Search results
1 – 7 of 7Stefanie Fella and Christoph Ratay
Recently emerged Packaging-as-a-Service (PaaS) systems adopt aspects of access-based services and triadic frameworks, which have typically been treated as conceptually separate…
Abstract
Purpose
Recently emerged Packaging-as-a-Service (PaaS) systems adopt aspects of access-based services and triadic frameworks, which have typically been treated as conceptually separate. The purpose of this paper is to investigate the implications of blending the two in what we call “access-based triadic systems,” by empirically evaluating intentions to adopt PaaS systems for takeaway food among restaurants and consumers.
Design/methodology/approach
We derived relevant attributes of PaaS systems from a qualitative pre-study with restaurants and consumers. Next, we conducted two factorial survey experiments with restaurants (N = 176) and consumers (N = 245) in Germany to quantitatively test the effects of those system attributes on their adoption intentions.
Findings
This paper highlights that the role of access-based triadic system providers as both the owners of shared assets and the operators of a triadic system is associated with a novel set of challenges and opportunities: System providers need to attract a critical mass of business and end customers while balancing asset protection and system complexity. At the same time, asset ownership introduces opportunities for improved quality control and differentiation from competition.
Originality/value
Conceptually, this paper extends research on access-based services and triadic frameworks by describing an unexplored hybrid form of non-ownership consumption we call “access-based triadic systems.” Empirically, this paper addresses the need to account for the demands of two distinct target groups in triadic systems and demonstrates how factorial survey experiments can be leveraged in this field.
Details
Keywords
To contribute to the theoretical work on products that contain both tangible (goods) and intangible (service) dimensions, by arguing that the consumption of physical goods and…
Abstract
Purpose
To contribute to the theoretical work on products that contain both tangible (goods) and intangible (service) dimensions, by arguing that the consumption of physical goods and services should be understood as a process with two major steps – the first and second moments of truth.
Design/methodology/approach
An investigation of the service perspective and packaging is made based on a literature review. Empirical examples are then presented from an interview study of people working with packaging‐related issues at Procter & Gamble, Schwarzkopf & Henkel, Procordia Food, and Coop. The relationship between theory/concepts and research in the paper can be described in terms of extension and emergent.
Findings
Consumers evaluate quality when they purchase an offering and when they consume it. Using the terminology of the present paper, this means that the perception of quality is created at both the first and second moments of truth. The first moment of truth is about obtaining customers’ attention and communicating the benefits of an offer. The second moment of truth is about providing the tools the customer needs to experience these benefits when using the product. The combination of these two moments of truth makes up the total customer experience.
Originality/value
This paper holds the potential to contribute to extending understanding of the service perspective and service encounters.
Details
Keywords
This paper aims to outline the concepts of web services architectures and to begin an exploration of the uses that recordkeeping professionals may define for such a potentially…
Abstract
Purpose
This paper aims to outline the concepts of web services architectures and to begin an exploration of the uses that recordkeeping professionals may define for such a potentially radical change to the way recordkeeping functionality is delivered.
Design/methodology/approach
The paper combines narrative with argument and analysis of the issues surrounding records management.
Findings
The paper shows that the digital world has introduced new challenges to recordkeeping professionals. The initial response has been to transfer traditional recordkeeping systems to automated solutions. Increasingly these are being challenged for fit in dynamic organizational environments. Web services as a building block for next generation software applications are growing in acceptance both in governments and innovative product offerings.
Originality/value
Recordkeeping professionals should ensure that they are very firmly grounded in best professional practice in recordkeeping to grasp such a technology opportunity.
Details
Keywords
The purpose of this paper is to show that the digital world has introduced new challenges to recordkeeping professionals.
Abstract
Purpose
The purpose of this paper is to show that the digital world has introduced new challenges to recordkeeping professionals.
Design/methodology/approach
The initial response has been to transfer traditional recordkeeping systems to automated solutions. Increasingly these are being challenged for fit in dynamic organizational environments. Web services as a building‐block for next generation software applications are growing in acceptance both in governments and innovative product offerings.
Findings
The paper outlines the concepts of web services architectures and begins an exploration of the uses that recordkeeping professionals may define for such a potentially radical change to the way recordkeeping functionality is delivered.
Originality/value
The paper challenges recordkeeping professionals to ensure that they are very firmly grounded in best professional practice in recordkeeping to grasp such a technology opportunity.
Details
Keywords
This paper aims to provide guidance so firms can enter the Internet of Things (IoT) era today – and realize its data-driven benefits – by using IoT “dark data” already generated…
Abstract
Purpose
This paper aims to provide guidance so firms can enter the Internet of Things (IoT) era today – and realize its data-driven benefits – by using IoT “dark data” already generated by their operations.
Design/methodology/approach
This study draws upon data from original expert interviews and an extensive study of over 1,200 research articles and white papers to provide managerial guidance for exploiting IoT dark data.
Findings
Many companies are held back from entering the IoT era today, not by technological issues, but by matters addressable by managerial and strategic leadership. Executives must build dark data awareness among their employees and use non-traditional measures to predict return on investment. The study shares expert advice for accomplishing both of these efforts.
Research limitations/implications
Only 3 out of 1,202 research articles addressed IoT dark data. This paper helps fill this gap in understanding.
Practical implications
This study provides normative guidelines for managers and executives to increase awareness of the dark IoT data that exist within their organizations and to motivate the investments needed to exploit this data to improve business performance.
Originality/value
This research provides guidance for companies to benefit from the IoT today. This study provides an alternate, pragmatic view of Industry 4.0 that focuses on current business reality rather than futurist visions.
Details
Keywords
Wenyuan Wang and Sira Yongchareon
This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups…
Abstract
Purpose
This study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups. Further, the report will advise commercial applications and advice of SECaaS as an extended context to help firms make decisions.
Design/methodology/approach
This paper compares the SECaaS categories in Cloud Security Alliance (CSA) with the security clauses in ISO/IEC 27002:2013 to give a comprehensive analysis of those SECaaS categories. Reviewed from a number of related literature, this paper analyzes and categorizes SECaaS into three major groups including protective, detective and reactive based on security control perspectives. This study has discussed the three groups and their interplay to identify the key characteristics and problems that they aim to address.
Findings
This paper also adds new evidence to support a better understanding of the current and future challenges and directions for SECaaS. Also, the study reveals both the positive and negative aspects of SECaaS along with business cases. It advises on various sizes and domains of organizations to consider SECaaS as one of their potential security approaches.
Originality/value
SECaaS has been demonstrated to be one of the increasingly popular ways to address security problems in Cloud computing. As a new concept, SECaaS could be treated as integrated security means and delivered as a service module in the Cloud. However, it is still in infancy and not very widely investigated. Recent studies suggest that SECaaS is an efficient solution for Cloud and real industries. However, shortcomings of SECaaS have not been well-studied and documented. Moreover, reviewing the existing research, researchers did not classify the SECaaS-related categories.
Details
Keywords
The purpose of this paper is to provide an overview of a new development in learning technology, while also demonstrating detailed knowledge of key developments. The new…
Abstract
Purpose
The purpose of this paper is to provide an overview of a new development in learning technology, while also demonstrating detailed knowledge of key developments. The new development in learning technology – known as dynamic publishing – makes possible advances in personalised and mobile learning delivery, among other things.
Design/methodology/approach
The paper gives an explanation of key terms, including LMS, LCMS, static publishing, dynamic publishing – and their key features and benefits.
Findings
Dynamic publishing offers ten key benefits.
Research limitations/implications
Dynamic publishing offers many advantages to both developers of online learning and users of online learning. In particular, it enables innovative business modelling, along with skills and media personalisation solutions – leading to overall content strategy optimisation.
Practical implications
There are a number of practical implications for learning content developers, learning and development managers and learners. At most, dynamic publishing could revolutionise the way that online learning contents are developed, stored, accessed and delivered – on an individualised basis – to learners.
Social implications
This could change not just the world of corporate learning (and online learning especially) but also the way that academic knowledge is imparted.
Originality/value
This learning technology – of dynamic publishing – is, as yet, in its early stages. As with all technologies of recent times, it is set to develop rapidly.
Details