Search results

1 – 10 of over 17000
Book part
Publication date: 11 October 2023

Javier Peña Capobianco

The objective of this chapter is to identify the key characteristics of Global Services businesses that will thrive and achieve success in the future. These factors are integrated…

Abstract

The objective of this chapter is to identify the key characteristics of Global Services businesses that will thrive and achieve success in the future. These factors are integrated into three main pillars, which we refer to as the Triple-Win. The first and most obvious pillar is technology as a tool. The second pillar is the design and sustainability of the business model, without which the previous factor would be merely a cost and not an investment. And last but not the least, there is the purpose which gives meaning to the proposal, focusing on the human being and their environment. The DIDPAGA business model sits at the intersection of these three elements.

Details

The New Era of Global Services: A Framework for Successful Enterprises in Business Services and IT
Type: Book
ISBN: 978-1-83753-627-6

Keywords

Open Access
Article
Publication date: 20 June 2023

Michela Guida, Federico Caniato, Antonella Moretto and Stefano Ronchi

The objective of this paper is to study the role of artificial intelligence (AI) in supporting the supplier scouting process, considering the information and the capabilities…

2823

Abstract

Purpose

The objective of this paper is to study the role of artificial intelligence (AI) in supporting the supplier scouting process, considering the information and the capabilities required to do so.

Design/methodology/approach

Twelve cases of IT and information providers offering AI-based scouting solutions were studied. The unit of analysis was the AI-based scouting solution, specifically the relationship between the provider and the buyer. Information processing theory (IPT) was adopted to address information processing needs (IPNs) and capabilities (IPCs).

Findings

Among buyers, IPNs in supplier scouting are high. IT and information providers can meet the needs of buyers through IPCs enabled by AI-based solutions. In this way, the fit between needs and capabilities can be reached.

Originality/value

The investigation of the role of AI in supplier scouting is original. The application of IPT to study the impact of AI in business processes is also novel. This paper contributes by investigating a phenomenon that is still unexplored and unconsolidated in a business context.

Details

International Journal of Physical Distribution & Logistics Management, vol. 53 no. 4
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 9 June 2023

Chongbin Zhao, B.E. Hobbs and Alison Ord

The objective of this paper is to establish a solution strategy for obtaining dual solutions, namely trivial (conventional) and nontrivial (unconventional) solutions, of coupled…

Abstract

Purpose

The objective of this paper is to establish a solution strategy for obtaining dual solutions, namely trivial (conventional) and nontrivial (unconventional) solutions, of coupled pore-fluid flow and chemical dissolution problems in heterogeneous porous media.

Design/methodology/approach

Through applying a perturbation to the pore-fluid velocity, original governing partial differential equations of a coupled pore-fluid flow and chemical dissolution problem in heterogeneous porous media are transformed into perturbed ones, which are then solved by using the semi-analytical finite element method. Through switching off and on the applied perturbation terms in the resulting perturbed governing partial differential equations, both the trivial and nontrivial solutions can be obtained for the original governing partial differential equations of the coupled pore-fluid flow and chemical dissolution problem in fluid-saturated heterogeneous porous media.

Findings

When a coupled pore-fluid flow and chemical dissolution system is in a stable state, the trivial and nontrivial solutions of the system are identical. However, if a coupled pore-fluid flow and chemical dissolution system is in an unstable state, then the trivial and nontrivial solutions of the system are totally different. This recognition can be equally used to judge whether a coupled pore-fluid flow and chemical dissolution system involving heterogeneous porous media is in a stable state or in an unstable state. The proposed solution strategy can produce dual solutions for simulating coupled pore-fluid flow and chemical dissolution problems in fluid-saturated heterogeneous porous media.

Originality/value

A solution strategy is proposed to obtain the nontrivial solution, which is often overlooked in the computational simulation of coupled pore-fluid flow and chemical dissolution problems in fluid-saturated heterogeneous porous media. The proposed solution strategy provides a useful way for understanding the underlying dynamic mechanisms of the chemical damage effect associated with the stability of structures that are built on soil foundations.

Details

Engineering Computations, vol. 40 no. 4
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 14 December 2023

Juan Martin Ireta-Sanchez

The purpose of this study is to identify the business strategies that entrepreneurs have formulated to establish the business with the intention of scaling up in the information…

Abstract

Purpose

The purpose of this study is to identify the business strategies that entrepreneurs have formulated to establish the business with the intention of scaling up in the information technology (IT) sector in Chile, given that they have managed to scale up sustainably at an average annual rate of 73.3% and an average annual employee growth rate of 37% for four consecutive years after an establishment period of 25 months.

Design/methodology/approach

Three methodological steps were used to identify which strategic initiatives are relevant to the establishment of small- and medium-sized enterprises (SMEs) on the path to scaling up. The first part consisted of identifying the literature and defining the research propositions and research questions. The second part was to prepare, collect and analyse the data to conduct the research by applying, transcribing, reviewing and coding the sources of evidence to explore how SMEs are able to develop strategic initiatives for the start-up process. The final stage was to validate the research proposal to identify potential strategic initiatives identified during the multi-case study.

Findings

As a result of the data analysis and empirical findings, three deliberate strategic initiatives were identified: staying engaged with customers, delivering successful business solutions and articulating social capital. However, in crisis situations, entrepreneurs readjust their strategies based on their management skills and an emergent strategic initiative was identified as securing the financial structure and revolutionising change. While this research was not designed to identify personal attributes, it did highlight the importance of adaptation and learning as a skill to drive the business model for scaling up during the establishment of their business.

Research limitations/implications

It is clear that the study focused on Chile and cannot be replicated in other regions or sectors due to the characteristics of the sample itself, but it provides empirical evidence that there are cycles prior to scale up that need to be understood. The findings were empirically validated during the establishment phase, but the deliberate and emergent strategic initiatives that consolidated the SME to prepare for its scale-up process are not evident in the theory.

Practical implications

The IT sector will continue to grow and change after the pandemic, and the global economy will use more digital systems, creating new ways of working with the use of IT. This context will impact on SMEs where strategies, whether deliberate or emergent, will need to be part of the new business models, and therefore, caution should be exercised when using the results of this study. Public and private institutions should educate and guide entrepreneurs for the potential scaling up of their SMEs without having to wait 42 months, according to Global Entrepreneurship Monitor 2021-2022 (Hill et al., 2022). Scaling up can begin as early as 25 months after establishment, breaking the paradigm of the theory that the SME must be established in a period of 3.5 years. This period cannot be generalised as business opportunities in the IT sector are faster. The research also contributes by reporting that contingency planning is relevant during the establishment phase.

Social implications

Educational institutions and the public sector have made efforts to change business cultures regarding the importance of strengthening entrepreneurship, but teaching the emergent strategies that often challenge SME creation is not yet widespread in educational formats. This is a challenge not only for institutions but also for entrepreneurs trying to anticipate the constant changes in the global economy. This research provides an opportunity to create more dynamic business models with more conscious risk planning.

Originality/value

Although the literature has confirmed the findings, this research has provided a pre-scaling picture that links these two important stages on the axis of deliberate and emergent strategies. The findings confirm the importance of correctly embedding five strategic initiatives for the establishment of the SME if it is to continue on its journey towards business scale-up. However, there is a lack of empirical evidence in emerging economies on how entrepreneurs have found the right path to scale-up.

Article
Publication date: 26 March 2024

Bernardo Nicoletti and Andrea Appolloni,

The logistics industry has undergone a tremendous transformation. This transformation is necessary to cope with the fundamental changes in customer expectations and the need for…

Abstract

Purpose

The logistics industry has undergone a tremendous transformation. This transformation is necessary to cope with the fundamental changes in customer expectations and the need for digitalization imposed by the pandemic, changes in the socioeconomic world, and innovative technology solutions. This paper aims to present digital transformation as an integrated framework for transforming the operating model and applying advanced solutions to the ecosystem of a quintile logistics (5PL) company. 5PL operators are typically an ecosystem. Loosely coupled or self-organized entities that collaborate in a symbiotic relationship represent this ecosystem. They aim to jointly develop capabilities, create innovative services or solutions, share knowledge, facilitate transactions, and leverage network synergies in a logistics environment to provide optimized or novel customer- or partner-centric solutions (Lamberjohann and Otto, 2020).

Design/methodology/approach

Currently, there is no single definition of an integrated logistics operations model in 5PL practice, so the qualitative method used in this paper allows for investigation from an exploratory perspective. The paper follows a qualitative research methodology, collecting and analyzing data/facts through interviews and visits to subject matter experts, industry practitioners, and academic researchers, combined with an extensive review of academic publications, industry reports, and written and media content from established organizations in the marketplace. This paper follows a qualitative research methodology, as it is an inquiry rather than a statistical study. The qualitative method allows the study of the concepts of phenomena and definitions, their characteristics, and the defining features that serve as the basis (Berg, 2007). It emphasizes generalized interpretation and deeper understanding of concepts, which would be more difficult in quantitative, statistically based research. Fact-finding was conducted in two ways: in-depth interviews with experts from academia, information and communication technology organizations, and key players in the logistics industry; and academic publications, industry reports, and written and media content from established national and international organizations in the market.

Findings

The operations model introduced considers six aspects: persons, processes, platforms, partners, protection and preservation. A virtual team approach can support the personal side of the 5PL ecosystem’s digital transformation. Managing a 5PL ecosystem should be based on collaborative planning, forecasting, and replenishment methods (Parsa et al., 2020). A digital platform can support trust among the stakeholders in the ecosystem. A blockchain solution can powerfully support the 5PL ecosystem from partner relationships’ points of view. The implementation of a cybersecurity reference model is important for protection (Bandari, 2023). Reverse logistics and an integrated approach support the preservation of the ecosystem.

Research limitations/implications

While the author has experience applying the different components of the operations model presented, it would be interesting to find a 5PL that would use all the components presented in an integrated way. The operations model presented applies to any similar ecosystem with minor adaptations.

Practical implications

This paper addresses operations models and digital transformation challenges for optimizing 5PL operators. It provides several opportunities and considerations for 5PL operators interested in improving their management and operations to cope with the growing challenges of today’s world.

Social implications

The competitiveness and long-term performance of 5PL operators depend on selecting and carefully implementing their operations models. This paper emphasizes the importance of using advanced operations models.

Originality/value

The operations model derives from the author’s personal experiences in research and the innovative application of these models to logistics operators (DHL, UPS, Poste Italiane and others). This paper brings together academic and industry perspectives and operations models in an integrated business digital transformation. This paper defines an original optimal operations model for a 5PL operator and can add sustainable value to organizations and society. In doing so, it outlines different solution requirements, the critical success factors and the challenges for solutions and brings logistical performance objectives when implementing a digital business transformation.

Details

Journal of Global Operations and Strategic Sourcing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 1 December 2021

Ignat Kulkov, Anastasia Tsvetkova and Maria Ivanova-Gongne

Virtual and augmented reality solutions in medicine are generally applied in communication, training, simulation and therapy. However, like most new digital developments, these…

1161

Abstract

Purpose

Virtual and augmented reality solutions in medicine are generally applied in communication, training, simulation and therapy. However, like most new digital developments, these technologies face a large number of institutional barriers that are inherent to the medical sector.

Design/methodology/approach

Following Richard Scott's view on institutions and organizations, a multiple case study is used to analyze regulatory, normative and cultural-cognitive institutional pillars in the medical industry.

Findings

The results of the study demonstrate that (1) the regulatory pillar inhibits the advancement of new technologies in the approach to treatment, regulation of patient data, educational processes for medical staff, and information and financial flows; (2) the number of barriers increases based on the solution's level of disruption and the number of variable conventional procedures; (3) trust between participants in the medical industry plays an important role in introducing new technologies; (4) new participants need to address certain pillars depending on the area of application.

Originality/value

The authors discuss top-down and bottom-up approaches for overcoming institutional barriers when implementing augmented and virtual reality solutions for companies focusing on the medical market.

Details

European Journal of Innovation Management, vol. 26 no. 4
Type: Research Article
ISSN: 1460-1060

Keywords

Open Access
Article
Publication date: 7 February 2023

Kim De Boeck, Maria Besiou, Catherine Decouttere, Sean Rafter, Nico Vandaele, Luk N. Van Wassenhove and Prashant Yadav

This paper aims to provide a discussion on the interface and interactions between data, analytical techniques and impactful research in humanitarian health supply chains. New…

1587

Abstract

Purpose

This paper aims to provide a discussion on the interface and interactions between data, analytical techniques and impactful research in humanitarian health supply chains. New techniques for data capturing, processing and analytics, such as big data, blockchain technology and artificial intelligence, are increasingly put forward as potential “game changers” in the humanitarian field. Yet while they have potential to improve data analytics in the future, larger data sets and quantification per se are no “silver bullet” for complex and wicked problems in humanitarian health settings. Humanitarian health supply chains provide health care and medical aid to the most vulnerable in development and disaster relief settings alike. Unlike commercial supply chains, they often lack resources and long-term collaborations to enable learning from the past and to improve further.

Design/methodology/approach

Based on a combination of the authors’ research experience, interactions with practitioners throughout projects and academic literature, the authors consider the interface between data and analytical techniques and highlight some of the challenges inherent to humanitarian health settings. The authors apply a systems approach to represent the multiple factors and interactions between data, analytical techniques and collaboration in impactful research.

Findings

Based on this representation, the authors discuss relevant debates and suggest directions for future research to increase the impact of data analytics and collaborations in fostering sustainable solutions.

Originality/value

This study distinguishes itself and contributes by bringing the interface and interactions between data, analytical techniques and impactful research together in a systems approach, emphasizing the interconnectedness.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 13 no. 3
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 19 April 2023

Yixuan Leng and Xiaoyu Zhao

The purpose of this study is to examine supplier–customer capabilities in solution co-creation and how they are matched from a relational process perspective.

Abstract

Purpose

The purpose of this study is to examine supplier–customer capabilities in solution co-creation and how they are matched from a relational process perspective.

Design/methodology/approach

Using a qualitative approach, the authors identified 20 sets of supplier–customer capability matches by conducting in-depth interviews with 34 matched informants and retrieving suppliers’ archival data (project documents and success stories).

Findings

The authors identified 20 capability matching sets (21 supplier and 23 customer capabilities) and developed a process-based model of bilateral capabilities that match at the organizational level in solution co-creation. The authors reveal their match forms (complementarity and compatibility) and offer suggestions for future research.

Research limitations/implications

This paper is qualitative; quantitative studies are required for testing and extending the initial conclusions.

Practical implications

This study guides the supplier and customer to cultivate different capabilities at different stages of solution co-creation and alerts them to the importance of capability complementarity and compatibility.

Originality/value

To the best of the authors’ knowledge, this study is the first to introduce the bilateral perspective into dynamic capability research in the context of solution co-creation. The authors discuss the abilities the supplier and customer must possess at different stages and how they match dynamically. The analysis extends the research on solution-specific capabilities and dynamic matching, offering useful implications for solution co-creation in practice.

Details

Journal of Business & Industrial Marketing, vol. 38 no. 12
Type: Research Article
ISSN: 0885-8624

Keywords

Article
Publication date: 9 August 2021

Mohammed Abbas and Adnan Alghail

The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It…

Abstract

Purpose

The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It represents all internet-based software, any other solutions for communications or employees’ sharing without any formal authorization or approval from the IT department. Such behavior can lead to a security breach of the organization’s data privacy, as these risks could disseminate it without the organization fully knowing. Recent research identifies that shadow IT is rarely covered from the knowledge sharing and knowledge protection (KP) perspective. This paper aims to provide an insight on how mobile shadow IT as a phenomenon could impact KP of an organization as a whole.

Design/methodology/approach

This is an exploratory study based on a qualitative approach. The authors conducted interviews with 11 IT users to answer the main research question. The interview guidelines were divided into three parts: types of mobile shadow IT and occurrence; KP nature in the workplace; and mobile shadow IT impact on KP.

Findings

The research findings identified that most interviewees use mobile shadow IT without any notice or permission from their IT departments. This sharing also negatively impacts the KP in the organization. The most common mobile shadow IT applications are the clouded type like Dropbox, Google Drive and WhatsApp. Interviewees are using mobile shadow IT mainly because organizations do not provide suitable tools to communicate efficiently. The authors concluded that mobile shadow IT harms KP with no security and privacy on what is being shared because this process is unmonitored by the organization.

Practical implications

For adequate knowledge and data protection, IT departments need to take more actions and efforts. This study can help IT decision-makers cope with the technology changes while understanding mobile shadow IT impacts. This study also offers insight regarding types of applications that can be used as an alternative tool for employees rather than using unauthorized applications. This research shows that medium-sized organizations are free to use these applications, which can cause damage to organizations.

Originality/value

This research is arguably among the first to explore the interviewees’ perspectives on how mobile shadow IT impacts KP. This paper also provides theoretical and practical insights by identifying the three primary constructs and how mobile shadow IT usage can affect KP.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 53 no. 4
Type: Research Article
ISSN: 2059-5891

Keywords

1 – 10 of over 17000