai

Data mining is widely considered necessary in many business applications for effective decision-making. The importance of business data mining is reflected by the…

Abstract

Purpose

Data mining is widely considered necessary in many business applications for effective decision-making. The importance of business data mining is reflected by the existence of numerous surveys in the literature focusing on the investigation of related works using data mining techniques for solving specific business problems. The purpose of this paper is to answer the following question: What are the widely used data mining techniques in business applications?

Design/methodology/approach

The aim of this paper is to examine related surveys in the literature and thus to identify the frequently applied data mining techniques. To ensure the recent relevance and quality of the conclusions, the criterion for selecting related studies are that the works be published in reputed journals within the past 10 years.

Findings

There are 33 different data mining techniques employed in eight different application areas. Most of them are supervised learning techniques and the application area where such techniques are most often seen is bankruptcy prediction, followed by the areas of customer relationship management, fraud detection, intrusion detection and recommender systems. Furthermore, the widely used ten data mining techniques for business applications are the decision tree (including C4.5 decision tree and classification and regression tree), genetic algorithm, k-nearest neighbor, multilayer perceptron neural network, naïve Bayes and support vector machine as the supervised learning techniques and association rule, expectation maximization and k-means as the unsupervised learning techniques.

Originality/value

The originality of this paper is to survey the recent 10 years of related survey and review articles about data mining in business applications to identify the most popular techniques.

Details

Kybernetes, vol. 46 no. 7
Type: Research Article
ISSN: 0368-492X

Keywords

To view the access options for this content please click here
Article
Publication date: 1 December 2003

Vishanth Weerakkody, Wendy L. Currie and Yamaya Ekanayake

The quest for service excellence and competitive edge by firms result in the constant search for effective process and information systems management methods. The recent…

Abstract

The quest for service excellence and competitive edge by firms result in the constant search for effective process and information systems management methods. The recent emergence of the application service provision (ASP) business model has promised firms remote‐access to industry robust business processes and “best of breed” enterprise applications on a rental basis. This paper examines how the ASP business model facilitates business process and information systems improvements in firms through effective process management. This is pursued through a review of relevant literature and empirical evidence gathered from a case study‐based investigation in six firms in the UK. By examining the features of remote application and business process outsourcing in the context of business process management, this paper outlines how firms can improve their business and IT performance. Findings from empirical evidence are used to substantiate the arguments and suggest areas for future research.

Details

Business Process Management Journal, vol. 9 no. 6
Type: Research Article
ISSN: 1463-7154

Keywords

To view the access options for this content please click here
Article
Publication date: 6 June 2016

Ozlem Bak

The purpose of this paper is to evaluate e-business driven organisational transformation and its resource implications for a European automotive multinational corporation…

Abstract

Purpose

The purpose of this paper is to evaluate e-business driven organisational transformation and its resource implications for a European automotive multinational corporation. The application of Business Process Change Model (BPCM) was used to investigate throughout the five developmental stages of transformation and the associated resource implications in business-to-business (B2B) and extranet applications.

Design/methodology/approach

Based on a case study design, B2B and extranet applications were selected. A triangulated research approach was used to capture the resource implications upon transformation, incorporating a participant observation and interviews.

Findings

The findings indicate that the resource implications change in a transformation process based on individual e-business applications as well as the developmental stages of BPCM. Throughout the transformation only resource investment remained present in both applications. The change in resource implications and iterations between the BPCM stages in the case of “process redefinition”, “continuous improvement” underline why organisational transformation in similar settings could indicate variances in organisations’ transformation results.

Research limitations/implications

The paper offers an insight into the resource implications in an e-business enabled transformation and underpins the importance of using developmental stages to bridge the divide between planning and application. The resource impact has been evaluated within the automotive sector using BPCM, future empirical research is needed to test the BPCM in other industrial e-business enabled transformation settings.

Practical implications

Organisations should take a developmental approach to transformation that assesses resources implications. This also raises the need for using models such as the BPCM to fine-tune the transformation effort, through the inclusion of a more interactive iteration between BPCM stages.

Originality/value

In this paper, the authors present an analysis of an e-business related, organisational transformation project, including an assessment of its ultimate effectiveness. This is the first case study, which focuses on resource implications solely and utilises the BPCM framework to understand the evolution of transformation effort and its resource implications.

Details

Information Technology & People, vol. 29 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

To view the access options for this content please click here
Article
Publication date: 19 June 2019

Anneli Douglas

Research abounds highlighting the differences between males and females when they travel. Even in business travel, these differences have been acknowledged, with suppliers…

Abstract

Purpose

Research abounds highlighting the differences between males and females when they travel. Even in business travel, these differences have been acknowledged, with suppliers and marketers spending significant money to develop and market products to accommodate them. The purpose of this study is to ascertain whether differences exist in terms of mobile application usage between male and female business travellers.

Design/methodology/approach

A mixed method approach is followed. An internet-based survey is distributed and in-depth interviews conducted with South African business travellers. The Mann–Whitney U-test is used to test the differences between males and females and their mobile application usage. Content analysis is used to analyse the interviews.

Findings

The results show that mobile applications are perceived as more important by females than males in all the phases of the travel cycle, although most of these differences in perceived importance were not significant.

Research limitations/implications

Owing to the online data-collection method and the self-selective process, the findings cannot be generalised to the global population of business travellers who use mobile applications.

Practical implications

The results should caution corporate organisations, travel management companies and their application developers not to spend unnecessary technological and financial resources on developing applications to accommodate differences between males and females, which might not exist. Companies should rather spend money on developing applications that will enhance and add convenience to the business traveller’s experience.

Originality/value

The main contribution of this study lies in investigating the applications market, particularly in the context of business travel. Applications focussed on specific sectors of the tourism industry, such as business travel applications, serve business travellers differently from generic travel applications. This research examines business travel-specific applications and expands the scale and scope of the enquiry, concentrating on the travellers’ view.

研究目的

本论文主要研究男人和女人在旅游中的行为区别。特别是在商务旅游中, 男女差别确实存在, 这也验证了供应商和营销商在开发营销产品中的针对性和区别性。本论文旨在验证是否男女商务旅游者对使用移动APP存在区别。

研究设计/方法/途径

本论文采用混合采样方法。采样方式通过网络问卷和深度访谈, 采样群体为南非商务游客。本论文采取Mann–Whitney U检验来测试男女在移动APP使用上的区别。本论文还采取文本分析法来分析访问数据。

研究结果

研究结果表明女性游客在各个旅游阶段都比男性游客对移动APP更看重, 而这些区别在统计计算上并没有获得显著效果。

研究理论限制/意义

由于线上采样和自助问卷的采样限制, 研究结果不能推广到全球商务旅客对于使用移动APP的态度。

研究实践意义

研究结果可以警示企业机构、旅游管理公司、以及APP开发商不要花费不必要的科技和财力资源来迎合男女受众的需求。因为这个区别可能不存在。公司应该花费财力在开发APP上, 使得商旅客人的使用体验更加便捷。

研究原创性/价值

本论文最重要的贡献就是研究了商旅APP市场。商旅APP区分于普通旅游APP。我们的研究检验了商旅客人APP以及扩展其度量和研究视野到旅游者的角度。

关键词

移动设备, 性别, 商务旅行, 商务旅行周期, 商务旅客, 移动商务旅行应用

Details

Journal of Hospitality and Tourism Technology, vol. 10 no. 3
Type: Research Article
ISSN: 1757-9880

Keywords

To view the access options for this content please click here
Article
Publication date: 1 October 2004

Wendy L. Currie, Xinkun Wang and Vishanth Weerakkody

This paper discusses an ongoing research programme, which explores the development of the software‐as‐a‐service business model by different service providers (xSPs). With…

Abstract

This paper discusses an ongoing research programme, which explores the development of the software‐as‐a‐service business model by different service providers (xSPs). With the demise of the first phase of the ASP market, due to the failure of vendors to provide business value to potential and existing customers, Web services promise to resolve some of these problems by integrating software applications across heterogeneous technology platforms and business environments. Whether this will be achieved is the subject of continuing debate. This paper presents the preliminary findings from a study, which uses the Microsoft .NET technology platform to develop Web services. Two Web‐enabled prototype databases are discussed. The paper concludes that Web services is still relatively new, but if key technical and business challenges are resolved, it may provide value for the customer where ASPs failed.

Details

Journal of Enterprise Information Management, vol. 17 no. 5
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Article
Publication date: 6 April 2020

Srinivasa Raghavan R., Jayasimha K.R. and Rajendra V. Nargundkar

Organizations worldwide are adopting software as a service (SaaS) applications, where they pay a subscription fee to gain access rather than buying the software. The…

Abstract

Purpose

Organizations worldwide are adopting software as a service (SaaS) applications, where they pay a subscription fee to gain access rather than buying the software. The extant models on software acquisition processes, several of which are based on organizational buying behavior, do not sufficiently explain how SaaS application acquisition decisions are made. This study aims to investigate the acquisition process organizations follow for SaaS software, the changes to the roles of the Chief Information Officer (CIO) and the business user and also looks at the impact of SaaS on the proliferation of unauthorized software systems.

Design/methodology/approach

The authors used exploratory research using the grounded theory approach based on 18 in-depth interviews conducted with respondents who have studied with enterprise software delivered on-premise and as SaaS in different roles such as sales, consulting, CIO, information technology (IT) management and product development.

Findings

The authors identified a need to classify the SaaS software and developed a framework that uses software specificity and its strategic importance to the organization to classify SaaS applications. The aforementioned framework is used to explain how software evaluation processes have changed for different kinds of SaaS applications. The authors also found that the CIO’s and the business users’ have changed substantially in SaaS application evaluations and found evidence to show that shadow IT will be restricted to some classes of SaaS applications.

Originality/value

By focusing on the changes to the roles and responsibilities of the members of the buying center, this paper provides unique insights into how the acquisition process of SaaS is different from the extant models used to explain enterprise software acquisitions. An understanding of how information search is conducted by the business users will help software vendors to target business users better.

Details

Journal of Business & Industrial Marketing, vol. 35 no. 4
Type: Research Article
ISSN: 0885-8624

Keywords

To view the access options for this content please click here
Article
Publication date: 7 October 2014

Martin Aruldoss, Miranda Lakshmi Travis and V. Prasanna Venkatesan

Business intelligence (BI) has been applied in various domains to take better decisions and it provides different level of information to its stakeholders according to the…

Abstract

Purpose

Business intelligence (BI) has been applied in various domains to take better decisions and it provides different level of information to its stakeholders according to the information needs. The purpose of this paper is to present a literature review on recent works in BI. The two principal aims in this survey are to identify areas lacking in recent research, thereby offering potential opportunities for investigation.

Design/methodology/approach

To simplify the study on BI literature, it is segregated into seven categories according to the usage. Each category of work is analyzed using parameters such as purpose, domain, problem identified, solution applied, benefit and outcome.

Findings

The BI contribution in various domains, ongoing research in BI, the convergence of BI domains, problems and solutions, results of congregated domains, core problems and key solutions. It also outlines BI and its components composition, widely applied BI solutions such as algorithm-based, architecture-based and model-based solutions. Finally, it discusses BI implementation issues and outlines the security and privacy policies adopted in BI environment.

Research limitations/implications

In this survey BI has been discussed in theoretical perspective whereas practical contribution has been given less attention.

Originality/value

A comprehensive survey on BI which identifies areas lacking in recent research and providing potential opportunities for investigation.

Details

Journal of Enterprise Information Management, vol. 27 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

To view the access options for this content please click here
Article
Publication date: 1 June 2004

Nada K. Kakabadse, Andrew Kakabadse, Pervaiz K. Ahmed and Alexander Kouzmin

Improved integration, centralized databases, access through Web browsers and application service providers (ASPs) are some of the current trends impacting on…

Abstract

Improved integration, centralized databases, access through Web browsers and application service providers (ASPs) are some of the current trends impacting on organizational decisions regarding IS/IT outsourcing. Web‐based technology liberated the client/server IT model from the limits of geographical boundaries delimited by a local area network. Partnering with the right ASPs could provide organizations with the new synergy required for competitive advantage. This paper outlines the development of a “solutions” innovation business model of rental‐based sourcing, charters current ASPs and the differences in IS/IT provision and offers an audit of the benefits and costs of ASPs to businesses and other stakeholders. Future challenges are mapped out for consideration as are strategic choices associated with continued outsourcing, as distinct from in‐sourcing, of IS/IT.

Details

European Journal of Innovation Management, vol. 7 no. 2
Type: Research Article
ISSN: 1460-1060

Keywords

1 – 10 of over 138000