Search results

1 – 10 of over 25000
Article
Publication date: 3 June 2019

Allard C.R. Van Riel, Jie J. Zhang, Lee Phillip McGinnis, Mohammad G. Nejad, Milos Bujisic and Paul A. Phillips

While innovative service systems may create substantial value for certain stakeholders, they often destroy value for others. This value paradox frequently leads to unsustainable…

1578

Abstract

Purpose

While innovative service systems may create substantial value for certain stakeholders, they often destroy value for others. This value paradox frequently leads to unsustainable service systems. The purpose of this paper is to explore the use of multiple theories to pinpoint and explain these value paradoxes, build a framework allowing potentially more sustainable value configuration of service systems and develop an agenda for future research. The framework is illustrated with examples from the hospitality industry.

Design/methodology/approach

The paper draws on prevalent theories and approaches, including service-dominant logic, business modeling, transaction cost economics, stakeholder theory, configuration theory and set theory, to develop a value configuration framework.

Findings

In a service system, the configuration of resources and relationships between these resources (i.e. the set of value propositions for various stakeholders of the system) determines which stakeholders will gain and which will lose and to what extent. For that reason, insight into the range of possible service configurations – or business models – will help decision makers consider the effects on various stakeholders, and, where possible, set their priorities right and make their businesses more sustainable. The research produces a rich research agenda.

Research limitations/implications

Examples from hospitality allow an in-depth examination of a range of dynamic configurational and technological innovations, but some idiosyncratic characteristics of the context may impede the wider applicability of the conceptual framework. Future research could complement this work by studying other service sectors.

Practical implications

The paper aims to provide decision makers in the service industry with a conceptual tool to explore, diagnose and, if needed, adjust the value configuration of their service operations. In practice, this tool may help explicate the service system configuration, thus helping managers determine their organizations’ desired positioning in terms of value creation and destruction, and to choose strategic directions by adapting configurations.

Social implications

Legislation and regulations are being adapted to various new service configurations. This paper attempts to – at least conceptually – distinguish different service configurations, allowing policy makers to identify the value trade-offs between stakeholders, including society at large.

Originality/value

Previous research focused primarily on value creation by innovative services and business models. Value creation for one stakeholder, however, could lead to value destruction for another. Taking this paradox into consideration may result in more open service ecosystems that explicitly consider sustainability and value implications in multiple dimensions and for a broader group of stakeholders.

Details

Journal of Service Management, vol. 30 no. 3
Type: Research Article
ISSN: 1757-5818

Keywords

Article
Publication date: 14 September 2015

Jin Shen, Bin Wu and Li Yu

Configuration systems are used as a means for efficient design of customer tailored product service systems (PSS). In PSS configuration, mapping customer needs with optimal…

Abstract

Purpose

Configuration systems are used as a means for efficient design of customer tailored product service systems (PSS). In PSS configuration, mapping customer needs with optimal configuration of PSS components have become much more challenging, because more knowledge with personalization aspects has to be considered. However, the extant techniques are hard to be applied to acquire personalized configuration rules. The purpose of this paper is to extract the configuration rule knowledge in symbolism formulation from historical data.

Design/methodology/approach

Customer characteristics (CCs) are defined and introduced into the construction of configuration rules. Personalized PSS configuration rules (PCRs) are thereby proposed to collect and represent more knowledge. An approach combining Local Cluster Neural Network and Rulex algorithm is proposed to extract rule knowledge from historical data.

Findings

The personalized configuration rules with CCs are able to alleviate the burden of customers in expressing functional requirements. Furthermore, in the long-term relationship with a customer in PSS realization, PSS offerings can be reconfigured according to the changing CCs with the guide of PCRs.

Originality/value

The contribution of this paper lies in introducing the attribute of CCs into the antecedents of PCRs and proposing the neural networks-based approach to extracting the rule knowledge from historical data.

Details

Industrial Management & Data Systems, vol. 115 no. 8
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 22 March 2013

Bo Edvardsson and Bård Tronvoll

The aim of this paper is to conceptualize service innovation through a service‐dominant logic (S‐D logic) lens and a service system foundation.

2175

Abstract

Purpose

The aim of this paper is to conceptualize service innovation through a service‐dominant logic (S‐D logic) lens and a service system foundation.

Design/methodology/approach

This conceptual paper offers a service‐dominant logic lens and a structuration theory approach emphasizing an actor perspective on service innovation. Since the value of innovation unfolds in practice, this paper will use customer to denote the key actor in co‐creating value in context.

Findings

The paper shows how a resource constellation in a service system is reconfigured and thus explains service innovation from the lens of S‐D logic, emphasizing customers' value co‐creation of value in practices. The focus is on the interdependencies between the configuration of resources in a service system and schemas that shape customers and other actors when integrating resources and co‐creating value.

Research limitations/implications

There is a need to discuss service innovation in a social constructivist view to better understand the guiding principles or schemas that enable actors to co‐create value.

Originality/value

Service innovation is understood as sourced by changes in either resources or schemas (norms and rules) or a combination, resulting in structural changes in a service system. The conceptualization provides: a new definition of service innovation; a new framework describing the interdependency between changes in resources and schemas as a basis for an innovative configuration or reconfiguration of a service system; and three propositions illustrating the relevance of this new framework.

Details

International Journal of Quality and Service Sciences, vol. 5 no. 1
Type: Research Article
ISSN: 1756-669X

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6483

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 3 August 2020

Fayez Ghazai Alotaibi, Nathan Clarke and Steven M. Furnell

The human factor is a major consideration in securing systems. A wide and increasing range of different technologies, devices, platforms, applications and services are being used…

Abstract

Purpose

The human factor is a major consideration in securing systems. A wide and increasing range of different technologies, devices, platforms, applications and services are being used every day by home users. In parallel, home users are also experiencing a range of different online threats and attacks and are increasingly being targeted as they lack the knowledge and awareness about potential threats and how to protect themselves. The increase in technologies and platforms also increases the burden upon a user to understand how to apply security across differing technologies, operating systems and applications. This results in managing the security across their technology portfolio increasingly more troublesome and time consuming. This paper aims to propose an approach that attempts to propose a system for improving security management and awareness for home users.

Design/methodology/approach

The proposed system is capable of creating and assigning different security policies for different digital devices in a user-friendly fashion. These assigned policies are monitored, checked and managed to review the user’s compliance with the assigned policies to provide bespoke awareness content based on the user’s current needs.

Findings

A novel framework was proposed for improving information security management and awareness for home users. In addition, a mock-up design was developed to simulate the proposed approach to visualise the main concept and the functions which might be performed when it is deployed in a real environment. A number of different scenarios have been simulated to show how the system can manage and deal with different types of users, devices and threats. In addition, the proposed approach has been evaluated by experts in the research domain. The overall feedback is positive, constructive and encouraging. The experts agreed that the identified research problem is a real problem. In addition, they agreed that the proposed approach is usable, feasible and effective in improving security management and awareness for home users.

Research limitations/implications

The proposed design of the system is a mock-up design without real data. Therefore, implementing the proposed approach in a real environment can provide the researcher with a better understanding of the effectiveness and the functionality of the proposed approach.

Practical implications

This study offers a framework and usable mock-up design which can help in improving information security management for home users.

Originality/value

Improving the security management and awareness for home users by monitoring, checking and managing different security controls and configurations effectively are the key to strengthen information security. Therefore, when home users have a good level of security management and awareness, this could protect and secure the home network and subsequently business infrastructure and services as well.

Details

Information & Computer Security, vol. 29 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 October 2016

Jennifer D. Chandler and Steven Chen

The purpose of this paper is to examine how practices influence service systems.

1425

Abstract

Purpose

The purpose of this paper is to examine how practices influence service systems.

Design/methodology/approach

Data across three service contexts (crafts, healthcare and fitness) were collected through depth interviews and netnographic analysis, and analyzed with a two-study multi-method approach focusing first on the micro- (individual) level and then on the macro- (network) level of service systems. Study 1 focused on a micro-level analysis using qualitative techniques (Spiggle, 1994). Study 2 focused on a macro-level analysis using partial least squares regression.

Findings

The results illustrate how practices can change service systems. This occurs when a nuanced practice (i.e. a practice style) orders and roots a service system in a specific form of value creation. The findings reveal four practice styles: individual-extant, social-extant, individual-modified and social-modified practice styles. These practice styles shift in response to event triggers and change service systems. These event triggers are: service beneficiary enhancement, service beneficiary failure, service provider failure and social change. Thus, the findings show that practices – when shifting in response to event triggers – change service systems. This transpires in the understudied meta-layer of a service system.

Practical implications

The study identifies four practice styles that can serve as the basis for segmentation and service design.

Originality/value

Service systems are dynamic and ever changing. This study explores how service systems change by proposing a practice approach to service systems.

Details

Journal of Service Management, vol. 27 no. 5
Type: Research Article
ISSN: 1757-5818

Keywords

Article
Publication date: 1 April 1994

Jacky Young, Debbie Collins and Kerry Keel

Unicorn and STILAS are multiuser client/server systems developed in and for the Unix environment to automate all aspects of information management, from cataloging and authority…

Abstract

Unicorn and STILAS are multiuser client/server systems developed in and for the Unix environment to automate all aspects of information management, from cataloging and authority control to intelligent access of non‐SIRSI databases. In keeping with the client/server concept, SIRSI has introduced a graphical user interface (GUI) to Unicorn and STILAS. The SIRSI system provides a path to information both inside and outside the library. SIRSI provides a standard interface, an “Intelligent Interface” client to diverse database systems and other vendors' library automation systems. SIRSI's Reference Database Managers provide an intelligent connection to locally mounted reference databases. SIRSI's VIZION, a stand‐alone desktop client, provides an automatic graphical user interface to hundreds of online sources of information and services available through the Internet and via modem. Furthermore, SIRSI has recently introduced WebCat, which facilitates mounting and access to the complete catalogs and other services of libraries over the Internet's World Wide Web.

Details

Library Hi Tech, vol. 12 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 4 July 2016

Pankaj U. Zine, Makarand S Kulkarni, Arun K. Ray and Rakesh Chawla

The purpose of this paper is to propose a conceptual framework for product service system (PSS) design for machine tools and discuss the PSS implementation issues focusing on the…

Abstract

Purpose

The purpose of this paper is to propose a conceptual framework for product service system (PSS) design for machine tools and discuss the PSS implementation issues focusing on the Indian machine tool business sector.

Design/methodology/approach

The paper opted for an exploratory survey conducted in the Indian machine tool sector including 39 in-depth interviews with employees of different organizations representing middle and senior management having decision-making authority. It also involves proposing a framework to address the stakeholder’s requirements for services that offers foundation for PSS designers.

Findings

The paper helps get an insights about key issues for PSS implementation by the Indian machine tool sector. The hybrid PSS model proposed in the paper can address the stakeholder’s requirements for flexibility in business models through different business phases.

Practical implications

The paper offers suggestions for the development of PSS for machine tools for designers and identify issues to be considered particularly in Indian machine tools business context.

Originality/value

This paper provides an insight to judge the feasibility of PSS concept for machine tools in Indian context and offers framework for PSS designers.

Details

Benchmarking: An International Journal, vol. 23 no. 5
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 10 July 2017

Lilliemay Cheung, Janet R. McColl-Kennedy and Leonard V. Coote

This paper aims to demonstrate how vulnerable consumer-citizens mobilize social capital following a natural disaster, showing how different forms of social capital contribute to…

1167

Abstract

Purpose

This paper aims to demonstrate how vulnerable consumer-citizens mobilize social capital following a natural disaster, showing how different forms of social capital contribute to well-being and resilience.

Design/methodology/approach

An embedded case study design comparing three different social networks is employed.

Findings

Understanding the active role consumer-citizens play in provisioning within social networks provides a deeper understanding of the important mechanisms that explain how different forms of social capital contribute to well-being. The three identified networks demonstrate different structural signatures composed of differing forms of social capital that arise following a natural disaster.

Research limitations/implications

Drawing on social capital theory, this study contributes to advancing transformative service research, providing implications for both theory and practice.

Originality/value

This study is one of the first to empirically compare networks in a natural disaster context, demonstrating the effects of bonding, bridging and linking social capital on well-being and community resilience. This study shows how social network analysis can be used to model network processes and mechanisms. Findings highlight the important role of social provisioning to vulnerable consumer-citizens as an alternate form of consumption.

Details

Journal of Services Marketing, vol. 31 no. 4/5
Type: Research Article
ISSN: 0887-6045

Keywords

Article
Publication date: 16 December 2019

Chandra Shekhar, Amit Kumar, Shreekant Varshney and Sherif I. Ammar

The internet of things and just-in-time are the embryonic model of innovation for the state-of-the-art design of the service system. This paper aims to develop a fault-tolerant…

Abstract

Purpose

The internet of things and just-in-time are the embryonic model of innovation for the state-of-the-art design of the service system. This paper aims to develop a fault-tolerant machining system with active and standby redundancy. The availability of the fault-tolerant redundant repairable system is a key concern in the successful deployment of the service system.

Design/methodology/approach

In this paper, the authors cogitate a fault-tolerant redundant repairable system of finite working units along with warm standby unit provisioning. Working unit and standby unit are susceptible to random failures, which interrupt the quality-of-service. The system is also prone to common cause failure, which tends its catastrophe. The instantaneous repair of failed unit guarantees the increase in the availability of the unit/system. The time-to-repair by the single service facility for the failed unit follows the arbitrary distribution. For increasing the practicability of the studied model, the authors have also incorporated real-time machining practices such as imperfect coverage of the failure of units, switching failure of standby unit, common cause failure, reboot delay, switch over delay, etc.

Findings

For deriving the explicit expression for steady-state probabilities of the system, the authors use a supplementary variable technique for which the only required input is the Laplace–Stieltjes transform (LST) of the repair time distribution.

Research limitations/implications

For complex and multi-parameters distribution of repair time, derivation of performance measures is not possible. The authors prefer numerical simulation because of its importance in the application for real-time uses.

Practical implications

The stepwise recursive procedure, illustrative examples, and numerical results have been presented for the diverse category of repair time distribution: exponential (M), n-stage Erlang (Ern), deterministic (D), uniform (U(a,b)), n-stage generalized Erlang (GE[n]) and hyperexponential (HE[n]).

Social implications

Concluding remarks and future scopes have also been included. The studied fault-tolerant redundant repairable system is suitable for reliability analysis of a computer system, communication system, manufacturing system, software reliability, service system, etc.

Originality/value

As per the survey in literature, no previous published paper is presented with so wide range of repair time distribution in the machine repair problem. This paper is valuable for system design for reliability analysis of the fault-tolerant redundant repairable.

Details

Engineering Computations, vol. 37 no. 3
Type: Research Article
ISSN: 0264-4401

Keywords

1 – 10 of over 25000