Search results
1 – 3 of 3Julie Krogh Agergaard, Kristoffer Vandrup Sigsgaard, Niels Henrik Mortensen, Jingrui Ge and Kasper Barslund Hansen
The purpose of this paper is to investigate the impact of early-stage maintenance clustering. Few researchers have previously studied early-stage maintenance clustering…
Abstract
Purpose
The purpose of this paper is to investigate the impact of early-stage maintenance clustering. Few researchers have previously studied early-stage maintenance clustering. Experience from product and service development has shown that early stages are critical to the development process, as most decisions are made during these stages. Similarly, most maintenance decisions are made during the early stages of maintenance development. Developing maintenance for clustering is expected to increase the potential of clustering.
Design/methodology/approach
A literature study and three case studies using the same data set were performed. The case studies simulate three stages of maintenance development by clustering based on the changes available at each given stage.
Findings
The study indicates an increased impact of maintenance clustering when clustering already in the first maintenance development stage. By performing clustering during the identification phase, 4.6% of the planned work hours can be saved. When clustering is done in the planning phase, 2.7% of the planned work hours can be saved. When planning is done in the scheduling phase, 2.4% of the planned work hours can be saved. The major difference in potential from the identification to the scheduling phase came from avoiding duplicate, unnecessary and erroneous work.
Originality/value
The findings from this study indicate a need for more studies on early-stage maintenance clustering, as few others have studied this.
Details
Keywords
Elham Rostami, Fredrik Karlsson and Ella Kolkowska
The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been…
Abstract
Purpose
The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and the way in which the suggested support has been brought about.
Design/methodology/approach
The results are based on a literature review of ISP management research published between 1990 and 2017.
Findings
Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare.
Research limitations/implications
Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process.
Practical implications
The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners.
Originality/value
Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.
Details
Keywords
Jonna Pauliina Koponen and Saara Maria Julkunen
This paper aims to explore how and why salespeople enhance or hinder long-term business-to-business (B2B) customer relationships at the interpersonal level by considering…
Abstract
Purpose
This paper aims to explore how and why salespeople enhance or hinder long-term business-to-business (B2B) customer relationships at the interpersonal level by considering self-disclosure and relational cost and reward evaluations.
Design/methodology/approach
Data from interviews (N = 47) with B2B sales professionals were analyzed, focusing on the shift of the phases in long-term B2B customer relationships.
Findings
Long-term B2B customer relationships evolve at the interpersonal level through a process of continuous relational cost and reward evaluation, self-disclosure and business disclosure in three phases: becoming business partners, collaborative partners and collaborative and personal partners. The reward evaluations progress from being business related to including even more relational benefits. Disclosure progresses through general business disclosure and general self-disclosure; strategic business disclosure and personal life self-disclosure; and synergistic business disclosure and private self-disclosure.
Research limitations/implications
The long-term B2B customer relationships could be studied at the interpersonal level from the customer’s perspective. Self-disclosure could be studied in cross-cultural settings as well as gender differences should be considered in future studies. Business and social penetration theory could be applied to investigate different types of relationships and other professional relationships, such as those between employers and employees. It would be important to test whether the business-related and self-disclosure subtypes apply to the development of other types of professional relationships or whether other disclosure subtypes exist. The authors recommend exploring salespeople’s and customers’ privacy management strategies in multiple communication channels.
Practical implications
Managers may apply the results of this study in their customer relationship management and sales training.
Originality/value
The findings outline a contextual extension of social penetration theory.
Details