24 resultados para value based selling
Resumo:
Enterprise Resource Planning (ERP) system literature reports very little research on post-adoption stages, that is, actual usage and value. Even fewer studies focus on the specificities of an industry analysis. Based on the Technology-Organizational-Environment (TOE) framework and the Resource-Based View (RBV) theory, we develop a research model to measure and examine determinants of ERP use and value and their impact in the Iberian region (Portugal and Spain) across Manufacturing and Services industries in Small and Medium Enterprises (SMEs). The empirical test was conducted through structural equation modelling, using data from 261 firms in the peninsula in the Manufacturing and Service industries. Results show that amongst ERP use determinants, Training is the most important determinant for Service firms and Compatibility for Manufacturing firms. Firm size, Analytics, and Collaboration contribute to ERP Value in both industries, with Analytics being more important for the Service industry. The paper provides insight into which determinants contribute to ERP use and ERP value in Iberian Manufacturing and Services SMEs, offering managerial and academic implications.
Resumo:
This study intends to explore the impact of customer experience on customer satisfaction and loyalty by trying to understand how location-based mobile marketing might enhance the customer experience. Primary data was collected from 201 smartphone users in 24 countries. Results have indicated that targeted location-based marketing positively influences customers’ experiences. Besides, the analysis has also shown a favorable impact on customers’ satisfaction and self-perceived loyalty. This suggests that location-based mobile marketing has the potential to positively add value to a customer’s experience and should therefore be considered an important tool in marketing communications.
Resumo:
Linear logic has long been heralded for its potential of providing a logical basis for concurrency. While over the years many research attempts were made in this regard, a Curry-Howard correspondence between linear logic and concurrent computation was only found recently, bridging the proof theory of linear logic and session-typed process calculus. Building upon this work, we have developed a theory of intuitionistic linear logic as a logical foundation for session-based concurrent computation, exploring several concurrency related phenomena such as value-dependent session types and polymorphic sessions within our logical framework in an arguably clean and elegant way, establishing with relative ease strong typing guarantees due to the logical basis, which ensure the fundamental properties of type preservation and global progress, entailing the absence of deadlocks in communication. We develop a general purpose concurrent programming language based on the logical interpretation, combining functional programming with a concurrent, session-based process layer through the form of a contextual monad, preserving our strong typing guarantees of type preservation and deadlock-freedom in the presence of general recursion and higher-order process communication. We introduce a notion of linear logical relations for session typed concurrent processes, developing an arguably uniform technique for reasoning about sophisticated properties of session-based concurrent computation such as termination or equivalence based on our logical approach, further supporting our goal of establishing intuitionistic linear logic as a logical foundation for sessionbased concurrency.
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Finance from the NOVA – School of Business and Economics and Maastricht University School of Business and Economics
Resumo:
This paper purposes a method for marketing segmentation based on customers‟ lifestyle. A quantitative and qualitative segmentation established by the Whitaker Lifestyle™ Method was created in order to define a concrete and clear identification of the customer, by understanding the behavior, style and preferences of each segment. After conducting 18 in-depth interviews, it was concluded that four main personas characterize the customer base of the company. These four personas will be the support for the creation of „quick-wins‟ that address to the expectations of each lifestyle, projecting a significant impact on the lifetime-value of the company‟s customer base
Resumo:
The underlying thesis examines the value drivers of direct investments in nursing home real estate in Germany. A survey among investors and operators is conducted in order to identify significant value drivers. Moreover, based on survey results, a framework for assessing German nursing home real estate is developed. This is applied in a case-study about the set-up of a nursing home value-add fund which will demonstrate the value creation process of redeveloping an existing nursing home real estate portfolio. Through a concluding analysis the sources of value creation, sensitivities and future prospects of direct investing into German nursing home real estate are concluded.
Resumo:
I test the Duffie, Gârleanu, and Pedersen hypothesis that security prices incorporate expected future securities lending income. To determine whether institutional investors anticipate gains from future lending of securities, I examine their trading behavior around loan-fee increases. The evidence suggests that institutions buy shares in response to an increase in lending fees, and that this could explain the premium associated with high- lending-fee stocks. Expected future lending income affects stock prices, although the effect seems to be attenuated by the negative information that arises from short selling.
Resumo:
An ion emitter consisting of a sharp silver tip covered in RbAg4I5 solid electrolyte film has been developed and studied. An accelerating potential is applied and Ag+ ions are emitted from the tip’s apex by field evaporation. The emitted ions are collected by a Faraday cup, producing a current on the pico/nanoampere level which is read by an electrometer. The tips were produced mechanically by sandpaper polishing. The sharpest tip produced had a 2:4 m apex radius. Two deposition methods were studied: thermal vacuum and pulsed laser deposition. The best tip produced a peak current value of 96nA at 180oC, and a quasi-stable 4nA emission current at 160oC, both using an extraction potential of 10kV . The emission dependence on time, temperature and accelerating potential has been studied. Deposited films were characterized by X-ray diffraction (XRD), profilometry, optical and Scanning Electron Microscope (SEM) and Secondary Ion Mass Spectroscopy (SIMS) measurements. Several ion emitters were developed, the latter ones were all able to maintain stable high ion emissions for long periods of time. This investigation was a continuation of an ongoing project backed by the European Space Agency, with the objective of making a proof of concept of this kind of ion emitter with potential application on ion thrusters for orbiting satellites. Going forward, it would be interesting to make a finer analysis of the electrolyte’s conductivity at high temperatures, explore Wien Effect-based emission and to further develop a multi-tip ion emitter prototype.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.