Search results
1 – 10 of over 31000Allard C.R. Van Riel, Jie J. Zhang, Lee Phillip McGinnis, Mohammad G. Nejad, Milos Bujisic and Paul A. Phillips
While innovative service systems may create substantial value for certain stakeholders, they often destroy value for others. This value paradox frequently leads to unsustainable…
Abstract
Purpose
While innovative service systems may create substantial value for certain stakeholders, they often destroy value for others. This value paradox frequently leads to unsustainable service systems. The purpose of this paper is to explore the use of multiple theories to pinpoint and explain these value paradoxes, build a framework allowing potentially more sustainable value configuration of service systems and develop an agenda for future research. The framework is illustrated with examples from the hospitality industry.
Design/methodology/approach
The paper draws on prevalent theories and approaches, including service-dominant logic, business modeling, transaction cost economics, stakeholder theory, configuration theory and set theory, to develop a value configuration framework.
Findings
In a service system, the configuration of resources and relationships between these resources (i.e. the set of value propositions for various stakeholders of the system) determines which stakeholders will gain and which will lose and to what extent. For that reason, insight into the range of possible service configurations – or business models – will help decision makers consider the effects on various stakeholders, and, where possible, set their priorities right and make their businesses more sustainable. The research produces a rich research agenda.
Research limitations/implications
Examples from hospitality allow an in-depth examination of a range of dynamic configurational and technological innovations, but some idiosyncratic characteristics of the context may impede the wider applicability of the conceptual framework. Future research could complement this work by studying other service sectors.
Practical implications
The paper aims to provide decision makers in the service industry with a conceptual tool to explore, diagnose and, if needed, adjust the value configuration of their service operations. In practice, this tool may help explicate the service system configuration, thus helping managers determine their organizations’ desired positioning in terms of value creation and destruction, and to choose strategic directions by adapting configurations.
Social implications
Legislation and regulations are being adapted to various new service configurations. This paper attempts to – at least conceptually – distinguish different service configurations, allowing policy makers to identify the value trade-offs between stakeholders, including society at large.
Originality/value
Previous research focused primarily on value creation by innovative services and business models. Value creation for one stakeholder, however, could lead to value destruction for another. Taking this paradox into consideration may result in more open service ecosystems that explicitly consider sustainability and value implications in multiple dimensions and for a broader group of stakeholders.
Details
Keywords
Bo Edvardsson and Bård Tronvoll
The aim of this paper is to conceptualize service innovation through a service‐dominant logic (S‐D logic) lens and a service system foundation.
Abstract
Purpose
The aim of this paper is to conceptualize service innovation through a service‐dominant logic (S‐D logic) lens and a service system foundation.
Design/methodology/approach
This conceptual paper offers a service‐dominant logic lens and a structuration theory approach emphasizing an actor perspective on service innovation. Since the value of innovation unfolds in practice, this paper will use customer to denote the key actor in co‐creating value in context.
Findings
The paper shows how a resource constellation in a service system is reconfigured and thus explains service innovation from the lens of S‐D logic, emphasizing customers' value co‐creation of value in practices. The focus is on the interdependencies between the configuration of resources in a service system and schemas that shape customers and other actors when integrating resources and co‐creating value.
Research limitations/implications
There is a need to discuss service innovation in a social constructivist view to better understand the guiding principles or schemas that enable actors to co‐create value.
Originality/value
Service innovation is understood as sourced by changes in either resources or schemas (norms and rules) or a combination, resulting in structural changes in a service system. The conceptualization provides: a new definition of service innovation; a new framework describing the interdependency between changes in resources and schemas as a basis for an innovative configuration or reconfiguration of a service system; and three propositions illustrating the relevance of this new framework.
Details
Keywords
Configuration systems are used as a means for efficient design of customer tailored product service systems (PSS). In PSS configuration, mapping customer needs with optimal…
Abstract
Purpose
Configuration systems are used as a means for efficient design of customer tailored product service systems (PSS). In PSS configuration, mapping customer needs with optimal configuration of PSS components have become much more challenging, because more knowledge with personalization aspects has to be considered. However, the extant techniques are hard to be applied to acquire personalized configuration rules. The purpose of this paper is to extract the configuration rule knowledge in symbolism formulation from historical data.
Design/methodology/approach
Customer characteristics (CCs) are defined and introduced into the construction of configuration rules. Personalized PSS configuration rules (PCRs) are thereby proposed to collect and represent more knowledge. An approach combining Local Cluster Neural Network and Rulex algorithm is proposed to extract rule knowledge from historical data.
Findings
The personalized configuration rules with CCs are able to alleviate the burden of customers in expressing functional requirements. Furthermore, in the long-term relationship with a customer in PSS realization, PSS offerings can be reconfigured according to the changing CCs with the guide of PCRs.
Originality/value
The contribution of this paper lies in introducing the attribute of CCs into the antecedents of PCRs and proposing the neural networks-based approach to extracting the rule knowledge from historical data.
Details
Keywords
Cecilia Mercado, Guido Dedene, Edward Peters and Rik Maes
Our economies are rapidly evolving toward being primarily service-driven, with information and communication as fundamental drivers for the service deployment. Strategic choices…
Abstract
Our economies are rapidly evolving toward being primarily service-driven, with information and communication as fundamental drivers for the service deployment. Strategic choices are increasingly driven by other parameters than the traditional goods-driven industrial type of economies. In this paper, the major drivers for making strategic choices in a competitive service economy are examined. It is shown how the competition in services based on information and communication technology (ICT) is competence-based. Competition aims at bringing additional value through services, but may also deploy specific techniques to stop value from leaking in particular business processes. Value creation and prevention of value leaks cannot just rely on the traditional material-based techniques, which are grounded in the strong tangible nature of the traditional economies. Today ICT-based services involve creative combinations of technologies, resources, and assets to answer as well as anticipate the growing demand for flexible solutions that create sustained added value. In this paper, the particular role of imperfections in service systems is explored, extending the well-known theories of information imperfections. Imperfections are not always solved but are sometimes even maintained in favor of sustained competitive advantage. Various ways to realize service rent are discussed with extensive examples. The concluding part of the paper points to some crucial service configuration issues, including the need for a sufficient degree of corporate-wide standardized service components and interfaces to address the growing demand for agility in competence-driven markets.
Details
Keywords
Bo Edvardsson, Per Skålén and Bård Tronvoll
Purpose – The aim is to introduce a sociological perspective on resource integration and value co-creation into service research using a service systems…
Abstract
Purpose – The aim is to introduce a sociological perspective on resource integration and value co-creation into service research using a service systems approach.
Methodology/approach – Conceptual and a case study of the service system a Telecom Equipment and Service Provider is embedded in is reported.
Findings – The service practice of the service system is framed by social structures of signification, legitimation, and domination. However, the practice is also independent of the structures since it is embedded in and shapes the structural realm.
Research implications and limitations – Drawing on structuration and practice theory, the chapter offers a new framework describing how social and service structures and practices can inform and reveal mechanisms of service system dynamics. Based on the framework, three propositions are developed focusing on the mechanisms of resource integration and value co-creation. The implications need to be generalized in future research by studying other empirical contexts.
Practical implications – The chapter provides some tentative guidelines on how organizations can design service systems that enable and support customers and other actors in their resource integration and value co-creation processes by paying attention to social structures and forces and not only resources as such.
Originality – The chapter explicates how social structures have implications for value co-creation and resource integration in service system. It makes systematic use of structuration and practice theory to understand the social dimensions of service systems. A distinction between intended and realized resource integration is made.
Details
Keywords
Leonard Walletzký, Luca Carrubbo, Nabil Georges Badr, Monica Dragoicea, Angeliki Maria Toli and Salem Badawi
The COVID-19 pandemic started a new era in understanding the topic of resilience and adaptability. The human society has not faced such a widespread global challenge until now…
Abstract
Purpose
The COVID-19 pandemic started a new era in understanding the topic of resilience and adaptability. The human society has not faced such a widespread global challenge until now. This paper aims to address a context change influenced by the COVID-19 pandemic, using a case study in high education. While the character of the issues emerging is the same as in any other domain, in high education, the principles and consequences can be more directly studied and analyzed.
Design/methodology/approach
This paper describes a framework to evaluate how the context of the tertiary education service has been disrupted and the influence on the adherence of the students to the educational process, via primary quantitative data collection. This paper tackles the problem of distinguishing the change in context and context change and the possibility of system reconfiguration.
Findings
To properly face the evolving conditions induced by the pandemic, the education service system must be aligned to the imposed emergency situations, trying to “find” where the changes have emerged, i.e. what kind of reconfiguration is, whether it appears in the goals or in the service system itself. Furthermore, this study discusses how the findings can be valuable and applied to situations beyond the pandemic, in other cases of context disruption to highlight how general the service activities are within our reconfiguration approach.
Originality/value
From a theoretical point of view, this work is in line with main assumptions of system thinking, by confirming several insights of service systems’ behavior, even in a logic of B2B interactions (from the offer side); first in terms of openness and adaptation, in addition to readiness to change and – when and how – this change can occur. From a practical point of view, this paper’s contribution is directed toward achieving the more successful change management process, as reached together by motivated partners working hard for a common final goal. Realizing that the pandemic has brought a completely new context of education, managers should focus now on monitoring all aspects of the education business, not only directly affected projects and processes.
Details
Keywords
Elham Ali Shammar and Ammar Thabit Zahary
Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…
Abstract
Purpose
Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.
Design/methodology/approach
A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.
Findings
Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.
Originality/value
This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.
Details
Keywords
Fayez Ghazai Alotaibi, Nathan Clarke and Steven M. Furnell
The human factor is a major consideration in securing systems. A wide and increasing range of different technologies, devices, platforms, applications and services are being used…
Abstract
Purpose
The human factor is a major consideration in securing systems. A wide and increasing range of different technologies, devices, platforms, applications and services are being used every day by home users. In parallel, home users are also experiencing a range of different online threats and attacks and are increasingly being targeted as they lack the knowledge and awareness about potential threats and how to protect themselves. The increase in technologies and platforms also increases the burden upon a user to understand how to apply security across differing technologies, operating systems and applications. This results in managing the security across their technology portfolio increasingly more troublesome and time consuming. This paper aims to propose an approach that attempts to propose a system for improving security management and awareness for home users.
Design/methodology/approach
The proposed system is capable of creating and assigning different security policies for different digital devices in a user-friendly fashion. These assigned policies are monitored, checked and managed to review the user’s compliance with the assigned policies to provide bespoke awareness content based on the user’s current needs.
Findings
A novel framework was proposed for improving information security management and awareness for home users. In addition, a mock-up design was developed to simulate the proposed approach to visualise the main concept and the functions which might be performed when it is deployed in a real environment. A number of different scenarios have been simulated to show how the system can manage and deal with different types of users, devices and threats. In addition, the proposed approach has been evaluated by experts in the research domain. The overall feedback is positive, constructive and encouraging. The experts agreed that the identified research problem is a real problem. In addition, they agreed that the proposed approach is usable, feasible and effective in improving security management and awareness for home users.
Research limitations/implications
The proposed design of the system is a mock-up design without real data. Therefore, implementing the proposed approach in a real environment can provide the researcher with a better understanding of the effectiveness and the functionality of the proposed approach.
Practical implications
This study offers a framework and usable mock-up design which can help in improving information security management for home users.
Originality/value
Improving the security management and awareness for home users by monitoring, checking and managing different security controls and configurations effectively are the key to strengthen information security. Therefore, when home users have a good level of security management and awareness, this could protect and secure the home network and subsequently business infrastructure and services as well.
Details
Keywords
Jennifer D. Chandler and Steven Chen
The purpose of this paper is to examine how practices influence service systems.
Abstract
Purpose
The purpose of this paper is to examine how practices influence service systems.
Design/methodology/approach
Data across three service contexts (crafts, healthcare and fitness) were collected through depth interviews and netnographic analysis, and analyzed with a two-study multi-method approach focusing first on the micro- (individual) level and then on the macro- (network) level of service systems. Study 1 focused on a micro-level analysis using qualitative techniques (Spiggle, 1994). Study 2 focused on a macro-level analysis using partial least squares regression.
Findings
The results illustrate how practices can change service systems. This occurs when a nuanced practice (i.e. a practice style) orders and roots a service system in a specific form of value creation. The findings reveal four practice styles: individual-extant, social-extant, individual-modified and social-modified practice styles. These practice styles shift in response to event triggers and change service systems. These event triggers are: service beneficiary enhancement, service beneficiary failure, service provider failure and social change. Thus, the findings show that practices – when shifting in response to event triggers – change service systems. This transpires in the understudied meta-layer of a service system.
Practical implications
The study identifies four practice styles that can serve as the basis for segmentation and service design.
Originality/value
Service systems are dynamic and ever changing. This study explores how service systems change by proposing a practice approach to service systems.
Details
Keywords
Jacky Young, Debbie Collins and Kerry Keel
Unicorn and STILAS are multiuser client/server systems developed in and for the Unix environment to automate all aspects of information management, from cataloging and authority…
Abstract
Unicorn and STILAS are multiuser client/server systems developed in and for the Unix environment to automate all aspects of information management, from cataloging and authority control to intelligent access of non‐SIRSI databases. In keeping with the client/server concept, SIRSI has introduced a graphical user interface (GUI) to Unicorn and STILAS. The SIRSI system provides a path to information both inside and outside the library. SIRSI provides a standard interface, an “Intelligent Interface” client to diverse database systems and other vendors' library automation systems. SIRSI's Reference Database Managers provide an intelligent connection to locally mounted reference databases. SIRSI's VIZION, a stand‐alone desktop client, provides an automatic graphical user interface to hundreds of online sources of information and services available through the Internet and via modem. Furthermore, SIRSI has recently introduced WebCat, which facilitates mounting and access to the complete catalogs and other services of libraries over the Internet's World Wide Web.